Technology

Related News

Australia and New Zealand central banks monitoring Anthropic's Mythos release

  • None
  • Published date: 2026-04-22 08:12:35

SYDNEY, April 22 : The central banks of Australia and New Zealand said on Wednesday they were monitoring the release of Anthropic's advanced Mythos artificial intelligence model, joining authorities around the world in expressing concerns about the new cybers…

SYDNEY, April 22 : The central banks of Australia and New Zealand said on Wednesday they were monitoring the release of Anthropic's advanced Mythos artificial intelligence model, joining authorities … [+1649 chars]

Anthropic's Mythos model accessed by unauthorised users: Bloomberg

  • Reuters
  • Published date: 2026-04-22 06:21:58

Unauthorized users reportedly gained access to Anthropic's new Mythos AI model via a private online forum on the same day the company announced plans for limited testing. Anthropic is investigating the alleged breach through a third-party vendor environment. …

A small group of unauthorized users has accessed Anthropic's new Mythos AI model, Bloomberg News reported on Tuesday, citing documentation and a person familiar with the matter.A handful of users in … [+903 chars]

Anthropic's Mythos model accessed by unauthorized users, Bloomberg News reports

  • yahoo
  • Published date: 2026-04-22 02:31:02

A handful of users in a private online forum gained access to Mythos on the same day that Anthropic first announced ‌a plan to ⁠release the model... The group has been using Mythos regularly since then, though not for ​cybersecurity purposes... Announced on A…

Skip to comments. Anthropic's Mythos model accessed by unauthorized users, Bloomberg News reports yahoo ^ | Tue, April 21, 2026 at 2:49 PM PDT | Reuters Posted on 04/21/2026 7:31:02 PM PDT by … [+1188 chars]

Japan finance minister to meet banks to discuss Mythos AI model, Bloomberg News reports

  • None
  • Published date: 2026-04-22 02:20:35

April 21 : Japan's Finance Minister Satsuki Katayama plans to meet the country's biggest banks and other financial institutions as early as this week to discuss Anthropic PBC's latest AI model Mythos, Bloomberg News reported on Tuesday citing people familiar …

April 21 : Japan's Finance Minister Satsuki Katayama plans to meet the country's biggest banks and other financial institutions as early as this week to discuss Anthropic PBC's latest AI model Mythos… [+590 chars]

Randall Munroe’s XKCD ‘Planets and Bright Stars’

  • None
  • Published date: 2026-04-22 00:00:00

None

<p>The post <a href="https://xkcd.com/3219/">Randall Munroe’s XKCD 'Planets and Bright Stars'</a> appeared first on <a href="https://www.infosecurity.us/">Infosecurity.US</a>.</p><figure class=" sqs-block-image-figure intrinsic "> <p> <a class=" sqs-block-image-link " href="https://randall%20munroe%E2%80%99s%20xkcd%20'planets%20and%20bright%20stars'/"></a></p> <p> <img data-stretch="false" data-image="https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/b8b8c37c-ab4d-4455-a4a0-bba738653f5a/planets_and_bright_stars.png" data-image-dimensions="374x265" data-image-focal-point="0.5,0.5" alt="" data-load="false" elementtiming="system-image-block" src="https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/b8b8c37c-ab4d-4455-a4a0-bba738653f5a/planets_and_bright_stars.png?format=1000w" width="374" height="265" sizes="auto, (max-width: 640px) 100vw, (max-width: 767px) 100vw, 100vw" onload='this.classList.add("loaded")' srcset="https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/b8b8c37c-ab4d-4455-a4a0-bba738653f5a/planets_and_bright_stars.png?format=100w 100w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/b8b8c37c-ab4d-4455-a4a0-bba738653f5a/planets_and_bright_stars.png?format=300w 300w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/b8b8c37c-ab4d-4455-a4a0-bba738653f5a/planets_and_bright_stars.png?format=500w 500w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/b8b8c37c-ab4d-4455-a4a0-bba738653f5a/planets_and_bright_stars.png?format=750w 750w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/b8b8c37c-ab4d-4455-a4a0-bba738653f5a/planets_and_bright_stars.png?format=1000w 1000w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/b8b8c37c-ab4d-4455-a4a0-bba738653f5a/planets_and_bright_stars.png?format=1500w 1500w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/b8b8c37c-ab4d-4455-a4a0-bba738653f5a/planets_and_bright_stars.png?format=2500w 2500w" loading="lazy" decoding="async" data-loader="sqs"></p> <p> <figcaption class="image-caption-wrapper"> <p data-rte-preserve-empty="true"><strong>via the comic artistry and dry wit of Randall Munroe, creator of XKCD</strong></p> </figcaption></p></figure><p><a href="https://www.infosecurity.us/blog/2026/4/22/randall-munroes-xkcd-planets-and-bright-stars-1">Permalink</a></p><p> </p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/randall-munroes-xkcd-planets-and-bright-stars-2/" data-a2a-title="Randall Munroe’s XKCD ‘Planets and Bright Stars’"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Frandall-munroes-xkcd-planets-and-bright-stars-2%2F&amp;linkname=Randall%20Munroe%E2%80%99s%20XKCD%20%E2%80%98Planets%20and%20Bright%20Stars%E2%80%99" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Frandall-munroes-xkcd-planets-and-bright-stars-2%2F&amp;linkname=Randall%20Munroe%E2%80%99s%20XKCD%20%E2%80%98Planets%20and%20Bright%20Stars%E2%80%99" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Frandall-munroes-xkcd-planets-and-bright-stars-2%2F&amp;linkname=Randall%20Munroe%E2%80%99s%20XKCD%20%E2%80%98Planets%20and%20Bright%20Stars%E2%80%99" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Frandall-munroes-xkcd-planets-and-bright-stars-2%2F&amp;linkname=Randall%20Munroe%E2%80%99s%20XKCD%20%E2%80%98Planets%20and%20Bright%20Stars%E2%80%99" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Frandall-munroes-xkcd-planets-and-bright-stars-2%2F&amp;linkname=Randall%20Munroe%E2%80%99s%20XKCD%20%E2%80%98Planets%20and%20Bright%20Stars%E2%80%99" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.infosecurity.us/">Infosecurity.US</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Marc Handelman">Marc Handelman</a>. Read the original post at: <a href="https://xkcd.com/3219/">https://xkcd.com/3219/</a> </p>

SnowFROC 2026: Secure Defaults, Real Trust, and a Better Layer on Top

  • Dwayne McDaniel
  • Published date: 2026-04-22 00:00:00

None

<p>The post <a href="https://blog.gitguardian.com/snowfroc-2026/">SnowFROC 2026: Secure Defaults, Real Trust, and a Better Layer on Top</a> appeared first on <a href="https://blog.gitguardian.com/">GitGuardian Blog – Take Control of Your Secrets Security</a>.</p><p><img decoding="async" src="https://storage.ghost.io/c/42/5d/425d266f-cf99-406e-9436-597a19bed011/content/images/2026/04/SnowFROCimage.png" alt="SnowFROC 2026: Secure Defaults, Real Trust, and a Better Layer on Top"></p><p>Denver likes a good origin story. The city still keeps a marker for <a href="https://visitdenver.com/blog/post/cheeseburger-birthplace/?ref=blog.gitguardian.com"><u>Louis Ballast and the Humpty Dumpty Barrel, the local spot tied to the cheeseburger’s Colorado claim</u></a>. That detail felt oddly right for <a href="https://snowfroc.com/?ref=blog.gitguardian.com"><u>SnowFROC 2026</u></a>. A cheeseburger is a small upgrade that changes the whole meal. This year’s conference kept returning to the same ideas in AppSec, such as how meaningful security progress often comes from well-placed layers that make the better choice easier to make. </p><p>The Snow in "SnowFROC" is due to the time of year the event takes place and the good possibility that it will snow, <a href="https://bsky.app/profile/mdwayne-real.bsky.social/post/3mjplq47s4m2x?ref=blog.gitguardian.com"><u>which it did this year</u></a>.  The other half of the name stands for Front Range OWASP Conference. This year, they expanded it into a two-day event in Denver that drew about 400 attendees to see 35 sessions, take part in 8 half-day training sessions, a CTF, and multiple village activities. The room carried that blend of practical curiosity and sharp hallway conversation that makes any security conference worth the trip. </p><p>Throughout the event, the sessions covered how software is actually built now: fast, AI-assisted, dependency-heavy, and spread across more people and systems than any one security team can fully monitor alone. The strongest sessions focused on incentives, workflows, trust boundaries, and the places where attackers keep finding leverage because defenders still leave too much to intent, memory, and good luck.</p><p>Here are just a few notes from SnorFROC 2026.</p><h2 id="the-human-layer-in-secure-defaults"><strong>The Human Layer in Secure Defaults</strong></h2><p>In the keynote from<a href="https://ca.linkedin.com/in/tanya-janca?ref=blog.gitguardian.com"><u> Tanya Janca, founder of She Hacks Purple Consulting</u></a>, called "Threat Modeling Developer Behavior: The Psychology of Bad Code," she explained that in AppSec, insecure code is rarely just a technical failure. It is usually a human one. Developers work under pressure, chase deadlines, respond to incentives, and fall back on habits, biases, and shortcuts that feel reasonable in the moment. Instead of telling people they are wrong and expecting better outcomes, AppSec teams need to understand why those choices happen in the first place. Psychology helps explain the gap between what teams say they value and what their systems actually reward.</p><p>Tanya talked about intervention and prevention over blame. Secure defaults beat secure intent because they remove friction and make the safer path the easier one. That can look like pre-commit hooks, IDE nudges, secure-by-default templates, and frequent reminders placed where decisions actually happen, not buried in a wiki. The same logic applies to training. Annual compliance sessions and lists of what not to do do not change behavior very well. Teaching secure patterns, explaining the why behind them, and reinforcing them in small daily ways is far more likely to stick. The goal is not more nagging. It is better environmental design.</p><p>Tayna shared her experiences about AI-assisted coding triggering automation bias, where people trust confident suggestions too quickly. Tight deadlines push present bias, making future breach risk feel abstract next to immediate shipping pressure. Copying code from forums, skipping tests, ignoring warnings, avoiding documentation, or showing off with clever code all follow similar patterns. </p><p>She asked us all to build systems that reward maintainable, tested, secure work and measure what actually matters, including time to fix, adoption of secure patterns, and real vulnerability reduction. If teams want secure coding to be real, they have to make it the path of least resistance.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img decoding="async" src="https://storage.ghost.io/c/42/5d/425d266f-cf99-406e-9436-597a19bed011/content/images/2026/04/data-src-image-9b8dc1df-9ed9-4d7b-8e9d-fa969e3d8d20.png" class="kg-image" alt="SnowFROC 2026: Secure Defaults, Real Trust, and a Better Layer on Top" loading="lazy" width="1000" height="753" srcset="https://storage.ghost.io/c/42/5d/425d266f-cf99-406e-9436-597a19bed011/content/images/size/w600/2026/04/data-src-image-9b8dc1df-9ed9-4d7b-8e9d-fa969e3d8d20.png 600w, https://storage.ghost.io/c/42/5d/425d266f-cf99-406e-9436-597a19bed011/content/images/2026/04/data-src-image-9b8dc1df-9ed9-4d7b-8e9d-fa969e3d8d20.png 1000w" sizes="auto, (min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Tanya Janca</span></figcaption></figure><h2 id="trust-has-become-a-supply-chain-primitive"><strong>Trust Has Become a Supply Chain Primitive</strong></h2><p><a href="https://www.linkedin.com/in/chris-lindsey-39b3915?ref=blog.gitguardian.com"><u>Chris Lindsey, Field CTO at OX Security</u></a>, started his talk "Inside the Modern Threat Landscape: Attacker Wins, Defender Moves, and Your Priorities," with a reminder that choosing not to act is still a choice. In today’s threat landscape, a small set of attack vectors keeps showing up in outsized breaches, including credential theft, session hijacking, phishing, typosquatting, browser extensions, DNS poisoning, and software that appears to come from trusted sources. The common thread is trust. Attackers do not usually break in by brute force alone, instead they build credibility first through a convincing email or a familiar package name, or a browser extension that looks legitimate on the surface. </p><p>Chris asked us to think in terms of what security leaders are asked by boards all the time and often struggle to answer: what did we actually get for this investment? What we need more disciplined framework for evaluating security spending based on risk reduction per dollar. That means asking better questions up front: what threat does this control address, what does it really cost once licensing, implementation, staffing, and maintenance are included, and what measurable reduction in exposure does it create? This is how you get to structured decision-making. When security teams can explain why one control was prioritized over another in terms that leadership understands, the conversation changes from vague reassurance to defensible tradeoffs.</p><p>If software and packages are still being pulled in freely, if extensions get broad permissions without scrutiny, and if reviews stop at surface-level validation, the pipeline stays open to abuse. Chris walked through examples that looked benign at first glance but revealed patterns of Trojan behavior, suspicious permissions, deceptive imports, callback infrastructure, and signs of rushed or obfuscated code. Prioritization is key. </p><p>He gave us the practical advice of what we could immediately implement: Scan software before use, review open source with stronger technical oversight, pin safe packages, and introduce cooldown periods. We must adopt a posture in which we rotate keys aggressively, sever malicious command-and-control connections urgently, and embrace AI to scale analysis where it adds real value. Attackers are operating in the real world and have no intention of reading your threat model. Your defenses need to be just as practical and reality-based.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img decoding="async" src="https://storage.ghost.io/c/42/5d/425d266f-cf99-406e-9436-597a19bed011/content/images/2026/04/data-src-image-8f9ce2b3-f9b8-4cbd-a00b-c76b372e776b.png" class="kg-image" alt="SnowFROC 2026: Secure Defaults, Real Trust, and a Better Layer on Top" loading="lazy" width="1000" height="753" srcset="https://storage.ghost.io/c/42/5d/425d266f-cf99-406e-9436-597a19bed011/content/images/size/w600/2026/04/data-src-image-8f9ce2b3-f9b8-4cbd-a00b-c76b372e776b.png 600w, https://storage.ghost.io/c/42/5d/425d266f-cf99-406e-9436-597a19bed011/content/images/2026/04/data-src-image-8f9ce2b3-f9b8-4cbd-a00b-c76b372e776b.png 1000w" sizes="auto, (min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Chris Lindsey</span></figcaption></figure><h2 id="npm%E2%80%99s-crisis-is-really-an-operations-story"><strong>npm’s Crisis Is Really an Operations Story</strong></h2><p>In the session from<a href="https://www.linkedin.com/in/jenngile?ref=blog.gitguardian.com"><u> Jenn Gile, founder of OpenSourceMalware.com</u></a>, called "npm's dark side: Preventing the next Shai-Hulud," she presented the last year of npm account takeovers and package compromises as a lesson in how malware now rides normal engineering behavior. Jenn drew a sharp line between two kinds of software risk: accidental vulnerabilities and intentionally malicious packages. A vulnerability is a flaw that can be exploited if an attacker has a viable path. Malicious software is built from the start to cause harm, often by targeting developers and build environments directly, and it does not always need the same kind of runtime path to do damage. Malicious code does rely, though, on abusing trust. When trust is the vector, the usual instinct to stay on the latest version can become part of the problem.</p><p>The heart of the session was account takeover (ATO) and why npm remains such an attractive target. Install scripts still run by default, and provenance is not mandatory. Long-lived publishing tokens remain common. In practice, that means attackers do not always need to break the package ecosystem itself. They can hijack trust that already exists. Jenn walked through a string of compromises from 2025 into 2026, including phishing campaigns, typosquatted domains, spoofed maintainer emails, CI and GitHub Actions token theft, and follow-on attacks that used stolen secrets to widen the blast radius. The throughline across cases like Nx, Qix, <a href="https://blog.gitguardian.com/shai-hulud-2/"><u>Shai-Hulud</u></a>, <a href="https://blog.gitguardian.com/team-pcp-snowball-analysis/"><u>TeamPCP</u></a>, and Axios was not just a technical weakness. It was how easily trusted maintainers, trusted packages, and trusted upgrade habits could be turned against the people relying on them.</p><p>Jenn explained that hardware keys help protect the human authentication path, while trusted publishing helps protect the machine path by tying publication to a specific GitHub Actions identity. Session-based authentication can reduce exposure windows, even if it does not eliminate the risk of phishing. However, strong controls only work if teams actually use them, and right now, friction and bias still get in the way.</p><p>Jenn's advice was to treat malware prevention as a team sport across development, product security, cloud security, and incident response. Use lockfiles, avoid automatic upgrades, scrutinize lifecycle scripts, harden CI, scan for malware earlier, rotate and scope credentials, monitor for misuse, and build supply chain playbooks that account for how malware behaves differently from ordinary vulnerabilities, especially in the JavaScript and Python ecosystems.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img decoding="async" src="https://storage.ghost.io/c/42/5d/425d266f-cf99-406e-9436-597a19bed011/content/images/2026/04/data-src-image-9a5b7271-e518-415c-a8fe-141df547adab.png" class="kg-image" alt="SnowFROC 2026: Secure Defaults, Real Trust, and a Better Layer on Top" loading="lazy" width="1000" height="753" srcset="https://storage.ghost.io/c/42/5d/425d266f-cf99-406e-9436-597a19bed011/content/images/size/w600/2026/04/data-src-image-9a5b7271-e518-415c-a8fe-141df547adab.png 600w, https://storage.ghost.io/c/42/5d/425d266f-cf99-406e-9436-597a19bed011/content/images/2026/04/data-src-image-9a5b7271-e518-415c-a8fe-141df547adab.png 1000w" sizes="auto, (min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Jenn Gile</span></figcaption></figure><h2 id="scale-comes-from-systems-not-heroics"><strong>Scale Comes From Systems, Not Heroics</strong></h2><p>In the final talk of the day, from <a href="https://www.linkedin.com/in/mudita-khurana-87b72442/?ref=blog.gitguardian.com"><u>Mudita Khurana, an Airbnb staff security engineer</u></a>, called "Scaling AppSec through humans &amp; agents," they presented a model for handling a world where code volume is rising fast, AI tools are now common, and meaningful portions of code are being produced outside the old IDE-centered workflow. She explained her company is seeing more code, more contributors, and far more code generated with AI than even a few years ago. Today nearly all pull request authors are using AI coding tools weekly, a meaningful amount of code is now written by non-engineers outside the IDE, and a large share of total code is AI-generated. Mudita explained you cannot keep up by adding manual review alone. Their response is a layered one: unified tooling to create consistency, LLM agents to extend coverage, and a human network to bring judgment and context where automation still falls short.</p><p>A single security CLI acts as the abstraction layer over capabilities like static analysis, software composition analysis, secrets detection, and infrastructure-as-code scanning, with the same experience, exemptions, and metrics no matter where it runs. That lets security checks show up across the developer workflow, from lightweight pre-commit feedback to fuller pull request scans and post-merge coverage. </p><p>On top of that, the team is using AI for security review in a more grounded way than generic prompting. Instead of asking a model for a broad security pass, they feed it security requirements as code, along with internal frameworks, auth models, and known anti-patterns. They also measure prompt changes against a dataset built from real historical vulnerabilities, which gives them a baseline for whether the agents are actually improving.</p><p>The part of their plan that Mudita was the most excited to share was their security champions program. They do not treat this program as volunteer side work. It is tied to the engineering career ladder, backed by real responsibilities, and supported with a two-way flow of data between security and the orgs doing the work. These champions help write custom rules, triage findings, support risk assessments, and drive adoption because they understand the business context in a way central security teams often cannot. They have created a feedback loop where human insight improves the tools, the tools improve the signal, and prevention gradually moves earlier, into the IDE, into AI prompts, and into the default way code gets written.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img decoding="async" src="https://storage.ghost.io/c/42/5d/425d266f-cf99-406e-9436-597a19bed011/content/images/2026/04/data-src-image-6417a808-7d7c-4078-abe8-5bafd5d0ab0b.png" class="kg-image" alt="SnowFROC 2026: Secure Defaults, Real Trust, and a Better Layer on Top" loading="lazy" width="1000" height="753" srcset="https://storage.ghost.io/c/42/5d/425d266f-cf99-406e-9436-597a19bed011/content/images/size/w600/2026/04/data-src-image-6417a808-7d7c-4078-abe8-5bafd5d0ab0b.png 600w, https://storage.ghost.io/c/42/5d/425d266f-cf99-406e-9436-597a19bed011/content/images/2026/04/data-src-image-6417a808-7d7c-4078-abe8-5bafd5d0ab0b.png 1000w" sizes="auto, (min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Mudita Khurana</span></figcaption></figure><h2 id="security-that-lives-where-decisions-happen">Security that lives where decisions happen</h2><p>One pattern ran through almost every strong session: security works best when it shows up at the point of action. In an IDE. In a pull request. In a package policy. In a browser extension review. In a token issuance flow. In a prompt used by an AI assistant. Teams still lose time when secure guidance lives in a wiki, a yearly training deck, or a control that runs too late to influence the original choice.</p><p>That shift sounds simple, but it changes program design. It favors lightweight friction, contextual signals, paved paths, and small reminders over large annual campaigns. It also favors security teams that can collaborate with developer platforms, identity teams, and cloud teams instead of operating as a separate review function.</p><h3 id="the-new-perimeter-is-made-of-borrowed-trust"><strong>The new perimeter is made of borrowed trust</strong></h3><p>Modern software development depends on borrowed trust. Developers trust registries, packages, maintainers, AI suggestions, browser tools, and automation pipelines. Organizations trust tokens, runners, integrations, and service accounts to behave within expected bounds. Attackers know that every one of those relationships can be bent.</p><p>That has direct implications for secrets management and non-human identities. A stolen token, an over-scoped credential, or a poisoned dependency can move through trusted systems much faster than traditional controls were built to handle. The answer is tighter provenance, shorter credential lifetimes, stronger attestation, clearer ownership, and continuous review of the trust assumptions hiding inside delivery pipelines.</p><h3 id="maturity-now-means-feedback-loops"><strong>Maturity now means feedback loops</strong></h3><p>There was another persistent theme that we need to focus on creating feedback loops. Behavioral nudges need measurement to know how to improve them. Threat prioritization needs cost and impact models to claim success. AI review needs evaluation against real defects to be meaningful. Supply chain response needs intelligence, containment, and recovery steps that teams can actually execute.</p><p>Mature AppSec programs increasingly look like systems that learn. They collect signals, improve defaults, refine detections, tighten identity boundaries, and push lessons back into the places where code and infrastructure are created. The organizations that do this well will handle AI-generated code, secrets sprawl, and NHI governance with more control because they have already built the habit of turning incidents and friction into better operating models.</p><h2 id="mile-high-city-learnings"><strong>Mile High City Learnings</strong></h2><p>SnowFROC 2026, which happens at the highest altitupd of any OWASP event, felt grounded in the best way. Talks treated security as daily operating design that focused on how people are rewarded, how trust is granted, how credentials spread, and how teams scale judgment without burning out the humans in the loop. Your author was able to give a talk about how we moved from slow waterfall based deployment to a world of DevOps where we have never deployed more, faster. We have a golden opportunity as we adopt AI across our tool chains to rethink authentication in a meaningful way that might just reverberate through all our stacks of non-human identities. That is the feedback look we can all benefit from.  </p><p>For teams thinking about identity risk, secrets exposure, and the governance of machine-driven development, SnowFROC offered a useful path forward. Start with defaults. Reduce silent trust. Treat credentials and dependencies as live operational risk. Then build feedback loops that make the next secure decision easier than the last one. That is a practical agenda, and after a snowy spring day in Denver, it also feels achievable.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/snowfroc-2026-secure-defaults-real-trust-and-a-better-layer-on-top/" data-a2a-title="SnowFROC 2026: Secure Defaults, Real Trust, and a Better Layer on Top"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fsnowfroc-2026-secure-defaults-real-trust-and-a-better-layer-on-top%2F&amp;linkname=SnowFROC%202026%3A%20Secure%20Defaults%2C%20Real%20Trust%2C%20and%20a%20Better%20Layer%20on%20Top" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fsnowfroc-2026-secure-defaults-real-trust-and-a-better-layer-on-top%2F&amp;linkname=SnowFROC%202026%3A%20Secure%20Defaults%2C%20Real%20Trust%2C%20and%20a%20Better%20Layer%20on%20Top" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fsnowfroc-2026-secure-defaults-real-trust-and-a-better-layer-on-top%2F&amp;linkname=SnowFROC%202026%3A%20Secure%20Defaults%2C%20Real%20Trust%2C%20and%20a%20Better%20Layer%20on%20Top" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fsnowfroc-2026-secure-defaults-real-trust-and-a-better-layer-on-top%2F&amp;linkname=SnowFROC%202026%3A%20Secure%20Defaults%2C%20Real%20Trust%2C%20and%20a%20Better%20Layer%20on%20Top" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fsnowfroc-2026-secure-defaults-real-trust-and-a-better-layer-on-top%2F&amp;linkname=SnowFROC%202026%3A%20Secure%20Defaults%2C%20Real%20Trust%2C%20and%20a%20Better%20Layer%20on%20Top" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://blog.gitguardian.com/">GitGuardian Blog - Take Control of Your Secrets Security</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Dwayne McDaniel">Dwayne McDaniel</a>. Read the original post at: <a href="https://blog.gitguardian.com/snowfroc-2026/">https://blog.gitguardian.com/snowfroc-2026/</a> </p>

