Technology

Related News

Taming Network Policy Sprawl with AI

  • Alan Shimel
  • Published date: 2026-04-14 00:00:00

None

<div style="padding: 56.25% 0 0 0; position: relative;"><iframe style="position: absolute; top: 0; left: 0; width: 100%; height: 100%;" title="Taming Network Policy Sprawl with AI" src="https://player.vimeo.com/video/1177392110?badge=0&amp;autopause=0&amp;player_id=0&amp;app_id=58479" frameborder="0"></iframe></div><p><script src="https://player.vimeo.com/api/player.js"></script></p><p>Zero-trust and micro-segmentation have become the default direction for enterprise network security, and for good reason. But the shift has introduced an operational problem that few organizations were ready for: an explosion of fragmented rules, overlapping policies and billions of complex access paths that no human team can realistically manage on its own.</p><p>Alan Shimel and Jody Brazil, CEO of FireMon, get into the messy reality of what network security policy management looks like at scale today. Brazil has been working in this space for years and describes how the move toward more granular access controls, while correct from a security standpoint, has created an administrative burden that is growing faster than most teams can keep up with. Every new segmentation rule, every zero trust policy adjustment and every cloud migration adds layers of complexity that compound over time.</p><p>The practical challenge is not just writing policies but understanding what they actually do in aggregate. When an enterprise has thousands of rules spread across firewalls, cloud environments and hybrid infrastructure, the interactions between those rules create access paths that are nearly impossible to audit manually. A single misconfigured rule can quietly open a path that undermines an otherwise well-designed security posture, and finding it without automation is like searching for a needle in a haystack made of other needles.</p><p>Brazil makes the case that AI-driven analytics are becoming essential for bringing order back to this sprawl, not by replacing security teams but by giving them the ability to actually see and reason about the full scope of their policy landscape. For security practitioners dealing with policy complexity that has outgrown their tooling, this is a grounded look at where the problem stands and what it takes to regain control.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/taming-network-policy-sprawl-with-ai/" data-a2a-title="Taming Network Policy Sprawl with AI"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Ftaming-network-policy-sprawl-with-ai%2F&amp;linkname=Taming%20Network%20Policy%20Sprawl%20with%20AI" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Ftaming-network-policy-sprawl-with-ai%2F&amp;linkname=Taming%20Network%20Policy%20Sprawl%20with%20AI" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Ftaming-network-policy-sprawl-with-ai%2F&amp;linkname=Taming%20Network%20Policy%20Sprawl%20with%20AI" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Ftaming-network-policy-sprawl-with-ai%2F&amp;linkname=Taming%20Network%20Policy%20Sprawl%20with%20AI" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Ftaming-network-policy-sprawl-with-ai%2F&amp;linkname=Taming%20Network%20Policy%20Sprawl%20with%20AI" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>

How Geordie AI Shocked RSAC to Win Innovation Sandbox

  • Alan Shimel
  • Published date: 2026-04-14 00:00:00

None

<div style="padding: 56.25% 0 0 0; position: relative;"><iframe style="position: absolute; top: 0; left: 0; width: 100%; height: 100%;" title="How Geordie AI Shocked RSAC to Win Innovation Sandbox" src="https://player.vimeo.com/video/1177109460?badge=0&amp;autopause=0&amp;player_id=0&amp;app_id=58479" frameborder="0"></iframe></div><p><script src="https://player.vimeo.com/api/player.js"></script></p><p>The RSAC Innovation Sandbox has long been one of the most watched competitions in cybersecurity, and this year’s winner caught much of the industry off guard. Alan Shimel sits down with Henry Comfort, CEO of Geordie AI, to talk about how a startup that was buying laptops just a year ago ended up taking the crown at the industry’s most prestigious launchpad.</p><p>Comfort’s path to cybersecurity was anything but conventional. Before founding Geordie AI, he ran operations for a UK football club and helped lead Darktrace through its hypergrowth phase. That experience across very different environments shaped his view of what enterprises actually need as they adopt AI at scale. The core problem he keeps seeing is a lack of visibility. Organizations are deploying AI agents and agentic workflows faster than their security teams can track, creating blind spots that traditional tools were never built to address.</p><p>The gap Comfort describes sits between two camps that have dominated the enterprise AI conversation. On one side are organizations that refuse to touch AI out of fear. On the other are those racing ahead without adequate guardrails. Most companies fall somewhere in the middle, wanting to move forward but lacking the ability to see what their AI systems are actually doing across the organization. Giving security teams that visibility and control over rapidly expanding agentic footprints is where Comfort sees the most urgent need.</p><p>For security leaders trying to get ahead of the governance challenge that agentic AI is creating, the Innovation Sandbox result signals where the industry thinks the next wave of critical investment needs to go.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/how-geordie-ai-shocked-rsac-to-win-innovation-sandbox/" data-a2a-title="How Geordie AI Shocked RSAC to Win Innovation Sandbox"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fhow-geordie-ai-shocked-rsac-to-win-innovation-sandbox%2F&amp;linkname=How%20Geordie%20AI%20Shocked%20RSAC%20to%20Win%20Innovation%20Sandbox" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fhow-geordie-ai-shocked-rsac-to-win-innovation-sandbox%2F&amp;linkname=How%20Geordie%20AI%20Shocked%20RSAC%20to%20Win%20Innovation%20Sandbox" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fhow-geordie-ai-shocked-rsac-to-win-innovation-sandbox%2F&amp;linkname=How%20Geordie%20AI%20Shocked%20RSAC%20to%20Win%20Innovation%20Sandbox" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fhow-geordie-ai-shocked-rsac-to-win-innovation-sandbox%2F&amp;linkname=How%20Geordie%20AI%20Shocked%20RSAC%20to%20Win%20Innovation%20Sandbox" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fhow-geordie-ai-shocked-rsac-to-win-innovation-sandbox%2F&amp;linkname=How%20Geordie%20AI%20Shocked%20RSAC%20to%20Win%20Innovation%20Sandbox" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>

How to Set Up BigCommerce DKIM and SPF Record 2026

  • None
  • Published date: 2026-04-14 00:00:00

None

<p>Originally published at <a href="https://easydmarc.com/blog/how-to-set-up-bigcommerce-dkim-and-spf-record-2026/">How to Set Up BigCommerce DKIM and SPF Record 2026</a> by <a href="https://easydmarc.com/blog/author/nshan/">Nshan Manoukian</a>.</p><p>Most BigCommerce store owners put time and effort into optimizing product pages, checkout flows, ad campaigns, etc., hardly giving any thought to whether the emails are actually being ‘delivered’ to the recipients’ primary inboxes. Order confirmations, shipping updates, abandoned-cart reminders, and password resets are all sent automatically, and most people assume they’ll land in the customer’s inbox by default.</p><p>However, the truth is a bit different and technical. </p><p>Inbox providers now treat unauthenticated emails with suspicion, especially those from e-commerce brands. So, if your domain lacks BigCommerce SPF and DKIM records, your emails may still be “sent” from BigCommerce, but they’re far more likely to be filtered, delayed, or ignored entirely by receiving servers.</p><p>This guide covers setting up SPF and DKIM for BigCommerce. But first, it’s important to understand why your domain requires <a href="https://easydmarc.com/blog/email-authentication-what-it-is-and-why-it-matters/">email authentication</a>.</p><h2 class="wp-block-heading" id="h-why-bigcommerce-stores-need-spf-and-dkim"><strong>Why BigCommerce Stores Need SPF and DKIM?</strong></h2><p>Here’s why BigCommerce SPF and BigCommerce DKIM are no longer optional in 2026.</p><h3 class="wp-block-heading" id="h-inbox-providers-no-longer-trust-unauthenticated-emails"><strong>Inbox Providers No Longer Trust Unauthenticated Emails</strong></h3><p>Email providers like Gmail, Outlook, and Yahoo now heavily rely on authentication to decide whether an email deserves to reach the inbox. If your store doesn’t have a valid BigCommerce SPF record or <a href="https://easydmarc.com/blog/what-is-a-dkim-signature/">DKIM signature</a>, your emails are automatically treated as “high risk.” This directly affects order confirmations, password reset emails, shipping updates, and marketing campaigns.</p><h3 class="wp-block-heading" id="h-e-commerce-brands-are-prime-targets-for-spoofing"><strong>E-commerce Brands Are Prime Targets for Spoofing</strong></h3><p>BigCommerce stores are especially attractive to attackers because they send high-value transactional emails that customers already expect and trust. If your domain lacks SPF and DKIM, it becomes easy for someone else to impersonate your brand and send phishing emails that look completely legitimate. Attackers commonly use this to send fake refund or invoice emails, share malicious payment links, or impersonate your support or billing team.</p><p>The real danger is that customers usually can’t tell the difference. If an email looks like it came from your store, they’re far more likely to click without thinking twice.</p><h3 class="wp-block-heading" id="h-revenue-depends-on-email-deliverability"><strong>Revenue Depends on Email Deliverability</strong></h3><p>For most BigCommerce stores, a significant portion of revenue is driven by automated emails, such as abandoned-cart reminders, promotions, and post-purchase flows. These messages are meant to reach customers at high-intent moments.</p><p>If those emails don’t land in the inbox, they simply don’t perform. When SPF and DKIM are missing or misconfigured, inbox providers treat your emails as less trustworthy, increasing the chances of them being filtered, delayed, or sent to spam.</p><h2 class="wp-block-heading" id="h-the-process-of-configuring-spf"><strong>The Process of Configuring SPF</strong></h2><ol class="wp-block-list"> <li>Access your DNS management dashboard.</li> <li>Under ‘Tools &amp; Settings’, choose ‘DNS Template’.</li> <li>Modify the DNS TXT record related to SPF.</li> </ol><p>For BigCommerce, the syntax of the SPF TXT record is: mydomain.com TXT v=spf1 include:_spf.bigcommerce.com -all</p><p>You should add this record to the DNS records section of the appropriate domain.</p><figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="1024" height="257" src="https://easydmarc.com/blog/wp-content/uploads/2026/04/image-11-1024x257.png" alt="" class="wp-image-60784" srcset="https://easydmarc.com/blog/wp-content/uploads/2026/04/image-11-1024x257.png 1024w, https://easydmarc.com/blog/wp-content/uploads/2026/04/image-11-300x75.png 300w, https://easydmarc.com/blog/wp-content/uploads/2026/04/image-11-768x193.png 768w, https://easydmarc.com/blog/wp-content/uploads/2026/04/image-11-1536x386.png 1536w, https://easydmarc.com/blog/wp-content/uploads/2026/04/image-11-1200x302.png 1200w, https://easydmarc.com/blog/wp-content/uploads/2026/04/image-11.png 1600w" sizes="(max-width: 1024px) 100vw, 1024px"></figure><p>If you are already using a third party’s SPF record, you need to include the new one. </p><p>Example: v=spf1 include:example.com include:_spf.bigcommerce.com -all</p><p><strong>Important Note</strong>: Each domain must have only one SPF TXT Record. If you have multiple SPF Records, SPF will return a PermError.</p><p>Lastly, save the adjustment and give your DNS up to 72 hours to reflect the changes.</p><h2 class="wp-block-heading" id="h-how-to-verify-spf-for-bigcommerce"><strong>How to Verify SPF for BigCommerce?</strong></h2><p>Setting up SPF is not a one-time task. You also need to check from time to time whether it’s actually working, especially after switching email tools, updating DNS, or adding new sending services. The easiest way to do this is by using online lookup tools that read your domain’s DNS records and show whether authentication is correctly set up.</p><p>For SPF, you can use the <a href="https://easydmarc.com/tools/spf-lookup">EasyDMARC SPF Lookup tool</a>. Just enter your domain name, and it will tell you:</p><ul class="wp-block-list"> <li>Which servers are allowed to send emails</li> </ul><ul class="wp-block-list"> <li>Whether your SPF record has any errors</li> </ul><ul class="wp-block-list"> <li>If your record is too long or close to technical limits</li> </ul><p>This helps you quickly spot missing services or broken configurations that could affect delivery.</p><h2 class="wp-block-heading" id="h-common-spf-issues-in-bigcommerce"><strong>Common SPF Issues in BigCommerce</strong></h2><p>At times, despite being careful, small mistakes can quietly disrupt email delivery. Here are some common SPF issues encountered in BigCommerce and how to fix them.</p><h3 class="wp-block-heading" id="h-existence-of-multiple-spf-records"><strong>Existence of Multiple SPF Records</strong></h3><p>One of the most frequent mistakes is having more than one SPF record for the same domain. This usually happens when different tools or developers add their own records separately.</p><p>Inbox providers only read one SPF record per domain. If multiple records exist, SPF fails automatically, even if all information is correct.</p><p>To fix it, merge everything into a single record. All sending services should be listed under a single v=spf1 entry rather than spread across multiple records.</p><h3 class="wp-block-heading" id="h-missing-email-services"><strong>Missing Email Services</strong></h3><p>Many BigCommerce stores use third-party tools, such as marketing platforms, CRMs, or support systems, to send emails. If these services are not included in SPF, their emails will fail authentication. This often happens after adding a new tool and forgetting to update the DNS.</p><p>So, fix it by listing all platforms that send emails on your behalf, and ensure each is included in your SPF record using include or IP mechanisms.</p><h3 class="wp-block-heading" id="h-exceeding-the-10-dns-lookup-limit"><strong>Exceeding the 10 DNS Lookup Limit</strong></h3><p>SPF allows a maximum of 10 DNS lookups. Large BigCommerce setups with multiple tools often cross this limit without realizing it, especially when several platforms are chained together using include statements.</p><p>When this happens, inbox providers stop checking and treat SPF as a failure, even if all sending services are technically valid. You can resolve this BigCommerce SPF record misconfiguration using an SPF flattener that replaces multiple ‘include’ statements with direct IP addresses. This reduces DNS lookups and keeps your record within technical limits while maintaining proper authorization.</p><h2 class="wp-block-heading" id="h-setting-up-dkim"><strong>Setting up DKIM</strong></h2><p>At the moment, BigCommerce doesn’t directly support DKIM signing. Nevertheless, BigCommerce allows you to route your emails through a DKIM-enabled system, allowing you to authenticate them with DKIM keys. For more specifics on this process, please reach out to the <a href="https://support.bigcommerce.com/apex/SupportLiveAgentPreChatPage?endpoint=https%3A%2F%2Fsupport.bigcommerce.com%2Fapex%2FSupportLiveAgentChatPage%3Flanguage%3D%26org_id%3D00D30000001FDCG%26deployment_id%3D572a0000000H7DJ%26sid%3D74bdb9fb-483b-4003-b789-d57e86ea4094%23deployment_id%3D572a0000000H7DJ%26org_id%3D00D30000001FDCG%26button_id%3D573a00000008j2D%26session_id%3D74bdb9fb-483b-4003-b789-d57e86ea4094">BigCommerce support team</a>.</p><p><strong>Important Note</strong>: If the provider recommends publishing a DMARC record, there’s no need to do so if you already have a DMARC record in place, as each domain can only have one DMARC record.</p><h2 class="wp-block-heading" id="h-wrapping-up-make-your-bigcommerce-emails-trusted"><strong>Wrapping Up: Make Your BigCommerce Emails Trusted</strong></h2><p>SPF and DKIM are no longer “nice to have” for BigCommerce stores; they are basic requirements for email trust. A properly configured SPF record ensures only authorized senders are allowed to send email from your domain. DKIM adds an extra layer of trust by confirming that your emails are real and haven’t been changed in transit. </p><p>So, <a href="https://uac.easydmarc.com/realms/easydmarc/protocol/openid-connect/registrations?client_id=dmarc-app&amp;response_type=code&amp;scope=openid+email&amp;redirect_uri=https%3A%2F%2Fapp.easydmarc.com%2Flogin%2Fcallback&amp;ui_locales=US&amp;utm_source=&amp;state=eyJ1c2VySXAiOiIyNDA2OmI0MDA6NzI6YWNkMjozMDQxOjVmOWI6OGMwOTozNWFhIiwiZ29VcmwiOiIiLCJsb2dpbk9wdGlvbnMiOnt9fQ%3D%3D">try EasyDMARC</a> to monitor, verify, and strengthen your email authentication setup and help your emails reach the inbox, protect your brand from being impersonated, and keep customer communication consistent and reliable.</p><h2 class="wp-block-heading" id="h-frequently-asked-questions"><strong>Frequently Asked Questions</strong></h2><h3 class="wp-block-heading" id="h-does-bigcommerce-provide-built-in-spf-and-dkim"><strong>Does BigCommerce Provide Built In SPF and DKIM?</strong></h3><p>BigCommerce provides basic SPF support, but it does not offer full DKIM signing by default. Most stores need third-party email services to properly authenticate emails.</p><h3 class="wp-block-heading" id="h-can-i-use-third-party-email-services-with-bigcommerce"><strong>Can I Use Third-Party Email Services With BigCommerce?</strong></h3><p>Yes, you can use services like marketing or support tools with BigCommerce. You just need to add their SPF and DKIM records to your domain. While you do so, make sure you don’t exceed the DNS lookup limit of 10.</p><h3 class="wp-block-heading" id="h-what-happens-if-bigcommerce-spf-or-dkim-is-not-set-up"><strong>What Happens If BigCommerce SPF or DKIM Is Not Set Up?</strong></h3><p>Your emails may go to spam or fail completely. Customers might not receive important messages, such as order updates or password resets. This can hamper delivery and customer support, ultimately tarnishing your brand image. </p><h3 class="wp-block-heading" id="h-how-long-does-spf-and-dkim-changes-take-to-apply"><strong>How Long Does SPF and DKIM Changes Take to Apply?</strong></h3><p>SPF and DKIM changes usually take a few minutes to a few hours. In some cases, DNS updates can take up to 48 hours. During this time, email delivery may remain inconsistent.</p><p>The post <a href="https://easydmarc.com/blog/how-to-set-up-bigcommerce-dkim-and-spf-record-2026/">How to Set Up BigCommerce DKIM and SPF Record 2026</a> appeared first on <a href="https://easydmarc.com/blog">EasyDMARC</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/how-to-set-up-bigcommerce-dkim-and-spf-record-2026/" data-a2a-title="How to Set Up BigCommerce DKIM and SPF Record 2026"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fhow-to-set-up-bigcommerce-dkim-and-spf-record-2026%2F&amp;linkname=How%20to%20Set%20Up%20BigCommerce%20DKIM%20and%20SPF%20Record%202026" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fhow-to-set-up-bigcommerce-dkim-and-spf-record-2026%2F&amp;linkname=How%20to%20Set%20Up%20BigCommerce%20DKIM%20and%20SPF%20Record%202026" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fhow-to-set-up-bigcommerce-dkim-and-spf-record-2026%2F&amp;linkname=How%20to%20Set%20Up%20BigCommerce%20DKIM%20and%20SPF%20Record%202026" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fhow-to-set-up-bigcommerce-dkim-and-spf-record-2026%2F&amp;linkname=How%20to%20Set%20Up%20BigCommerce%20DKIM%20and%20SPF%20Record%202026" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fhow-to-set-up-bigcommerce-dkim-and-spf-record-2026%2F&amp;linkname=How%20to%20Set%20Up%20BigCommerce%20DKIM%20and%20SPF%20Record%202026" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://easydmarc.com/blog/">EasyDMARC</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Nshan Manoukian">Nshan Manoukian</a>. Read the original post at: <a href="https://easydmarc.com/blog/how-to-set-up-bigcommerce-dkim-and-spf-record-2026/">https://easydmarc.com/blog/how-to-set-up-bigcommerce-dkim-and-spf-record-2026/</a> </p>

