Technology

Related News

The NSA is reportedly using Anthropic's new model Mythos

  • feedfeeder
  • Published date: 2026-04-19 21:32:53

Despite the months-long feud between Anthropic and the Pentagon, the National Security Agency is using the AI company's new Mythos Preview, according to Axios , which spoke to two sources with knowledge of the matter. Anthropic announced Mythos Preview at the…

Despite the months-long feud between Anthropic and the Pentagon, the National Security Agency is using the AI company's new Mythos Preview, according to Axios, which spoke to two sources with knowled… [+1495 chars]

Integrity: Partnership With JK Financial Expands AI-Driven Life, Health And Wealth Services

  • Amit Chowdhry
  • Published date: 2026-04-19 17:06:41

Integrity Marketing Group announced that JK Financial has joined its platform, expanding access to AI-powered tools and holistic financial planning services across life, health, and wealth. Financial terms of the partnership were not disclosed.

Integrity Marketing Group announced that JK Financial has joined its platform, expanding access to AI-powered tools and holistic financial planning services across life, health, and wealth. Financial… [+5034 chars]

Inside the rise of wrench attacks against crypto holders and how France has become the focus

  • Olivier Acuna
  • Published date: 2026-04-19 14:00:00

The French authorities have acknowledge the urgent need to implement specific security measures to protect crypto investors and executives from the so-called wrench attacks

France is facing a rise in crypto-related kidnappings as so-called wrench attacks become more frequent, brazen and violent. That shift was visible this week amid the staging of an annual internation… [+5742 chars]

Cryptographically Agile Policy Enforcement for Contextual Data Access

  • None
  • Published date: 2026-04-19 00:00:00

None

<p>The post <a href="https://www.gopher.security/blog/cryptographically-agile-policy-enforcement-contextual-data-access">Cryptographically Agile Policy Enforcement for Contextual Data Access</a> appeared first on <a href="https://www.gopher.security/blog">Read the Gopher Security's Quantum Safety Blog</a>.</p><h2>Understanding the need for Agility in ai contexts</h2><p>Ever wonder why we're still using security math from the 70s to protect ai models that are basically living in the future? It's like putting a wooden deadbolt on a vault full of digital gold—eventually, someone’s going to show up with a chainsaw.</p><p>The problem is that the Model Context Protocol (mcp) lets these models grab data from everywhere—your emails, medical records, or even private retail inventories. If that "context" isn't locked down with more than just standard rsa, we're in trouble.</p><p>Traditional encryption is sitting on a ticking clock. Most of our stuff relies on math problems that quantum computers will eventually find easy. (<a href="https://www.sciencedaily.com/releases/2026/04/260406045126.htm">Scientists find quantum computers forget most of their work</a>)</p><ul> <li><strong>The "Harvest Now, Decrypt Later" threat</strong>: Hackers are stealing encrypted training data today, just waiting for a quantum machine to crack it in five years. According to a 2023 report by Deloitte, organizations need to start transitioning to quantum-resistant readiness now because the transition takes years, not weeks. (<a href="https://deloitte.wsj.com/riskandcompliance/quantum-readiness-the-case-for-future-proofing-infrastructure-3293b06f">Quantum Readiness: The Case for Future-Proofing Infrastructure</a>)</li> <li><strong>Contextual Shelf-life</strong>: In healthcare, patient data needs to stay private for decades. (<a href="https://pmc.ncbi.nlm.nih.gov/articles/PMC12138216/">Data privacy in healthcare: Global challenges and solutions – PMC</a>) If you use mcp to feed a model patient history, that data's "secret" status has to outlast the current crypto standards.</li> <li><strong>Shor's Algorithm</strong>: This is the "chainsaw" I mentioned. It's a quantum algorithm that makes rsa and tls look like wet paper.</li> </ul><p>Agility isn't just a buzzword here; it’s about not having to rewrite your entire api every time a new NIST standard drops. It's the ability to swap out algorithms without the whole system falling over.</p><p><img decoding="async" src="https://cdn.pseo.one/685d00d4cb08ab5f5934b924/690c83ae1ca595b8c6f91e0f/cryptographically-agile-policy-enforcement-contextual-data-access/mermaid-diagram-1.svg" alt="Diagram 1"><br> <em>Diagram 1 shows how a request moves from an ai model through a crypto-agile gateway, which swaps out old encryption for post-quantum algorithms before hitting the data source.</em></p><p>If you're running a finance app, you might need to handle hybrid signatures—mixing old-school security with new post-quantum stuff—just to keep things moving while you upgrade. It's messy because post-quantum keys are way bigger and can slow down your api calls if you don't manage the overhead right.</p><p>I saw a dev team recently try to hardcode a specific quantum-resistant library into their mcp server. Total nightmare. When the library got a patch, they had to rebuild everything. An <strong>agile policy</strong> would've let them just update a config file.</p><p>So, we gotta figure out how to make these policies actually work in the real world without killing performance. Anyway, that leads us right into the architectural frameworks we use to enforce these rules…</p><h2>Implementing granular policy enforcement in MCP</h2><p>Ever tried explaining to a firewall why a specific ai model should see a spreadsheet but not the payroll tab? It’s a mess because traditional rules just see "the model" as one big user, which is a massive security hole.</p><p>If you're messing with mcp, you've probably realized that just "plugging it in" is a recipe for disaster. I've been looking at how <a href="https://gopher.security/">Gopher Security</a> handles this, and they use what they call a 4D framework that actually makes sense for the quantum age. </p><ul> <li><strong>Quantum-Resistant Tunnels</strong>: They don't just rely on old tls. Gopher sets up p2p connectivity using post-quantum standards so even if someone sniffs the traffic now, they can't crack it later when quantum rigs get better. </li> <li><strong>Automated mcp Deployment</strong>: You can basically feed it your openapi or swagger schemas, and it spits out a secure mcp server. It saves so much time compared to manually mapping every endpoint.</li> <li><strong>Identity-First Security</strong>: It treats the model's intent as part of the identity. If the model starts asking for weird stuff it wasn't designed for, the system just cuts it off.</li> <li><strong>Continuous Observability</strong>: This is the fourth pillar—it's about real-time monitoring of every data exchange. You can't secure what you can't see, so they track the "conversation" between the ai and the data to spot anomalies instantly.</li> </ul><blockquote> <p>According to Gopher Security, their approach focuses on "cryptographic agility," allowing teams to swap out encryption modules without breaking the underlying ai logic.</p> </blockquote><p>The old way (rbac) is basically: "Is Dave an admin? Yes? Give him everything." But with ai, Dave isn't the one asking—the model is. We need something way more granular.</p><p>Imagine a retail mcp server. A floor manager might need to check stock levels, but the ai shouldn't be able to pull the home addresses of the warehouse staff just because it has "inventory access." </p><p><img decoding="async" src="https://cdn.pseo.one/685d00d4cb08ab5f5934b924/690c83ae1ca595b8c6f91e0f/cryptographically-agile-policy-enforcement-contextual-data-access/mermaid-diagram-2.svg" alt="Diagram 2"><br> <em>Diagram 2 illustrates the difference between broad rbac access and granular parameter-level filtering where only specific data fields are allowed through to the model.</em></p><p>We’re talking about <strong>parameter-level restrictions</strong>. You can actually block specific "tools" within the mcp if the environmental signals don't look right—like if the request is coming from an unmanaged device or a weird ip range. It stops "tool poisoning," which is when an attacker manipulates the arguments or descriptions the model uses to call external functions, tricking it into doing something dangerous.</p><p>Honestly, it’s about making the security as smart as the ai it’s protecting. Next, we should probably look at securing the communication pipes to make sure nobody is eavesdropping…</p><h2>Defending against the new ai threat landscape</h2><p>You ever feel like giving an ai access to your data is like handing a toddler a loaded gun? It's all fun and games until the model starts seeing things it shouldn't because some clever attacker hid a "ignore all previous instructions" command in a random pdf.</p><p>The real scary part of mcp isn't just the model making a mistake, it's <strong>indirect prompt injection</strong>. This happens when a model reads a malicious resource—like a poisoned customer support ticket—and suddenly starts acting like a puppet for a hacker. </p><p>To stop this, we need <strong>deep packet inspection (dpi)</strong> for ai traffic. We aren't just looking at headers anymore; we're scanning the actual context window for hidden payloads. A 2024 report by HiddenLayer found that nearly 77% of companies surveyed identified ai-specific threats as a top concern, yet many still rely on basic web firewalls.</p><ul> <li><strong>Contextual Sandboxing</strong>: Treat every new mcp resource as "untrusted" until it's scrubbed. </li> <li><strong>Instruction Filtering</strong>: Use a secondary, smaller model to check if the incoming data contains imperative commands that override the system prompt.</li> <li><strong>Real-time mcp Alerts</strong>: If a resource tries to trigger a tool that doesn't match the current task, kill the session immediately.</li> </ul><p><img decoding="async" src="https://cdn.pseo.one/685d00d4cb08ab5f5934b924/690c83ae1ca595b8c6f91e0f/cryptographically-agile-policy-enforcement-contextual-data-access/mermaid-diagram-3.svg" alt="Diagram 3"><br> <em>Diagram 3 shows a security layer intercepting a malicious prompt injection attempt before it reaches the core ai model logic.</em></p><p>If a model usually asks for 10 rows of data and suddenly requests 10,000, your security should be screaming. We need to monitor the <strong>behavioral fingerprints</strong> of these ai-to-server communications to catch zero-day leaks before they get out of hand.</p><p>Monitoring for exfiltration patterns is huge for compliance like soc 2. If the ai starts hitting the database at 3 AM from a weird ip, that’s an anomaly you can't ignore. Honestly, it’s about watching the "intent" of the conversation, not just the bytes.</p><p>Anyway, keeping the models from being hijacked is one thing, but we also gotta talk about future-proofing the architecture so we don't get wrecked by quantum computers…</p><h2>Future-proofing the enterprise ai stack</h2><p>So, we've built these fancy ai models and hooked them up to everything. But if the pipes connecting them are still using old-school locks, we're basically leaving the back door wide open for a quantum-powered burglar.</p><p>When you're setting up mcp, you can't just rely on standard tls anymore. You need secure tunnels that use <strong>Key Encapsulation Mechanisms (KEMs)</strong>. These are math problems that even a quantum computer can't solve in its sleep. In the mcp lifecycle, these kems are usually implemented at the transport layer—specifically as extensions to tls 1.3—to secure the initial handshake before any application data even moves.</p><p>The trick is doing this without making your api feel like it's running on a dial-up modem. Hybrid kems are the way to go—you wrap a classical key inside a post-quantum one. If one fails, the other still holds the line.</p><p>I've seen healthcare apps try to move massive patient datasets over mcp. If they don't use quantum-resistant p2p, that data is "harvest now, decrypt later" bait. You gotta ensure the handshake is fast but the encryption is thick.</p><p><img decoding="async" src="https://cdn.pseo.one/685d00d4cb08ab5f5934b924/690c83ae1ca595b8c6f91e0f/cryptographically-agile-policy-enforcement-contextual-data-access/mermaid-diagram-4.svg" alt="Diagram 4"><br> <em>Diagram 4 depicts a hybrid handshake process where both classical and quantum-resistant keys are exchanged to create a secure tunnel.</em></p><p>Don't just flip the switch and hope for the best. You need a real plan to keep things from breaking when the next security standard drops.</p><ul> <li><strong>Audit your schemas</strong>: Look at your openapi files. Are you exposing "ssn" when the model only needs "last 4 digits"? Trim the fat.</li> <li><strong>Behavioral alerts</strong>: Set up triggers for when a model asks for data it shouldn't. If a retail bot starts asking for credit card hashes instead of tracking numbers, kill the connection.</li> <li><strong>Crypto-agility</strong>: Use a gateway that lets you swap algorithms via config. As mentioned earlier, avoiding hardcoded libraries is the only way to stay sane.</li> </ul><p>A 2023 study by <strong>Cloud Security Alliance</strong> found that a huge chunk of enterprises aren't ready for the quantum transition because their crypto is "brittle." Don't be that guy.</p><p>Anyway, the goal isn't to be perfect—it's to be harder to hit than the next guy. Keep your keys fresh, your policies tight, and your ai on a short leash. Good luck out there.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/cryptographically-agile-policy-enforcement-for-contextual-data-access/" data-a2a-title="Cryptographically Agile Policy Enforcement for Contextual Data Access"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fcryptographically-agile-policy-enforcement-for-contextual-data-access%2F&amp;linkname=Cryptographically%20Agile%20Policy%20Enforcement%20for%20Contextual%20Data%20Access" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fcryptographically-agile-policy-enforcement-for-contextual-data-access%2F&amp;linkname=Cryptographically%20Agile%20Policy%20Enforcement%20for%20Contextual%20Data%20Access" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fcryptographically-agile-policy-enforcement-for-contextual-data-access%2F&amp;linkname=Cryptographically%20Agile%20Policy%20Enforcement%20for%20Contextual%20Data%20Access" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fcryptographically-agile-policy-enforcement-for-contextual-data-access%2F&amp;linkname=Cryptographically%20Agile%20Policy%20Enforcement%20for%20Contextual%20Data%20Access" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fcryptographically-agile-policy-enforcement-for-contextual-data-access%2F&amp;linkname=Cryptographically%20Agile%20Policy%20Enforcement%20for%20Contextual%20Data%20Access" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.gopher.security/blog">Read the Gopher Security&amp;#039;s Quantum Safety Blog</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Read the Gopher Security's Quantum Safety Blog">Read the Gopher Security's Quantum Safety Blog</a>. Read the original post at: <a href="https://www.gopher.security/blog/cryptographically-agile-policy-enforcement-contextual-data-access">https://www.gopher.security/blog/cryptographically-agile-policy-enforcement-contextual-data-access</a> </p>

A History of Global Hacking — and Where It’s Going Next

  • None
  • Published date: 2026-04-19 00:00:00

None

<p>The post <a href="https://www.govtech.com/blogs/lohrmann-on-cybersecurity/a-history-of-global-hacking-and-where-its-going-next">A History of Global Hacking — and Where It’s Going Next</a> appeared first on Lohrmann on Cybersecurity.</p><p><main id="readArticle" class="Page-main" data-module="" data-padding="none" morss_own_score="5.174216027874564" morss_score="13.809575143896664"></main></p><p><a href="https://www.govtech.com/blogs/lohrmann-on-cybersecurity">Lohrmann on Cybersecurity</a></p><h1>A History of Global Hacking — and Where It’s Going Next</h1><h2>In her new book, <i>Code War: How Nations Hack, Spy, and Shape the Digital Battlefield,</i> Allie Mellen provides true stories of the current cyber war and, importantly, what might be ahead.</h2><div>April 19, 2026 • </div><p><a href="https://www.govtech.com/authors/dan-lohrmann.html"><span>Dan Lohrmann</span></a></p><figure> <p><img decoding="async" src="https://erepublic.brightspotcdn.com/dims4/default/5992c28/2147483647/strip/true/crop/5677x2960+0+338/resize/840x438!/quality/90/?url=http%3A%2F%2Ferepublic-brightspot.s3.us-west-2.amazonaws.com%2F80%2F7f%2F06383ac444849563869885bc280e%2Fadobestock-261287007.jpeg"></p> <div>Adobe Stock/lev dolgachov</div> </figure><div class="Page-articleBody RichTextBody" morss_own_score="5.449856733524355" morss_score="132.94985673352437"> <p> In the midst of recent battles with Iran and their global partners, U.S. public- and private-sector organizations are also battling to <a href="https://www.govtech.com/blogs/lohrmann-on-cybersecurity/securing-critical-infrastructure-in-a-time-of-war">secure critical infrastructure in a time of war</a>. Federal agencies recently <a href="https://www.politico.com/news/2026/04/07/iranian-hackers-energy-water-cybersecurity-00862018">warned that Iranian hackers are targeting U.S. energy and water sectors</a>.</p></div><div>For example, the Cybersecurity and Infrastructure Security Agency and other three-letter agencies released this advisory: “<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa26-097a">Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure</a>.”</div><div>But backing up a bit, many thoughtful readers are interested in more context, history, examples and deeper-dive stories of what has happened, is happening now and will be happening in the future regarding nation-state hacking. </div><div>Which is where a new book by Allie Mellen is so helpful. Mellen <a href="https://www.linkedin.com/in/hackerxbella/">is principal analyst for Forrester</a>, and she has owned and operated a successful technical consultancy during her career. Her book covers a wide range of topics and stories related to various cybersecurity themes, trends, power structures and hacking activities by China, Russia and more. <figure> <p><img decoding="async" src="https://erepublic.brightspotcdn.com/dims4/default/7c4a58e/2147483647/strip/true/crop/126x177+0+0/resize/840x1180!/quality/90/?url=http%3A%2F%2Ferepublic-brightspot.s3.us-west-2.amazonaws.com%2F8a%2F95%2F5585860149dab8b6d0e6c0b93dd2%2Fcode-war.png"></p> </figure> <p>Here is the <a href="https://www.amazon.com/Code-War-Nations-Digital-Battlefield/dp/1394285574">abstract for <i>Code War</i> from Amazon</a>:</p></div><div>“Cyberattacks are the ultimate geopolitical weapon of the 21st century. They are used to damage presidential campaigns, shut down electric grids, sway public sentiment, and cost businesses and governments alike billions of dollars.</div><div>“Popular culture portrays cyberattacks as unstoppable and mysterious actions taken by shadowy, unpredictable forces. </div><div>“They aren’t. <i>Code War: How Nations Hack, Spy, and Shape the Digital Battlefield</i> shatters this depiction, revealing nation-state cyberattacks for what they are: calculated, measured actions to achieve state objectives.</div><div>“World-renowned cybersecurity expert Allie Mellen draws on her extensive experience with nation-state cyberattacks and AI threats to break down how and why nations deploy cyberattacks in their own unique ways, driven by their military doctrine, national history, and, most importantly, geopolitical strategy.</div><div>“Mellen deconstructs the most infamous cyberattacks of our time to reveal how and why attacks like Stuxnet, WannaCry, and NotPetya happened and how their success altered the international landscape. She juxtaposes these attacks against the brutal reality of how nations surveil, manipulate, and control their own citizens’ data.</div><div>“An essential resource for individuals, business professionals, and government officials, <i>Code War</i> demonstrates how you can use this knowledge to understand and respond to the practical realities of nation-state cyberattacks.</div><div>“Readers will also find: <ul> <li>An overview of how cyberattacks and defenses operate, where governments most frequently use them, their limitations, and where they provide the most value</li> <li>An in-depth breakdown of some of the most important cyberattacks of the modern age, including those targeting the 2016 US Presidential elections, the Olympics, and those against Taiwan, Ukraine, and Tibet</li> <li>Deep dives into the histories and attacks perpetrated by governments with the most prolific cyberattacks: China, Russia, and the United States</li> </ul> <p>“An eye-opening guide to the world of nation-state cyberattacks, <i>Code War</i> is a must-read for business and government leaders responsible for protecting against these attacks. It’s also a fascinating look into the world of cyberattacks for anyone interested in international relations who wants to keep up with the evolving weapons of war.”</p></div><div>Some of the topics covered in <i>Code War</i> are shown here: <figure> <p><img decoding="async" src="https://erepublic.brightspotcdn.com/dims4/default/54f5fab/2147483647/strip/true/crop/480x354+0+0/resize/840x620!/quality/90/?url=http%3A%2F%2Ferepublic-brightspot.s3.us-west-2.amazonaws.com%2Fb9%2F2f%2Fab8805cf494397b572e5f4aef1e4%2Fcode-war2.jpg"></p> </figure> <p>In addition, there are detailed sections on Russia and China hacking, with stories and great examples provided like crypto wars, Olympic games, “Beijing’s Trojan Dragon,” disinformation and much more.</p> <h3>MY THOUGHTS ON CODE WAR</h3> </div><div>I really enjoyed this book for several reasons.</div><div>First, the overview of our current cybersecurity situation globally is packed with true stories and examples that put the headlines we see every day into context.</div><div>Second, I found Part IV on the future to be very insightful and helpful. Here’s how Chapter 43, “Three Broken Promises,” opens:</div><div>“Though the United States remains the world’s leading power, it now operates in a competitive environment where influence is increasingly contested. The unipolar era has ended, and the coming decades will define the balance of power in a world no longer centered on a single place.</div><div>“Here’s the wrench that is being thrown in the works of all three of these nations — the United States, China and Russia: Leadership across the board is failing to live up to the social contracts it has established with its people.”</div><div>The chapter then describes the challenges in all three countries. Part IV goes on to discuss the changes coming with NVIDIA and AI, which the author calls “The Fourth Power.”</div><div>In Chapter 45, the case is made that “reality does not exist.” Here is how that chapter ends:</div><div>“AI providers are capable of adjusting their models to craft the reality they or the government wants us to have. Visibility into its decisions that models make, opaque, which makes it even more difficult to understand why they produced the outputs they did.</div><div>“We have come further than the disinformation-ridden world of the past. We are firmly in a world where reality no longer exists. It is what we decide. Nations, enterprises, and individuals face a battle for believability.”</div><div>Finally, in the conclusion in Chapter 45, we see this:</div><div>“The one through line in this book is you.</div><div>“What do nation-states want? Your data. What do they want to influence? Your worldview. What are you to them? Someone to protect or to persecute.</div><div>“What do tech companies want? Your data. What do they want to keep? Your attention. What are you to them? A user to serve and a resource to exploit.”</div><div>Mellen elaborates on how cybersecurity is so critical to this conversation and closes with this: “We get to chose what we demand from governments and companies — and what we are no longer willing to accept.” <h3>FINAL THOUGHTS</h3> </div><div>For decades, Paul Harvey, a legendary American radio broadcaster, famously said “And now you know … the rest of the story.”</div><div>Thoughtful readers still want to know what has happened in our recent global history with technology and hacking. How did we get to this point in 2026 between nation-states and criminal hackers, and where we are going next?</div><div>Before focusing on AI hacking and cybersecurity in the future, this book will help you understand the rest of the story regarding the importance of data and the impact on you and your customers.</div><p><a href="https://www.govtech.com/tag/cybersecurity">Cybersecurity</a></p><p><a href="https://www.govtech.com/authors/dan-lohrmann.html"></a></p><p><img decoding="async" src="https://erepublic.brightspotcdn.com/dims4/default/7be6234/2147483647/strip/true/crop/343x343+77+0/resize/100x100!/quality/90/?url=http%3A%2F%2Ferepublic-brightspot.s3.us-west-2.amazonaws.com%2Faa%2Fbe%2F66bbbc539526800857dd96f3c9d5%2Flohrman.jpg"></p><p></p><p><a href="https://www.govtech.com/authors/dan-lohrmann.html">Dan Lohrmann</a></p><div> Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker and author. </div><p><a href="https://www.govtech.com/authors/dan-lohrmann.html">See More Stories by Dan Lohrmann</a></p><p></p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/a-history-of-global-hacking-and-where-its-going-next/" data-a2a-title="A History of Global Hacking — and Where It’s Going Next"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fa-history-of-global-hacking-and-where-its-going-next%2F&amp;linkname=A%20History%20of%20Global%20Hacking%20%E2%80%94%20and%20Where%20It%E2%80%99s%20Going%20Next" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fa-history-of-global-hacking-and-where-its-going-next%2F&amp;linkname=A%20History%20of%20Global%20Hacking%20%E2%80%94%20and%20Where%20It%E2%80%99s%20Going%20Next" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fa-history-of-global-hacking-and-where-its-going-next%2F&amp;linkname=A%20History%20of%20Global%20Hacking%20%E2%80%94%20and%20Where%20It%E2%80%99s%20Going%20Next" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fa-history-of-global-hacking-and-where-its-going-next%2F&amp;linkname=A%20History%20of%20Global%20Hacking%20%E2%80%94%20and%20Where%20It%E2%80%99s%20Going%20Next" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fa-history-of-global-hacking-and-where-its-going-next%2F&amp;linkname=A%20History%20of%20Global%20Hacking%20%E2%80%94%20and%20Where%20It%E2%80%99s%20Going%20Next" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="">Lohrmann on Cybersecurity</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Lohrmann on Cybersecurity">Lohrmann on Cybersecurity</a>. Read the original post at: <a href="https://www.govtech.com/blogs/lohrmann-on-cybersecurity/a-history-of-global-hacking-and-where-its-going-next">https://www.govtech.com/blogs/lohrmann-on-cybersecurity/a-history-of-global-hacking-and-where-its-going-next</a> </p>

The AI Doomers Who Are Playing With Fire

  • Matt Novak
  • Published date: 2026-04-18 12:00:38

For years, the dangerous rhetoric has been out of control. And things are turning violent.