Agentic Data Pipelines: The Shift to Autonomous Data Engineering

  • None
  • Published date: 2026-04-22 00:00:00

None

<p>Data engineering is no longer about building pipelines that follow instructions. It is about building systems that think, adapt, and fix themselves. The traditional model of static workflows, manual monitoring, and reactive debugging is breaking under the pressure of modern data scale and speed.</p><p><a href="https://www.ishir.com/blog/320339/ai-native-marketing-is-here-its-not-the-next-destination.htm">Agentic data pipelines</a> change that completely. They replace rigid processes with autonomous systems powered by AI agents that can observe, reason, act, and learn in real time. Instead of waiting for engineers to intervene, these pipelines make decisions on their own, handle failures as they happen, and continuously improve from experience.</p><p>This shift is not theoretical. It is already redefining how data platforms are built and operated in 2026. In this blog, we break down how agentic pipelines work, what makes them different, and how teams can start adopting them without unnecessary risk.</p><h2>What Are Agentic Data Pipelines?</h2><p>Traditional data pipelines follow fixed instructions. <a href="https://www.ishir.com/blog/319236/how-to-prepare-your-business-for-ai-a-workflow-first-approach.htm">Engineers define workflows</a>, schedule jobs, and fix failures manually. Agentic pipelines remove that rigidity. They are AI-driven systems that can reason, plan, act, and learn without constant human input. In 2026, this is no longer experimental. Most new data infrastructure is being created and managed by <a href="https://www.ishir.com/artificial-intelligence.htm">AI agents</a>, not humans.</p><h2>The Six Layers of an Agentic Pipeline: How Intelligence Is Built Into Data Systems</h2><p><strong>1. Intent Layer</strong><br> The intent layer defines the purpose of the pipeline instead of just the steps. It captures business goals, data consumers, and expectations around freshness, accuracy, and reliability. This allows the system to prioritize decisions dynamically based on outcomes, not instructions. Without intent, the pipeline cannot adapt and simply executes blindly.</p><p><strong>2. Observability Layer</strong><br> The observability layer provides continuous visibility into pipeline health, <a href="https://www.ishir.com/blog/126517/why-investing-in-quality-analysts-is-investing-in-your-future.htm">data quality</a>, and system performance. It tracks metrics like failures, schema drift, anomalies, and SLA breaches in real time. These signals act as the foundation for decision-making. Without strong observability, the system lacks awareness and cannot respond effectively.</p><p><strong>3. Reasoning Engine</strong><br> The reasoning engine is the decision-making core that interprets signals and determines the right course of action. It performs root cause analysis, evaluates possible fixes, and selects the best response based on context. This eliminates generic reactions and replaces them with intelligent, situation-aware decisions. It is what makes the pipeline autonomous instead of reactive.</p><p><strong>4. Action Layer</strong><br> The action layer executes decisions directly within the system by interacting with orchestration tools and infrastructure. It can restart jobs, scale resources, modify queries, or isolate faulty data. This layer ensures that decisions are not just theoretical but actually implemented in production. Speed and reliability of execution define its effectiveness.</p><p><strong>5. Memory Layer</strong><br> The memory layer stores past incidents, decisions, and outcomes to improve future responses. It allows the system to learn from recurring issues and resolve them faster over time. Instead of re-analyzing every problem, the pipeline builds operational intelligence. This continuous learning is what drives long-term efficiency and resilience.</p><p><strong>6. Governance Layer</strong><br> The governance layer enforces policies, controls, and compliance boundaries for all actions. It defines what can be automated, what requires approval, and ensures every decision is logged and traceable. This layer builds trust by balancing autonomy with control. Without governance, the system risks making unchecked changes in production.</p><h2>AI-Driven Pipeline Automation Loop: From Detection to Self-Healing</h2><p>Agentic pipelines operate on a continuous loop that enables real-time decision-making and self-healing without human intervention. Each step in the loop plays a distinct role in maintaining and improving the system.</p><ul> <li><strong>Observe</strong><br> Continuously monitors system signals, including logs, metrics, data quality, schema changes, and performance indicators. This step ensures the pipeline has full visibility into both data and infrastructure conditions in real time.</li> <li><strong>Reason</strong><br> Analyzes the observed signals to identify root causes of issues. It differentiates between transient errors and deeper systemic problems, then determines the most effective course of action based on context and intent.</li> <li><strong>Act</strong><br> Executes the chosen response directly within the system. This could involve retrying jobs, scaling resources, modifying queries, or isolating problematic data to prevent downstream impact.</li> <li><strong>Remember</strong><br> Stores the incident, decision, and outcome as part of the system’s memory. This enables faster and more accurate handling of similar issues in the future, improving performance over time.</li> </ul><h2>AI-Powered Self-Healing Pipelines for Data Reliability</h2><p>Self-healing is the immediate payoff. Engineers currently spend a large portion of time identifying and fixing issues. Agentic systems eliminate most of that effort.</p><p><strong>Failure scenarios and autonomous responses</strong></p><p><img fetchpriority="high" decoding="async" class="alignnone size-full wp-image-320924" src="https://www.ishir.com/wp-content/uploads/2026/04/AI-First-Products-4.png" alt="" width="740" height="432" srcset="https://www.ishir.com/wp-content/uploads/2026/04/AI-First-Products-4.png 740w, https://www.ishir.com/wp-content/uploads/2026/04/AI-First-Products-4-300x175.png 300w" sizes="(max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 984px) 61vw, (max-width: 1362px) 45vw, 600px"></p><h2>Autonomous Data Pipeline Generation: AI-Driven Pipeline Creation from Intent</h2><h4><strong>Autonomous Pipeline Generation</strong></h4><p>Beyond self-healing, agentic systems can generate entire pipeline components from natural language specifications or by analyzing raw data patterns. Tools like Databricks Genie Code (launched March 2026) and Snowflake Cortex Code represent the leading edge of this capability.</p><p>Genie Code reasons through problems, plans multi-step approaches, writes and validates production-grade code, and maintains the result — all while keeping humans in control of the decisions that matter. On real-world data science tasks, it more than doubled the success rate of leading coding agents from 32.1% to 77.1%.</p><p><strong>E<u>xample: Agent-generated dbt model</u></strong></p><p><a href="https://www.ishir.com/data-ai-acceleration.htm">Data transformation agents</a> can analyze raw data patterns, suggest and generate dbt models and tests automatically, aligned with organizational best practices. Here is what agent-assisted pipeline generation looks like:</p><p><img decoding="async" class="alignnone size-full wp-image-320929" src="https://www.ishir.com/wp-content/uploads/2026/04/AI-First-Products-5.png" alt="AI-First Products " width="740" height="432" srcset="https://www.ishir.com/wp-content/uploads/2026/04/AI-First-Products-5.png 740w, https://www.ishir.com/wp-content/uploads/2026/04/AI-First-Products-5-300x175.png 300w" sizes="(max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 984px) 61vw, (max-width: 1362px) 45vw, 600px"></p><h2>Multi-Agent Data Pipeline Orchestration: Coordinating AI Agents for Scalable, Autonomous Data Engineering</h2><p>Modern agentic pipelines do not rely on a single AI agent. They operate as coordinated systems of specialized agents, each responsible for a specific function within the data lifecycle. This approach mirrors how high-performing data teams work, but executes at machine speed with continuous coordination and no handoffs.</p><p>At the center is the <a href="https://www.ishir.com/ai-agent-orchestration-services.htm">orchestrator agent</a>, which acts as the control layer. It assigns tasks, manages dependencies, resolves conflicts between agents, and maintains a global view of pipeline health. It ensures that all components work in sync and that decisions align with the pipeline’s intent and governance policies.</p><p><strong>Supporting it are domain-specific agents:</strong></p><ul> <li><strong>Ingestion Agents</strong> handle data intake from multiple sources. They monitor schema changes, adjust parsing logic dynamically, and ensure incoming data remains compatible with downstream systems. This reduces breakages caused by upstream changes.</li> <li><strong>Data Quality Agents</strong> continuously validate data against defined standards. They detect anomalies, enforce data contracts, quarantine bad records, and trigger corrective actions when quality thresholds are violated. This prevents bad data from propagating across the pipeline.</li> <li><strong>Transformation Agents</strong> generate, optimize, and maintain transformation logic. They build <a href="https://www.ishir.com/hire-mysql-developer.htm">SQL queries</a>, dbt models, and feature engineering workflows while continuously improving performance and efficiency based on usage patterns.</li> </ul><p>The real complexity lies in coordination. These agents often operate on overlapping responsibilities and shared resources. The orchestration layer must manage dependencies, prioritize tasks, and resolve conflicts in real time. For example, a quality agent may flag an issue while a transformation agent is mid-execution. The orchestrator decides whether to pause, reroute, or continue processing based on impact and policy.</p><p>This multi-agent architecture enables parallel execution, faster recovery, and higher system resilience. Instead of a single point of failure, intelligence is distributed across multiple agents that collaborate continuously. The result is a data pipeline that is not just automated, but coordinated, adaptive, and scalable by design.</p><h2>Governance, Trust &amp; the Human-in-the-Loop</h2><p>The most common objection to agentic pipelines is: how do you trust a system that modifies <a href="https://www.ishir.com/blog/42058/top-15-emerging-databases-to-use-in-2022-and-beyond.htm">production databases</a> without asking permission? The answer is Policy-Based Action Frameworks – a governance layer that defines exactly what agents can and cannot do autonomously.</p><p><strong>Policy enforcement levels:</strong></p><ul> <li>Notify only – agent identifies issue, logs it, and alerts a human. No autonomous action taken.</li> <li>Suggest – agent proposes a specific remediation with reasoning. Human reviews and approves before execution.</li> <li>Auto-approve low-risk – agent autonomously executes pre-approved actions (retries, minor schema fixes). Logs all actions.</li> <li>Full autonomy with audit – agent acts freely within defined policy boundaries. Every action logged with reasoning traces.</li> </ul><p>Most organizations start at ‘notify only’ and progressively unlock higher autonomy as trust in the system is established. This graduated approach is critical – it allows teams to validate the agent’s logic in shadow mode before granting write access to production systems.</p><p>As agentic operating models mature, <a href="https://www.ishir.com/hire-big-data-engineer.htm">data engineers</a> shift from hand-coding transformations to supervising autonomous systems. That means designing guardrails, reviewing agent decisions, and resolving novel edge cases. Explainability becomes core to the model: reasoning traces, auditable logs, and human-in-the-loop checkpoints are required for trust and compliance.</p><h2>AI-Powered Data Engineering Tools, Roles, and Impact</h2><h4><strong>Agentic Data Platforms</strong></h4><p><strong>Tools included:</strong> Databricks Genie Code, Snowflake Cortex Code<br> These platforms handle end-to-end pipeline generation, optimization, and deployment. They translate business intent into production-ready workflows using AI. The impact is faster development cycles, reduced manual coding, and higher consistency in pipeline design.</p><h4><strong>Pipeline Orchestration Tools</strong></h4><p><strong>Tools included:</strong> Apache Airflow, Dagster, Prefect<br> These tools manage scheduling, dependencies, and execution of <a href="https://www.ishir.com/blog/313910/ai-agent-orchestration-how-it-works-and-why-it-matters.htm">data workflows</a>. In agentic systems, they act as execution backbones where AI agents trigger reruns, adjust workflows, and optimize operations in real time. Their role is critical for stability and controlled execution.</p><h4><strong>Self-Healing and Observability Tools</strong></h4><p><strong>Tools included:</strong> Acceldata ADM, Monte Carlo, OpenTelemetry<br> These tools provide deep visibility into pipeline health, data quality, and system performance. They enable anomaly detection and support automated remediation through <a href="https://www.ishir.com/ai-agent-development-services.htm">agentic decision-making</a>. The impact is reduced downtime and elimination of manual debugging.</p><h4><strong>Data Transformation and AI Modeling Tools</strong></h4><p><strong>Tools included:</strong> dbt with AI agents, Spark with LLMs<br> These tools automate the creation and optimization of data transformations. They generate <a href="https://www.ishir.com/blog/317646/migrating-sql-server-to-aurora-postgresql-solving-the-real-challenges-of-cloud-database-modernization.htm">SQL models</a>, enforce <a href="https://www.ishir.com/software-testing-qa-services.htm">data tests</a>, and improve performance based on usage patterns. This reduces engineering effort while improving data reliability and scalability.</p><h4><strong>Data Governance and Lineage Tools</strong></h4><p><strong>Tools included</strong>: Unity Catalog, Apache Atlas, OpenLineage<br> These systems enforce access controls, maintain lineage, and ensure compliance. They define what actions agents can take and provide full auditability of every decision. Their impact is trust, transparency, and safe automation in production environments.</p><h4><strong>Memory and Context Stores</strong></h4><p><strong>Tools included:</strong> LanceDB, Chroma, Vector databases<br> These systems store historical context, past incidents, and decision outcomes. They allow AI agents to learn from previous scenarios and improve over time. The result is faster resolution of recurring issues and continuous system optimization.</p><h2>Agentic Data Pipeline Implementation Roadmap</h2><h4><strong>Step 1: Start with AI-Assisted Pipeline Development</strong></h4><p>Adopt AI coding tools like GitHub Copilot, Databricks Genie Code, or Snowflake Cortex Code to accelerate pipeline creation. This delivers immediate productivity gains without changing existing architecture. It is the lowest-risk entry point into agentic systems.</p><h4><strong>Step 2: Implement Automated Data Quality Monitoring</strong></h4><p><a href="https://www.ishir.com/hire-machine-learning-engineers.htm">Deploy ML-based data quality</a> and anomaly detection tools to replace static rules. This improves accuracy in detecting issues and significantly reduces alert fatigue. It builds the foundation for intelligent decision-making.</p><h4><strong>Step 3: Deploy Self-Healing Agents in Shadow Mode</strong></h4><p>Introduce agentic systems in “suggest only” mode where they recommend fixes but do not execute them. Monitor their decisions over a few weeks to validate accuracy and build trust. This step ensures safe evaluation before automation.</p><h4><strong>Step 4: Define Governance and Policy Frameworks</strong></h4><p>Establish clear rules for what actions can be automated and what requires human approval. Start with strict controls and gradually allow low-<a href="https://www.ishir.com/strategic-advisory-services.htm">risk autonomous actions</a>. Governance is critical to ensure safe and compliant operations.</p><h4><strong>Step 5: Enable the Autonomous Pipeline Loop</strong></h4><p>Activate the full observe-reason-act-remember loop with controlled autonomy. Allow agents to execute approved actions, learn from outcomes, and continuously improve. Conduct regular audits to ensure decisions remain aligned with business intent and policies.</p><h2>How ISHIR Helps You Build Agentic Data Pipelines</h2><p>ISHIR helps organizations transition from traditional data pipelines to agentic, AI-driven systems by combining Agentic AI development with deep data engineering expertise. We design and build intelligent agents, modernize pipeline architectures, and integrate observability, orchestration, and self-healing capabilities to create scalable, autonomous data platforms aligned with business outcomes.</p><p>Beyond implementation, ISHIR enables real business impact through advanced <a href="https://www.ishir.com/data-analytics.htm">data analytics</a> and hands-on <a href="https://www.ishir.com/data-ai-acceleration.htm">Data + AI workshops</a>. We help teams unlock actionable insights, define clear adoption roadmaps, and build internal capability to manage and scale agentic systems with confidence and control.</p><div class="ctaThreeWrapper"> <div class="ctaThreeContent"> <div class="ctaThreeConList"> <div class="content"> <h2 data-start="0" data-end="101">Struggling with fragile data pipelines, constant failures, and manual fixes slowing your team down?</h2> <p>ISHIR helps you build AI-powered, self-healing data pipelines that automate operations and scale with confidence.</p> <div class="linkWrapper"><a href="https://www.ishir.com/get-in-touch.htm" rel="noopener">Get Started</a></div> </div> </div> </div> </div><h2>FAQs on Agentic Data Pipelines and AI-Driven Data Engineering</h2><h4><strong>Q. What is an agentic data pipeline and how is it different from traditional pipelines?</strong></h4><p>An agentic data pipeline is an AI-driven system that can observe, reason, act, and learn without constant human intervention. Unlike traditional pipelines that follow fixed workflows, agentic pipelines adapt dynamically to changes in data, schema, and system conditions. They do not just execute tasks, they make decisions based on context and intent. This shift reduces manual debugging, improves reliability, and enables real-time optimization. It is a move from static automation to intelligent autonomy.</p><h4><strong>Q. How do AI agents actually improve data pipeline reliability?</strong></h4><p>AI agents improve reliability by continuously monitoring system health and data quality, then taking corrective action instantly. Instead of waiting for alerts and manual fixes, they identify root causes and resolve issues such as failures, anomalies, or schema changes in real time. They also learn from past incidents, which means recurring problems are handled faster and more accurately. This significantly reduces downtime, data inconsistencies, and operational overhead.</p><h4><strong>Q. Are agentic data pipelines safe to use in production environments?</strong></h4><p>Yes, but only when implemented with strong governance frameworks. Most organizations start with limited autonomy where agents suggest actions instead of executing them. Over time, low-risk actions like retries or scaling are automated, while critical changes still require approval. Every action is logged, traceable, and aligned with policy rules. This controlled approach ensures safety, compliance, and trust while gradually increasing automation.</p><h4><strong>Q. What are the main challenges in adopting agentic pipelines?</strong></h4><p>The biggest challenges are trust, governance, and system integration. Teams often hesitate to allow AI systems to modify production data without oversight. There is also complexity in integrating AI agents with existing orchestration, monitoring, and data systems. Another challenge is defining clear intent and policies so agents can make correct decisions. Successful adoption requires a phased approach with validation, monitoring, and gradual rollout.</p><h4><strong>Q. Do agentic pipelines replace data engineers?</strong></h4><p>No, they change the role of data engineers rather than replacing them. Engineers move from writing and fixing pipelines to designing systems, defining policies, and supervising AI agents. They focus more on architecture, governance, and optimization instead of repetitive operational tasks. This shift increases productivity and allows teams to handle larger, more complex data environments with fewer resources.</p><h4><strong>Q. What tools are commonly used to build AI-driven data pipelines?</strong></h4><p>The ecosystem includes agentic platforms like Databricks Genie Code and Snowflake Cortex, orchestration tools like Airflow and Dagster, and observability tools like Monte Carlo and OpenTelemetry. Transformation tools such as dbt combined with AI agents automate modeling and SQL generation. Governance tools ensure compliance, while vector databases store memory for learning. These tools work together to enable intelligent, autonomous pipeline behavior.</p><h4><strong>Q. How can organizations start implementing agentic data pipelines today?</strong></h4><p>The best approach is to start small and build progressively. Begin with AI-assisted development to speed up pipeline creation, then implement automated data quality monitoring. Introduce agentic systems in a suggestion mode to validate their decisions before enabling automation. Define governance policies early to control risk. Once trust is established, gradually activate full autonomy with continuous monitoring and audits. This phased strategy ensures safe and effective adoption.</p><p>The post <a href="https://www.ishir.com/blog/320917/agentic-data-pipelines-the-shift-to-autonomous-data-engineering.htm">Agentic Data Pipelines: The Shift to Autonomous Data Engineering</a> appeared first on <a href="https://www.ishir.com/">ISHIR | Custom AI Software Development Dallas Fort-Worth Texas</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/agentic-data-pipelines-the-shift-to-autonomous-data-engineering/" data-a2a-title="Agentic Data Pipelines: The Shift to Autonomous Data Engineering"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fagentic-data-pipelines-the-shift-to-autonomous-data-engineering%2F&amp;linkname=Agentic%20Data%20Pipelines%3A%20The%20Shift%20to%20Autonomous%20Data%20Engineering" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fagentic-data-pipelines-the-shift-to-autonomous-data-engineering%2F&amp;linkname=Agentic%20Data%20Pipelines%3A%20The%20Shift%20to%20Autonomous%20Data%20Engineering" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fagentic-data-pipelines-the-shift-to-autonomous-data-engineering%2F&amp;linkname=Agentic%20Data%20Pipelines%3A%20The%20Shift%20to%20Autonomous%20Data%20Engineering" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fagentic-data-pipelines-the-shift-to-autonomous-data-engineering%2F&amp;linkname=Agentic%20Data%20Pipelines%3A%20The%20Shift%20to%20Autonomous%20Data%20Engineering" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fagentic-data-pipelines-the-shift-to-autonomous-data-engineering%2F&amp;linkname=Agentic%20Data%20Pipelines%3A%20The%20Shift%20to%20Autonomous%20Data%20Engineering" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.ishir.com/">ISHIR | Custom AI Software Development Dallas Fort-Worth Texas</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Naresh Kumar">Naresh Kumar</a>. Read the original post at: <a href="https://www.ishir.com/blog/320917/agentic-data-pipelines-the-shift-to-autonomous-data-engineering.htm">https://www.ishir.com/blog/320917/agentic-data-pipelines-the-shift-to-autonomous-data-engineering.htm</a> </p>

