SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsAccording to Anthropic, their new Claude Mythos model discovered thousands of zero-day vulnerabilities across every major operating system and web browser, generating successful exploits in 72.4% of trials where previous frontier models sat at less than 1%. The conversation since has been heavy on alarm and light on practical guidance.
SANS faculty and staff have been building VulnOps workflows with current AI models for 15 months, finding critical flaws that human reviewers missed. Thursday, April 16 at noon ET, they are putting that experience on screen. Ed Skoudis covers what is real and what is hype. Chris Elgee demonstrates AI-assisted vulnerability discovery against real code using a model you can access right now. And Joshua Wright closes with what this means for your team and your role over the next 12 months.
No registration required. https://www.sans.org/mlp/sans-critical-advisory-bugbusters-ai-vulnerability-discovery-hype-vs-reality
On April 12, 2026, the Cloud Security Alliance published a briefing addressing AI-driven vulnerability discovery and offering strategic recommendations for CISOs. While this document responds to Anthropic's announcement of Mythos, authors Gadi Evron, Rich Mogull, and Rob T. Lee emphasize that implementing resilient architecture, internal vulnerability hunting, prompt incident response, and AI acceleration for security programs represents a "structural shift" beyond any one model or announcement. The paper's stated aim is to inform and equip "the CISO who needs to walk into a room Monday morning with a credible plan," including background and triage questions, a draft risk register, priority actions to update a security program, and talking points for briefing executives on AI risk. Contributing authors include Jen Easterly, Bruce Schneier, Chris Inglis, Rob Joyce, Heather Adkins, Joshua Saxe, Sounil Yu, John N. Stewart, Katie Moussouris, Dave Lewis, and Maxim Kovalsky, with review by another 250 CISOs and cyber practitioners.

"Never let a good crisis go to waste." Yes, there's a lot of fear and uncertainty right now, but there's also opportunity to do amazing work. Carve out some time to read the CSA paper and get in front of decision makers at your organization to offer guidance on shaping the future of your cybersecurity program.

We often talk about how important it is to treat "out of band" patches. When you get the brain power of the people involved in this paper to work together, we have a similar type of situation. If there is one thing you do this week to understand how the threat landscape is evolving, read this paper.

If Anthropic’s claims are true (and we are waiting for similar claims from OpenAI) then the entire game of cybersecurity is about to change. As others are suggesting, read the paper and then read other analyst’s opinions and recommendations. Your leadership will look to you for advice and guidance, be sure you have prepared yourself in advance to handle some difficult questions.
So far, this is about finding known classes of vulnerabilities faster, at greater scale, across vastly more targets. These known classes are in general represented in guides such as the CIS Community Defense Model and are the basis for CIS Critical Security Control selection. However, you cannot react fast enough to this coming flood, so the acceleration also underscores the need for preparation by putting security controls in place, ensuring that security is “turned on” before deployment, etc. Also, anecdotally, even if LLMs discover new classes of vulnerabilities, you still get significant value from “best practices” against types of attacks you did not know about beforehand. This is not surprising, since good practices limit movement, access, unauthorized changes, privilege abuse, etc.

Mythos’s ability to discover flaws is a capability we hope our software providers will leverage, particularly as the interval between flaw discovery and exploitation continues to shrink. This capacity raises the bar for protection of your AI, and you need to stay secure. The guidance from the CSA provides guidance for updating your risk register and supporting security program, and if nothing else, make sure that you haven’t missed current risks and mitigations.
Cloud Security Alliance
Qualys Threat Research Unit (TRU) has published analysis of four years' worth of vulnerability remediation records comprising over one billion entries from more than 10,000 organizations, concluding that "any architecture that depends on human-speed response carries structural risk," and contending that defenders must redesign remediation architecture accordingly. Between 2022 and 2025, the volume of "closed vulnerability events" addressing flaws published in the US Cybersecurity and Infrastructure Security Agency's Known Exploited Vulnerabilities catalog (CISA KEV) grew from 73 million to 473 million, a 650% increase. However, during that time the proportion of CISA KEV flaws still open seven days after disclosure rose from 56% to 63%. Qualys says this represents "the human ceiling," positing that no amount of effort nor workforce growth could realistically compensate for the volume of current threats. The first of the report's six sections highlights the limitations of manual remediation. The second section notes that the full time period from exploitation to full remediation, measured as Average Window of Exposure (AWE), was about 21 days for most organizations. The third section analyzes discrepancies between attacker speed and defender speed in 52 specific cases, emphasizing that "observing vulnerabilities is not the same as eliminating them." Section four defines a metric of "Risk Mass" to capture "the cumulative exposure an organization absorbed while [a] vulnerability remained open," calculated by multiplying the number of vulnerable assets by the number of days each remains exposed. Section five addresses the challenge of prioritizing remediation, especially understanding a flaw's actual exploitability given existing controls rather than merely its defined severity. The sixth and final section advocates for remediation that can scale up consistently without human intervention at every stage, namely a Risk Operations Center (ROC) "that fuses embedded intelligence, deterministic confirmation of actual exploitability, and autonomous remediation into a single operational loop."

