This article explores how Mythos‑class models are reshaping expectations for cyber programs and pressuring today’s vulnerability‑sharing frameworks. It also outlines actions CISOs, GCs, and boards should consider as AI accelerates vulnerability discovery and exploitation.
tinyurl.com/3n4zfmjj
#vulns
Posts by Cyber Threat Alliance
CTA Member @mcafee.com notes that cloud storage scams are making headlines again:
www.mcafee.com/blogs/securi...
#cybersecurity #scams #cloudsecurity
CTA member @extrahop.bsky.social notes 'Enterprises are rushing to deploy AI agents for cybersecurity. But a fundamental flaw in how these systems handle memory is quietly undermining their defenses'...
www.extrahop.com/blog/why-ai-...
CTA member Check Point research shows a long‑standing trend: attackers consistently exploit highly trusted brands to steal credentials and gain initial access to personal and enterprise environments.
blog.checkpoint.com/research/the...
#phishing #cybersecurity #threatintellignece #cyberesearch
CTA Member SOCRadar on the three Windows Defender vulnerabilities disclosed as zero-days that are being actively exploited: BlueHammer, RedSun, and UnDefend.
socradar.io/blog/blueham...
#cybersecurity #threatintelligence #0day #vulnerabilities
Our 2025 Year in Review is live. Data sharing soared. Engagement deepened. Our member and partner community grew stronger. And our voice in #cybersecurity news and thought leadership reached new heights.
This is what collective defense looks like in action.
tinyurl.com/mr255wvp
#strongertogether
Tomorrow - April 15th! Register:
www.cybernextconference.org
We convene policymakers and #cybersecurity leaders to unpack the trends driving the global cybersecurity agenda, from EU competitiveness & digital sovereignty to quantum readiness & evolving international partnerships
#cyberpolicy
CTA member OneFirewall says that "joining @cyberalliance.bsky.social was one of the better decisions we've made. Not because it's a magic bullet—there isn't one—but because it fundamentally changed what we can see and how fast we can act on it"
tinyurl.com/exwe5v84
#cybersecurity #strongertogether
Join us April 15th for CyberNext Brussels!
We bring together policymakers and cybersecurity leaders to assess the forces shaping the global agenda.
Register and agenda:
www.cybernextconference.org
@cyberalliance.bsky.social
@cybercoalition.bsky.social
#cyberpolicy #cybersecurity
CTA Member @silentpush.bsky.social blog on tool sprawl challenges:
www.silentpush.com/blog/pivot-p...
#cybersecurity
CTA Member @reversinglabs.com on a fake recruiter campaign:
www.reversinglabs.com/blog/graphal...
#cybersecurity #scam #fakerecruiter
CTA Member @Lumu on Remcos RAT
lumu.io/blog/remcos-...
#cybersecurity #RAT
CTA Member CyberCX on Shadow AI:
cybercx.com.au/blog/shadow-...
#cybersecurity #Cyber #AI #ShadowAI
CTA member @symantec.bsky.social
This activity began in early February and has continued in recent days. What organizations should expect next from Iran-aligned groups and the steps they should take to guard against cyberattacks.
www.security.com/threat-intel...
#cybersecurity #cyberattacks
From CTA member @nozominetworks.bsky.social
www.nozominetworks.com/blog/these-i...
#cybersecurity #OT #CriticalInfrastructure #CISA
CTA member Check Point March Threat Report
672 ransomware attacks were reported globally. This represents an 8% decrease yoy, yet a 7% increase compared to February, indicating renewed attacker momentum following short-term declines earlier in the qtr
More stats:
blog.checkpoint.com/research/mar...
“By decreasing spending on cybersecurity at a time when the threats in #cybersecurity are accelerating, from both nation-state adversaries and criminal organizations, you’re choosing to increase the nation’s risk,” @cyallianceprez.bsky.social
www.csoonline.com/article/4156...
#CISA #cyberpolicy
Join us April 15th for CyberNext Brussels!
We bring together policymakers and cybersecurity leaders to assess the forces shaping the global agenda. .
Register and agenda:
www.cybernextconference.org
@cyberalliance.bsky.social @cybercoalition.bsky.social
VB2026 CFP closing now - last chance to submit (deadline April 9). VB2026 Seville 14-16 October.
The VB2026 Call for Papers closes in just 2 days.
If you have insights, research or real-world experiences to share with the security community, this is your last chance to submit your proposal for VB2026 Seville 🎤
Deadline: 9 April 2026
Click for more info ➡️ www.virusbulletin.com/conference/v...
Now On-Demand: Shaken and Stirred: Geopolitics and Cybersecurity
Panelists explored how fast‑shifting geopolitics & technology are turning #cybersecurity from a standalone technical field into a core element of national resilience, military operations, and information influence
tinyurl.com/mr43d4w6
CyberNext Brussels is April 15th
We unite policymakers and cybersecurity leaders to examine key trends—from EU competitiveness and digital sovereignty to quantum and changing geopolitical partnerships—shaping today’s global cybersecurity landscape.
Register www.cybernextconference.org
#cybersecurity
Starting soon! 9 am ET
us06web.zoom.us/webinar/regi...
#cybersecurity #webinar #geopolitics
CTA Member Check Point on how cyber criminals are preparing their attacks months in advance
blog.checkpoint.com/research/tax...
#cybersecurity #scams
Join us Monday, April 6th at 9 am EDT for CTA Webinar: Shaken and Stirred: Geopolitics and Cybersecurity in 2026. Panelists will discuss how geopolitical turmoil is reshaping #cybersecurity assumptions and how fragmentation is influencing our path forward
Register: tinyurl.com/ycxf6um4
#geopolitics
New research from @rapid7.com Labs has uncovered undocumented features leading to the discovery of 7 new BPFDoor variants: a stealthy kernel-level backdoor that uses Berkeley Packet Filters (BPFs) to inspect traffic from right inside the operating system kernel.
www.rapid7.com/blog/post/ne...
Have you registered?
Join us Monday, April 6th at 9 am ET
Shaken and Stirred: Geopolitics and Cybersecurity in 2026.
Panelists will discuss how geopolitical turmoil is reshaping #cybersecurity assumptions and how fragmentation is influencing our path forward
Register: tinyurl.com/43a22327
Cyber resilience isn’t built by technology alone—it grows when we invest in the people behind it. “Give to Gain” shows how empowering women across cybersecurity strengthens readiness, response, and long‑term stability.
www.youtube.com/watch?v=ICvR...
#cybersecurity #investinwomen #cyberresilience
Big news: Motorola Solutions has joined @cyberalliance.bsky.social!
As a global leader in mission‑critical safety and security tech, Motorola brings powerful new perspectives to our shared fight against cyber threats.
Stronger together!
#cybersecurity #threatintel #publicsafety
tinyurl.com/4h5krn3m
CTA member Penta Security:
“Orgs must stop viewing #ransomware as a technical issue and start treating it as a profit‑driven criminal business…the goal isn’t preventing every attack, but making attacks as unprofitable as possible.”
tinyurl.com/59umvj49
CTA member @mcafee.com's research team identified an Android rootkit campaign tracked as Operation Novoice.
www.mcafee.com/blogs/other-...
#cybersecurity #android #rootkit