After OpenAI’s ChatGPT burst onto the scene in late 2022, it wasn’t long before mainstream America started hearing about the warnings. Executives at the top AI companies told us that they were buildi… [+9926 chars]

Turn your office suite around with this deal on Microsoft 365

  • Stack Commerce
  • Published date: 2026-04-18 11:00:00

Empower productivity by saving on a one-year subscription. The post Turn your office suite around with this deal on Microsoft 365 appeared first on Popular Science.

We may earn revenue from the products available on this page and participate in affiliate programs. Learn more TL;DR: Empower productivity with a one-year subscription to Microsoft 365 for just $69.9… [+2069 chars]

Responsible AI Governance for UK SMEs: A Practical Starting Point

  • None
  • Published date: 2026-04-18 00:00:00

None

<p><!-- content style : start --></p><style type="text/css" data-name="kubio-style"></style><p><!-- content style : end --></p><h1>Responsible AI Governance for UK SMEs: A Practical Starting Point</h1><p>Artificial intelligence is moving quickly into everyday business use. For many UK SMEs, that means AI is no longer a future topic. It is already helping with drafting content, summarising documents, handling customer queries, analysing data, and supporting internal decisions.</p><p>That can bring real value, but it also creates new risks. If AI is introduced without clear oversight, it can expose business information, produce unreliable outputs, or be used in ways that do not match the organisation’s expectations. That is why responsible AI governance matters. In simple terms, it is the set of decisions, rules, and checks that help a business use AI safely, consistently, and in line with its risk appetite.</p><p>For a small business, governance does not need to be heavy or bureaucratic. In fact, the best approach is usually the simplest one that still gives you control. The aim is not to stop people using AI. The aim is to make sure it is used in a way that supports the business rather than creating avoidable problems.</p><h2>What responsible AI governance means for a small business</h2><h3>Why governance matters before AI use scales</h3><p>Many SMEs start with AI informally. A team member tries a public tool to draft an email. Another uses AI to summarise meeting notes. Someone else pastes customer information into a chatbot to save time. Individually, these actions may seem low risk. But once AI use becomes common, the business can quickly lose sight of where information is going, who is approving use, and whether the outputs are reliable.</p><p>Governance matters before AI use scales because it is much easier to set expectations early than to correct poor habits later. A small amount of structure can prevent confusion, reduce duplication, and help staff understand what is acceptable. It also makes it easier for leaders to explain to customers, suppliers, and partners how AI is being used.</p><h3>How to keep the approach practical and proportionate</h3><p>For UK SMEs, proportionate governance means matching controls to the level of risk. A low-risk use case, such as drafting internal meeting notes, does not need the same level of oversight as a tool that influences hiring, pricing, or customer decisions. The point is to avoid over-engineering.</p><p>A practical approach usually includes a short policy, named ownership, a basic review process for new tools, and clear rules on data handling. You do not need a large committee or a long approval chain. You do need enough clarity that staff know what to do, and enough oversight that leaders can spot issues early.</p><h2>Common AI risks UK SMEs should plan for</h2><h3>Data leakage and inappropriate use of business information</h3><p>One of the most common risks is accidental disclosure of business or customer information. Staff may paste confidential material into an AI tool without realising how it is stored, processed, or reused. This can include customer records, commercial plans, internal policies, source code, or sensitive emails.</p><p>Even when a tool appears convenient, the business still needs to understand what information is suitable to share. A sensible rule is to treat public AI tools cautiously and avoid entering anything that would be sensitive if it appeared outside the business. That includes personal data, confidential contracts, and information covered by contractual restrictions.</p><h3>Bias, inaccurate outputs, and over-reliance on AI results</h3><p>AI tools can produce outputs that sound convincing but are wrong, incomplete, or out of date. They can also reflect bias in the data they were trained on or in the way they are used. For SMEs, the main risk is often not that AI is malicious, but that people trust it too much.</p><p>This matters when AI is used to support decisions about customers, staff, suppliers, or finance. If a business relies on AI without checking the result, it may make poor decisions or miss important context. Responsible AI governance should therefore assume that AI output is a starting point, not a final answer. Human review remains important, especially where the outcome affects people or business-critical decisions.</p><h2>A simple governance framework you can apply</h2><h3>Set ownership, approval, and review responsibilities</h3><p>Every AI use case should have a clear owner. That person does not need to be a technical expert, but they should understand why the tool is being used, what data it touches, and what risks it introduces. Ownership helps avoid the common problem where everyone assumes someone else is responsible.</p><p>It is also useful to define who can approve new AI tools, who can review higher-risk use cases, and who should be informed if something goes wrong. In a small business, this may simply mean the managing director, operations lead, or IT lead, depending on the structure of the organisation. The important point is that responsibility is visible, not implied.</p><h3>Define acceptable use, data handling, and escalation routes</h3><p>A short acceptable use policy is often enough to get started. It should explain what staff may use AI for, what they must not do, and when they need approval. It should also cover data handling, including what types of information must not be entered into external tools.</p><p>Escalation routes matter too. If a staff member notices an AI output that looks wrong, or if they think information has been shared inappropriately, they should know who to tell. The process should be simple and non-punitive. Staff are more likely to report issues early if they know the business wants to learn from them rather than blame them.</p><h2>How to assess AI tools before adoption</h2><h3>Questions to ask suppliers and internal teams</h3><p>Before adopting an AI tool, ask a few basic questions. What business problem is it solving? What data will it use? Who can access the information? Is the tool being used for internal support only, or will it influence customer-facing or operational decisions? What happens if the tool is unavailable or gives a poor answer?</p><p>It is also worth asking whether the tool is being introduced because it is genuinely useful, or simply because it is available. Not every process needs AI. Sometimes a simpler, more predictable method is the better business choice.</p><p>From a supplier perspective, ask how the tool handles data, whether it offers admin controls, whether logs are available, and whether the business can limit how information is retained or shared. You do not need a perfect answer to every question, but you do need enough information to judge whether the risk is acceptable.</p><h3>What to look for in privacy, security, and control settings</h3><p>When reviewing an AI tool, look for practical controls rather than marketing claims. Useful features may include user access controls, the ability to restrict sensitive data, audit logs, role-based permissions, and settings for data retention. If the tool integrates with other systems, check what permissions it needs and whether those permissions are broader than necessary.</p><p>Privacy notices and terms of use should be read carefully, especially where customer or employee data may be involved. If the business cannot clearly explain how the tool uses data, that is usually a sign to pause and review further. For SMEs, the goal is not to eliminate all risk, but to understand it well enough to manage it.</p><h2>Building staff awareness without overcomplicating it</h2><h3>Practical guidance for everyday users</h3><p>Staff awareness is one of the most effective parts of responsible AI governance. People do not need a long technical briefing. They need clear, practical guidance that fits how they work.</p><p>For example, staff should know that AI output must be checked before it is used, that sensitive information should not be pasted into public tools, and that AI should not be treated as a source of truth. They should also understand that if a tool is used to support a customer response, a report, or a decision, a human remains accountable for the final result.</p><p>Short examples are often more useful than abstract rules. Show staff what safe use looks like in your business. That might include drafting internal communications, summarising non-sensitive notes, or helping with brainstorming. It should also include examples of what not to do, such as entering confidential client details or relying on AI for final decisions without review.</p><h3>Keeping policies short, clear, and usable</h3><p>Policies work best when people can actually use them. A short, well-written AI policy is usually more effective than a long document that nobody reads. Keep the language plain. Avoid unnecessary jargon. Make the rules easy to find and easy to follow.</p><p>It can help to structure the policy around three simple questions: what is allowed, what needs approval, and what is prohibited. That gives staff a quick reference point and reduces uncertainty. If the policy becomes too long, it may be better to split it into a short policy and a separate guidance note with examples.</p><h2>Reviewing and improving AI governance over time</h2><h3>Using incidents and near misses to refine controls</h3><p>AI governance should improve as the business learns. If a staff member uses a tool in an unexpected way, or if an output creates confusion, treat it as useful feedback. Near misses are often the best source of improvement because they show where the current controls are not quite clear enough.</p><p>Review what happened, whether the policy was understood, and whether the business needs a better control or a clearer instruction. This is a practical way to strengthen governance without adding unnecessary process.</p><h3>When to revisit policies as tools and use cases change</h3><p>AI tools change quickly, and so do business needs. A policy that worked six months ago may no longer be enough if the business adopts new systems, starts using AI with customer data, or expands into new use cases. Revisit the policy when there is a significant change in tools, suppliers, data types, or decision-making processes.</p><p>A regular review cycle is sensible, even if it is light-touch. For many SMEs, an annual review is a good starting point, with additional checks whenever a major change is introduced. The review does not need to be complicated. It just needs to confirm that the controls still match the way the business actually uses AI.</p><h2>Getting started without delay</h2><p>If your business is just beginning to use AI, start small. Identify the tools in use, decide who owns them, set a few clear rules on data handling, and give staff simple guidance they can follow. Then review the position regularly and adjust as needed.</p><p>Responsible AI governance is not about slowing the business down. It is about helping it use AI with more confidence, better consistency, and fewer surprises. For UK SMEs, that is usually the right balance between innovation and control.</p><p>If you would like support shaping a practical, risk-based approach to AI governance as part of your wider information security programme, speak to a consultant.</p><h2>Frequently asked questions</h2><p><strong>What is responsible AI governance for an SME?</strong><br>It is the set of rules, roles, and checks that help a small business use AI safely and consistently. It usually covers ownership, data handling, approval of new tools, staff guidance, and regular review.</p><p><strong>How can a small business start governing AI without a large compliance team?</strong><br>Start with a short policy, named ownership, basic supplier checks, and simple staff guidance. Focus on the highest-risk uses first, then improve the approach over time as the business learns more.</p><p><strong>Do all AI tools need the same level of control?</strong><br>No. The level of control should match the risk. A low-risk internal use case may need only light oversight, while a tool that handles sensitive data or supports important decisions needs more scrutiny.</p><p><strong>What is the biggest mistake SMEs make with AI?</strong><br>The most common mistake is allowing AI use to grow informally without clear rules. That can lead to data leakage, poor decisions, and confusion over who is responsible.</p><p><strong>Should AI outputs always be checked by a person?</strong><br>Yes, especially where the output will be used in a customer-facing, operational, or decision-making context. AI should support human judgement, not replace it.</p><p><strong>How often should AI governance be reviewed?</strong><br>At least annually, and sooner if the business adopts new tools, changes how data is used, or starts applying AI to higher-risk activities.</p><p>The post <a href="https://clearpathsecurity.co.uk/responsible-ai-governance-for-uk-smes-a-practical-starting-point-2/">Responsible AI Governance for UK SMEs: A Practical Starting Point</a> appeared first on <a href="https://clearpathsecurity.co.uk/">Clear Path Security Ltd</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/responsible-ai-governance-for-uk-smes-a-practical-starting-point/" data-a2a-title="Responsible AI Governance for UK SMEs: A Practical Starting Point"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fresponsible-ai-governance-for-uk-smes-a-practical-starting-point%2F&amp;linkname=Responsible%20AI%20Governance%20for%20UK%20SMEs%3A%20A%20Practical%20Starting%20Point" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fresponsible-ai-governance-for-uk-smes-a-practical-starting-point%2F&amp;linkname=Responsible%20AI%20Governance%20for%20UK%20SMEs%3A%20A%20Practical%20Starting%20Point" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fresponsible-ai-governance-for-uk-smes-a-practical-starting-point%2F&amp;linkname=Responsible%20AI%20Governance%20for%20UK%20SMEs%3A%20A%20Practical%20Starting%20Point" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fresponsible-ai-governance-for-uk-smes-a-practical-starting-point%2F&amp;linkname=Responsible%20AI%20Governance%20for%20UK%20SMEs%3A%20A%20Practical%20Starting%20Point" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fresponsible-ai-governance-for-uk-smes-a-practical-starting-point%2F&amp;linkname=Responsible%20AI%20Governance%20for%20UK%20SMEs%3A%20A%20Practical%20Starting%20Point" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://clearpathsecurity.co.uk/">Clear Path Security Ltd</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Clear Path Security Ltd">Clear Path Security Ltd</a>. Read the original post at: <a href="https://clearpathsecurity.co.uk/responsible-ai-governance-for-uk-smes-a-practical-starting-point-2/">https://clearpathsecurity.co.uk/responsible-ai-governance-for-uk-smes-a-practical-starting-point-2/</a> </p>