The Treatment Was Successful. Unfortunately the Patient Died

  • Alan Shimel
  • Published date: 2026-04-14 00:00:00

None

<p><span style="font-weight: 400;">For the last few weeks, the cybersecurity world has been arguing about what Anthropic’s Mythos and projects like Glasswing actually mean. Some people hear the alarms and think we are watching the beginning of the end. Others think we are finally seeing the breakthrough the industry has been chasing for decades.</span></p><p><span style="font-weight: 400;">They may both be right.</span></p><p><span style="font-weight: 400;">The optimistic camp includes people I respect. In <a href="https://www.linkedin.com/pulse/beginning-end-cybersecurity-jen-easterly-ch97c" target="_blank" rel="noopener">a recent piece</a>, former CISA Director Jen Easterly argues that AI could mark the beginning of the end of cybersecurity as we know it, not because threats disappear but because software finally becomes secure by design.</span></p><p><span style="font-weight: 400;">Her argument is simple and hard to refute. Cybersecurity exists largely because we keep shipping insecure software. If AI systems can systematically discover and fix vulnerabilities, developers will eventually respond by writing better code in the first place. The endless cycle of scan, detect, patch and repeat could finally give way to resilient software.</span></p><p><span style="font-weight: 400;">In other words, cyber nirvana.</span></p><p><span style="font-weight: 400;">But there is another perspective worth listening to. Security analyst Rich Mogull <a href="https://cloudsecurityalliance.org/blog/2026/02/26/core-collapse" target="_blank" rel="noopener">describes the coming AI shockwave</a> as a kind of stellar physics event, a “core collapse” where the current model of cybersecurity compresses into something denser and stronger.</span></p><p><span style="font-weight: 400;">Stars do not quietly become neutron stars.</span></p><p><span style="font-weight: 400;">They explode first.</span></p><p><span style="font-weight: 400;">And that supernova phase is what worries me.</span></p><p><span style="font-weight: 400;"><a href="https://cloudsecurityalliance.org/blog/2026/04/08/anthropic-s-mythos-is-here-defending-from-the-vulnpocalypse" target="_blank" rel="noopener">The Cloud Security Alliance recently warned</a> about what it calls the “Vulnpocalypse,” a moment when AI systems like Mythos can systematically discover vulnerabilities across the entire software ecosystem.</span></p><p><span style="font-weight: 400;">Think about that for a second.</span></p><p><span style="font-weight: 400;">For decades, the cybersecurity industry has been constrained by human limits. Even the best vulnerability researchers could only examine so much code. Exploit development required time, skill and patience. Discovery was the bottleneck.</span></p><p><span style="font-weight: 400;">AI just removed that bottleneck.</span></p><p><span style="font-weight: 400;">Tools like Mythos change the equation. Instead of a handful of elite researchers looking for weaknesses, imagine thousands of AI agents examining software continuously. They can analyze entire codebases, identify flaws and even generate exploit paths.</span></p><p><span style="font-weight: 400;">The industry likes to frame this as a defensive breakthrough. And maybe it is. If defenders deploy these tools first, they might uncover vulnerabilities before attackers do.</span></p><p><span style="font-weight: 400;">But defenders still face the same problem they always have.</span></p><p><span style="font-weight: 400;">Finding bugs is the easy part.</span></p><p><span style="font-weight: 400;">Fixing them is the hard part.</span></p><p><span style="font-weight: 400;">Every vulnerability still has to be triaged, prioritized, patched, tested and deployed. That process takes time and coordination. In large organizations it can take weeks or months.</span></p><p><span style="font-weight: 400;">Attackers do not have that problem.</span></p><p><span style="font-weight: 400;">They only need to find one weakness and move.</span></p><p><span style="font-weight: 400;">That asymmetry has always existed. What AI does is amplify it.</span></p><p><span style="font-weight: 400;">Imagine AI systems discovering vulnerabilities across enterprise software, open source dependencies, embedded systems and infrastructure platforms at machine speed. Now imagine attackers using similar tools to turn those discoveries into automated exploits.</span></p><p><span style="font-weight: 400;">That is not a hypothetical scenario. It is the logical next step.</span></p><p><span style="font-weight: 400;">This is why Mogull’s supernova analogy resonates. In astrophysics, a star collapses when the forces that hold it together can no longer support the mass inside it. The core compresses in an instant and the outer layers explode outward.</span></p><p><span style="font-weight: 400;">Cybersecurity may be approaching a similar moment.</span></p><p><span style="font-weight: 400;">For years, the industry has built an enormous ecosystem around vulnerability discovery, patching and mitigation. Vendors sell scanners. Consultants sell testing. Enterprises build entire programs around managing flaws in software.</span></p><p><span style="font-weight: 400;">Now imagine AI discovering vulnerabilities faster than organizations can remediate them.</span></p><p><span style="font-weight: 400;">The entire system begins to wobble.</span></p><p><span style="font-weight: 400;">This is not just about enterprise risk. It is also about the cybersecurity industry itself. If software eventually becomes secure by design, a lot of today’s security tooling becomes less relevant. Whole categories of vendors exist because code is insecure.</span></p><p><span style="font-weight: 400;">If that changes, the market changes with it.</span></p><p><span style="font-weight: 400;">It would not be shocking to see the number of cybersecurity companies shrink dramatically over the next decade. Maybe by half. Maybe more.</span></p><p><span style="font-weight: 400;">But the real danger is not the long-term equilibrium. The real danger is the transition period.</span></p><p><span style="font-weight: 400;">Between today’s vulnerable software ecosystem and tomorrow’s secure code lies the Vulnpocalypse.</span></p><p><span style="font-weight: 400;">That period could look less like cyber nirvana and more like a Trail of Tears for parts of the industry. Enterprises scrambling to fix decades of accumulated vulnerabilities. Security teams drowning in findings. Attackers racing to exploit weaknesses before patches arrive.</span></p><p><span style="font-weight: 400;">In that environment, resilience becomes the only strategy that matters. Assume your code has flaws. Assume your infrastructure will be tested. Assume attackers have access to the same AI tools defenders do.</span></p><p><span style="font-weight: 400;">Because they will.</span></p><p><span style="font-weight: 400;">To be clear, I actually believe Easterly may be right about the destination. AI could eventually force the software industry to build systems that are fundamentally more secure. If vulnerability discovery becomes cheap and automatic, insecure coding practices will become unsustainable.</span></p><p><span style="font-weight: 400;">Developers will adapt. Software will improve. The ecosystem will stabilize.</span></p><p><span style="font-weight: 400;">But Mogull may also be right about the process that gets us there.</span></p><p><span style="font-weight: 400;">Stars do not quietly collapse into neutron stars.</span></p><p><span style="font-weight: 400;">They explode first.</span></p><p><span style="font-weight: 400;">And when that supernova hits the cybersecurity universe, we may discover something uncomfortable.</span></p><p><span style="font-weight: 400;">The treatment was successful.</span></p><p><span style="font-weight: 400;">Unfortunately, the patient died.</span></p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/the-treatment-was-successful-unfortunately-the-patient-died/" data-a2a-title="The Treatment Was Successful. Unfortunately the Patient Died"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fthe-treatment-was-successful-unfortunately-the-patient-died%2F&amp;linkname=The%20Treatment%20Was%20Successful.%20Unfortunately%20the%20Patient%20Died" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fthe-treatment-was-successful-unfortunately-the-patient-died%2F&amp;linkname=The%20Treatment%20Was%20Successful.%20Unfortunately%20the%20Patient%20Died" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fthe-treatment-was-successful-unfortunately-the-patient-died%2F&amp;linkname=The%20Treatment%20Was%20Successful.%20Unfortunately%20the%20Patient%20Died" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fthe-treatment-was-successful-unfortunately-the-patient-died%2F&amp;linkname=The%20Treatment%20Was%20Successful.%20Unfortunately%20the%20Patient%20Died" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fthe-treatment-was-successful-unfortunately-the-patient-died%2F&amp;linkname=The%20Treatment%20Was%20Successful.%20Unfortunately%20the%20Patient%20Died" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>

“Moment-in-Time” GRC Is Becoming Obsolete

  • Alan Shimel
  • Published date: 2026-04-14 00:00:00

None

<p><span style="font-weight: 400;">For decades, governance, risk and compliance (GRC) has largely been treated as a periodic exercise. Security and compliance teams gather evidence, fill out questionnaires, prepare documentation and assemble reports for auditors, regulators or board meetings. Once the audit cycle ends, attention shifts elsewhere until the next compliance review begins.</span></p><p><span style="font-weight: 400;">That model may have worked when IT infrastructure changed slowly and applications were updated only occasionally. In today’s world of cloud platforms, DevOps pipelines and constantly evolving software environments, however, the notion that risk can be measured accurately at a single moment in time is increasingly difficult to defend.</span></p><p><span style="font-weight: 400;">That idea sits at the center of a new TrustCloud integration with ServiceNow announced this week.</span></p><p><span style="font-weight: 400;">The company has launched a </span>native application for the ServiceNow platform<span style="font-weight: 400;">, positioning it as another step in its effort to move governance, risk and compliance away from static reporting cycles and toward continuous monitoring of enterprise risk.</span></p><h3><b>Moving Beyond Snapshot Compliance</b></h3><p><span style="font-weight: 400;">Abheer Bipin, director of product at TrustCloud, says the traditional approach to GRC simply cannot keep pace with modern software environments.</span></p><p><span style="font-weight: 400;">“The old way of looking at GRC as a moment in time, based on what a human entered into a form, is obsolete,” Bipin said during a recent conversation.</span></p><p><span style="font-weight: 400;">Historically, compliance frameworks relied on evidence collected during periodic reviews. Teams gathered documentation, completed surveys and verified that controls appeared to be operating correctly at that particular moment. The results were packaged into reports that represented the organization’s risk posture at the time the information was collected.</span></p><p><span style="font-weight: 400;">The challenge is that systems rarely remain static for long. Cloud infrastructure shifts, new code is deployed, configurations change and access permissions evolve. In highly automated environments, these changes can occur dozens or even hundreds of times per day.</span></p><p><span style="font-weight: 400;">When that happens, a risk report generated weeks or months earlier quickly loses relevance.</span></p><p><span style="font-weight: 400;">TrustCloud’s vision is to treat GRC as a continuously updated process that reflects the current state of enterprise systems rather than a historical snapshot.</span></p><h3><b>Embedding Risk Management in the Operational Platform</b></h3><p><span style="font-weight: 400;">The company’s new ServiceNow application reflects that philosophy by embedding TrustCloud’s cyber risk platform directly into operational workflows that enterprises already rely on to manage IT and security operations.</span></p><p><span style="font-weight: 400;">ServiceNow has steadily evolved into a central platform for enterprise operations, supporting IT service management, incident response, asset tracking and integrated risk management. By integrating with ServiceNow’s ITSM, IRM and configuration management database, TrustCloud can correlate operational data with security telemetry to evaluate whether controls are functioning as intended.</span></p><p><span style="font-weight: 400;">When issues are detected, remediation tasks can be automatically generated and routed through the same ServiceNow workflows organizations already use to manage infrastructure and application changes.</span></p><p><span style="font-weight: 400;">This approach effectively moves compliance monitoring into everyday operational processes rather than treating it as a separate activity performed only during audit cycles.</span></p><h3><b>AI, DevOps and Continuous Assurance</b></h3><p><span style="font-weight: 400;">The shift toward continuous GRC mirrors a transformation that already occurred in software development. DevOps practices replaced periodic testing with continuous integration and validation embedded directly into development pipelines.</span></p><p><span style="font-weight: 400;">TrustCloud sees governance and compliance evolving along a similar trajectory. Instead of relying primarily on manual evidence collection, organizations can use AI, operational telemetry and automated workflows to maintain a constantly updated view of their risk posture.</span></p><p><span style="font-weight: 400;">Humans remain central to the process, but their role increasingly shifts toward interpreting risk and making strategic decisions rather than manually assembling compliance documentation.</span></p><p><span style="font-weight: 400;">This vision also aligns closely with ServiceNow’s broader platform strategy. The company has been positioning its platform as the operational backbone of the enterprise, connecting IT operations, security operations and risk management workflows. ServiceNow is also an investor in TrustCloud, reflecting a close relationship between the two companies and their shared belief that GRC will increasingly live inside operational platforms.</span></p><h3><b>Shimmy’s Take</b></h3><p><span style="font-weight: 400;">Spend enough time talking with CISOs and one complaint comes up again and again. For all the innovation happening in cybersecurity tooling, many GRC programs still run on spreadsheets, surveys and evidence gathering exercises that feel like they belong in another decade.</span></p><p><span style="font-weight: 400;">The disconnect becomes obvious when you look at how modern infrastructure actually behaves. Cloud systems change constantly, code is deployed continuously and AI is accelerating the pace of software development even further. In that environment, a compliance report based on data collected months earlier tells you very little about your real risk posture.</span></p><p><span style="font-weight: 400;">Moving GRC into operational platforms like ServiceNow and feeding it with real-time telemetry is an attempt to close that gap. If the model works, compliance stops being a periodic reporting exercise and becomes something closer to a living system that reflects the current state of an enterprise at any given moment.</span></p><p><span style="font-weight: 400;">For an industry that has historically struggled to keep pace with the speed of modern software, that would be a meaningful step forward.</span></p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/moment-in-time-grc-is-becoming-obsolete/" data-a2a-title="“Moment-in-Time” GRC Is Becoming Obsolete"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fmoment-in-time-grc-is-becoming-obsolete%2F&amp;linkname=%E2%80%9CMoment-in-Time%E2%80%9D%20GRC%20Is%20Becoming%20Obsolete" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fmoment-in-time-grc-is-becoming-obsolete%2F&amp;linkname=%E2%80%9CMoment-in-Time%E2%80%9D%20GRC%20Is%20Becoming%20Obsolete" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fmoment-in-time-grc-is-becoming-obsolete%2F&amp;linkname=%E2%80%9CMoment-in-Time%E2%80%9D%20GRC%20Is%20Becoming%20Obsolete" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fmoment-in-time-grc-is-becoming-obsolete%2F&amp;linkname=%E2%80%9CMoment-in-Time%E2%80%9D%20GRC%20Is%20Becoming%20Obsolete" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fmoment-in-time-grc-is-becoming-obsolete%2F&amp;linkname=%E2%80%9CMoment-in-Time%E2%80%9D%20GRC%20Is%20Becoming%20Obsolete" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>

Kubernetes Is Eating Production: Why Usage Keeps Climbing Into 2026

  • None
  • Published date: 2026-04-14 00:00:00

None

<p>Kubernetes isn’t just up in 2026; it’s becoming the default foundation for production software and AI. The latest <a href="https://www.cncf.io/reports/the-cncf-annual-cloud-native-survey/">CNCF Annual Cloud Native Survey</a> shows that Kubernetes is now the backbone of production infrastructure, with 82% of container users running Kubernetes in production and 94% either running, piloting, or evaluating it. At this point, the real question for most teams isn’t whether they should use Kubernetes but how to run it safely, efficiently, and at scale without burning out in-house teams.</p><p><img fetchpriority="high" decoding="async" src="https://www.fairwinds.com/hs-fs/hubfs/Figure8-KubernetesUsage.png?width=500&amp;height=449&amp;name=Figure8-KubernetesUsage.png" width="500" height="449" alt="Figure8-KubernetesUsage" style="height: auto; max-width: 100%; width: 500px; margin-left: auto; margin-right: auto; display: block;"></p><h2>From Side Project to Core Infrastructure</h2><p>If you look at the <a href="https://www.cncf.io/reports/the-cncf-annual-cloud-native-survey/">CNCF survey data</a>, Kubernetes has clearly crossed the line from experiment to foundation. Production use climbed from about two‑thirds of container users in 2023 to four‑fifths by 2024, and cloud native techniques are now the norm for 98% of organizations.</p><p>You can see that shift inside most companies. Kubernetes isn’t the cool side project in one team anymore; it’s the essential platform under customer‑facing apps, internal systems, and an increasing number of AI services. Today, 66% of organizations are also running generative AI workloads on Kubernetes.</p><p>That curve hasn’t flattened yet and doesn’t look like it will any time soon; CNCF’s year‑over‑year data shows Kubernetes production usage and AI workloads both rising into 2025, which is why 2026 is less about whether to use Kubernetes and more about whether your platform can keep up.</p><h2>Why Kubernetes Keeps Winning</h2><p>So why does Kubernetes keep gaining traction instead of leveling off? A few big forces are at play.</p><h3>AI and ML Are Going Real‑World</h3><p>Training jobs, data processing, and especially inference are moving into production environments. The CNCF survey notes that Kubernetes is becoming the de facto orchestration layer and platform for AI as more organizations run inference workloads on clusters across clouds and on‑prem. Another <a href="https://www.devopsdigest.com/2025-state-of-production-kubernetes-ai-driving-growth-as-cost-pressures-bite">recent production‑Kubernetes survey</a> shows the same pattern: AI is now one of the primary growth drivers for Kubernetes usage, with the vast majority of teams expecting AI workloads on their clusters to increase over the next year.</p><p>Teams don’t want separate, bespoke infrastructure just for AI if they can avoid it, and Kubernetes gives them one place to run <a href="https://www.fairwinds.com/blog/deploying-ai/ml-workloads-gpu-enabled-kubernetes-is-the-right-fit">GPU‑heavy workloads</a>, data pipelines, and regular services with consistent tooling and deployment practices. GPU efficiency really matters now: GPUs are expensive, and leadership notices when they sit idle.</p><p>Kubernetes scheduling, autoscaling, and resource controls help teams keep GPU nodes busy and shared across teams instead of locked to one project. The CNCF survey and related analyses point out that GPU‑centric AI workloads are a major Kubernetes use case and an important driver of how organizations architect and operate their clusters. That financial pressure pushes more AI work onto Kubernetes, not less.</p><p>Put simply, once AI shows up in your roadmap, it pulls Kubernetes deeper into the center of your infrastructure story, not out of it.</p><h3>Cloud Native Is the New Normal</h3><p>Microservices and containers are now the mainstream choice for new apps and a common path for modernization, which naturally leads to Kubernetes as the orchestration layer. It can handle both new services and migrated workloads across multiple clouds and environments, and the official <a href="https://kubernetes.io/docs/home/">Kubernetes documentation</a> and <a href="https://www.cncf.io/">CNCF ecosystem</a> make it easier to adopt best practices over time.</p><h3>Managed Kubernetes Changed the Game</h3><p>With services like <a href="https://aws.amazon.com/eks/">Amazon EKS</a>, <a href="https://cloud.google.com/kubernetes-engine">Google Kubernetes Engine</a>, and <a href="https://azure.microsoft.com/services/kubernetes-service/">Azure Kubernetes Service</a>, teams don’t have to run their own control planes anymore. It’s much easier to spin up clusters and say yes when another team asks for their own environment. That convenience is great, but it also means clusters multiply faster than solid governance, security, and cost controls if you’re not careful.</p><h3>Platform Engineering Is Making Kubernetes Invisible</h3><p>Platform teams and <a href="https://www.fairwinds.com/blog/what-is-an-internal-developer-platform-idp">Internal Developer Platforms</a> are putting GUIs, CLIs, templates, and golden paths in front of Kubernetes so developers don’t have to think about YAML and kubectl every day. Developers click a button or run a simple command and get a service, a namespace, or a deployment. Under the hood, it’s still Kubernetes doing the work, which means your footprint grows even if most developers never touch raw cluster APIs. <a href="https://platformengineering.org/">Platformengineering.org</a>’s guide on <a href="https://platformengineering.org/blog/what-are-golden-paths-a-guide-to-streamlining-developer-workflows">golden paths</a> shows how often Kubernetes sits at the core of these platforms.</p><h2>AI Is Quickly Locking Kubernetes In</h2><p>Because Kubernetes is the backbone of so many production stacks and AI workloads, most teams look a lot like the organizations in the <a href="https://www.cncf.io/reports/the-cncf-annual-cloud-native-survey/">CNCF survey</a>: cloud native is standard, Kubernetes is boring in the best way, and the hard part is everything around it. The difference between teams that thrive and teams that burn out usually comes down to three deliberate choices: <a href="https://www.fairwinds.com/blog/7-building-blocks-for-a-successful-internal-developer-platform-for-kubernetes">treating Kubernetes as a shared product</a> instead of a collection of pet clusters, enforcing guardrails and golden paths instead of one‑off fixes, and choosing how much of the day‑to‑day cluster work your own people really need to own.</p><p><img decoding="async" src="https://www.fairwinds.com/hs-fs/hubfs/Figure1-KubernetesUsageforHostingAIWorkloads.png?width=600&amp;height=524&amp;name=Figure1-KubernetesUsageforHostingAIWorkloads.png" width="600" height="524" alt="Figure1-KubernetesUsageforHostingAIWorkloads" style="height: auto; max-width: 100%; width: 600px; margin-left: auto; margin-right: auto; display: block;"></p><h2>What This Actually Means for Your Team</h2><p>If Kubernetes is running more and more of your production and AI stack, you probably feel a few of these already:</p><ul> <li><span style="font-size: 18px;"><strong>Local problems become fleet problems.</strong> One team’s bad <a href="https://www.fairwinds.com/blog/how-to-correctly-set-resource-requests-and-limits">limits</a> or noisy workloads don’t just annoy that team anymore; they hit shared clusters, shared bills, and shared SLOs. Security, cost, and reliability stop being team issues and become platform‑wide concerns.</span></li> <li><span style="font-size: 18px;"><strong>You wake up one day with a cluster proliferation problem. </strong>You started with a pet cluster, now you have multiple clusters per environment, region, and business unit. Upgrades hurt, policies <a href="https://www.fairwinds.com/blog/configuration-drift-kubernetes">drift</a>, and <a href="https://www.fairwinds.com/blog/top-9-questions-kubernetes-monitoring">observability</a> feels fragmented.</span></li> <li><span style="font-size: 18px;"><strong>Your platform and SRE teams are stretched thin.</strong> They’re juggling upgrades, CVEs, <a href="https://www.fairwinds.com/blog/love-kubernetes-add-ons-securing-kubernetes-beyond-core">add‑on</a> sprawl, on-call support, multi‑cluster networking, and <a href="https://www.fairwinds.com/blog/ai-cloud-native-managing-kubernetes-platform">AI workloads</a> on top of every namespace and deployment question.</span></li> </ul><h2>Where to go from here</h2><p>If your clusters, workloads, and AI initiatives are multiplying faster than your platform capacity, that’s not a sign you’re failing; it’s a sign you’ve hit the same inflection point as the rest of the industry. This is exactly the phase Fairwinds focuses on. We turn Kubernetes from the thing that keeps breaking into a stable, AI‑ready foundation under everything else you’re building. With <a href="https://www.fairwinds.com/blog/managed-kubernetes-as-a-service-unlocks-immediate-value">managed Kubernetes and platform guidance</a>, your engineers can spend more time on new features, better customer experiences, and smarter AI instead of constantly dealing with emergency upgrade windows.</p><p>In practice, that means Fairwinds:</p><ul style="font-size: 18px;"> <li>Takes over day‑2 operations for your EKS clusters.</li> <li>Standardizes add-ons and guardrails across your fleet.</li> <li>Helps you stand up an internal developer platform on top of Kubernetes.</li> </ul><p>Kubernetes is already eating your production; the real question for 2026 is whether it does that on your terms, with guardrails and help, or through one more round of 2 a.m. pages.</p><div class="hs-cta-embed hs-cta-simple-placeholder hs-cta-embed-195526220975" style="max-width:100%; max-height:100%; width:700px;height:212.91015625px; margin: 0 auto; display: block; margin-top: 20px; margin-bottom: 20px"> <a href="https://www.fairwinds.com/hs/cta/wi/redirect?encryptedPayload=AVxigLL7UTGy3r3r7HG1NVtEOS5bbd7Q33IzK%2BZBA2Y90akRqCH%2BMBn%2F%2FVPO4RB0n2a6WGKTH5u0O%2B8okYh2GrY1TBEK4fkdiaXWj7f%2BrHiaTuTlOltg7ActNGRw2A%2FS%2FLb1PxbYiNpVkq0sUdFzWW8ZnMsawOgsd5%2BavcXhmSJkc8pb3dJGZUr1zyh5m%2Bqxl7Su5tcoGN2NHujejGL2IoXIxW5j&amp;webInteractiveContentId=195526220975&amp;portalId=2184645"> <img decoding="async" alt="Learn More Managed Kubernetes-as-a-Service    " src="https://no-cache.hubspot.com/cta/default/2184645/interactive-195526220975.png" style="height: 100%; width: 100%; object-fit: fill; margin: 0 auto; display: block; margin-top: 20px; margin-bottom: 20px" align="center"> </a> </div><p> </p><p><img loading="lazy" decoding="async" src="https://track.hubspot.com/__ptq.gif?a=2184645&amp;k=14&amp;r=https%3A%2F%2Fwww.fairwinds.com%2Fblog%2Fkubernetes-eating-production-why-usage-keeps-climbing&amp;bu=https%253A%252F%252Fwww.fairwinds.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "></p><p>The post <a href="https://www.fairwinds.com/blog/kubernetes-eating-production-why-usage-keeps-climbing">Kubernetes Is Eating Production: Why Usage Keeps Climbing Into 2026</a> appeared first on <a href="https://www.fairwinds.com/blog">Fairwinds | Blog</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/kubernetes-is-eating-production-why-usage-keeps-climbing-into-2026/" data-a2a-title="Kubernetes Is Eating Production: Why Usage Keeps Climbing Into 2026"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fkubernetes-is-eating-production-why-usage-keeps-climbing-into-2026%2F&amp;linkname=Kubernetes%20Is%20Eating%20Production%3A%20Why%20Usage%20Keeps%20Climbing%20Into%202026" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fkubernetes-is-eating-production-why-usage-keeps-climbing-into-2026%2F&amp;linkname=Kubernetes%20Is%20Eating%20Production%3A%20Why%20Usage%20Keeps%20Climbing%20Into%202026" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fkubernetes-is-eating-production-why-usage-keeps-climbing-into-2026%2F&amp;linkname=Kubernetes%20Is%20Eating%20Production%3A%20Why%20Usage%20Keeps%20Climbing%20Into%202026" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fkubernetes-is-eating-production-why-usage-keeps-climbing-into-2026%2F&amp;linkname=Kubernetes%20Is%20Eating%20Production%3A%20Why%20Usage%20Keeps%20Climbing%20Into%202026" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fkubernetes-is-eating-production-why-usage-keeps-climbing-into-2026%2F&amp;linkname=Kubernetes%20Is%20Eating%20Production%3A%20Why%20Usage%20Keeps%20Climbing%20Into%202026" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.fairwinds.com/blog">Fairwinds | Blog</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Melissa Kapnick">Melissa Kapnick</a>. Read the original post at: <a href="https://www.fairwinds.com/blog/kubernetes-eating-production-why-usage-keeps-climbing">https://www.fairwinds.com/blog/kubernetes-eating-production-why-usage-keeps-climbing</a> </p>

