Microsoft: April updates trigger BitLocker key prompts on some serversMicrosoft confirmed on Tuesday that some Windows Server 2025 devices will boot into BitLocker recovery after installing the April 2026 KB5082063 Windows security update. BitLocker is a Windows security feature that encrypts storage drives to prevent ...Apr 15, 2026·2 min read·20
The silent “Storm”: New infostealer hijacks sessions, decrypts server-side* A new infostealer called Storm appeared on underground cybercrime networks in early 2026, representing a shift in how credential theft is developing. For under $1,000 a month, operators get a stealer that harvests browser credentials, session cooki...Apr 13, 2026·4 min read·1
Over 20,000 crypto fraud victims identified in international crackdownAn international law enforcement action led by the U.K.'s National Crime Agency (NCA) has identified over 20,000 victims of cryptocurrency fraud across Canada, the United Kingdom, and the United States. Dubbed "Operation Atlantic," this joint action ...Apr 12, 2026·2 min read·1
Nearly 4,000 US industrial devices exposed to Iranian cyberattacksThe attack surface targeted by Iranian-linked hackers in cyberattacks against U.S. critical infrastructure networks includes thousands of Internet-exposed programmable logic controllers (PLCs) manufactured by Rockwell Automation. According to a issu...Apr 11, 2026·2 min read·4
ChatGPT rolls out new $100 Pro subscription to challenge ClaudeOpenAI has rolled out a new Pro subscription that costs $100 and is in line with Claude's pricing, which also has a $100 subscription, in addition to the $200 Max monthly plan. Until now, OpenAI has offered three subscription tiers. First is Go, whic...Apr 11, 2026·2 min read·1
Supply chain attack at CPUID pushes malware with CPU-Z/HWMonitorHackers gained access to an API for the CPUID project and changed the download links on the official website to serve malicious executables for the popular CPU-Z and HWMonitor tools. The two utilities have millions of users who rely on them for track...Apr 10, 2026·3 min read·34
Analysis of one billion CISA KEV remediation records exposes limits of human-scale security* Author: Saeed Abbasi, Senior Manager, Threat Research Unit, Qualys With Time-to-Exploit now at negative seven days and autonomous AI agents accelerating threats, the data no longer supports incremental improvement. The architecture of defense must ...Apr 10, 2026·6 min read·2