<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[CyberMaterial: News]]></title><description><![CDATA[Find all cybersecurity alerts, incidents and news.]]></description><link>https://www.cybermaterial.com/s/news</link><image><url>https://substackcdn.com/image/fetch/$s_!nNgF!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6c57d21-5644-4f88-bf07-ea44d2603e80_482x482.png</url><title>CyberMaterial: News</title><link>https://www.cybermaterial.com/s/news</link></image><generator>Substack</generator><lastBuildDate>Mon, 04 May 2026 04:41:28 GMT</lastBuildDate><atom:link href="https://www.cybermaterial.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[CyberMaterial]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[cybermaterial@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[cybermaterial@substack.com]]></itunes:email><itunes:name><![CDATA[CyberMaterial]]></itunes:name></itunes:owner><itunes:author><![CDATA[CyberMaterial]]></itunes:author><googleplay:owner><![CDATA[cybermaterial@substack.com]]></googleplay:owner><googleplay:email><![CDATA[cybermaterial@substack.com]]></googleplay:email><googleplay:author><![CDATA[CyberMaterial]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Patchstack Bug Bounty Guidelines]]></title><description><![CDATA[Patchstack has released detailed guidelines for their Bug Bounty Program, which aims to identify and address vulnerabilities in WordPress core, plugins, and themes.]]></description><link>https://www.cybermaterial.com/p/patchstack-bug-bounty-guidelines</link><guid isPermaLink="false">https://www.cybermaterial.com/p/patchstack-bug-bounty-guidelines</guid><pubDate>Fri, 01 May 2026 12:15:13 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!FgaO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faeb7dd90-18eb-4816-b626-6bf12d18215f_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!FgaO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faeb7dd90-18eb-4816-b626-6bf12d18215f_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FgaO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faeb7dd90-18eb-4816-b626-6bf12d18215f_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!FgaO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faeb7dd90-18eb-4816-b626-6bf12d18215f_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!FgaO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faeb7dd90-18eb-4816-b626-6bf12d18215f_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!FgaO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faeb7dd90-18eb-4816-b626-6bf12d18215f_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FgaO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faeb7dd90-18eb-4816-b626-6bf12d18215f_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/aeb7dd90-18eb-4816-b626-6bf12d18215f_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:650164,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/196106187?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faeb7dd90-18eb-4816-b626-6bf12d18215f_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!FgaO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faeb7dd90-18eb-4816-b626-6bf12d18215f_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!FgaO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faeb7dd90-18eb-4816-b626-6bf12d18215f_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!FgaO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faeb7dd90-18eb-4816-b626-6bf12d18215f_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!FgaO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faeb7dd90-18eb-4816-b626-6bf12d18215f_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Patchstack has released detailed guidelines for their Bug Bounty Program, which aims to identify and address vulnerabilities in WordPress core, plugins, and themes. The guidelines specify the scope of the program, the types of vulnerabilities that are eligible for bounties, and the criteria for valid submissions. This initiative is designed to enhance the security of WordPress components distributed through recognized repositories such as WordPress.org, Envato, and GitHub.<br><br>The Bug Bounty Program focuses on vulnerabilities that have a clear and measurable security impact, with a CVSS v3.1 base score of 6.5 or higher. Eligible components must have at least 1,000 active installations, or 100+ installations if the vulnerability has a CVSS score of 8.5 or higher and can be exploited by unauthenticated users. Additionally, the component must have been released within the last three years, and the report should target the latest version available.<br><br>Several common rejection reasons are outlined, including vulnerabilities that arise from expected functionality or configurations made by high-privilege users. Reports involving vulnerabilities with high attack complexity or those that result in minor data leakage or modification are also outside the scope. Furthermore, vulnerabilities requiring unrealistic identifiers or scenarios, as well as those involving non-publicly-distributed components, are not eligible for bounties.<br><br>Submissions must consolidate multiple findings of the same vulnerability type into a single report. Vendor or developer self-submissions are accepted for disclosure but do not qualify for bounties. Reports must be complete, accurate, and verifiable, with realistic prerequisites and exploitation scenarios. Specific types of vulnerabilities, such as CSV injection, CAPTCHA bypasses, and IP spoofing, are explicitly excluded from the program.<br><br>To participate in the Bug Bounty Program, security researchers must ensure their reports meet the outlined criteria and provide sufficient evidence of the vulnerability's impact. By adhering to these guidelines, participants can contribute to improving the security of WordPress components and potentially earn bounties for their findings.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://patchstack.com/database/report</p>]]></content:encoded></item><item><title><![CDATA[Versus Project Operator Extradited to US]]></title><description><![CDATA[The Department of Justice has successfully extradited a German national from Colombia to the United States.]]></description><link>https://www.cybermaterial.com/p/versus-project-operator-extradited</link><guid isPermaLink="false">https://www.cybermaterial.com/p/versus-project-operator-extradited</guid><pubDate>Fri, 01 May 2026 12:14:34 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!SZYN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F889039de-9242-418c-950a-f2c391fdfc6c_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!SZYN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F889039de-9242-418c-950a-f2c391fdfc6c_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!SZYN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F889039de-9242-418c-950a-f2c391fdfc6c_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!SZYN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F889039de-9242-418c-950a-f2c391fdfc6c_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!SZYN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F889039de-9242-418c-950a-f2c391fdfc6c_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!SZYN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F889039de-9242-418c-950a-f2c391fdfc6c_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!SZYN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F889039de-9242-418c-950a-f2c391fdfc6c_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/889039de-9242-418c-950a-f2c391fdfc6c_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:329799,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/196106104?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F889039de-9242-418c-950a-f2c391fdfc6c_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!SZYN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F889039de-9242-418c-950a-f2c391fdfc6c_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!SZYN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F889039de-9242-418c-950a-f2c391fdfc6c_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!SZYN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F889039de-9242-418c-950a-f2c391fdfc6c_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!SZYN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F889039de-9242-418c-950a-f2c391fdfc6c_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The Department of Justice has successfully extradited a German national from Colombia to the United States. This individual is accused of owning and operating 'The Versus Project', a platform allegedly involved in cybercriminal activities. This action marks a significant step in the ongoing efforts by U.S. authorities to address international cybercrime.<br><br>The extradition coincides with the sentencing of two men involved in using BlackCat ransomware to extort U.S. entities. These cases highlight the persistent threat posed by cybercriminals who exploit vulnerabilities to target organizations across borders. The Department of Justice's actions demonstrate a commitment to pursuing cybercriminals regardless of their location.<br><br>'Versus Project' is believed to have facilitated various illegal activities, providing a platform for cybercriminals to conduct operations. The extradited individual is now facing charges in the United States, where authorities will continue their investigation into the extent of the platform's activities and its impact on victims.<br><br>The impact of these cybercriminal activities is significant, affecting numerous organizations and individuals. The use of ransomware like BlackCat can lead to severe financial losses and operational disruptions. As cyber threats continue to evolve, it is essential for organizations to remain vigilant and proactive in their cybersecurity strategies.<br><br>To mitigate the risk of falling victim to such cyber threats, organizations should regularly update their security protocols and conduct thorough risk assessments. Implementing robust cybersecurity measures and educating employees about potential threats can help protect against the activities of platforms like 'The Versus Project'.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://databreaches.net/2026/04/30/versus-project-marketplace-creator-and-operator-extradited-from-colombia-to-the-united-states/?pk_campaign=feed&amp;pk_kwd=versus-project-marketplace-creator-and-operator-extradited-from-colombia-to-the-united-states</p>]]></content:encoded></item><item><title><![CDATA[Europol Busts Albanian Scam Call Centers]]></title><description><![CDATA[In a significant breakthrough against online fraud, Europol has successfully dismantled an Albanian criminal network operating scam call centers.]]></description><link>https://www.cybermaterial.com/p/europol-busts-albanian-scam-call</link><guid isPermaLink="false">https://www.cybermaterial.com/p/europol-busts-albanian-scam-call</guid><pubDate>Fri, 01 May 2026 12:13:35 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!V5Ya!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07d44b00-56ad-4747-82cf-23afb0388eba_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!V5Ya!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07d44b00-56ad-4747-82cf-23afb0388eba_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!V5Ya!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07d44b00-56ad-4747-82cf-23afb0388eba_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!V5Ya!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07d44b00-56ad-4747-82cf-23afb0388eba_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!V5Ya!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07d44b00-56ad-4747-82cf-23afb0388eba_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!V5Ya!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07d44b00-56ad-4747-82cf-23afb0388eba_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!V5Ya!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07d44b00-56ad-4747-82cf-23afb0388eba_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/07d44b00-56ad-4747-82cf-23afb0388eba_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:926227,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/196106057?