The Bay Agenda: Security for Journalists

  • Melissa Srago
  • Published date: 2026-04-13 21:27:32

April 14, 2026 - 6:00pm to 7:30pm PDT San Francisco, CA KALW (not EFF) will host this event. EFF Senior Staff Technologist William Budington will be speaking. From the Organizers:  KALW examines how journalists can protect themselves, their sources an…

Bill Budington is a longtime activist, cryptography enthusiast, and a Senior Staff Technologist on EFF's Public Interest Technology team. His research has been featured in The New York Times, The Los… [+747 chars]

How to Prepare for Agentic Commerce Without Breaking Digital Identity

  • PYMNTS
  • Published date: 2026-04-13 08:00:50

A fundamental assumption about the internet has broken. Automated traffic now accounts for the majority of online activity, and a growing share of that activity is not malicious but functional. Software agents are booking travel, managing subscriptions, execu…

A fundamental assumption about the internet has broken.Automated traffic now accounts for the majority of online activity, and a growing share of that activity is not malicious but functional. Softwa… [+4368 chars]

Facephi Strengthens Its International Expansion with the Opening of a Subsidiary in Canada

  • Facephi
  • Published date: 2026-04-13 07:20:00

Facephi Strengthens Its International Expansion with the Opening of a Subsidiary in Canada The Biometric and Digital Identity sector within the Canadian...

Facephi Strengthens Its International Expansion with the Opening of a Subsidiary in Canada <ul><li>The Biometric and Digital Identity sector within the Canadian financial sector is expected to main… [+3612 chars]

How to proactively secure NHIs in your organization?

  • None
  • Published date: 2026-04-13 00:00:00

None

<h2>Are Non-Human Identities the Weak Link in Your Security Infrastructure?</h2><p>Where digital transformation impacts every sector, the management of Non-Human Identities (NHIs) represents a burgeoning area of concern for cybersecurity professionals. Organizations are increasingly relying on machine identities due to the rise of cloud computing and automated services; however, the complexity of these systems often leads to security oversights. This oversight can act as an open gateway for cyber threats if not managed properly.</p><h3>Understanding the Essence of Non-Human Identities</h3><p>Machine identities, known as Non-Human Identities (NHIs), are integral to modern cybersecurity practices. They function similarly to human identities in that they require authentication to access systems. However, instead of traditional passwords, NHIs utilize “Secrets” — encrypted tokens, passwords, or keys — that enable secure communication and operations. These secrets act like a passport, and permissions serve as a visa, together regulating the NHI’s activities.</p><p>Managing these identities extends beyond mere authentication. It involves securing both the identities (akin to a tourist) and their access credentials (the passport), along with monitoring their activities.</p><h3>The Strategic Importance of Comprehensive NHI Security</h3><p>From financial services to healthcare, various industries depend heavily on machine-to-machine communication. As such, NHIs play a crucial role in security frameworks across sectors like finance, healthcare, travel, and DevOps. They are particularly relevant for organizations rooted in cloud environments, where seamless interconnectivity is both a necessity and a risk.</p><p>A holistic approach to managing NHIs goes beyond simple point solutions like secret scanners, which only offer limited protection. Comprehensive NHI management platforms provide insights about ownership, usage patterns, permissions, and potential system vulnerabilities. This allows for a context-aware security approach that can mitigate risks effectively and efficiently.</p><h3>Benefits of Proactive NHI Management</h3><p>Proper NHI management offers numerous advantages that not only bolster security but also enhance operational efficiencies:</p><ul> <li><strong>Reduced Risk:</strong> By proactively identifying vulnerabilities, NHI management minimizes the likelihood of breaches and data leaks, safeguarding sensitive information.</li> <li><strong>Improved Compliance:</strong> Organizations can ensure adherence to regulatory requirements through robust policy enforcement and comprehensive audit trails.</li> <li><strong>Increased Efficiency:</strong> Automation of NHIs and secrets management allows security teams to allocate resources to more strategic initiatives.</li> <li><strong>Enhanced Visibility and Control:</strong> Centralized management provides an expansive view of access governance, improving accountability and decision-making.</li> <li><strong>Cost Savings:</strong> Automating secrets rotation and NHIs decommissioning reduces operational costs, allowing for better budget allocation.</li> </ul><h3>Addressing Security Gaps Between Teams</h3><p>One of the significant challenges organizations face is the disconnect between security and R&amp;D teams, which can create security gaps. By addressing these gaps through effective NHI management, an organization can create a secure cloud environment that accommodates innovative R&amp;D efforts without compromising security.</p><p>The focus should be on establishing a collaborative framework where security protocols align with R&amp;D objectives. It is imperative to integrate security considerations early in the development process to ensure that NHIs are managed within a secure infrastructure from the outset.</p><h3>Building a Secure Cloud Environment</h3><p>The cloud has become a critical component of modern business operations, offering flexibility and scalability. However, its dynamic nature also presents unique security challenges. Organizations must strive to build secure cloud environments where NHIs are effectively managed to prevent potential breaches.</p><p>By leveraging data-driven insights and tools for NHI management, organizations can achieve a balanced security posture that supports business objectives without unnecessary risk.</p><p>To further explore such strategies and their role in reshaping cybersecurity frameworks, you might find insightful perspectives in the <a href="https://entro.security/blog/cybersecurity-predictions-2025/">Cybersecurity Predictions for 2025</a>.</p><h3>Leveraging Automation for Strategic Security Initiatives</h3><p>Automation in NHI management is not merely a means of reducing workload but is a strategic enabler. It allows cybersecurity teams to focus on high-level security frameworks rather than exhaustively managing secrets and permissions manually. Automating the discovery, classification, and rotation of NHIs can provide substantial efficiency gains.</p><p>Engaging in best practices for NHI management can substantially offset the complexity of managing machine identities. A proactive strategy that emphasizes automation and data insight can facilitate a more agile and responsive security posture. With industry experts suggest, leveraging artificial intelligence in Identity Management and Access Management (IMA and AM) is also pivotal for contemporary security needs, as elaborated <a href="https://entro.security/blog/harnessing-ai-in-ima-and-am/">here</a>.</p><h3>Enhancing Interdepartmental Collaboration</h3><p>The effective management of NHIs also necessitates improved communication and collaboration across various departments such as SOC and DevOps teams. By fostering a culture of shared responsibility and common objectives related to security protocols, organizations can ensure that security measures are consistently implemented across different platforms and applications.</p><p>By embracing these strategic measures, organizations can significantly advance their security capabilities, ensuring that NHIs are no longer the weak link in their infrastructure. The importance of a proactive, holistic approach to NHI management cannot be understated, especially in modern digital.</p><h3>Streamlining Compliance and Audit Trails with NHI Management</h3><p>How do organizations maintain compliance while managing the complexities of Non-Human Identities (NHIs)? This is a pressing question where regulatory continually change, demanding rigorous auditing processes and adherence to standards. NHI management solutions are crucial in providing the policies and audit trails necessary for compliance.</p><p>The rise in regulatory demands makes it vital for organizations to adopt a structured approach to compliance. NHI management can assist in crafting auditable processes that not only meet but exceed regulatory expectations. By centralizing policies surrounding machine identities, businesses can generate detailed audit trails efficiently, ensuring transparency and accountability. This approach significantly mitigates the risk of non-compliance, reducing the likelihood of financial penalties or reputational damage. For a deeper understanding of compliance management, delve into the <a href="https://entro.security/blog/secrets-security-and-soc2-compliance/">Secrets Security and SOC2 Compliance</a> article.</p><h3>The Role of Data-Driven Insights in Securing NHIs</h3><p>Can data really safeguard NHIs effectively? Using data-driven insights has become a hallmark of securing Non-Human Identities successfully. Contextualizing the data surrounding NHIs enhances threat detection and ensures more effective solutions.</p><p>By leveraging data analytics, organizations decode patterns in NHI usage, identifying anomalies that could indicate security threats. Tools that analyze permission and usage patterns offer a dynamic view of vulnerabilities, providing actionable insights. These insights enable quick identification and mitigation of security threats, reinforcing an organization’s cybersecurity posture. For those seeking more on data’s transformative power in cybersecurity frameworks, the <a href="https://entro.security/blog/iam-and-ilm-lifecycle-stages/">IAM and ILM Lifecycle Stages</a> article offers extensive insights.</p><h3>Building an Adaptive Security Framework with NHIs</h3><p>What does an adaptive security framework look like with NHIs at its core? A flexible and adaptive security framework accounts for evolving threats and vulnerabilities, utilizing NHIs as a critical factor within its architecture.</p><p>Adaptive frameworks adjust according to threats, demanding real-time monitoring and adjustment. This agility is achieved by integrating NHI management solutions, which enable the continuous assessment of machine identity usage. By adopting a real-time defense approach, businesses are better positioned to tackle emerging threats proactively. This adaptability ensures that security measures keep pace with advancements in technology and cyber threats.</p><h3>Addressing the Human Factor in NHI Management</h3><p>How does the human element affect NHI management strategies? While NHIs focus on machine identities, the surrounding human factor remains a pivotal part of effective management and security.</p><p>The intersection between humans and machine identities often introduces additional security considerations. Training and raising awareness among staff regarding NHI management increase the efficient and secure operation of these systems. Educating teams on potential human-driven vulnerabilities provides a holistic view of cybersecurity, bridging gaps between machine processes and human action. Nurturing a culture of security mindfulness ensures both technology and personnel work in unison to uphold security standards.</p><h3>Considerations for Cloud-Based NHI Infrastructure</h3><p>Why is the cloud uniquely challenged regarding NHIs? Where businesses migrate operations to the cloud, maintaining robust NHI security becomes increasingly challenging yet essential.</p><p>Cloud environments demand meticulous attention to NHIs due to their inherently interconnected structure. Within cloud-based infrastructures, machine identities proliferate, and managing their security requires diligent oversight. Strategies for NHI protection are therefore central to safeguarding cloud assets. By implementing tailored methods specific to cloud environments, organizations can manage machine identities efficiently, preventing unauthorized access and potential breaches.</p><h3>Proponents of a Unified NHI Management Framework</h3><p>How can a unified framework enhance NHI management? By integrating NHI management under a single framework, organizations can achieve comprehensive oversight and streamlined operations.</p><p>A unified framework centralizes management efforts, ensuring consistency across all platforms and services. This approach fosters collaboration between previously siloed departments, facilitating the effective implementation of security policies. Unified frameworks reduce complexity, increase visibility, and enhance an organization’s ability to respond swiftly to emerging threats.</p><p>Incorporating methodologies that align security measures with broader organizational goals transforms NHIs from a weak link to a foundational component of the security structure. While sectors continue growing more reliant on machine identities, crafting a strategy that balances protection and innovation remains critical.</p><p>The post <a href="https://entro.security/how-to-proactively-secure-nhis-in-your-organization/">How to proactively secure NHIs in your organization?</a> appeared first on <a href="https://entro.security/">Entro</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/how-to-proactively-secure-nhis-in-your-organization/" data-a2a-title="How to proactively secure NHIs in your organization?"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fhow-to-proactively-secure-nhis-in-your-organization%2F&amp;linkname=How%20to%20proactively%20secure%20NHIs%20in%20your%20organization%3F" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fhow-to-proactively-secure-nhis-in-your-organization%2F&amp;linkname=How%20to%20proactively%20secure%20NHIs%20in%20your%20organization%3F" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fhow-to-proactively-secure-nhis-in-your-organization%2F&amp;linkname=How%20to%20proactively%20secure%20NHIs%20in%20your%20organization%3F" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fhow-to-proactively-secure-nhis-in-your-organization%2F&amp;linkname=How%20to%20proactively%20secure%20NHIs%20in%20your%20organization%3F" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fhow-to-proactively-secure-nhis-in-your-organization%2F&amp;linkname=How%20to%20proactively%20secure%20NHIs%20in%20your%20organization%3F" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://entro.security/">Entro</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Alison Mack">Alison Mack</a>. Read the original post at: <a href="https://entro.security/how-to-proactively-secure-nhis-in-your-organization/">https://entro.security/how-to-proactively-secure-nhis-in-your-organization/</a> </p>

Randall Munroe’s XKCD ‘Solar Warning’

  • None
  • Published date: 2026-04-13 00:00:00

None

<figure class=" sqs-block-image-figure intrinsic "> <p> <a class=" sqs-block-image-link " href="https://xkcd.com/3215/"></a></p> <p> <img data-stretch="false" data-image="https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/0e8cbe43-81f6-4057-b1fb-630e43ac1503/solar_warning.png" data-image-dimensions="304x333" data-image-focal-point="0.5,0.5" alt="" data-load="false" elementtiming="system-image-block" src="https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/0e8cbe43-81f6-4057-b1fb-630e43ac1503/solar_warning.png?format=1000w" width="304" height="333" sizes="auto, (max-width: 640px) 100vw, (max-width: 767px) 100vw, 100vw" onload='this.classList.add("loaded")' srcset="https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/0e8cbe43-81f6-4057-b1fb-630e43ac1503/solar_warning.png?format=100w 100w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/0e8cbe43-81f6-4057-b1fb-630e43ac1503/solar_warning.png?format=300w 300w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/0e8cbe43-81f6-4057-b1fb-630e43ac1503/solar_warning.png?format=500w 500w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/0e8cbe43-81f6-4057-b1fb-630e43ac1503/solar_warning.png?format=750w 750w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/0e8cbe43-81f6-4057-b1fb-630e43ac1503/solar_warning.png?format=1000w 1000w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/0e8cbe43-81f6-4057-b1fb-630e43ac1503/solar_warning.png?format=1500w 1500w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/0e8cbe43-81f6-4057-b1fb-630e43ac1503/solar_warning.png?format=2500w 2500w" loading="lazy" decoding="async" data-loader="sqs"></p> <p> <figcaption class="image-caption-wrapper"> <p class=""><strong>via the comic artistry and dry wit of Randall Munroe, creator of XKCD</strong></p> </figcaption></p></figure><p><a href="https://www.infosecurity.us/blog/2026/4/13/randall-munroes-xkcd-solar-warning">Permalink</a></p><p></p><p>The post <a href="https://xkcd.com/3215/">Randall Munroe’s XKCD 'Solar Warning'</a> appeared first on <a href="https://www.infosecurity.us/">Infosecurity.US</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/randall-munroes-xkcd-solar-warning/" data-a2a-title="Randall Munroe’s XKCD ‘Solar Warning’"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Frandall-munroes-xkcd-solar-warning%2F&amp;linkname=Randall%20Munroe%E2%80%99s%20XKCD%20%E2%80%98Solar%20Warning%E2%80%99" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Frandall-munroes-xkcd-solar-warning%2F&amp;linkname=Randall%20Munroe%E2%80%99s%20XKCD%20%E2%80%98Solar%20Warning%E2%80%99" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Frandall-munroes-xkcd-solar-warning%2F&amp;linkname=Randall%20Munroe%E2%80%99s%20XKCD%20%E2%80%98Solar%20Warning%E2%80%99" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Frandall-munroes-xkcd-solar-warning%2F&amp;linkname=Randall%20Munroe%E2%80%99s%20XKCD%20%E2%80%98Solar%20Warning%E2%80%99" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Frandall-munroes-xkcd-solar-warning%2F&amp;linkname=Randall%20Munroe%E2%80%99s%20XKCD%20%E2%80%98Solar%20Warning%E2%80%99" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.infosecurity.us/">Infosecurity.US</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Marc Handelman">Marc Handelman</a>. Read the original post at: <a href="https://xkcd.com/3215/">https://xkcd.com/3215/</a> </p>

How capable is Agentic AI in handling complex cloud deployments?