The Time Is Now to Prepare for CRA Enforcement

  • None
  • Published date: 2026-04-22 00:00:00

None

<p>The post <a href="https://www.sonatype.com/blog/the-time-is-now-to-prepare-for-cra-enforcement">The Time Is Now to Prepare for CRA Enforcement</a> appeared first on <a href="https://www.sonatype.com/blog">2024 Sonatype Blog</a>.</p><div class="hs-featured-image-wrapper"> <a href="https://www.sonatype.com/blog/the-time-is-now-to-prepare-for-cra-enforcement" title="" class="hs-featured-image-link"> <img decoding="async" src="https://www.sonatype.com/hubfs/blog_cra_enforcements.jpg" alt="Image of a network of hexagon shapes each containing different icons, one with a checkmark, one with a checkbox, one with a lock, one with a human formone with a circle of stars." class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div><p style="background-color: #ffffff;">When t<span style="text-decoration: none;">he </span><a href="https://www.sonatype.com/resources/guides/eu-cyber-resilience-act-guide" style="text-decoration: none;">EU Cyber Resilience Act (CRA)</a><span style="text-decoration: none;"> wa</span>s introduced into law in 2024, it represented one of the most significant regulatory shifts we’ve seen anywhere in the world with implications for how organizations build, ship, and maintain software. It establishes cybersecurity requirements for hardware and software products sold within the European Union or produced by organizations operating in the EU, and is among the first international legislation focused on cybersecurity requirements. It was also par<span style="text-decoration: none;">t of a </span><a href="https://www.sonatype.com/resources?category=158041693505" style="text-decoration: none;">wave of global regulations</a><span style="text-decoration: none;"> th</span>at put the security of software supply chains in the spotlight.</p><p><img decoding="async" src="https://track.hubspot.com/__ptq.gif?a=1958393&amp;k=14&amp;r=https%3A%2F%2Fwww.sonatype.com%2Fblog%2Fthe-time-is-now-to-prepare-for-cra-enforcement&amp;bu=https%253A%252F%252Fwww.sonatype.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "></p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/the-time-is-now-to-prepare-for-cra-enforcement/" data-a2a-title="The Time Is Now to Prepare for CRA Enforcement"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fthe-time-is-now-to-prepare-for-cra-enforcement%2F&amp;linkname=The%20Time%20Is%20Now%20to%20Prepare%20for%20CRA%20Enforcement" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fthe-time-is-now-to-prepare-for-cra-enforcement%2F&amp;linkname=The%20Time%20Is%20Now%20to%20Prepare%20for%20CRA%20Enforcement" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fthe-time-is-now-to-prepare-for-cra-enforcement%2F&amp;linkname=The%20Time%20Is%20Now%20to%20Prepare%20for%20CRA%20Enforcement" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fthe-time-is-now-to-prepare-for-cra-enforcement%2F&amp;linkname=The%20Time%20Is%20Now%20to%20Prepare%20for%20CRA%20Enforcement" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fthe-time-is-now-to-prepare-for-cra-enforcement%2F&amp;linkname=The%20Time%20Is%20Now%20to%20Prepare%20for%20CRA%20Enforcement" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.sonatype.com/blog">2024 Sonatype Blog</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Aaron Linskens">Aaron Linskens</a>. Read the original post at: <a href="https://www.sonatype.com/blog/the-time-is-now-to-prepare-for-cra-enforcement">https://www.sonatype.com/blog/the-time-is-now-to-prepare-for-cra-enforcement</a> </p>

Malicious trading website drops malware that hands your browser to attackers

  • None
  • Published date: 2026-04-22 00:00:00

None

<p>The post <a href="https://www.malwarebytes.com/blog/threat-intel/2026/04/malicious-trading-website-drop-malware-that-hands-over-your-browser-to-attackers">Malicious trading website drops malware that hands your browser to attackers</a> appeared first on <a href="https://www.malwarebytes.com/">Malwarebytes</a>.</p><p>During our threat hunting, we found a campaign using the same malware loader from <a href="https://www.malwarebytes.com/blog/threat-intel/2026/04/from-fake-proton-vpn-sites-to-gaming-mods-this-windows-infostealer-is-everywhere)" rel="noreferrer noopener">our previous research</a> to deliver a different threat: <strong>Needle Stealer</strong>, data-stealing malware designed to quietly harvest sensitive information from infected devices, including browser data, login sessions, and cryptocurrency wallets.</p><p>In this case, attackers used a website promoting a tool called <strong>TradingClaw</strong> (<code>tradingclaw[.]pro</code>), which claims to be an AI-powered assistant for TradingView. </p><p>TradingView is a legitimate platform used by traders to analyze financial markets, but this fake TradingClaw site is not part of TradingView, nor is it related to the legitimate startup <code>tradingclaw[.]chat</code>. Instead, it’s being used here as a lure to trick people into downloading malware.</p><h2 class="wp-block-heading" id="h-what-is-needle-stealer">What is Needle Stealer?</h2><p>Needle is a modular infostealer written in Golang. In simple terms, that means it’s built in pieces, so attackers can turn features on or off depending on what they want to steal.</p><p>According to its control panel, Needle includes:</p><ul class="wp-block-list"> <li><strong>Needle Core</strong>: The main component, with features like form grabbing (capturing data you enter into websites) and clipboard hijacking</li> <li><strong>Extension module</strong>: Controls browsers, redirects traffic, injects scripts, and replaces downloads</li> <li><strong>Desktop wallet spoofer</strong>: Targets cryptocurrency wallet apps like Ledger, Trezor, and Exodus</li> <li><strong>Browser wallet spoofer</strong>: Targets browser-based wallets like MetaMask and Coinbase, including attempts to extract seed phrases</li> </ul><p>The panel also shows a “coming soon” feature to generate fake Google or Cloudflare-style pages, suggesting the attackers plan to expand into more advanced phishing techniques.</p><figure class="wp-block-image aligncenter size-full"><img decoding="async" loading="lazy" width="778" height="488" src="https://www.malwarebytes.com/wp-content/uploads/sites/2/2026/04/trading-claw-GO-Needle-Panel.png" alt="Needle Stealer panel" class="wp-image-402735"><figcaption class="wp-element-caption"><em>Needle Stealer panel</em></figcaption></figure><p id="h-in-this-blog-post-we-analyze-the-distribution-of-the-stealer-through-a-fake-website-related-to-an-ai-service-called-tradingclaw-we-have-detected-that-the-same-stealer-is-also-distributed-by-other-malware-such-as-amadey-and-gcleaner">In this article, we analyze the distribution of the stealer through a fake website related to an AI service called <strong>TradingClaw</strong>. We have detected that the same stealer is also distributed by other malware such as Amadey and GCleaner. </p><h2 class="wp-block-heading" id="h-analysis-of-the-tradingclaw-campaign">Analysis of the TradingClaw campaign</h2><p>In this campaign, the malware is distributed through a fake website advertising TradingClaw as an AI trading tool.</p><figure class="wp-block-image aligncenter size-full"><img decoding="async" loading="lazy" width="972" height="522" src="https://www.malwarebytes.com/wp-content/uploads/sites/2/2026/04/trading-claw-GO-1.jpeg" alt="Malicious TradingClaw website" class="wp-image-402739"><figcaption class="wp-element-caption"><em>Malicious TradingClaw website</em></figcaption></figure><p>The site itself behaves selectively. In some cases, visitors are shown the fake TradingClaw page, while in others they are redirected to a different site (<code>studypages[.]com</code>). This kind of filtering is commonly used by attackers to avoid detection and only show the malicious content to intended targets. Search engines, for example, see the Studypages version:</p><figure class="wp-block-image aligncenter size-large"><img decoding="async" loading="lazy" height="205" width="1024" src="https://www.malwarebytes.com/wp-content/uploads/sites/2/2026/04/trading-claw-GO-studypages.png?w=1024" alt="Studypages fake page" class="wp-image-402741"><figcaption class="wp-element-caption"><em>Google results shows the Studypages fake page</em></figcaption></figure><p>If a user proceeds, they are prompted to download a ZIP file. This file contains the first stage of the infection chain.</p><p>Like in the previous campaign, the attack relies on a technique called DLL hijacking. In simple terms, this means the malware disguises itself as a legitimate file that a trusted program will load automatically. When the program runs, it unknowingly executes the malicious code instead.</p><p>In this case, the DLL loader (named <code>iviewers.dll</code>) is executed first. It then loads a second-stage DLL, which ultimately injects the Needle Stealer into a legitimate Windows process (<code>RegAsm.exe</code>) using a technique known as process hollowing.</p><figure class="wp-block-image aligncenter size-large"><img decoding="async" loading="lazy" height="308" width="1024" src="https://www.malwarebytes.com/wp-content/uploads/sites/2/2026/04/trading-claw-GO-RegAsmprocess.png?w=1024" alt="Needle Stealer injected in RegAsm.exe process" class="wp-image-402746"><figcaption class="wp-element-caption"><em>Needle Stealer injected in RegAsm.exe process</em></figcaption></figure><p>The stealer is developed in Golang, and most of the functions are implemented in the “ext” package. </p><figure class="wp-block-image aligncenter size-full"><img decoding="async" loading="lazy" width="345" height="533" src="https://www.malwarebytes.com/wp-content/uploads/sites/2/2026/04/trading-claw-GO-exepackage.png" alt="Part of the “exe” package" class="wp-image-402747"><figcaption class="wp-element-caption"><em>Part of the “exe” package</em></figcaption></figure><h2 class="wp-block-heading">What the malware does</h2><p>Once installed, the Needle core module can:</p><ul class="wp-block-list"> <li>Take screenshots of the infected system</li> <li>Steal browser data, including history, cookies, and saved information</li> <li>Extract data from apps like Telegram and FTP clients</li> <li>Collect files such as .txt documents and wallet data</li> <li>Steal cryptocurrency wallet information</li> </ul><p>One of the more concerning features is its ability to install malicious browser extensions.</p><h2 class="wp-block-heading">Malicious browser extensions</h2><p>The stealer also supports the distribution of malicious browser extensions, giving attackers a powerful way to take control of the victim’s browser.</p><p>We identified multiple variations of these extensions, each with slightly different file structures and components. Behind the scenes, the malware uses built-in Golang features to unpack a hidden ZIP archive (often named <code>base.zip</code> or <code>meta.zip</code>) that contains the extension files, along with a configuration file (<code>cfg.json</code>). </p><p>Partial <code>cfg.json</code> config file:</p><pre class="wp-block-code"><code>{ "extension_host": {}, "api_key": "… "server_url": "https://C2/api/v2", "self_destruct": true, "base_extension": true, "ext_manifest": { "account_extension_type": 0, "active_permissions": { "api": [ "history", "notifications", "storage", "tabs", "webNavigation", "declarativeNetRequest", "scripting", "declarativeNetRequestWithHostAccess", "sidePanel" ], "explicit_host": [ "&lt;all_urls&gt;" ], "manifest_permissions": [], "scriptable_host": [ "&lt;all_urls&gt;" ] }, "commands": { "_execute_action": { "was_assigned": true } }, …</code></pre><p class="has-text-align-center" style="font-size:16px"> </p><p>This configuration file is key. It tells the malware where to send stolen data (the command-and-control server), which malicious extension to install, and which features to enable.</p><p>The stealer extension is dropped in a random folder in the path <code>%LOCALAPPDATA%\Packages\Extensions</code>. The folder contains three main files <code>popup.js</code>, <code>content.js</code>, and <code>background.js</code>.   </p><figure class="wp-block-image aligncenter size-full"><img decoding="async" loading="lazy" width="990" height="355" src="https://www.malwarebytes.com/wp-content/uploads/sites/2/2026/04/trading-claw-GO-extension.png" alt="The malicious extension dropped" class="wp-image-402758"><figcaption class="wp-element-caption"><em>The malicious extension dropped</em></figcaption></figure><p>The extensions analyzed have Google-related names.</p><figure class="wp-block-image aligncenter size-full"><img decoding="async" loading="lazy" width="895" height="736" src="https://www.malwarebytes.com/wp-content/uploads/sites/2/2026/04/trading-claw-GO-translate.png" alt="The fake malicious extension on Edge Browser" class="wp-image-402759"><figcaption class="wp-element-caption"><em>The fake malicious extension on Edge Browser</em></figcaption></figure><h2 class="wp-block-heading" id="h-what-the-malicious-extensions-can-do">What the malicious extensions can do</h2><p>The extension gives attackers near full control over the browser, with capabilities that go far beyond typical malware.</p><p>It can:</p><ul class="wp-block-list"> <li><strong>Connect to a remote server</strong> using a built-in API key and regularly check in for instructions. It can also switch to backup domains if the main server goes offline.</li> <li><strong>Generate a unique ID</strong> to track the infected user over time.</li> <li><strong>Collect full browsing history</strong> and send it to a remote server (<code>/upload</code>).</li> <li><strong>Monitor what you’re doing in real time</strong>, including which sites you visit, and apply attacker-controlled redirect rules. This allows it to silently send you to different websites or alter what you see on a page, including injecting or hiding content.</li> <li><strong>Intercept downloads</strong>, cancel legitimate files, and replace them with malicious ones from attacker-controlled servers.</li> <li><strong>Inject scripts directly into web pages</strong>, enabling further data theft or manipulation.</li> <li><strong>Display fake browser notifications</strong> with attacker-controlled text and images.</li> </ul><hr class="wp-block-separator has-alpha-channel-opacity"><h2 class="wp-block-heading">How it communicates with attackers</h2><p>The stealer and its extension communicate with command-and-control (C2) servers using several API endpoints. These are essentially different “channels” used for specific tasks:</p><ul class="wp-block-list"> <li><code>/backup-domains/active</code>—retrieves backup servers to stay connected if the main one is blocked</li> <li><code>/upload</code>—sends stolen data back to the attackers</li> <li><code>/extension</code>—receives instructions for redirects, downloads, and notifications</li> <li><code>/scripts</code>—downloads malicious code to inject into web pages</li> </ul><h2 class="wp-block-heading">How to stay safe</h2><p>Scammers are increasingly using AI-themed tools to make fake websites look legitimate. In this case, a supposed “AI trading assistant” was used to trick people into installing malware.</p><p>To reduce your risk:</p><ul class="wp-block-list"> <li><strong>Download software only from official websites</strong>. If a tool claims to work with a well-known platform, check the platform’s official site to confirm it’s real.</li> <li><strong>Check who created the file before running it</strong>. Look at the publisher name and avoid anything that looks unfamiliar or inconsistent.</li> <li><strong>Review your browser extensions regularly</strong>. Remove anything you don’t recognize, especially extensions you didn’t knowingly install.</li> </ul><h2 class="wp-block-heading" id="h-what-to-do-if-you-think-you-ve-been-affected">What to do if you think you’ve been affected</h2><p>If you think you may have downloaded this infostealer:</p><ul class="wp-block-list"> <li>Check EDR and firewall logs for communications with the C2s listed in the IOCs part.</li> <li>From a different, clean device, sign out of every active session on your important accounts: Google, Microsoft 365, any banking portal, GitHub, Discord, Telegram, Steam, and your crypto exchange. Change all passwords and enable 2FA for accounts you have accessed from this machine.</li> <li>Check the folder <code>%LOCALAPPDATA%\Packages\Extensions</code> and suspicious browser extensions.</li> <li>If you have cryptocurrency wallets on the machine, move the funds from a clean device immediately. This is what these operators monetize first.</li> <li><a href="https://www.malwarebytes.com/solutions/virus-scanner" rel="noreferrer noopener">Run a full scan with Malwarebytes</a>.</li> </ul><h2 class="wp-block-heading" id="h-indicators-of-compromise-iocs">Indicators of Compromise (IOCs)</h2><p><strong>HASH</strong></p><p><code>95dcac62fc15e99d112d812f7687292e34de0e8e0a39e4f12082f726fa1b50ed</code></p><p><code>0d10a6472facabf7d7a8cfd2492fc990b890754c3d90888ef9fe5b2d2cca41c0</code></p><p><strong>Domains</strong></p><p><code>Tradingclaw[.]pro</code>: fake website</p><p><code>Chrocustumapp[.]com</code>: related to malicious extension</p><p><code>Chrocustomreversal[.]com</code>: related to malicious extension</p><p><code>google-services[.]cc</code>: related to malicious extension</p><p><code>Coretest[.]digital</code>: C2 panel</p><p><code>Reisen[.]work</code>: C2 panel</p><p><strong>IPs</strong></p><p><code>178[.]16[.]55[.]234</code>: C2 panel</p><p><code>185[.]11[.]61[.]149</code>: C2 panel</p><p><code>37[.]221[.]66[.]27</code>: C2 panel</p><p><code>2[.]56[.]179[.]16</code>: C2 panel</p><p><code>178[.]16[.]54[.]109</code>: C2 panel</p><p><code>37[.]221[.]66[.]27</code>: C2 panel</p><p><code>209[.]17[.]118[.]17</code>: C2 panel</p><p><code>162[.]216[.]5[.]130</code>: C2 panel</p><hr class="wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide"><p><strong>We don’t just report on threats—we remove them</strong></p><p>Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by <a href="https://www.malwarebytes.com/for-home">downloading Malwarebytes today</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/malicious-trading-website-drops-malware-that-hands-your-browser-to-attackers/" data-a2a-title="Malicious trading website drops malware that hands your browser to attackers"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fmalicious-trading-website-drops-malware-that-hands-your-browser-to-attackers%2F&amp;linkname=Malicious%20trading%20website%20drops%20malware%20that%20hands%20your%20browser%20to%20attackers" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fmalicious-trading-website-drops-malware-that-hands-your-browser-to-attackers%2F&amp;linkname=Malicious%20trading%20website%20drops%20malware%20that%20hands%20your%20browser%20to%20attackers" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fmalicious-trading-website-drops-malware-that-hands-your-browser-to-attackers%2F&amp;linkname=Malicious%20trading%20website%20drops%20malware%20that%20hands%20your%20browser%20to%20attackers" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fmalicious-trading-website-drops-malware-that-hands-your-browser-to-attackers%2F&amp;linkname=Malicious%20trading%20website%20drops%20malware%20that%20hands%20your%20browser%20to%20attackers" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fmalicious-trading-website-drops-malware-that-hands-your-browser-to-attackers%2F&amp;linkname=Malicious%20trading%20website%20drops%20malware%20that%20hands%20your%20browser%20to%20attackers" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.malwarebytes.com/">Malwarebytes</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Malwarebytes">Malwarebytes</a>. Read the original post at: <a href="https://www.malwarebytes.com/blog/threat-intel/2026/04/malicious-trading-website-drop-malware-that-hands-over-your-browser-to-attackers">https://www.malwarebytes.com/blog/threat-intel/2026/04/malicious-trading-website-drop-malware-that-hands-over-your-browser-to-attackers</a> </p>