The old saying "vendors can release patches but not apply them" rings very true, and as this report highlights, the scale of vulnerabilities and associated patches and workarounds is growing to a level that we will not be able to cope with using traditional vulnerability management techniques. Companies will need to start to look at auto-remediation solutions as part of their vulnerability management program and balance the risk of a vulnerability being exploited causing a breach versus an automated update causing an outage. In many cases, dealing with an outage may be preferable to dealing with a ransomware attack or a fine from a regulator.

I have been thinking that vulnerability scanning, patch management, and other ‘legacy’ mechanisms to protect an environment have been broken for a while. Here are my initial thoughts: There are too many vulnerabilities for a single company to track, let alone if you have 10,000 endpoints. Some companies have hundreds of thousands of vulnerabilities to patch. The problem with that statement is that of those hundreds of thousands of vulnerabilities, there is a small number of them with working exploit code in the wild. That is, until now. Now we have expert systems that can automate the creation of exploits to determine how real those vulnerabilities actually are. In a world where there is a machine doing this work, the only answer is to fight back with more machines. It will be a machine arms race. I will, however, note that this is the reality we are facing, and many companies are still grappling with the 101 of “what do we do and when?” We have a SANS Webcast around this on Thursday that I highly recommend you attend.

This issue is particularly relevant in light of Anthropic's Mythos. Mythos will discover more vulnerabilities earlier; it is likely to overwhelm any remediation strategy that relies on people. We must remediate at or near the rate of discovery. Also, we should keep in mind that there is an upper bound to the rate of change that any system can tolerate. There is always the potential for the solution to become the problem. While there are only hundreds of CVEs in the KEV, there are billions of instances of those vulnerabilities, many of which will never be remediated. No matter how quickly we patch, there will always be a window for attack and exploitation.
In the coming age of AI, the research states the obvious… humans are the weak link. The cybersecurity community must find a way to automate the patch management process. IOW, a machine-to-machine approach is needed. Without that, the game continues to favor the attacker.

The numbers show that we’re not only dealing with an ever-increasing number of vulnerabilities, but also falling behind as the number of flaws increases faster than our ability to address them. The takeaway is to make sure that you’re automating as much as possible for vulnerability management: detection, verification, analysis, application of updates, etc. Have a talk with your team about what manual processes remain, as well as where the automation isn’t helping. You may need new tools, but make sure you’ve looked at what’s already on hand.
Adobe has released updates to address a vulnerability in Adobe Acrobat Reader that has been exploited in the wild since late last year. The vulnerability, (CVE-2026-34621) is a critical arbitrary code execution issue that is due to improperly controlled modification of object prototype attributes, or prototype pollution. The vulnerability was initially noted by EXPMON founder and researcher Haifei Li, who published a blog about the issue after receiving a malicious PDF sample that was able to bypass sandbox restrictions and invoke privileged JavaScript APIs. Users are urged to update to the most recent version of Reader: Acrobat DC version 26.001.21411 or later; Acrobat Reader DC version 26.001.21411 or later; Acrobat 2024 version 24.001.30362 or later for Windows and 24.001.30360 or later for macOS.