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07d44b00-56ad-4747-82cf-23afb0388eba_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!V5Ya!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07d44b00-56ad-4747-82cf-23afb0388eba_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!V5Ya!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07d44b00-56ad-4747-82cf-23afb0388eba_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!V5Ya!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07d44b00-56ad-4747-82cf-23afb0388eba_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!V5Ya!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07d44b00-56ad-4747-82cf-23afb0388eba_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>In a significant breakthrough against online fraud, Europol has successfully dismantled an Albanian criminal network operating scam call centers. This operation, which spanned two years, culminated in the arrest of 10 individuals and the seizure of substantial assets, including nearly &#8364;900,000 in cash and hundreds of electronic devices. The fraudulent scheme is estimated to have cost victims at least &#8364;50 million.<br><br>The investigation began in June 2023 when Austrian law enforcement identified numerous fraud victims in Vienna. By April 2024, they had traced an IP address linked to the perpetrators and requested assistance from Albanian authorities. The scam involved misleading advertisements on social media and search engines, which lured victims into a fake investment scheme. Once registered, victims were assigned 'retention agents' who impersonated investment advisors.<br><br>The operation was structured like a legitimate business, with call center agents organized into language-specific teams targeting different markets. Of the 450 employees, 'conversion agents' focused on acquiring new victims, while 'retention agents' worked to extract more money from them. The organization also had dedicated teams for management, finance, IT, and HR, with team leaders overseeing operations.<br><br>Victims were persuaded to open accounts on cryptocurrency platforms, initially depositing &#8364;500. The network employed psychological tactics and local language skills to gain victims' trust. In some cases, they used remote access software to control victims' computers, although the exact purpose remains unclear. The money was never invested but laundered internationally, affecting victims in countries such as Austria, Italy, Germany, and the UK.<br><br>To protect themselves, individuals should be wary of unsolicited investment offers, especially those promising high returns. It is advisable to conduct thorough research and verify the legitimacy of any investment opportunity. Victims of such scams should report incidents to local authorities to aid in ongoing investigations and prevent further fraud.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://www.infosecurity-magazine.com/news/europol-albanian-scam-call-centers/</p>]]></content:encoded></item><item><title><![CDATA[Datalink Partners with Arctic Wolf for AI Security]]></title><description><![CDATA[Datalink Networks has announced a strategic partnership with Arctic Wolf to enhance its security offerings for customers in the United States and Canada.]]></description><link>https://www.cybermaterial.com/p/datalink-partners-with-arctic-wolf</link><guid isPermaLink="false">https://www.cybermaterial.com/p/datalink-partners-with-arctic-wolf</guid><pubDate>Fri, 01 May 2026 12:12:44 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!4oNp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00f524aa-bd61-4025-8314-72195532e95e_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4oNp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00f524aa-bd61-4025-8314-72195532e95e_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4oNp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00f524aa-bd61-4025-8314-72195532e95e_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!4oNp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00f524aa-bd61-4025-8314-72195532e95e_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!4oNp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00f524aa-bd61-4025-8314-72195532e95e_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!4oNp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00f524aa-bd61-4025-8314-72195532e95e_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4oNp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00f524aa-bd61-4025-8314-72195532e95e_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/00f524aa-bd61-4025-8314-72195532e95e_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:194557,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/196105966?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00f524aa-bd61-4025-8314-72195532e95e_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4oNp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00f524aa-bd61-4025-8314-72195532e95e_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!4oNp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00f524aa-bd61-4025-8314-72195532e95e_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!4oNp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00f524aa-bd61-4025-8314-72195532e95e_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!4oNp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00f524aa-bd61-4025-8314-72195532e95e_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Datalink Networks has announced a strategic partnership with Arctic Wolf to enhance its security offerings for customers in the United States and Canada. This collaboration will allow Datalink to integrate Arctic Wolf's AI-led security operations into its service portfolio, providing customers with advanced security capabilities without the need to establish their own security operations center (SOC). The partnership aims to address the increasing demand from customers for robust security solutions that can be managed externally, alleviating the burden on internal resources.<br><br>The partnership is particularly timely as managed service providers (MSPs) face mounting pressure to deliver stronger security outcomes. Many organizations lack the internal staff, tools, or time to effectively manage security operations on their own. By partnering with Arctic Wolf, Datalink can offer a comprehensive security operations portfolio powered by the Aurora Superintelligence Platform, which is delivered through Arctic Wolf's Aurora Agentic SOC. This platform combines telemetry from customer environments with AI-driven analysis and human expertise to ensure accurate and actionable security insights.<br><br>Arctic Wolf's platform is designed to enrich and analyze data from various sources, providing enhanced visibility and faster response times. The integration of AI technology helps in identifying threats more efficiently, while human experts validate outcomes and guide decision-making processes. This approach allows Datalink to extend its managed services with structured security operations support, offering clients improved monitoring, compliance support, and overall security posture.<br><br>For Datalink, this partnership represents an opportunity to strengthen its service offerings by incorporating Arctic Wolf's advanced security capabilities. It also highlights a broader trend among MSPs to collaborate with specialized security operations partners to fill gaps in their service portfolios. By doing so, MSPs can maintain their client relationships while providing enhanced security services without the need to invest heavily in building these capabilities internally.<br><br>Organizations looking to improve their security operations should consider leveraging partnerships like the one between Datalink and Arctic Wolf. This collaboration provides a pathway to mature security operations, reducing operational complexity and improving response times. Customers can benefit from the combined expertise and technology of both companies, ensuring a more robust and efficient security posture without the associated costs and complexities of developing these capabilities in-house.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://www.channele2e.com/brief/datalink-taps-arctic-wolf-for-ai-led-security-operations </p>]]></content:encoded></item><item><title><![CDATA[Cybercrime Fighters Club Launched]]></title><description><![CDATA[Group-IB has announced the creation of the Cybercrime Fighters Club, a new initiative designed to foster collaboration and knowledge sharing in the cybersecurity field.]]></description><link>https://www.cybermaterial.com/p/cybercrime-fighters-club-launched</link><guid isPermaLink="false">https://www.cybermaterial.com/p/cybercrime-fighters-club-launched</guid><pubDate>Thu, 30 Apr 2026 12:33:01 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!nOp1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb643d482-0697-4325-b393-583b6b5e5878_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!nOp1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb643d482-0697-4325-b393-583b6b5e5878_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!nOp1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb643d482-0697-4325-b393-583b6b5e5878_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!nOp1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb643d482-0697-4325-b393-583b6b5e5878_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!nOp1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb643d482-0697-4325-b393-583b6b5e5878_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!nOp1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb643d482-0697-4325-b393-583b6b5e5878_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!nOp1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb643d482-0697-4325-b393-583b6b5e5878_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b643d482-0697-4325-b393-583b6b5e5878_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:269276,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195991953?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb643d482-0697-4325-b393-583b6b5e5878_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!nOp1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb643d482-0697-4325-b393-583b6b5e5878_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!nOp1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb643d482-0697-4325-b393-583b6b5e5878_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!nOp1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb643d482-0697-4325-b393-583b6b5e5878_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!nOp1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb643d482-0697-4325-b393-583b6b5e5878_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Group-IB has announced the creation of the Cybercrime Fighters Club, a new initiative designed to foster collaboration and knowledge sharing in the cybersecurity field. This community aims to bring together individuals with a shared interest in combating cybercrime, providing a platform for discussion and joint research on emerging threats. The club is hosted on Discord, a popular communication platform, allowing for real-time interaction among members.<br><br>The Cybercrime Fighters Club is open to a wide range of participants, from seasoned cybersecurity professionals to newcomers and enthusiasts. This inclusivity ensures that anyone with an interest in cybersecurity can join the conversation, learn from others, and contribute their own insights. The community is positioned as a welcoming space where members can connect, share experiences, and grow their understanding of cyber threats.<br><br>Technical discussions within the club will focus on the latest trends and developments in cybercrime, enabling members to stay informed about new tactics and technologies used by cybercriminals. By facilitating these exchanges, Group-IB hopes to enhance the collective knowledge of its members and improve their ability to respond to cyber threats effectively. The club also encourages collaborative research efforts, allowing members to work together on projects that address specific cybersecurity challenges.