Ignoring DPDP Compliance? Here’s the Risk to Your Organization

  • None
  • Published date: 2026-04-18 00:00:00

None

<p>In boardroom discussions, data breaches are typically evaluated through the lens of financial impact, regulatory exposure, and operational disruption. While these factors are critical, they often overshadow a more fundamental concern: the <strong>consumer</strong>. Every piece of personal data collected by an organization represents a relationship built on trust. When that data is mishandled, exposed, or misused, the impact extends far beyond compliance violations. It directly affects individuals who have entrusted organizations with their personal information. With the enforcement of the <a href="https://kratikal.com/dpdp-act"><mark class="has-inline-color has-luminous-vivid-orange-color">Digital Personal Data Protection Act, 2023</mark></a>, this trust is no longer an abstract concept. It is a <strong>legal and operational responsibility</strong> that organizations must actively uphold. In this blog, we will explore how organizations are at risk if they ignore DPDP compliance.</p><h2 class="wp-block-heading"><strong>Impact of Ineffective Data Practices</strong></h2><p>Inadequate data protection is not just a technical failure; it is a systemic risk that affects both individuals and organizations.</p><p>From a consumer perspective, the consequences can be severe and long-lasting. Exposure of personal data can lead to identity theft, financial fraud, and persistent privacy violations. Individuals may find themselves targeted by phishing campaigns or social engineering attacks, often without immediate awareness of how their data was compromised.</p><p>For organizations, these incidents translate into tangible business risks. Loss of customer trust is often immediate and difficult to recover. Reputational damage can impact market perception, investor confidence, and long-term growth. Additionally, customer churn increases as users migrate to platforms they perceive as more secure and transparent.</p><p>A data breach, therefore, is not just an isolated incident; it is a reflection of how effectively an organization governs and protects the data entrusted to it.</p><p><br> <br> </p><br><meta charset="UTF-8"><br><meta name="viewport" content="width=device-width, initial-scale=1.0"><p> <!-- IMPORTANT: SEO control --><br> <meta name="robots" content="noindex, nofollow"></p><p> </p><title>Blog Form</title><br><div class="containers"> <!-- Left Section --> <div class="left-section"> <p class="heading-wrap">Book Your Free Cybersecurity Consultation Today!</p> <p> <img decoding="async" src="https://awareness.threatcop.ai/marketing/new_asset_blog_form.svg" alt="People working on cybersecurity" class="consultation-image"> </p></div> <p> <!-- Right Section --></p> <div class="right-section"> <div class="form-containers"> <form action="https://kratikal.com/thanks/thankyou-blog" method="get" onsubmit="return validateForm(this)"> <div class="form-group"> <label for="fullName">Full Name</label><br> <input type="text" required name="FullName" placeholder="Enter full name"> </div> <div class="form-group"> <label for="email">Email ID</label><br> <input type="email" required name="email" placeholder="your name @ example.com"> </div> <div class="form-group"> <label for="company">Company Name</label><br> <input type="text" required name="CompanyName" placeholder="Enter company name"> </div> <div class="form-group"> <label for="phone">Phone Number</label><br> <input type="number" required name="Phone" placeholder="Enter phone number"> </div> <p> <input type="hidden" name="BlogForm" value="BlogForm"><br> <button type="submit" class="submit-btnns" name="submit" value="I am interested!">I am interested!</button><br> </p></form> </div> </div> </div><p><!-- CSS Styles --></p><style> .containers{ display: flex; width: 100%; max-width: 800px; height: 500px; box-shadow: 0 0 10px rgba(0, 0, 0, 0.1); border-radius: 4px; overflow: hidden; margin: 25px auto; } .left-section { width: 50%; background-color: #000; color: white; padding: 30px; display: flex; flex-direction: column; position: relative; overflow: hidden; } .left-section .heading-wrap { font-size: 24px; line-height: 40px; margin-bottom: 30px; z-index: 2; position: relative; color: white; } .consultation-image { position: absolute; bottom: 0; left: 0; width: 100%; height: 70%; object-fit: cover; object-position: center; } .right-section { width: 50%; background-color: white; padding: 30px; display: flex; flex-direction: column; justify-content: center; } .form-containers { width: 100%; } .form-group { margin-bottom: 20px; } label { display: block; color: #666; margin-bottom: 5px; font-size: 14px; } .right-section input { width: 88%; padding: 12px 15px; border: 1px solid #e0e0e0; border-radius: 8px; font-size: 16px; } .submit-btnns { width: 100%; padding: 15px; background: linear-gradient(to right, #e67e22, #d35400); border: none; border-radius: 8px; color: white; font-size: 18px; font-weight: bold; cursor: pointer; margin-top: 10px; } /* Responsive */ @media (max-width: 768px) { .containers { flex-direction: column; height: auto; } .left-section, .right-section { width: 100%; } .left-section { height: 400px; } .consultation-image { height: 60%; } } @media (max-width: 480px) { .left-section { padding: 20px; height: 350px; } .left-section .heading-wrap { font-size: 17px; line-height: 28px;width: 80%; } .right-section { padding: 20px; } .right-section input, .submit-btnns { padding: 10px; } } </style><p><!-- JS Validation --><br> <script> function validateForm(form) { const inputs = form.querySelectorAll("input[type=text], input[type=email], input[type=number]"); for (let i = 0; i < inputs.length; i++) { if (/[<>]/.test(inputs[i].value)) { alert("Tags and attributes are not allowed in form fields!"); return false; // prevent submission } } return true; // allow submission } </script><br> <script>(function(){function c(){var b=a.contentDocument||a.contentWindow.document;if(b){var d=b.createElement('script');d.innerHTML="window.__CF$cv$params={r:'9ee958558a4336bb',t:'MTc3NjU3NDgyMA=='};var a=document.createElement('script');a.src='/cdn-cgi/challenge-platform/scripts/jsd/main.js';document.getElementsByTagName('head')[0].appendChild(a);";b.getElementsByTagName('head')[0].appendChild(d)}}if(document.body){var a=document.createElement('iframe');a.height=1;a.width=1;a.style.position='absolute';a.style.top=0;a.style.left=0;a.style.border='none';a.style.visibility='hidden';document.body.appendChild(a);if('loading'!==document.readyState)c();else if(window.addEventListener)document.addEventListener('DOMContentLoaded',c);else{var e=document.onreadystatechange||function(){};document.onreadystatechange=function(b){e(b);'loading'!==document.readyState&&(document.onreadystatechange=e,c())}}}})();</script><script defer src="https://static.cloudflareinsights.com/beacon.min.js/v8c78df7c7c0f484497ecbca7046644da1771523124516" integrity="sha512-8DS7rgIrAmghBFwoOTujcf6D9rXvH8xm8JQ1Ja01h9QX8EzXldiszufYa4IFfKdLUKTTrnSFXLDkUEOTrZQ8Qg==" data-cf-beacon='{"version":"2024.11.0","token":"33edbdb5f462496f85e52978979b687b","server_timing":{"name":{"cfCacheStatus":true,"cfEdge":true,"cfExtPri":true,"cfL4":true,"cfOrigin":true,"cfSpeedBrain":true},"location_startswith":null}}' crossorigin="anonymous"></script> </p><h3 class="wp-block-heading"><strong>What Happens When Consumer Choices are Ignored?</strong></h3><p>Consumers are increasingly aware of their data rights and privacy expectations. When organizations fail to respect these expectations, the consequences are both immediate and measurable.</p><p>Users are quick to disengage from platforms that misuse or overuse their data. Negative experiences are often shared publicly, influencing broader perception and brand reputation. In parallel, regulators are becoming more proactive in identifying and penalizing non-compliant practices.</p><p>Ignoring consumer privacy choices can result in:</p><ul class="wp-block-list"> <li>Declining user engagement and retention</li> <li>Increased negative sentiment and reputational risk</li> <li>Greater likelihood of audits and regulatory action</li> <li>Loss of competitive advantage in privacy-conscious markets</li> </ul><p>Trust, once compromised, is difficult to rebuild. In a highly competitive environment, even minor lapses can significantly impact business outcomes.</p><h3 class="wp-block-heading"><strong>The Role of Data Governance in DPDP Compliance</strong></h3><p>Effective<mark class="has-inline-color has-luminous-vivid-orange-color"> </mark><a href="https://kratikal.com/blog/understanding-indias-dpdp-act-a-complete-overview/"><mark class="has-inline-color has-luminous-vivid-orange-color">DPDP compliance</mark></a><mark class="has-inline-color has-luminous-vivid-orange-color"><a href="https://kratikal.com/blog/understanding-indias-dpdp-act-a-complete-overview/"> </a></mark>begins with strong data governance. Organizations must have clear visibility into what data they collect, where it resides, and how it flows across systems.</p><p>Without a structured governance framework, even well-intentioned security measures can fall short. Data silos, inconsistent policies, and a lack of ownership create gaps that increase both compliance and security risks.</p><p>A mature data governance strategy enables organizations to:</p><ul class="wp-block-list"> <li>Maintain accurate data inventories</li> <li>Enforce consistent data handling policies</li> <li>Ensure accountability across teams</li> <li>Support audit readiness and regulatory reporting</li> </ul><p>In the context of the Digital Personal Data Protection Act, 2023, governance is not optional; it is foundational to demonstrating compliance.</p><h3 class="wp-block-heading"><strong>Key Compliance Requirements Organizations Must Implement</strong></h3><p>To effectively address the risks associated with non-compliance, organizations must adopt a structured and practical approach to <strong>DPDP compliance</strong>, aligned with regulatory expectations outlined under India’s DPDP framework.</p><ol class="wp-block-list"> <li><strong>Data Discovery and Mapping</strong></li> </ol><p>A foundational step in achieving DPDP compliance is establishing <strong>complete visibility into the data landscape</strong>.</p><p>Organizations must be able to clearly identify:</p><ul class="wp-block-list"> <li>What personal data is being collected</li> <li>Where this data is stored across systems, applications, and environments</li> <li>Who has access to the data, both internally and externally</li> </ul><p>This level of visibility enables organizations to maintain control over their data assets, enforce appropriate safeguards, and demonstrate accountability, key expectations under the Digital Personal Data Protection Act, 2023.</p><ol start="2" class="wp-block-list"> <li><strong>Consent Management Framework</strong></li> </ol><p>The DPDP framework places significant emphasis on <strong>consent-driven data processing</strong>, making it essential for organizations to implement a robust consent management mechanism.</p><p>A compliant consent framework should include:</p><ul class="wp-block-list"> <li>Clear and purpose-specific consent notices</li> <li>Multi-language accessibility to ensure user understanding across diverse audiences</li> <li>Simple and user-friendly mechanisms to withdraw consent</li> <li>Proper consent tracking, logging, and auditability</li> </ul><p>By implementing these measures, organizations can ensure transparency in data processing while empowering individuals to exercise control over their personal data.</p><ol start="3" class="wp-block-list"> <li><strong>Security Controls and Monitoring</strong></li> </ol><p>Organizations are required to implement <strong>reasonable security safeguards</strong> to protect personal data from breaches and misuse.</p><p>Essential measures include:</p><ul class="wp-block-list"> <li>Encryption of sensitive data</li> <li>Role-based access controls</li> <li>Continuous monitoring of systems and data flows</li> <li>Regular vulnerability assessments and testing</li> </ul><p>These controls help reduce the risk of unauthorized access and strengthen the overall data protection posture.</p><ol start="4" class="wp-block-list"> <li><strong>Incident Response and Breach Management</strong></li> </ol><p>The DPDP framework mandates timely reporting and response to data breaches.</p><p>Organizations must:</p><ul class="wp-block-list"> <li>Detect incidents at the earliest possible stage</li> <li>Respond within defined regulatory timelines</li> <li>Notify both authorities and affected individuals, as required</li> </ul><p>A well-defined incident response plan is critical to minimizing damage and ensuring compliance.</p><p><br> <br> </p><br><meta charset="UTF-8"><br><meta name="viewport" content="width=device-width, initial-scale=1.0"><br><title>Cyber Security Squad – Newsletter Signup</title><link rel="stylesheet" href="https://kratikal.com/blog/ignoring-dpdp-compliance-risk-to-organization/styles.css"><link rel="preconnect" href="https://fonts.googleapis.com/"><link rel="preconnect" href="https://fonts.gstatic.com/" crossorigin><link href="https://fonts.googleapis.com/css2?family=Roboto:wght@400;500;700&amp;display=swap" rel="stylesheet"><style type="text/css"> /* Reset and base styles */</p> <p>.newsletterwrap .containerWrap { width: 100%; max-width: 800px; margin: 25px auto; }</p> <p>/* Card styles */ .newsletterwrap .signup-card { background-color: white; border-radius: 10px; overflow: hidden; box-shadow: 0 4px 12px rgba(0, 0, 0, 0.1); border: 8px solid #e85d0f; }</p> <p>.newsletterwrap .content { padding: 30px; display: flex; justify-content: space-between; align-items: center; flex-wrap: wrap; }</p> <p>/* Text content */ .newsletterwrap .text-content { flex: 1; min-width: 250px; margin-right: 20px; }</p> <p>.newsletterwrap .main-heading { font-size: 26px; color: #333; font-weight: 900; margin-bottom: 0px; }</p> <p>.newsletterwrap .highlight { color: #e85d0f; font-weight: 500; margin-bottom: 15px; }</p> <p>.newsletterwrap .para { color: #666; line-height: 1.5; margin-bottom: 10px; }</p> <p>.newsletterwrap .bold { font-weight: 700; }</p> <p>/* Logo */ .newsletterwrap .rightlogo { display: flex; flex-direction: column; align-items: center; margin-top: 10px; }</p> <p>.newsletterwrap .logo-icon { position: relative; width: 80px; height: 80px; margin-bottom: 10px; }</p> <p>.newsletterwrap .c-outer, .c-middle, .c-inner { position: absolute; border-radius: 50%; border: 6px solid #e85d0f; border-right-color: transparent; }</p> <p>.newsletterwrap .c-outer { width: 80px; height: 80px; top: 0; left: 0; }</p> <p>.newsletterwrap .c-middle { width: 60px; height: 60px; top: 10px; left: 10px; }</p> <p>.newsletterwrap .c-inner { width: 40px; height: 40px; top: 20px; left: 20px; }</p> <p>.newsletterwrap .logo-text { color: #e85d0f; font-weight: 700; font-size: 0.9rem; text-align: center; }</p> <p>/* Form */ .newsletterwrap .signup-form { display: flex; padding: 0 30px 30px; }</p> <p>.newsletterwrap input[type="email"] { flex: 1; padding: 12px 15px; border: 1px solid #ddd; border-radius: 4px 0 0 4px; font-size: 1rem; outline: none; }</p> <p>.newsletterwrap input[type="email"]:focus { border-color: #e85d0f; }</p> <p>.newsletterwrap .submitBtn { background-color: #e85d0f; color: white; border: none; padding: 12px 20px; border-radius: 0 4px 4px 0; font-size: 1rem; cursor: pointer; transition: background-color 0.3s; white-space: nowrap; }</p> <p>.newsletterwrap button:hover { background-color: #d45000; }</p> <p>/* Responsive styles */ @media (max-width: 768px) { .newsletterwrap .content { flex-direction: column; text-align: center; }</p> <p> .newsletterwrap .text-content { margin-right: 0; margin-bottom: 20px; }</p> <p> .newsletterwrap .rightlogo { margin-top: 20px; } }</p> <p>@media (max-width: 480px) { .newsletterwrap .signup-form { flex-direction: column; }</p> <p> .newsletterwrap input[type="email"] { border-radius: 4px; margin-bottom: 10px; }</p> <p> .newsletterwrap .submitBtn { border-radius: 4px; width: 100%; } } </style><p><br> </p><div class="containerWrap"> <div class="signup-card"> <div class="content"> <div class="text-content"> <h1 class="main-heading">Get in!</h1> <p class="para">Join our weekly <span style="color: #e75d10;">newsletter</span> and stay updated</p> </div> <div class="rightlogo"> <div class="logo-icon"> <div class="c-outer"></div> <div class="c-middle"></div> <div class="c-inner"></div> </div> <div class="logo-text">CYBER SECURITY SQUAD</div> </div> </div> <form class="signup-form" action="https://kratikal.com/thanks/thankyou-newsletter" method="get"> <input type="email" name="email" value="" placeholder="Email" required><br> <input type="submit" name="submit" value="I am interested!" class="submitBtn"><br> </form> </div> </div><p><br> </p><h3 class="wp-block-heading"><strong>How Kratikal Can Help You with DPDP Compliance?</strong></h3><p>Kratikal supports organizations in navigating the complexities of <strong>DPDP compliance</strong> by combining deep cybersecurity expertise with practical, implementation-driven solutions. From conducting comprehensive gap assessments and compliance audits to designing consent management frameworks and strengthening data governance, Kratikal helps businesses align their processes with regulatory requirements. Their approach also includes employee awareness training, policy development, and incident response readiness, ensuring organizations are not only compliant on paper but also operationally prepared to handle data securely. By building a strong foundation of security and compliance, Kratikal enables organizations to reduce risk, avoid penalties, and foster long-term trust with customers and stakeholders.</p><h3 class="wp-block-heading">FAQs</h3><div class="schema-how-to wp-block-yoast-how-to-block"> <p class="schema-how-to-description"> </p><ol class="schema-how-to-steps"> <li class="schema-how-to-step" id="how-to-step-1776444854118"><strong class="schema-how-to-step-name"><strong>What are the risks of not complying with DPDP?</strong></strong> <p class="schema-how-to-step-text"> Under the DPDP Act, businesses may face penalties of up to ₹250 crore for failing to report incidents on time.</p> </li> <li class="schema-how-to-step" id="how-to-step-1776444870014"><strong class="schema-how-to-step-name"><strong>How do non-compliance penalties impact a business?</strong></strong> <p class="schema-how-to-step-text">Data protection non-compliance can result in significant fines, legal complications, and a loss of customer trust.</p> </li> <li class="schema-how-to-step" id="how-to-step-1776444882862"><strong class="schema-how-to-step-name"><strong>How do consulting firms help organizations comply with the DPDP Act?</strong></strong> <p class="schema-how-to-step-text">Consultants bridge the gap between regulations and real-world implementation by creating policies, offering security guidance, training teams, and providing DPO-as-a-service when needed.</p> </li> </ol> </div><p>The post <a href="https://kratikal.com/blog/ignoring-dpdp-compliance-risk-to-organization/">Ignoring DPDP Compliance? Here’s the Risk to Your Organization</a> appeared first on <a href="https://kratikal.com/blog">Kratikal Blogs</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/ignoring-dpdp-compliance-heres-the-risk-to-your-organization/" data-a2a-title="Ignoring DPDP Compliance? Here’s the Risk to Your Organization"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fignoring-dpdp-compliance-heres-the-risk-to-your-organization%2F&amp;linkname=Ignoring%20DPDP%20Compliance%3F%20Here%E2%80%99s%20the%20Risk%20to%20Your%20Organization" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fignoring-dpdp-compliance-heres-the-risk-to-your-organization%2F&amp;linkname=Ignoring%20DPDP%20Compliance%3F%20Here%E2%80%99s%20the%20Risk%20to%20Your%20Organization" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fignoring-dpdp-compliance-heres-the-risk-to-your-organization%2F&amp;linkname=Ignoring%20DPDP%20Compliance%3F%20Here%E2%80%99s%20the%20Risk%20to%20Your%20Organization" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fignoring-dpdp-compliance-heres-the-risk-to-your-organization%2F&amp;linkname=Ignoring%20DPDP%20Compliance%3F%20Here%E2%80%99s%20the%20Risk%20to%20Your%20Organization" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fignoring-dpdp-compliance-heres-the-risk-to-your-organization%2F&amp;linkname=Ignoring%20DPDP%20Compliance%3F%20Here%E2%80%99s%20the%20Risk%20to%20Your%20Organization" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://kratikal.com/blog/">Kratikal Blogs</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Shikha Dhingra">Shikha Dhingra</a>. Read the original post at: <a href="https://kratikal.com/blog/ignoring-dpdp-compliance-risk-to-organization/">https://kratikal.com/blog/ignoring-dpdp-compliance-risk-to-organization/</a> </p>

I'm spending 3 months coding the old way

  • evakhoury
  • Published date: 2026-04-17 16:19:53

Article URL: https://miguelconner.substack.com/p/im-coding-by-hand Comments URL: https://news.ycombinator.com/item?id=47807583 Points: 3 # Comments: 0

I decided to move to Brooklyn for a coding retreat. There were some personal reasons that brought me back to the US. But rather than heading immediately back to work, I wanted to take some time to … [+9370 chars]

Is Anthropic's Mythos AI too powerful? Bankers and ministers get into a huddle and raise concerns - key points to know

  • Shreya Biswas
  • Published date: 2026-04-17 13:29:48

Anthropic Mythos​ financial system risk​: Global finance leaders are discussing Anthropic's new AI model, Claude Mythos. This advanced AI can identify system vulnerabilities. Finance ministers and central bankers are concerned about its potential impact on fi…

Anthropic Mythos financial system risk: A powerful new AI model from Anthropic is raising serious concerns among global financial leaders, with finance ministers, central bankers, and top executives … [+4012 chars]

From Analytics to “Interception”: How Website Tracking Became a Wiretap Problem—and What Companies Should Do About It

  • Mark Rasch
  • Published date: 2026-04-17 00:00:00

None

<p>There is a certain irony in watching a statute designed to prevent clandestine eavesdropping on telephone calls become one of the most aggressively deployed tools against ordinary website functionality. The federal Wiretap Act—codified as part of the Electronic Communications Privacy Act (“ECPA”), 18 U.S.C. §§ 2510–2522—was never intended to regulate marketing pixels, session replay scripts, or real-time bidding infrastructure. Yet that is precisely what is happening.<br><br>Plaintiffs are increasingly reframing the architecture of the modern web as a form of unlawful interception. Courts, in turn, are increasingly willing to entertain the theory. What began as a handful of cases has now matured into a nationwide litigation wave, with decisions emerging from multiple circuits and districts that—while not uniform—reflect a clear doctrinal trajectory.</p><h3>The Recharacterization of the Web as a Communication Channel</h3><p>At the core of these cases is a deceptively simple move. A user’s interaction with a website—clicking a link, searching for a provider, entering information into a form—is characterized as an “electronic communication.” Once that premise is accepted, everything else follows.<br><br>The statute prohibits the intentional “interception” (acquisition of the contents) of such communications. 18 U.S.C. § 2511(1)(a). It defines “contents” broadly to include “any information concerning the substance, purport, or meaning of that communication.” 18 U.S.C. § 2510(8).<br><br>What plaintiffs argue—and what courts are increasingly accepting—is that tracking technologies embedded in websites are not passive observers. They are devices that acquire the contents of communications in real time and transmit them elsewhere. That, they say, is interception.<br><br>Courts have repeatedly entertained this framing. In Hannant v. Culbertson Memorial Hospital Foundation, No. 4:24-cv-04164-SLD-RLH (C.D. Ill. Mar. 19, 2026), the court allowed ECPA claims to proceed where tracking pixels allegedly captured and disclosed patient interactions with a hospital website. Similarly, in McClain v. Capital Vision Services, LLC, No. 25 CV 7675 (N.D. Ill. Mar. 13, 2026), the court held that allegations that Google Analytics transmitted patient-specific eye care information were sufficient to state a claim under § 2511.</p><h3>How Tracking Technology Actually Works</h3><p>To understand why this argument has traction, one has to understand the technology—not in marketing terms, but in network terms.<br><br>When a user loads a webpage, the browser executes code from multiple sources. A tracking pixel—often a small script or invisible image—triggers a request to a third-party server, transmitting information such as the page URL, device identifiers, and sometimes user-provided data. More advanced tools like session replay software record granular interaction data, including clicks, keystrokes, and navigation paths.<br><br>Analytics platforms such as Google Analytics or Adobe Analytics aggregate this data to provide insights into user behavior. Meanwhile, advertising technologies—such as Meta Pixel or LinkedIn Insight Tag—transmit user interactions into broader data ecosystems, where they are combined with other data to create detailed behavioral profiles.<br><br>In B.N. v. Oregon Reproductive Medicine, LLC, No. 3:25-cv-00202-IM (D. Or. Apr. 3, 2026), the court described how a fertility clinic’s use of the LinkedIn Insight Tag allegedly captured IVF-related page visits, consultation scheduling, and form submissions tied to identifiable users. The court concluded that these allegations plausibly described the interception of the “contents” of communications.<br><br>Similarly, in Semien v. PubMatic Inc., No. 25-cv-03164-SI (N.D. Cal. Jan. 27, 2026), plaintiffs alleged that a data broker’s pixel tracked users across multiple websites, aggregated the data, and used it to build cross-platform advertising profiles. The case highlights that liability theories are no longer confined to website operators, but extend to adtech intermediaries themselves.</p><h3>Why Courts are Letting These Cases Proceed</h3><p>The success of these claims turns on several converging doctrinal developments.<br><br>First, courts are expanding what counts as “contents.” In earlier cases, courts distinguished between content and routing information. But where a URL or interaction reveals substantive information—such as a medical condition or treatment inquiry—courts increasingly find that it conveys the “meaning” of a communication. See, e.g., B.N., supra; McClain, supra. Courts are increasingly rejecting the distinction between where you are going (non-content info) and what you are doing (content information). If we look at a phone call, the distinction is between the numbers dialed (non-content) and what you say on the phone. For texts or emails, header info is non-content, and content is, well, content. The problem is, with these tracking cookies or pixels, its hard to make a hard line. The more the information invades privacy, the more it is likely to be seen as “content.” If a person calls a pregnancy center multiple times, we can infer that they are pregnant. Merely calling an AIDS clinic can create an inference of a diagnosis. Tracking cookies that track visits to sites related to cancer treatment can infer a diagnosis. The real problem is that casual users don’t know what data is being collected and how it is being used, or to whom it is being disclosed.<br><br>Second, courts are narrowing the scope of the “party” defense. The Wiretap Act permits interception where one party to the communication consents. 18 U.S.C. § 2511(2)(d). Website operators argue that they are parties to user interactions on their own sites, and that makes sense. When you visit a website, you establish a connection between you and the website. But the wiretap statute contains an important limitation: It is illegal to “obtain the contents” of a communication — even your own communication — if you do so “for the purpose of committing any criminal or tortious act.”<br><br>In healthcare cases, plaintiffs have invoked HIPAA as the predicate unlawful act. Courts have increasingly accepted that theory. In B.N., the court held that alleged violations of HIPAA’s prohibition on unauthorized disclosure of protected health information, 42 U.S.C. § 1320d-6, could satisfy the crime-tort exception. Likewise, in McClain, the court rejected arguments that commercial motivation negates unlawful purpose, allowing the claim to proceed. The plaintiff, however, would have to show that the dominant purpose for the collection of the information was to commit a crime or a tort.<br><br>In Adair v. Cigna Corporate Services, LLC, Civil Action No. 25-2384 (E.D. Pa. Feb. 4, 2026), plaintiffs alleged that tracking technologies embedded in both public webpages and authenticated patient portals captured and transmitted sensitive health-related interactions. The court relied in part on regulatory guidance from the U.S. Department of Health and Human Services, which states that disclosures of protected health information to tracking vendors for marketing purposes without authorization are impermissible. See U.S. Dept of Health &amp; Hum. Servs., <a href="https://www.hhs.gov/hipaa/for-professionals/privacy/guidance/hipaa-online-tracking/index.html" target="_blank" rel="noopener">Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates (June 26, 2024)</a>.<br><br>Third, courts are increasingly skeptical of the argument that these technologies are merely neutral tools. The economic reality—that the data is used for profiling, targeting, and monetization—undermines the notion that the interception is incidental. In short, the wiretap law is designed to protect privacy – and courts are finding that what companies call “data analytics” is often a privacy violation.</p><h3>Where Defendants Still Prevail</h3><p>Despite these developments, not all cases survive. Courts continue to impose limits, particularly where the alleged data collection is less sensitive or where the connection to interception is attenuated.<br><br>In Popa v. Microsoft Corp., 153 F.4th 784 (9th Cir. 2025), the Ninth Circuit held that the collection of non-sensitive browsing data did not constitute a sufficiently concrete injury to confer Article III standing. Similarly, courts have distinguished between third parties that act as mere service providers and those that independently exploit data. In Lisota v. Heartland Dental, LLC, No. 25 CV 7518 (N.D. Ill. Jan. 13, 2026), the court applied the “ordinary course of business” exception to dismiss claims arising from call analysis software used to facilitate communications.<br>These decisions suggest that context matters: The sensitivity of the data, the role of the third party, and the purpose of the collection all influence the outcome.</p><h3>Practical Advice: Reducing Risk in a Post-Pixel World</h3><p>For companies, the lesson is not that tracking must cease, but that it must be governed with the same rigor as any other data processing activity.<br><br>The first imperative is data minimization. Organizations should examine whether their tracking technologies collect information that reveals sensitive attributes—particularly health, financial, or similarly protected data—and eliminate or restrict such collection where possible.<br><br>Second, companies must understand their vendors. Third-party scripts should not be treated as black boxes. Contracts should limit data use, prohibit downstream sharing, and require compliance with applicable laws. Technical configurations should be reviewed to ensure that unnecessary data is not transmitted.<br><br>Third, consent must be meaningful. The wiretap statute excludes “interceptions” where the impacted person has “consented” to the interception. But the consent must be clear and unambiguous. Generic disclosures buried in privacy policies are increasingly inadequate. Where sensitive data is involved, companies should consider obtaining explicit, informed consent that clearly describes what data is collected and how it will be used. It’s a privacy statute masquerading as a wiretap law.<br><br>Fourth, tracking should be context-specific. Technologies that may be acceptable on public-facing pages may be inappropriate on authenticated portals, patient interfaces, or transaction pages. Segmentation of environments can significantly reduce risk. Monitoring external contacts may be different from monitoring internal movements.<br><br>Fifth, organizations should integrate tracking technologies into their broader governance frameworks. That includes maintaining inventories of tracking tools, conducting privacy impact assessments, and aligning practices with regulatory guidance.<br><br>Finally, companies should ensure that their policies accurately reflect their practices—and that those practices can withstand scrutiny. Overbroad disclosures or inconsistencies between stated and actual practices can exacerbate liability. Collect only what you need and use it only for the reasons that you have stated. And those reasons must be legitimate. And delete it when no longer needed. The problem is, this data is valuable and useful for data mining by AI. Which presents an entirely different kettle of fish.</p><p>Conclusion: A Statute Reimagined</p><p>What we are witnessing is not merely creative pleading. It is the reinterpretation of a legacy statute in light of modern technology.<br><br>The Wiretap Act was designed for an era of discrete, point-to-point communications. The internet is a continuous, multi-party data ecosystem. Courts are increasingly bridging that gap by expanding the concept of interception to include routine tracking.<br><br>Whether that approach ultimately holds at the appellate level remains to be seen. But for now, the direction is clear.<br><br>Tracking technologies are no longer invisible infrastructure. They are legally consequential mechanisms of data acquisition.<br><br>And in that environment, every pixel carries not just information—but risk.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/from-analytics-to-interception-how-website-tracking-became-a-wiretap-problem-and-what-companies-should-do-about-it/" data-a2a-title="From Analytics to “Interception”: How Website Tracking Became a Wiretap Problem—and What Companies Should Do About It"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Ffrom-analytics-to-interception-how-website-tracking-became-a-wiretap-problem-and-what-companies-should-do-about-it%2F&amp;linkname=From%20Analytics%20to%20%E2%80%9CInterception%E2%80%9D%3A%20How%20Website%20Tracking%20Became%20a%20Wiretap%20Problem%E2%80%94and%20What%20Companies%20Should%20Do%20About%20It" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Ffrom-analytics-to-interception-how-website-tracking-became-a-wiretap-problem-and-what-companies-should-do-about-it%2F&amp;linkname=From%20Analytics%20to%20%E2%80%9CInterception%E2%80%9D%3A%20How%20Website%20Tracking%20Became%20a%20Wiretap%20Problem%E2%80%94and%20What%20Companies%20Should%20Do%20About%20It" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Ffrom-analytics-to-interception-how-website-tracking-became-a-wiretap-problem-and-what-companies-should-do-about-it%2F&amp;linkname=From%20Analytics%20to%20%E2%80%9CInterception%E2%80%9D%3A%20How%20Website%20Tracking%20Became%20a%20Wiretap%20Problem%E2%80%94and%20What%20Companies%20Should%20Do%20About%20It" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Ffrom-analytics-to-interception-how-website-tracking-became-a-wiretap-problem-and-what-companies-should-do-about-it%2F&amp;linkname=From%20Analytics%20to%20%E2%80%9CInterception%E2%80%9D%3A%20How%20Website%20Tracking%20Became%20a%20Wiretap%20Problem%E2%80%94and%20What%20Companies%20Should%20Do%20About%20It" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Ffrom-analytics-to-interception-how-website-tracking-became-a-wiretap-problem-and-what-companies-should-do-about-it%2F&amp;linkname=From%20Analytics%20to%20%E2%80%9CInterception%E2%80%9D%3A%20How%20Website%20Tracking%20Became%20a%20Wiretap%20Problem%E2%80%94and%20What%20Companies%20Should%20Do%20About%20It" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>