  • None
  • Published date: 2026-04-13 00:00:00

None

<h2>What Makes Non-Human Identities Crucial in a Complex Cloud Environment?</h2><p>One might wonder how organizations can secure their digital assets effectively. The answer lies in a robust Non-Human Identity (NHI) management system. NHIs serve as a cornerstone in safeguarding cloud infrastructure by addressing vulnerabilities that often arise due to the disconnect between security and R&amp;D teams.</p><h3>Understanding Non-Human Identities and Their Role</h3><p>Machine identities, often referred to as NHIs, are crucial components in cybersecurity. These identities streamline secure communication between systems and users by using secrets, which are encrypted credentials akin to digital passports. Similar to how a passport grants you entry into a country, secrets permit access to network resources. Managing these identities involves safeguarding the actual machine identities and their access credentials, ensuring they operate securely.</p><h3>The Holistic Approach to NHI Management</h3><p>Efficient management of NHIs offers a comprehensive approach that spans all stages of the identity lifecycle—from discovery and classification to threat detection and resolution. Unlike point solutions, such as secret scanners, which offer limited protection, a holistic strategy provides insights into ownership, permissions, usage patterns, and potential risks.</p><h3>Benefits of Effective NHI Management</h3><p>Organizations leveraging effective NHI management can experience significant benefits:</p><ul> <li><strong>Reduced Risk:</strong> By proactively identifying and addressing security risks, organizations can diminish the potential for data breaches.</li> <li><strong>Improved Compliance:</strong> NHI management assists in meeting regulatory requirements, complete with policy enforcement and audit trails.</li> <li><strong>Increased Efficiency:</strong> Automation in managing NHIs and secrets enables security teams to focus on strategic initiatives rather than routine tasks.</li> <li><strong>Enhanced Visibility and Control:</strong> A centralized view of access management empowers teams with governance capabilities.</li> <li><strong>Cost Savings:</strong> By automating processes like secrets rotation and decommissioning, operational costs are significantly reduced.</li> </ul><h3>Relevance Across Various Sectors</h3><p>The significance of NHIs transcends various industries, including financial services, healthcare, travel, development operations, and security operations centers (SOC). For organizations operating in the cloud, effective NHI management becomes even more pivotal.</p><p>When considering <a href="https://entro.security/blog/non-human-identities-and-data-security-in-financial-services/" rel="noopener">data security in financial services</a>, for instance, NHIs play an essential role in protecting sensitive financial data while ensuring compliance with stringent regulations. Similarly, <a href="https://entro.security/blog/secrets-security-and-soc2-compliance/" rel="noopener">secrets management</a> is critical for meeting compliance standards like SOC 2, underscoring the necessity for a robust security posture.</p><h3>Addressing Security Gaps with NHI Management</h3><p>A significant challenge in security is bridging the gap between security teams and research and development departments. NHIs provide a solution by creating a secure cloud environment where both teams can operate efficiently. This strategic approach enables organizations to optimize security protocols, ensuring that development initiatives do not compromise security standards.</p><p>Moreover, with the advent of <a href="https://verticalrelevance.applytojob.com/apply/pDRnTObRjy/AI-Agentic-ML-Cloud-Consultant" rel="noopener">AI deployments</a> in complex cloud environments, NHIs ensure seamless integration of artificial intelligence, maintaining the security of digital assets. This integration is critical with AI continues to grow in capability and complexity, necessitating robust security mechanisms to safeguard operations.</p><p>In summary, with cloud environments and AI capabilities evolve, the strategic importance of Non-Human Identities in maintaining a secure digital infrastructure cannot be overstated. By emphasizing a holistic and robust approach to NHI management, organizations can fortify their security measures, ensuring resilience against potential cyber threats while optimizing operations across various sectors.</p><h3>Exploring Challenges in NHI Management</h3><p>How might organizations tackle the unique challenges posed by Non-Human Identity (NHI) management? While these machine identities are indispensable, they come with their own hurdles that must be addressed for maintaining system integrity and security.</p><p>One of the primary issues is the sheer volume of NHIs present in any given organization. With a growing number of applications and microservices, each generating its own set of identities and secrets, the complexity can become overwhelming. This abundance creates a sprawling environment that is difficult to monitor and secure effectively without a comprehensive strategy. The rapid proliferation of these identities often leads to lapses in oversight, subsequently leaving organizations vulnerable to cyber threats.</p><p>Another challenge revolves around the absence of standard practices when it comes to identity lifecycle management. Each department or team might have its own protocols, which can result in fragmented approaches to security. Inconsistent practices lead to vulnerabilities, with some identities possibly being neglected or decommissioned improperly. By aligning standards across departments, organizations can ensure a more cohesive and secure management process.</p><h3>The Strategic Role of Automation in NHI Management</h3><p>What role does automation play in NHIs? Automation is a game-changer, simplifying the process of handling numerous machine identities and their associated secrets. Through automation, organizations can reduce the likelihood of human error, a common factor in many data breaches.</p><p>Automated tools streamline essential processes, such as the rotation of secrets and the provisioning or decommissioning of NHIs, without compromising security. This efficiency permits security teams to reallocate their focus to more strategic tasks, fostering an environment where innovation can thrive alongside robust security measures.</p><p>Moreover, automated systems can continuously monitor identity usage patterns and permissions, identifying potential security risks before they become problems. These sophisticated systems also provide detailed reports and analytics, helping organizations fine-tune their security strategies by learning from past occurrences and anticipating future challenges.</p><h3>Leveraging Advanced Analytics for Better Security</h3><p>How can advanced analytics bolster security within NHI management? In recent years, the integration of analytics has shifted from being a mere convenience to a strategic necessity for organizations navigating complex cloud environments.</p><p>Analytics offer invaluable insights into usage patterns and anomalies, making it easier to spot potential security threats. By analyzing data ingested over time, security measures become proactive rather than reactive, drastically reducing response times in the event of a breach. Machine learning algorithms are especially useful in this domain, when they can learn and predict potential vulnerabilities based on historical data, thereby providing an additional layer of security.</p><p>Furthermore, advanced analytics play a pivotal role in achieving <a href="https://entro.security/blog/best-practices-maintaining-secrets-security-in-development-stage/">compliance</a> with industry regulations by facilitating audit processes and offering traceability in operations. They ensure that all actions within the system are documented, aiding in both internal reviews and external regulatory audits.</p><h3>A Collaborative Effort for Enhanced Security</h3><p>How crucial is collaboration between teams in elevating the efficacy of NHI management? Successful security strategies are often the result of interdisciplinary cooperation. Bridging the gap between cybersecurity teams and other departments, particularly research and development, is essential.</p><p>When these teams work together, they establish unified security protocols and standards that comprehend the intricacies of development environments. This collaboration fosters faster and more efficient responses to security requirements, with R&amp;D teams understand the implications of their work on overall system security and can adapt quickly to any changes in security protocols.</p><p>Moreover, a culture of collaboration promotes shared responsibility. Every team member becomes an active participant in maintaining the security health of their systems, contributing to an organizational culture where security is everyone’s concern, not just the IT department’s.</p><h3>Future Directions for NHI Management</h3><p>What trends might redefine NHI management moving forward? With technological innovations continue to shape cloud environments, NHIs are bound to evolve in their complexity and significance.</p><p>One notable development is the advent of <a href="https://www.businesswire.com/news/home/20250625765780/en/Introducing-Genesys-Cloud-AI-Studio-Empowering-Businesses-with-Responsible-Agentic-AI-for-Transformational-Customer-Experiences" rel="noopener">Agentic AI technologies</a>, which are poised to transform the way machine identities interact within cloud architectures. These technologies encompass AI with the autonomy to manage its identities, requiring a reevaluation of how we approach security protocols.</p><p>Additionally, the increasing focus on privacy and data protection will push for even more stringent compliance regulations, mandating organizations to adopt transparent and secure management systems. This shift towards enhanced privacy measures will drive innovation in security technologies, including advanced methods of encrypting and managing secrets.</p><p>In conclusion, the role of Non-Human Identities within cloud environments remains crucial, with their management being a critical component in securing digital assets. When organizations endeavor to stay ahead, a focus on automation, analytics, and cross-department collaboration will be imperative to maintaining robust security frameworks, all while accommodating future technological advancements and regulatory requirements. This journey toward enhanced NHI management will ultimately lead to a more secure, efficient, and compliant digital.</p><p>The post <a href="https://entro.security/how-capable-is-agentic-ai-in-handling-complex-cloud-deployments/">How capable is Agentic AI in handling complex cloud deployments?</a> appeared first on <a href="https://entro.security/">Entro</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/how-capable-is-agentic-ai-in-handling-complex-cloud-deployments/" data-a2a-title="How capable is Agentic AI in handling complex cloud deployments?"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fhow-capable-is-agentic-ai-in-handling-complex-cloud-deployments%2F&amp;linkname=How%20capable%20is%20Agentic%20AI%20in%20handling%20complex%20cloud%20deployments%3F" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fhow-capable-is-agentic-ai-in-handling-complex-cloud-deployments%2F&amp;linkname=How%20capable%20is%20Agentic%20AI%20in%20handling%20complex%20cloud%20deployments%3F" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fhow-capable-is-agentic-ai-in-handling-complex-cloud-deployments%2F&amp;linkname=How%20capable%20is%20Agentic%20AI%20in%20handling%20complex%20cloud%20deployments%3F" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fhow-capable-is-agentic-ai-in-handling-complex-cloud-deployments%2F&amp;linkname=How%20capable%20is%20Agentic%20AI%20in%20handling%20complex%20cloud%20deployments%3F" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fhow-capable-is-agentic-ai-in-handling-complex-cloud-deployments%2F&amp;linkname=How%20capable%20is%20Agentic%20AI%20in%20handling%20complex%20cloud%20deployments%3F" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://entro.security/">Entro</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Alison Mack">Alison Mack</a>. Read the original post at: <a href="https://entro.security/how-capable-is-agentic-ai-in-handling-complex-cloud-deployments/">https://entro.security/how-capable-is-agentic-ai-in-handling-complex-cloud-deployments/</a> </p>

Anthropic Just Gave Defenders a Firehose. They’re Already Drowning

  • Jack Poller
  • Published date: 2026-04-13 00:00:00

None

<p>Anthropic announced Project Glasswing last week with the kind of language reserved for genuine inflection points. Claude Mythos Preview, a frontier model the company deliberately chose not to release publicly, had already identified thousands of zero-day vulnerabilities across every major operating system and web browser — including a bug that had been sitting undetected in OpenBSD for 27 years. The partner list reads like a who’s who of critical infrastructure: Microsoft, Nvidia, AWS, Apple, Google, CrowdStrike, Palo Alto Networks, Cisco, Broadcom, JPMorgan Chase, and the Linux Foundation. Anthropic committed $100 million in usage credits and framed the whole initiative as an urgent attempt to give defenders a head start before these capabilities proliferate beyond actors committed to deploying them safely.</p><p>It is an impressive announcement. It is also solving the wrong problem.</p><p>Defenders have never lacked for vulnerabilities to find. The global security industry produces an extraordinary volume of vulnerability intelligence every single day — from CVSS-scored CVEs to proprietary threat feeds to penetration testing engagements to bug bounty programs to automated scanning tools that have been running continuously for years. The problem has never been the discovery pipeline. The problem has always been what happens after discovery, and that is where Project Glasswing goes conspicuously quiet.</p><p>Consider what the average enterprise security team faces. At any given moment, a mid-sized organization with moderately complex infrastructure carries thousands of known, unpatched vulnerabilities in production systems. Security teams know about them. They have known about many of them for months, sometimes years. The vulnerabilities sit in queues not because defenders are lazy or incompetent, but because remediation requires coordination across organizational boundaries that security teams do not control — development pipelines, change management windows, vendor patch cycles, legacy systems that cannot be patched without breaking something else, and business owners who will not accept downtime for a vulnerability rated high rather than critical. Prioritization is not a science. It is a negotiation, and security teams lose that negotiation constantly because the business pressure to keep systems running always outweighs the abstract risk of a vulnerability that attackers have not yet exploited.</p><p>Now Anthropic is proposing to dramatically accelerate the front end of a pipeline that is already choking at the back end. Mythos Preview will find more vulnerabilities, faster, with greater sophistication than any tool that preceded it. The model can chain three, four, or five vulnerabilities in sequence to construct exploits that would have required elite human expertise to discover manually. That capability is genuinely remarkable. It is also about to make the remediation problem catastrophically worse for every security team that does not have the operational capacity to act on what the model finds — which is most of them.</p><p>This is not a hypothetical concern. Alex Stamos, who has spent his career at the intersection of security engineering and institutional reality, put a sharp timestamp on the broader capability race: roughly six months before open-weight models catch up to frontier models in vulnerability discovery, at which point the exploit pipeline becomes democratized and every malicious actor on the planet gains access to the same discovery capability Anthropic is currently restricting to forty-plus vetted organizations. That six-month window is Anthropic’s argument for urgency. It is also an argument for asking a harder question: if defenders cannot remediate what they already know about, what exactly does finding more vulnerabilities faster accomplish for them?</p><p>The honest answer is that it accomplishes a great deal for the forty-plus organizations in the Glasswing coalition, most of which have the engineering headcount, the operational maturity, and the organizational authority to act on what the model surfaces. Microsoft can patch Windows. Google can fix Chrome. Palo Alto Networks can harden its own platform. For those organizations, Mythos Preview delivers genuine defensive leverage. The rest of the ecosystem — the thousands of enterprises, municipalities, healthcare systems, and critical infrastructure operators running on the software these companies produce — will inherit better-patched upstream dependencies without receiving any of the capability that produced them.</p><p>What the security industry needs alongside a more powerful vulnerability discovery engine is a more powerful remediation operating model — one that uses the same agentic AI capabilities to triage, prioritize, and orchestrate fixes at machine speed rather than at the speed of a change management committee. The bottleneck in enterprise security has never been intelligence. It has been action. Remediation requires touching production systems, coordinating across organizational silos, and accepting risk in the short term to reduce risk over time. Those are fundamentally human organizational problems, and no amount of vulnerability discovery acceleration changes that calculus without a corresponding investment in remediation capacity.</p><p>Anthropic deserves credit for recognizing that these capabilities require governance before they require democratization, and Project Glasswing is a serious attempt to structure that governance around the organizations best positioned to absorb it. But treating discovery as the primary leverage point reflects a model of the defender’s problem that has not been accurate for at least a decade. The vulnerability queue is not empty. It is overflowing. Adding more to it faster, even with the best intentions, is not a security strategy — it is a faster way to drown.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/anthropic-just-gave-defenders-a-firehose-theyre-already-drowning/" data-a2a-title="Anthropic Just Gave Defenders a Firehose. They’re Already Drowning"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fanthropic-just-gave-defenders-a-firehose-theyre-already-drowning%2F&amp;linkname=Anthropic%20Just%20Gave%20Defenders%20a%20Firehose.%20They%E2%80%99re%20Already%20Drowning" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fanthropic-just-gave-defenders-a-firehose-theyre-already-drowning%2F&amp;linkname=Anthropic%20Just%20Gave%20Defenders%20a%20Firehose.%20They%E2%80%99re%20Already%20Drowning" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fanthropic-just-gave-defenders-a-firehose-theyre-already-drowning%2F&amp;linkname=Anthropic%20Just%20Gave%20Defenders%20a%20Firehose.%20They%E2%80%99re%20Already%20Drowning" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fanthropic-just-gave-defenders-a-firehose-theyre-already-drowning%2F&amp;linkname=Anthropic%20Just%20Gave%20Defenders%20a%20Firehose.%20They%E2%80%99re%20Already%20Drowning" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fanthropic-just-gave-defenders-a-firehose-theyre-already-drowning%2F&amp;linkname=Anthropic%20Just%20Gave%20Defenders%20a%20Firehose.%20They%E2%80%99re%20Already%20Drowning" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>

Simply opening a PDF could trigger this Adobe Reader zero-day

  • None
  • Published date: 2026-04-13 00:00:00

None

<p>Opening the wrong PDF in Adobe Reader was enough to let criminals quietly spy on your computer and unleash more attacks, even though everything looked normal.</p><p>A <a href="https://justhaifei1.blogspot.com/2026/04/expmon-detected-sophisticated-zero-day-adobe-reader.html" rel="noreferrer noopener nofollow">researcher</a> analyzed a malicious PDF and found that it abused a previously unknown flaw (a “zero‑day”) in Adobe Acrobat Reader.</p><p>When a victim simply opens this PDF, hidden code inside it can read files that Acrobat Reader should not be allowed to access and send them to an attacker’s server. Some tests show that it allows attackers to pull in additional malicious code from a remote server and run it on the victim’s machine, potentially escaping Adobe’s sandbox protections.</p><p>In its <a href="https://helpx.adobe.com/security/products/acrobat/apsb26-43.html" rel="noreferrer noopener nofollow">security bulletin</a>, Adobe acknowledges that the vulnerability tracked as <a href="https://www.cve.org/CVERecord?id=CVE-2026-34621" rel="noreferrer noopener nofollow">CVE-2026-34621</a>, is being exploited in the wild.</p><p>The issue impacts the following products and versions for both Windows and macOS:</p><ul class="wp-block-list"> <li>Acrobat DC versions 26.001.21367 and earlier (fixed in 26.001.21411)</li> <li>Acrobat Reader DC versions 26.001.21367 and earlier (fixed in 26.001.21411)</li> <li>Acrobat 2024 versions 24.001.30356 and earlier (fixed in 24.001.30362 for Windows and 24.001.30360 for macOS)</li> </ul><p>Exploitation requires you to open a malicious PDF, but nothing more. No extra clicks or permissions are needed. The researcher found malicious samples using this exploit dating back to November 11, 2025.</p><p>Testing showed that a successful exploitation can:</p><ul class="wp-block-list"> <li>Pull in JavaScript from a remote server and execute it inside Adobe Reader.</li> <li>Steal arbitrary local files and send them out, proving real‑world data theft is possible even without a full remote code execution chain.</li> </ul><h2 class="wp-block-heading" id="h-how-to-stay-safe">How to stay safe</h2><p>The easiest way to stay safe is to install the emergency update.</p><p>The latest product versions are available to end users via one of the following methods:    </p><ul class="wp-block-list"> <li><strong>Manually: </strong>Go to Help &gt; Check for updates</li> <li><strong>Automatically: </strong>Updates install without user intervention when detected</li> <li><strong>Direct download: </strong>Available from the <a href="https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fget.adobe.com%2Freader&amp;data=05%7C02%7Cswatson%40adobe.com%7C675bbcff341a4acc045d08dd19d0ba7b%7Cfa7b1b5a7b34438794aed2c178decee1%7C0%7C0%7C638695106463324612%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=xm%2B0ml%2Bsuc%2Fi8pF7Rqy%2BBFuS5u2NYBCchqSGB3DKDDU%3D&amp;reserved=0" rel="noreferrer noopener nofollow">Acrobat Reader Download Center</a></li> </ul><p>For IT administrators (managed environments):</p><ul class="wp-block-list"> <li>Refer to the relevant release notes for installer links</li> <li>Deploy updates using AIP-GPO, bootstrapper, SCUP/SCCM (Windows), or Apple Remote Desktop/SSH (macOS)</li> </ul><p>If you’re unable or unwilling to update right away:</p><ul class="wp-block-list"> <li>Be extra cautious with PDFs from unknown senders or unexpected attachments, even after patching, as attackers may pivot to new variants. </li> <li>Use an up-to-date, real-time <a href="https://www.malwarebytes.com/">anti-malware solution</a> to block known malicious servers and detect malware and exploits.</li> <li>Carefully monitor all HTTP/HTTPS traffic for the  “Adobe Synchronizer” string in the <a href="https://www.malwarebytes.com/blog/news/2017/08/explained-user-agent" rel="noreferrer noopener">User Agent</a> field.</li> </ul><hr class="wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide"><p><strong>We don’t just report on threats—we remove them</strong></p><p>Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by <a href="https://www.malwarebytes.com/for-home">downloading Malwarebytes today</a>.</p><p>The post <a href="https://www.malwarebytes.com/blog/news/2026/04/simply-opening-a-pdf-could-trigger-this-adobe-reader-zero-day">Simply opening a PDF could trigger this Adobe Reader zero-day</a> appeared first on <a href="https://www.malwarebytes.com/">Malwarebytes</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/simply-opening-a-pdf-could-trigger-this-adobe-reader-zero-day/" data-a2a-title="Simply opening a PDF could trigger this Adobe Reader zero-day"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fsimply-opening-a-pdf-could-trigger-this-adobe-reader-zero-day%2F&amp;linkname=Simply%20opening%20a%20PDF%20could%20trigger%20this%20Adobe%20Reader%20zero-day" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fsimply-opening-a-pdf-could-trigger-this-adobe-reader-zero-day%2F&amp;linkname=Simply%20opening%20a%20PDF%20could%20trigger%20this%20Adobe%20Reader%20zero-day" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fsimply-opening-a-pdf-could-trigger-this-adobe-reader-zero-day%2F&amp;linkname=Simply%20opening%20a%20PDF%20could%20trigger%20this%20Adobe%20Reader%20zero-day" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fsimply-opening-a-pdf-could-trigger-this-adobe-reader-zero-day%2F&amp;linkname=Simply%20opening%20a%20PDF%20could%20trigger%20this%20Adobe%20Reader%20zero-day" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fsimply-opening-a-pdf-could-trigger-this-adobe-reader-zero-day%2F&amp;linkname=Simply%20opening%20a%20PDF%20could%20trigger%20this%20Adobe%20Reader%20zero-day" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.malwarebytes.com/">Malwarebytes</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Malwarebytes">Malwarebytes</a>. Read the original post at: <a href="https://www.malwarebytes.com/blog/news/2026/04/simply-opening-a-pdf-could-trigger-this-adobe-reader-zero-day">https://www.malwarebytes.com/blog/news/2026/04/simply-opening-a-pdf-could-trigger-this-adobe-reader-zero-day</a> </p>

CEOs: You Don’t Add AI. You Rebuild for It.