Original Avatar Actor Responds To Aang Movie Leak, Admit They've "Skimmed" It

  • Nick Bythrow
  • Published date: 2026-04-21 13:17:23

An original actor from Avatar: The Last Airbender responds to the major leak of the show's movie sequel, admitting that they've "skimmed" the film.

An original actor from Avatar: The Last Airbender has seen the leaked sequel movie. The star has responded to the major leak of the show's movie sequel, Avatar Aang: The Last Airbender, admitting th… [+3464 chars]

CI Global Asset Management Launches Gold Bullion Mutual Fund, Announces Changes to Several ETFs

  • Business Wire
  • Published date: 2026-04-21 11:10:16

TORONTO — CI Global Asset Management (“CI GAM”) today launched CI Gold Bullion Fund, providing expanded access to an award-winning mandate that invests in physical gold. CI GAM also announced a name change and risk rating changes within its ETF lineup. CI Gol…

THIS CONTENT IS RESERVED FOR SUBSCRIBERS ONLY Subscribe now to read the latest news in your city and across Canada. <ul><li>Exclusive articles from Barbara Shecter, Joe O'Connor, Gabriel Friedman, … [+7478 chars]

White House Correspondents’ Dinner: Who’s Hosting Events On D.C.’s Big Weekend

  • Ted Johnson
  • Published date: 2026-04-21 10:26:36

A prevailing theme of this year’s White House Correspondents’ Association dinner will be how journalists make a statement in the presence of Donald Trump, whose attacks on the media have come in the form of social media posts and outbursts, but also more seri…

A prevailing theme of this year’s White House Correspondents’ Association dinner will be how journalists make a statement in the presence of Donald Trump, whose attacks on the media have come in the … [+4905 chars]

German central bank chief calls for wide access to Anthropic's Mythos

  • None
  • Published date: 2026-04-21 06:43:35

FRANKFURT, April 21 : German central bank chief Joachim Nagel called on Tuesday for all institutions to have access to Anthropic's artificial intelligence model Mythos to keep the playing field even and to avoid it being misused. The Bundesbank head said bank…

FRANKFURT, April 21 : German central bank chief Joachim Nagel called on Tuesday for all institutions to have access to Anthropic's artificial intelligence model Mythos to keep the playing field even … [+2310 chars]

Europe must prevent misuse of Anthropic's Mythos, Bundesbank chief warns

  • None
  • Published date: 2026-04-21 06:43:35

FRANKFURT, April 21 : Banking authorities must prevent the misuse of Anthropic's Mythos, its most advanced AI model to date, which opens the door to new and sophisticated cyber risks, Bundesbank President Joachim Nagel said on Tuesday."Mythos is an AI model t…

FRANKFURT, April 21 : Banking authorities must prevent the misuse of Anthropic's Mythos, its most advanced AI model to date, which opens the door to new and sophisticated cyber risks, Bundesbank Pres… [+525 chars]

500,000 Vulnerabilities, 14 That Matter: How Exploit Chain Analysis Cuts Through the Noise