Randall Munroe’s XKCD ‘Home Remedies’

  • None
  • Published date: 2026-04-17 00:00:00

None

<p>The post <a href="https://xkcd.com/3217/">Randall Munroe’s XKCD 'Home Remedies'</a> appeared first on <a href="https://www.infosecurity.us/">Infosecurity.US</a>.</p><figure class=" sqs-block-image-figure intrinsic "> <p> <a class=" sqs-block-image-link " href="https://xkcd.com/3217/"></a></p> <p> <img data-stretch="false" data-image="https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/fb8d032a-da36-43ba-8f0c-59178146c072/home_remedies.png" data-image-dimensions="364x249" data-image-focal-point="0.5,0.5" alt="" data-load="false" elementtiming="system-image-block" src="https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/fb8d032a-da36-43ba-8f0c-59178146c072/home_remedies.png?format=1000w" width="364" height="249" sizes="auto, (max-width: 640px) 100vw, (max-width: 767px) 100vw, 100vw" onload='this.classList.add("loaded")' srcset="https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/fb8d032a-da36-43ba-8f0c-59178146c072/home_remedies.png?format=100w 100w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/fb8d032a-da36-43ba-8f0c-59178146c072/home_remedies.png?format=300w 300w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/fb8d032a-da36-43ba-8f0c-59178146c072/home_remedies.png?format=500w 500w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/fb8d032a-da36-43ba-8f0c-59178146c072/home_remedies.png?format=750w 750w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/fb8d032a-da36-43ba-8f0c-59178146c072/home_remedies.png?format=1000w 1000w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/fb8d032a-da36-43ba-8f0c-59178146c072/home_remedies.png?format=1500w 1500w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/fb8d032a-da36-43ba-8f0c-59178146c072/home_remedies.png?format=2500w 2500w" loading="lazy" decoding="async" data-loader="sqs"></p> <p> <figcaption class="image-caption-wrapper"> <p class=""><strong>via the comic artistry and dry wit of Randall Munroe, creator of XKCD</strong></p> </figcaption></p></figure><p><a href="https://www.infosecurity.us/blog/2026/4/17/randall-munroes-xkcd-home-remedies">Permalink</a></p><p> </p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/randall-munroes-xkcd-home-remedies/" data-a2a-title="Randall Munroe’s XKCD ‘Home Remedies’"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Frandall-munroes-xkcd-home-remedies%2F&amp;linkname=Randall%20Munroe%E2%80%99s%20XKCD%20%E2%80%98Home%20Remedies%E2%80%99" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Frandall-munroes-xkcd-home-remedies%2F&amp;linkname=Randall%20Munroe%E2%80%99s%20XKCD%20%E2%80%98Home%20Remedies%E2%80%99" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Frandall-munroes-xkcd-home-remedies%2F&amp;linkname=Randall%20Munroe%E2%80%99s%20XKCD%20%E2%80%98Home%20Remedies%E2%80%99" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Frandall-munroes-xkcd-home-remedies%2F&amp;linkname=Randall%20Munroe%E2%80%99s%20XKCD%20%E2%80%98Home%20Remedies%E2%80%99" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Frandall-munroes-xkcd-home-remedies%2F&amp;linkname=Randall%20Munroe%E2%80%99s%20XKCD%20%E2%80%98Home%20Remedies%E2%80%99" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.infosecurity.us/">Infosecurity.US</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Marc Handelman">Marc Handelman</a>. Read the original post at: <a href="https://xkcd.com/3217/">https://xkcd.com/3217/</a> </p>

Belgium’s NIS2 Audit Window Opens April 18, 2026. The Rest of the EU Is Right Behind.

  • None
  • Published date: 2026-04-17 00:00:00

None

<p>On April 18, 2026, Belgium becomes the first EU member state to hit a hard NIS2 conformity assessment deadline. Essential entities operating in Belgium must have completed their first formal assessment by that date, conducted by a Conformity Assessment Body <a href="https://economie.fgov.be/en/themes/quality-and-safety/accreditation/belac">accredited by BELAC</a> and authorized by the CCB.</p><p>Belgium is the leading edge. It is not the whole story. 2026 is the year active NIS2 enforcement moves from “transposed on paper” to “auditors at the door” across the bloc. The transposition deadline passed in October 2024. National authorities are now resourced, mandated, and ready to ask hard questions.</p><p>Those questions will land on your SOC. Documented risk assessments. Tested incident-response plans. Supply chain reviews. Training records. And proof that your management team oversaw all of it.</p><p>If your SOC generates alerts faster than it generates documentation, you have a problem, whether your deadline is April 18 or later in the year.</p><hr class="wp-block-separator has-alpha-channel-opacity"><h2 class="wp-block-heading">What NIS2 actually demands from your SOC</h2><p>NIS2 classifies energy, health, transport, water, digital infrastructure, and public administration as essential services. Every organization in those sectors carries the directive’s full weight, including supply chain vendors above the 50-employee or €10 million threshold.</p><p>The obligations aren’t abstract. Three of them hit SOC operations directly.</p><p><strong>Incident reporting timelines.</strong> NIS2 requires a 24-hour early warning for significant incidents, a 72-hour formal notification, and a 1-month final report. Those deadlines assume your team can produce structured, regulator-ready documentation while simultaneously managing an active incident. That is not a realistic expectation for a manual SOC.</p><p><strong>Management liability.</strong> <a href="https://digital-strategy.ec.europa.eu/en/policies/nis2-directive" rel="noreferrer noopener">Article 20 holds management bodies personally accountable</a> for cybersecurity risk decisions. Board members and executives at essential entities face individual liability for failures their SOC can’t document. Undocumented investigations, missing audit trails, and informal response processes are personal legal exposure for leadership.</p><p><strong>Fines with teeth.</strong> Essential entity violations carry fines up to €10 million or 2% of global annual turnover, whichever is higher.</p><blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"> <figure class="wp-block-image size-large"><a href="https://d3security.com/resources/nis2-compliance-for-the-ai-soc/"><img fetchpriority="high" decoding="async" width="1024" height="576" src="https://d3security.com/wp-content/uploads/2026/04/NIS2-Compliance-for-the-AI-SOC_-The-24_72_Month-Reporting-Stack-_-D3-1024x576.jpg" alt='Preview of the whitepaper titled "NIS2 Compliance for the AI SOC"' class="wp-image-61347" srcset="https://d3security.com/wp-content/uploads/2026/04/NIS2-Compliance-for-the-AI-SOC_-The-24_72_Month-Reporting-Stack-_-D3-1024x576.jpg 1024w, https://d3security.com/wp-content/uploads/2026/04/NIS2-Compliance-for-the-AI-SOC_-The-24_72_Month-Reporting-Stack-_-D3-300x169.jpg 300w, https://d3security.com/wp-content/uploads/2026/04/NIS2-Compliance-for-the-AI-SOC_-The-24_72_Month-Reporting-Stack-_-D3-768x432.jpg 768w, https://d3security.com/wp-content/uploads/2026/04/NIS2-Compliance-for-the-AI-SOC_-The-24_72_Month-Reporting-Stack-_-D3-1536x864.jpg 1536w, https://d3security.com/wp-content/uploads/2026/04/NIS2-Compliance-for-the-AI-SOC_-The-24_72_Month-Reporting-Stack-_-D3.jpg 1920w" sizes="(max-width: 1024px) 100vw, 1024px"></a></figure> <p>The 24/72/month stack is more demanding than it looks in the directive. <strong><a href="https://d3security.com/resources/nis2-compliance-for-the-ai-soc/">See how each window maps to autonomous investigation</a></strong> — and what documentation each deadline requires.</p> </blockquote><hr class="wp-block-separator has-alpha-channel-opacity"><h2 class="wp-block-heading">The documentation problem nobody’s talking about</h2><p>Most NIS2 discussions focus on technical controls: network segmentation, access management, patch cadence. Those matter. The audit failure most organizations will face is operational.</p><p>Auditors will ask: show me what happened when you got an alert last Tuesday. Show me the investigation. Show me who made what decision, and when.</p><p>Manual SOC processes don’t produce that record. An analyst works through a queue, opens a ticket, runs some queries, escalates or closes. The investigation lives in their head and in scattered tool outputs. That won’t satisfy Article 20.</p><p>ENISA’s workforce analysis puts the EU shortfall at close to 300,000 unfilled cybersecurity roles. Two-thirds of organizations report understaffed security teams. Smaller utilities, healthcare operators, and infrastructure providers frequently have zero dedicated security staff, yet NIS2 applies to them from the moment they cross the employee or revenue threshold. There’s no carve-out for “we were planning to hire.”</p><p><strong>Further reading:</strong> See how autonomous SOC operations close the compliance gap in <a href="https://d3security.com/resources/ai-autonomous-soc-european-healthcare/">European healthcare environments</a> and <a href="https://d3security.com/resources/ai-autonomous-soc-european-electric-utilities/">electric utility operations</a>. Both sectors sit squarely inside NIS2’s essential services classification.</p><hr class="wp-block-separator has-alpha-channel-opacity"><h2 class="wp-block-heading">What audit-ready SOC operations look like</h2><p>An NIS2 audit comes down to documentation, not headcount. The real question is whether your SOC generates auditable evidence as a byproduct of normal operations.</p><p>That requires three things your current setup may not have.</p><p><strong>Investigation depth at alert speed.</strong> NIS2’s 24-hour early warning window gives you less than a day to determine whether an incident is significant enough to report. Manual triage at L2 depth takes hours per alert. Morpheus AI triages 95% of alerts in under two minutes at L2+ investigation depth, completing full investigations without human review. That speed is what creates room to meet reporting deadlines.</p><p><strong>Automatic documentation.</strong> Every investigation Morpheus AI runs produces a structured, auditable record: timeline, evidence chain, actions taken, decision points. When a regulator asks to see your incident handling, you have a complete record rather than a reconstruction from memory. The same principle applies to DORA, which imposes nearly identical documentation obligations on EU financial entities. See our guide to <a href="https://d3security.com/resources/automating-dora-compliance/">automated compliance evidence under DORA</a>.</p><p><strong>Cross-stack visibility.</strong> NIS2 requires evidence that you understand your threat environment, including supply chain exposure. Morpheus AI’s Attack Path Discovery traces threats East-West across your stack and North-South through 90 days of telemetry. It maps how an attacker moved, what they touched, and where the exposure ends. That’s the kind of evidence that satisfies a thorough audit.</p><hr class="wp-block-separator has-alpha-channel-opacity"><h2 class="wp-block-heading">Why Belgium is first, and why other member states follow fast</h2><p>Belgium’s April 18 conformity assessment deadline is a national implementation detail built into the Belgian transposition law. It uses an independent CAB certification model, which means essential entities can’t self-attest. An accredited third party has to verify compliance.</p><p>Most other member states are operating on different timelines, but the direction of travel is the same. Enforcement teams at BSI (Germany), <a href="https://cyber.gouv.fr/la-directive-nis-2" type="link" id="https://cyber.gouv.fr/la-directive-nis-2" rel="noreferrer noopener">ANSSI (France)</a>, ACN (Italy), NCSC-NL (Netherlands), and their counterparts across the bloc are already issuing guidance, running sector consultations, and preparing audit programs. 2026 is when notices start landing.</p><p>Expect the pattern Belgium is setting to repeat: formal assessment obligations, evidence requirements, and management-level sign-off, all backed by personal liability under Article 20.</p><hr class="wp-block-separator has-alpha-channel-opacity"><h2 class="wp-block-heading">Germany just raised the stakes</h2><p>If you operate in Germany, the NIS2 picture has a new layer. KRITIS Dachgesetz <a href="https://www.bsi.bund.de/EN/Themen/KRITIS-und-regulierte-Unternehmen/Kritische-Infrastrukturen/kritis_node.html" rel="noreferrer noopener">entered into force on March 17, 2026</a>. It expands Germany’s critical infrastructure scope from around 2,000 entities to over 30,000. Organizations that were outside the regulatory perimeter last year are now in it.</p><p>Registration requirements under KRITIS apply three months after the act’s entry into force. That timeline lands in June 2026. Germany’s BSI has been clear: it expects organizations to be well into their compliance journey before registration opens, not starting from zero.</p><hr class="wp-block-separator has-alpha-channel-opacity"><h2 class="wp-block-heading">2026 is the year to close the gap</h2><p>Belgium’s April 18 deadline is the first audit checkpoint. It won’t be the last. Regulators across most member states are looking for evidence of intent and progress: a documented assessment, a response plan, proof that leadership is engaged.</p><p>What regulators won’t accept is nothing. No documentation. No visible process. No record of oversight.</p><p>The fastest path to compliance evidence is infrastructure that generates documentation automatically while closing alerts faster than your current team can open them. <a href="https://d3security.com/morpheus/">Morpheus AI</a> was built for environments where regulatory pressure and threat volume arrive simultaneously. It handles the alert queue (95% triaged in under two minutes) and produces the audit trail that turns SOC operations into compliance evidence.</p><p>The question isn’t whether your deadline has hit yet. It’s whether you can prove you’re handling NIS2 when it does.</p><p><strong>Read the full technical breakdown:</strong> <a href="https://d3security.com/resources/nis2-compliance-ai-soc/">NIS2 Compliance for the AI SOC: The 24/72/Month Reporting Stack</a>. Our whitepaper walks through how autonomous investigation meets NIS2’s reporting windows, Article 20 oversight, and member-state enforcement in 2026.</p><figure data-wp-context='{"imageId":"69e2c91577969"}' data-wp-interactive="core/image" data-wp-key="69e2c91577969" class="wp-block-image size-large wp-lightbox-container"><img decoding="async" width="1024" height="617" data-wp-class--hide="state.isContentHidden" data-wp-class--show="state.isContentVisible" data-wp-init="callbacks.setButtonStyles" data-wp-on--click="actions.showLightbox" data-wp-on--load="callbacks.setButtonStyles" data-wp-on-window--resize="callbacks.setButtonStyles" src="https://d3security.com/wp-content/uploads/2026/04/morpheus-deep-soc-architecture-diagram-1024x617.jpg" alt="Morpheus Deep SOC architecture diagram showing alert ingestion from NDR, EDR, XDR, SIEM, email, DLP, and CSP sources through AI-powered L1/L2 triage, Attack Path Discovery investigation, and automated incident response with self-healing integrations" class="wp-image-60650" srcset="https://d3security.com/wp-content/uploads/2026/04/morpheus-deep-soc-architecture-diagram-1024x617.jpg 1024w, https://d3security.com/wp-content/uploads/2026/04/morpheus-deep-soc-architecture-diagram-300x181.jpg 300w, https://d3security.com/wp-content/uploads/2026/04/morpheus-deep-soc-architecture-diagram-768x463.jpg 768w, https://d3security.com/wp-content/uploads/2026/04/morpheus-deep-soc-architecture-diagram-1536x925.jpg 1536w, https://d3security.com/wp-content/uploads/2026/04/morpheus-deep-soc-architecture-diagram-2048x1234.jpg 2048w" sizes="(max-width: 1024px) 100vw, 1024px"><button class="lightbox-trigger" type="button" aria-haspopup="dialog" aria-label="Enlarge" data-wp-init="callbacks.initTriggerButton" data-wp-on--click="actions.showLightbox" data-wp-style--right="state.imageButtonRight" data-wp-style--top="state.imageButtonTop"><br> <svg xmlns="http://www.w3.org/2000/svg" width="12" height="12" fill="none" viewbox="0 0 12 12"> <path fill="#fff" d="M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z"></path> </svg><br> </button></figure><hr class="wp-block-separator has-alpha-channel-opacity"><h2 class="wp-block-heading">About Morpheus AI</h2><p>Morpheus AI is D3 Security’s AI-autonomous SOC platform. It triages alerts at L2+ depth in under two minutes, maps full attack paths across your environment, and generates auditable investigation records for regulatory compliance, including NIS2 incident reporting and Article 20 management documentation.</p><hr class="wp-block-separator has-alpha-channel-opacity"><h2 class="wp-block-heading">Frequently asked questions about NIS2 SOC compliance</h2><h3 class="wp-block-heading">What happens on April 18, 2026, for NIS2?</h3><p>April 18, 2026 is the deadline by which essential entities operating in Belgium must complete their first NIS2 conformity assessment, conducted by a Conformity Assessment Body accredited by BELAC and <a href="https://ccb.belgium.be/" type="link" id="https://ccb.belgium.be" rel="noreferrer noopener">authorized by the CCB</a>. Belgium is the first EU member state to set a hard conformity assessment deadline. Other member states are running parallel enforcement ramp-ups on their own national timelines throughout 2026.</p><h3 class="wp-block-heading">When does NIS2 enforcement begin across the EU?</h3><p>The <a href="https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32022L2555" rel="noreferrer noopener">NIS2 Directive</a> has been legally in force since October 18, 2024, when it repealed the original NIS directive. The transposition deadline for EU member states was October 17, 2024. 2026 is the year national authorities across the bloc move from transposition into active enforcement, with audit timelines varying by country.</p><h3 class="wp-block-heading">What are the NIS2 incident reporting timelines?</h3><p>NIS2 requires three reporting steps: a 24-hour early warning for significant incidents, a 72-hour formal notification to the relevant national authority, and a 1-month final incident report. All three require structured, documented evidence.</p><h3 class="wp-block-heading">What is Article 20 NIS2?</h3><p>Article 20 of the NIS2 Directive holds management bodies personally accountable for cybersecurity risk oversight. Board members and executives at essential entities can face individual liability if their organization cannot produce documented evidence of security governance decisions.</p><h3 class="wp-block-heading">What is the NIS2 fine for non-compliance?</h3><p>For essential entities, NIS2 fines can reach €10 million or 2% of global annual turnover, whichever is higher.</p><h3 class="wp-block-heading">Which sectors does NIS2 cover?</h3><p>NIS2 covers energy, health, transport, water, digital infrastructure, ICT service management, public administration, and space. It also extends to supply chain vendors above the 50-employee or €10 million annual revenue threshold that serve organizations in these sectors.</p><h3 class="wp-block-heading">What is KRITIS Dachgesetz?</h3><p>KRITIS Dachgesetz is Germany’s national critical infrastructure protection law, which entered into force on March 17, 2026. It expands Germany’s regulated critical infrastructure scope from approximately 2,000 entities to over 30,000 organizations. Registration obligations apply three months after entry into force, creating a June 2026 deadline.</p><h3 class="wp-block-heading">What documentation does an NIS2 audit require from a SOC?</h3><p>NIS2 auditors typically request documented risk assessments, tested incident-response plans, supply chain security reviews, staff training records, evidence of management oversight, and structured records of individual incident investigations including timeline, decisions made, and actions taken.</p><h3 class="wp-block-heading">How can a SOC meet NIS2’s 24-hour early warning requirement?</h3><p>Meeting the 24-hour window requires SOCs to triage, investigate, and assess the significance of incidents within hours of detection. Automated triage platforms like Morpheus AI complete L2+ investigations in under two minutes, creating the capacity to determine reportability well within the 24-hour window.</p><p><script type="application/ld+json"> { "@context": "https://schema.org", "@type": "Article", "headline": "Belgium's NIS2 Audit Window Opens April 18, 2026. The Rest of the EU Is Right Behind.", "description": "Belgium's NIS2 conformity assessment deadline hits April 18, 2026. Other EU member states are ramping enforcement close behind. What auditors will demand from your SOC: incident reporting timelines, Article 20 management liability, and automatic documentation.", "datePublished": "2026-04-09", "dateModified": "2026-04-15", "author": { "@type": "Organization", "name": "D3 Security", "url": "https://d3security.com" }, "publisher": { "@type": "Organization", "name": "D3 Security", "logo": { "@type": "ImageObject", "url": "https://d3security.com/wp-content/uploads/d3-logo.png" } }, "mainEntityOfPage": { "@type": "WebPage", "@id": "https://d3security.com/blog/nis2-soc-audit-readiness-2026/" }, "about": [ {"@type": "Thing", "name": "NIS2 Directive"}, {"@type": "Thing", "name": "SOC compliance"}, {"@type": "Thing", "name": "Belgium NIS2 conformity assessment"}, {"@type": "Thing", "name": "KRITIS Dachgesetz"}, {"@type": "Thing", "name": "Article 20 NIS2"} ] } </script><br> <script type="application/ld+json"> { "@context": "https://schema.org", "@type": "FAQPage", "mainEntity": [ { "@type": "Question", "name": "What happens on April 18, 2026, for NIS2?", "acceptedAnswer": { "@type": "Answer", "text": "April 18, 2026 is the deadline by which essential entities operating in Belgium must complete their first NIS2 conformity assessment, conducted by a Conformity Assessment Body accredited by BELAC and authorized by the CCB. Belgium is the first EU member state to set a hard conformity assessment deadline. Other member states are running parallel enforcement ramp-ups on their own national timelines throughout 2026." } }, { "@type": "Question", "name": "When does NIS2 enforcement begin across the EU?", "acceptedAnswer": { "@type": "Answer", "text": "The NIS2 Directive has been legally in force since October 18, 2024, when it repealed the original NIS directive. The transposition deadline for EU member states was October 17, 2024. 2026 is the year national authorities across the bloc move from transposition into active enforcement, with audit timelines varying by country." } }, { "@type": "Question", "name": "What are the NIS2 incident reporting timelines?", "acceptedAnswer": { "@type": "Answer", "text": "NIS2 requires three reporting steps: a 24-hour early warning for significant incidents, a 72-hour formal notification to the relevant national authority, and a 1-month final incident report." } }, { "@type": "Question", "name": "What is Article 20 NIS2?", "acceptedAnswer": { "@type": "Answer", "text": "Article 20 of the NIS2 Directive holds management bodies personally accountable for cybersecurity risk oversight. Board members and executives at essential entities can face individual liability if their organization cannot produce documented evidence of security governance decisions." } }, { "@type": "Question", "name": "What is the NIS2 fine for non-compliance?", "acceptedAnswer": { "@type": "Answer", "text": "For essential entities, NIS2 fines can reach €10 million or 2% of global annual turnover, whichever is higher. For important entities, the cap is €7 million or 1.4% of global annual turnover." } }, { "@type": "Question", "name": "Which sectors does NIS2 cover?", "acceptedAnswer": { "@type": "Answer", "text": "NIS2 covers energy, health, transport, water, digital infrastructure, ICT service management, public administration, and space. Supply chain vendors above the 50-employee or €10 million annual revenue threshold that serve organizations in these sectors are also included." } }, { "@type": "Question", "name": "What is KRITIS Dachgesetz?", "acceptedAnswer": { "@type": "Answer", "text": "KRITIS Dachgesetz is Germany's national critical infrastructure protection law, which entered into force on March 17, 2026. It expands Germany's regulated critical infrastructure scope from approximately 2,000 entities to over 30,000 organizations." } } ] } </script></p><p>The post <a href="https://d3security.com/blog/nis2-soc-audit-readiness-2026/">Belgium’s NIS2 Audit Window Opens April 18, 2026. The Rest of the EU Is Right Behind.</a> appeared first on <a href="https://d3security.com/">D3 Security</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/belgiums-nis2-audit-window-opens-april-18-2026-the-rest-of-the-eu-is-right-behind/" data-a2a-title="Belgium’s NIS2 Audit Window Opens April 18, 2026. The Rest of the EU Is Right Behind."><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fbelgiums-nis2-audit-window-opens-april-18-2026-the-rest-of-the-eu-is-right-behind%2F&amp;linkname=Belgium%E2%80%99s%20NIS2%20Audit%20Window%20Opens%20April%2018%2C%202026.%20The%20Rest%20of%20the%20EU%20Is%20Right%20Behind." title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fbelgiums-nis2-audit-window-opens-april-18-2026-the-rest-of-the-eu-is-right-behind%2F&amp;linkname=Belgium%E2%80%99s%20NIS2%20Audit%20Window%20Opens%20April%2018%2C%202026.%20The%20Rest%20of%20the%20EU%20Is%20Right%20Behind." title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fbelgiums-nis2-audit-window-opens-april-18-2026-the-rest-of-the-eu-is-right-behind%2F&amp;linkname=Belgium%E2%80%99s%20NIS2%20Audit%20Window%20Opens%20April%2018%2C%202026.%20The%20Rest%20of%20the%20EU%20Is%20Right%20Behind." title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fbelgiums-nis2-audit-window-opens-april-18-2026-the-rest-of-the-eu-is-right-behind%2F&amp;linkname=Belgium%E2%80%99s%20NIS2%20Audit%20Window%20Opens%20April%2018%2C%202026.%20The%20Rest%20of%20the%20EU%20Is%20Right%20Behind." title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fbelgiums-nis2-audit-window-opens-april-18-2026-the-rest-of-the-eu-is-right-behind%2F&amp;linkname=Belgium%E2%80%99s%20NIS2%20Audit%20Window%20Opens%20April%2018%2C%202026.%20The%20Rest%20of%20the%20EU%20Is%20Right%20Behind." title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://d3security.com/">D3 Security</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Shriram Sharma">Shriram Sharma</a>. Read the original post at: <a href="https://d3security.com/blog/nis2-soc-audit-readiness-2026/">https://d3security.com/blog/nis2-soc-audit-readiness-2026/</a> </p>

