Infosec Industry News
A collection of Infosec latest news, analysis and best practices from top business influencers and the world's most trustworthy sources.
New infosec products of the month: April 2026
Here's a look at the most interesting products from the past month, featuring releases from Advenica, Aptori, Axonius, Broadcom, GlobalSign, Intruder, IP Fabric, Mallory, Secureframe, Siemens, Sitehop, and Virtue AI. Mallory is launching an…
Prediction Markets Are Killing Gaming's Leak Culture
For years, gaming news spread in a relatively predictable pattern: an insider at a major game studio whispers to a YouTuber with a developed community, who then posts a vague albeit alluring video, and within hours Reddit threads are investigating…
What Do ADT, Vimeo, and a Rogue AI Have in Common? A Very Bad Week in Cybersecurity
It's been another big week for hacks, as the ShinyHunters ransomware group breached video platform Vimeo and home security company ADT. The hackers primarily got video metadata, titles, and email addresses from Vimeo. The ADT hack was worse:…
Psychic predicts Trump walking into 'years of instability' after King Charles visit
Donald Trump is set to face 'several years of surprises and instability,' which began with the King's state visit to the US as international tensions continue to mount. With the US conflict with Iran showing no sign of resolution, Donald Trump…
FBI Warns of Surge in Hacker-Enabled Cargo Theft
A new alert issued by the FBI warns of a surge in cyber-enabled cargo theft, with hackers targeting both brokers and carriers in sophisticated attacks. The FBI's warning is not surprising. In late 2025, cybersecurity firm Proofpoint reported…
Why PLC Modernization Is Critical for Power Generation and Industrial Water Facilities
Aging programmable logic controllers (PLCs) are exposing power generation and industrial water facilities to growing operational risk. A structured migration strategy can reduce downtime, strengthen cybersecurity, and position plants for a digital…
Hugging Face, ClawHub Abused for Malware Distribution
Threat actors are using trojanized shared files to distribute malware via AI distribution platforms such as Hugging Face and ClawHub, Acronis reports. The attacks do not compromise AI agents, but rely on social engineering to trick users into…
1,800 Hit in Mini Shai-Hulud Attack on SAP, Lightning, Intercom
Over 1,800 developers were affected by the Mini Shai-Hulud supply chain attack that hit the PyPi, NPM, and PHP ecosystems over the past two days. Attributed to the TeamPCP hacking group, the campaign was first spotted on April 29, after malicious…
Twilio's second act is all about AI, and investors are buying it
When Khozema Shipchandler took the helm as CEO of the cloud communications company Twilio in early 2024, activist investors were demanding cost cuts. Its stock had declined sharply since its pandemic high in 2021. The company has worked to turn…
Securing the Grid from the Sensor Up: Why Predictive Maintenance and Cybersecurity Are Inseparable
Modern predictive maintenance depends on sensors and data streams that double as attack surfaces. Protecting the grid now means treating cybersecurity as a reliability discipline. In the interconnected age of 2026 and beyond, reliability in power…
Two US Security Experts Sentenced to Prison for Helping Ransomware Gang
Two cybersecurity experts from the United States have been sentenced to prison over charges related to their role in ransomware attacks. Ryan Goldberg of Georgia and Kevin Martin of Texas were each given a 4-year prison sentence after they pleaded…
Cisco Releases Open Source Tool for AI Model Provenance
Cisco on Thursday unveiled a new open source tool, named Model Provenance Kit, designed to help organizations address potential issues associated with the use of third-party AI models. Organizations often leverage AI models obtained from model…
Sophisticated Deep#Door Backdoor Enables Espionage, Disruption
A newly identified stealthy Python-based backdoor framework provides attackers with persistent remote command execution and surveillance capabilities on Windows computers, Securonix reports. The malware's infection chain starts with the execution…
Short Covering Emerges in Coffee Futures on Dollar Weakness
July arabica coffee (KCN26) on Friday closed up +0.85 (+0.30%), and July ICE robusta coffee (RMN26) closed up +3 (+0.09%). Coffee prices recovered from 1.5-week lows on Friday and settled higher after the dollar index ($DXY) fell to a 2-week low…
Cyber-Insecurity in the AI Era
Tarique Mustafa is Cofounder and CEO/CTO of two AI-powered cybersecurity companies: GCCybersecurity, Inc. and its data compliance spinout, Chorology, Inc. A prolific inventor and internationally recognized authority in knowledge representation…
Receive a Daily briefing on Infosec Industry News
Get Started