  • None
  • Published date: 2026-04-21 00:00:00

None

<div data-elementor-type="wp-post" data-elementor-id="12030" class="elementor elementor-12030" data-elementor-post-type="post"> <div data-particle_enable="false" data-particle-mobile-disabled="false" class="elementor-element elementor-element-4379983 e-con-full e-flex e-con e-parent" data-id="4379983" data-element_type="container" data-e-type="container"> <div class="elementor-element elementor-element-a5557b0 elementor-widget elementor-widget-text-editor" data-id="a5557b0" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default"> <h2><strong>When 500,000 Findings Hide 14 Real Threats </strong></h2> <p>Modern enterprises ingest vulnerability data from dozens of sources: endpoint detection and response platforms, vulnerability scanners, cloud security posture tools, container image scanners. A large organization can easily accumulate hundreds of thousands of individual findings. The standard response is to sort by CVSS score, filter for criticals, and start patching. But vulnerability management needs to shift from CVSS-based severity ranking to contextual exploit chain analysis — evaluating how individual vulnerabilities combine into realistic attack paths.</p> <p>The problem is that CVSS scores evaluate vulnerabilities in isolation. A renderer vulnerability in a web browser is serious, but the browser sandbox contains it. A sandbox escape is dangerous, but it requires an initial foothold to exploit. Neither finding alone tells you the full story. But if the same endpoint is vulnerable to both, an attacker can chain them together into a zero click, full host compromise with no user interaction beyond visiting a webpage. That combined risk is qualitatively different from anything either CVE represents on its own.</p> <p>Recently, we used Praetorian Guard to analyze a customer environment containing roughly 500,000 vulnerability findings ingested from the customer’s CrowdStrike deployment. Guard integrates with over 60 third party security tools, including CrowdStrike, Wiz, Tenable, Qualys, Rapid7, Orca, and Microsoft Defender, pulling vulnerability data from across the customer’s security stack into a single platform.</p> <p>Using Guard’s vulnerability data and CVE research capabilities, we linked related findings into exploit chains and correlated them with threat intelligence on active exploitation. The vast majority of the 500,000 findings were noise: real vulnerabilities, but ones that were either unexploitable in context, already mitigated by compensating controls, or low impact in isolation. The signal-to-noise ratio was roughly 35,000 to 1. The analysis identified 14 endpoints where an attacker could realistically achieve full host compromise through browser-based drive-by attacks: one chain confirmed in a state-sponsored campaign, the other combining a Pwn2Own-demonstrated exploit with a sandbox escape from the same vulnerability class exploited in a separate APT operation.</p> <p>This post walks through the methodology and explains why exploit chain analysis surfaces risks that traditional CVSS-based prioritization misses.</p> </div> </div> <div data-particle_enable="false" data-particle-mobile-disabled="false" class="elementor-element elementor-element-71cc2d7 e-con-full e-flex e-con e-parent" data-id="71cc2d7" data-element_type="container" data-e-type="container"> <div class="elementor-element elementor-element-2cc7527 elementor-widget elementor-widget-heading" data-id="2cc7527" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default"> <h2 class="elementor-heading-title elementor-size-default">Why Individual CVEs Lie About Risk</h2> </div> </div> <div data-particle_enable="false" data-particle-mobile-disabled="false" class="elementor-element elementor-element-b5cfa25 e-con-full e-flex e-con e-parent" data-id="b5cfa25" data-element_type="container" data-e-type="container"> <div class="elementor-element elementor-element-46996ad elementor-widget elementor-widget-text-editor" data-id="46996ad" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default"> <p>The scale of the problem starts with the numbers. In 2025, over 48,000 CVEs were published, roughly 130 per day, bringing the cumulative total since 1999 above 300,000. Of those 300,000+, CISA’s Known Exploited Vulnerabilities catalog contains approximately 1,500 entries: less than half a percent of all CVEs ever published have been confirmed exploited in the wild. The vast majority of vulnerabilities that receive a CVE and a CVSS score will never be used in an actual attack.</p> <h4>Example: The Linux Kernel CVE Flood</h4> <p>After the kernel team became a CVE Numbering Authority in 2024, they began assigning a CVE to nearly every bug fix regardless of exploitability. The result was over 3,600 kernel CVEs in 2025 alone, roughly 10 per day. Of those, seven were added to CISA’s KEV catalog as confirmed exploited in the wild. A security team that triages every critical kernel CVE with equal urgency is spending most of its time on vulnerabilities that no attacker will ever use.</p> <h4>How Browser Sandboxing Works</h4> <p>Every major browser uses a multi-process model where the renderer, the component that parses HTML, executes JavaScript, and handles layout, runs in a sandboxed child process with heavily restricted access to the operating system. This is the browser’s primary security boundary.</p> <p>A vulnerability in the renderer, like an out-of-bounds write in the JavaScript engine, gives an attacker code execution inside the content process. That sounds bad, but the sandbox means they can read and write memory within that process and not much else. They cannot touch the filesystem, spawn new processes, or interact with the network beyond what the renderer is already allowed to do.</p> <p>A sandbox escape, by contrast, allows a compromised child process to break out of isolation and execute code at the user’s full privilege level on the host operating system. But a sandbox escape is useless without an initial foothold inside the sandbox. You need to already be running code in the content process before you can exploit an IPC handle leak or a logic error in the broker process.</p> <h4>Why Scanners Miss the Combined Risk</h4> <p>This is the fundamental problem with evaluating these vulnerabilities individually. Your vulnerability scanner or EDR platform reports the renderer bug as critical. It reports the sandbox escape as critical. Both assessments are technically correct based on the CVSS scoring methodology.</p> <p>But neither report tells you that the two findings on the same endpoint combine into something far worse than either one alone: a zero-click exploit chain that gives an attacker full code execution on the host operating system the moment a user visits a malicious page.</p> <h4>Chrome vs. Firefox: Not All Browsers Chain the Same Way</h4> <p>Modern Chrome has introduced an additional mitigation that makes this problem even more nuanced. Chrome’s V8 engine now includes a heap sandbox that isolates the V8 heap so that memory corruption from a JavaScript engine bug cannot spread to other parts of the process memory. In practice, this means that exploiting Chrome in 2025 often requires three vulnerabilities rather than two: a V8 type confusion for initial heap corruption, a <a href="https://www.youtube.com/watch?v=5otAw81AHQ0">V8 sandbox</a> bypass to escape the heap cage, and then an OS-level sandbox escape (typically via a Mojo IPC logic bug) to reach the operating system.</p> <p>Firefox’s SpiderMonkey engine does not have an equivalent heap isolation mechanism, which means the two-stage model described above (renderer RCE directly to OS sandbox escape) remains sufficient for a complete chain. This architectural difference is one reason why the Firefox chains we identified are particularly concerning: the attack surface requires fewer links in the chain to achieve full compromise.</p> <p> </p> </div> </div> <div data-particle_enable="false" data-particle-mobile-disabled="false" class="elementor-element elementor-element-22e9862 e-con-full e-flex e-con e-parent" data-id="22e9862" data-element_type="container" data-e-type="container"> <div class="elementor-element elementor-element-109d2b5 elementor-widget elementor-widget-image" data-id="109d2b5" data-element_type="widget" data-e-type="widget" data-widget_type="image.default"> <img fetchpriority="high" decoding="async" width="1120" height="800" src="https://www.praetorian.com/wp-content/uploads/2026/04/chrome-exploit-chain-renderer-to-host-compromise-via-v8-sand-1.webp" class="attachment-full size-full wp-image-12027" alt="Chrome exploit chain renderer to host compromise via V8 sandbox escape" srcset="https://www.praetorian.com/wp-content/uploads/2026/04/chrome-exploit-chain-renderer-to-host-compromise-via-v8-sand-1.webp 1120w, https://www.praetorian.com/wp-content/uploads/2026/04/chrome-exploit-chain-renderer-to-host-compromise-via-v8-sand-1-300x214.webp 300w, https://www.praetorian.com/wp-content/uploads/2026/04/chrome-exploit-chain-renderer-to-host-compromise-via-v8-sand-1-1024x731.webp 1024w, https://www.praetorian.com/wp-content/uploads/2026/04/chrome-exploit-chain-renderer-to-host-compromise-via-v8-sand-1-768x549.webp 768w" sizes="(max-width: 1120px) 100vw, 1120px"> </div> </div> <div data-particle_enable="false" data-particle-mobile-disabled="false" class="elementor-element elementor-element-6eac46d e-con-full e-flex e-con e-parent" data-id="6eac46d" data-element_type="container" data-e-type="container"> <div class="elementor-element elementor-element-8d27532 elementor-widget elementor-widget-heading" data-id="8d27532" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default"> <h2 class="elementor-heading-title elementor-size-default">The Chains: Two Distinct Paths to Full Compromise</h2> </div> </div> <div data-particle_enable="false" data-particle-mobile-disabled="false" class="elementor-element elementor-element-16585cf e-con-full e-flex e-con e-parent" data-id="16585cf" data-element_type="container" data-e-type="container"> <div class="elementor-element elementor-element-8f5854a elementor-widget elementor-widget-text-editor" data-id="8f5854a" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default"> <p>This analysis did not surface a single exploit chain. It surfaced two, sharing a common sandbox escape but using different renderer vulnerabilities as the initial foothold. One chain is a confirmed APT weapon. The other combines independently proven components: a Pwn2Own-demonstrated renderer exploit and a sandbox escape whose Chrome equivalent was deployed by a state-sponsored group. A subset of endpoints were vulnerable to both chains simultaneously.</p> <h4><strong>Chain 1: CVE-2025-4918 + CVE-2025-2857 (Pwn2Own Berlin)</strong></h4> <p><strong>CVE-2025-4918</strong> is an out-of-bounds read/write vulnerability in Firefox’s JavaScript engine, specifically in the resolution of Promise objects. An attacker can trigger the bug by serving malicious JavaScript from a webpage. When a victim visits the page, the vulnerability allows the attacker to execute arbitrary code inside the Firefox content process. No clicks, downloads, or prompts are required. This vulnerability was demonstrated at Pwn2Own Berlin 2025 and affects Firefox versions prior to 138.0.4.</p> <p><strong>CVE-2025-2857</strong> is a sandbox escape in Firefox’s inter process communication (IPC) code on Windows. A compromised child process can cause the parent browser process to return an overly powerful handle, allowing the attacker to break out of browser isolation and execute code at the user’s full privilege level on the underlying operating system. Mozilla discovered this vulnerability after Google patched a nearly identical flaw in Chrome (CVE-2025-2783), which had been actively exploited in the wild. CVE-2025-2857 carries a CVSS score of 10.0 and affects Firefox versions prior to 136.0.4.</p> <p>Chained together, these two vulnerabilities allow a complete drive-by compromise: a user visits a webpage, the renderer exploit fires silently and gains code execution inside the content process, and the sandbox escape immediately elevates that access to the host operating system. The attacker has full control of the endpoint without the user ever clicking, downloading, or approving anything.</p> <h4><b>Chain 2: CVE-2024-9680 + CVE-2025-2857 / CVE-2024-49039 (RomCom)</b></h4> <p><strong>CVE-2024-9680</strong> is a use after free vulnerability in Firefox’s Animation Timeline component (Web Animations API), discovered by ESET researcher Damien Schaeffer in October 2024. Like CVE-2025-4918, it provides remote code execution inside the browser’s content process with no user interaction beyond visiting a malicious page. It was exploited as a zero day in the wild from at least October through November 2024 and carries a CVSS score of 9.8. It affects Firefox versions prior to 131.0.2.</p> <p>The second stage of this chain has two variants. The primary path uses the same CVE-2025-2857 sandbox escape described above. The alternate path uses CVE-2024-49039, a privilege escalation vulnerability in the Windows Task Scheduler (CVSS 8.8) that allows code running at low integrity inside the browser sandbox to escape to medium integrity by abusing the Task Scheduler’s RPC interface. This is confirmed in the wild chain: RomCom deployed CVE-2024-9680 paired with CVE-2024-49039 to achieve full host compromise through zero click drive-by attacks in late 2024.</p> <p>There is an important logical relationship between these two chains. CVE-2024-9680 was patched in October 2024. CVE-2025-2857 was patched in March 2025. Any host that has not patched the older renderer vulnerability is guaranteed to also be missing the newer sandbox escape patch. The presence of CVE-2024-9680 on an endpoint is therefore a strong signal that CVE-2025-2857 is also present, and our analysis confirmed this across every affected host.</p> <p> </p> </div> </div> <div data-particle_enable="false" data-particle-mobile-disabled="false" class="elementor-element elementor-element-7e68f92 e-con-full e-flex e-con e-parent" data-id="7e68f92" data-element_type="container" data-e-type="container"> <div class="elementor-element elementor-element-ee2e604 elementor-widget elementor-widget-image" data-id="ee2e604" data-element_type="widget" data-e-type="widget" data-widget_type="image.default"> <img decoding="async" width="1640" height="880" src="https://www.praetorian.com/wp-content/uploads/2026/04/firefox-zero-click-exploit-chains-two-campaigns-shared-sandb-1.webp" class="attachment-full size-full wp-image-12028" alt="Firefox zero-click exploit chains two campaigns shared sandbox escape" srcset="https://www.praetorian.com/wp-content/uploads/2026/04/firefox-zero-click-exploit-chains-two-campaigns-shared-sandb-1.webp 1640w, https://www.praetorian.com/wp-content/uploads/2026/04/firefox-zero-click-exploit-chains-two-campaigns-shared-sandb-1-300x161.webp 300w, https://www.praetorian.com/wp-content/uploads/2026/04/firefox-zero-click-exploit-chains-two-campaigns-shared-sandb-1-1024x549.webp 1024w, https://www.praetorian.com/wp-content/uploads/2026/04/firefox-zero-click-exploit-chains-two-campaigns-shared-sandb-1-768x412.webp 768w, https://www.praetorian.com/wp-content/uploads/2026/04/firefox-zero-click-exploit-chains-two-campaigns-shared-sandb-1-1536x824.webp 1536w" sizes="(max-width: 1640px) 100vw, 1640px"> </div> </div> <div data-particle_enable="false" data-particle-mobile-disabled="false" class="elementor-element elementor-element-b3b07e8 e-con-full e-flex e-con e-parent" data-id="b3b07e8" data-element_type="container" data-e-type="container"> <div class="elementor-element elementor-element-fe1a52a elementor-widget elementor-widget-heading" data-id="fe1a52a" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default"> <h2 class="elementor-heading-title elementor-size-default">Active Exploitation and APT Attribution</h2> </div> </div> <div data-particle_enable="false" data-particle-mobile-disabled="false" class="elementor-element elementor-element-f7b8344 e-con-full e-flex e-con e-parent" data-id="f7b8344" data-element_type="container" data-e-type="container"> <div class="elementor-element elementor-element-13b2ad6 elementor-widget elementor-widget-text-editor" data-id="13b2ad6" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default"> <p>What elevates these chains from theoretical risks to urgent ones is the threat intelligence behind their components. Chain 2 is a confirmed in-the-wild APT weapon. Chain 1 was not observed in a campaign as a pair, but its components are independently proven: the renderer exploit was demonstrated against a hardened target at Pwn2Own Berlin, and the sandbox escape shares a root cause with a Chrome vulnerability that a separate state-sponsored group exploited in the wild. The techniques exist. The question is not whether this chain is exploitable, but when someone assembles it.</p> <p><strong>RomCom (Storm-0978 / Tropical Scorpius)</strong> is a Russia aligned APT group conducting both cybercrime and espionage operations. In late 2024, RomCom deployed the CVE-2024-9680 + CVE-2024-49039 chain as a zero click drive-by attack, using fake websites to redirect victims to an exploit server that deployed the RomCom backdoor.</p> <p>ESET’s telemetry showed up to 250 victims per country across Europe and North America between October and November 2024. Targets included government, defense, and energy sectors in Ukraine, pharmaceutical and insurance companies in the United States, and legal firms in Germany. Both CVEs in this chain are listed in CISA’s Known Exploited Vulnerabilities catalog, with ransomware use confirmed in a 2025 update. RomCom has a track record of zero day exploitation, having previously used CVE-2023-36884 (Microsoft Word) in 2023.</p> <p><strong>Operation ForumTroll</strong> exploited CVE-2025-2783, the Chrome equivalent of the Firefox sandbox escape CVE-2025-2857. Discovered by Kaspersky’s GReAT team in March 2025, the attackers sent spearphishing emails disguised as invitations to the Primakov Readings academic forum, targeting media outlets, educational institutions, and government organizations. The campaign deployed the LeetAgent backdoor followed by Dante spyware, a commercial surveillance product developed by Memento Labs (formerly Hacking Team). Kaspersky attributed the campaign to a state sponsored APT group whose primary objective was espionage. A second wave was detected in October 2025 targeting political scientists, indicating the group remains active.</p> <p>The Firefox sandbox escape (CVE-2025-2857) is not merely similar to the Chrome vulnerability exploited by ForumTroll. Mozilla explicitly stated that Firefox developers found the flaw by examining their own IPC code after the Chrome bug was disclosed. The underlying pattern, a logic error that allows a child process to leak a privileged handle from the parent, was present in both browsers independently. An attacker with the capability to exploit one could reasonably adapt to exploit the other.</p> <p>The result is that a single customer environment contained endpoints vulnerable to two independent exploit chains capable of achieving full host compromise through zero-click browser attacks. One is a confirmed chain exploited in the wild by APT groups. The other assembles a Pwn2Own-demonstrated renderer exploit with a sandbox escape whose underlying vulnerability class was independently exploited by a state-sponsored group. No individual CVE report communicates that level of compound risk.</p> </div> </div> <div data-particle_enable="false" data-particle-mobile-disabled="false" class="elementor-element elementor-element-6656f7c e-con-full e-flex e-con e-parent" data-id="6656f7c" data-element_type="container" data-e-type="container"> <div class="elementor-element elementor-element-27e5f93 elementor-widget elementor-widget-heading" data-id="27e5f93" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default"> <h2 class="elementor-heading-title elementor-size-default">Assessing Exploitability Beyond CVSS</h2> </div> </div> <div data-particle_enable="false" data-particle-mobile-disabled="false" class="elementor-element elementor-element-4a71173 e-con-full e-flex e-con e-parent" data-id="4a71173" data-element_type="container" data-e-type="container"> <div class="elementor-element elementor-element-a84bb14 elementor-widget elementor-widget-text-editor" data-id="a84bb14" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default"> <p>Linking CVEs into chains is only half the problem. The other half is determining whether a given chain is actually exploitable in practice. A chain composed of two theoretical vulnerabilities with no public proof of concept is a very different risk than a chain where both stages have been demonstrated at Pwn2Own, confirmed exploited by a named APT group, listed in CISA’s Known Exploited Vulnerabilities catalog, or backed by published exploit code.This kind of analysis incorporates multiple exploitability signals when evaluating a linked finding:</p> <p>CISA KEV entries confirm that a vulnerability has been exploited in the wild and often indicate whether ransomware groups have operationalized it. Pwn2Own demonstrations prove that a full exploit chain is achievable against a hardened target under controlled conditions. Public proof of concept exploits lower the barrier to exploitation by providing a starting point that less sophisticated attackers can adapt. APT attribution from threat intelligence providers like Kaspersky GReAT, ESET, Google TAG, and Mandiant establishes which threat actors have deployed a given technique, against which target profiles, and in what geographies.</p> <p>Each of these signals independently elevates the urgency of a finding. When multiple signals converge on the same chain, the case for immediate action becomes overwhelming. There is also an emerging signal that is changing how we think about exploitability timelines: AI assisted exploit development.</p> </div> </div> <div data-particle_enable="false" data-particle-mobile-disabled="false" class="elementor-element elementor-element-36ec85e e-con-full e-flex e-con e-parent" data-id="36ec85e" data-element_type="container" data-e-type="container"> <div class="elementor-element elementor-element-2f08ddd elementor-widget elementor-widget-heading" data-id="2f08ddd" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default"> <h2 class="elementor-heading-title elementor-size-default">Automated N-Day Exploit Generation Pipelines</h2> </div> </div> <div data-particle_enable="false" data-particle-mobile-disabled="false" class="elementor-element elementor-element-5bd1c50 e-con-full e-flex e-con e-parent" data-id="5bd1c50" data-element_type="container" data-e-type="container"> <div class="elementor-element elementor-element-b6f2dbd elementor-widget elementor-widget-text-editor" data-id="b6f2dbd" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default"> <p>In March 2026, researchers at Calif demonstrated that Claude could take a FreeBSD kernel vulnerability advisory (CVE-2026-4747) and produce a fully working remote root shell exploit in approximately four hours of compute time, with minimal human guidance. The AI handled lab setup, multi packet shellcode delivery across 15 ROP rounds, offset debugging via crash dumps, and a kernel to userland process transition. While that specific target lacked modern mitigations like KASLR and stack canaries, the trajectory is unmistakable.</p> <p>Internally at Praetorian, we have had similar success using AI agents to develop working exploits for local privilege escalation and container escape vulnerabilities against both Linux and FreeBSD kernels. The time from CVE publication to working exploit is compressing from weeks to hours, and the barrier to entry is dropping from specialized exploit developer to anyone with access to a frontier model.</p> <p>For vulnerability chains where even one stage has a public advisory and a patch diff, the assumption should be that a working exploit can be generated faster than most organizations can deploy a patch. Exploitability assessment must account for this by weighing not just whether a public exploit exists now, but whether the vulnerability class and available technical context make AI assisted exploitation feasible.</p> </div> </div> <div data-particle_enable="false" data-particle-mobile-disabled="false" class="elementor-element elementor-element-8bcc58a e-con-full e-flex e-con e-parent" data-id="8bcc58a" data-element_type="container" data-e-type="container"> <div class="elementor-element elementor-element-f236bc2 elementor-widget elementor-widget-heading" data-id="f236bc2" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default"> <h2 class="elementor-heading-title elementor-size-default">From 500,000 Findings to 14 Critical Endpoints</h2> </div> </div> <div data-particle_enable="false" data-particle-mobile-disabled="false" class="elementor-element elementor-element-72a36a0 e-con-full e-flex e-con e-parent" data-id="72a36a0" data-element_type="container" data-e-type="container"> <div class="elementor-element elementor-element-a7591d1 elementor-widget elementor-widget-text-editor" data-id="a7591d1" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default"> <p>This customer’s environment had roughly 500,000 individual vulnerability findings from their CrowdStrike deployment alone. Guard ingests findings simultaneously from multiple sources: CrowdStrike for endpoint vulnerabilities, Wiz or Orca for cloud misconfigurations, Tenable or Qualys for infrastructure scanning, etc. Sorting any one of these sources by CVSS score and filtering for criticals would have returned thousands of results, most of which were either unexploitable in their specific deployment context or represented vulnerabilities that, while technically severe, had no realistic attack path given the compensating controls in place.</p> <p>Our approach was different. Rather than treating each CVE as an independent risk to be scored and ranked, we correlated findings across the same endpoint to identify cases where multiple vulnerabilities composed into a viable exploit chain, then enriched those chains with the exploitability signals described in the previous section: CISA KEV status, public PoC availability, Pwn2Own demonstrations, APT attribution, and AI assisted exploitation feasibility.</p> <p>Guard’s CVE research pipeline ingests newly published vulnerabilities, determines which products and versions are affected, and cross references against what is deployed in each customer’s environment. When threat intelligence surfaces active exploitation by a named APT group, that context informs the chain analysis. The browser exploit chains identified here connected two Firefox CVEs to a Kaspersky threat report on ForumTroll and an ESET writeup on RomCom, surfacing the 14 endpoints that actually mattered out of half a million findings. For a deeper look at the architecture behind this, see our CEO’s post on the Attack Helix.</p> <p>The result was a set of linked findings, each representing not a single CVE but a complete attack path. We identified 14 endpoints where unpatched Firefox installations were vulnerable to at least one complete exploit chain: nine endpoints exposed to the Pwn2Own Berlin chain (CVE-2025-4918 + CVE-2025-2857), and five endpoints exposed to the RomCom chain (CVE-2024-9680 + CVE-2025-2857), with a subset of hosts vulnerable to both chains simultaneously and two hosts carrying an additional escape path via CVE-2024-49039. Each linked finding included the full chain description, the specific CVEs involved, exploitability context, and a recommendation that went beyond “patch Firefox” to include forensic triage guidance for indicators of compromise associated with RomCom and ForumTroll tooling.</p> <p>The reduction from 500,000 to 14 is not a trick of filtering. It reflects a fundamentally different question. Instead of asking “which vulnerabilities are severe?”, the right question is “which combinations of vulnerabilities create a realistic attack path that a capable adversary is likely to exploit?” The answer set is dramatically smaller, and dramatically more actionable.</p> </div> </div> <div data-particle_enable="false" data-particle-mobile-disabled="false" class="elementor-element elementor-element-078127b e-con-full e-flex e-con e-parent" data-id="078127b" data-element_type="container" data-e-type="container"> <div class="elementor-element elementor-element-6d5f15e elementor-widget elementor-widget-image" data-id="6d5f15e" data-element_type="widget" data-e-type="widget" data-widget_type="image.default"> <img decoding="async" width="1600" height="600" src="https://www.praetorian.com/wp-content/uploads/2026/04/exploit-chain-analysis-funnel-500k-vulnerability-findings-to-1.webp" class="attachment-full size-full wp-image-12029" alt="Exploit chain analysis funnel 500K vulnerability findings to 14 critical endpoints" srcset="https://www.praetorian.com/wp-content/uploads/2026/04/exploit-chain-analysis-funnel-500k-vulnerability-findings-to-1.webp 1600w, https://www.praetorian.com/wp-content/uploads/2026/04/exploit-chain-analysis-funnel-500k-vulnerability-findings-to-1-300x113.webp 300w, https://www.praetorian.com/wp-content/uploads/2026/04/exploit-chain-analysis-funnel-500k-vulnerability-findings-to-1-1024x384.webp 1024w, https://www.praetorian.com/wp-content/uploads/2026/04/exploit-chain-analysis-funnel-500k-vulnerability-findings-to-1-768x288.webp 768w, https://www.praetorian.com/wp-content/uploads/2026/04/exploit-chain-analysis-funnel-500k-vulnerability-findings-to-1-1536x576.webp 1536w" sizes="(max-width: 1600px) 100vw, 1600px"> </div> </div> <div data-particle_enable="false" data-particle-mobile-disabled="false" class="elementor-element elementor-element-12bd24b e-con-full e-flex e-con e-parent" data-id="12bd24b" data-element_type="container" data-e-type="container"> <div class="elementor-element elementor-element-a0fe589 elementor-widget elementor-widget-heading" data-id="a0fe589" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default"> <h2 class="elementor-heading-title elementor-size-default">Conclusions</h2> </div> </div> <div data-particle_enable="false" data-particle-mobile-disabled="false" class="elementor-element elementor-element-eef0f4b e-con-full e-flex e-con e-parent" data-id="eef0f4b" data-element_type="container" data-e-type="container"> <div class="elementor-element elementor-element-1e97191 elementor-widget elementor-widget-text-editor" data-id="1e97191" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default"> <p>Under a traditional CVSS-sort workflow, those 14 endpoints would be buried in a queue of thousands of critical findings, undifferentiated from renderer bugs on systems with no matching sandbox escape or sandbox escapes on systems with no initial foothold. They would get patched eventually, in whatever order the ticket queue dictated, with no forensic triage and no awareness that a state-sponsored campaign had already weaponized one chain, and that the components of the other had been independently proven exploitable at Pwn2Own and in the wild.</p> <p>The linked findings Guard surfaced tell a different story. Each one ships with full chain context: the specific CVEs, the exploitability signals, the CISA KEV status, and IOC guidance for related APT tooling. That context changes what remediation looks like. Not just “patch Firefox,” but “these 14 hosts are exposed to zero-click chains built from vulnerabilities that state-sponsored actors and top security researchers have independently proven exploitable, and here is what to look for if they have already been hit.”</p> <p>This is what the Praetorian Guard platform does: it ingests vulnerability data from across the security stack, links findings into exploit chains, enriches them with threat intelligence, and surfaces the results that represent genuine, exploitable risk. A vulnerability pattern identified in one customer environment becomes a detection capability that protects every Guard customer facing the same exposure class. If you are managing hundreds of thousands of findings and struggling to identify what actually matters, you have the same problem this customer had.</p> <p><em>Want to see what exploit chains exist in your environment?</em></p> <p><a href="https://www.praetorian.com/guard">Request a Guard demo</a> <em>and we’ll show you.</em></p> </div> </div> </div><p>The post <a href="https://www.praetorian.com/blog/exploit-chain-analysis/">500,000 Vulnerabilities, 14 That Matter: How Exploit Chain Analysis Cuts Through the Noise</a> appeared first on <a href="https://www.praetorian.com/">Praetorian</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/500000-vulnerabilities-14-that-matter-how-exploit-chain-analysis-cuts-through-the-noise/" data-a2a-title="500,000 Vulnerabilities, 14 That Matter: How Exploit Chain Analysis Cuts Through the Noise"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2F500000-vulnerabilities-14-that-matter-how-exploit-chain-analysis-cuts-through-the-noise%2F&amp;linkname=500%2C000%20Vulnerabilities%2C%2014%20That%20Matter%3A%20How%20Exploit%20Chain%20Analysis%20Cuts%20Through%20the%20Noise" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2F500000-vulnerabilities-14-that-matter-how-exploit-chain-analysis-cuts-through-the-noise%2F&amp;linkname=500%2C000%20Vulnerabilities%2C%2014%20That%20Matter%3A%20How%20Exploit%20Chain%20Analysis%20Cuts%20Through%20the%20Noise" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2F500000-vulnerabilities-14-that-matter-how-exploit-chain-analysis-cuts-through-the-noise%2F&amp;linkname=500%2C000%20Vulnerabilities%2C%2014%20That%20Matter%3A%20How%20Exploit%20Chain%20Analysis%20Cuts%20Through%20the%20Noise" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2F500000-vulnerabilities-14-that-matter-how-exploit-chain-analysis-cuts-through-the-noise%2F&amp;linkname=500%2C000%20Vulnerabilities%2C%2014%20That%20Matter%3A%20How%20Exploit%20Chain%20Analysis%20Cuts%20Through%20the%20Noise" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2F500000-vulnerabilities-14-that-matter-how-exploit-chain-analysis-cuts-through-the-noise%2F&amp;linkname=500%2C000%20Vulnerabilities%2C%2014%20That%20Matter%3A%20How%20Exploit%20Chain%20Analysis%20Cuts%20Through%20the%20Noise" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.praetorian.com/blog/">Offensive Security Blog: Latest Trends in Hacking | Praetorian</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Praetorian">Praetorian</a>. Read the original post at: <a href="https://www.praetorian.com/blog/exploit-chain-analysis/">https://www.praetorian.com/blog/exploit-chain-analysis/</a> </p>

Seceon Recognized in the 2026 Gartner® “Voice of the Customer” Report for Security Information and Event Management