  • None
  • Published date: 2026-04-13 00:00:00

None

<h2>Why Most AI Strategies Fail Before They Scale</h2><p><a href="https://www.ishir.com/artificial-intelligence.htm" rel="noopener">Artificial intelligence</a> has moved from experimentation to expectation. Nearly every enterprise has deployed AI in some form. Yet most organizations are not seeing meaningful enterprise-wide impact.</p><p>According to McKinsey &amp; Company, the gap is not in the technology. The gap is in how companies operate around it.</p><p>Their latest research shows a clear pattern. The companies capturing real value from AI are not treating it as a feature or a tool. They are redesigning workflows, redefining roles, and restructuring how decisions get made.</p><p>The conclusion is direct. AI does not create value by being added to existing systems. It creates value when the organization itself is rewired.</p><p>If your strategy is to layer AI on top of legacy processes, you are not transforming. You are delaying.</p><h2>The Real Shift: From Tools to Operating Model</h2><p>Most leadership teams approach AI as a capability upgrade. Better analytics. Faster automation. Improved reporting.</p><p>This mindset limits outcomes because it assumes the existing system still works.</p><p><strong>AI changes three foundational elements of a business:</strong></p><p><strong>1. Inputs</strong><br> Data becomes dynamic, continuous, and increasingly proprietary</p><p><strong>2. Workflows</strong><br> Tasks shift from human-led execution to agent-assisted orchestration</p><p><strong>3. Value creation</strong><br> Speed, iteration, and intelligence become competitive advantages</p><p>When those three elements change, the operating model must change with them.</p><p>McKinsey’s research reinforces this. Among all factors studied, redesigning workflows had the highest impact on financial outcomes from AI adoption.</p><p>That is the signal most organizations are missing.</p><h2>Why “Bolt-On AI” Fails</h2><p>Many companies fall into the same pattern:</p><ul> <li>Add a chatbot to customer support</li> <li>Use AI for internal reporting</li> <li>Automate isolated workflows</li> </ul><p>These initiatives create incremental improvements. They rarely create strategic advantage.</p><p>The reason is simple. Legacy processes remain intact. Decision latency stays the same. Organizational friction is unchanged.</p><p>AI ends up adapting to the business, instead of the <a href="https://www.ishir.com/blog/137126/how-does-one-create-an-ai-future-in-your-business.htm" rel="noopener">business adapting to AI</a>.</p><p><strong>This leads to three failure modes:</strong></p><p><strong>1. Fragmentation</strong><br> AI exists in silos with no compounding effect</p><p><strong>2. Underutilization</strong><br> Teams do not change how they work, so productivity gains stall</p><p><strong>3. Misaligned incentives</strong><br> Success metrics remain tied to old processes, not new outcomes</p><p>The result is predictable. Activity increases. Impact does not.</p><h4><strong>The Companies That Are Winning</strong></h4><p>A different pattern is emerging among companies that are seeing results.</p><p>They are not asking where AI fits.</p><p>They are asking how the business should operate if AI were native.</p><p><strong>These organizations are:</strong></p><ul> <li>Rebuilding workflows end to end</li> <li><a href="https://www.ishir.com/generative-ai-solutions.htm" rel="noopener">Embedding AI</a> into decision-making layers</li> <li>Creating new roles aligned to AI-driven execution</li> <li>Treating data as a strategic asset, not a byproduct</li> </ul><p><strong>They are moving from:</strong></p><p>Human → Software → Outcome</p><p>to</p><p>Human → AI Agent → Software → Outcome</p><p>This shift compresses time, reduces friction, and increases decision velocity. It also changes how teams are structured.</p><p>We are already seeing early signals of this in the market, including flatter organizations and fewer management layers as<a href="https://www.ishir.com/ai-agent-development-services.htm" rel="noopener"> AI agents</a> take on coordination and execution roles.</p><h4><strong>The Three-Step Roadmap to Rebuild for AI</strong></h4><p>Based on what is working across companies, there is a clear path forward.</p><h4><strong>Step 1: Audit Ruthlessly</strong></h4><p>Start by mapping your current system in detail.</p><ul> <li>Core processes</li> <li>Decision points</li> <li>Metrics and KPIs</li> <li>Bottlenecks and delays</li> </ul><p>Identify which parts of the system are repeatable, rule-based, or data-driven. These are your first candidates for AI agents.</p><p>This is not a surface-level exercise. Most organizations underestimate how much hidden complexity exists in their workflows.</p><p>The goal is clarity, not speed.</p><h4><strong>Step 2: Re-Architect Around Outcomes</strong></h4><p>Once you understand the system, redesign it from first principles.</p><p>Do not ask how AI fits into the current workflow.</p><p>Ask what the workflow should look like if AI and humans worked together from the start.</p><p><strong>This includes:</strong></p><ul> <li>Defining <a href="https://www.ishir.com/blog/312060/human-in-the-loop-vs-autonomous-development-for-enterprise-software.htm" rel="noopener">roles for humans and AI agents</a></li> <li>Establishing guardrails and governance</li> <li>Designing escalation paths</li> <li>Aligning incentives with outcomes, not activity</li> </ul><p>This step often requires difficult decisions.</p><p>Some processes will need to be eliminated. Others will need to be rebuilt entirely.</p><p>This is where most organizations hesitate. It is also where most of the value is created.</p><h4><strong>Step 3: Lock in Differentiated Data and IP</strong></h4><p><a href="https://www.ishir.com/blog/203185/top-ai-app-builders-showdown-speed-features-pricing-which-one-wins-in-2025.htm" rel="noopener">AI models</a> are becoming more accessible. The advantage is shifting away from the models themselves.</p><p><strong>The real edge comes from:</strong></p><ul> <li>Proprietary data</li> <li>Unique workflows</li> <li>Institutional knowledge</li> </ul><p>Organizations that continue to treat their data as public or disposable will lose this advantage.</p><p><strong>Instead:</strong></p><ul> <li><a href="https://www.ishir.com/modern-data-infrastructure.htm" rel="noopener">Build private data pipelines</a></li> <li>Create internal knowledge systems</li> <li>Use AI to continuously improve these assets</li> </ul><p>Your data becomes your moat.</p><h2>Where to Start: Quick Wins That Create Momentum</h2><p>Full transformation takes time. Momentum starts with targeted wins.</p><p><strong>Three areas consistently deliver early results:</strong></p><p><strong>1. Financial Reconciliation</strong></p><p>Automating repetitive financial processes reduces errors and frees up time for higher-value work.</p><p><strong>2. Customer Support Triage</strong></p><p>AI agents can classify, prioritize, and route customer issues instantly, improving response times and experience.</p><p><strong>3. Market Research and Intelligence</strong></p><p>Automating data collection and synthesis enables faster decision-making and better strategic insight.</p><p><strong>These use cases share three characteristics:</strong></p><ul> <li>High volume</li> <li>Clear rules</li> <li>Measurable outcomes</li> </ul><p><strong>Track impact across:</strong></p><ul> <li>Time saved</li> <li>Error reduction</li> <li>Revenue influence</li> </ul><p>Use these results to fund deeper transformation.</p><h2>The Role of Leadership: This Is a CEO Problem</h2><p>AI transformation is not a technology initiative.</p><p>It is a leadership decision. McKinsey’s research shows that CEO involvement in AI governance correlates strongly with financial impact.</p><p>This is not surprising.</p><p><strong>Rebuilding workflows requires:</strong></p><ul> <li>Organizational alignment</li> <li>Resource allocation</li> <li>Cultural change</li> </ul><p>These do not happen without executive ownership.</p><p>If leadership treats AI as a side project, the organization will do the same.</p><h2>Organizational Resistance: The Real Barrier</h2><p>The biggest obstacle to AI adoption is not technical.</p><p>It is organizational inertia.</p><p><strong>Common patterns include:</strong></p><ul> <li>Teams protecting existing processes</li> <li>Leaders optimizing for short-term stability</li> <li>Misaligned incentives that discourage change</li> </ul><p>To move forward, leadership must address this directly.</p><p><strong>Ask one question:</strong></p><p>If a competitor rebuilt your business from scratch using AI, what would they do differently?</p><p>Then start there.</p><h2>AI as an Operating System, Not a Feature</h2><p>The shift happening right now is similar to previous platform shifts.</p><p>Cloud changed infrastructure. Mobile changed interfaces.</p><p>AI is changing how work gets done.</p><p>This is not incremental. It is foundational.</p><p><strong>Organizations that treat AI as an operating system will:</strong></p><ul> <li>Move faster</li> <li>Learn faster</li> <li>Adapt faster</li> </ul><p>Organizations that treat it as a feature will struggle to keep up.</p><h2>How ISHIR Helps Organizations Rebuild for AI</h2><p>At ISHIR, we work with founders, CIOs, and enterprise leaders to move from AI experimentation to <a href="https://www.ishir.com/software-product-development.htm" rel="noopener">AI-native execution</a>.</p><p>Our approach focuses on clarity before build.</p><p><strong>We help organizations:</strong></p><ul> <li>Audit and map current workflows and decision systems</li> <li>Identify high-impact AI opportunities aligned to business outcomes</li> <li>Design AI-native operating models with clear roles, governance, and guardrails</li> <li>Build and deploy agentic workflows that integrate into real business processes</li> <li><a href="https://www.ishir.com/data-ai-acceleration.htm" rel="noopener">Establish data &amp; AI strategies</a> that create long-term competitive advantage</li> </ul><p>We combine strategy, product thinking, and engineering to ensure AI is not just implemented, but embedded into how the business operates.</p><p>We serve clients in Dallas Fort Worth, Austin, Houston and San Antonio Texas, Singapore and UAE (Abu Dhabi, Dubai) with teams in India, Asia, LATAM and East Europe.</p><h4><strong>The Bottom Line</strong></h4><p>AI will not transform your business by itself.</p><p>The transformation happens when you redesign how your business runs.</p><p><strong>This requires:</strong></p><ul> <li>Clarity over speed</li> <li>Leadership over delegation</li> <li>Rebuilding over patching</li> </ul><p>The companies that move first will define the new standard.</p><p>The rest will be forced to follow.</p><div class="ctaThreeWrapper"> <div class="ctaThreeContent"> <div class="ctaThreeConList"> <div class="content"> <h2>Stop bolting AI onto your old operating model, rebuild it from the ground up</h2> <p><span data-teams="true">Schedule a call with ISHIR to map your three-step AI operating model transformation and identify your first high-impact quick wins.</span></p> <div class="linkWrapper"><a href="https://www.ishir.com/get-in-touch.htm" rel="noopener">Get Started</a></div> </div> </div> </div> </div><h2>FAQs</h2><h4><strong>Q. Why do most AI initiatives fail to deliver business value?</strong></h4><p>Most AI initiatives fail because they are implemented without changing the underlying workflows. Organizations add AI tools but continue operating with legacy processes, which limits impact. Without redesigning how work is done, AI becomes an isolated improvement rather than a multiplier. Value comes when AI is embedded into decision-making and execution layers. That requires organizational change, not just technical deployment.</p><h4><strong>Q. What does “organizational rewiring” mean in the context of AI?</strong></h4><p>Organizational rewiring refers to redesigning workflows, roles, and decision-making structures to align with AI capabilities. It involves changing how teams operate, how data flows, and how outcomes are measured. Instead of adapting AI to existing systems, companies rebuild systems around AI. This includes governance, incentives, and collaboration between humans and AI agents. The goal is to create a system where AI drives continuous improvement.</p><h4><strong>Q. How should CEOs approach AI transformation?</strong></h4><p>CEOs should treat AI as a core business transformation, not a technology initiative. This means owning the strategy, aligning leadership, and driving accountability across the organization. AI requires changes in processes, talent, and culture, which only leadership can enforce. CEOs must also define clear success metrics tied to business outcomes. Without executive ownership, AI efforts remain fragmented.</p><h4><strong>Q. What are the first steps to becoming an AI-native organization?</strong></h4><p>The first step is to audit current workflows and identify repeatable processes. Next, redesign these workflows to incorporate AI and human collaboration. Finally, build a data strategy that supports continuous learning and improvement. Organizations should start with high-impact use cases to build momentum. Over time, these efforts expand into broader transformation.</p><h4><strong>Q. What are AI agents and why do they matter?</strong></h4><p>AI agents are systems that can perform tasks, make decisions, and interact with other systems autonomously. They go beyond basic automation by handling multi-step workflows. This allows organizations to scale operations without increasing headcount. AI agents also enable faster decision-making and reduce operational friction. They are becoming a core component of modern operating models.</p><h4><strong>Q. How do you identify the best AI use cases?</strong></h4><p>The best use cases are processes that are repetitive, data-driven, and high volume. These areas provide clear opportunities for automation and measurable impact. Organizations should focus on workflows where errors are costly or time consumption is high. Early wins often come from finance, customer support, and research functions. These use cases create proof points for broader adoption.</p><h4><strong>Q. What role does data play in AI transformation?</strong></h4><p>Data is the foundation of AI performance and differentiation. Proprietary data enables better models, insights, and decision-making. Organizations that build strong data pipelines gain a long-term advantage. Data should be treated as a strategic asset, not a byproduct. Investing in data quality and governance is critical for success.</p><h4><strong>Q. How long does AI transformation take?</strong></h4><p>AI transformation is an ongoing process rather than a fixed timeline. Initial results can be achieved within weeks through targeted use cases. However, full organizational transformation takes months or years. The key is to maintain momentum through continuous iteration. Organizations that move consistently outperform those that delay.</p><h4><strong>Q. What are common mistakes in AI adoption?</strong></h4><p>Common mistakes include focusing on tools instead of outcomes, underestimating change management, and failing to align incentives. Many organizations also neglect data quality and governance. Another mistake is treating AI as a one-time project rather than a continuous capability. Avoiding these pitfalls requires a structured approach.</p><h4><strong>Q. How do you measure AI ROI?</strong></h4><p>AI ROI should be measured using business outcomes such as revenue growth, cost reduction, and productivity gains. Metrics should include time saved, error rates, and customer satisfaction. Organizations should also track adoption and usage rates. Clear KPIs are essential for scaling AI initiatives. Without measurement, impact remains unclear.</p><h4><strong>Q. How does AI change team structures?</strong></h4><p>AI enables smaller, more efficient teams by automating routine tasks. It also reduces the need for multiple management layers. Teams become more cross-functional and outcome-driven. New roles emerge around AI strategy, governance, and operations. This leads to a more agile organization.</p><h4><strong>Q. What industries benefit most from AI?</strong></h4><p>AI has applications across all industries, including finance, healthcare, retail, and manufacturing. The impact is greatest in areas with large data sets and repetitive processes. Service operations, marketing, and product development are common starting points. Each industry has unique opportunities based on its data and workflows. The key is aligning AI with business objectives.</p><h4><strong>Q. How do you manage risks associated with AI?</strong></h4><p>Managing AI risks requires governance, monitoring, and clear policies. Organizations should address issues such as data privacy, bias, and accuracy. Human oversight remains important, especially in critical decisions. Regular audits and feedback loops help improve performance. Risk management should be integrated into the AI lifecycle.</p><h4><strong>Q. What is the difference between AI-enabled and AI-native organizations?</strong></h4><p>AI-enabled organizations use AI to improve existing processes. AI-native organizations design their operations around AI from the start. The difference lies in how deeply AI is integrated into workflows. AI-native companies achieve greater speed and efficiency. They also adapt more quickly to change.</p><h4><strong>Q. How can ISHIR support AI transformation?</strong></h4><p>ISHIR provides end-to-end support for AI transformation, from strategy to execution. We help organizations identify opportunities, redesign workflows, and deploy AI solutions. Our approach ensures alignment between technology and business outcomes. We also support governance, data strategy, and scaling. This enables sustainable, long-term impact.</p><p>The post <a href="https://www.ishir.com/blog/319979/ai-transformation-rebuild-operating-model-ceo-guide.htm">CEOs: You Don’t Add AI. You Rebuild for It.</a> appeared first on <a href="https://www.ishir.com/">ISHIR | Custom AI Software Development Dallas Fort-Worth Texas</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/ceos-you-dont-add-ai-you-rebuild-for-it/" data-a2a-title="CEOs: You Don’t Add AI. You Rebuild for It."><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fceos-you-dont-add-ai-you-rebuild-for-it%2F&amp;linkname=CEOs%3A%20You%20Don%E2%80%99t%20Add%20AI.%20You%20Rebuild%20for%20It." title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fceos-you-dont-add-ai-you-rebuild-for-it%2F&amp;linkname=CEOs%3A%20You%20Don%E2%80%99t%20Add%20AI.%20You%20Rebuild%20for%20It." title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fceos-you-dont-add-ai-you-rebuild-for-it%2F&amp;linkname=CEOs%3A%20You%20Don%E2%80%99t%20Add%20AI.%20You%20Rebuild%20for%20It." title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fceos-you-dont-add-ai-you-rebuild-for-it%2F&amp;linkname=CEOs%3A%20You%20Don%E2%80%99t%20Add%20AI.%20You%20Rebuild%20for%20It." title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fceos-you-dont-add-ai-you-rebuild-for-it%2F&amp;linkname=CEOs%3A%20You%20Don%E2%80%99t%20Add%20AI.%20You%20Rebuild%20for%20It." title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.ishir.com/">ISHIR | Custom AI Software Development Dallas Fort-Worth Texas</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Rishi Khanna">Rishi Khanna</a>. Read the original post at: <a href="https://www.ishir.com/blog/319979/ai-transformation-rebuild-operating-model-ceo-guide.htm">https://www.ishir.com/blog/319979/ai-transformation-rebuild-operating-model-ceo-guide.htm</a> </p>