This is the fix to the flaw we discussed last week in NewsBites Volume 28, Number 27, April 10. As Adobe treated this as an emergency fix, so should you. Make sure all your copies of Acrobat are updated. We now have both a CVE (CVSS score 8.6) and an update for current versions of Reader, Acrobat DC and Classic 24. If you’re running anything older, move to one of the updated/supported versions.
While the CVSS score is 8.6, don’t be lulled into not prioritizing the patch. Acrobat Reader is on pretty much everybody’s desktop, and users are accustomed to receiving and opening PDF attachments without much thought. Heed Adobe’s advice: update to the latest version of Reader now.
Help Net Security
BleepingComputer
The Hacker News
Adobe
NIST
Just Haifei
X
CPUID, a site that hosts software for monitoring PC hardware performance and data, experienced a supply chain compromise overnight from April 9 to April 10, 2026. For six hours or more, the links for downloading tools such as CPU-Z, HWMonitor, and PerfMonitor were changed to URLs that served trojanized software. According to Kaspersky, the files contained both a legitimate signed executable and a malicious DLL for sideloading the STX remote access trojan (RAT). CPUID confirmed via social media that a "side API" had been compromised, allowing the threat actor to redirect download links to malicious files, but stated that the original signed files themselves were not affected and the breach has been fixed. Breakglass Intelligence assesses that the compromise had actually been ongoing since April 3, and based on a common command-and-control (C2) IP among ten different malware samples, the researchers posit that this attack may be related to a trojanized FileZilla campaign from March 2026 and a malware sample called "superbad[.]exe" dating to July 2025.

The Breakglass Intelligence post includes the file and network IoCs you’re looking for. So, make sure you’ve got the known good versions of CPUID as well as no traces of shenanigans.

CPUID breach was a big bad. Lots of Windows Machines, especially those at home labs run by professional and semi-professional IT people, were hit by this. It was a “putty-level” event. Unsure what the fallout is yet, but it seems that we will find out in the next few weeks.
Breakglass
BleepingComputer
The Hacker News
SecurityWeek
The Register
A proposed class-action lawsuit filed in federal court in California alleges that healthcare practitioners at Sutter Health and MemorialCare used an AI transcription tool to record conversations between patients and healthcare providers without patients' consent. According to the complaint, over the past six months, staff at the Sutter Health and MemorialCare facilities "captured and processed [plaintiffs'] confidential physician-patient communications. Plaintiffs did not receive clear notice that their medical conversations would be recorded by an artificial intelligence platform, transmitted outside the clinical setting, or processed through third-party systems." Abridge AI is what is sometimes called an "ambient clinical documentation" system; it uses microphone-enabled devices to record conversations, then transcribes those conversations and creates clinical notes. The Abridge AI software allegedly transmits the recordings to external servers for transcription and summary.

Two things here: First, always have consent before recording (and recourse for a ‘no’ answer). There are too many privacy and data protection requirements to assume it’s not required. Second, be clear where those recordings are stored and analyzed/transcribed. In this instance they were not only missing consent, but processing PHI, which requires certification, business partner agreements, and appropriate security measures. Beware of technology outpacing regulatory requirements. AI transcription and summarization of content is really common and helpful, but are the required controls in place, or is that left as an exercise for the user?

Since even most California privacy laws only require opt-out be offered (vs. be the default unless explicit opt-in) odds are high that some existing clause covers this. But it would be good to get some case law precedent on the books defining what is required for “ambient eavesdropping” use, both in obtaining permission and in assuring the accuracy of the output.

This case highlights the growing concerns around the use of AI in sensitive environments such as healthcare. From a European perspective, this would most likely be illegal under the EU GDPR, particularly around consent, transparency, and data processing. The saying "Europe regulates while the world innovates" is often bandied about in a derogatory way, but this is a good example of why strong regulation is needed to ensure technology is not employed to abuse the human rights of individuals.
I’m of two minds on this lawsuit. Sure, the patient should have been notified that a transcription service was being employed, but that’s the reality we live in today: notification typically after the fact. The result will be something akin to a consent banner on a digital device, or on the wall, or as a form that is signed and filed. Did we really move the cybersecurity needle forward?

With the number of two-party consent states and the number of AI transcription devices I am seeing, I was curious to see what would happen in this scenario. Considering how many devices are wearables (looking at you, Ray-Ban glasses) and how many places they are used that are not public, how many of these lawsuits are just waiting to happen? If you are a company of any size, you may want to consider how to protect yourself in the event of these types of lawsuits. Do you use AI transcription services for anything? Are people aware? This will be as much policy as it is legal adjustments. One to watch for sure.
The US Federal Bureau of Investigation, along with law enforcement authorities in Indonesia, has dismantled a phishing operation that stole account credentials and attempted to conduct more than $42 million in fraudulent transactions. The scheme involved the use of a phishing kit known as W3LL, which provided criminals with the means of creating lookalike websites to trick users into divulging account credentials. According to a press release, "FBI Atlanta, with assistance from the U.S. Attorney’s Office for the Northern District of Georgia, identified and seized infrastructure facilitating the phishing service. In coordination with the Indonesian National Police, authorities detained the alleged developer, G.L, and seized key domains tied to the operation."