When Geopolitics Writes Your Compliance Roadmap

  • Jack Poller
  • Published date: 2026-04-17 00:00:00

None

<p>Cyber policy has always lagged cyber reality. Regulations arrive after breaches, frameworks emerge after failures, and accountability structures materialize long after the damage lands on someone else’s balance sheet. NCC Group’s fifth edition of its <a href="https://insights.nccgroup.com/l/898251/2026-04-10/31n3qnc/898251/1775832666BTAOLedA/Global_Policy_Cyber_Radar_5_DIGITAL_UK_APAC.pdf">Global Cyber Policy Radar</a> suggests that cycle is finally breaking — not because governments have gotten smarter, but because the stakes have grown too large to ignore.</p><p>The report lands at a moment when geopolitical fracture lines are reshaping the regulatory landscape faster than most compliance programs can track. Three forces drive the transformation: digital sovereignty fragmenting the global technology stack, AI security governance embedding itself into existing cyber frameworks rather than spawning new standalone laws, and board-level accountability shifting from aspiration to legal requirement. None of these trends operate independently. Together, they define a fundamentally different operating environment for the organizations trying to navigate all three simultaneously.</p><h3>The Sovereignty Trap</h3><p>Digital sovereignty has become one of those phrases that means everything and therefore risks meaning nothing. Governments invoke digital sovereignty to justify procurement restrictions, data localization mandates, supply chain controls, and preferential treatment for domestic technology providers — sometimes simultaneously, rarely with a coherent shared rulebook.</p><p>NCC Group maps the actual regulatory outputs: the EU’s Cybersecurity Act revisions planning to phase out high-risk third-country ICT vendors from critical infrastructure, U.S. rules banning Chinese and Russian software and hardware in connected vehicles effective 2027, and the broader U.S. commitment to moving away from adversary vendors entirely. Australia, the UK, Singapore, and South Korea pursue parallel tracks with varying levels of specificity and enforcement ambition.</p><p>The operational implication for global organizations isn’t abstract. Technology stacks that made economic sense under a unified global market now carry regulatory risk in a fragmented one. Supply chain decisions that once turned on performance and price carry geopolitical exposure that boards don’t yet have the vocabulary to evaluate. Organizations anchoring their sovereignty response to political buzzwords rather than actual risk will find themselves caught between jurisdictions with conflicting requirements and no clear path through either.</p><h3>AI Governance Without an AI Law</h3><p>The sweeping AI Acts that seemed inevitable two years ago largely won’t materialize in the comprehensive form once anticipated. Governments have concluded that grafting AI governance onto existing cyber resilience frameworks is more tractable than building parallel regulatory architectures from scratch.</p><p>That conclusion has direct consequences. The UK’s Cyber Assessment Framework now explicitly incorporates AI-related cyber risks. Australia embedded Responsible AI requirements in its public sector procurement framework through December 2025 updates to its Information Security Manual. The EU’s Digital Omnibus delays high-risk AI obligations until supporting technical standards exist — pushing implementation toward 2027-28 — while still expecting organizations to demonstrate security controls over AI systems through existing NIS2 and DORA obligations.</p><p>The practical takeaway is that regulators won’t demand a dedicated AI compliance posture so much as evidence that AI systems receive the same security rigor applied to the rest of the digital estate. Organizations that treat AI security as a separate workstream from their broader cyber resilience program will find themselves exposed when regulators look under the hood.</p><h3>The Board Has Run Out of Excuses</h3><p>The third force is also the most consequential for how security investments get approved. Governments across multiple jurisdictions have moved beyond encouraging boards to take cyber seriously and started legislating it.</p><p>The EU’s DORA and NIS2 already impose personal liability on senior management. The UK’s Cyber Security and Resilience Bill is expected to include explicit board-level responsibility for critical infrastructure operators and managed service providers. South Korea’s proposed updates to its Network Act and Personal Information Protection Act strengthen personal accountability for CEOs and CISOs. Israel’s draft National Cyber Law includes criminal sanctions for leaders at essential organizations who refuse to comply with emergency instructions.</p><p>This convergence changes the CISO’s position inside the organization. Investment decisions that once required extended advocacy now carry regulatory urgency that CFOs and CEOs understand without translation. The challenge shifts from making the case for investment to ensuring security governance evidence reaches boards in a form they can evaluate and attest to. Forrester’s 2026 security benchmark data cited in the report reveals that only 15% of enterprise security decision-makers prioritize board-level communication as a strategic priority — a gap that regulators are actively closing.</p><h3>The Offensive Cyber Complication</h3><p>Threading through all three regulatory shifts is a development that compliance frameworks haven’t caught up with: the normalization of state-sponsored offensive cyber operations. France, the Netherlands, Germany, and Denmark have each taken concrete steps to expand offensive capabilities, while the U.S.’s Cyber Strategy adopts an explicitly offense-forward posture that includes incentivizing private sector participation in disrupting adversary networks.</p><p>For organizations, this creates a governance question that sits above the typical security program scope. When governments call on private companies to support offensive campaigns — or when adversary-targeted infrastructure runs on privately owned networks — where does defense end and active cooperation begin? The legal cover, board authorization, and governance structures required to answer that question don’t yet exist in most organizations. Building them belongs on the agenda now, before someone else makes that decision on your behalf.</p><p>NCC Group’s report frames this as a moment requiring proactive engagement rather than reactive compliance. Organizations that build evidence-led resilience programs, clarify their positions on public-private cooperation, and equip boards to navigate the intersection of cyber risk, geopolitics, and regulation will operate from a position of advantage. Those waiting for the landscape to stabilize before acting will find the window has already closed.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/when-geopolitics-writes-your-compliance-roadmap/" data-a2a-title="When Geopolitics Writes Your Compliance Roadmap"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fwhen-geopolitics-writes-your-compliance-roadmap%2F&amp;linkname=When%20Geopolitics%20Writes%20Your%20Compliance%20Roadmap" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fwhen-geopolitics-writes-your-compliance-roadmap%2F&amp;linkname=When%20Geopolitics%20Writes%20Your%20Compliance%20Roadmap" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fwhen-geopolitics-writes-your-compliance-roadmap%2F&amp;linkname=When%20Geopolitics%20Writes%20Your%20Compliance%20Roadmap" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fwhen-geopolitics-writes-your-compliance-roadmap%2F&amp;linkname=When%20Geopolitics%20Writes%20Your%20Compliance%20Roadmap" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fwhen-geopolitics-writes-your-compliance-roadmap%2F&amp;linkname=When%20Geopolitics%20Writes%20Your%20Compliance%20Roadmap" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>

New IBM Security Services Aim to Counter Risks of Frontier AI Models

  • Jeffrey Burt
  • Published date: 2026-04-17 00:00:00

None

<p>IBM wants to use AI agents to help organizations assess their ability to protect themselves from the cybersecurity risks that increasingly advanced AI frontier models pose when they’re used by threat actors.</p><p>The IT giant’s consulting unit this week unveiled IBM Autonomous Security, a collection of specialized and coordinated agents that Big Blue executives said will wend their way through an enterprise’s often-sprawling security stack and enable it to work more as a unified system than a collection of tools that work on their own.</p><p>The agents are charged with a range of tasks, including analyzing weaknesses in software that expose them to cyber risks, finding exploit paths in runtime environments, bolstering security practices and enforcing policies within security tools, detecting anomalies, and containing cyberthreats.</p><p>At the same time, IBM Consulting is offering a new cybersecurity assessment service that can detail security weaknesses in an organization’s IT environment, including gaps in security, exposures in AI policies, and potential paths bad actors can use to exploit such weaknesses. They’ll spot security issues – including attacks – and respond to them.</p><p>In addition, the service will offer enterprises mitigation guidance that details the priorities and show how they can more quickly detect and respond to agentic-based threats by enhancing automation in their operations and improving their architectural alignment.</p><h3>Frontier Models’ Dual Uses</h3><p>Frontier models are expanding both the cybersecurity capabilities for organizations and the cyberthreat risks they create, including accelerating the speed of attacks and lowering the skill level needed by bad actors to launch sophisticated, automated campaigns.</p><p>“Frontier AI offers significant promise for cybersecurity, including accelerating vulnerability discovery and patching, optimizing defensive systems, and enhancing threat detection capabilities,” the Frontier Model Forum, an industry group launched three years ago by Microsoft, Google, Anthropic, and OpenAI that promotes the safe and responsible development of frontier models, <a href="https://www.frontiermodelforum.org/technical-reports/managing-advanced-cyber-risks-in-frontier-ai-frameworks/#:~:text=REPORT%20PDF-,Introduction,enable%20serious%20harm%20without%20them." target="_blank" rel="noopener">wrote in February</a>. “However, these same capabilities create dual-use risks, potentially lowering barriers for malicious actors to exploit known vulnerabilities or discover new attack vectors. As AI capabilities advance, it is crucial to develop robust risk management frameworks that maximize security benefits while proactively addressing emerging risks.”</p><p>Mark Hughes, global managing partner of cybersecurity services for IBM Consulting, echoed the sentiment, <a href="https://newsroom.ibm.com/2026-04-15-ibm-announces-new-cybersecurity-measures-to-help-enterprises-confront-agentic-attacks" target="_blank" rel="noopener">saying in a statement</a> that “frontier models are creating a new category of enterprise threat that is fast moving, systemic and increasingly autonomous. Meeting that threat requires a systemic defense.”</p><h3>Illustrating the Dangers</h3><p>The cybersecurity industry this month got hard lessons in what frontier models are capable of. Anthropic executives last week <a href="https://securityboulevard.com/2026/04/anthropic-unveils-restricted-ai-cyber-model-in-unprecedented-industry-alliance/" target="_blank" rel="noopener">unveiled Claude Mythos Preview</a>, a general-purpose frontier model that they wrote was “<a href="https://red.anthropic.com/2026/mythos-preview/" target="_blank" rel="noopener">strikingly capable at computer security tasks</a>.”</p><p>In particular, the model is particularly good at identifying software vulnerabilities, detecting some that have gone undetected for more than two decades. That said, it’s equally as good at autonomously creating exploits for the security flaws, so good that Anthropic executives are limiting its release to particular users.</p><p>“Claude Mythos Preview is a general-purpose, unreleased frontier model that reveals a stark fact: AI models have reached a level of coding capability where they can surpass all but the most skilled humans at finding and exploiting software vulnerabilities,” they <a href="https://www.anthropic.com/glasswing" target="_blank" rel="noopener">wrote</a>.</p><p>The vendor also is using it to create guardrails that will be used in an upcoming version of its Claude Opus model that won’t pose the same level of risk as Mythos. In addition, Mythos Preview is being used as the foundation of <a href="https://www.anthropic.com/project/glasswing" target="_blank" rel="noopener">Project Glasswing</a>, an initiative launched with Amazon Web Services, Apple, Broadcom, Cisco, CrowdStrike, Google, JPMorgan Chase, the Linux Foundation, Microsoft, Nvidia, and Palo Alto Networks.</p><p>The companies will use Mythos Preview in their work developing defensive security technologies. In addition, more than 40 other organizations that build or maintain key software infrastructure will use it to scan and secure systems running their first-party and open software.</p><h3>OpenAI and GPT-5.4-Cyber</h3><p>This week, OpenAI <a href="https://securityboulevard.com/2026/04/openai-follows-anthropic-in-limiting-access-to-its-cyber-focused-model/" target="_blank" rel="noopener">introduced GPT-5.4-Cyber</a>, a cybersecurity-focused variant of its GPT-5.4 model that also will be limited in its release through <a href="https://openai.com/index/trusted-access-for-cyber/" target="_blank" rel="noopener">its Trusted Access for Cyber (TAC) program</a> for similar reasons.</p><p>“Our goal is to make these tools as widely available as possible while preventing misuse,” OpenAI executives wrote. “Ultimately, we aim to make advanced defensive capabilities available to legitimate actors large and small, including those responsible for protecting critical infrastructure, public services, and the digital systems people depend on every day.”</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/new-ibm-security-services-aim-to-counter-risks-of-frontier-ai-models/" data-a2a-title="New IBM Security Services Aim to Counter Risks of Frontier AI Models"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fnew-ibm-security-services-aim-to-counter-risks-of-frontier-ai-models%2F&amp;linkname=New%20IBM%20Security%20Services%20Aim%20to%20Counter%20Risks%20of%20Frontier%20AI%20Models" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fnew-ibm-security-services-aim-to-counter-risks-of-frontier-ai-models%2F&amp;linkname=New%20IBM%20Security%20Services%20Aim%20to%20Counter%20Risks%20of%20Frontier%20AI%20Models" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fnew-ibm-security-services-aim-to-counter-risks-of-frontier-ai-models%2F&amp;linkname=New%20IBM%20Security%20Services%20Aim%20to%20Counter%20Risks%20of%20Frontier%20AI%20Models" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fnew-ibm-security-services-aim-to-counter-risks-of-frontier-ai-models%2F&amp;linkname=New%20IBM%20Security%20Services%20Aim%20to%20Counter%20Risks%20of%20Frontier%20AI%20Models" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fnew-ibm-security-services-aim-to-counter-risks-of-frontier-ai-models%2F&amp;linkname=New%20IBM%20Security%20Services%20Aim%20to%20Counter%20Risks%20of%20Frontier%20AI%20Models" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>

NIST, Overrun by Massive Numbers of Submitted CVEs, Limits Analysis Work

  • Jeffrey Burt
  • Published date: 2026-04-17 00:00:00

None

<p>The federal agency that for years has tracked, analyzed, and cataloged software vulnerabilities and made the information widely available is being overwhelmed by the massive numbers of security flaws being submitted and is now narrowing the scope of what it will do.</p><p>The National Institute of Standards and Technology (NIST) said this week that it will only add details to common vulnerabilities and exposures (CVEs) that <a href="https://www.nist.gov/news-events/news/2026/04/nist-updates-nvd-operations-address-record-cve-growth" target="_blank" rel="noopener">meet particular criteria</a>, including those that are listed by CISA in its catalog of vulnerabilities that are being exploited, are found in software used by federal agencies, or are defined in <a href="https://www.nist.gov/itl/executive-order-14028-improving-nations-cybersecurity" target="_blank" rel="noopener">Executive Order 14028</a> issued by then-President Biden in 2021.</p><p>CVEs that don’t meet any of those categories will still be listed by NIST in the <a href="https://nvd.nist.gov/" target="_blank" rel="noopener">National Vulnerability Database</a> (NVD), but the agency won’t add any more information about them. Until this week, NIST researchers would give each submitted CVE a severity score and other information to every submitted CVE, but the exponential growth in the number of submissions in recent years has made that work impossible, they said.</p><p>That number grew 263% between 2020 and last year, and NIST officials said they expect the numbers to grow in the future. The number of submissions during the first quarter this year was almost a third higher than the same three months in 2025. The agency noted that last year, agency researchers enriched almost 42,000 CVEs, a 45% year-over-year increase.</p><h3>Years in the Making</h3><p>The strain on the agency began to show in 2024 in the wake of budget and staff cuts, and spilled over into 2025 when <a href="https://securityboulevard.com/2025/04/nist-deprioritizes-pre-2018-cves-as-backlog-struggles-continue/" target="_blank" rel="noopener">NIST made changes</a> to how they were handling the growing backlog of submissions.</p><p>The agency’s struggles rattled the security teams both with public agencies at all levels and at private companies, all of which had relied on NIST’s data to more quickly find and fix vulnerabilities. Dozens of security experts and organizations sent a <a href="https://docs.google.com/document/d/1y6JXhh52b1OMxLMQyl_WH0R2-85iYEBzjSm_fhv8-GY/edit?tab=t.0" target="_blank" rel="noopener">letter to Congress</a> in April 2024 asking to put more resources back into NIST and the NVD.</p><p>“This shutdown has disrupted essential resilience efforts across the public and private sectors,” they wrote. “This situation must be corrected with a sense of urgency appropriate to the broader strategic imperative of securing our systems infrastructure.”</p><h3>Companies Will Need to Step Up</h3><p>This shouldn’t come as a surprise, given the earlier warning signs and the growing number of CVEs, according to security pros. The private sector will have to take on many of the responsibilities that once belonged to NIST, and they’ll need to do it quickly, given that the surge in AI innovation means that not only are autonomous systems able to detect and identify even greater numbers of security flaws, but – as seen with the announcements this month by Anthropic of its <a href="https://securityboulevard.com/2026/04/anthropic-unveils-restricted-ai-cyber-model-in-unprecedented-industry-alliance/" target="_blank" rel="noopener">Mythos Preview AI</a> and OpenAI’s similar <a href="https://securityboulevard.com/2026/04/openai-follows-anthropic-in-limiting-access-to-its-cyber-focused-model/" target="_blank" rel="noopener">GPT-5.4-Cyber foundations</a> models – they’re also more easily be able to create exploits to use against them.</p><p>“We’ve seen a dramatic spike in AI-reported valid vulnerabilities,” said Vincenzo Iozzo, co-founder and CEO of SlashID. “As a result, the new NIST policy is sensible and the categories still covered are the most critical ones. Further, LLMs [large language models] are approaching the point where they are good enough to allow individual organizations to prioritize and contextualize vulnerabilities in their environment reducing the need for enriched CVEs.”</p><h3>A New Model Needed</h3><p>NIST is showing that the model it’s relied on for years can’t hold up in this era of more and faster detection of vulnerabilities, according to cybersecurity experts.</p><p>Doc McConnell, Head of Policy at Finite State and a former CISA branch chief and cybersecurity advisor to the U.S. Office of Budget and Management, said there needs to be two significant changes, the first being that manufacturers need to invest more in security-by-design that includes vulnerability testing and risk assessment early in the design process and fixing flaws before they reach users.</p><p>“Second, as NIST has acknowledged, we can no longer rely on universal severity scores,” McConnell said. “Organizations need to be able to analyze the exploitability of a vulnerability within their own environment, enriched with their own context.”</p><p>Trey Ford, chief strategy and trust officer at Bugcrowd, echoed the sentiment.</p><p>“What NIST is acknowledging is something the research community has understood for years: you cannot centralize vulnerability triage at this volume and expect it to hold,” Ford said. “The signal that actually drives remediation priority has always come from real-world exploitability, not database metadata, and that requires human researchers with adversarial instincts working continuously against live environments.”</p><p>“The next generation of vulnerability programs will be built around that kind of active, distributed signal, not quarterly enrichment cycles,” he said.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/nist-overrun-by-massive-numbers-of-submitted-cves-limits-analysis-work/" data-a2a-title="NIST, Overrun by Massive Numbers of Submitted CVEs, Limits Analysis Work"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fnist-overrun-by-massive-numbers-of-submitted-cves-limits-analysis-work%2F&amp;linkname=NIST%2C%20Overrun%20by%20Massive%20Numbers%20of%20Submitted%20CVEs%2C%20Limits%20Analysis%20Work" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fnist-overrun-by-massive-numbers-of-submitted-cves-limits-analysis-work%2F&amp;linkname=NIST%2C%20Overrun%20by%20Massive%20Numbers%20of%20Submitted%20CVEs%2C%20Limits%20Analysis%20Work" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fnist-overrun-by-massive-numbers-of-submitted-cves-limits-analysis-work%2F&amp;linkname=NIST%2C%20Overrun%20by%20Massive%20Numbers%20of%20Submitted%20CVEs%2C%20Limits%20Analysis%20Work" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fnist-overrun-by-massive-numbers-of-submitted-cves-limits-analysis-work%2F&amp;linkname=NIST%2C%20Overrun%20by%20Massive%20Numbers%20of%20Submitted%20CVEs%2C%20Limits%20Analysis%20Work" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fnist-overrun-by-massive-numbers-of-submitted-cves-limits-analysis-work%2F&amp;linkname=NIST%2C%20Overrun%20by%20Massive%20Numbers%20of%20Submitted%20CVEs%2C%20Limits%20Analysis%20Work" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>