Anthropic Mythos AI Model Strikes Fear in Trump Administration, U.S. Banks

  • Jeffrey Burt
  • Published date: 2026-04-12 00:00:00

None

<p>Anthropic’s new AI model, which is so good at detecting software vulnerabilities – and creating code to exploit them – that the vendor refused to widely release it, reportedly caught the attention of Trump Administration officials who felt it was dangerous enough to warn financial services organizations.</p><p>Treasury Secretary Scott Bessent and Jerome Powell, chairman of the Federal Reserve, late last week reportedly met with a group of CEOs of several U.S. banks – including Citi, Bank of America, and Wells Fargo – to warn them about the cybersecurity risks that <a href="https://securityboulevard.com/2026/04/openai-readies-rollout-of-new-cyber-model-as-industry-shifts-to-defense/" target="_blank" rel="noopener">Anthropic’s Claude Mythos Preview</a> poses if it’s used by nation-state or financially motivated bad actors.</p><p><a href="https://www.nytimes.com/2026/04/10/business/anthropic-claude-mythos-preview-banks.html?smid=nytcore-android-share" target="_blank" rel="noopener">According to The New York Times</a>, Bessent told the CEOs that deploying Mythos Preview could put their customers’ sensitive data at risk.</p><p>The CEOs already were in Washington, D.C. for a lobby group meeting, and CNBC <a href="https://www.cnbc.com/2026/04/10/powell-bessent-us-bank-ceos-anthropic-mythos-ai-cyber.html" target="_blank" rel="noopener">described the get-together</a> with Bessent and Powell as a “surprise meeting.”</p><p>A Treasury spokesperson told The New York Times that the meeting “was convened by Secretary Bessent to initiate a process for planning and coordination of our approach to the rapid developments taking place in AI.”</p><p>The meeting was first <a href="https://www.bloomberg.com/news/articles/2026-04-10/anthropic-model-scare-sparks-urgent-bessent-powell-warning-to-bank-ceos" target="_blank" rel="noopener">reported by Bloomberg</a>. Financial regulators in the UK are also <a href="https://www.ft.com/content/ec7bb366-9643-47ce-9909-fc5ad4864ae5?syn-25a6b1a6=1" target="_blank" rel="noopener">reviewing the cybersecurity implications</a> of Mythos Preview, according to the Financial Times, and Bloomberg reported that the Bank of England will <a href="https://www.bloomberg.com/news/articles/2026-04-11/bank-of-england-set-to-discuss-anthropic-s-mythos-with-banks" target="_blank" rel="noopener">discuss the AI model</a> with banks in that country.</p><h3>Mythos Preview’s Promise, Threat</h3><p>Anthropic announced Mythos Preview earlier this month, noting that company scientists used the frontier model to find thousands of zero-day vulnerabilities, many of them critical and some that have been around but undetected for decades. The flaws were found in every major operating system and web browser.</p><p>In <a href="https://www.anthropic.com/glasswing" target="_blank" rel="noopener">a blog post</a> about the frontier AI model, Anthropic executives credited its strong agentic coding and reasoning skills for its “powerful cyber capabilities.” It was able to identify the vulnerabilities and create code to exploit them without any human intervention.</p><p>“Claude Mythos Preview demonstrates a leap in these cyber skills – the vulnerabilities it has spotted have in some cases survived decades of human review and millions of automated security tests, and the exploits it develops are increasingly sophisticated,” they wrote, adding that without needed safeguards, the cyber capabilities in frontier models like Mythos Preview “could be used to exploit the many existing flaws in the world’s most important software. This could make cyberattacks of all kinds much more frequent and destructive, and empower adversaries of the United States and its allies.”</p><h3>Enter Project Glasswing</h3><p>Anthropic is making Mythos Preview the foundation of <a href="https://www.anthropic.com/project/glasswing" target="_blank" rel="noopener">Project Glasswing</a>, an initiative to make software more secure. The company is making Mythos Preview available to a small number of organizations, including hyperscalers like Amazon Web Services, Google and Microsoft, security vendors like CrowdStrike and Palo Alto Networks, and infrastructure and device vendors like Broadcom, Apple and Nvidia. Also, JPMorgan Chase and The Linux Foundation will have access.</p><p>The goal is to use the AI model to strengthen the security of their software.</p><p>In addition, Anthropic has been speaking with U.S. government officials about the offensive and defensive capabilities of Mythos Preview, noting that securing the nation’s critical infrastructure – a target of cyber operations of adversaries like <a href="https://securityboulevard.com/2025/10/chinas-flax-typhoon-exploits-arcgis-app-for-year-long-persistence/" target="_blank" rel="noopener">China</a>, <a href="https://securityboulevard.com/2026/01/russias-crackdown-on-probiv-data-leaks-may-have-fed-the-beast-instead/" target="_blank" rel="noopener">Russia</a>, <a href="https://securityboulevard.com/2026/04/iranian-attackers-are-targeting-u-s-energy-water-systems-federal-agencies-say/" target="_blank" rel="noopener">Iran</a> and <a href="https://devops.com/north-korean-hackers-suspected-in-supply-chain-attack-on-popular-axios-project/" target="_blank" rel="noopener">North Korea</a> – is a priority for the United States, as it is for other democratic countries.</p><h3>A Warning from JPMorgan</h3><p>Jamie Dimon, CEO of JPMorgan, was the only top executive of a U.S. bank who couldn’t make it to the meeting with Bessent and Powell. In a <a href="https://www.jpmorganchase.com/ir/annual-report/2025/ar-ceo-letters" target="_blank" rel="noopener">letter to shareholders</a> earlier this month, Dimon lauded the advantages that AI will bring, but also warned of the cybersecurity threats, from deepfakes to information to vulnerabilities.</p><p>“These risks are real, but they are manageable if companies, regulators and governments prepare,” he wrote. “The worst mistakes we can make are predictable: overreact at the first serious incident and regulate out important innovation or underreact and fail to learn from what went wrong.”</p><p>Anthropic has had its share of recent security issues. A human error involving a release package led to the <a href="https://www.cnbc.com/2026/03/31/anthropic-leak-claude-code-internal-source.html" target="_blank" rel="noopener">leaking of some of the internal source code</a> for its Claude Code coding assistant. In addition, LayerX researchers last week said protections in Claude Code <a href="https://devops.com/layerx-anthropics-claude-code-can-easily-be-easily-weaponized/" target="_blank" rel="noopener">can easily be hacked</a> and used as a tool to launch cyberattacks, hack into websites, and develop new vulnerabilities.</p><p>This also comes as Anthropic pushes back at the U.S. Defense Department for labeling it as a supply chain risk that threatens national security. Company executives claim the Trump Administration is using the label to punish Anthropic for refusing to bend on limits for the use of its AI technology in warfare.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/anthropic-mythos-ai-model-strikes-fear-in-trump-administration-u-s-banks/" data-a2a-title="Anthropic Mythos AI Model Strikes Fear in Trump Administration, U.S. Banks"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fanthropic-mythos-ai-model-strikes-fear-in-trump-administration-u-s-banks%2F&amp;linkname=Anthropic%20Mythos%20AI%20Model%20Strikes%20Fear%20in%20Trump%20Administration%2C%20U.S.%20Banks" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fanthropic-mythos-ai-model-strikes-fear-in-trump-administration-u-s-banks%2F&amp;linkname=Anthropic%20Mythos%20AI%20Model%20Strikes%20Fear%20in%20Trump%20Administration%2C%20U.S.%20Banks" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fanthropic-mythos-ai-model-strikes-fear-in-trump-administration-u-s-banks%2F&amp;linkname=Anthropic%20Mythos%20AI%20Model%20Strikes%20Fear%20in%20Trump%20Administration%2C%20U.S.%20Banks" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fanthropic-mythos-ai-model-strikes-fear-in-trump-administration-u-s-banks%2F&amp;linkname=Anthropic%20Mythos%20AI%20Model%20Strikes%20Fear%20in%20Trump%20Administration%2C%20U.S.%20Banks" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fanthropic-mythos-ai-model-strikes-fear-in-trump-administration-u-s-banks%2F&amp;linkname=Anthropic%20Mythos%20AI%20Model%20Strikes%20Fear%20in%20Trump%20Administration%2C%20U.S.%20Banks" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>

How to scale NHI systems for large enterprises?

  • None
  • Published date: 2026-04-12 00:00:00

None

<h2>What is the Role of Non-Human Identities in Large Enterprises?</h2><p>Where technological processes are increasingly automated, the question arises: How do enterprises manage and secure their numerous machine identities? With the growing reliance on cloud computing, large enterprises face unique challenges in managing Non-Human Identities (NHIs). Understanding these identities, or machine identities, is pivotal for ensuring robust cybersecurity.</p><p>Machine identities function much like human identities by interacting with various systems and storing sensitive data. These NHIs are essentially a combination of a “Secret”—which could be an encrypted password, token, or cryptographic key—and the permissions granted to them by destination servers. While most prominent in financial services and healthcare sectors, NHIs are becoming integral to industries such as travel and DevOps. Managing NHIs in cloud environments is a strategic step towards ensuring a secure digital infrastructure.</p><h3>Why Effective Management of NHIs Matters</h3><p>Managing NHIs effectively is not merely a technical requirement but a strategic imperative for enterprises. Proper management of NHIs offers numerous benefits that collectively enhance an organization’s security posture.</p><p>– <strong>Reduced Risk:</strong> Proactively identifying and mitigating risks reduces potential security breaches and data leaks. This is essential when vigilant against cyber threats.</p><p>– <strong>Improved Compliance:</strong> Policies and audit trails ensure organizations meet stringent regulatory standards, a necessity in sectors like finance and healthcare.</p><p>– <strong>Increased Efficiency:</strong> Automating the management of NHIs allows security teams to focus on more strategic initiatives rather than mundane tasks.</p><p>– <strong>Enhanced Visibility and Control:</strong> A centralized view of NHIs offers better governance and access management, further fortifying the enterprise’s security framework.</p><p>– <strong>Cost Savings:</strong> Operational costs are reduced through automation, such as secrets rotation and the decommissioning of obsolete NHIs.</p><p>The combination of these benefits positions enterprises to tackle increasing security challenges efficiently and effectively.</p><h3>Strategies for Scaling NHI Systems in Large Enterprises</h3><p>Where enterprises grow, so do their NHI systems, which leads to increased complexity and potential security gaps. Addressing these challenges involves a comprehensive approach to scaling NHI systems:</p><p>1. <strong>Discovery and Classification:</strong> Begin by identifying all NHIs. Classifying them based on risk, function, and criticality helps prioritize management efforts.</p><p>2. <strong>Threat Detection and Remediation:</strong> Utilize advanced analytics to monitor NHI activities for anomalies. Early detection of potential threats allows for quick remediation, minimizing damage.</p><p>3. <strong>Lifecycle Management:</strong> Adopt a holistic approach to managing the lifecycle of NHIs—from creation and usage to eventual decommissioning. This helps maintain an efficient security environment.</p><p>4. <strong>Integration with Security Tools:</strong> Integrating NHI management with existing security tools, such as Identity and Access Management (IAM) systems, enhances overall security.</p><p>5. <strong>Automation:</strong> Leverage automation for tasks like secrets rotation and permission adjustments to improve efficiency and reduce human error.</p><p>For those enterprises on the path to scaling their NHI systems, these strategies can serve as a blueprint for strengthening their security frameworks.</p><h3>The Importance of Bridging Security and R&amp;D Teams</h3><p>The disconnect between security and Research and Development (R&amp;D) teams often leads to vulnerabilities in managing NHIs. It is crucial to foster collaboration between these teams to create a secure cloud environment. By aligning security protocols with the innovative processes of R&amp;D teams, enterprises can ensure that security measures are woven into the very fabric of product development and deployment.</p><p>This collaboration is vital not just in theory but in practice. In finance, for instance, ensuring the collaboration between security and compliance teams helps organizations meet regulatory standards more effectively. This is further explained in detail in the <a href="https://entro.security/blog/non-human-identities-and-data-security-in-financial-services/">Non-Human Identities and Data Security in Financial Services</a> blog post.</p><h3>Valuable Insights into NHI Management</h3><p>Data-driven insights play a crucial role in managing NHIs effectively. Information about ownership, permissions, usage patterns, and vulnerabilities provides context-aware security. For example, identifying unusual patterns in machine identity usage can signal potential security threats, prompting further investigation.</p><p>Creating robust systems for monitoring and analyzing such data ensures that enterprises are alerted to risks before they materialize into breaches. When organizations grow, maintaining this level of vigilance becomes more challenging but also more critical.</p><p><b>References:</b></p><p>For insights into how NHI management supports <a href="https://entro.security/blog/secrets-security-and-soc2-compliance/">Secrets Security and SOC2 Compliance</a>, this article offers valuable perspectives.</p><p>Discover more about overcoming challenges in <a href="https://entro.security/blog/challenges-and-best-practices-in-iac-secrets-security/">IAC Secrets Security</a> to strengthen your enterprise’s security posture.</p><p>In conclusion, when enterprises increasingly depend on machine identities to drive operational efficiency and innovation, the need for scalable, secure, and efficient NHI management becomes paramount. By adopting strategic approaches and fostering collaboration between teams, organizations can achieve greater security and compliance, ultimately paving the way for sustained growth and success.</p><h3>Unpacking the Complexities of NHI Management in the Cloud</h3><p>Have you ever wondered how the rapid shift to cloud environments affects cybersecurity? Large enterprises must increasingly consider the implications of cloud adoption on their NHI management strategies. Cloud environments introduce numerous challenges due to their distributed nature, which, while offering flexibility, also presents potential security vulnerabilities.</p><p>Where organizations migrate to the cloud, the proliferation of NHIs—machine identities that are critical for executing automated processes—becomes more complex. This increased complexity necessitates a comprehensive management strategy to secure these identities and maintain the integrity of enterprise systems. Understanding requires dissecting the specific challenges associated with cloud-based NHI management and how enterprises can effectively navigate them.</p><h3>Key Challenges in Cloud-Based NHI Management</h3><p>The management of NHIs in cloud environments performs a delicate balancing act, maintaining both the security and usability of digital operations. Below are key challenges facing NHI management in the cloud:</p><ul> <li><strong>Distributed Infrastructure:</strong> The decentralized nature of cloud infrastructures can make it difficult to enforce consistent security protocols across all systems and locations. NHIs may have access to multiple cloud resources, escalating the risk of unauthorized access if not properly managed.</li> <li><strong>Dynamic Environments:</strong> With cloud environments frequently change—adding and removing resources as needed—tracking and securing NHIs becomes a moving target. Employing proactive measures such as continuous monitoring is critical to recognize changes promptly and secure NHIs effectively.</li> <li><strong>Complex Access Patterns:</strong> Unlike traditional data centers, the cloud permits more diverse and intricate access patterns, necessitating a more granular approach to permissions and roles management.</li> <li><strong>Integration Challenges:</strong> Moving to the cloud often involves the integration of legacy systems with new technology stacks. Ensuring NHIs are consistently managed across these disparate systems requires synchronized efforts between information technology (IT) and security teams.</li> </ul><p>Addressing these issues demands collaboration across an organization, binding the security, IT, and development teams in a cohesive strategy to manage NHIs efficiently.</p><h3>Bridging the Gap: Collaboration is Key</h3><p>How do teams work together to ensure effective NHI management in the cloud? Bringing security, R&amp;D, and IT teams on the same page is essential. This synergy ensures NHIs are well-integrated into cloud solutions without sacrificing security.</p><p>Effective collaboration involves regular communication channels and shared objectives. By fostering an environment where these teams work hand-in-hand, enterprises can mitigate the risk of misalignment that leads to vulnerabilities. This collaboration not only streamlines NHI management but allows enterprises to keep up with innovations without compromising security, as echoed in many industry success stories.</p><h3>Implementing NHI Management Best Practices</h3><p>In aiming to secure NHIs within complex cloud operations, organizations can apply several best practices to enhance efficacy:</p><p>1. <strong>Continuous Monitoring:</strong> Implementing real-time monitoring systems to track activities associated with NHIs is crucial. This not only focuses on immediate threats but also learns the access trends over time to identify anomalies and potential breaches early.</p><p>2. <strong>Role-Based Access Control (RBAC):</strong> Using RBAC, businesses can assign appropriate permissions to NHIs, adhering to the principle of least privilege to reduce over-provided access, thereby limiting potential security breaches.</p><p>3. <strong>Regular Audits and Reporting:</strong> Periodic audits of NHIs ensure they are functioning as intended and aligned with compliance requirements. Detailed reporting reinforces a secure environment through a regulated review process.</p><p>4. <strong>Automated Secret Management:</strong> A critical part of securing NHIs is managing their secrets efficiently. Automating this process minimizes human error and keeps these credentials updated with minimal disruption to operations.</p><p>Further insights into maintaining secrets security during the development stage can be explored in an article that delves into <a href="https://entro.security/blog/best-practices-maintaining-secrets-security-in-development-stage/">Best Practices for Maintaining Secrets Security in Development</a>.</p><p>The strategic imperative of managing NHIs in large enterprises cannot be overstated. While industries evolve, so must the tactics employed to secure these machine identities. The intricacies of cloud-based environments necessitate a robust, coordinated approach combining technologies and inter-departmental cooperation.</p><p>Engaging with contemporary solutions while adhering to time-tested best practices empowers organizations to harness the power of NHIs without succumbing to security threats. By understanding the dynamic interactions between NHIs and cloud infrastructure, enterprises are better positioned to cultivate a security-conscious corporate culture. Maintaining vigilance and adaptability is not just beneficial; it is essential for sustained operational success.</p><p>Organizations can explore deeper into managing NHI permissions and security on our <a href="https://entro.security/blog/use-case-secure-non-human-identities/">Use Case for Secure Non-Human Identities</a>, as the emphasis on NHIs continues to be a winding yet vital path to ensuring the future success of businesses.</p><p>The post <a href="https://entro.security/how-to-scale-nhi-systems-for-large-enterprises/">How to scale NHI systems for large enterprises?</a> appeared first on <a href="https://entro.security/">Entro</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/how-to-scale-nhi-systems-for-large-enterprises/" data-a2a-title="How to scale NHI systems for large enterprises?"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fhow-to-scale-nhi-systems-for-large-enterprises%2F&amp;linkname=How%20to%20scale%20NHI%20systems%20for%20large%20enterprises%3F" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fhow-to-scale-nhi-systems-for-large-enterprises%2F&amp;linkname=How%20to%20scale%20NHI%20systems%20for%20large%20enterprises%3F" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fhow-to-scale-nhi-systems-for-large-enterprises%2F&amp;linkname=How%20to%20scale%20NHI%20systems%20for%20large%20enterprises%3F" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fhow-to-scale-nhi-systems-for-large-enterprises%2F&amp;linkname=How%20to%20scale%20NHI%20systems%20for%20large%20enterprises%3F" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fhow-to-scale-nhi-systems-for-large-enterprises%2F&amp;linkname=How%20to%20scale%20NHI%20systems%20for%20large%20enterprises%3F" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://entro.security/">Entro</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Alison Mack">Alison Mack</a>. Read the original post at: <a href="https://entro.security/how-to-scale-nhi-systems-for-large-enterprises/">https://entro.security/how-to-scale-nhi-systems-for-large-enterprises/</a> </p>

19 Billion Passwords Leaked: Protect Yourself from Cyber Threats

  • None
  • Published date: 2026-04-12 00:00:00

None

<p>In one of the most significant cybersecurity breaches, researchers have uncovered a massive repository containing over <strong>19 billion compromised passwords</strong>, the largest publicly indexed trove of stolen credentials ever recorded. This collection, dubbed "RockYou2024," aggregates data from <strong>more than 200 recent breaches</strong> over the past year, making it a potent weapon for cybercriminals.</p><h3>What Was Leaked?</h3><p>The <strong>password database</strong> includes:</p><ul> <li> <p>Usernames and email IDs linked to passwords.</p> </li> <li> <p>Only <strong>6% of the entries are unique</strong>, indicating a catastrophic level of password reuse.</p> </li> <li> <p>Passwords sourced from major breaches, phishing kits, and various malware incidents.</p> </li> </ul><p>This database is not hidden in the dark web; it's circulating on hacker forums and is actively used for credential stuffing attacks.</p><h3>The Threat of Password Reuse</h3><p><a href="https://mojoauth.com/blog/what-is-credential-stuffing/">Credential stuffing is</a> a significant threat where attackers use stolen username-password pairs across multiple sites. Users often reuse the same passwords for:</p><ul> <li> <p>Email accounts</p> </li> <li> <p>Banking apps</p> </li> <li> <p>Social media</p> </li> <li> <p>eCommerce platforms</p> </li> </ul><p>Commonly reused passwords include "123456," "qwerty," and "password." This vulnerability is exploited by cybercriminals, making it crucial for organizations and individuals to adopt better security practices.</p><h3>Immediate Actions to Take</h3><ol> <li> <p><strong>Audit Your Accounts</strong>: Use services like <a href="https://haveibeenpwned.com/">HaveIBeenPwned.com</a> to check if your email has been compromised.</p> </li> <li> <p><strong>Rotate Passwords</strong>: Change passwords for critical services, ensuring they are unique and complex.</p> </li> <li> <p><strong>Adopt Password Managers</strong>: Utilize tools like <a href="https://mojoauth.com/">MojoAuth</a> for generating and storing strong passwords.</p> </li> <li> <p><strong>Enforce MFA</strong>: Implement Multi-Factor Authentication (MFA) using app-based solutions like Google Authenticator or hardware tokens.</p> </li> <li> <p><strong>Transition to Passwordless Authentication</strong>: Consider adopting solutions that utilize biometrics, passkeys, or FIDO2-based authentication.</p> </li> </ol><h3>Recommendations for Businesses and Security Teams</h3><p>Organizations should implement <strong>Zero Trust policies</strong> and enforce Single Sign-On (SSO) combined with MFA across all SaaS applications. Regular training on password hygiene is essential, as is investing in behavioral biometrics to detect anomalies in login attempts. For enhanced security, enterprises can explore <a href="https://mojoauth.com/">MojoAuth</a> to integrate passwordless authentication solutions, ensuring a smooth and secure user experience.</p><h3>The Evolving Cyber Threat Landscape</h3><p>The <strong>credential arsenal</strong> revealed by this breach significantly lowers the entry barrier for cyberattacks, enabling even less skilled hackers to gain unauthorized access. Cybercriminals often operate in sophisticated networks, such as <strong>Panda Shop</strong> and <strong>Smishing Triad</strong>, which use automation and phishing tactics to exploit these credentials.</p><p>Several of these attack dynamics are explored in <a href="https://guptadeepak.com/ebooks/cybersecurity-breaches-decoded/">Cybersecurity Breaches Decoded</a>, especially where operational failures create long-term security exposure.</p><h3>Protecting Your <a href="https://mojoauth.com/blog/category/digital-identity/">Digital Identity</a></h3><ol> <li> <p><strong>Use Strong, Unique Passwords</strong>: Avoid dictionary words or easily guessable patterns. Opt for <strong>12+ characters</strong> with a mix of character types.</p> </li> <li> <p><strong>Change Compromised Passwords Immediately</strong>: Prioritize high-risk accounts and ensure all reused passwords are replaced.</p> </li> <li> <p><strong>Monitor Account Activity</strong>: Regularly check for unauthorized access and revoke permissions from unknown devices.</p> </li> <li> <p><strong>Stay Informed</strong>: Follow trusted cybersecurity resources to keep abreast of emerging threats.</p> </li> </ol><p>As the landscape of cybersecurity continues to evolve, it's critical to adapt and employ robust security measures. For businesses looking to enhance their security posture, <a href="https://mojoauth.com/">MojoAuth</a> offers innovative passwordless authentication solutions tailored for web and mobile applications.</p><p>The post <a href="https://mojoauth.com/blog/19-billion-passwords-leaked-protect-yourself-from-cyber-threats">19 Billion Passwords Leaked: Protect Yourself from Cyber Threats</a> appeared first on <a href="https://mojoauth.com/blog">MojoAuth Blog – Passwordless Authentication &amp; Identity Solutions</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/19-billion-passwords-leaked-protect-yourself-from-cyber-threats-2/" data-a2a-title="19 Billion Passwords Leaked: Protect Yourself from Cyber Threats"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2F19-billion-passwords-leaked-protect-yourself-from-cyber-threats-2%2F&amp;linkname=19%20Billion%20Passwords%20Leaked%3A%20Protect%20Yourself%20from%20Cyber%20Threats" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2F19-billion-passwords-leaked-protect-yourself-from-cyber-threats-2%2F&amp;linkname=19%20Billion%20Passwords%20Leaked%3A%20Protect%20Yourself%20from%20Cyber%20Threats" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2F19-billion-passwords-leaked-protect-yourself-from-cyber-threats-2%2F&amp;linkname=19%20Billion%20Passwords%20Leaked%3A%20Protect%20Yourself%20from%20Cyber%20Threats" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2F19-billion-passwords-leaked-protect-yourself-from-cyber-threats-2%2F&amp;linkname=19%20Billion%20Passwords%20Leaked%3A%20Protect%20Yourself%20from%20Cyber%20Threats" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2F19-billion-passwords-leaked-protect-yourself-from-cyber-threats-2%2F&amp;linkname=19%20Billion%20Passwords%20Leaked%3A%20Protect%20Yourself%20from%20Cyber%20Threats" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://mojoauth.com/blog">MojoAuth Blog - Passwordless Authentication &amp;amp; Identity Solutions</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by MojoAuth Blog - Passwordless Authentication &amp; Identity Solutions">MojoAuth Blog - Passwordless Authentication &amp; Identity Solutions</a>. Read the original post at: <a href="https://mojoauth.com/blog/19-billion-passwords-leaked-protect-yourself-from-cyber-threats">https://mojoauth.com/blog/19-billion-passwords-leaked-protect-yourself-from-cyber-threats</a> </p>

