Latest Internet & Cybersecurity News

đź“…April 18, 2026 at 1:00 AM
Global cybersecurity spending surges to $240B amid quantum threats, ransomware surges, major breaches in media and EU cloud, critical Windows patches, and rising AI-driven attacks.
1

Global Cybersecurity Spending to Hit $240 Billion in 2026

Gartner forecasts global cybersecurity spending reaching $240 billion in 2026, a 12.5% increase, driven by ransomware averaging $5.08 million per breach and AI-powered attacks.Source 1 Enterprises are rebuilding defenses against quantum threats with cryptographic overhauls urged by NIST.Source 1 IDC projects even higher spending at $308 billion, focusing on AI-driven platforms and zero trust.Source 1

2

Quantum 'Harvest Now, Decrypt Later' Attacks Top Concerns

87% of organizations rank quantum 'harvest now, decrypt later' attacks as a top worry, per Gigamon research, pushing cryptographic agility.Source 1 Quantum Secure Encryption launched QPA v2 to identify encryption vulnerabilities and provide fix plans.Source 1 Adversaries are already collecting encrypted data for future quantum decryption.Source 1

3

Epoch Times Hit by CoinbaseCartel Ransomware

Major US media outlet Epoch Times suffered a ransomware attack by 'CoinbaseCartel', locking down consumer databases.Source 2 The breach was detected recently, with data exfiltration extent still under assessment.Source 2 This highlights ongoing threats to media entities.Source 2

4

Massive 350 GB Data Theft from EU Commission's Cloud

350 GB of data stolen from the European Commission’s cloud infrastructure in Brussels, a significant blow to EU systems.Source 2 The breach compromises critical infrastructure that has been targeted for some time.Source 2 Investigations continue into the full impact.Source 2

5

Microsoft Patch Tuesday Reveals 165 Vulnerabilities

Microsoft's April 2026 Patch Tuesday addressed 165 vulnerabilities, eight critical, with CVE-2026-33824 actively exploited.Source 2 Users urged to update systems immediately to avoid risks.Source 2 This underscores ongoing Windows security challenges.Source 2

6

Ransomware Attacks on Automakers Double

Ransomware incidents targeting carmakers have doubled, raising alarms for smart vehicle security.Source 2 'Smart' cars are increasingly vulnerable in the expanding threat landscape.Source 2 Industry must enhance protections.Source 2

7

Iranian Hackers Active in Middle East Cyber Conflicts

While physical attacks between Iran and foes paused, Iranian hackers continue digital operations amid regional tensions.Source 3 This persists as bombs and missiles halt.Source 3 Cybersecurity remains a key battleground.Source 3

8

International Takedown of 53 DDoS Domains, 4 Arrests

Authorities from 21 countries dismantled 53 domains and arrested four suspects in DDoS operations used by over 75,000 cybercriminals.Source 3 Europol coordinated the effort.Source 3 This disrupts major cybercrime networks.Source 3

9

Starlink Outage Exposes US Navy Unmanned Vessel Vulnerability

A Starlink global outage halted US Navy unmanned surface vessels during a test, revealing single-point failure risks.Source 3 Communications disrupted for nearly an hour off California.Source 3 Affects military operations reliant on satellite networks.Source 3

10

Commvault and NetApp Announce Cyber Resilience Alliance

Commvault and NetApp launched an integrated data protection platform combining recovery with AI-driven ransomware detection.Source 1 Spans on-premises and cloud for immutable, recoverable data.Source 1 Enhances enterprise cyber resilience.Source 1

11

Exein Opens APAC Headquarters in Taipei

Embedded runtime cybersecurity leader Exein established its APAC HQ and Taipei office to expand in the region.Source 4 Focuses on global cybersecurity solutions.Source 4 Strengthens presence amid rising threats.Source 4

12

OpenAI Launches GPT-5.4 Cyber Model

OpenAI released GPT-5.4 Cyber, a specialized AI model advancing cybersecurity applications.Source 5 Part of rapid AI developments including agents SDK updates.Source 5 Impacts defensive AI strategies.Source 5