<br><br>The impact of the Cybercrime Fighters Club is expected to be significant, as it provides a unique opportunity for individuals to engage with peers and experts in the field. By fostering a sense of community and shared purpose, the club aims to strengthen the overall cybersecurity ecosystem. Participants can benefit from the diverse perspectives and expertise of fellow members, leading to more effective strategies for combating cybercrime.<br><br>To join the Cybercrime Fighters Club, interested individuals can access the community through Discord. Group-IB encourages anyone passionate about cybersecurity to participate, regardless of their level of experience. By joining the club, members can take advantage of the resources and support available, enhancing their skills and contributing to the fight against cybercrime.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://www.group-ib.com/blog/cybercrime-fighters-club/ </p>]]></content:encoded></item><item><title><![CDATA[Claude Mythos Fears Startle Japan's Financial Sector]]></title><description><![CDATA[Japan's financial sector is taking proactive steps to address potential cybersecurity threats posed by Anthropic's new AI model, Mythos.]]></description><link>https://www.cybermaterial.com/p/claude-mythos-fears-startle-japans</link><guid isPermaLink="false">https://www.cybermaterial.com/p/claude-mythos-fears-startle-japans</guid><pubDate>Thu, 30 Apr 2026 12:31:26 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!j_BC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F816376a0-6096-4194-b6e4-b1c08c8abcf2_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!j_BC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F816376a0-6096-4194-b6e4-b1c08c8abcf2_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!j_BC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F816376a0-6096-4194-b6e4-b1c08c8abcf2_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!j_BC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F816376a0-6096-4194-b6e4-b1c08c8abcf2_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!j_BC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F816376a0-6096-4194-b6e4-b1c08c8abcf2_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!j_BC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F816376a0-6096-4194-b6e4-b1c08c8abcf2_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!j_BC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F816376a0-6096-4194-b6e4-b1c08c8abcf2_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/816376a0-6096-4194-b6e4-b1c08c8abcf2_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:821657,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195991766?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F816376a0-6096-4194-b6e4-b1c08c8abcf2_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!j_BC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F816376a0-6096-4194-b6e4-b1c08c8abcf2_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!j_BC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F816376a0-6096-4194-b6e4-b1c08c8abcf2_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!j_BC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F816376a0-6096-4194-b6e4-b1c08c8abcf2_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!j_BC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F816376a0-6096-4194-b6e4-b1c08c8abcf2_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Japan's financial sector is taking proactive steps to address potential cybersecurity threats posed by Anthropic's new AI model, Mythos. On April 24, key figures from Japan's financial industry, including the finance minister and leaders from major banks, convened to form a task force dedicated to understanding and mitigating the risks associated with this advanced AI technology. The concern stems from Mythos's ability to identify previously unknown vulnerabilities in various software systems, raising alarms about the security of financial data and operations.<br><br>During testing, Mythos demonstrated its capability to uncover both new and longstanding vulnerabilities in browsers and operating systems. Notably, it identified a 27-year-old vulnerability and successfully chained multiple vulnerabilities into a single exploit. This has led to heightened concerns within Japan's financial sector, with officials expressing fears that a successful cyberattack could force banks to revert to cash transactions, disrupting the economy.<br><br>Despite these concerns, some cybersecurity experts question the extent of the threat posed by Mythos. They argue that while the model's capabilities are impressive, the financial sector should not overestimate its impact. Similar vulnerabilities are often discovered by other AI models, and the majority of successful cyberattacks do not rely on exploiting such vulnerabilities.<br><br>The global financial system relies heavily on public trust, making cybersecurity a top priority for financial institutions. Japan's financial sector, known for its robust cybersecurity measures, is now focusing on enhancing its defenses against potential threats from Mythos. This includes ensuring that existing systems are secure and that vulnerabilities are promptly addressed.<br><br>Organizations are advised to continue strengthening their cybersecurity frameworks and not to become overly fixated on Mythos. Instead, they should focus on comprehensive security strategies that address a wide range of potential threats. By doing so, they can better protect themselves against both current and emerging cybersecurity challenges.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://www.darkreading.com/cyber-risk/claude-mythos-startle-japans-financial-sector </p>]]></content:encoded></item><item><title><![CDATA[U.S. Charges Suspected Scattered Spider Member]]></title><description><![CDATA[Federal authorities have taken legal action against Peter Stokes, a 19-year-old alleged member of the cybercriminal group known as Scattered Spider.]]></description><link>https://www.cybermaterial.com/p/us-charges-suspected-scattered-spider</link><guid isPermaLink="false">https://www.cybermaterial.com/p/us-charges-suspected-scattered-spider</guid><pubDate>Thu, 30 Apr 2026 12:30:25 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!sDoP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1502aaca-abc1-41ec-bbc8-4bb508f7bc6c_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!sDoP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1502aaca-abc1-41ec-bbc8-4bb508f7bc6c_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!sDoP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1502aaca-abc1-41ec-bbc8-4bb508f7bc6c_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!sDoP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1502aaca-abc1-41ec-bbc8-4bb508f7bc6c_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!sDoP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1502aaca-abc1-41ec-bbc8-4bb508f7bc6c_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!sDoP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1502aaca-abc1-41ec-bbc8-4bb508f7bc6c_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!sDoP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1502aaca-abc1-41ec-bbc8-4bb508f7bc6c_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1502aaca-abc1-41ec-bbc8-4bb508f7bc6c_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:481980,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195991707?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1502aaca-abc1-41ec-bbc8-4bb508f7bc6c_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!sDoP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1502aaca-abc1-41ec-bbc8-4bb508f7bc6c_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!sDoP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1502aaca-abc1-41ec-bbc8-4bb508f7bc6c_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!sDoP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1502aaca-abc1-41ec-bbc8-4bb508f7bc6c_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!sDoP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1502aaca-abc1-41ec-bbc8-4bb508f7bc6c_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Federal authorities have taken legal action against Peter Stokes, a 19-year-old alleged member of the cybercriminal group known as Scattered Spider. Stokes, who operates under the alias 'Bouquet', was apprehended earlier this month in Helsinki. His arrest occurred as he was attempting to board a flight to Japan, highlighting the international scope of law enforcement efforts against cybercrime.<br><br>Stokes holds dual citizenship in the United States and Estonia, which may complicate jurisdictional issues in the case. His arrest is part of a broader crackdown on Scattered Spider, a group implicated in numerous cyber intrusions. The group has been under scrutiny for its sophisticated methods and high-profile targets, making this arrest a significant development in ongoing cybercrime investigations.<br><br>At the time of his arrest, Stokes was found in possession of multiple electronic devices. These devices are likely to be examined for evidence that could further illuminate the operations of Scattered Spider. The arrest underscores the importance of international cooperation in tackling cybercrime, as Stokes was detained in Finland while en route to Japan.<br><br>The impact of this arrest on Scattered Spider's activities remains to be seen, but it represents a potential disruption to the group's operations. Organizations and individuals should remain vigilant, as cybercriminal groups often have distributed networks that can continue operations despite the arrest of key members.<br><br>To protect against potential threats, cybersecurity professionals are advised to ensure that all systems are up-to-date with the latest security patches. Additionally, monitoring for unusual activity and implementing robust security protocols can help mitigate the risk of cyber intrusions. Staying informed about the latest developments in cybercrime is essential for maintaining a strong security posture.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://www.chicagotribune.com/2026/04/27/teen-charged-in-chicago-was-part-of-international-scattered-spider-hacker-group-feds-say/ </p>]]></content:encoded></item><item><title><![CDATA[OpenAI Cyber Defense Roadmap Released]]></title><description><![CDATA[OpenAI has unveiled a new cyber defense roadmap titled 'Cybersecurity in the Intelligence Age', aimed at equipping security professionals with AI-powered tools to stay ahead of cyber threats.]]></description><link>https://www.cybermaterial.com/p/openai-cyber-defense-roadmap-released</link><guid isPermaLink="false">https://www.cybermaterial.com/p/openai-cyber-defense-roadmap-released</guid><pubDate>Thu, 30 Apr 2026 12:29:45 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!khX9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7588bd80-d874-4b2e-849c-34050cdd4b78_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!khX9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7588bd80-d874-4b2e-849c-34050cdd4b78_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!khX9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7588bd80-d874-4b2e-849c-34050cdd4b78_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!khX9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7588bd80-d874-4b2e-849c-34050cdd4b78_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!khX9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7588bd80-d874-4b2e-849c-34050cdd4b78_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!khX9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7588bd80-d874-4b2e-849c-34050cdd4b78_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!khX9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7588bd80-d874-4b2e-849c-34050cdd4b78_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7588bd80-d874-4b2e-849c-34050cdd4b78_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:745976,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195991648?