Why Anthropic’s Mythos Is a Systemic Shift for Global Cybersecurity

  • None
  • Published date: 2026-04-12 00:00:00

None

<p> </p><p><a href="https://www.govtech.com/blogs/lohrmann-on-cybersecurity">Lohrmann on Cybersecurity</a></p><h1>Why Anthropic’s Mythos Is a Systemic Shift for Global Cybersecurity</h1><h2>With the release of Anthropic’s Project Glasswing and Claude Mythos, how should CISOs navigate the arrival of automated exploit chaining, collapsing patch cycles and the inevitable rise of adversarial AI?</h2><div>April 12, 2026 •</div><p><a href="https://www.govtech.com/authors/dan-lohrmann.html">Dan Lohrmann</a></p><figure><img decoding="async" src="https://erepublic.brightspotcdn.com/dims4/default/3388ada/2147483647/strip/true/crop/4687x2444+0+346/resize/840x438!/quality/90/?url=http%3A%2F%2Ferepublic-brightspot.s3.us-west-2.amazonaws.com%2F14%2F56%2F19411bfc4f7393edf3c68c17b85f%2Fadobestock-679761570.jpeg"> <div>Adobe Stock/thejokercze</div> </figure><div class="Page-articleBody RichTextBody"> <p>The <a href="https://www.anthropic.com/glasswing">announcements this week from Anthropic regarding Project Glasswing</a> have created a global cyber paradigm shift that can be considered a scary “ChatGPT moment” or even a “zero-day tsunami” for cybersecurity.</p> </div><div>Headlines related to this announcement include <a href="https://www.reuters.com/business/finance/bessent-powell-warn-bank-ceos-about-anthropic-model-risks-bloomberg-news-reports-2026-04-10/">major bank CEOs being warned in an urgent closed-door meeting</a> held by U.S. Treasury Secretary Scott Bessent and Federal Reserve Chair Jerome Powell about the cyber risks posed by Anthropic’s latest AI model.</div><div> <p>Anthropic has said its Claude Mythos model is capable of identifying ⁠and exploiting weaknesses across “every major operating system and every major web browser.” What makes Mythos different is not just that it can find vulnerabilities. It appears to be unusually strong at chaining multiple weaknesses together into sophisticated exploit paths. This means that it doesn’t just find a bug, but writes the script to jump from a browser to the kernel to the cloud. This capability bundle is what will keep CISOs awake at night.</p> </div><div>Anthropic said it was in ongoing discussions with U.S. government officials about the model‘s offensive and defensive cyber capabilities. They are taking steps to limit access to these.</div><div>However, it is important to note <a href="https://aisle.com/blog/ai-cybersecurity-after-mythos-the-jagged-frontier">this article from AISLE</a> claims that many other models currently have very similar capabilities to find critical zero-day vulnerabilities and that these likely can be replicated to a large extent by others.</div><div> <p>Even though Anthropic is restricting access to Mythos, the architectural decisions it made to achieve vulnerability discovery will likely be reverse-engineered and embedded into Chinese and Russian open-source models by late 2026 — at the latest.</p> <p> </p> <h3>MORE DETAILS FOR CISOs</h3> </div><div>Groups in many industries are scrambling now to hold “CISO Huddles” to discuss implications and urgent actions that are needed by cyber leaders. For example, the Cloud Security Alliance is holding a <a href="https://www.linkedin.com/posts/jimreavis_emergency-ciso-zoom-huddle-mythos-the-activity-7448004545663700992-XL7N?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAAAWvWUBividW3-ao-0USZQ_tAsxCS7Uk1I">Mythos/”AI vulnerability cataclysm” CISOs Huddle – Public Form</a>.</div><div>I like the LinkedIn commentary on this topic by my friend Richard Stiennon, <a href="https://www.linkedin.com/posts/stiennon_mythos-preview-is-a-break-glass-moment-activity-7447990812266741760-OMRH?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAAAWvWUBividW3-ao-0USZQ_tAsxCS7Uk1I">which can be found here</a>.</div><div> <p>As Stiennon points out, many questions are raised by these announcements. Some of the top questions include:</p> <ul> <li>Does the industry have the infrastructure to absorb thousands of new zero days being uncovered every week?</li> <li>Can vulnerability scanners keep up?</li> <li>Can enrichment platforms keep up?</li> <li>Can enterprise security teams handle the increased workload?</li> <li>Can software vendors patch vulnerabilities fast enough?</li> </ul> <p>Some other implications include:</p> </div><div>The urgent briefing by Treasury Secretary Bessent and Fed Chair Powell elevates AI cyber risk from an IT issue to a systemic financial stability threat. CISOs at major institutions should expect aggressive new regulatory frameworks and “coordinated defense” requirements. Other critical sectors will likely follow.</div><div>Project Glasswing provides $100 million in credits to “blue teams” to ensure defenders maintain a head start. CISOs must aggressively integrate these frontier models into their own DevSecOps pipelines to automate code remediation before adversaries weaponize the same capabilities.</div><div>For CISOs, the working assumption must be that the “Claude Mythos” capability gap is temporary. While U.S. labs have self-imposed safety filters and “redline” protocols, adversarial models are rapidly converging on these same capabilities without the same ethical or regulatory friction. Assume that “West-leading” capabilities will be replicated by foreign models within months, not years.</div><div>As a former government leader, I worry about who will have access to Mythos. No doubt, insider threats will emerge. Assume that advanced cyber-reasoning will eventually leak into the open-source ecosystem.</div><div> <p>Recent leaks — such as the 512,000 lines of Claude code surfacing in Chinese developer forums — show that even high-security labs cannot perfectly contain their logic. CISOs must assume that low-tier ransomware groups will soon have access to “Mythos-lite” capabilities via unmonitored Russian or Chinese open-weight models, effectively “industrializing” sophisticated nation-state attack vectors.</p> <p> </p> <h3>TOP 7 MOVES FOR CISOs</h3> <p><b>Assume the vulnerability window is compressing.</b> Recalibrate your operating model around hours/days, not weeks — emergency change paths, pre-approved rollback, and “patch or compensate” decisions that can move fast.</p> <p><b>Move from periodic scanning to continuous exposure management.</b> Prioritize Internet-facing assets and identity paths first; measure coverage and exploitability, not just raw finding counts.</p> <p><b>Treat exploit chaining as the default.</b> Pressure-test controls and detections across the full chain (browser/email → endpoint → identity → cloud control plane), not single-critical vulnerability exploit events.</p> <p><b>Make compensating controls first-class.</b> For what you can’t patch quickly: WAF/virtual patching, segmentation, hardening baselines and tighter egress controls buy time when patch speed loses the race.</p> <p><b>Shift left with automation — or you’ll be outpaced.</b> Use AI-assisted code review and remediation to reduce vulnerable code at the source; don’t rely on tickets and humans to scale triage and fixes.</p> <p><b>Pressure-test vendors and critical suppliers.</b> Ask for patch service-level agreements, evidence of secure-by-design practices and how they handle “exploit-in-the-wild” events when AI accelerates weaponization.</p> <p><b>Plan for surge capacity.</b> If discovery volume spikes, your bottleneck becomes triage, change execution and validation — staff and automate accordingly.</p> <h3>FINAL THOUGHTS</h3> </div><div>If a vulnerability exists in your stack, an AI, regardless of its country of origin, will find it. Your defense strategy cannot rely on “AI safety” or “export controls” to keep these tools out of the wrong hands.</div><div>Finally, as teams are rapidly deployed to address these urgent zero-day threats, expect them to be stretched and other security and development projects to take a back seat.</div><div> <p>Make sure that important priority projects don’t get thrown out (or put on a backburner too long) in the rush to address the implications from Anthropic’s Mythos.</p> </div><p><a href="https://www.govtech.com/tag/cybersecurity">Cybersecurity</a></p><p> </p><p><img decoding="async" src="https://erepublic.brightspotcdn.com/dims4/default/7be6234/2147483647/strip/true/crop/343x343+77+0/resize/100x100!/quality/90/?url=http%3A%2F%2Ferepublic-brightspot.s3.us-west-2.amazonaws.com%2Faa%2Fbe%2F66bbbc539526800857dd96f3c9d5%2Flohrman.jpg"></p><p> </p><p><a href="https://www.govtech.com/authors/dan-lohrmann.html">Dan Lohrmann</a></p><div>Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker and author.</div><p><a href="https://www.govtech.com/authors/dan-lohrmann.html">See More Stories by Dan Lohrmann</a></p><p> </p><p>The post <a href="https://www.govtech.com/blogs/lohrmann-on-cybersecurity/why-anthropics-mythos-is-a-systemic-shift-for-global-cybersecurity">Why Anthropic’s Mythos Is a Systemic Shift for Global Cybersecurity</a> appeared first on Lohrmann on Cybersecurity.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/why-anthropics-mythos-is-a-systemic-shift-for-global-cybersecurity/" data-a2a-title="Why Anthropic’s Mythos Is a Systemic Shift for Global Cybersecurity"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fwhy-anthropics-mythos-is-a-systemic-shift-for-global-cybersecurity%2F&amp;linkname=Why%20Anthropic%E2%80%99s%20Mythos%20Is%20a%20Systemic%20Shift%20for%20Global%20Cybersecurity" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fwhy-anthropics-mythos-is-a-systemic-shift-for-global-cybersecurity%2F&amp;linkname=Why%20Anthropic%E2%80%99s%20Mythos%20Is%20a%20Systemic%20Shift%20for%20Global%20Cybersecurity" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fwhy-anthropics-mythos-is-a-systemic-shift-for-global-cybersecurity%2F&amp;linkname=Why%20Anthropic%E2%80%99s%20Mythos%20Is%20a%20Systemic%20Shift%20for%20Global%20Cybersecurity" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fwhy-anthropics-mythos-is-a-systemic-shift-for-global-cybersecurity%2F&amp;linkname=Why%20Anthropic%E2%80%99s%20Mythos%20Is%20a%20Systemic%20Shift%20for%20Global%20Cybersecurity" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fwhy-anthropics-mythos-is-a-systemic-shift-for-global-cybersecurity%2F&amp;linkname=Why%20Anthropic%E2%80%99s%20Mythos%20Is%20a%20Systemic%20Shift%20for%20Global%20Cybersecurity" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="">Lohrmann on Cybersecurity</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Lohrmann on Cybersecurity">Lohrmann on Cybersecurity</a>. Read the original post at: <a href="https://www.govtech.com/blogs/lohrmann-on-cybersecurity/why-anthropics-mythos-is-a-systemic-shift-for-global-cybersecurity">https://www.govtech.com/blogs/lohrmann-on-cybersecurity/why-anthropics-mythos-is-a-systemic-shift-for-global-cybersecurity</a> </p>

Who’s Been Impersonating This ProPublica Reporter?

  • Robert Faturechi
  • Published date: 2026-04-11 09:00:00

A mysterious impostor who claimed to be ProPublica reporter Robert Faturechi reached out to a Canadian official and a Latvian businessman working with Ukraine. So, the real Robert did some reporting of his own.

The call came from a number I didnt recognize, with a Canadian area code. A steely voice on the other end of the line greeted me, identifying himself as an official with the Canadian military. He h… [+10581 chars]

Mythos and Glasswing

  • Michael Tsai
  • Published date: 2026-04-10 19:37:58

Rich Mogull: Anthropic, the company behind the Claude AI chatbot, made two security announcements that were shocking for many but seen as inevitable by those of us working in AI security. First, it announced Mythos Preview, a new, non-public AI model that tur…

Rich Mogull: Anthropic, the company behind the Claude AI chatbot, made two security announcements that were shocking for many but seen as inevitable by those of us working in AI security. First, it … [+2381 chars]

Intel 486 CPU announced April 10, 1989

  • Dave Farquhar
  • Published date: 2026-04-10 12:03:34

The killer app for the 486 didn't come out until a year or so later

Intel announced the 486 CPU at Comdex on April 10, 1989. It was an expensive chip, priced at $950 each in quantities of 1,000. I thought it would be fun to look back at what the magazines at the time… [+5353 chars]

Airport Security Solutions Global Markets, 2025-2026 & 2030 with IDEMIA, SITA, Thales, NEC, Honeywell, Amadeus, HID Global, Teledyne FLIR, Smiths Detection, Genetec, and Milestone Dominating

  • Research and Markets
  • Published date: 2026-04-10 11:17:00

The rebound of air travel post-COVID is driving demand for advanced airport security solutions. Key opportunities include AI-enabled and biometric systems for efficient screening, infrastructure expansion, and Smart Airport initiatives. Regional variations an…

Dublin, April 10, 2026 (GLOBE NEWSWIRE) -- The "Airport Security Solutions, Global, 2025-2030" report has been added to ResearchAndMarkets.com's offering. The global airport security market is exper… [+8065 chars]

The Phishing-as-a-Service Pipeline: How a Scalable Fraud Ecosystem Is Driving Global Attacks