The issue is reusable credentials. As long as we continue to use them, they will be exploited. That there is a market for them suggests that they continue to be widely used. Use of reusable credentials in almost any application is risky; in financial transactions it is reckless. Resistance to strong authentication may be rooted in the false belief that it is inconvenient. Get over it.

The W3LLSTORE, which was used for selling and exchanging captured credentials from the W3LL phishing-as-a-service system was shut down in 2023, but attackers switched to private messaging services instead. This action, a first ever partnership between the FBI and Indonesia law enforcement, takes out the remaining service, which was a sophisticated phishing ecosystem, had an entry price of only $500, and was found to be connected to more than 850 campaigns.
Leveraging a website 'watering hole’ whether legitimate or lookalike is just table stakes with credential harvesting. Glad that law enforcement shut this operation down, but unfortunately, others will pop up quickly after.
Infosecurity Magazine
The Record
The Hacker News
FBI
Video game publisher Rockstar has confirmed that the company experienced a data breach through third-party anomaly detection and analytics provider Anodot. Anodot began experiencing disruptions to Snowflake Streams on April 4, which Snowflake confirmed was an intentional lockdown of Anodot accounts due to unusual activity. Neither Anodot nor Snowflake has confirmed a threat actor's allegations that the breach was carried out using stolen authentication tokens. Rockstar stated to news sources, "We can confirm that a limited amount of non-material company information was accessed in connection with a third-party data breach. This incident has no impact on our organization or our players." Rockstar is the only company among Anodot's clients to confirm any impact from the breach at the time of this writing.

This story highlights that criminals are increasingly targeting the supply chain, and organisations need to better manage the cyber risks in their supply chain. Indeed, under the EU NIS2 and DORA regulations this is now becoming a requirement for all regulated entities. Soon no matter where you are in the supply chain you will be required to demonstrate you are managing cyber security risk in your organisations.

Snowflake is a powerful data lake, but you need to secure it properly. Snowflake has implemented services that detect and respond to anomalous activity, but you really need to get the basics right first. Start with phishing-resistant authentication.
The Register
BleepingComputer
BleepingComputer
TechCrunch
The Record
Google has announced that end-to-end encryption (E2EE) integrated into Gmail is now available for Enterprise users on all Android and iOS devices. This feature relies on client-side encryption (CSE) and will allow users to send encrypted messages to any recipient, regardless of that recipient's email address. Gmail recipients will receive an encrypted message normally via inbox, and non-Gmail recipients will view and reply to the message in a browser. Users must have an Enterprise Plus license for Google Workspace with Assured Controls or Assured Controls Plus, and the feature must be enabled in the CSE admin interface.

Seriously consider implementing E2EE for your email system, regardless of provider. Verify users outside your tenant are sent a link to a website for decryption. Then teach users to encrypt sensitive information always. This is a culture change, so you want to test and develop plans which move from suggested to required use. Leverage testers in as many business units as you can. Make sure you understand who can decrypt these messages, and how that control is managed.

Enterprise users of Exchange and Gmail have a straightforward path to turning on end-to-end encryption, within the bounds of their enterprise licensing and directory. But even within those boundaries, it takes a lot of workflow testing to find out what breaks when objects are persistently encrypted.
OpenAI has published a security advisory announcing that the company is revoking and rotating their macOS app signing certificate due to concerns following the Axios supply chain attack. On March 31, 2026, a GitHub Actions workflow with "access to a certificate and notarization material used for signing macOS applications, including ChatGPT Desktop, Codex, Codex-cli, and Atlas," downloaded and executed a malicious version of Axios (1.14.1). All macOS users of these OpenAI apps should update to the latest versions. In response to the incident, the company "engaged a third-party digital forensics and incident response firm, rotated [their] macOS code signing certificate, published new builds of all relevant macOS products with the new certificate, and are working with Apple to ensure software signed with the previous certificate cannot be newly notarized." No evidence of fraudulent software notarization, modifications to published software, nor compromise or risk to existing software installations has been observed. While a new certificate has been issued, the old one will not be fully revoked until May 8 "to minimize disruption" during remediation; new software signed with the old certificate will be blocked by macOS security unless bypassed manually, and after May 8 "new downloads and launches of apps signed with the previous certificate will be blocked by macOS security protections."