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7588bd80-d874-4b2e-849c-34050cdd4b78_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!khX9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7588bd80-d874-4b2e-849c-34050cdd4b78_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!khX9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7588bd80-d874-4b2e-849c-34050cdd4b78_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!khX9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7588bd80-d874-4b2e-849c-34050cdd4b78_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!khX9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7588bd80-d874-4b2e-849c-34050cdd4b78_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>OpenAI has unveiled a new cyber defense roadmap titled 'Cybersecurity in the Intelligence Age', aimed at equipping security professionals with AI-powered tools to stay ahead of cyber threats. This initiative is part of OpenAI's effort to ensure that defensive capabilities are enhanced faster than malicious actors can adapt their tactics. The roadmap was spearheaded by Sasha Baker and released in April 2026, reflecting a strategic approach to bolster national resilience against cyber threats.<br><br>The roadmap outlines five core pillars designed to democratize access to advanced defensive capabilities. These pillars focus on integrating artificial intelligence into security frameworks to provide a robust defense mechanism against evolving cyber threats. By prioritizing the development and deployment of AI tools, OpenAI aims to empower defenders with the necessary resources to protect critical infrastructure and sensitive data.<br><br>Technical details of the roadmap emphasize the importance of AI in identifying and mitigating threats before they can cause significant harm. The use of machine learning algorithms and predictive analytics is highlighted as a key component in detecting anomalies and preventing breaches. This proactive approach is intended to shift the balance of power towards defenders, enabling them to respond swiftly and effectively to potential attacks.<br><br>The impact of this roadmap is expected to be significant, as it provides a framework for organizations to enhance their cybersecurity posture. By adopting AI-driven security measures, companies can improve their ability to detect and respond to threats, thereby reducing the risk of data breaches and other cyber incidents. This initiative also aims to foster collaboration among industry stakeholders to share knowledge and best practices.<br><br>Organizations are encouraged to review the 'Cybersecurity in the Intelligence Age' roadmap to understand how AI can be integrated into their existing security strategies. By doing so, they can build resilience against cyber threats and ensure that they are prepared to face the challenges of the digital age. Security professionals should consider investing in AI technologies and training to fully leverage the benefits outlined in the roadmap.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://gbhackers.com/openai-unveils-cyber-defense-roadmap/ </p>]]></content:encoded></item><item><title><![CDATA[Pentagon launches cyber apprenticeship program]]></title><description><![CDATA[The Pentagon has introduced a cyber apprenticeship program designed to address the growing need for skilled professionals in technology and cybersecurity.]]></description><link>https://www.cybermaterial.com/p/pentagon-launches-cyber-apprenticeship</link><guid isPermaLink="false">https://www.cybermaterial.com/p/pentagon-launches-cyber-apprenticeship</guid><pubDate>Wed, 29 Apr 2026 12:23:17 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!5B6r!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa58d5807-8373-4813-b1f5-1234ba9b08ca_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5B6r!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa58d5807-8373-4813-b1f5-1234ba9b08ca_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5B6r!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa58d5807-8373-4813-b1f5-1234ba9b08ca_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!5B6r!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa58d5807-8373-4813-b1f5-1234ba9b08ca_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!5B6r!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa58d5807-8373-4813-b1f5-1234ba9b08ca_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!5B6r!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa58d5807-8373-4813-b1f5-1234ba9b08ca_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5B6r!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa58d5807-8373-4813-b1f5-1234ba9b08ca_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a58d5807-8373-4813-b1f5-1234ba9b08ca_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:781675,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195863456?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa58d5807-8373-4813-b1f5-1234ba9b08ca_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5B6r!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa58d5807-8373-4813-b1f5-1234ba9b08ca_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!5B6r!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa58d5807-8373-4813-b1f5-1234ba9b08ca_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!5B6r!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa58d5807-8373-4813-b1f5-1234ba9b08ca_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!5B6r!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa58d5807-8373-4813-b1f5-1234ba9b08ca_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The Pentagon has introduced a cyber apprenticeship program designed to address the growing need for skilled professionals in technology and cybersecurity. This initiative aligns with the administration's broader strategy to fill vacancies in these critical sectors by prioritizing skill-based hiring over traditional educational credentials.<br><br>The program is a response to the increasing demand for cybersecurity experts as threats continue to evolve and become more sophisticated. By focusing on skill-based hiring, the Pentagon aims to tap into a wider pool of candidates who may not have formal degrees but possess the necessary technical skills and aptitude for cybersecurity roles.<br><br>Technical details of the program have not been fully disclosed, but it is expected to include hands-on training and mentorship from experienced professionals in the field. Participants will likely gain practical experience in various aspects of cybersecurity, preparing them for roles that require a deep understanding of both defensive and offensive cyber operations.<br><br>The impact of this program could be significant, as it may help bridge the gap between the current demand for cybersecurity professionals and the available workforce. By equipping individuals with the skills needed to protect critical infrastructure and sensitive information, the Pentagon is taking proactive steps to enhance national security.<br><br>Individuals interested in pursuing a career in cybersecurity are encouraged to apply for the apprenticeship program. This opportunity offers a pathway to gain valuable experience and develop the skills necessary to succeed in a rapidly changing field. Those accepted into the program will likely benefit from a structured learning environment and the chance to work alongside seasoned cybersecurity experts.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://www.nextgov.com/cybersecurity/2026/04/pentagon-launches-cyber-apprenticeship-program/413187/</p>]]></content:encoded></item><item><title><![CDATA[Canada proposes crypto ATM ban]]></title><description><![CDATA[The Canadian government has announced a proposal to ban Bitcoin and other cryptocurrency ATMs, citing their misuse by scammers and money launderers.]]></description><link>https://www.cybermaterial.com/p/canada-proposes-crypto-atm-ban</link><guid isPermaLink="false">https://www.cybermaterial.com/p/canada-proposes-crypto-atm-ban</guid><pubDate>Wed, 29 Apr 2026 12:22:20 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!JLYm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05cc409f-705a-4c1a-9310-1b4f54257312_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JLYm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05cc409f-705a-4c1a-9310-1b4f54257312_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JLYm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05cc409f-705a-4c1a-9310-1b4f54257312_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!JLYm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05cc409f-705a-4c1a-9310-1b4f54257312_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!JLYm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05cc409f-705a-4c1a-9310-1b4f54257312_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!JLYm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05cc409f-705a-4c1a-9310-1b4f54257312_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JLYm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05cc409f-705a-4c1a-9310-1b4f54257312_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/05cc409f-705a-4c1a-9310-1b4f54257312_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:524976,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195863369?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05cc409f-705a-4c1a-9310-1b4f54257312_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!JLYm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05cc409f-705a-4c1a-9310-1b4f54257312_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!JLYm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05cc409f-705a-4c1a-9310-1b4f54257312_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!JLYm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05cc409f-705a-4c1a-9310-1b4f54257312_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!JLYm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05cc409f-705a-4c1a-9310-1b4f54257312_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>The Canadian government has announced a proposal to ban Bitcoin and other cryptocurrency ATMs, citing their misuse by scammers and money launderers. This initiative is part of the government's efforts to enhance regulatory oversight of the high-risk segments within the cryptocurrency sector. The proposal was detailed in the Spring Economic Update 2026, released on April 28, which highlights the government's concerns about the role of crypto ATMs in facilitating financial crimes.<br><br>According to the update, crypto ATMs have become a primary method for scammers to defraud victims and for criminals to launder money. These machines, which have become common in locations such as malls, gas stations, and corner stores, are seen as a convenient tool for illicit activities rather than for legitimate use by everyday consumers. The government argues that the risks associated with these ATMs outweigh their benefits, prompting the proposal to eliminate them.<br><br>The proposed ban would not completely restrict Canadians from accessing cryptocurrencies. Instead, it suggests that individuals can continue to purchase virtual currencies through brick-and-mortar money services businesses. This approach aims to provide a safer and more regulated environment for cryptocurrency transactions, reducing the potential for fraud and money laundering.<br><br>The impact of this proposal, if implemented, would be significant for the cryptocurrency industry in Canada. It would require businesses that currently operate crypto ATMs to adapt to new regulations and potentially shift their focus to other methods of providing cryptocurrency services. Additionally, consumers who rely on these ATMs for convenience may need to adjust to alternative means of purchasing digital currencies.<br><br>To comply with the proposed regulations, businesses and consumers should prepare for the transition by familiarizing themselves with the available options for purchasing cryptocurrencies through regulated channels. Staying informed about the progress of this proposal and any subsequent legislative changes will be essential for those involved in the cryptocurrency market in Canada.