  • None
  • Published date: 2026-04-10 00:00:00

None

<div class="wp-block-group tablet-padding-top50 has-light-grey-background-color has-background"> <div class="wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow"> <div class="wp-block-columns tablet-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex"> <div class="wp-block-column padding-right50 tablet-padding-right0 is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:60%"> <p class="back-link padding-bottom40 grey-link no-underline tablet-align-center"><a href="https://flashpoint.io/blog">Blogs</a></p> <h6 class="wp-block-heading padding-bottom5 tablet-align-center">Blog</h6> <h1 class="wp-block-heading padding-bottom30 tablet-align-center h2-style has-dark-blue-color has-text-color">The Phishing-as-a-Service Pipeline: How a Scalable Fraud Ecosystem Is Driving Global Attacks</h1> <p class="padding-bottom40 tablet-align-center">In this post, we examine how phishing-as-a-service (PhaaS) has evolved into a structured cybercrime ecosystem, how threat actors collaborate across infrastructure, delivery, and monetization layers, and why this model continues to drive large-scale financial fraud targeting global organizations.</p> <div class="wp-block-columns tablet-columns tablet-align-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex"> <div class="wp-block-column is-vertically-aligned-center no-margin is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:130px"> <div class="block share align-left tablet-align-center left"> <div class="title">SHARE THIS:</div> <p> <a href="https://www.facebook.com/sharer/sharer.php?u=https://flashpoint.io/blog/the-phishing-as-a-service-pipeline-how-a-scalable-fraud-ecosystem-is-driving-global-attacks/" class="has-dark-blue-color"><br> <svg width="18" height="18" viewbox="0 0 18 18" fill="none" xmlns="http://www.w3.org/2000/svg"> <path fill-rule="evenodd" clip-rule="evenodd" d="M0 9.05025C0 13.5248 3.24975 17.2455 7.5 18V11.4998H5.25V9H7.5V6.99975C7.5 4.74975 8.94975 3.50025 11.0002 3.50025C11.6497 3.50025 12.3503 3.6 12.9998 3.69975V6H11.85C10.7498 6 10.5 6.54975 10.5 7.25025V9H12.9L12.5002 11.4998H10.5V18C14.7502 17.2455 18 13.5255 18 9.05025C18 4.0725 13.95 0 9 0C4.05 0 0 4.0725 0 9.05025Z" fill="currentColor"></path> </svg><br> </a><br> <a href="https://twitter.com/intent/tweet?text=The%20Phishing-as-a-Service%20Pipeline:%20How%20a%20Scalable%20Fraud%20Ecosystem%20Is%20Driving%20Global%20Attacks&amp;url=https://flashpoint.io/blog/the-phishing-as-a-service-pipeline-how-a-scalable-fraud-ecosystem-is-driving-global-attacks/&amp;%23038;via=flashpointintel" class="has-dark-blue-color"><br> <svg width="18" height="18" viewbox="0 0 18 18" fill="none" xmlns="http://www.w3.org/2000/svg"> <g clip-path="url(#clip0_1936_244)"> <path d="M9 17.6646C13.9706 17.6646 18 13.7142 18 8.84111C18 3.96801 13.9706 0.0175781 9 0.0175781C4.02944 0.0175781 0 3.96801 0 8.84111C0 13.7142 4.02944 17.6646 9 17.6646Z" fill="currentColor"></path> <path d="M12.2195 4.52588H13.8313L10.3101 8.3453L14.4525 13.5426H11.2085L8.66811 10.3905L5.76133 13.5426H4.1486L7.91488 9.45735L3.94153 4.52588H7.26685L9.56315 7.40708L12.2185 4.52588H12.2195ZM11.6538 12.6271H12.5469L6.78207 5.39334H5.82368L11.6538 12.6271Z" fill="white"></path> </g> <defs> <clippath id="clip0_1936_244"> <rect width="18" height="18" fill="white"></rect> </clippath> </defs> </svg><br> </a><br> <a href="https://www.linkedin.com/shareArticle?mini=false&amp;url=https://flashpoint.io/blog/the-phishing-as-a-service-pipeline-how-a-scalable-fraud-ecosystem-is-driving-global-attacks/&amp;%23038;title=The%20Phishing-as-a-Service%20Pipeline:%20How%20a%20Scalable%20Fraud%20Ecosystem%20Is%20Driving%20Global%20Attacks&amp;%23038;summary=&amp;%23038;source=https://flashpoint.io" class="has-dark-blue-color"><br> <svg width="18" height="18" viewbox="0 0 18 18" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M9 0C4.02937 0 0 4.02938 0 9C0 13.9706 4.02937 18 9 18C13.9706 18 18 13.9706 18 9C18 4.02938 13.9706 0 9 0ZM6.79687 12.7303H4.97437V6.86531H6.79687V12.7303ZM5.87437 6.14531C5.29875 6.14531 4.92656 5.7375 4.92656 5.23312C4.92656 4.71844 5.31 4.32281 5.89781 4.32281C6.48562 4.32281 6.84562 4.71844 6.85687 5.23312C6.85687 5.7375 6.48562 6.14531 5.87437 6.14531ZM13.4531 12.7303H11.6306V9.48C11.6306 8.72344 11.3662 8.20969 10.7072 8.20969C10.2037 8.20969 9.90469 8.5575 9.7725 8.89219C9.72375 9.01125 9.71156 9.18 9.71156 9.34781V12.7294H7.88812V8.73563C7.88812 8.00344 7.86469 7.39125 7.84031 6.86437H9.42375L9.50719 7.67906H9.54375C9.78375 7.29656 10.3716 6.73219 11.355 6.73219C12.5541 6.73219 13.4531 7.53562 13.4531 9.2625V12.7303Z" fill="currentColor"></path> </svg><br> </a> </p></div> </div> <div class="wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:400px"> <div class="block blog-author-info tablet-align-center"> <div class="blog-info"> <div class="img-container"><img decoding="async" src="https://flashpoint.io/wp-content/uploads/2022/06/author-image-150x150-1-150x150.png" alt="Default Author Image"></div> <div class="name"><a href="https://flashpoint.io/blog/author/flashpoint-intel-team/">Flashpoint Intel Team </a></div> <div class="date">April 10, 2026</div> </div> </div> </div> </div> </div> <div class="wp-block-column padding-top90 tablet-padding-top0 is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:40%"> <figure class="wp-block-image size-full border-radius"><img loading="lazy" decoding="async" width="1200" height="628" src="https://flashpoint.io/wp-content/uploads/Phishing-as-a-Service_Blog.png" alt="" class="wp-image-57666"></figure> </div> </div> </div> </div><div class="wp-block-group"> <div class="wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow"> <div class="block table-of-contents"> <div class="left"> <div class="mobile-bar"> <div class="closed"><img decoding="async" src="https://flashpoint.io/wp-content/themes/flashpoint/img/icon-toc-mobile-icon.svg" type="image/svg+xml"> Table Of Contents</div> <div class="mobile-close"><img decoding="async" src="https://flashpoint.io/wp-content/themes/flashpoint/img/icon-toc-mobile-close.svg" type="image/svg+xml"></div> </div> <div class="sidebar-items-container"> <div class="links-container"> <div class="heading">Table of Contents</div> <div class="links"> <div class="links__item"><a href="https://flashpoint.io/blog/the-phishing-as-a-service-pipeline-how-a-scalable-fraud-ecosystem-is-driving-global-attacks/#phishing-kits-service-based-fraud-economy">From Phishing Kits to a Service-Based Fraud Economy</a></div> <div class="links__item"><a href="https://flashpoint.io/blog/the-phishing-as-a-service-pipeline-how-a-scalable-fraud-ecosystem-is-driving-global-attacks/#mfa-bypass-ai">MFA Bypass and AI Are Reshaping Phishing Capabilities</a></div> <div class="links__item"><a href="https://flashpoint.io/blog/the-phishing-as-a-service-pipeline-how-a-scalable-fraud-ecosystem-is-driving-global-attacks/#phaas-pipeline">The PhaaS Pipeline: How the Ecosystem Operates</a></div> <div class="links__item"><a href="https://flashpoint.io/blog/the-phishing-as-a-service-pipeline-how-a-scalable-fraud-ecosystem-is-driving-global-attacks/#infrastructure-delivery-exfiltration">Infrastructure, Delivery, and Exfiltration Are Increasingly Specialized</a></div> <div class="links__item"><a href="https://flashpoint.io/blog/the-phishing-as-a-service-pipeline-how-a-scalable-fraud-ecosystem-is-driving-global-attacks/#credential-theft-to-financial-monetization">From Credential Theft to Financial Monetization</a></div> <div class="links__item"><a href="https://flashpoint.io/blog/the-phishing-as-a-service-pipeline-how-a-scalable-fraud-ecosystem-is-driving-global-attacks/#distributed-ecosystem">A Distributed Ecosystem of Threat Actors</a></div> <div class="links__item"><a href="https://flashpoint.io/blog/the-phishing-as-a-service-pipeline-how-a-scalable-fraud-ecosystem-is-driving-global-attacks/#law-enforcement">Law Enforcement Pressure Is Increasing, but the Model Persists</a></div> <div class="links__item"><a href="https://flashpoint.io/blog/the-phishing-as-a-service-pipeline-how-a-scalable-fraud-ecosystem-is-driving-global-attacks/#what-this-means">What This Means for Security Teams</a></div> <div class="links__item"><a href="https://flashpoint.io/blog/the-phishing-as-a-service-pipeline-how-a-scalable-fraud-ecosystem-is-driving-global-attacks/#cta">Protecting Your Organization from the PhaaS Ecosystem</a></div> </div> <p><span class="expander">More</span></p></div> <div class="links-container"> <div class="heading">subscribe to our newsletter</div> <div class="links"><iframe loading="lazy" src="https://go.flashpoint.io/l/272312/2024-08-20/24ww895" width="100%" height="500" frameborder="0" allowtransparency="true" allowfullscreen="true" style="border:0;" class="temp-pardot-embed"></iframe></div> </div> </div> </div> <div class="right"> <p><a href="https://flashpoint.io/intelligence-101/phishing/" rel="noreferrer noopener">Phishing</a> is no longer a standalone tactic. It has matured into a service-based ecosystem where specialized actors provide each component of an attack lifecycle, from infrastructure and delivery to credential harvesting and cash-out.</p> <p>Flashpoint analysts, working with partner financial institutions, have observed a growing number of PhaaS operations operating with a level of coordination and specialization more commonly associated with legitimate software platforms. These ecosystems bring together phishing kit developers, infrastructure providers, spam delivery services, and financially motivated actors into a single, scalable pipeline for fraud.</p> <p>This shift has significantly lowered the barrier to entry for cybercriminals while increasing the scale, efficiency, and success rate of phishing campaigns.</p> <h2 class="wp-block-heading padding-top50 padding-bottom20 has-dark-blue-color has-text-color" id="phishing-kits-service-based-fraud-economy">From Phishing Kits to a Service-Based Fraud Economy</h2> <p>PhaaS emerged from early phishing kits into a full cybercrime-as-a-service model built on commercialization, modular tooling, and operational scalability.</p> <p>Early phishing activity relied on standalone kits — basic login pages and scripts that allowed attackers to collect credentials. Over time, operators began centralizing these capabilities into subscription-based platforms offering hosting, domain management, campaign tooling, and ongoing support.</p> <p>Modern PhaaS platforms now operate similarly to legitimate SaaS providers:</p> <ul class="wp-block-list"> <li>Subscription-based pricing models</li> <li>Prebuilt templates for major brands and services</li> <li>Integrated delivery mechanisms (email, SMS, QR phishing)</li> <li>Real-time dashboards for campaign tracking and credential harvesting</li> </ul> <p>This model has made sophisticated phishing accessible to low-skill actors. Kits can cost as little as US$10, while full platforms enable large-scale campaigns for relatively modest monthly fees.</p> <h2 class="wp-block-heading padding-top50 padding-bottom20 has-dark-blue-color has-text-color" id="mfa-bypass-ai">MFA Bypass and AI Are Reshaping Phishing Capabilities</h2> <p>As organizations adopted multifactor authentication (MFA), PhaaS operators adapted.</p> <p>Modern platforms increasingly rely on adversary-in-the-middle (AiTM) techniques, using reverse proxy infrastructure to intercept login sessions in real time. This allows attackers to capture not only credentials, but also MFA tokens and session cookies, effectively bypassing traditional authentication controls.</p> <p>At the same time, AI is accelerating the scale and effectiveness of phishing campaigns.</p> <p>Threat actors are using AI to:</p> <ul class="wp-block-list"> <li>Generate convincing, localized phishing lures</li> <li>Clone brand interfaces with high fidelity</li> <li>Optimize campaigns through automated testing and iteration</li> </ul> <p>This combination of MFA bypass and AI-driven automation has transformed phishing from a volume-based tactic into a precision-driven access vector.</p> <h2 class="wp-block-heading padding-top50 padding-bottom20 has-dark-blue-color has-text-color" id="phaas-pipeline">The PhaaS Pipeline: How the Ecosystem Operates</h2> <p>What distinguishes modern phishing operations is not just tooling, but coordination.</p> <p>A typical PhaaS campaign follows a structured lifecycle:</p> <figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="1024" src="https://flashpoint.io/wp-content/uploads/The-PhaaS-Pipeline-How-the-Ecosystem-Operates-1024x1024.png" alt="" class="wp-image-57665"></figure> <p>This pipeline is supported by a network of specialized providers, each responsible for a different stage of the attack lifecycle.</p> <h2 class="wp-block-heading padding-top50 padding-bottom20" id="infrastructure-delivery-exfiltration">Infrastructure, Delivery, and Exfiltration Are Increasingly Specialized</h2> <p>Flashpoint analysis highlights how different actors focus on distinct parts of the ecosystem.</p> <h3 class="wp-block-heading">Infrastructure and Kit Development</h3> <p>Phishing kit developers provide increasingly sophisticated tooling, including:</p> <ul class="wp-block-list"> <li>Reverse proxy (AiTM) capabilities for MFA bypass</li> <li>Anti-bot protections to evade researchers</li> <li>“Live panels” enabling real-time interaction with victims</li> </ul> <p>Platforms such as GhostFrame, Rapid Pages, and MUH Pro Admin illustrate how these tools are being productized and distributed at scale.</p> <h3 class="wp-block-heading">SMS Delivery and Spoofing</h3> <p>Smishing has become a critical delivery vector.</p> <p>Threat actors operate dedicated SMS gateway services capable of sending large volumes of messages via APIs or bulk uploads. Others actively seek advanced spoofing capabilities to bypass authentication controls such as SPF, DKIM, and DMARC, enabling phishing messages to appear legitimate at the protocol level.</p> <h3 class="wp-block-heading">Credential Exfiltration and Telegram Integration</h3> <p>Credential collection is increasingly automated and centralized.</p> <p>Many campaigns exfiltrate stolen credentials directly to Telegram bots or channels, enabling real-time access to victim data. This infrastructure also allows for rapid scaling and coordination across actors participating in the same campaign or ecosystem.</p> <h2 class="wp-block-heading padding-top50 padding-bottom20" id="credential-theft-to-financial-monetization">From Credential Theft to Financial Monetization</h2> <p>The ultimate goal of PhaaS operations is monetization.</p> <p>Stolen credentials are used to enable account takeover (ATO), which allows attackers to:</p> <ul class="wp-block-list"> <li>Access financial accounts</li> <li>Lock out legitimate users</li> <li>Initiate fraudulent transactions</li> <li>Launch follow-on scams</li> </ul> <p>Flashpoint analysis of actors such as “JUN JUN,” associated with the Squirtle group, illustrates how these operations extend into structured financial fraud and laundering.</p> <p>Observed activity shows a progression from acquiring phishing logs (“fish material”) to targeting high-value accounts and ultimately laundering funds through complex mechanisms, including tax fraud and credit card repayment schemes designed to recycle illicit funds.</p> <p>This highlights how phishing is only the entry point into a broader fraud pipeline.</p> <h2 class="wp-block-heading padding-top50 padding-bottom20" id="distributed-ecosystem">A Distributed Ecosystem of Threat Actors</h2> <p>The PhaaS landscape is not controlled by a single group, but by a network of loosely connected actors and clusters.</p> <p>Examples include:</p> <ul class="wp-block-list"> <li><strong>Fluffy Spider:</strong> Focused on large-scale infrastructure deployment and domain generation</li> <li><strong>IVAN:</strong> A more exclusive, high-tier operation leveraging SEO poisoning and advanced evasion techniques</li> <li><strong>Smishing Triad:</strong> A highly coordinated group conducting global SMS phishing campaigns</li> <li><strong>System Bot:</strong> A modular phishing toolkit with credential harvesting and OTP bypass capabilities</li> </ul> <p>These actors operate across different regions and languages but demonstrate comparable levels of technical capability and operational maturity.</p> <p>Many of these groups function with enterprise-like structures, including support teams, affiliate models, and performance-based operations, further reinforcing the industrialization of phishing-driven fraud.</p> <h2 class="wp-block-heading padding-top50 padding-bottom20" id="law-enforcement">Law Enforcement Pressure Is Increasing, but the Model Persists</h2> <p>Recent takedowns, including operations targeting platforms such as Tycoon 2FA, demonstrate growing coordination between public and private sector defenders.</p> <p>These efforts have:</p> <ul class="wp-block-list"> <li>Disrupted infrastructure</li> <li>Increased operational costs for threat actors</li> <li>Accelerated collaboration between intelligence providers and law enforcement</li> </ul> <p>However, the underlying PhaaS model remains resilient.</p> <p>Even as major platforms are dismantled, operators frequently rebrand, migrate infrastructure, or fragment into smaller services. The demand for scalable, low-cost phishing capabilities continues to sustain the ecosystem.</p> <h2 class="wp-block-heading padding-top50 padding-bottom20" id="what-this-means">What This Means for Security Teams</h2> <p>Phishing-as-a-service has evolved from a tactic to an ecosystem that industrializes fraud.</p> <p>Flashpoint assesses that the increasing coordination between phishing kit developers, infrastructure providers, and financial fraud actors will continue to drive large-scale credential harvesting and account takeover activity targeting global organizations.</p> <p>For defenders, this means that effective mitigation requires more than user awareness and traditional controls. Organizations must account for:</p> <ul class="wp-block-list"> <li>MFA bypass techniques such as AiTM</li> <li>Rapid infrastructure rotation and evasion</li> <li>The integration of phishing into broader fraud and access broker pipelines</li> </ul> <h2 class="wp-block-heading padding-top50 padding-bottom20" id="cta">Protecting Your Organization from the PhaaS Ecosystem</h2> <p>Understanding how phishing ecosystems operate — from infrastructure and delivery to monetization — is critical for disrupting attacks before they result in fraud.</p> <p>Flashpoint provides intelligence that helps organizations track phishing campaigns, identify emerging threat actors, and detect compromised credentials in real time. By correlating activity across the full attack lifecycle, security teams can better anticipate threats and respond before they escalate.</p> <p>To learn how Flashpoint can support your team with actionable intelligence on phishing and fraud ecosystems, <a href="https://flashpoint.io/demo/">schedule a demo</a>.</p> </div> </div> </div> </div><div class="wp-block-group padding-top0"> <div class="wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow"> <div class="wp-block-group max-width-medium border-radius padding-top70 padding-bottom70 has-primary-blue-background-color has-background"> <div class="wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow"> <h2 class="wp-block-heading has-text-align-center padding-bottom30 has-primary-white-color has-text-color">Begin your free trial today.</h2> <div class="wp-block-columns tablet-columns text-align-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex"> <div class="wp-block-column is-vertically-aligned-center padding-right25 tablet-padding-right0 is-layout-flow wp-block-column-is-layout-flow"> <div class="block button-cta tablet-center"><a href="https://flashpoint.io/free-trial" class="btn-primary-white solid has-primary-blue-color no-icon right">Get a Free Trial</a></div> </div> <div class="wp-block-column is-vertically-aligned-center tablet-align-center is-layout-flow wp-block-column-is-layout-flow"> <p class="link white with-arrow bold padding-bottom0"><a href="https://flashpoint.io/contact-us/">Contact Sales</a></p> </div> </div> </div> </div> </div> </div><p>The post <a href="https://flashpoint.io/blog/the-phishing-as-a-service-pipeline-how-a-scalable-fraud-ecosystem-is-driving-global-attacks/">The Phishing-as-a-Service Pipeline: How a Scalable Fraud Ecosystem Is Driving Global Attacks</a> appeared first on <a href="https://flashpoint.io/">Flashpoint</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/the-phishing-as-a-service-pipeline-how-a-scalable-fraud-ecosystem-is-driving-global-attacks/" data-a2a-title="The Phishing-as-a-Service Pipeline: How a Scalable Fraud Ecosystem Is Driving Global Attacks"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fthe-phishing-as-a-service-pipeline-how-a-scalable-fraud-ecosystem-is-driving-global-attacks%2F&amp;linkname=The%20Phishing-as-a-Service%20Pipeline%3A%20How%20a%20Scalable%20Fraud%20Ecosystem%20Is%20Driving%20Global%20Attacks" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fthe-phishing-as-a-service-pipeline-how-a-scalable-fraud-ecosystem-is-driving-global-attacks%2F&amp;linkname=The%20Phishing-as-a-Service%20Pipeline%3A%20How%20a%20Scalable%20Fraud%20Ecosystem%20Is%20Driving%20Global%20Attacks" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fthe-phishing-as-a-service-pipeline-how-a-scalable-fraud-ecosystem-is-driving-global-attacks%2F&amp;linkname=The%20Phishing-as-a-Service%20Pipeline%3A%20How%20a%20Scalable%20Fraud%20Ecosystem%20Is%20Driving%20Global%20Attacks" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fthe-phishing-as-a-service-pipeline-how-a-scalable-fraud-ecosystem-is-driving-global-attacks%2F&amp;linkname=The%20Phishing-as-a-Service%20Pipeline%3A%20How%20a%20Scalable%20Fraud%20Ecosystem%20Is%20Driving%20Global%20Attacks" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fthe-phishing-as-a-service-pipeline-how-a-scalable-fraud-ecosystem-is-driving-global-attacks%2F&amp;linkname=The%20Phishing-as-a-Service%20Pipeline%3A%20How%20a%20Scalable%20Fraud%20Ecosystem%20Is%20Driving%20Global%20Attacks" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://flashpoint.io/blog/">Threat Intelligence Blog | Flashpoint</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Flashpoint Intel Team">Flashpoint Intel Team</a>. Read the original post at: <a href="https://flashpoint.io/blog/the-phishing-as-a-service-pipeline-how-a-scalable-fraud-ecosystem-is-driving-global-attacks/">https://flashpoint.io/blog/the-phishing-as-a-service-pipeline-how-a-scalable-fraud-ecosystem-is-driving-global-attacks/</a> </p>

Randall Munroe’s XKCD ‘Electric Vehicles’

  • None
  • Published date: 2026-04-10 00:00:00

None

<figure class=" sqs-block-image-figure intrinsic "> <p> <img data-stretch="false" data-image="https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/7f18d6d4-2b1d-4300-b3d4-f6716931eb77/electric_vehicles.png" data-image-dimensions="209x389" data-image-focal-point="0.5,0.5" alt="" data-load="false" elementtiming="system-image-block" src="https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/7f18d6d4-2b1d-4300-b3d4-f6716931eb77/electric_vehicles.png?format=1000w" width="209" height="389" sizes="auto, (max-width: 640px) 100vw, (max-width: 767px) 100vw, 100vw" onload='this.classList.add("loaded")' srcset="https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/7f18d6d4-2b1d-4300-b3d4-f6716931eb77/electric_vehicles.png?format=100w 100w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/7f18d6d4-2b1d-4300-b3d4-f6716931eb77/electric_vehicles.png?format=300w 300w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/7f18d6d4-2b1d-4300-b3d4-f6716931eb77/electric_vehicles.png?format=500w 500w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/7f18d6d4-2b1d-4300-b3d4-f6716931eb77/electric_vehicles.png?format=750w 750w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/7f18d6d4-2b1d-4300-b3d4-f6716931eb77/electric_vehicles.png?format=1000w 1000w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/7f18d6d4-2b1d-4300-b3d4-f6716931eb77/electric_vehicles.png?format=1500w 1500w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/7f18d6d4-2b1d-4300-b3d4-f6716931eb77/electric_vehicles.png?format=2500w 2500w" loading="lazy" decoding="async" data-loader="sqs"><figcaption class="image-caption-wrapper"> <p class=""><strong>via the comic artistry and dry wit of Randall Munroe, creator of XKCD</strong></p> </figcaption></p></figure><p><a href="https://www.infosecurity.us/blog/2026/4/10/randall-munroes-xkcd-electric-vehicles">Permalink</a></p><p> </p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/randall-munroes-xkcd-electric-vehicles/" data-a2a-title="Randall Munroe’s XKCD ‘Electric Vehicles’"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Frandall-munroes-xkcd-electric-vehicles%2F&amp;linkname=Randall%20Munroe%E2%80%99s%20XKCD%20%E2%80%98Electric%20Vehicles%E2%80%99" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Frandall-munroes-xkcd-electric-vehicles%2F&amp;linkname=Randall%20Munroe%E2%80%99s%20XKCD%20%E2%80%98Electric%20Vehicles%E2%80%99" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Frandall-munroes-xkcd-electric-vehicles%2F&amp;linkname=Randall%20Munroe%E2%80%99s%20XKCD%20%E2%80%98Electric%20Vehicles%E2%80%99" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Frandall-munroes-xkcd-electric-vehicles%2F&amp;linkname=Randall%20Munroe%E2%80%99s%20XKCD%20%E2%80%98Electric%20Vehicles%E2%80%99" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Frandall-munroes-xkcd-electric-vehicles%2F&amp;linkname=Randall%20Munroe%E2%80%99s%20XKCD%20%E2%80%98Electric%20Vehicles%E2%80%99" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.infosecurity.us/">Infosecurity.US</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Marc Handelman">Marc Handelman</a>. Read the original post at: <a href="https://xkcd.com/3214/">https://xkcd.com/3214/</a> </p>