National Vulnerability Database (NVD) Shifts to Selective Enrichment as CVE Volume Surges

  • None
  • Published date: 2026-04-17 00:00:00

None

<div class="wp-block-group tablet-padding-top50 has-light-grey-background-color has-background"> <div class="wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow"> <div class="wp-block-columns tablet-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex"> <div class="wp-block-column padding-right50 tablet-padding-right0 is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:60%"> <p class="back-link padding-bottom40 grey-link no-underline tablet-align-center"><a href="https://flashpoint.io/blog">Blogs</a></p> <h6 class="wp-block-heading padding-bottom5 tablet-align-center">Blog</h6> <h1 class="wp-block-heading padding-bottom30 tablet-align-center h2-style has-dark-blue-color has-text-color">National Vulnerability Database (NVD) Shifts to Selective Enrichment as CVE Volume Surges</h1> <p class="padding-bottom40 tablet-align-center">In this post, we examine what NVD’s shift to selective enrichment means for vulnerability workflows and how security teams can maintain visibility and prioritization at scale.</p> <div class="wp-block-columns tablet-columns tablet-align-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex"> <div class="wp-block-column is-vertically-aligned-center no-margin is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:130px"> <div class="block share align-left tablet-align-center left"> <div class="title">SHARE THIS:</div> <p> <a href="https://www.facebook.com/sharer/sharer.php?u=https://flashpoint.io/blog/national-vulnerability-database-nvd-shifts-to-selective-enrichment-as-cve-volume-surges/" class="has-dark-blue-color"><br> <svg width="18" height="18" viewbox="0 0 18 18" fill="none" xmlns="http://www.w3.org/2000/svg"> <path fill-rule="evenodd" clip-rule="evenodd" d="M0 9.05025C0 13.5248 3.24975 17.2455 7.5 18V11.4998H5.25V9H7.5V6.99975C7.5 4.74975 8.94975 3.50025 11.0002 3.50025C11.6497 3.50025 12.3503 3.6 12.9998 3.69975V6H11.85C10.7498 6 10.5 6.54975 10.5 7.25025V9H12.9L12.5002 11.4998H10.5V18C14.7502 17.2455 18 13.5255 18 9.05025C18 4.0725 13.95 0 9 0C4.05 0 0 4.0725 0 9.05025Z" fill="currentColor"></path> </svg><br> </a><br> <a href="https://twitter.com/intent/tweet?text=National%20Vulnerability%20Database%20(NVD)%20Shifts%20to%20Selective%20Enrichment%20as%20CVE%20Volume%20Surges&amp;url=https://flashpoint.io/blog/national-vulnerability-database-nvd-shifts-to-selective-enrichment-as-cve-volume-surges/&amp;%23038;via=flashpointintel" class="has-dark-blue-color"><br> <svg width="18" height="18" viewbox="0 0 18 18" fill="none" xmlns="http://www.w3.org/2000/svg"> <g clip-path="url(#clip0_1936_244)"> <path d="M9 17.6646C13.9706 17.6646 18 13.7142 18 8.84111C18 3.96801 13.9706 0.0175781 9 0.0175781C4.02944 0.0175781 0 3.96801 0 8.84111C0 13.7142 4.02944 17.6646 9 17.6646Z" fill="currentColor"></path> <path d="M12.2195 4.52588H13.8313L10.3101 8.3453L14.4525 13.5426H11.2085L8.66811 10.3905L5.76133 13.5426H4.1486L7.91488 9.45735L3.94153 4.52588H7.26685L9.56315 7.40708L12.2185 4.52588H12.2195ZM11.6538 12.6271H12.5469L6.78207 5.39334H5.82368L11.6538 12.6271Z" fill="white"></path> </g> <defs> <clippath id="clip0_1936_244"> <rect width="18" height="18" fill="white"></rect> </clippath> </defs> </svg><br> </a><br> <a href="https://www.linkedin.com/shareArticle?mini=false&amp;url=https://flashpoint.io/blog/national-vulnerability-database-nvd-shifts-to-selective-enrichment-as-cve-volume-surges/&amp;%23038;title=National%20Vulnerability%20Database%20(NVD)%20Shifts%20to%20Selective%20Enrichment%20as%20CVE%20Volume%20Surges&amp;%23038;summary=&amp;%23038;source=https://flashpoint.io" class="has-dark-blue-color"><br> <svg width="18" height="18" viewbox="0 0 18 18" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M9 0C4.02937 0 0 4.02938 0 9C0 13.9706 4.02937 18 9 18C13.9706 18 18 13.9706 18 9C18 4.02938 13.9706 0 9 0ZM6.79687 12.7303H4.97437V6.86531H6.79687V12.7303ZM5.87437 6.14531C5.29875 6.14531 4.92656 5.7375 4.92656 5.23312C4.92656 4.71844 5.31 4.32281 5.89781 4.32281C6.48562 4.32281 6.84562 4.71844 6.85687 5.23312C6.85687 5.7375 6.48562 6.14531 5.87437 6.14531ZM13.4531 12.7303H11.6306V9.48C11.6306 8.72344 11.3662 8.20969 10.7072 8.20969C10.2037 8.20969 9.90469 8.5575 9.7725 8.89219C9.72375 9.01125 9.71156 9.18 9.71156 9.34781V12.7294H7.88812V8.73563C7.88812 8.00344 7.86469 7.39125 7.84031 6.86437H9.42375L9.50719 7.67906H9.54375C9.78375 7.29656 10.3716 6.73219 11.355 6.73219C12.5541 6.73219 13.4531 7.53562 13.4531 9.2625V12.7303Z" fill="currentColor"></path> </svg><br> </a> </p></div> </div> <div class="wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:400px"> <div class="block blog-author-info tablet-align-center"> <div class="blog-info"> <div class="img-container"><img decoding="async" src="https://flashpoint.io/wp-content/uploads/2022/06/author-image-150x150-1-150x150.png" alt="Default Author Image"></div> <div class="name"><a href="https://flashpoint.io/blog/author/flashpoint/">Flashpoint </a></div> <div class="date">April 17, 2026</div> </div> </div> </div> </div> </div> <div class="wp-block-column padding-top90 tablet-padding-top0 is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:40%"> <figure class="wp-block-image size-full border-radius"><img loading="lazy" decoding="async" width="1200" height="628" src="https://flashpoint.io/wp-content/uploads/NVD_Blog.png" alt="" class="wp-image-57869"></figure> </div> </div> </div> </div><div class="wp-block-group"> <div class="wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow"> <div class="block table-of-contents"> <div class="left"> <div class="mobile-bar"> <div class="closed"><img decoding="async" src="https://flashpoint.io/wp-content/themes/flashpoint/img/icon-toc-mobile-icon.svg" type="image/svg+xml"> Table Of Contents</div> <div class="mobile-close"><img decoding="async" src="https://flashpoint.io/wp-content/themes/flashpoint/img/icon-toc-mobile-close.svg" type="image/svg+xml"></div> </div> <div class="sidebar-items-container"> <div class="links-container"> <div class="heading">Table of Contents</div> <div class="links"> <div class="links__item"><a href="https://flashpoint.io/blog/national-vulnerability-database-nvd-shifts-to-selective-enrichment-as-cve-volume-surges/#what-changed">What Changed in NVD’s Operating Model</a></div> <div class="links__item"><a href="https://flashpoint.io/blog/national-vulnerability-database-nvd-shifts-to-selective-enrichment-as-cve-volume-surges/#impact">The Impact on Vulnerability Workflows</a></div> <div class="links__item"><a href="https://flashpoint.io/blog/national-vulnerability-database-nvd-shifts-to-selective-enrichment-as-cve-volume-surges/#prioritization-criteria">Prioritization Criteria Will Not Capture the Full Risk Landscape</a></div> <div class="links__item"><a href="https://flashpoint.io/blog/national-vulnerability-database-nvd-shifts-to-selective-enrichment-as-cve-volume-surges/#vulnerability-intelligence">Vulnerability Intelligence Requires Broader Coverage and Deeper Context</a></div> <div class="links__item"><a href="https://flashpoint.io/blog/national-vulnerability-database-nvd-shifts-to-selective-enrichment-as-cve-volume-surges/#what-to-do">Vulnerability Intelligence Requires Broader Coverage and Deeper Context</a></div> <div class="links__item"><a href="https://flashpoint.io/blog/national-vulnerability-database-nvd-shifts-to-selective-enrichment-as-cve-volume-surges/#structural-shift">A Structural Shift in Vulnerability Data</a></div> </div> <p><span class="expander">More</span></p></div> <div class="links-container"> <div class="heading">subscribe to our newsletter</div> <div class="links"><iframe loading="lazy" src="https://go.flashpoint.io/l/272312/2024-08-20/24ww895" width="100%" height="500" frameborder="0" allowtransparency="true" allowfullscreen="true" style="border:0;" class="temp-pardot-embed"></iframe></div> </div> </div> </div> <div class="right"> <p>The National Vulnerability Database (NVD) is changing how it processes and enriches vulnerability data in response to sustained growth in CVE submissions.</p> <p>Under a new model <a href="https://www.nist.gov/news-events/news/2026/04/nist-updates-nvd-operations-address-record-cve-growth" rel="noreferrer noopener">announced by the National Institute of Standards and Technology</a>, NVD will no longer enrich every CVE. Instead, enrichment efforts will focus on a defined subset, including vulnerabilities in the CISA KEV catalog, software used by the federal government, and software designated as critical.</p> <p>All other CVEs will remain in the database without additional context unless specifically requested.</p> <p>Rising disclosure volumes are placing pressure on public vulnerability infrastructure, and it has direct implications for how security teams consume and act on vulnerability data.</p> <h2 class="wp-block-heading padding-bottom25 padding-top50 has-dark-blue-color has-text-color" id="what-changed">What Changed in NVD’s Operating Model</h2> <p>For years, NVD aimed to provide consistent enrichment across all CVEs, including severity scoring, affected product data, and supporting context for prioritization.</p> <p>That approach has not been sustainable since late 2023.</p> <p>In 2025, <a href="https://flashpoint.io/resources/report/flashpoint-global-threat-intelligence-report-2026/" rel="noreferrer noopener">Flashpoint tracked</a> 44,509 disclosed vulnerabilities, 14,593 of which had publicly available exploits (and 1,944 more with proof-of-concepts). </p> <p>CVE submissions increased by 263% between 2020 and 2025, with 2026 already tracking higher year-over-year. Even with increased throughput, NVD has not been able to keep pace.</p> <p>Under the updated model:</p> <ul class="wp-block-list"> <li>CVEs meeting prioritization criteria will be enriched on an accelerated timeline</li> <li>CVEs outside those criteria will be labeled and left without enrichment</li> <li>Re-analysis of modified CVEs will occur selectively</li> <li>Separate NVD severity scoring will no longer be applied by default</li> </ul> <p>This introduces a significant structural change in how vulnerability data is published and maintained.</p> <h2 class="wp-block-heading padding-top50 padding-bottom20 has-dark-blue-color has-text-color" id="impact">The Impact on Vulnerability Workflows</h2> <p>Many security programs rely on NVD enrichment to operationalize CVE data. That enrichment provides the context needed to evaluate risk and determine remediation priorities.</p> <p>With enrichment applied selectively, teams will encounter a growing number of CVEs that include:</p> <ul class="wp-block-list"> <li>Limited or no severity scoring</li> <li>Incomplete product and version data</li> <li>Minimal context on exploitability or impact</li> <li>No CPE strings that allow for programmatic consumption of data</li> </ul> <p>At the same time, disclosure volume continues to rise, and exploitation timelines remain compressed. This creates a gap between what is disclosed and what can be acted on efficiently.</p> <p>Security teams will need to account for:</p> <ul class="wp-block-list"> <li>Larger backlogs of CVEs without actionable context</li> <li>Increased manual effort to evaluate relevance and risk</li> <li>Greater variability in data quality across sources</li> </ul> <p>These changes affect vulnerability management, threat intelligence, and security operations workflows simultaneously.</p> <h2 class="wp-block-heading padding-top50 padding-bottom20 has-dark-blue-color has-text-color" id="prioritization-criteria">Prioritization Criteria Will Not Capture the Full Risk Landscape</h2> <p>NVD’s updated model focuses enrichment on a defined set of criteria, including known exploited vulnerabilities and software relevant to federal systems.</p> <p>These categories represent important segments of risk, but they do not encompass the full set of vulnerabilities that organizations encounter in practice.</p> <p>Modern environments include:</p> <ul class="wp-block-list"> <li>Open-source dependencies</li> <li>SaaS platforms and APIs</li> <li>Cloud infrastructure and services</li> <li>Third-party and partner integrations</li> </ul> <p>Many vulnerabilities affecting these environments fall outside formal prioritization frameworks or lack immediate classification within public datasets. As a result, security teams will continue to face exposure from vulnerabilities that are:</p> <ul class="wp-block-list"> <li>Actively exploited but not yet included in prioritized lists</li> <li>Missing complete metadata or enrichment</li> <li>Relevant to their environment but not captured by federal-centric criteria</li> </ul> <h2 class="wp-block-heading padding-top50 padding-bottom20 has-dark-blue-color has-text-color" id="vulnerability-intelligence">Vulnerability Intelligence Requires Broader Coverage and Deeper Context</h2> <p>As public enrichment becomes more selective, organizations will rely more heavily on alternative sources to maintain visibility and context.</p> <p>Effective <a href="https://flashpoint.io/ignite/vulnerability-intelligence/" rel="noreferrer noopener">vulnerability intelligence</a> requires:</p> <ul class="wp-block-list"> <li>Coverage across CVE and non-CVE vulnerabilities</li> <li>Continuous tracking of exploitation activity and adversary usage</li> <li>Context on exploit maturity, and remediation</li> <li>Consistent enrichment that can be integrated into operational workflows</li> </ul> <p>This level of detail supports faster and more accurate decision-making in environments where both volume and speed are increasing.</p> <p>Flashpoint’s vulnerability intelligence model is built to address these requirements, with a dataset that includes over <a href="https://flashpoint.io/blog/flashpoint-surpasses-cataloging-7000-known-exploited-vulnerabilities/" rel="noreferrer noopener">7,000 known exploited vulnerabilities</a> and ongoing analyst-driven enrichment across global sources.</p> <h2 class="wp-block-heading padding-top50 padding-bottom20" id="what-to-do">What Security Teams Should Do Next</h2> <p>This shift in NVD operations does not change the need to track CVEs. It changes how that data can be used. Security teams should evaluate how their current workflows depend on:</p> <ul class="wp-block-list"> <li>NVD enrichment for prioritization</li> <li>CVSS scoring as a primary decision input</li> <li>Completeness of public vulnerability data</li> </ul> <p>From there, teams can take steps to strengthen resilience:</p> <ul class="wp-block-list"> <li>Incorporate sources of vulnerability intelligence that cover CVE and more</li> <li>Align prioritization to exploitation activity and environmental relevance</li> <li>Validate coverage across software, cloud, and third-party dependencies</li> <li>Ensure that enrichment gaps do not delay remediation decisions</li> </ul> <h2 class="wp-block-heading padding-top50 padding-bottom20" id="structural-shift">A Structural Shift in Vulnerability Data</h2> <p>For many teams, NVD has been a default source of vulnerability context. This change makes clear that its role is narrowing at a time when disclosure volume and prioritization demands are increasing.</p> <p>At the same time, the role of vulnerability intelligence is expanding.</p> <p>Security teams need access to data that supports prioritization, not just identification. They need consistent enrichment, faster turnaround, broader coverage, and context tied to real-world activity. As disclosure volumes continue to grow, those requirements become more central to how organizations manage risk.</p> <p>Flashpoint’s Vulnerability Intelligence provides this level of coverage and context, with analyst-driven enrichment, global visibility across CVE and non-CVE vulnerabilities, and a dataset that includes over 7,000 known exploited vulnerabilities.</p> <p><a href="https://flashpoint.io/demo/" rel="noreferrer noopener">Request a demo</a> to see how Flashpoint helps security teams prioritize and act on vulnerability risk with greater precision and confidence.</p> </div> </div> </div> </div><div class="wp-block-group padding-top0"> <div class="wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow"> <div class="wp-block-group max-width-medium border-radius padding-top70 padding-bottom70 has-primary-blue-background-color has-background"> <div class="wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow"> <h2 class="wp-block-heading has-text-align-center padding-bottom30 has-primary-white-color has-text-color">Begin your free trial today.</h2> <div class="wp-block-columns tablet-columns text-align-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex"> <div class="wp-block-column is-vertically-aligned-center padding-right25 tablet-padding-right0 is-layout-flow wp-block-column-is-layout-flow"> <div class="block button-cta tablet-center"><a href="https://flashpoint.io/free-trial" class="btn-primary-white solid has-primary-blue-color no-icon right">Get a Free Trial</a></div> </div> <div class="wp-block-column is-vertically-aligned-center tablet-align-center is-layout-flow wp-block-column-is-layout-flow"> <p class="link white with-arrow bold padding-bottom0"><a href="https://flashpoint.io/contact-us/">Contact Sales</a></p> </div> </div> </div> </div> </div> </div><p>The post <a href="https://flashpoint.io/blog/national-vulnerability-database-nvd-shifts-to-selective-enrichment-as-cve-volume-surges/">National Vulnerability Database (NVD) Shifts to Selective Enrichment as CVE Volume Surges</a> appeared first on <a href="https://flashpoint.io/">Flashpoint</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/national-vulnerability-database-nvd-shifts-to-selective-enrichment-as-cve-volume-surges/" data-a2a-title="National Vulnerability Database (NVD) Shifts to Selective Enrichment as CVE Volume Surges"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fnational-vulnerability-database-nvd-shifts-to-selective-enrichment-as-cve-volume-surges%2F&amp;linkname=National%20Vulnerability%20Database%20%28NVD%29%20Shifts%20to%20Selective%20Enrichment%20as%20CVE%20Volume%20Surges" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fnational-vulnerability-database-nvd-shifts-to-selective-enrichment-as-cve-volume-surges%2F&amp;linkname=National%20Vulnerability%20Database%20%28NVD%29%20Shifts%20to%20Selective%20Enrichment%20as%20CVE%20Volume%20Surges" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fnational-vulnerability-database-nvd-shifts-to-selective-enrichment-as-cve-volume-surges%2F&amp;linkname=National%20Vulnerability%20Database%20%28NVD%29%20Shifts%20to%20Selective%20Enrichment%20as%20CVE%20Volume%20Surges" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fnational-vulnerability-database-nvd-shifts-to-selective-enrichment-as-cve-volume-surges%2F&amp;linkname=National%20Vulnerability%20Database%20%28NVD%29%20Shifts%20to%20Selective%20Enrichment%20as%20CVE%20Volume%20Surges" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fnational-vulnerability-database-nvd-shifts-to-selective-enrichment-as-cve-volume-surges%2F&amp;linkname=National%20Vulnerability%20Database%20%28NVD%29%20Shifts%20to%20Selective%20Enrichment%20as%20CVE%20Volume%20Surges" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://flashpoint.io/blog/">Threat Intelligence Blog | Flashpoint</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Flashpoint">Flashpoint</a>. Read the original post at: <a href="https://flashpoint.io/blog/national-vulnerability-database-nvd-shifts-to-selective-enrichment-as-cve-volume-surges/">https://flashpoint.io/blog/national-vulnerability-database-nvd-shifts-to-selective-enrichment-as-cve-volume-surges/</a> </p>