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://budget.canada.ca/update-miseajour/2026/report-rapport/chap2-en.html#a27 </p>]]></content:encoded></item><item><title><![CDATA[Meta Faces EU DSA Violations]]></title><description><![CDATA[Meta Platforms, the parent company of Facebook and Instagram, is under scrutiny by the European Commission for allegedly breaching the Digital Services Act (DSA).]]></description><link>https://www.cybermaterial.com/p/meta-faces-eu-dsa-violations</link><guid isPermaLink="false">https://www.cybermaterial.com/p/meta-faces-eu-dsa-violations</guid><pubDate>Wed, 29 Apr 2026 12:21:19 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!fWcz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F795eaa08-1227-4059-a4ea-db3738249a4c_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fWcz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F795eaa08-1227-4059-a4ea-db3738249a4c_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fWcz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F795eaa08-1227-4059-a4ea-db3738249a4c_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!fWcz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F795eaa08-1227-4059-a4ea-db3738249a4c_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!fWcz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F795eaa08-1227-4059-a4ea-db3738249a4c_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!fWcz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F795eaa08-1227-4059-a4ea-db3738249a4c_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fWcz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F795eaa08-1227-4059-a4ea-db3738249a4c_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/795eaa08-1227-4059-a4ea-db3738249a4c_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:212682,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195863248?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F795eaa08-1227-4059-a4ea-db3738249a4c_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!fWcz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F795eaa08-1227-4059-a4ea-db3738249a4c_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!fWcz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F795eaa08-1227-4059-a4ea-db3738249a4c_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!fWcz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F795eaa08-1227-4059-a4ea-db3738249a4c_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!fWcz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F795eaa08-1227-4059-a4ea-db3738249a4c_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Meta Platforms, the parent company of Facebook and Instagram, is under scrutiny by the European Commission for allegedly breaching the Digital Services Act (DSA). The Commission's preliminary decision indicates that Meta has not implemented adequate measures to prevent children under 13 from accessing its social media platforms. This violation could result in fines reaching up to $12 billion if not addressed promptly.<br><br>The European Commission's investigation into Meta's compliance with the DSA has been ongoing for nearly two years. The primary concern is that Meta's current systems allow minors to bypass age restrictions by simply entering a false birth date during the sign-up process. This loophole undermines the DSA's objective to protect children from inappropriate content and ensure a safer online environment.<br><br>Technically, the issue lies in Meta's age verification and user identification mechanisms. The platforms currently rely on self-reported age information, which is easily manipulated by users. The lack of a robust verification system means that underage users can create accounts without any substantial barriers, posing a significant compliance risk under the DSA.<br><br>The potential impact of these violations is substantial, with fines that could reach up to $12 billion. Beyond financial penalties, Meta's reputation and its ability to operate within the European market could be severely affected. The company must take decisive action to align its practices with the DSA requirements to avoid these consequences.<br><br>To address the Commission's concerns, Meta needs to develop and implement more effective age verification processes. This could involve integrating third-party verification services or employing advanced technologies such as AI to better identify and manage underage accounts. By enhancing these systems, Meta can work towards compliance with the DSA and mitigate the risk of significant penalties.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://ec.europa.eu/commission/presscorner/detail/en/ip_26_920</p>]]></content:encoded></item><item><title><![CDATA[Malwarebytes integrates with Claude for scam checks]]></title><description><![CDATA[A Malwarebytes has taken a significant step in enhancing online security by integrating its threat intelligence with popular AI tools, ChatGPT and Claude.]]></description><link>https://www.cybermaterial.com/p/malwarebytes-integrates-with-claude</link><guid isPermaLink="false">https://www.cybermaterial.com/p/malwarebytes-integrates-with-claude</guid><pubDate>Wed, 29 Apr 2026 12:20:10 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!DIMl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf03c122-4add-46f9-93e0-2d24e9e0de8b_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DIMl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf03c122-4add-46f9-93e0-2d24e9e0de8b_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DIMl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf03c122-4add-46f9-93e0-2d24e9e0de8b_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!DIMl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf03c122-4add-46f9-93e0-2d24e9e0de8b_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!DIMl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf03c122-4add-46f9-93e0-2d24e9e0de8b_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!DIMl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf03c122-4add-46f9-93e0-2d24e9e0de8b_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DIMl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf03c122-4add-46f9-93e0-2d24e9e0de8b_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/df03c122-4add-46f9-93e0-2d24e9e0de8b_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:536970,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195863179?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf03c122-4add-46f9-93e0-2d24e9e0de8b_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!DIMl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf03c122-4add-46f9-93e0-2d24e9e0de8b_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!DIMl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf03c122-4add-46f9-93e0-2d24e9e0de8b_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!DIMl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf03c122-4add-46f9-93e0-2d24e9e0de8b_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!DIMl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf03c122-4add-46f9-93e0-2d24e9e0de8b_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>A Malwarebytes has taken a significant step in enhancing online security by integrating its threat intelligence with popular AI tools, ChatGPT and Claude. This move aims to address the growing challenge of online scams, which are becoming increasingly difficult to detect. By embedding its security capabilities into these AI platforms, Malwarebytes hopes to provide users with reliable and quick answers to their safety concerns.<br><br>The integration with Claude allows users to easily check the safety of links, phone numbers, and email addresses. Users can activate Malwarebytes in Claude through a simple process that does not require a Malwarebytes account. Once connected, users can ask Claude to verify the legitimacy of suspicious content, receiving immediate and informed responses.<br><br>Technical details of this integration include the ability to paste URLs, share phone numbers, and email addresses for verification. Claude can also perform WHOIS lookups to provide additional information about domain registrations. The system categorizes results into four verdicts: malicious, suspicious, safe, and unknown, guiding users on how to proceed based on the threat level.<br><br>The impact of this integration is significant, as it empowers users to protect themselves from scams without interrupting their daily activities. With scams becoming more sophisticated, even experienced internet users can be caught off guard. By using Malwarebytes within Claude, users can enhance their online safety with minimal effort.<br><br>To start using Malwarebytes in Claude, users can follow a straightforward setup process available in the Help Center. This integration is a valuable tool for anyone looking to safeguard their online interactions, providing peace of mind in an increasingly digital world.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://www.malwarebytes.com/blog/product/2026/04/scam-checking-just-got-a-lot-easier-malwarebytes-is-now-in-claude</p>]]></content:encoded></item><item><title><![CDATA[Cybersecurity Professionals Feel Undervalued]]></title><description><![CDATA[A new report by Harvey Nash highlights a growing sense of dissatisfaction among cybersecurity professionals, with over three-quarters not receiving a pay raise last year.]]></description><link>https://www.cybermaterial.com/p/cybersecurity-professionals-feel</link><guid isPermaLink="false">https://www.cybermaterial.com/p/cybersecurity-professionals-feel</guid><pubDate>Tue, 28 Apr 2026 12:44:17 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!oZo4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F594337a3-a005-4a17-9396-575493520790_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!oZo4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F594337a3-a005-4a17-9396-575493520790_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!oZo4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F594337a3-a005-4a17-9396-575493520790_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!oZo4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F594337a3-a005-4a17-9396-575493520790_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!oZo4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F594337a3-a005-4a17-9396-575493520790_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!oZo4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F594337a3-a005-4a17-9396-575493520790_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!oZo4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F594337a3-a005-4a17-9396-575493520790_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/594337a3-a005-4a17-9396-575493520790_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:433110,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195744581?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F594337a3-a005-4a17-9396-575493520790_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!oZo4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F594337a3-a005-4a17-9396-575493520790_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!oZo4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F594337a3-a005-4a17-9396-575493520790_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!oZo4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F594337a3-a005-4a17-9396-575493520790_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!oZo4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F594337a3-a005-4a17-9396-575493520790_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>A new report by Harvey Nash highlights a growing sense of dissatisfaction among cybersecurity professionals, with over three-quarters not receiving a pay raise last year. This lack of financial recognition has led to feelings of being undervalued, with many considering a job change in the near future. The report, published on April 27, underscores the challenges faced by cybersecurity professionals in an industry where their skills are in high demand but often not adequately rewarded.