  • None
  • Published date: 2026-04-21 00:00:00

None

<p><em>Seceon earns a 4.6 out of 5.0 overall rating from 82 verified customer reviews, with 90% of reviewers willing to recommend the platform, reflecting strong real-world satisfaction across the global services and financial sectors</em></p><p>WESTFORD, Mass., April 21, 2026 /PRNewswire/ — Seceon Inc., a leading provider of AI-driven cybersecurity solutions for enterprises and managed security service providers (MSSPs), today announced its inclusion in the “Voice of the Customer” for Security Information and Event Management (SIEM), published April 10, 2026. The recognition is based entirely on verified reviews and ratings submitted by Seceon customers on the Gartner Peer Insights platform over an 18-month period.</p><figure class="wp-block-image size-full is-resized"><img fetchpriority="high" decoding="async" width="1400" height="1562" src="https://seceon.com/wp-content/uploads/2026/04/Figure_1._Voice_of_the_Customer_for_Security_Information_and_Event_Management-1.png" alt="" class="wp-image-31248" style="width:787px;height:auto" title="Gartner's Peer Review Voice of the Customer Quadrant, recognized Seceon as a leading SIEM solution in 2026. Driven by verified customer feedback, Seceon delivers strong outcomes in threat detection, response, and compliance with high ratings across product capabilities, deployment, and support." srcset="https://seceon.com/wp-content/uploads/2026/04/Figure_1._Voice_of_the_Customer_for_Security_Information_and_Event_Management-1.png 1400w, https://seceon.com/wp-content/uploads/2026/04/Figure_1._Voice_of_the_Customer_for_Security_Information_and_Event_Management-1-269x300.png 269w, https://seceon.com/wp-content/uploads/2026/04/Figure_1._Voice_of_the_Customer_for_Security_Information_and_Event_Management-1-918x1024.png 918w, https://seceon.com/wp-content/uploads/2026/04/Figure_1._Voice_of_the_Customer_for_Security_Information_and_Event_Management-1-768x857.png 768w, https://seceon.com/wp-content/uploads/2026/04/Figure_1._Voice_of_the_Customer_for_Security_Information_and_Event_Management-1-1377x1536.png 1377w" sizes="(max-width: 1400px) 100vw, 1400px"><figcaption class="wp-element-caption">Gartner’s Peer Review Voice of the Customer Quadrant, recognized Seceon as a leading SIEM solution in 2026. Driven by verified customer feedback, Seceon delivers strong outcomes in threat detection, response, and compliance with high ratings across product capabilities, deployment, and support.</figcaption></figure><figure class="wp-block-image size-large is-resized"><img decoding="async" width="1024" height="535" src="https://seceon.com/wp-content/uploads/2026/04/Recognized-as-a-Customers-Choice-in-the-Gartner-Peer-Insights%E2%84%A2-Voice-of-the-Customer-Quadrant-2026-2-1024x535.png" alt="" class="wp-image-31249" style="aspect-ratio:1.9140527646242034;width:826px;height:auto" title='Seceon is included in the Gartner® Peer Insights™ "Voice of the Customer" for Security Information and Event Management (2026), based on verified reviews from customers across the globe. The recognition reflects strong feedback across deployment experience, usability, and operational effectiveness, highlighting how security teams are turning to unified platforms to improve visibility, accelerate response, and reduce operational complexity.' srcset="https://seceon.com/wp-content/uploads/2026/04/Recognized-as-a-Customers-Choice-in-the-Gartner-Peer-Insights™-Voice-of-the-Customer-Quadrant-2026-2-1024x535.png 1024w, https://seceon.com/wp-content/uploads/2026/04/Recognized-as-a-Customers-Choice-in-the-Gartner-Peer-Insights™-Voice-of-the-Customer-Quadrant-2026-2-300x157.png 300w, https://seceon.com/wp-content/uploads/2026/04/Recognized-as-a-Customers-Choice-in-the-Gartner-Peer-Insights™-Voice-of-the-Customer-Quadrant-2026-2-768x401.png 768w, https://seceon.com/wp-content/uploads/2026/04/Recognized-as-a-Customers-Choice-in-the-Gartner-Peer-Insights™-Voice-of-the-Customer-Quadrant-2026-2.png 1200w" sizes="(max-width: 1024px) 100vw, 1024px"><figcaption class="wp-element-caption">Seceon is included in the Gartner® Peer Insights<img decoding="async" src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;"> “Voice of the Customer” for Security Information and Event Management (2026), based on verified reviews from customers across the globe. The recognition reflects strong feedback across deployment experience, usability, and operational effectiveness, highlighting how security teams are turning to unified platforms to improve visibility, accelerate response, and reduce operational complexity.</figcaption></figure><p>Seceon achieved an overall rating of 4.6 out of 5.0 stars across 82 verified customer reviews, 210 total reviews, with 90% of reviewers indicating a willingness to recommend Seceon to peers. The company was recognized in the “Aspiring” Voice of the Customer Quadrant, reflecting above-market-average overall experience scores alongside a growing customer footprint.</p><p><em> “The SIEM market has long been dominated by solutions that are expensive to deploy, slow to deliver value, and difficult to manage without large teams. Our inclusion in the Gartner Peer Insights Voice of the Customer with a 4.6 rating and a top deployment experience score validates that there is a better way, and that our customers are living proof of it.”<br></em><strong>— Chandra Pandey, Founder &amp; CEO, Seceon Inc. </strong></p><p><strong>Why This Recognition Matters</strong></p><p>The Gartner Peer Insights “Voice of the Customer” is one of the most trusted peer-driven evaluations in enterprise technology. Inclusion requires a minimum of 20 verified reviews over 18 months, a 4.0 or higher overall rating, and sufficient ratings across capabilities and support delivery criteria that ensure only vendors with demonstrated customer satisfaction are represented. Across the entire SIEM market during this period, Gartner Peer Insights collected 2,673 total reviews and ratings.</p><p>For Seceon, earning a 90% Willingness to Recommend score, ahead of several larger, well-resourced competitors in the market, underscores the tangible value customers experience when deploying the Seceon Open Threat Management (OTM) Platform. Seceon’s Deployment Experience score of 4.6 out of 5.0 is particularly notable, reflecting the platform’s ease of onboarding and time-to-value relative to more complex legacy SIEM architectures.</p><p><strong>What Customers Value Most</strong></p><p>Across 82 verified reviews, Seceon customers predominantly from the services, finance, and communications sectors, spanning organizations in the US, Asia/Pacific, Europe, and globally — consistently highlight:</p><ul class="wp-block-list"> <li>  AI-driven, real-time threat detection and automated response that reduces analyst workload and alert fatigue</li> <li>  Superior deployment experience compared to legacy SIEM tools, with rapid time-to-value for resource-constrained teams</li> <li>  Strong MSSP and multi-tenant capabilities that enable service providers to deliver scalable, enterprise-grade protection</li> <li>  Consistent, high-quality customer support rated 4.5 out of 5.0 across 82 reviewers</li> <li>  Competitive total cost of ownership, making advanced threat detection accessible beyond large enterprise budgets</li> </ul><p>Read Seceon’s verified customer reviews and access the full Gartner Peer Insights Voice of the Customer for SIEM report at: <strong><u><a href="https://edge.prnewswire.com/c/link/?t=0&amp;l=en&amp;o=4669056-1&amp;h=147230541&amp;u=https%3A%2F%2Fseceon.com%2F2026-gartner-peer-insights-voice-of-the-customer-for-siem%2F&amp;a=https%3A%2F%2Fseceon.com%2F2026-gartner-peer-insights-voice-of-the-customer-for-siem%2F" rel="noreferrer noopener">https://seceon.com/2026-gartner-peer-insights-voice-of-the-customer-for-siem/</a></u></strong></p><p><strong>About the Seceon Open Threat Management Platform</strong></p><p>Seceon’s Open Threat Management (OTM) Platform combines AI, machine learning, and behavioral analytics to continuously monitor, detect, and automatically contain threats across on-premises, cloud, and hybrid environments in real time, 24/7. Designed for enterprises and MSSPs alike, the platform ingests and correlates data from across the full IT environment, eliminating the complexity, cost, and tuning burden of traditional SIEM deployments.</p><p><strong>Gartner Disclaimer</strong></p><p><em>Gartner, Voice of the Customer for Security Information and Event Management, Peer Community Contributors, 10 April 2026. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and PEER INSIGHTS is a trademark and service mark of Gartner, Inc. and/or its affiliates and are used herein with permission. All rights reserved. Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences with the vendors listed on the platform, should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates.</em></p><p><strong>Media Contact:<br></strong>Shikha Pandey<br><a href="/cdn-cgi/l/email-protection" class="__cf_email__" data-cfemail="a4f7cccdcfccc5e4d7c1c7c1cbca8ac7cbc9">[email protected]</a><br><a href="https://edge.prnewswire.com/c/link/?t=0&amp;l=en&amp;o=4527006-1&amp;h=2865169115&amp;u=http%3A%2F%2Fwww.seceon.com%2F&amp;a=www.seceon.com" rel="noreferrer noopener">www.seceon.com</a><br>+1 978-496-4058</p><p><strong>Reference Link:</strong> <a href="https://www.prnewswire.com/news-releases/seceon-recognized-in-the-2026-gartner-voice-of-the-customer-report-for-security-information-and-event-management-302748446.html">Seceon Recognized in the 2026 Gartner® “Voice of the Customer” Report for Security Information and Event Management</a></p><p>The post <a href="https://seceon.com/seceon-recognized-in-the-2026-gartner-voice-of-the-customer-report-for-security-information-and-event-management/">Seceon Recognized in the 2026 Gartner® “Voice of the Customer” Report for Security Information and Event Management</a> appeared first on <a href="https://seceon.com/">Seceon Inc</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/seceon-recognized-in-the-2026-gartner-voice-of-the-customer-report-for-security-information-and-event-management/" data-a2a-title="Seceon Recognized in the 2026 Gartner® “Voice of the Customer” Report for Security Information and Event Management"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fseceon-recognized-in-the-2026-gartner-voice-of-the-customer-report-for-security-information-and-event-management%2F&amp;linkname=Seceon%20Recognized%20in%20the%202026%20Gartner%C2%AE%20%E2%80%9CVoice%20of%20the%20Customer%E2%80%9D%20Report%20for%20Security%20Information%20and%20Event%20Management" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fseceon-recognized-in-the-2026-gartner-voice-of-the-customer-report-for-security-information-and-event-management%2F&amp;linkname=Seceon%20Recognized%20in%20the%202026%20Gartner%C2%AE%20%E2%80%9CVoice%20of%20the%20Customer%E2%80%9D%20Report%20for%20Security%20Information%20and%20Event%20Management" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fseceon-recognized-in-the-2026-gartner-voice-of-the-customer-report-for-security-information-and-event-management%2F&amp;linkname=Seceon%20Recognized%20in%20the%202026%20Gartner%C2%AE%20%E2%80%9CVoice%20of%20the%20Customer%E2%80%9D%20Report%20for%20Security%20Information%20and%20Event%20Management" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fseceon-recognized-in-the-2026-gartner-voice-of-the-customer-report-for-security-information-and-event-management%2F&amp;linkname=Seceon%20Recognized%20in%20the%202026%20Gartner%C2%AE%20%E2%80%9CVoice%20of%20the%20Customer%E2%80%9D%20Report%20for%20Security%20Information%20and%20Event%20Management" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fseceon-recognized-in-the-2026-gartner-voice-of-the-customer-report-for-security-information-and-event-management%2F&amp;linkname=Seceon%20Recognized%20in%20the%202026%20Gartner%C2%AE%20%E2%80%9CVoice%20of%20the%20Customer%E2%80%9D%20Report%20for%20Security%20Information%20and%20Event%20Management" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://seceon.com/">Seceon Inc</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Anamika Pandey">Anamika Pandey</a>. Read the original post at: <a href="https://seceon.com/seceon-recognized-in-the-2026-gartner-voice-of-the-customer-report-for-security-information-and-event-management/">https://seceon.com/seceon-recognized-in-the-2026-gartner-voice-of-the-customer-report-for-security-information-and-event-management/</a> </p>

Iran Alleges US Networking Gear Was Deliberately Disabled

  • James Maguire
  • Published date: 2026-04-21 00:00:00

None

<p style="font-weight: 400;">Reports from Iranian state media claim that U.S.-manufactured networking gear ceased functioning at critical moments during military strikes. The allegations, which cannot be independently verified, claim there were simultaneous failures across routers and switches produced by Cisco, Fortinet, Juniper Networks, and MikroTik during attacks on Iranian infrastructure.</p><p style="font-weight: 400;">According to accounts published by the Iranian <a href="https://farsnews.ir/FarsNews_eng">Fars News Agency</a>, the disruptions occurred as U.S. forces targeted sites in Iran’s Isfahan Province. Devices reportedly disconnected or rebooted despite the country having largely severed its connection to the global Internet. Iranian officials claimed the timing was deliberate, suggesting the presence of embedded vulnerabilities or dormant malware within the equipment.</p><p style="font-weight: 400;">Iranian sources say that the failures could not have resulted from conventional remote cyberattacks, given the country’s isolation from external networks during the strikes. Instead, they describe scenarios involving pre-positioned code within firmware or the activation of hidden backdoors capable of triggering disruptions without external connectivity.</p><p style="font-weight: 400;">U.S. vendors have not confirmed the existence of such vulnerabilities, and no independent technical analysis has been released.</p><p style="font-weight: 400;">Since the start of the conflict, authorities have maintained a near-total Internet shutdown. Only a limited group of approved users could access the Internet. This isolation is one of the reasons it is hard to verify claims of coordinated hardware failures.</p><p style="font-weight: 400;">The isolation also reveals Iran’s decision to build a centralized and controllable network architecture, which limits foreign influence and enhances domestic surveillance. The downside of such a centralized approach is that it includes the potential for single points of failure.</p><h2 style="font-weight: 400;"><strong>Sustained Cyber Battle </strong></h2><p style="font-weight: 400;">Whatever the truth of the claims about the networking gear, a sustained cyber battle is almost certainly being pursued by both the U.S. and Iran.</p><p style="font-weight: 400;">U.S. military officials have acknowledged using offensive cyber capabilities in recent conflicts. In briefings earlier this year, senior defense leaders described cyber units as first movers used to attack an adversary’s communication infrastructure before physical strikes begin.</p><p style="font-weight: 400;">Iran, according to U.S. authorities, made a series of intrusions into American critical infrastructure, compromising systems tied to oil, gas, and water operations, and causing operational disruptions. The attacks targeted programmable logic controllers, which bridge digital commands and physical machinery.</p><p style="font-weight: 400;">While the disruptions reported in the U.S. were limited, they show a persistent effort to establish footholds in critical systems that could be leveraged during conflicts.</p><p style="font-weight: 400;">Independent hacking groups aligned with Iran have also signaled their intent to continue cyber operations regardless of diplomatic developments. Following a recent ceasefire, one such group stated that attacks against U.S. targets would resume when conditions allow. Cyber conflict operates on a separate timeline from conventional warfare.</p><p style="font-weight: 400;">A key point here: the lack of verifiable evidence highlights the challenge of separating technical reality from information warfare. In a conflict where cyber capabilities are both real tools and instruments of propaganda, claims of sabotage can influence opinions even without confirmation.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/iran-alleges-us-networking-gear-was-deliberately-disabled/" data-a2a-title="Iran Alleges US Networking Gear Was Deliberately Disabled"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Firan-alleges-us-networking-gear-was-deliberately-disabled%2F&amp;linkname=Iran%20Alleges%20US%20Networking%20Gear%20Was%20Deliberately%20Disabled" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Firan-alleges-us-networking-gear-was-deliberately-disabled%2F&amp;linkname=Iran%20Alleges%20US%20Networking%20Gear%20Was%20Deliberately%20Disabled" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Firan-alleges-us-networking-gear-was-deliberately-disabled%2F&amp;linkname=Iran%20Alleges%20US%20Networking%20Gear%20Was%20Deliberately%20Disabled" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Firan-alleges-us-networking-gear-was-deliberately-disabled%2F&amp;linkname=Iran%20Alleges%20US%20Networking%20Gear%20Was%20Deliberately%20Disabled" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Firan-alleges-us-networking-gear-was-deliberately-disabled%2F&amp;linkname=Iran%20Alleges%20US%20Networking%20Gear%20Was%20Deliberately%20Disabled" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>

Manhattan DA Bragg Pushes Meta to Put a Stop to Immigration Scams

  • Teri Robinson
  • Published date: 2026-04-21 00:00:00

None

<p><span data-contrast="none">Manhattan’s hard-nosed District Attorney Alvin Bragg, who secured 34 felony convictions against President Trump, is taking on Meta to hold the social media company accountable for immigration scams growing like wildfire on its platforms.</span><span data-ccp-props='{"201341983":2,"335557856":16777215,"335559739":480,"335559740":487}'> </span></p><p><span data-contrast="none">In a </span><a href="https://manhattanda.org/wp-content/uploads/2026/04/Letter-to-Meta-4.9.26.pdf" target="_blank" rel="noopener"><span data-contrast="none">recent letter</span></a><span data-contrast="none">, Bragg urged Meta CEO Mark Zuckerberg to act to stop the scams, which he said were difficult to prosecute, and requested a meeting with the company’s representatives.</span><span data-ccp-props='{"201341983":2,"335557856":16777215,"335559739":480,"335559740":487}'> </span></p><p><span data-contrast="none">Bragg noted that imposter accounts were using Meta’s platforms like Facebook and WhatsApp to “</span><span data-contrast="auto">falsely pose as pro bono legal services organizations, such as Catholic Charities” and then extract money for assistance from the victims. The funds typically make their way overseas, hampering prosecution and recovery.</span><span data-ccp-props='{"201341983":2,"335557856":16777215,"335559739":480,"335559740":487}'> </span></p><p><span data-contrast="none">“These scams are especially dangerous because they target a vulnerable population who are in situations of emotional distress,” says Miks Aalto, cofounder and CEO at Hoxhunt. Impersonating trusted legal organizations or charities lends a sense of urgency that prompts victims to respond more quickly.</span><span data-ccp-props='{"201341983":2,"335557856":16777215,"335559739":480,"335559740":487}'> </span></p><p><span data-contrast="none">The speed of the cycle makes pinning attackers and punishing them more difficult. “Even when fake accounts are reported and removed, attackers can create new ones very quickly using the same tactics but with just enough adaptations to fool the filters,” says Aalto, noting that AI is accelerating the “endless game of whack-a-mole.”</span><span data-ccp-props='{"201341983":2,"335557856":16777215,"335559739":480,"335559740":487}'> </span></p><p><span data-contrast="auto">While the Manhattan DA’s office “investigates and prosecutes these crimes when able, your company can play an important role in protecting users from fraud and theft,” Bragg wrote, pointing out that the imposter accounts stand in violation of Meta’s terms of service that prohibit “accounts that provide false information or engage in unlawful or misleading conduct.”</span><span data-ccp-props='{"201341983":2,"335557856":16777215,"335559739":480,"335559740":487}'> </span></p><p><span data-contrast="auto">But Meta doesn’t seem to be following its own terms for removing those accounts. “We have spoken with at least two institutional leaders of pro bono legal services organizations whose requests to remove false profiles were declined despite following this reporting protocol,” Bragg wrote. </span><span data-ccp-props='{"201341983":0,"335559739":0,"335559740":360}'> </span></p><p><span data-contrast="none">For Meta, protection seems to be a matter of priorities. The company “has built moderation that protects celebrities and abandons nonprofits, and scammers exploit that asymmetry as operational cover,” says Collin Hogue-Spears, senior director of solution management at Black Duck. </span><span data-ccp-props='{"201341983":0,"335559739":0,"335559740":360}'> </span></p><p><span data-contrast="none">He says that scammers “bought Facebook ads, cloned nonprofit logos, and migrated victims into WhatsApp where no moderation algorithm can follow.”</span><span data-ccp-props='{"201341983":0,"335559739":0,"335559740":360}'> </span></p><p><span data-contrast="none">About one-third of all Catholic Charities agencies across the U.S. “have reported impersonation campaigns using their names and branding to extract payments from immigrants” but when “verified institutional leaders reported their own impersonators through Meta’s official process, Meta declined the removal requests.”</span><span data-ccp-props='{"201341983":0,"335559739":0,"335559740":360}'> </span></p><p><span data-contrast="none">The reporting button, Hogue-Spears says, “exists to satisfy an audit… not to stop a scammer; it is a suggestion box.”</span><span data-ccp-props='{"201341983":0,"335559739":0,"335559740":360}'> </span></p><p><span data-contrast="auto">If Meta is sincere about protecting its users as the company has claimed repeatedly, Bragg said it must “take necessary, proactive steps” to do so. </span><span data-ccp-props='{"201341983":2,"335557856":16777215,"335559739":480,"335559740":487}'> </span></p><p><span data-contrast="auto">To that end, Bragg asked Zuckerberg to:</span><span data-ccp-props='{"201341983":2,"335557856":16777215,"335559739":480,"335559740":487}'> </span></p><p><span data-contrast="auto">1) Add a reporting option to your Law Enforcement Online Requests Portal, allowing agencies like our office to report imposter accounts engaged in criminal conduct directly to Meta. </span><span data-ccp-props='{"201341983":2,"335557856":16777215,"335559739":480,"335559740":487}'> </span></p><p><span data-contrast="auto">2) Prioritize addressing reports of imposter accounts where criminality is alleged and temporarily suspend those accounts while the investigation is conducted. </span><span data-ccp-props='{"201341983":2,"335557856":16777215,"335559739":480,"335559740":487}'> </span></p><p><span data-contrast="auto">3) Ensure users claiming to represent organizations like legal services providers match the geographic locations of those organizations by strengthening verification tools and analyzing existing user data, such as IP address location.</span><span data-ccp-props='{"201341983":2,"335557856":16777215,"335559739":480,"335559740":487}'> </span></p><p><span data-contrast="none">Noting that the problem doesn’t belong solely to Meta but rather is a platform problem, Trey Ford, chief strategy and trust officer at Bugcrowd, says, “the DA’s letter should be a forcing function for the entire industry to build law enforcement escalation paths that match the severity of criminal activity, not just the volume of reports.”</span><span data-ccp-props='{"201341983":0,"335559739":0,"335559740":360}'> </span></p><p><span data-contrast="none">What the DA is really describing, he says, “is an industry-wide gap — social platforms were architected for growth and connection, not for the kind of trust verification that criminal impersonation demands.”</span><span data-ccp-props='{"201341983":0,"335559739":0,"335559740":360}'> </span></p><p><span data-contrast="auto">Outreach to the communities affected is critical, too. </span><span data-contrast="none">“We all must understand that if someone contacts you offering legal help or financial assistance through social media or messaging apps, don’t rely on the message itself, even if it appears to come from a source you’ve spent your life trusting, like church services,” says Aalto. “Verification and critical thinking are essential. Reach out to the organization through official channels to confirm the offer of assistance is real.” Good advice, although that might be a tall order for immigrants spooked by aggressive actions taken by ICE in the last year and who may be hesitant to reach out.</span><span data-ccp-props='{"201341983":0,"335559739":0,"335559740":360}'> </span></p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/manhattan-da-bragg-pushes-meta-to-put-a-stop-to-immigration-scams/" data-a2a-title="Manhattan DA Bragg Pushes Meta to Put a Stop to Immigration Scams "><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fmanhattan-da-bragg-pushes-meta-to-put-a-stop-to-immigration-scams%2F&amp;linkname=Manhattan%20DA%20Bragg%20Pushes%20Meta%20to%20Put%20a%20Stop%20to%20Immigration%20Scams%C2%A0" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fmanhattan-da-bragg-pushes-meta-to-put-a-stop-to-immigration-scams%2F&amp;linkname=Manhattan%20DA%20Bragg%20Pushes%20Meta%20to%20Put%20a%20Stop%20to%20Immigration%20Scams%C2%A0" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fmanhattan-da-bragg-pushes-meta-to-put-a-stop-to-immigration-scams%2F&amp;linkname=Manhattan%20DA%20Bragg%20Pushes%20Meta%20to%20Put%20a%20Stop%20to%20Immigration%20Scams%C2%A0" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fmanhattan-da-bragg-pushes-meta-to-put-a-stop-to-immigration-scams%2F&amp;linkname=Manhattan%20DA%20Bragg%20Pushes%20Meta%20to%20Put%20a%20Stop%20to%20Immigration%20Scams%C2%A0" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fmanhattan-da-bragg-pushes-meta-to-put-a-stop-to-immigration-scams%2F&amp;linkname=Manhattan%20DA%20Bragg%20Pushes%20Meta%20to%20Put%20a%20Stop%20to%20Immigration%20Scams%C2%A0" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>