The Rise of Remote Jobs in Cybersecurity and Authentication

  • None
  • Published date: 2026-04-17 00:00:00

None

<p>The post <a href="https://mojoauth.com/blog/remote-jobs-cybersecurity-authentication">The Rise of Remote Jobs in Cybersecurity and Authentication</a> appeared first on <a href="https://mojoauth.com/blog">MojoAuth Blog – Passwordless Authentication &amp; Identity Solutions</a>.</p><p>The landscape of work has shifted in ways we couldn’t have imagined a decade ago. While many industries have wrestled with the transition to home offices, the cybersecurity sector has found a natural home in the remote world. Honestly, it makes sense when you think about it. I remember the days when security meant physical badges and heavy server-room doors, but the very nature of protecting digital assets no longer requires that physical presence. Instead, it requires sharp minds, a secure connection, and an evolving understanding of how we verify who is who in a digital space.</p><p>But have you ever wondered why it took a global shift for us to realize that the most digital profession on earth didn't actually need a physical desk?</p><h2><strong>The Shift to a Borderless Workforce</strong></h2><p>For years, the gold standard for security was the perimeter. You had an office, a firewall, and people sitting at desks inside that physical fortress. But that model has crumbled. As companies moved to the cloud, the fortress disappeared. Today, the perimeter is actually the person. It is the identity of the user and the device they’re holding. I guess you could say the office is wherever you happen to open your laptop.</p><p>This shift has created a massive <a href="https://mojoauth.com/blog/secure-writing-platform-login-systems"><u>demand for professionals</u></a> who understand authentication. When your entire workforce is scattered across different time zones, knowing for certain that a login attempt is legitimate becomes the top priority. Because of this, remote roles in identity and access management have exploded. It’s a bit of a whirlwind, but in a good way.</p><p>Companies are no longer looking for the best talent within a small radius of their headquarters. They’re looking for the best talent, period.</p><h2><strong>Why Authentication is the New Front Line</strong></h2><p>Authentication used to be a simple matter of a username and a password. We now know that isn’t enough. The rise of sophisticated phishing and social engineering means that passwords are often the weakest link in the chain. So, we see this massive push toward multi-factor authentication and even passwordless systems. You know, those moments where you just tap a notification on your phone and you are in.</p><p>But if the password is dead, what exactly are we protecting?</p><p>Remote cybersecurity workers are the ones who build and monitor these systems. They’re the architects of zero-trust environments where nothing is taken for granted. In a zero-trust model, the system assumes every connection attempt is a potential threat until proven otherwise. Working in this field from a home office feels appropriate. You’re living the reality of the digital nomad while securing the infrastructure that makes it possible for others to do the same. And that’s the point.</p><h2><strong>Skills for the Remote Security Professional</strong></h2><p>If you’re looking to break into this space or level up your current career, you need a specific mix of technical and soft skills. On the technical side, a deep understanding of cloud security protocols is non-negotiable. You should be familiar with how different platforms handle identity. Understanding the nuances of single sign-on and biometric verification is also becoming increasingly important.</p><p>And yet, is technical skill enough in a world where you never see your coworkers in person?</p><p>Remote work also demands high levels of self-discipline and communication. In an office, you can see if a colleague is stressed or if a project is hitting a wall. Online, you have to be more intentional. Maybe it is the hum of the laptop at midnight or the silence of a home office that makes you realize how much the human element matters. You have to be able to explain complex security risks to non-technical stakeholders via video call or chat thread without causing panic.</p><h2><strong>Positioning Yourself in a Competitive Market</strong></h2><p>As the number of remote roles grows, so does the competition. Having the right certifications is a great start, but how you present your experience is what gets you the interview. This is where your professional presentation becomes vital. When you’re applying for high-stakes roles in cybersecurity, your documentation needs to reflect a high level of precision and organization.</p><p>Many successful applicants find that using professional structures helps them stand out. For instance, <a href="https://www.monster.com/resume/templates"><u>Monster’s resume templates</u></a> can give you a solid foundation for organizing your technical skills and remote work history. These templates help ensure that your background in authentication and system monitoring is clear and easy for recruiters to scan.</p><p>It’s about making sure your expertise doesn’t get lost in a cluttered layout.</p><h2><strong>The Future of Secure Remote Work</strong></h2><p>We’re not going back to the way things were. The flexibility of remote work is too valuable for both employers and employees. But as we move forward, the threats will continue to evolve. Artificial intelligence is already being used to create more convincing scams, which means our authentication methods must become even smarter.</p><p>The future of cybersecurity is remote, and it’s centered on identity. As long as we’re connecting to work from our living rooms, coffee shops, and home offices, we’ll need dedicated professionals to ensure those connections are safe. It takes a lot of focus, and maybe a little too much coffee, but the impact is real.</p><p>It’s a challenging field, but for those who enjoy solving puzzles and protecting others, there’s never been a better time to jump in.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/the-rise-of-remote-jobs-in-cybersecurity-and-authentication/" data-a2a-title="The Rise of Remote Jobs in Cybersecurity and Authentication"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fthe-rise-of-remote-jobs-in-cybersecurity-and-authentication%2F&amp;linkname=The%20Rise%20of%20Remote%20Jobs%20in%20Cybersecurity%20and%20Authentication" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fthe-rise-of-remote-jobs-in-cybersecurity-and-authentication%2F&amp;linkname=The%20Rise%20of%20Remote%20Jobs%20in%20Cybersecurity%20and%20Authentication" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fthe-rise-of-remote-jobs-in-cybersecurity-and-authentication%2F&amp;linkname=The%20Rise%20of%20Remote%20Jobs%20in%20Cybersecurity%20and%20Authentication" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fthe-rise-of-remote-jobs-in-cybersecurity-and-authentication%2F&amp;linkname=The%20Rise%20of%20Remote%20Jobs%20in%20Cybersecurity%20and%20Authentication" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fthe-rise-of-remote-jobs-in-cybersecurity-and-authentication%2F&amp;linkname=The%20Rise%20of%20Remote%20Jobs%20in%20Cybersecurity%20and%20Authentication" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://mojoauth.com/blog">MojoAuth Blog - Passwordless Authentication &amp;amp; Identity Solutions</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by MojoAuth Blog - Passwordless Authentication &amp; Identity Solutions">MojoAuth Blog - Passwordless Authentication &amp; Identity Solutions</a>. Read the original post at: <a href="https://mojoauth.com/blog/remote-jobs-cybersecurity-authentication">https://mojoauth.com/blog/remote-jobs-cybersecurity-authentication</a> </p>

The Vulnerability Management Race Is Over. It’s Time to Focus on Exposure.

  • Jon Baker
  • Published date: 2026-04-17 00:00:00

None

<p>The post <a href="https://www.attackiq.com/2026/04/17/its-time-to-focus-on-exposure/">The Vulnerability Management Race Is Over. It’s Time to Focus on Exposure.</a> appeared first on <a href="https://www.attackiq.com/">AttackIQ</a>.</p><article id="post-38840" class="entry content-bg single-entry post-38840 post type-post status-publish format-standard has-post-thumbnail hentry category-insights" morss_own_score="9.190909090909091" morss_score="11.94818181818182"> <div class="entry-content-wrap" morss_own_score="5.514545454545455" morss_score="9.557439597895936"> <div class="entry-content single-content" morss_own_score="5.55007400098668" morss_score="139.04232683855156"> <p>With Anthropic’s <a href="https://red.anthropic.com/2026/mythos-preview/">Mythos Preview announcement</a>, the race to patch all vulnerabilities is over. As defenders, we must move on.</p> <p>We must focus on what adversaries can do after they exploit a vulnerability: which attack paths those exploits enable, where those paths lead, and how to eliminate them before they reach what matters. That is a tractable problem. It is also a fundamentally different one than vulnerability management, and it requires a fundamentally different program.</p> <h2>What Is Mythos?</h2> <p>On April 7, 2026, Anthropic announced <a href="https://red.anthropic.com/2026/mythos-preview/">Claude Mythos Preview</a>, a frontier AI model that autonomously discovered thousands of zero-day vulnerabilities across every major operating system and web browser. It generated working exploits without human guidance. Against Mozilla Firefox vulnerabilities alone, it developed 181 working exploits. The oldest vulnerability it found had been sitting undetected for 27 years.</p> <p>Mythos outperformed every prior model on real-world exploitation benchmarks, scoring 83.1% on CyberGym’s vulnerability reproduction test. It chains multiple vulnerabilities together and identifies novel attack paths, without a human in the loop. That is a qualitative shift in offensive capability, not an incremental one.</p> <h2>Mythos Didn’t Start This. It Ended the Debate.</h2> <p>But this is a future we’ve been working toward for several years. The data has been telling this story for a long time.</p> <p>Researchers at the <a href="https://zerodayclock.com/">Zero Day Clock</a> have tracked mean time-to-exploit across more than 3,500 confirmed CVE-exploit pairs drawn from CVE, CISA’s Known Exploited Vulnerabilities catalog, and other trusted sources. In 2021, that mean was over a year. By 2025, it had fallen to one month. By early 2026, it had crossed one week. Then one day.</p> <p>The <a href="https://www.crowdstrike.com/global-threat-report/">CrowdStrike 2026 Global Threat Report</a> documented a 42% year-over-year increase in zero-day vulnerabilities exploited prior to public disclosure — continuing a multi-year trend of rising zero-day abuse. The vulnerability management ecosystem has been approaching a breaking point for years: more CVEs than teams can process, patch cycles that lag the threat, and a tracking infrastructure that was built for a world of dozens of critical disclosures per month, not hundreds.</p> <p>What Mythos does is close the argument. For years, the response to accelerating exploit timelines was “we need to patch faster” or “we need better vulnerability management.” Those responses were always inadequate. Now they’re obviously inadequate. In April 2026, <a href="https://www.nist.gov/news-events/news/2026/04/nist-updates-nvd-operations-address-record-cve-growth">NIST announced updates to NVD operations</a> specifically to address record CVE growth — another signal that the ecosystem itself is straining. Tracking vulnerabilities more diligently is not a path to resilience.</p> <p>Mythos makes that even clearer. It can unpack patches, reverse engineer them, and develop working exploits from the patch content itself. Adversaries can now weaponize our patches faster than we can deploy them. The patch process, the last line of the old model’s defense, has become part of the attack surface.</p> <p>The future that practitioners have been watching approach for years is here. The question isn’t whether it arrived. The question is what you’re going to do about it.</p> <p morss_own_score="7.0" morss_score="9.0"><strong>What this means for your program: </strong>Stop asking how to close the backlog faster. Start asking which vulnerabilities in that backlog create a real path to the assets your organization cannot afford to lose. That shift, from managing a list to managing actual risk, is the foundation everything else in this blog builds on.</p> <h2>CVSS Scores Don’t Tell You What Attackers Do Next</h2> <p>Here’s what most vulnerability programs miss – the score on a CVE tells you how bad the flaw is. It doesn’t tell you what an attacker can do once the vulnerability has been exploited.</p> <p>A critical-severity CVE in an isolated segment, with no viable path to sensitive systems, is a fundamentally different risk than a medium-severity vulnerability that sits one lateral move from your most important data. CVSS doesn’t tell you the difference. Attack path analysis does.</p> <p>Threat-informed attack path analysis is grounded in how adversaries actually behave. Understanding how adversaries use MITRE ATT&amp;CK techniques post-exploit to build a path to crown jewels tells you which vulnerabilities actually matter, where the choke points are, and which controls you need to validate. The question isn’t “what’s the CVSS score?” It’s “what’s the attack path this vulnerability enables, and do our controls actually stop it?”</p> <p morss_own_score="7.0" morss_score="9.0"><strong>What this means for your program: </strong>Reorder your patch backlog around threat-informed, validated attack paths, not severity scores. A CVE that sits on a validated path to your crown jewels moves to the front of the queue, regardless of its score. A critical CVE with no viable onward path can wait. You can’t make that call without attack path analysis. Severity scoring alone will consistently send you to the wrong place.</p> <h2>Focus on Breaking Attack Paths, Not Patching.</h2> <p>Most security programs are built around remediating vulnerabilities. That’s the wrong frame when the backlog is growing faster than it can be closed.</p> <p>You don’t always need a patch to eliminate risk. Network segmentation, access controls, and compensating controls can all sever a path to a crown jewel — even when the underlying vulnerability remains open. If you know the choke points within your attack paths, you have an opportunity beyond patching — break the path itself.</p> <p>The <a href="https://labs.cloudsecurityalliance.org/wp-content/uploads/2026/04/mythosreadyv4.pdf">Cloud Security Alliance</a> coalition specifically calls out segmentation as a critical defensive layer. The challenge most programs face is knowing <em>where</em> to segment, and then validating that the controls they put in place are actually working. Deploying a control and testing a control are different things. Most programs do the first. Fewer do the second systematically.</p> <p>This is the posture shift that matters. You’re not waiting for every vulnerability to be fixed. You’re identifying which ones create viable paths to what matters, and breaking those paths through a combination of patching where you can and compensating controls where you can’t. Both approaches count. Neither works without knowing the path.</p> <p morss_own_score="7.0" morss_score="9.0"><strong>What this means for your program: </strong>Map your crown jewels and the threat-informed attack paths that lead to them. Then ask two questions: which vulnerabilities sit on those paths, and which controls are supposed to break them? If you can’t answer the second question with evidence, not assumption, you have unvalidated gaps in your program. Find them before an attacker does.</p> <h2>Your AI Assets Are Part of Your Attack Surface Now</h2> <p morss_own_score="7.0" morss_score="9.0">The Cloud Security Alliance analysis rates unmanaged AI agent exposure as <strong>Critical</strong> severity. Most security programs have no way to discover or validate controls against agents, MCP servers, and models. That gap is not theoretical — it means the asset class the paper identifies as most urgently unaddressed is also the one least likely to be in scope for any security validation program today. Your AI footprint is part of your overall exposure. It needs to be treated that way.</p> <p>Most organizations don’t have a clear picture of what AI capabilities are running in their enterprise. Agents, models, MCP servers, and third-party integrations are being deployed fast — often by teams outside of security, often without a formal inventory. Organizations that wouldn’t dream of leaving a critical server unvalidated are doing exactly that with AI systems that have access to sensitive data, internal controls, and privileged workflows.</p> <p morss_own_score="7.0" morss_score="9.0"><strong>What this means for your program: </strong>Start by understanding what AI capabilities are running in your environment — who deployed them, what they’re connected to, and what data and systems they can access. Then bring them into scope for the same threat-informed validation you apply to the rest of your environment. A compromised AI agent with access to sensitive workflows isn’t just a data risk — it’s a potential pivot point to your crown jewels. Exposure management must include your AI exposure.</p> <h2>Detection Has to Keep Up. Right Now, It Doesn’t.</h2> <p>The Cloud Security Alliance paper identifies detection latency as a Critical severity gap. Alert triage, SIEM correlation, and incident response playbooks were all designed for threats that moved at human speed. AI-augmented attackers don’t.</p> <p>The numbers make the problem concrete. According to the <a href="https://www.crowdstrike.com/global-threat-report/">CrowdStrike 2026 Global Threat Report</a>, the average eCrime breakout time fell to 29 minutes in 2025. The fastest recorded breakout took 27 seconds. In one intrusion, data exfiltration began within four minutes of initial access. Detection workflows built around human-paced investigation cycles don’t operate at that speed. By the time an alert is triaged, the attacker has already moved.</p> <p>If your detection logic isn’t continuously validated against the techniques your most relevant threat actors actually use, you don’t know whether it works. You have an assumption. Detection engineering that continuously tests coverage and automatically tunes when coverage drifts is what closes that gap — and it’s the prerequisite for any response capability that operates at machine speed.</p> <p morss_own_score="7.0" morss_score="9.0"><strong>What this means for your program: </strong>Test your detection logic against real attack techniques on a continuous basis, not a quarterly one. Know whether your coverage holds against the specific TTPs most likely to be used against your organization. When it doesn’t, fix it immediately, not at the next review cycle. This is the closed loop that makes everything else in a threat-informed program operational rather than theoretical.</p> <h2>Continuous Defense Is Not a Technology Decision. It’s an Organizational One.</h2> <p>Quarterly assessments and annual pen tests were built for a different era. They don’t fail because they’re bad practices. They fail because they were designed for a threat that moved at human speed, and the threat no longer does.</p> <p>The organizations that manage this environment successfully will be the ones that build continuously adaptive security operations. New vulnerability disclosed – reassess attack paths immediately. New AI agent deployed – update the exposure picture. Threat actor shifts techniques – adjust detection and validation automatically.</p> <p>This kind of program requires organizational alignment around a different set of questions. Not “how many vulnerabilities did we close this quarter?” but “which paths to our crown jewels are broken, validated, and monitored right now?” Those are different metrics. They require different conversations between security teams and leadership.</p> <p>And they require leadership that understands the only path forward runs through automation — not automation layered on top of the old vulnerability management model, but automation grounded in what adversaries actually do. Threat-informed defense is what gives that automation its direction. The technology has to change. So does the organizational context around it.</p> <p morss_own_score="7.0" morss_score="9.0"><strong>What this means for your program: </strong>If your security reporting still centers on patch rates and vulnerability counts, you’re reporting on activity, not on the posture question your organization actually needs answered. Work with leadership to reframe the metrics around attack path coverage and control validation. That shift is harder than deploying any technology. It matters more.</p> <p>Mythos-class capabilities won’t stay exclusive. The models that follow will be faster, cheaper, and more accessible. The cost and skill required to discover and exploit vulnerabilities will keep falling. And the volume of what gets found will exceed anything the current vulnerability tracking infrastructure was built to handle.</p> <p>None of that is a reason to panic. It is a reason to be clear-eyed about what a resilient security program looks like from here.</p> <p>The programs that hold will be threat-informed and continuously operating. They’ll know their adversaries, test their defenses against real techniques, validate their controls with evidence, and extend that discipline to their AI assets. They’ll be built around the assumption that the backlog never fully closes, optimized to ensure the open items don’t create paths to what matters.</p> <p><strong><em>The threat has become a living system. Defense has to become one, too.</em></strong></p> <h2><strong>References</strong></h2> </div> <p><a href="https://www.attackiq.com/author/jbaker/"><img decoding="async" src="https://www.attackiq.com/wp-content/uploads/2025/10/hs-jon-baker-auth-150x150.webp"></a></p> <h4><a href="https://www.attackiq.com/author/jbaker/">Jon Baker</a></h4> <p>Jon is Vice President of Threat‑Informed Defense at AttackIQ, where he leads efforts to help organizations transform security operations through Threat‑Informed Defense and Continuous Threat Exposure Management (CTEM). His work focuses on defining how CTEM is applied in practice and helping security teams adopt disciplined, outcome‑driven approaches that improve security effectiveness at scale.<br>  <br> Previously, Jon was the Director and Co‑Founder of MITRE’s Center for Threat‑Informed Defense, where he built a global community that defined and advanced threat‑informed defense through collaborative R&amp;D. The Center played a foundational role in maturing threat‑informed defense from concept to operational discipline.<br>  <br> Jon once led MITRE’s Cyber Threat Intelligence and Adversary Emulation Department, overseeing MITRE ATT&amp;CK® and CALDERA, and contributed to the development of foundational cybersecurity standards including STIX, TAXII, and OVAL.</p> </div> </article><p>With Anthropic’s <a href="https://red.anthropic.com/2026/mythos-preview/">Mythos Preview announcement</a>, the race to patch all vulnerabilities is over. As defenders, we must move on.</p><p>We must focus on what adversaries can do after they exploit a vulnerability: which attack paths those exploits enable, where those paths lead, and how to eliminate them before they reach what matters. That is a tractable problem. It is also a fundamentally different one than vulnerability management, and it requires a fundamentally different program.</p><h2>What Is Mythos?</h2><p>On April 7, 2026, Anthropic announced <a href="https://red.anthropic.com/2026/mythos-preview/">Claude Mythos Preview</a>, a frontier AI model that autonomously discovered thousands of zero-day vulnerabilities across every major operating system and web browser. It generated working exploits without human guidance. Against Mozilla Firefox vulnerabilities alone, it developed 181 working exploits. The oldest vulnerability it found had been sitting undetected for 27 years.</p><p>Mythos outperformed every prior model on real-world exploitation benchmarks, scoring 83.1% on CyberGym’s vulnerability reproduction test. It chains multiple vulnerabilities together and identifies novel attack paths, without a human in the loop. That is a qualitative shift in offensive capability, not an incremental one.</p><h2>Mythos Didn’t Start This. It Ended the Debate.</h2><p>But this is a future we’ve been working toward for several years. The data has been telling this story for a long time.</p><p>Researchers at the <a href="https://zerodayclock.com/">Zero Day Clock</a> have tracked mean time-to-exploit across more than 3,500 confirmed CVE-exploit pairs drawn from CVE, CISA’s Known Exploited Vulnerabilities catalog, and other trusted sources. In 2021, that mean was over a year. By 2025, it had fallen to one month. By early 2026, it had crossed one week. Then one day.</p><p>The <a href="https://www.crowdstrike.com/global-threat-report/">CrowdStrike 2026 Global Threat Report</a> documented a 42% year-over-year increase in zero-day vulnerabilities exploited prior to public disclosure — continuing a multi-year trend of rising zero-day abuse. The vulnerability management ecosystem has been approaching a breaking point for years: more CVEs than teams can process, patch cycles that lag the threat, and a tracking infrastructure that was built for a world of dozens of critical disclosures per month, not hundreds.</p><p>What Mythos does is close the argument. For years, the response to accelerating exploit timelines was “we need to patch faster” or “we need better vulnerability management.” Those responses were always inadequate. Now they’re obviously inadequate. In April 2026, <a href="https://www.nist.gov/news-events/news/2026/04/nist-updates-nvd-operations-address-record-cve-growth">NIST announced updates to NVD operations</a> specifically to address record CVE growth — another signal that the ecosystem itself is straining. Tracking vulnerabilities more diligently is not a path to resilience.</p><p>Mythos makes that even clearer. It can unpack patches, reverse engineer them, and develop working exploits from the patch content itself. Adversaries can now weaponize our patches faster than we can deploy them. The patch process, the last line of the old model’s defense, has become part of the attack surface.</p><p>The future that practitioners have been watching approach for years is here. The question isn’t whether it arrived. The question is what you’re going to do about it.</p><p morss_own_score="7.0" morss_score="9.0"><strong>What this means for your program: </strong>Stop asking how to close the backlog faster. Start asking which vulnerabilities in that backlog create a real path to the assets your organization cannot afford to lose. That shift, from managing a list to managing actual risk, is the foundation everything else in this blog builds on.</p><h2>CVSS Scores Don’t Tell You What Attackers Do Next</h2><p>Here’s what most vulnerability programs miss – the score on a CVE tells you how bad the flaw is. It doesn’t tell you what an attacker can do once the vulnerability has been exploited.</p><p>A critical-severity CVE in an isolated segment, with no viable path to sensitive systems, is a fundamentally different risk than a medium-severity vulnerability that sits one lateral move from your most important data. CVSS doesn’t tell you the difference. Attack path analysis does.</p><p>Threat-informed attack path analysis is grounded in how adversaries actually behave. Understanding how adversaries use MITRE ATT&amp;CK techniques post-exploit to build a path to crown jewels tells you which vulnerabilities actually matter, where the choke points are, and which controls you need to validate. The question isn’t “what’s the CVSS score?” It’s “what’s the attack path this vulnerability enables, and do our controls actually stop it?”</p><p morss_own_score="7.0" morss_score="9.0"><strong>What this means for your program: </strong>Reorder your patch backlog around threat-informed, validated attack paths, not severity scores. A CVE that sits on a validated path to your crown jewels moves to the front of the queue, regardless of its score. A critical CVE with no viable onward path can wait. You can’t make that call without attack path analysis. Severity scoring alone will consistently send you to the wrong place.</p><h2>Focus on Breaking Attack Paths, Not Patching.</h2><p>Most security programs are built around remediating vulnerabilities. That’s the wrong frame when the backlog is growing faster than it can be closed.</p><p>You don’t always need a patch to eliminate risk. Network segmentation, access controls, and compensating controls can all sever a path to a crown jewel — even when the underlying vulnerability remains open. If you know the choke points within your attack paths, you have an opportunity beyond patching — break the path itself.</p><p>The <a href="https://labs.cloudsecurityalliance.org/wp-content/uploads/2026/04/mythosreadyv4.pdf">Cloud Security Alliance</a> coalition specifically calls out segmentation as a critical defensive layer. The challenge most programs face is knowing <em>where</em> to segment, and then validating that the controls they put in place are actually working. Deploying a control and testing a control are different things. Most programs do the first. Fewer do the second systematically.</p><p>This is the posture shift that matters. You’re not waiting for every vulnerability to be fixed. You’re identifying which ones create viable paths to what matters, and breaking those paths through a combination of patching where you can and compensating controls where you can’t. Both approaches count. Neither works without knowing the path.</p><p morss_own_score="7.0" morss_score="9.0"><strong>What this means for your program: </strong>Map your crown jewels and the threat-informed attack paths that lead to them. Then ask two questions: which vulnerabilities sit on those paths, and which controls are supposed to break them? If you can’t answer the second question with evidence, not assumption, you have unvalidated gaps in your program. Find them before an attacker does.</p><h2>Your AI Assets Are Part of Your Attack Surface Now</h2><p morss_own_score="7.0" morss_score="9.0">The Cloud Security Alliance analysis rates unmanaged AI agent exposure as <strong>Critical</strong> severity. Most security programs have no way to discover or validate controls against agents, MCP servers, and models. That gap is not theoretical — it means the asset class the paper identifies as most urgently unaddressed is also the one least likely to be in scope for any security validation program today. Your AI footprint is part of your overall exposure. It needs to be treated that way.</p><p>Most organizations don’t have a clear picture of what AI capabilities are running in their enterprise. Agents, models, MCP servers, and third-party integrations are being deployed fast — often by teams outside of security, often without a formal inventory. Organizations that wouldn’t dream of leaving a critical server unvalidated are doing exactly that with AI systems that have access to sensitive data, internal controls, and privileged workflows.</p><p morss_own_score="7.0" morss_score="9.0"><strong>What this means for your program: </strong>Start by understanding what AI capabilities are running in your environment — who deployed them, what they’re connected to, and what data and systems they can access. Then bring them into scope for the same threat-informed validation you apply to the rest of your environment. A compromised AI agent with access to sensitive workflows isn’t just a data risk — it’s a potential pivot point to your crown jewels. Exposure management must include your AI exposure.</p><h2>Detection Has to Keep Up. Right Now, It Doesn’t.</h2><p>The Cloud Security Alliance paper identifies detection latency as a Critical severity gap. Alert triage, SIEM correlation, and incident response playbooks were all designed for threats that moved at human speed. AI-augmented attackers don’t.</p><p>The numbers make the problem concrete. According to the <a href="https://www.crowdstrike.com/global-threat-report/">CrowdStrike 2026 Global Threat Report</a>, the average eCrime breakout time fell to 29 minutes in 2025. The fastest recorded breakout took 27 seconds. In one intrusion, data exfiltration began within four minutes of initial access. Detection workflows built around human-paced investigation cycles don’t operate at that speed. By the time an alert is triaged, the attacker has already moved.</p><p>If your detection logic isn’t continuously validated against the techniques your most relevant threat actors actually use, you don’t know whether it works. You have an assumption. Detection engineering that continuously tests coverage and automatically tunes when coverage drifts is what closes that gap — and it’s the prerequisite for any response capability that operates at machine speed.</p><p morss_own_score="7.0" morss_score="9.0"><strong>What this means for your program: </strong>Test your detection logic against real attack techniques on a continuous basis, not a quarterly one. Know whether your coverage holds against the specific TTPs most likely to be used against your organization. When it doesn’t, fix it immediately, not at the next review cycle. This is the closed loop that makes everything else in a threat-informed program operational rather than theoretical.</p><h2>Continuous Defense Is Not a Technology Decision. It’s an Organizational One.</h2><p>Quarterly assessments and annual pen tests were built for a different era. They don’t fail because they’re bad practices. They fail because they were designed for a threat that moved at human speed, and the threat no longer does.</p><p>The organizations that manage this environment successfully will be the ones that build continuously adaptive security operations. New vulnerability disclosed – reassess attack paths immediately. New AI agent deployed – update the exposure picture. Threat actor shifts techniques – adjust detection and validation automatically.</p><p>This kind of program requires organizational alignment around a different set of questions. Not “how many vulnerabilities did we close this quarter?” but “which paths to our crown jewels are broken, validated, and monitored right now?” Those are different metrics. They require different conversations between security teams and leadership.</p><p>And they require leadership that understands the only path forward runs through automation — not automation layered on top of the old vulnerability management model, but automation grounded in what adversaries actually do. Threat-informed defense is what gives that automation its direction. The technology has to change. So does the organizational context around it.</p><p morss_own_score="7.0" morss_score="9.0"><strong>What this means for your program: </strong>If your security reporting still centers on patch rates and vulnerability counts, you’re reporting on activity, not on the posture question your organization actually needs answered. Work with leadership to reframe the metrics around attack path coverage and control validation. That shift is harder than deploying any technology. It matters more.</p><p>Mythos-class capabilities won’t stay exclusive. The models that follow will be faster, cheaper, and more accessible. The cost and skill required to discover and exploit vulnerabilities will keep falling. And the volume of what gets found will exceed anything the current vulnerability tracking infrastructure was built to handle.</p><p>None of that is a reason to panic. It is a reason to be clear-eyed about what a resilient security program looks like from here.</p><p>The programs that hold will be threat-informed and continuously operating. They’ll know their adversaries, test their defenses against real techniques, validate their controls with evidence, and extend that discipline to their AI assets. They’ll be built around the assumption that the backlog never fully closes, optimized to ensure the open items don’t create paths to what matters.</p><p><strong><em>The threat has become a living system. Defense has to become one, too.</em></strong></p><h2><strong>References</strong></h2><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/the-vulnerability-management-race-is-over-its-time-to-focus-on-exposure/" data-a2a-title="The Vulnerability Management Race Is Over. It’s Time to Focus on Exposure."><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fthe-vulnerability-management-race-is-over-its-time-to-focus-on-exposure%2F&amp;linkname=The%20Vulnerability%20Management%20Race%20Is%20Over.%20It%E2%80%99s%20Time%20to%20Focus%20on%20Exposure." title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fthe-vulnerability-management-race-is-over-its-time-to-focus-on-exposure%2F&amp;linkname=The%20Vulnerability%20Management%20Race%20Is%20Over.%20It%E2%80%99s%20Time%20to%20Focus%20on%20Exposure." title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fthe-vulnerability-management-race-is-over-its-time-to-focus-on-exposure%2F&amp;linkname=The%20Vulnerability%20Management%20Race%20Is%20Over.%20It%E2%80%99s%20Time%20to%20Focus%20on%20Exposure." title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fthe-vulnerability-management-race-is-over-its-time-to-focus-on-exposure%2F&amp;linkname=The%20Vulnerability%20Management%20Race%20Is%20Over.%20It%E2%80%99s%20Time%20to%20Focus%20on%20Exposure." title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fthe-vulnerability-management-race-is-over-its-time-to-focus-on-exposure%2F&amp;linkname=The%20Vulnerability%20Management%20Race%20Is%20Over.%20It%E2%80%99s%20Time%20to%20Focus%20on%20Exposure." title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.attackiq.com/">AttackIQ</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Jon Baker">Jon Baker</a>. Read the original post at: <a href="https://www.attackiq.com/2026/04/17/its-time-to-focus-on-exposure/">https://www.attackiq.com/2026/04/17/its-time-to-focus-on-exposure/</a> </p>