<br><br>The Harvey Nash Global Tech Talent &amp; Salary Report surveyed over 3,646 technology professionals worldwide, revealing that only 45% of cybersecurity employees expect a pay increase in the next year. This is significantly lower than the three-quarters of AI and machine learning professionals who anticipate a raise. Cybersecurity professionals are among the most dissatisfied in the tech sector, with 23% describing themselves as unhappy, trailing only behind quality assurance and infrastructure staff.<br><br>Despite several high-profile cybersecurity incidents in 2025, such as the ransomware attack on Jaguar Land Rover and a massive data breach at Change Healthcare, only 22% of organizations have increased their cybersecurity resources. This lack of response has contributed to the perception that cybersecurity roles are undervalued, despite their critical importance in managing business risk.<br><br>Ankur Anand, CIO of Harvey Nash, emphasized the need for organizations to better recognize and reward cybersecurity talent. He noted that the current trend of rising workloads and stagnant pay is unsustainable and could lead to increased attrition as professionals seek better opportunities elsewhere.<br><br>To mitigate the risk of losing key cybersecurity staff, companies should prioritize making their employees feel valued and supported. This involves treating cybersecurity as a strategic capability, ensuring that these professionals are visible and backed by leadership. By doing so, organizations can enhance their ability to respond to incidents and maintain a strong security posture.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://www.harveynash.co.uk/latest-news/tech-talent-and-salary-report-2026 </p>]]></content:encoded></item><item><title><![CDATA[U.S. Companies Face Record Privacy Fines in 2025]]></title><description><![CDATA[In 2025, U.S.]]></description><link>https://www.cybermaterial.com/p/us-companies-face-record-privacy</link><guid isPermaLink="false">https://www.cybermaterial.com/p/us-companies-face-record-privacy</guid><pubDate>Tue, 28 Apr 2026 12:42:39 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!tVX-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93bb204d-8c56-4351-b344-e3efd51dcc4d_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!tVX-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93bb204d-8c56-4351-b344-e3efd51dcc4d_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!tVX-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93bb204d-8c56-4351-b344-e3efd51dcc4d_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!tVX-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93bb204d-8c56-4351-b344-e3efd51dcc4d_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!tVX-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93bb204d-8c56-4351-b344-e3efd51dcc4d_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!tVX-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93bb204d-8c56-4351-b344-e3efd51dcc4d_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!tVX-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93bb204d-8c56-4351-b344-e3efd51dcc4d_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/93bb204d-8c56-4351-b344-e3efd51dcc4d_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:481839,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195744337?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93bb204d-8c56-4351-b344-e3efd51dcc4d_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!tVX-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93bb204d-8c56-4351-b344-e3efd51dcc4d_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!tVX-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93bb204d-8c56-4351-b344-e3efd51dcc4d_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!tVX-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93bb204d-8c56-4351-b344-e3efd51dcc4d_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!tVX-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93bb204d-8c56-4351-b344-e3efd51dcc4d_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>In 2025, U.S. companies faced unprecedented fines totaling $3.45 billion for privacy violations, a figure that eclipses the combined total of the previous five years. This increase is largely due to more robust privacy laws in states such as California, enhanced interstate partnerships for enforcing these laws, and a heightened focus on the implications of AI and automation on privacy. The shift marks a move from raising awareness to rigorous enforcement by state regulators.<br><br>The California Consumer Privacy Act (CCPA), which had been relatively dormant in terms of enforcement since its provisions went live in 2023, saw a significant uptick in regulatory actions in 2025. The California Privacy Protection Agency has been actively pursuing violators across various industries, including tech, automotive, and consumer goods. This change reflects a broader trend where regulators are no longer offering leniency and are instead holding companies accountable for privacy law compliance.<br><br>A key factor in the increased enforcement is the formation of the Consortium of Privacy Regulators, a coalition of ten states dedicated to coordinating investigations and enforcement of privacy laws across state lines. This collaboration aims to address issues such as unauthorized access, deletion, and sale of personal information. Additionally, states are updating existing privacy laws to tackle challenges posed by AI technologies, particularly concerning how personal data is used in AI training and decision-making processes.<br><br>The impact of these developments is significant, as companies that have neglected their privacy programs may find themselves facing substantial fines. The renewed focus on enforcement serves as a wake-up call for businesses to prioritize data privacy and ensure compliance with state regulations. The trend is expected to continue, with privacy fines likely to increase further in the coming years.<br><br>To mitigate risks, companies should invest in strengthening their privacy programs and stay informed about evolving state laws. This includes understanding the implications of AI on data privacy and ensuring that their practices align with legal requirements. As states lead the charge in building the legal framework for data privacy in the AI era, businesses must adapt to avoid the financial and reputational consequences of non-compliance.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://cyberscoop.com/privacy-companies-hit-with-record-fines-2025-gartner/ </p>]]></content:encoded></item><item><title><![CDATA[DORA and Operational Resilience]]></title><description><![CDATA[The Digital Operational Resilience Act (DORA) is a regulatory framework introduced by the European Union to enhance the resilience of financial services firms against IT disruptions.]]></description><link>https://www.cybermaterial.com/p/dora-and-operational-resilience</link><guid isPermaLink="false">https://www.cybermaterial.com/p/dora-and-operational-resilience</guid><pubDate>Tue, 28 Apr 2026 12:41:30 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ewCk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cff77f9-6f19-4d1a-bc22-4ef850027365_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ewCk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cff77f9-6f19-4d1a-bc22-4ef850027365_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ewCk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cff77f9-6f19-4d1a-bc22-4ef850027365_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!ewCk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cff77f9-6f19-4d1a-bc22-4ef850027365_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!ewCk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cff77f9-6f19-4d1a-bc22-4ef850027365_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!ewCk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cff77f9-6f19-4d1a-bc22-4ef850027365_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ewCk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cff77f9-6f19-4d1a-bc22-4ef850027365_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9cff77f9-6f19-4d1a-bc22-4ef850027365_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:382093,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195744220?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cff77f9-6f19-4d1a-bc22-4ef850027365_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ewCk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cff77f9-6f19-4d1a-bc22-4ef850027365_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!ewCk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cff77f9-6f19-4d1a-bc22-4ef850027365_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!ewCk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cff77f9-6f19-4d1a-bc22-4ef850027365_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!ewCk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cff77f9-6f19-4d1a-bc22-4ef850027365_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The Digital Operational Resilience Act (DORA) is a regulatory framework introduced by the European Union to enhance the resilience of financial services firms against IT disruptions. Effective from January 2025, DORA sets clear expectations for firms to manage IT risks systematically, conduct resilience testing under realistic conditions, and maintain strict oversight of third-party dependencies. The act aims to ensure that organizations can retain control and restore services promptly during incidents, thereby minimizing operational and regulatory risks.<br><br>Despite being in effect for over a year, the maturity of compliance with DORA varies significantly across the financial sector. While some institutions have invested in continuity and cyber response measures, others are still in the early stages of building the necessary frameworks. A survey conducted in 2025 revealed that 96% of financial services organizations in the EMEA region believe they need to improve their resilience to meet DORA's standards. The challenge lies not only in having governance documents but in executing consistent actions across complex systems and suppliers under pressure.<br><br>Technical challenges often arise during major incidents when access to critical systems is compromised. Network faults or cyber incidents can sever connectivity, making it difficult for engineers to isolate affected components and stabilize services. This highlights a gap in many resilience programs, where backup and disaster recovery plans do not ensure that teams can administer infrastructure during an incident. Independent management access, such as out-of-band management, provides a dedicated route to critical infrastructure, allowing teams to restore services even when the primary network is impaired.<br><br>Supply chain disruptions add another layer of complexity, as financial services firms rely on shared platforms and external providers. When disruptions originate from the supply chain, firms must still contain the impact and maintain essential services, often in coordination with third parties. DORA emphasizes the importance of third-party oversight and operational outcomes, pushing firms to understand which providers support critical functions and how to respond when external dependencies are under stress.<br><br>To meet DORA's requirements, firms should focus on maintaining operational control during severe disruptions. Implementing independent management access to critical infrastructure can help achieve this by providing a practical means of staying in control when the main route into the environment is compromised. This approach reduces both operational risk during incidents and regulatory risk in the aftermath, ensuring that firms can limit impact and restore services safely.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://www.itsecurityguru.org/2026/04/28/dora-and-the-practical-test-of-operational-resilience/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=dora-and-the-practical-test-of-operational-resilience </p>]]></content:encoded></item><item><title><![CDATA[Proofpoint AI Incident Report 2026]]></title><description><![CDATA[Proofpoint, Inc.]]