A Claude Opus 4.6-powered AI coding agent operating through the Cursor editor autonomously deleted the production database and backups of SaaS startup PocketOS in just nine seconds. The incident highlights critical security failures in AI guardrails and infrastructure access controls.…
AI Coding Agent Powered by Claude Opus 4.6 Deletes Production Database in 9 Seconds
A Cursor AI coding agent powered by Anthropic’s Claude Opus 4.6 deleted the entire production database and all volume-level backups of PocketOS, a SaaS platform serving car rental businesses nationwide, in a single unauthorized API call on Friday, April 25,…
Fake Document Reader App Hits 10K Downloads, Spreads Anatsa Malware
A newly discovered malicious Android application masquerading as a document reader was found on the Google Play Store, infecting users with the notorious Anatsa banking trojan. The app, which had already surpassed 10,000 downloads before its removal, highlights the ongoing…
12 Signs Your SaaS Product Isn’t Enterprise-Ready (and How to Fix Each)
Not sure if your SaaS is enterprise-ready? Score yourself on 12 signs procurement teams check — SSO, SCIM, SOC 2, audit logs, and more. Includes a team scorecard. The post 12 Signs Your SaaS Product Isn’t Enterprise-Ready (and How to…
AI Was Meant to Help. So Why Is It Making Work Harder for Women in Indonesia?
Artificial intelligence is often presented as a neutral and forward-looking force that improves efficiency and removes human bias from decision-making. In practice, however, many women working in Indonesia’s gig economy experience these systems very differently. Rather than easing workloads,…
How Authentication Systems Help Build Trust in Online Education Platforms
Learn how authentication systems help build trust in online education platforms by improving security, protecting data, and ensuring safe access. The post How Authentication Systems Help Build Trust in Online Education Platforms appeared first on Security Boulevard. This article has…
How Email Infrastructure Impacts OTP and Magic Link Authentication Success Rates
Learn how email infrastructure impacts OTP and magic link authentication success rates, improving deliverability, security, and user experience. The post How Email Infrastructure Impacts OTP and Magic Link Authentication Success Rates appeared first on Security Boulevard. This article has been…
ISC Stormcast For Tuesday, April 28th, 2026 https://isc.sans.edu/podcastdetail/9908, (Tue, Apr 28th)
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: ISC Stormcast For Tuesday, April 28th, 2026…
How to fix cybersecurity’s agentic AI identity crisis
<p>The rapid adoption of agentic AI is radically shifting how enterprises operate, automate workflows and interact with digital systems. Autonomous <a href=”https://www.techtarget.com/searchenterpriseai/definition/AI-agents”>AI agents</a> — intelligent systems that are capable of executing commands, accessing sensitive data and making decisions on behalf…
IT Security News Hourly Summary 2026-04-28 03h : 3 posts
3 posts were published in the last hour 1:2 : Contextual Anomaly Detection in Quantum-Resistant MCP Transport Layers 0:9 : Pitney Bowes – 8,243,989 breached accounts 0:9 : Ongoing supply-chain attack ‘explicitly targeting’ security, dev tools
Contextual Anomaly Detection in Quantum-Resistant MCP Transport Layers
Explore how contextual anomaly detection secures MCP transport layers with quantum-resistant encryption. Learn to defend AI infrastructure against tool poisoning and prompt injection. The post Contextual Anomaly Detection in Quantum-Resistant MCP Transport Layers appeared first on Security Boulevard. This article…
Pitney Bowes – 8,243,989 breached accounts
In April 2026, the hacking collective ShinyHunters claimed to have obtained data from Pitney Bowes as part of a broader extortion campaign that also named several other organisations. After negotiations allegedly failed, the group publicly released the data which included…
Ongoing supply-chain attack ‘explicitly targeting’ security, dev tools
Vendor confirms repo data exposure after Lapsus$ claims source code, secrets dump Software security testing outfit Checkmarx has become the latest organization caught up in an ongoing attack on security-tool providers. The biz said data posted online appears to have…
IT Security News Hourly Summary 2026-04-28 00h : 8 posts
8 posts were published in the last hour 21:55 : IT Security News Daily Summary 2026-04-27 21:32 : Free Antivirus Software Face-Off: Which One Protects Best in 2026? 21:32 : Top 7 Threat Intelligence Platforms & Software in 2026 21:32…
IT Security News Daily Summary 2026-04-27
154 posts were published in the last hour 21:32 : Free Antivirus Software Face-Off: Which One Protects Best in 2026? 21:32 : Top 7 Threat Intelligence Platforms & Software in 2026 21:32 : Wireless Network Security: WEP, WPA, WPA2 &…
Free Antivirus Software Face-Off: Which One Protects Best in 2026?
Find the best free antivirus software of 2026. Compare Bitdefender, Avira, Kaspersky & more for features, speed, and real-time defense. The post Free Antivirus Software Face-Off: Which One Protects Best in 2026? appeared first on eSecurity Planet. This article has…
Top 7 Threat Intelligence Platforms & Software in 2026
Discover top threat intelligence platforms, including their features, use cases, and comparisons in 2026. The post Top 7 Threat Intelligence Platforms & Software in 2026 appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the…
Wireless Network Security: WEP, WPA, WPA2 & WPA3 Explained in 2026
Wireless security is important for protecting wireless networks and services from unwanted attacks in 2026. The post Wireless Network Security: WEP, WPA, WPA2 & WPA3 Explained in 2026 appeared first on eSecurity Planet. This article has been indexed from eSecurity…
Top 7 Full Disk Encryption Software Solutions in 2026
Protect your data with the best disk encryption solutions in 2026. The post Top 7 Full Disk Encryption Software Solutions in 2026 appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article: Top…
Best Zero Trust Security Solutions in 2026
Zero trust continues to gain traction in 2026 as organizations adopt continuous verification, least-privilege access, and comprehensive monitoring. The post Best Zero Trust Security Solutions in 2026 appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet…
Trump’s Golden Dome gets $3.2B of contractors and an AI sprinkle
Space Force awards 11 firms prototype deals to build orbital interceptors The United States Space Force (USSF) has awarded eleven companies contracts to develop space-based interceptors for President Trump’s Golden Dome program, in agreements worth up to $3.2 billion.… This…
Medical and utility tech companies admit digital breakins
Itron, Medtronic disclose breaches in Friday filings Digital intruders recently broke into two major tech suppliers – utility-technology firm Itron and medical-device maker Medtronic – according to filings with federal regulators.… This article has been indexed from The Register –…
[un]prompted 2026 – Exploring The Al Automation Boundary
Author, Creator & Presenter: Arthi Nagarajan, Software Engineer for Internal Threat Detection At Datadog Our thanks to [un]prompted for publishing their Creators, Authors and Presenter’s outstanding [un]prompted 2026 AI Security Practitioner content on the Organizations’ YouTube Channel. Permalink The post…
ADT Breach Exposes Data of 5.5 Million Customers, ShinyHunters Likely Behind Attack
The ShinyHunters extortion group is claiming responsibility for a breach of home and commercial security vendor ADT that exposed the data of 5.5 million customers. attack appears to be part of a larger and ongoing vishing campaign being run by…