Two MDO field reports every IT security lead should read

  • None
  • Published date: 2026-04-21 00:00:00

None

<p>The post <a href="https://ironscales.com/blog/two-mdo-field-reports-every-it-security-lead-should-read">Two MDO field reports every IT security lead should read</a> appeared first on <a href="https://ironscales.com/blog">Blog</a>.</p><p>Tyler Swinehart, Director of Global IT &amp; Security at IRONSCALES, has been publishing the kind of LinkedIn pieces I wish more practitioners would write. No vendor angle. No positioning. Just “here’s what I learned the hard way operating this thing in production, and here’s what nobody told me until it was too late.”</p><p>His last two posts are about Microsoft Defender for Office, specifically Explorer and Quarantine. If you operate MDO, you should read both. They’re under 10 minutes each, and they’ll save you hours the next time you’re deep in a phishing investigation wondering why your search results don’t add up.</p><p>I’ll resist the urge to recap them (Tyler explains his own work better than I will). But read both back to back and a pattern emerges. Native email security tooling has a transparency problem, and it shows up in the operational moments that vendor roadmaps never plan for.</p><h2>The Explorer post: search that “works” but doesn’t tell you what it’s doing</h2><p><img fetchpriority="high" decoding="async" src="https://ironscales.com/hs-fs/hubfs/Blog/2026/Microsoft%20Defender%20for%20Office%20Explorer.webp?width=360&amp;height=390&amp;name=Microsoft%20Defender%20for%20Office%20Explorer.webp" width="360" height="390" alt="Microsoft Defender for Office Explorer" style="height: auto; max-width: 100%; width: 360px; margin-left: 10px; margin-right: 0px; float: right;">Tyler’s first piece walks through MDO Explorer’s filtering limits. No regex. No OR statements. No “starts with” operator. Weird Unicode behavior that quietly drops matches. And a 30-day log retention cap that nobody mentions until someone asks you for 45-day-old logs and you have nothing to show. His workaround is KQL through Advanced Hunting Queries, which is the right answer if you’re willing to learn another query language.</p><p>Read the full post here: <a href="https://www.linkedin.com/pulse/microsoft-defender-office-explorer-stuff-nobody-tells-tyler-swinehart-vvrvc/">Microsoft Defender for Office Explorer (the stuff nobody tells you until it’s too late)</a></p><p>The strategic read is this. Explorer’s UI gives you a confidence interval Microsoft never actually promised. You search for a sender, get results, and assume you’ve seen everything that matches. You haven’t. Special characters might have dropped matches. The “contains” operator is doing fuzzy work you can’t see. The 30-day window is invisible until it bites you. The product is doing its job. It just isn’t telling you what its job actually is.</p><p>This pattern shows up across the native security category. Tools get built for the median use case and quietly fail the edge cases that matter most during an active investigation.</p><h2>The Quarantine post: a product that disagrees with you and won’t say why</h2><p><img decoding="async" src="https://ironscales.com/hs-fs/hubfs/Blog/2026/MDO%20Quarantine%20-%20the%20stuff%20nobody%20tells%20you.webp?width=410&amp;height=539&amp;name=MDO%20Quarantine%20-%20the%20stuff%20nobody%20tells%20you.webp" width="410" height="539" alt="MDO Quarantine - the stuff nobody tells you" style="height: auto; max-width: 100%; width: 410px; float: right; margin-left: 10px; margin-right: 0px;">Tyler’s second piece opens with a department head asking why a contract email never arrived. Quarantined as “High Confidence Phish.” No notification. No scoring breakdown. No indicator list. Just gone.</p><p>Read the full post here: <a href="https://www.linkedin.com/pulse/mdo-quarantine-stuff-nobody-tells-you-until-youre-policy-swinehart-lcfze/">MDO Quarantine (the stuff nobody tells you until you’re debugging a policy that quietly does nothing)</a></p><p>Then it gets worse. Microsoft hides the quarantine console entirely if you don’t have the right RBAC role (no grayed-out menu, no helpful “you need access” hint, just nothing). The submission workflow has two paths, neither well documented, neither carrying an SLA. Quarantined emails vanish after 30 days with no extension, no delegation, no archive. And the headline finding, which security admins should print and tape to their wall: preset security policies silently override your custom configurations with no warning, no conflict indicator, no UI signal that anything is being ignored.</p><p>You can spend an afternoon debugging quarantine behavior that isn’t doing what your custom policy says it’s doing, only to discover Microsoft picked a different policy and didn’t bother to mention it.</p><h2>The thread between both posts</h2><p>Both pieces describe products that work exactly as designed and fail their operators anyway. The detection logic is competent. The interface is usable. The features ship. What’s missing is the operational transparency that lets a security team trust the tool, debug it when it misbehaves, and explain its decisions to the business.</p><p>Most vendor evaluations underweight this dimension (mine included, in different ways). We benchmark catch rates, detection coverage, AI sophistication. We rarely benchmark whether a Tier 1 analyst can figure out why something happened, whether a custom policy is actually running, whether a search returned everything it should have, or whether last quarter’s logs are still available when legal asks for them.</p><p>Closing that gap means treating transparency as a feature in its own right, with its own roadmap, its own success metrics, and its own UX investment.</p><h2>What to do with this</h2><p>Two takeaways, depending on where you sit.</p><p>If you operate MDO: read both posts. Audit your preset policy stack against your custom configs (Tyler’s finding there alone could save you a week of confused troubleshooting). Get your KQL skills sharp enough to run real Advanced Hunting Queries when Explorer hits its limits. Forward your MDO logs somewhere with retention longer than 30 days before someone asks you for historical data.</p><p>If you evaluate email security tools: add operational transparency to your eval criteria. Ask vendors how analysts surface why a verdict was reached, how they validate that custom policies are actually applied, and how they expose log retention. The answers will tell you more than another detection benchmark will.</p><p>Tyler’s LinkedIn is <a href="https://www.linkedin.com/in/tyler-swinehart/">here</a> if you want to follow along. He’s writing more of these. They’re worth your time.</p><p><img loading="lazy" decoding="async" src="https://track.hubspot.com/__ptq.gif?a=20641927&amp;k=14&amp;r=https%3A%2F%2Fironscales.com%2Fblog%2Ftwo-mdo-field-reports-every-it-security-lead-should-read&amp;bu=https%253A%252F%252Fironscales.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "></p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/two-mdo-field-reports-every-it-security-lead-should-read/" data-a2a-title="Two MDO field reports every IT security lead should read"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Ftwo-mdo-field-reports-every-it-security-lead-should-read%2F&amp;linkname=Two%20MDO%20field%20reports%20every%20IT%20security%20lead%20should%20read" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Ftwo-mdo-field-reports-every-it-security-lead-should-read%2F&amp;linkname=Two%20MDO%20field%20reports%20every%20IT%20security%20lead%20should%20read" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Ftwo-mdo-field-reports-every-it-security-lead-should-read%2F&amp;linkname=Two%20MDO%20field%20reports%20every%20IT%20security%20lead%20should%20read" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Ftwo-mdo-field-reports-every-it-security-lead-should-read%2F&amp;linkname=Two%20MDO%20field%20reports%20every%20IT%20security%20lead%20should%20read" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Ftwo-mdo-field-reports-every-it-security-lead-should-read%2F&amp;linkname=Two%20MDO%20field%20reports%20every%20IT%20security%20lead%20should%20read" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://ironscales.com/blog">Blog</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Audian Paxson">Audian Paxson</a>. Read the original post at: <a href="https://ironscales.com/blog/two-mdo-field-reports-every-it-security-lead-should-read">https://ironscales.com/blog/two-mdo-field-reports-every-it-security-lead-should-read</a> </p>

A Cybersecurity Lifeline for Lean IT Teams: Introducing C.R.E.W.

  • None
  • Published date: 2026-04-21 00:00:00

None

<p>The post <a href="https://businessinsights.bitdefender.com/where-lean-it-teams-start-cybersecurity">A Cybersecurity Lifeline for Lean IT Teams: Introducing C.R.E.W.</a> appeared first on <a href="https://businessinsights.bitdefender.com">Business Insights</a>.</p><div class="hs-featured-image-wrapper"> <a href="https://businessinsights.bitdefender.com/where-lean-it-teams-start-cybersecurity?hsLang=en-us" title="" class="hs-featured-image-link"> <img decoding="async" src="https://businessinsights.bitdefender.com/hubfs/crew-lifeline-lean-security-teams.png" alt="A Cybersecurity Lifeline for Lean IT Teams: Introducing C.R.E.W." class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div><h3>“Too small to target” is a dangerous cybersecurity myth, while “Where do I start?,” is a legitimate cyber defense question.</h3><p><span>Imagine leaving your office unlocked overnight—not because you don’t have anything valuable, but because you assume no one would bother breaking in.</span></p><p><img decoding="async" src="https://track-eu1.hubspot.com/__ptq.gif?a=341979&amp;k=14&amp;r=https%3A%2F%2Fbusinessinsights.bitdefender.com%2Fwhere-lean-it-teams-start-cybersecurity&amp;bu=https%253A%252F%252Fbusinessinsights.bitdefender.com&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "></p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/a-cybersecurity-lifeline-for-lean-it-teams-introducing-c-r-e-w/" data-a2a-title="A Cybersecurity Lifeline for Lean IT Teams: Introducing C.R.E.W."><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fa-cybersecurity-lifeline-for-lean-it-teams-introducing-c-r-e-w%2F&amp;linkname=A%20Cybersecurity%20Lifeline%20for%20Lean%20IT%20Teams%3A%20Introducing%20C.R.E.W." title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fa-cybersecurity-lifeline-for-lean-it-teams-introducing-c-r-e-w%2F&amp;linkname=A%20Cybersecurity%20Lifeline%20for%20Lean%20IT%20Teams%3A%20Introducing%20C.R.E.W." title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fa-cybersecurity-lifeline-for-lean-it-teams-introducing-c-r-e-w%2F&amp;linkname=A%20Cybersecurity%20Lifeline%20for%20Lean%20IT%20Teams%3A%20Introducing%20C.R.E.W." title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fa-cybersecurity-lifeline-for-lean-it-teams-introducing-c-r-e-w%2F&amp;linkname=A%20Cybersecurity%20Lifeline%20for%20Lean%20IT%20Teams%3A%20Introducing%20C.R.E.W." title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fa-cybersecurity-lifeline-for-lean-it-teams-introducing-c-r-e-w%2F&amp;linkname=A%20Cybersecurity%20Lifeline%20for%20Lean%20IT%20Teams%3A%20Introducing%20C.R.E.W." title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://businessinsights.bitdefender.com">Business Insights</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Riana Dewi">Riana Dewi</a>. Read the original post at: <a href="https://businessinsights.bitdefender.com/where-lean-it-teams-start-cybersecurity">https://businessinsights.bitdefender.com/where-lean-it-teams-start-cybersecurity</a> </p>

Lattice-based Signature Schemes for MCP Host Authentication

  • None
  • Published date: 2026-04-21 00:00:00

None

<p>The post <a href="https://www.gopher.security/blog/lattice-based-signature-schemes-mcp-host-authentication">Lattice-based Signature Schemes for MCP Host Authentication</a> appeared first on <a href="https://www.gopher.security/blog">Read the Gopher Security's Quantum Safety Blog</a>.</p><h2>Why classical auth is failing our mcp hosts</h2><p>Ever wonder why we're still using math from the 70s to protect ai that's basically from the future? (<a href="https://www.quora.com/Whats-the-point-in-continuing-to-teach-mathematics-especially-at-the-collegiate-level-when-software-can-do-it-all-and-well-all-be-using-AI-in-a-few-years-anyway">What's the point in continuing to teach mathematics, …</a>) It’s kind of wild when you think about it. </p><p>Before we dive in, let's talk about what an mcp actually is. The Model Context Protocol (mcp) is basically the new standard for connecting ai models to different data sources and tools, making sure the ai actually knows what it's talking about. But the stuff keeping our mcp hosts safe right now—mostly rsa and ecdsa—is basically a sitting duck. According to NIST, we need new standards like ML-DSA because quantum computers will eventually just walk through classical pki like it isn't even there. (<a href="https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards">NIST Releases First 3 Finalized Post-Quantum Encryption Standards</a>)</p><ul> <li><strong>Shor’s Algorithm is the killer</strong>: It makes current encryption useless by solving the hard math problems we rely on in seconds.</li> <li><strong>Harvest Now, Decrypt Later</strong>: Bad actors are stealing ai context data today, just waiting for better tech to unlock it later.</li> <li><strong>mcp Vulnerability</strong>: These servers handle super sensitive stuff—think healthcare records or private financial data—making them "prime targets" as noted in <a href="https://www.mdpi.com/2410-387X/7/3/33">Cryptography 2023</a>.</li> </ul><p><img decoding="async" src="https://cdn.pseo.one/685d00d4cb08ab5f5934b924/690c83ae1ca595b8c6f91e0f/lattice-based-signature-schemes-mcp-host-authentication/mermaid-diagram-1.svg" alt="Diagram 1"></p><p>It's a mess, honestly. But that's why everyone is looking at lattices now. Let's look at the actual math.</p><h2>Understanding lattice-based signatures for ai</h2><p>Think of a lattice like a massive, infinite grid of points floating in a thousand-dimensional space. To us, it sounds like sci-fi, but for ai security, it's the ultimate shield because findind the "shortest" path between these points is a math problem so hard that even a quantum computer gets a headache trying to solve it.</p><p>Lattice-based security mostly relies on two big ideas: <strong>Module-LWE</strong> (Learning With Errors) and <strong>Module-SIS</strong> (Short Integer Solution). In simple terms, we’re hiding a secret inside a bunch of "noisy" math equations that look like random junk to anyone without the key.</p><ul> <li><strong>High-Dimensional Grids</strong>: Instead of simple numbers, we use vectors in modules, which gives us more flexibility than older "ring" versions.</li> <li><strong>Shortest Vector Problem</strong>: The security core is that you can't find the shortest non-zero vector in a complex lattice without basically guessing forever.</li> <li><strong>ML-DSA (dilithium)</strong>: This is the new gold standard. As noted in <a href="https://csrc.nist.gov/pubs/fips/204/final">FIPS 204</a>, this standard uses module lattices to make signatures that are "quantum-resistant" and super fast for mcp hosts.</li> </ul><p><img decoding="async" src="https://cdn.pseo.one/685d00d4cb08ab5f5934b924/690c83ae1ca595b8c6f91e0f/lattice-based-signature-schemes-mcp-host-authentication/mermaid-diagram-2.svg" alt="Diagram 2"></p><p>Honestly, the cool part is how fast this runs. I saw a demo where a dev swapped out rsa for a lattice scheme and the auth time barely budged, even though the security went through the roof.</p><h2>Implementing ML-DSA in MCP deployments</h2><p>So you've got the math down, but how do we actually drop this into a live mcp setup without breaking everything? It’s one thing to talk about grids, it's another to handle large keys while your server is screaming for lower latency.</p><p>Honestly, the biggest headache with ml-dsa is the signature size—it’s beefy compared to the tiny ecdsa stuff we’re used to. Gopher security is a framework used for securing distributed systems—it basically acts as a 4D security layer that helps mcp deployments handle these large lattice signatures by optimizing how they move through the pipes. </p><ul> <li><strong>Latency management</strong>: Since lattice signatures are bigger, you need smart buffering so your ai context doesn't lag while waiting for auth.</li> <li><strong>Automated compliance</strong>: It’s pretty handy for soc 2 because it bakes post-quantum crypto right into the audit logs.</li> <li><strong>Hybrid modes</strong>: A lot of folks are running "dual signatures"—classical and ml-dsa together—just in case one has a bug we don't know about yet.</li> </ul><p>If you’re messing around in python, you’ll probably use something like the <code>pqcrypto</code> or <code>oqs</code> wrappers. The main trick is handling the <strong>rejection sampling</strong>. This is a process where the algorithm checks if the signature might leak info about the secret key; if it does, it "rejects" it and tries again. For an mcp host, this means you might see a tiny bit of jitter in how long it takes to sign a request.</p><pre><code class="language-python"># Using Dilithium2 which is the core algorithm for the ML-DSA-44 standard # This library implements the FIPS 204 compatible logic for module-lattices from pqcrypto.sign import dilithium2 def verify_mcp_host(message, signature, public_key): try: # this is where the ml-dsa magic happens is_valid = dilithium2.verify(public_key, signature, message) if is_valid: print("host is legit, sharing context...") return True except Exception as e: print(f"auth failed: {e}") return False </code></pre><blockquote> <p>A 2023 paper in Cryptography points out that while these signatures are bigger, they actually run faster on cpu cycles than rsa—usually under 30ms for a full verify.</p> </blockquote><h2>Performance trade-offs and real-world issues</h2><p>Look, nobody likes a slow api, but switching to quantum-resistant auth isn't exactly free. The biggest "ouch" factor is definitely the size. For the standard ML-DSA-65 level, your public key is about 1.9kb, but the signature itself is around 3.3kb. When you add those together with other metadata, you're looking at a lot more data on the wire than old-school methods.</p><p>Lattice-based schemes are fast on the cpu, but they're heavy on the wire. If you're running a p2p mcp network with thousands of sub-second requests, that extra bandwidth starts to add up fast.</p><ul> <li><strong>Network Bloat</strong>: Moving several kilobytes of data per signature can choke low-bandwidth iot devices in a healthcare or retail setting.</li> <li><strong>CPU Wins</strong>: Even though the data is bigger, as noted earlier, the actual math is way faster than rsa, often verifying in under 5ms.</li> <li><strong>Hardware needs</strong>: For high-traffic mcp hosts, you might need dedicated acceleration just to handle the packet overhead without spiking your latency.</li> </ul><p><img decoding="async" src="https://cdn.pseo.one/685d00d4cb08ab5f5934b924/690c83ae1ca595b8c6f91e0f/lattice-based-signature-schemes-mcp-host-authentication/mermaid-diagram-3.svg" alt="Diagram 3"></p><p>You don't just flip a switch on this stuff. Most folks start with a <strong>hybrid mode</strong> where you use both classical and ml-dsa signatures together. It's a "belt and suspenders" approach—if one has a bug, the other still holds the line.</p><p>Also, watch out for <strong>tool poisoning</strong>. When you update your api schemas to handle these larger keys, make sure your validation logic isn't being tricked into skipping checks. A 2024 paper by Kunal Dey and others on <a href="https://arxiv.org/abs/2410.19220">arXiv</a> suggests that using module-based variants gives us the flexibility to tune these parameters so we don't totally kill our performance while staying secure.</p><p>Anyway, it's a bit of a balancing act. You're trading some bytes for peace of mind against future quantum threats, which, honestly, feels like a fair deal.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/lattice-based-signature-schemes-for-mcp-host-authentication/" data-a2a-title="Lattice-based Signature Schemes for MCP Host Authentication"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Flattice-based-signature-schemes-for-mcp-host-authentication%2F&amp;linkname=Lattice-based%20Signature%20Schemes%20for%20MCP%20Host%20Authentication" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Flattice-based-signature-schemes-for-mcp-host-authentication%2F&amp;linkname=Lattice-based%20Signature%20Schemes%20for%20MCP%20Host%20Authentication" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Flattice-based-signature-schemes-for-mcp-host-authentication%2F&amp;linkname=Lattice-based%20Signature%20Schemes%20for%20MCP%20Host%20Authentication" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Flattice-based-signature-schemes-for-mcp-host-authentication%2F&amp;linkname=Lattice-based%20Signature%20Schemes%20for%20MCP%20Host%20Authentication" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Flattice-based-signature-schemes-for-mcp-host-authentication%2F&amp;linkname=Lattice-based%20Signature%20Schemes%20for%20MCP%20Host%20Authentication" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.gopher.security/blog">Read the Gopher Security&amp;#039;s Quantum Safety Blog</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Read the Gopher Security's Quantum Safety Blog">Read the Gopher Security's Quantum Safety Blog</a>. Read the original post at: <a href="https://www.gopher.security/blog/lattice-based-signature-schemes-mcp-host-authentication">https://www.gopher.security/blog/lattice-based-signature-schemes-mcp-host-authentication</a> </p>

‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty

  • None
  • Published date: 2026-04-21 00:00:00

None

<p>The post <a href="https://krebsonsecurity.com/2026/04/scattered-spider-member-tylerb-pleads-guilty/">‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty</a> appeared first on <a href="https://krebsonsecurity.com">Krebs on Security</a>.</p><p>A 24-year-old British national and senior member of the cybercrime group “<strong>Scattered Spider</strong>” has pleaded guilty to wire fraud conspiracy and aggravated identity theft. <strong>Tyler Robert Buchanan </strong>admitted his role in a series of text-message phishing attacks in the summer of 2022 that allowed the group to hack into at least a dozen major technology companies and steal tens of millions of dollars worth of cryptocurrency from investors.</p><p>Buchanan’s hacker handle “<strong>Tylerb</strong>” once graced a leaderboard in the English-language criminal hacking scene that tracked the most accomplished cyber thieves. Now in U.S. custody and awaiting sentencing, the Dundee, Scotland native is facing the possibility of more than 20 years in prison.</p><div id="attachment_73476" style="width: 610px" class="wp-caption aligncenter"><img fetchpriority="high" aria-describedby="caption-attachment-73476" decoding="async" class="size-full wp-image-73476" src="https://krebsonsecurity.com/wp-content/uploads/2026/04/dailymail-tylerb.png" alt="A screenshot of two photos of Buchanan that appeared in a Daily Mail story dated May 3, 2025." width="600" height="807"> <p id="caption-attachment-73476" class="wp-caption-text">Two photos published in a Daily Mail story dated May 3, 2025 show Buchanan as a child (left) and as an adult being detained by airport authorities in Spain. “M&amp;S” in this screenshot refers to Marks &amp; Spencer, a major U.K. retail chain that suffered a ransomware attack last year at the hands of Scattered Spider.</p> </div><p>Scattered Spider is the name given to a prolific English-speaking cybercrime group known for using social engineering tactics to break into companies and steal data for ransom, often impersonating employees or contractors to deceive IT help desks into granting access.</p><p>As part of his guilty plea, Buchanan admitted conspiring with other Scattered Spider members to launch tens of thousands of SMS-based phishing attacks in 2022 that led to intrusions at a number of technology companies, including Twilio, LastPass, DoorDash, and Mailchimp.</p><p>The group then used data stolen in those breaches to carry out <a href="https://krebsonsecurity.com/category/sim-swapping/" rel="noopener">SIM-swapping attacks</a> that siphoned funds from individual cryptocurrency investors. In an unauthorized SIM-swap, crooks transfer the target’s phone number to a device they control and intercept any text messages or phone calls to the victim’s device — such as one-time passcodes for authentication and password reset links sent via SMS. The U.S. Justice Department <a href="https://www.justice.gov/usao-cdca/pr/british-national-pleads-guilty-hacking-companies-and-stealing-least-8-million-virtual" rel="noopener">said</a> Buchanan admitted to stealing at least $8 million in virtual currency from individual victims throughout the United States.<span id="more-73470"></span></p><p>FBI investigators tied Buchanan to the 2022 SMS phishing attacks after discovering the same username and email address was used to register numerous phishing domains seen in the campaign. The domain registrar <strong>NameCheap</strong> found that less than a month before the phishing spree, the account that registered those domains logged in from an Internet address in the U.K. FBI investigators said the Scottish police told them the address was leased to Buchanan throughout 2022.</p><p>As <a href="https://krebsonsecurity.com/2024/06/alleged-boss-of-scattered-spider-hacking-group-arrested/" rel="noopener">first reported</a> by KrebsOnSecurity, Buchanan fled the United Kingdom in February 2023, after a rival cybercrime gang hired thugs to invade his home, assault his mother, and threaten to burn him with a blowtorch unless he gave up the keys to his cryptocurrency wallet. That same year, U.K. investigators found a device at Buchanan’s Scotland residence that included data stolen from SMS phishing victims and seed phrases from cryptocurrency theft victims.</p><p>Buchanan was <a href="https://krebsonsecurity.com/2025/04/alleged-scattered-spider-member-extradited-to-u-s/" rel="noopener">arrested by Spanish authorities in June 2024</a> while trying to board a flight to Italy. He was extradited to the United States and has remained in U.S. federal custody since April 2025.</p><p>Buchanan is the second known Scattered Spider member to plead guilty. <strong>Noah Michael Urban</strong>, 21, of Palm Coast, Fla., was <a href="https://krebsonsecurity.com/2025/08/sim-swapper-scattered-spider-hacker-gets-10-years/" rel="noopener">sentenced to 10 years in federal prison last year</a> and ordered to pay $13 million in restitution. Three other alleged co-conspirators — <strong>Ahmed Hossam Eldin Elbadawy</strong>, 24, a.k.a. “AD,” of College Station, Texas; <strong>Evans Onyeaka Osiebo</strong>, 21, of Dallas, Texas; and <strong>Joel Martin Evans</strong>, 26, a.k.a. “joeleoli,” of Jacksonville, North Carolina – still face criminal charges.</p><p>Two other alleged Scattered Spider members will soon be tried in the United Kingdom. <strong>Owen Flowers</strong>, 18, and <strong>Thalha Jubair</strong>, 20, are <a href="https://krebsonsecurity.com/2025/09/feds-tie-scattered-spider-duo-to-115m-in-ransoms/" rel="noopener">facing charges</a> related to the hacking and extortion of several large U.K. retailers, the London transit system, and healthcare providers in the United States. Both have pleaded not guilty, and their trial is slated to begin in June.</p><p>Investigators say the Scattered Spider suspects are part of <a href="https://krebsonsecurity.com/2024/09/the-dark-nexus-between-harm-groups-and-the-com/" rel="noopener">a sprawling cybercriminal community online</a> known as “<strong>The Com</strong>,” wherein hackers from different cliques boast publicly on Telegram and Discord about high-profile cyber thefts that almost invariably begin with social engineering — tricking people over the phone, email or SMS into giving away credentials that allow remote access to corporate internal networks.</p><p>One of the more popular SIM-swapping channels on Telegram has long maintained a leaderboard of the most rapacious SIM-swappers, indexed by their supposed conquests in stealing cryptocurrency. That leaderboard previously listed Buchanan’s hacker alias Tylerb at #65 (out of 100 hackers), with Urban’s moniker “Sosa” coming in at #24.</p><p>Buchanan’s sentencing hearing is scheduled for August 21, 2026. According to the Justice Department, he faces a statutory maximum sentence of 22 years in federal prison. However, any sentence the judge hands down in this case may be significantly tempered by a number of mitigating factors in the U.S. Sentencing Guidelines, including the defendant’s age, criminal history, time already served in U.S. custody, and the degree to which they cooperated with federal authorities.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/scattered-spider-member-tylerb-pleads-guilty/" data-a2a-title="‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fscattered-spider-member-tylerb-pleads-guilty%2F&amp;linkname=%E2%80%98Scattered%20Spider%E2%80%99%20Member%20%E2%80%98Tylerb%E2%80%99%20Pleads%20Guilty" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fscattered-spider-member-tylerb-pleads-guilty%2F&amp;linkname=%E2%80%98Scattered%20Spider%E2%80%99%20Member%20%E2%80%98Tylerb%E2%80%99%20Pleads%20Guilty" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fscattered-spider-member-tylerb-pleads-guilty%2F&amp;linkname=%E2%80%98Scattered%20Spider%E2%80%99%20Member%20%E2%80%98Tylerb%E2%80%99%20Pleads%20Guilty" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fscattered-spider-member-tylerb-pleads-guilty%2F&amp;linkname=%E2%80%98Scattered%20Spider%E2%80%99%20Member%20%E2%80%98Tylerb%E2%80%99%20Pleads%20Guilty" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fscattered-spider-member-tylerb-pleads-guilty%2F&amp;linkname=%E2%80%98Scattered%20Spider%E2%80%99%20Member%20%E2%80%98Tylerb%E2%80%99%20Pleads%20Guilty" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://krebsonsecurity.com">Krebs on Security</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by BrianKrebs">BrianKrebs</a>. Read the original post at: <a href="https://krebsonsecurity.com/2026/04/scattered-spider-member-tylerb-pleads-guilty/">https://krebsonsecurity.com/2026/04/scattered-spider-member-tylerb-pleads-guilty/</a> </p>

Oracle April 2026 Critical Patch Update Addresses 241 CVEs

  • None
  • Published date: 2026-04-21 00:00:00

None

<p>The post <a href="https://www.tenable.com/blog/oracle-april-2026-critical-patch-update-addresses-241-cves">Oracle April 2026 Critical Patch Update Addresses 241 CVEs</a> appeared first on <a href="https://www.tenable.com/">Tenable Blog</a>.</p><div morss_own_score="2.473469387755102" morss_score="38.554761763568024"> <p><strong>Oracle addresses 241 CVEs in its second quarterly update of 2026 with 481 patches, including 34 critical updates.</strong></p> <h2>Key takeaways:</h2> <ol> <li>The second Critical Patch Update (CPU) for 2026 contains fixes for 241 unique CVEs in 481 security updates<br> </li> <li>34 issues (7.1% of all patches) were assigned a critical severity rating<br> </li> <li>Oracle Communications received the highest number of patches at 139, accounting for 28.9% of all patches<br> </li> </ol> <h2>Background</h2> <p>On April 21, Oracle released its <a href="https://www.oracle.com/security-alerts/cpuapr2026.html"><u>Critical Patch Update (CPU) for April 2026</u></a>, the second quarterly update of the year. This CPU contains fixes for 241 unique CVEs in 481 security updates across 28 Oracle product families. Out of the 481 security updates published this quarter, 7.1% of patches were assigned a critical severity. High severity patches accounted for the bulk of security patches at 45.9%, followed by medium severity patches at 44.1%.</p> <p>This quarter’s update includes 34 critical patches across 22 CVEs.</p> <table> <thead> <tr> <th><strong>Severity</strong></th> <th><strong>Issues Patched</strong></th> <th><strong>CVEs</strong></th> </tr> </thead> <tbody> <tr> <td>Critical</td> <td>34</td> <td>22</td> </tr> <tr> <td>High</td> <td>221</td> <td>99</td> </tr> <tr> <td>Medium</td> <td>212</td> <td>107</td> </tr> <tr> <td>Low</td> <td>14</td> <td>13</td> </tr> <tr> <td><strong>Total</strong></td> <td><strong>481</strong></td> <td><strong>241</strong></td> </tr> </tbody> </table> <h2>Analysis</h2> <p>This quarter, the Oracle Communications product family contained the highest number of patches at 139, accounting for 28.9% of the total patches, followed by Oracle Financial Services Applications at 75 patches, which accounted for 15.6% of the total patches.</p> <p>A full breakdown of the patches for this quarter can be seen in the following table, which also includes a count of vulnerabilities that can be exploited over a network without authentication.</p> <table> <thead> <tr> <th><strong>Oracle Product Family</strong></th> <th><strong>Number of Patches</strong></th> <th><strong>Remote Exploit without Auth</strong></th> </tr> </thead> <tbody> <tr> <td>Oracle Communications</td> <td>139</td> <td>93</td> </tr> <tr> <td>Oracle Financial Services Applications</td> <td>75</td> <td>59</td> </tr> <tr> <td>Oracle Fusion Middleware</td> <td>59</td> <td>46</td> </tr> <tr> <td>Oracle MySQL</td> <td>34</td> <td>3</td> </tr> <tr> <td>Oracle PeopleSoft</td> <td>21</td> <td>7</td> </tr> <tr> <td>Oracle E-Business Suite</td> <td>18</td> <td>8</td> </tr> <tr> <td>Oracle Analytics</td> <td>15</td> <td>11</td> </tr> <tr> <td>Oracle Retail Applications</td> <td>15</td> <td>15</td> </tr> <tr> <td>Oracle Siebel CRM</td> <td>14</td> <td>13</td> </tr> <tr> <td>Oracle Java SE</td> <td>11</td> <td>7</td> </tr> <tr> <td>Oracle GoldenGate</td> <td>10</td> <td>7</td> </tr> <tr> <td>Oracle Enterprise Manager</td> <td>9</td> <td>8</td> </tr> <tr> <td>Oracle Virtualization</td> <td>9</td> <td>1</td> </tr> <tr> <td>Oracle Database Server</td> <td>8</td> <td>4</td> </tr> <tr> <td>Oracle Utilities Applications</td> <td>7</td> <td>6</td> </tr> <tr> <td>Oracle Hyperion</td> <td>6</td> <td>4</td> </tr> <tr> <td>Oracle Construction and Engineering</td> <td>4</td> <td>3</td> </tr> <tr> <td>Oracle Life Science Applications</td> <td>4</td> <td>3</td> </tr> <tr> <td>Oracle Supply Chain</td> <td>4</td> <td>2</td> </tr> <tr> <td>Oracle Blockchain Platform</td> <td>3</td> <td>2</td> </tr> <tr> <td>Oracle Commerce</td> <td>3</td> <td>2</td> </tr> <tr> <td>Oracle JD Edwards</td> <td>3</td> <td>3</td> </tr> <tr> <td>Oracle Adapter for Eclipse RDF4J</td> <td>2</td> <td>2</td> </tr> <tr> <td>Oracle Autonomous Health Framework</td> <td>2</td> <td>1</td> </tr> <tr> <td>Oracle REST Data Services</td> <td>2</td> <td>2</td> </tr> <tr> <td>Oracle Systems</td> <td>2</td> <td>1</td> </tr> <tr> <td>Oracle TimesTen In-Memory Database</td> <td>1</td> <td>1</td> </tr> <tr> <td>Oracle Hospitality Applications</td> <td>1</td> <td>1</td> </tr> </tbody> </table> <h2>Solution</h2> <p>Customers are advised to apply all relevant patches in this quarter’s CPU. Please refer to the <a href="https://www.oracle.com/security-alerts/cpuapr2026.html"><u>April 2026 advisory</u></a> for full details.</p> <h2>Identifying affected systems</h2> <p>A list of Tenable plugins to identify these vulnerabilities will appear <a href="https://www.tenable.com/plugins/search?q=%22%28April+2026+CPU%29%22&amp;sort=&amp;page=1"><u>here</u></a> as they’re released. This link uses a search filter to ensure that all matching plugin coverage will appear as it is released.</p> <h3>Get more information</h3> <p><em><strong>Join</strong></em> <em><strong>on Tenable Connect for further discussions on the latest cyber threats.</strong></em></p> <p><em><strong>Learn more about</strong></em> <em><strong>, the Exposure Management Platform for the modern attack surface.</strong></em></p> </div><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/oracle-april-2026-critical-patch-update-addresses-241-cves/" data-a2a-title="Oracle April 2026 Critical Patch Update Addresses 241 CVEs"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Foracle-april-2026-critical-patch-update-addresses-241-cves%2F&amp;linkname=Oracle%20April%202026%20Critical%20Patch%20Update%20Addresses%20241%20CVEs" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Foracle-april-2026-critical-patch-update-addresses-241-cves%2F&amp;linkname=Oracle%20April%202026%20Critical%20Patch%20Update%20Addresses%20241%20CVEs" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Foracle-april-2026-critical-patch-update-addresses-241-cves%2F&amp;linkname=Oracle%20April%202026%20Critical%20Patch%20Update%20Addresses%20241%20CVEs" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Foracle-april-2026-critical-patch-update-addresses-241-cves%2F&amp;linkname=Oracle%20April%202026%20Critical%20Patch%20Update%20Addresses%20241%20CVEs" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Foracle-april-2026-critical-patch-update-addresses-241-cves%2F&amp;linkname=Oracle%20April%202026%20Critical%20Patch%20Update%20Addresses%20241%20CVEs" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.tenable.com/">Tenable Blog</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Research Special Operations">Research Special Operations</a>. Read the original post at: <a href="https://www.tenable.com/blog/oracle-april-2026-critical-patch-update-addresses-241-cves">https://www.tenable.com/blog/oracle-april-2026-critical-patch-update-addresses-241-cves</a> </p>

DLP That Doesn’t Make You Choose: Introducing Menlo AI Adaptive DLP – Blog | Menlo Security

  • None
  • Published date: 2026-04-21 00:00:00

None

<p>The post <a href="https://www.menlosecurity.com/blog/dlp-that-doesnt-make-you-choose-introducing-menlo-ai-adaptive-dlp">DLP That Doesn't Make You Choose: Introducing Menlo AI Adaptive DLP – Blog | Menlo Security</a> appeared first on <a href="https://www.menlosecurity.com">Menlo Security Blog</a>.</p><p>Blog Announcing Menlo AI Adaptive DLP – AI-based sensitive data detection and masking. File delivery rather than blocking. Cloud-based, zero endpoint footprint.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/dlp-that-doesnt-make-you-choose-introducing-menlo-ai-adaptive-dlp-blog-menlo-security/" data-a2a-title="DLP That Doesn’t Make You Choose: Introducing Menlo AI Adaptive DLP – Blog | Menlo Security"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fdlp-that-doesnt-make-you-choose-introducing-menlo-ai-adaptive-dlp-blog-menlo-security%2F&amp;linkname=DLP%20That%20Doesn%E2%80%99t%20Make%20You%20Choose%3A%20Introducing%20Menlo%20AI%20Adaptive%20DLP%20%E2%80%93%20Blog%20%7C%20Menlo%20Security" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fdlp-that-doesnt-make-you-choose-introducing-menlo-ai-adaptive-dlp-blog-menlo-security%2F&amp;linkname=DLP%20That%20Doesn%E2%80%99t%20Make%20You%20Choose%3A%20Introducing%20Menlo%20AI%20Adaptive%20DLP%20%E2%80%93%20Blog%20%7C%20Menlo%20Security" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fdlp-that-doesnt-make-you-choose-introducing-menlo-ai-adaptive-dlp-blog-menlo-security%2F&amp;linkname=DLP%20That%20Doesn%E2%80%99t%20Make%20You%20Choose%3A%20Introducing%20Menlo%20AI%20Adaptive%20DLP%20%E2%80%93%20Blog%20%7C%20Menlo%20Security" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fdlp-that-doesnt-make-you-choose-introducing-menlo-ai-adaptive-dlp-blog-menlo-security%2F&amp;linkname=DLP%20That%20Doesn%E2%80%99t%20Make%20You%20Choose%3A%20Introducing%20Menlo%20AI%20Adaptive%20DLP%20%E2%80%93%20Blog%20%7C%20Menlo%20Security" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fdlp-that-doesnt-make-you-choose-introducing-menlo-ai-adaptive-dlp-blog-menlo-security%2F&amp;linkname=DLP%20That%20Doesn%E2%80%99t%20Make%20You%20Choose%3A%20Introducing%20Menlo%20AI%20Adaptive%20DLP%20%E2%80%93%20Blog%20%7C%20Menlo%20Security" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.menlosecurity.com">Menlo Security Blog</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Menlo Security Blog">Menlo Security Blog</a>. Read the original post at: <a href="https://www.menlosecurity.com/blog/dlp-that-doesnt-make-you-choose-introducing-menlo-ai-adaptive-dlp">https://www.menlosecurity.com/blog/dlp-that-doesnt-make-you-choose-introducing-menlo-ai-adaptive-dlp</a> </p>