></description><link>https://www.cybermaterial.com/p/proofpoint-ai-incident-report-2026</link><guid isPermaLink="false">https://www.cybermaterial.com/p/proofpoint-ai-incident-report-2026</guid><pubDate>Tue, 28 Apr 2026 12:40:43 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!QtI2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdbe55a21-a2fe-4e2b-b9e1-d30b5723170f_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QtI2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdbe55a21-a2fe-4e2b-b9e1-d30b5723170f_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QtI2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdbe55a21-a2fe-4e2b-b9e1-d30b5723170f_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!QtI2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdbe55a21-a2fe-4e2b-b9e1-d30b5723170f_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!QtI2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdbe55a21-a2fe-4e2b-b9e1-d30b5723170f_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!QtI2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdbe55a21-a2fe-4e2b-b9e1-d30b5723170f_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QtI2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdbe55a21-a2fe-4e2b-b9e1-d30b5723170f_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dbe55a21-a2fe-4e2b-b9e1-d30b5723170f_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:578673,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195743909?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdbe55a21-a2fe-4e2b-b9e1-d30b5723170f_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QtI2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdbe55a21-a2fe-4e2b-b9e1-d30b5723170f_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!QtI2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdbe55a21-a2fe-4e2b-b9e1-d30b5723170f_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!QtI2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdbe55a21-a2fe-4e2b-b9e1-d30b5723170f_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!QtI2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdbe55a21-a2fe-4e2b-b9e1-d30b5723170f_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Proofpoint, Inc. has released its 2026 AI and Human Risk Landscape report, shedding light on the challenges organizations face as they rapidly adopt AI technologies. The report, based on a survey of over 1,400 security professionals from 12 countries, highlights a significant gap between AI deployment and security preparedness. With AI systems now operational across various functions, organizations are finding it difficult to ensure their security controls are effective against potential AI compromises.<br><br>The study reveals that 87% of organizations have moved beyond pilot stages with AI assistants, and 76% are rolling out autonomous agents. Despite these advancements, 52% of organizations are not fully confident in their AI security controls' ability to detect compromised systems. Furthermore, half of the organizations with existing controls have already experienced AI-related incidents, indicating a pressing need for improved security measures.<br><br>AI's integration into enterprise workflows has expanded the attack surface, with threats spreading rapidly across email, cloud applications, and collaboration platforms. The report notes that while email remains a primary threat vector, AI-related incidents are increasingly affecting other channels, including social and messaging platforms. This widespread exposure underscores the necessity for comprehensive security strategies that encompass all potential points of vulnerability.<br><br>Investigation readiness remains a significant challenge, as only one-third of organizations feel fully prepared to handle AI-related incidents. The complexity of managing multiple security tools further complicates incident response, with 94% of organizations finding tool management challenging. This fragmentation limits visibility and slows response times, emphasizing the need for a unified security platform.<br><br>To address these issues, organizations are encouraged to pursue vendor and tool consolidation, expand AI protections, and enhance collaboration channel coverage. By adopting a unified platform approach, organizations can improve their security posture and better manage the risks associated with AI deployment. As AI continues to transform enterprise operations, establishing robust security foundations will be crucial for scaling AI confidently and securely.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://www.proofpoint.com/us/newsroom/press-releases/proofpoint-research-reveals-half-global-organizations-experienced-ai </p>]]></content:encoded></item><item><title><![CDATA[Aspiritech Celebrates Cybersecurity Apprenticeship]]></title><description><![CDATA[Aspiritech, an Evanston-based nonprofit, has launched a new Cybersecurity Apprenticeship Program designed to connect adults on the autism spectrum with careers in the tech industry.]]></description><link>https://www.cybermaterial.com/p/aspiritech-celebrates-cybersecurity</link><guid isPermaLink="false">https://www.cybermaterial.com/p/aspiritech-celebrates-cybersecurity</guid><pubDate>Mon, 27 Apr 2026 12:48:06 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ju8V!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff107d8b7-1f3e-4143-be0d-93df1dcdd4b7_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ju8V!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff107d8b7-1f3e-4143-be0d-93df1dcdd4b7_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ju8V!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff107d8b7-1f3e-4143-be0d-93df1dcdd4b7_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!ju8V!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff107d8b7-1f3e-4143-be0d-93df1dcdd4b7_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!ju8V!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff107d8b7-1f3e-4143-be0d-93df1dcdd4b7_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!ju8V!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff107d8b7-1f3e-4143-be0d-93df1dcdd4b7_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ju8V!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff107d8b7-1f3e-4143-be0d-93df1dcdd4b7_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f107d8b7-1f3e-4143-be0d-93df1dcdd4b7_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:595850,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195622737?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff107d8b7-1f3e-4143-be0d-93df1dcdd4b7_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ju8V!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff107d8b7-1f3e-4143-be0d-93df1dcdd4b7_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!ju8V!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff107d8b7-1f3e-4143-be0d-93df1dcdd4b7_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!ju8V!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff107d8b7-1f3e-4143-be0d-93df1dcdd4b7_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!ju8V!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff107d8b7-1f3e-4143-be0d-93df1dcdd4b7_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Aspiritech, an Evanston-based nonprofit, has launched a new Cybersecurity Apprenticeship Program designed to connect adults on the autism spectrum with careers in the tech industry. This initiative is part of Aspiritech's broader mission to provide meaningful employment opportunities for autistic individuals, a mission that began nearly two decades ago. The program is officially recognized by the U.S. Department of Labor, ensuring that participants receive training that meets national standards and prepares them for in-demand cybersecurity roles.<br><br>The launch of the Cybersecurity Apprenticeship Program is a significant step for Aspiritech, which has been known for its work in software testing and quality assurance. As the demand for cybersecurity professionals continues to grow, Aspiritech has expanded its offerings to include this new program, which provides technical instruction and prepares participants for the CompTIA Security+ exam. The program includes 12 weeks of classroom instruction followed by 2,000 hours of paid on-the-job training, either at Aspiritech or with partner employers.<br><br>The program aims to address the high unemployment and underemployment rates among autistic individuals, which the National Institutes of Health estimates to be nearly 40%. By providing specialized training and support, Aspiritech hopes to bridge the gap between the autistic community and the tech industry, where thousands of cybersecurity roles remain unfilled due to a lack of qualified candidates. The apprenticeship program is supported by a grant from the Illinois Department of Commerce and Economic Opportunity, further highlighting its importance and potential impact.<br><br>Participants in the program, such as Jamie Specht, have expressed the personal and professional benefits of being part of an inclusive and supportive environment. For many, the program offers not only the opportunity to gain valuable skills but also a sense of belonging and acceptance. Aspiritech's sensory-friendly office spaces are designed to accommodate the needs of autistic employees, ensuring that they can work comfortably and effectively.<br><br>Looking ahead, Aspiritech plans to expand its training and employment programs, with a goal of training at least 250 people this year. The organization is also exploring additional career pathways in fields such as automation, artificial intelligence, and advanced manufacturing. By continuing to grow and adapt its programs, Aspiritech aims to further reduce autistic unemployment and underemployment, demonstrating the potential of individuals when given the opportunity to succeed.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://evanstonroundtable.com/2026/04/26/aspiritech-to-host-celebration-of-neuro-inclusive-cybersecurity-program/ </p>]]></content:encoded></item><item><title><![CDATA[Belgium's New Cyber Crisis Response Plan]]></title><description><![CDATA[Belgium has taken significant steps to enhance its cybersecurity posture by revising its national cyber crisis response plan.]]></description><link>https://www.cybermaterial.com/p/belgiums-new-cyber-crisis-response</link><guid isPermaLink="false">https://www.cybermaterial.com/p/belgiums-new-cyber-crisis-response</guid><pubDate>Mon, 27 Apr 2026 12:46:53 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!k9Va!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f013a19-0d18-4914-a0a7-0b651e226e05_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!k9Va!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f013a19-0d18-4914-a0a7-0b651e226e05_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!k9Va!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f013a19-0d18-4914-a0a7-0b651e226e05_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!k9Va!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f013a19-0d18-4914-a0a7-0b651e226e05_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!k9Va!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f013a19-0d18-4914-a0a7-0b651e226e05_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!k9Va!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f013a19-0d18-4914-a0a7-0b651e226e05_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!k9Va!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f013a19-0d18-4914-a0a7-0b651e226e05_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1f013a19-0d18-4914-a0a7-0b651e226e05_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:760191,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195622612?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f013a19-0d18-4914-a0a7-0b651e226e05_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!k9Va!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f013a19-0d18-4914-a0a7-0b651e226e05_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!k9Va!