Verify your installed OpenAI apps are signed with the new certificate; update those which aren’t. As the old certificate will not be revoked until May 8, the older flawed macOS versions could still be running.

For signing certificates to be more than just eyewash, revocation checking (and off-schedule rotation) has to become standard operating procedure.

It should not be necessary to say that certificates do not sign; private keys sign. Certificates are meta-data about the key.
Travel platform Booking.com has begun informing customers that their reservation details may have been accessed by intruders. The compromised data include names, contact information, reservation information, and messages exchanged with hotels or other accommodations through the Booking.com platform. Booking.com says it has contained the issue and reset users' PINs. European fitness chain Basic-Fit has disclosed that an intruder accessed the system that tracks gym members' visits and downloaded some members' personal data. The compromised information includes names, physical addresses, email addresses, phone numbers, dates of birth, bank account information, and other membership data. In all, Basic-Fit estimates that the incident affected one million individuals in Belgium, France, Germany, Luxembourg, the Netherlands, and Spain. The incident was detected on Monday, April 13, and Basic-Fit has notified affected individuals by email.

The big deal here is that the stolen data will be used to craft legitimate looking messages regarding travel plans, with the intent to extort money or shore up identity theft activities. Triple check messages regarding your travel plans for legitimacy, validating with a known good number for the referenced business, and make sure the information used with booking.com is included in your identity protection profile. It’s a good excuse to make sure the monitored information is both accurate and complete.
The Register
SecurityWeek
BleepingComputer
The Record
Heise
The Register
Basic-Fit
SANS Internet Storm Center StormCast Tuesday, April 14, 2026
EncystPHP Webshell; CPUID Compromise; OpenAI Mac Cert Issue; Axios Vulnerability
https://isc.sans.edu/podcastdetail/9890
Scans for EncystPHP Webshell
https://isc.sans.edu/diary/Scans+for+EncystPHP+Webshell/32892
CPUID Compromise
https://x.com/d0cTB/status/2042520961824559150
OpenAI Mac Application Update due to Axios Compromise
https://openai.com/index/axios-developer-tool-compromise/
Axios Vulnerability CVE-2026-40175
https://github.com/axios/axios/security/advisories/GHSA-fvcv-3m26-pcqx
SANS Internet Storm Center StormCast Monday, April 13, 2026
Obfuscated JavaScript; Numbers in Passwords; Adobe Patches 0-Day; ClickFix Fix Bypass
https://isc.sans.edu/podcastdetail/9888
Obfuscated JavaScript or Nothing
https://isc.sans.edu/diary/Obfuscated+JavaScript+or+Nothing/32884
Numbers in Passwords
https://isc.sans.edu/diary/Number+Usage+in+Passwords+Take+Two/32866
Adobe 0-Day Patch CVE-2026-34621
https://helpx.adobe.com/security/products/acrobat/apsb26-43.html
ClickFix Bypass via ScriptEditor
https://www.jamf.com/blog/clickfix-macos-script-editor-atomic-stealer/
Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.
The Gartner® Magic Quadrant™ is one of the most trusted benchmarks in tech. Optro (formerly AuditBoard) has been named a Leader in the 2026 Gartner® Magic Quadrant™ for Third-Party Risk Management Tools for Assurance Leaders and placed furthest to the right on Completeness of Vision. This recognition comes just months after Optro was named a Leader in the 2025 Magic Quadrant™ for GRC Tools, Assurance Leaders.
Exposure Management Track at Spring Cyber Solutions Fest 2026 | Thursday, May 7 at 10:00 AM ET with chair Jonathan Risto
Webinar | Agentic Exploitation: Why Threat Feeds are the New Critical Business Vulnerability | Tuesday, April 28 at 1:00 PM ET
Webinar | What's Working & What's Ahead in Cyber Defense | Thursday, April 30, 2026 at 8:30 AM