10 Films That Leaked Online Before Release

  • SREEJU SUDHAKARAN
  • Published date: 2026-04-16 10:17:53

As Jana Nayagan and Avatar: Aang, The Last Airbender become victims of piracy even before they got an official release, Sreeju Sudhakaran looks back at some of the major Indian movies that were impacted by pre-release leaks.

As Jana Nayagan and Avatar: Aang, The Last Airbender become victims of piracy even before they are released in theatres, Sreeju Sudhakaran looks back at some Indian movies impacted by pre-release lea… [+10553 chars]

UK banks get their Mythos briefing within days

  • Ana-Maria Stanciuc
  • Published date: 2026-04-16 09:45:09

The Bank of England’s Cross Market Operational Resilience Group will convene within days to brief major UK banks, insurers, and exchanges about Anthropic’s Claude Mythos Preview. This unreleased AI model regulators say can autonomously identify and exploit vu…

The Bank of Englands Cross Market Operational Resilience Group will convene within days to brief major UK banks, insurers, and exchanges about Anthropics Claude Mythos Preview. This unreleased AI m… [+6325 chars]

Fixed-point topology meets fractal memory: a Kutumba-stabilized framework for nonlocal fractal–fractional dynamics

  • R. Aruna Devi, R. Surendar, S. Sweatha, Syed Tauseef Saeed, Abdulrahman A. Almehizia, Mohamed Aly Saleh, Feyisa Edosa Merga
  • Published date: 2026-04-16 00:07:15

Scientific Reports - Fixed-point topology meets fractal memory: a Kutumba-stabilized framework for nonlocal fractal–fractional dynamics

<li>Easttom, W. C. II. Computer security fundamentals (Pearson IT Certification, 2023. </li><li>Singh, H., Srivastava, H. M. &amp; Baleanu, D. Methods of mathematical modelling: infectious diseases … [+7308 chars]

Sweden Blames Russian Hackers for Attempted Destructive Cyberattack on Thermal Plant

  • None
  • Published date: 2026-04-16 00:00:00

None

<h2><b>What happened</b></h2><p class="p3">Sweden said hackers with connections to Russian intelligence and security services attempted a destructive cyberattack against one of the country’s thermal power plants in early 2025. Swedish officials said the attack was unsuccessful because a built-in protection mechanism blocked it before disruption could occur. Civil Defense Minister Carl-Oskar Bohlin said the incident reflects riskier and more reckless behavior and warned that pro-Russian groups once focused on denial-of-service attacks are now attempting destructive operations against organizations in Europe.<span class="Apple-converted-space">  </span></p><h2><b>Who is affected</b></h2><p class="p3">The direct target was one of Sweden’s thermal power plants, though officials did not publicly identify the facility by name. The broader concern extends to energy and other critical infrastructure operators facing increasingly aggressive attacks aimed at causing real-world disruption to essential services.<span class="Apple-converted-space">  </span></p><h2><b>Why CISOs should care</b></h2><p class="p3">This matters because the incident involved an attempted destructive attack against energy infrastructure rather than a conventional disruption or data theft operation. It also adds to a wider pattern of recent attacks and attempted attacks against power, water, and heating-related systems in Europe, raising the operational stakes for critical infrastructure defenders.<span class="Apple-converted-space">  </span></p><h2><b>3 practical actions</b></h2><ol> <li class="p3"><span class="s3"><b>Review built-in safety controls:</b></span> Validate that protection mechanisms in industrial and energy environments can stop destructive actions even if attackers reach operational systems.<span class="Apple-converted-space">  </span></li> <li class="p3"><span class="s3"><b>Treat critical infrastructure as a live target:</b></span> Reassess threat models for facilities providing heat, power, or water, especially where disruption could quickly affect the public.<span class="Apple-converted-space">  </span></li> <li class="p3"><span class="s3"><b>Plan for hybrid escalation:</b></span> Prepare for cyber activity that may be part of a broader pressure campaign, since Swedish officials said hybrid attacks extending beyond cyberspace are becoming more dangerous.<span class="Apple-converted-space">  </span></li> </ol><p class="p3">For more news about disruptive intrusions affecting critical infrastructure, click <a href="https://cisowhisperer.com/tag/cyberattack/"><span class="s3"><b>Cyberattack </b></span></a><span class="s2"><span style="font-family: Verdana, BlinkMacSystemFont, -apple-system, 'Segoe UI', Roboto, Oxygen, Ubuntu, Cantarell, 'Open Sans', 'Helvetica Neue', sans-serif;">to read more.</span></span></p><p>The post <a rel="nofollow" href="https://cisowhisperer.com/sweden-blames-russian-hackers-for-attempted-destructive-cyberattack-on-thermal-plant/">Sweden Blames Russian Hackers for Attempted Destructive Cyberattack on Thermal Plant</a> appeared first on <a rel="nofollow" href="https://cisowhisperer.com/">CISO Whisperer</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/sweden-blames-russian-hackers-for-attempted-destructive-cyberattack-on-thermal-plant/" data-a2a-title="Sweden Blames Russian Hackers for Attempted Destructive Cyberattack on Thermal Plant"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fsweden-blames-russian-hackers-for-attempted-destructive-cyberattack-on-thermal-plant%2F&amp;linkname=Sweden%20Blames%20Russian%20Hackers%20for%20Attempted%20Destructive%20Cyberattack%20on%20Thermal%20Plant" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fsweden-blames-russian-hackers-for-attempted-destructive-cyberattack-on-thermal-plant%2F&amp;linkname=Sweden%20Blames%20Russian%20Hackers%20for%20Attempted%20Destructive%20Cyberattack%20on%20Thermal%20Plant" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fsweden-blames-russian-hackers-for-attempted-destructive-cyberattack-on-thermal-plant%2F&amp;linkname=Sweden%20Blames%20Russian%20Hackers%20for%20Attempted%20Destructive%20Cyberattack%20on%20Thermal%20Plant" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fsweden-blames-russian-hackers-for-attempted-destructive-cyberattack-on-thermal-plant%2F&amp;linkname=Sweden%20Blames%20Russian%20Hackers%20for%20Attempted%20Destructive%20Cyberattack%20on%20Thermal%20Plant" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fsweden-blames-russian-hackers-for-attempted-destructive-cyberattack-on-thermal-plant%2F&amp;linkname=Sweden%20Blames%20Russian%20Hackers%20for%20Attempted%20Destructive%20Cyberattack%20on%20Thermal%20Plant" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://cisowhisperer.com">CISO Whisperer</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Evan Rowe">Evan Rowe</a>. Read the original post at: <a href="https://cisowhisperer.com/sweden-blames-russian-hackers-for-attempted-destructive-cyberattack-on-thermal-plant/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=sweden-blames-russian-hackers-for-attempted-destructive-cyberattack-on-thermal-plant">https://cisowhisperer.com/sweden-blames-russian-hackers-for-attempted-destructive-cyberattack-on-thermal-plant/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=sweden-blames-russian-hackers-for-attempted-destructive-cyberattack-on-thermal-plant</a> </p>

“iCloud storage is full” scam is back, and now it wants your payment details

  • None
  • Published date: 2026-04-16 00:00:00

None

<p>The post <a href="https://www.malwarebytes.com/blog/news/2026/04/icloud-storage-is-full-scam-is-back-and-now-it-wants-your-payment-details">“iCloud storage is full” scam is back, and now it wants your payment details</a> appeared first on <a href="https://www.malwarebytes.com/">Malwarebytes</a>.</p><p>A few months ago, we reported on a <a href="https://www.malwarebytes.com/blog/news/2026/02/a-fake-cloud-storage-alert-that-ends-at-freecash">fake cloud storage alert that triggered a redirect chain</a> to an app that has since been <a href="https://techcrunch.com/2026/04/14/how-the-rewards-app-freecash-scammed-its-way-to-the-top-of-the-app-stores/" rel="noreferrer noopener nofollow">delisted from the Apple Store</a>.</p><p>The threat of losing your photos is a powerful lure, so scammers are now using it to steal personal and financial details.</p><p>The <a href="https://www.theguardian.com/money/2026/apr/12/apple-icloud-storage-scam-emails#:~:text=There%2520are%2520lots%2520of%2520variations,https://www.theguardian.com/money/2026/apr/12/apple-icloud-storage-scam-emails" rel="noreferrer noopener nofollow">Guardian</a> warns about an iCloud-themed campaign that start with a few “your iCloud storage is full’ messages, then escalates to threats. If you don’t respond or take action, the emails claim your data will be wiped on a specific date.</p><p>US <a href="https://www.consumeraffairs.com/news/iphone-users-are-being-targeted-with-a-new-phishing-scam-041526.html" rel="noreferrer noopener nofollow">Consumer Affairs</a> has urged users not to click any links and to contact Apple directly if they receive such messages.</p><p>The deadline in the emails is never far away, usually just two days. No scammer ever wants you to think things through before you act, so there is always time pressure.</p><hr class="wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide" style="margin-top:var(--wp--preset--spacing--20);margin-bottom:var(--wp--preset--spacing--20)"><div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex"> <div class="wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:10%"></div> <div class="wp-block-column is-layout-flow wp-container-core-column-is-layout-10073889 wp-block-column-is-layout-flow" style="padding-top:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--30);flex-basis:70%"> <h2 class="wp-block-heading has-dark-blue-color has-text-color has-link-color wp-elements-2df367df4b7eeeeac786a0b3dfec10e1" id="h-scam-or-legit-scam-guard-knows"><strong>Scam or legit? Scam Guard knows</strong>.</h2> </div> <div class="wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:20%"> <div class="wp-block-malware-bytes-button mb-button" id="mb-button-2c88a240-3457-4d23-8d74-29d332e8eda0"> <div class="mb-button__row"> <div class="mb-button__item mb-button-item-0"> <p class="btn-main"><a href="https://www.malwarebytes.com/solutions/scam-guard" rel="noreferrer noopener">TRY IT FREE</a></p> </div> </div> </div> </div> </div><hr class="wp-block-separator aligncenter has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide" style="margin-top:var(--wp--preset--spacing--20);margin-bottom:var(--wp--preset--spacing--20)"><p>We’ve seen these emails in English and Spanish. Oddly, the monthly rate is set at 99 pence or 99 euro cents respectively.</p><p>The 0.99 seems to be the magic number. In reality, scammers don’t care about the payment. What they want is for you fill out the form on their phishing site.</p><figure class="wp-block-image aligncenter size-full"><img decoding="async" loading="lazy" width="446" height="274" src="https://www.malwarebytes.com/wp-content/uploads/sites/2/2026/04/email_screenshot.png" alt="Email saying you must upgrade to iCloud+ or lose your photos" class="wp-image-400382"><figcaption class="wp-element-caption">Email saying you must upgrade to iCloud+ or lose your photos</figcaption></figure><p>The screenshot above is just one of many examples. There are plenty of variations, but they all follow the same them: make a small payment to stop the files in your iCloud storage from being deleted.</p><p>The websites these emails link to also vary, but they all ask for personal and payment details to complete that payment.</p><h2 class="wp-block-heading" id="h-how-to-stay-safe">How to stay safe</h2><p>It’s worth remembering that Apple does notify users when their iCloud storage is nearing capacity, but those alerts appear within your device settings or as official system notifications. They don’t come through unsolicited text messages or emails with external links. If you need to check your storage, go directly to <strong>Settings</strong> on your device and review your iCloud usage.</p><p>So, to stay safe:</p><ul class="wp-block-list"> <li>Always access your account through our official website.</li> <li>Never share your password with anyone.</li> <li>Never click on links in unsolicited emails without verifying with a trusted source.</li> <li>Use an up-to-date, real-time <a href="https://www.malwarebytes.com/home-page" rel="noreferrer noopener">anti-malware solution</a> with a web protection component.</li> <li>Do not engage with websites that attract visitors like this.</li> </ul><p>Pro tip: <a href="https://www.malwarebytes.com/solutions/scam-guard" rel="noreferrer noopener">Malwarebytes Scam Guard</a> would have helped you identify this email as a scam and provided advice on how to proceed.</p><hr class="wp-block-separator has-alpha-channel-opacity is-style-wide"><p><strong>We don’t just report on scams—we help detect them</strong></p><p>Cybersecurity risks should never spread beyond a headline. If something looks dodgy to you, check if it’s a scam using <a href="https://www.malwarebytes.com/solutions/scam-guard">Malwarebytes Scam Guard</a>. Submit a screenshot, paste suspicious content, or share a link, text or phone number, and we’ll tell you if it’s a scam or legit. Available with <a href="https://www.malwarebytes.com/premium" rel="noreferrer noopener">Malwarebytes Premium Security</a> for all your devices, and in the <a href="https://www.malwarebytes.com/mobile">Malwarebytes app for iOS and Android</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/icloud-storage-is-full-scam-is-back-and-now-it-wants-your-payment-details/" data-a2a-title="“iCloud storage is full” scam is back, and now it wants your payment details"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Ficloud-storage-is-full-scam-is-back-and-now-it-wants-your-payment-details%2F&amp;linkname=%E2%80%9CiCloud%20storage%20is%20full%E2%80%9D%20scam%20is%20back%2C%20and%20now%20it%20wants%20your%20payment%20details" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Ficloud-storage-is-full-scam-is-back-and-now-it-wants-your-payment-details%2F&amp;linkname=%E2%80%9CiCloud%20storage%20is%20full%E2%80%9D%20scam%20is%20back%2C%20and%20now%20it%20wants%20your%20payment%20details" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Ficloud-storage-is-full-scam-is-back-and-now-it-wants-your-payment-details%2F&amp;linkname=%E2%80%9CiCloud%20storage%20is%20full%E2%80%9D%20scam%20is%20back%2C%20and%20now%20it%20wants%20your%20payment%20details" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Ficloud-storage-is-full-scam-is-back-and-now-it-wants-your-payment-details%2F&amp;linkname=%E2%80%9CiCloud%20storage%20is%20full%E2%80%9D%20scam%20is%20back%2C%20and%20now%20it%20wants%20your%20payment%20details" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Ficloud-storage-is-full-scam-is-back-and-now-it-wants-your-payment-details%2F&amp;linkname=%E2%80%9CiCloud%20storage%20is%20full%E2%80%9D%20scam%20is%20back%2C%20and%20now%20it%20wants%20your%20payment%20details" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.malwarebytes.com/">Malwarebytes</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Malwarebytes">Malwarebytes</a>. Read the original post at: <a href="https://www.malwarebytes.com/blog/news/2026/04/icloud-storage-is-full-scam-is-back-and-now-it-wants-your-payment-details">https://www.malwarebytes.com/blog/news/2026/04/icloud-storage-is-full-scam-is-back-and-now-it-wants-your-payment-details</a> </p>