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f013a19-0d18-4914-a0a7-0b651e226e05_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!k9Va!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f013a19-0d18-4914-a0a7-0b651e226e05_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!k9Va!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f013a19-0d18-4914-a0a7-0b651e226e05_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Belgium has taken significant steps to enhance its cybersecurity posture by revising its national cyber crisis response plan. Originally established in 2017, the plan has been updated in 2026 to better address the evolving threat landscape and incorporate recent developments in European cybersecurity regulations. This revision underscores Belgium's commitment to a collaborative approach in managing digital incidents and crises across both public and private sectors.<br><br>The updated plan has been formally adopted through a Royal Decree and is grounded in two key pieces of legislation: the Law of 26 April 2024, which integrates the European NIS2 Directive into Belgian law, and the Law of 25 May 2007 on civil security. These legal foundations ensure that the plan is not just a theoretical document but a practical tool for real-world crisis management. The plan's comprehensive framework is designed to facilitate coordinated responses to cybersecurity incidents at the national level.<br><br>The plan outlines a structured response framework that includes the roles and responsibilities of various stakeholders, crisis management procedures, and channels for information exchange. It emphasizes the importance of national preparedness measures such as exercises and training, and ensures that Belgium can effectively participate in coordinated crisis management efforts at the European level. The framework is designed to protect critical sectors and enable seamless collaboration among competent bodies during a crisis.<br><br>A notable aspect of the 2026 revision is its alignment with the European Union's initiatives to bolster digital resilience. By incorporating mechanisms that facilitate Belgium's participation in EU-level cyber crisis management, the plan ensures compliance with the NIS2 Directive and enhances the country's ability to respond to cross-border cyber threats. This European dimension is crucial for maintaining robust cybersecurity defenses in an interconnected digital environment.<br><br>Organizations in Belgium are encouraged to familiarize themselves with the revised national cyber crisis response plan. Understanding the framework and the roles of different stakeholders will be essential for effective collaboration and preparedness in the event of a cyber crisis. While the detailed operational content of the plan remains confidential, the publicly disclosed framework provides sufficient guidance for stakeholders to align their cybersecurity strategies with national and European standards.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://ccb.belgium.be/news/belgium-adopts-new-national-cyber-crisis-response-plan</p>]]></content:encoded></item><item><title><![CDATA[CISA Director Nominee Withdraws]]></title><description><![CDATA[Sean Plankey, nominated by the current administration to lead the Cybersecurity and Infrastructure Security Agency (CISA), has withdrawn from consideration.]]></description><link>https://www.cybermaterial.com/p/cisa-director-nominee-withdraws</link><guid isPermaLink="false">https://www.cybermaterial.com/p/cisa-director-nominee-withdraws</guid><pubDate>Mon, 27 Apr 2026 12:46:05 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!uYsW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce744262-ee97-4607-a149-10da53c89e3d_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!uYsW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce744262-ee97-4607-a149-10da53c89e3d_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!uYsW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce744262-ee97-4607-a149-10da53c89e3d_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!uYsW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce744262-ee97-4607-a149-10da53c89e3d_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!uYsW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce744262-ee97-4607-a149-10da53c89e3d_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!uYsW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce744262-ee97-4607-a149-10da53c89e3d_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!uYsW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce744262-ee97-4607-a149-10da53c89e3d_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ce744262-ee97-4607-a149-10da53c89e3d_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:632125,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195622538?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce744262-ee97-4607-a149-10da53c89e3d_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!uYsW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce744262-ee97-4607-a149-10da53c89e3d_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!uYsW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce744262-ee97-4607-a149-10da53c89e3d_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!uYsW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce744262-ee97-4607-a149-10da53c89e3d_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!uYsW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce744262-ee97-4607-a149-10da53c89e3d_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Sean Plankey, nominated by the current administration to lead the Cybersecurity and Infrastructure Security Agency (CISA), has withdrawn from consideration. This development marks a setback for the Trump administration's efforts to advance its cybersecurity agenda. Plankey's decision comes after a prolonged nomination process that failed to secure Senate confirmation.<br><br>Plankey informed the Trump administration of his withdrawal, citing the Senate's reluctance to confirm him as the primary reason. Despite being initially nominated in March 2025 and renominated in January, his candidacy faced significant delays. The Senate holds on his nomination were due to unrelated political issues, including objections from Senators Ron Wyden and Rick Scott over separate matters concerning CISA and the Coast Guard.<br><br>The stalled nomination process has left CISA without a permanent leader during a challenging period. The agency has been grappling with personnel cuts and mission downsizing, which have affected its reputation and operational capabilities. Plankey's withdrawal adds to the uncertainty surrounding the agency's leadership and future direction.<br><br>Plankey's professional background includes senior roles in technology and cybersecurity across various organizations. He previously worked on maritime cybersecurity policy at the National Security Council and served in the Department of Energy's cybersecurity division. Despite his qualifications, the political impasse in the Senate proved insurmountable.<br><br>In the absence of a confirmed director, Nick Andersen, CISA's deputy director, continues to serve as acting director. The Trump administration is expected to announce a new nominee soon, as the agency seeks to stabilize its leadership and address ongoing challenges in the cybersecurity sector.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://www.politico.com/news/2026/04/22/sean-plankey-withdraws-nomination-cisa-00887136</p>]]></content:encoded></item><item><title><![CDATA[Google plans $40bn investment in Anthropic]]></title><description><![CDATA[Google's parent company, Alphabet, has announced plans to invest up to $40 billion in Anthropic, a developer of AI systems.]]></description><link>https://www.cybermaterial.com/p/google-plans-40bn-investment-in-anthropic</link><guid isPermaLink="false">https://www.cybermaterial.com/p/google-plans-40bn-investment-in-anthropic</guid><pubDate>Mon, 27 Apr 2026 12:43:43 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ZUEn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89ead4a1-c3fd-487a-8574-5e0012df2b38_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ZUEn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89ead4a1-c3fd-487a-8574-5e0012df2b38_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ZUEn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89ead4a1-c3fd-487a-8574-5e0012df2b38_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!ZUEn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89ead4a1-c3fd-487a-8574-5e0012df2b38_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!ZUEn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89ead4a1-c3fd-487a-8574-5e0012df2b38_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!ZUEn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89ead4a1-c3fd-487a-8574-5e0012df2b38_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ZUEn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89ead4a1-c3fd-487a-8574-5e0012df2b38_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/89ead4a1-c3fd-487a-8574-5e0012df2b38_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:505584,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195622248?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89ead4a1-c3fd-487a-8574-5e0012df2b38_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ZUEn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89ead4a1-c3fd-487a-8574-5e0012df2b38_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!ZUEn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89ead4a1-c3fd-487a-8574-5e0012df2b38_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!ZUEn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89ead4a1-c3fd-487a-8574-5e0012df2b38_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!ZUEn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89ead4a1-c3fd-487a-8574-5e0012df2b38_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Google's parent company, Alphabet, has announced plans to invest up to $40 billion in Anthropic, a developer of AI systems. This significant investment will begin with an initial $10 billion cash commitment, with the remaining $30 billion contingent on Anthropic meeting specific performance criteria. This move underscores the growing interest and competition in the AI sector as major tech companies seek to bolster their AI capabilities.<br><br>Anthropic, known for its Claude AI system, has been a focal point of investment activity in recent months. The company recently completed a Series G financing round in February, raising $30 billion and achieving a post-money valuation of $380 billion. This round of funding is intended to expand Anthropic's infrastructure across major cloud services, including Amazon Web Services, Microsoft Azure, and Google Cloud.<br><br>The AI sector is witnessing a surge in investments as companies like Amazon and Google compete for technological advancements. Amazon has also committed to investing up to $25 billion in Anthropic, with an initial $5 billion cash injection. These investments are contingent on Anthropic meeting certain commercial targets, reflecting a strategic approach to funding in the AI industry.<br><br>Anthropic's Claude Code system has gained widespread adoption within the developer community, contributing to a significant increase in the company's annual run-rate revenue. The company has also secured multi-year supply agreements with chip producer Broadcom and cloud infrastructure provider CoreWeave to support its growing demand for AI offerings.<br><br>For businesses and stakeholders in the AI and tech sectors, these developments signal a competitive push towards enhancing AI capabilities. Companies should stay informed about these investments and consider their potential impact on the market dynamics and technological advancements in AI and cloud services.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: hhttps://www.techmonitor.ai/news/google-eyes-40bn-anthropic-investment-starting-with-10bn-cash</p>]]></content:encoded></item></channel></rss>