Cleartext

Cleartext โ€“ April 27, 2026


Listen Later

Cleartext โ€“ April 27, 2026

Daily cybersecurity briefing for CISOs and security leaders.

๐ŸŽง Listen to this episode

Episode Summary

Today's episode covers 8 stories across 6 topic areas, including: Risky Bulletin: New fingerprinting technique can track Tor users; Researchers Identify Fast16 Sabotage Malware That Pre-Dates Stuxnet; Mythos Changed the Math on Vulnerability Discovery. Most Teams Aren't Ready for the Remediation Side.

Stories Covered
๐ŸŒ Geopolitical
Risky Bulletin: New fingerprinting technique can track Tor users

Risky Business News ยท Apr 27 ยท Relevance: โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–‘โ–‘โ–‘ 7/10

Why it matters to CISOs: This roundup covers multiple geopolitically significant items: a new Tor de-anonymization technique, Intellexa's US exploit supply chain ties, US accusations of Chinese AI theft, and expanded US router bans โ€” all of which inform threat modeling and supply chain risk for enterprise security leaders.

  • A new fingerprinting technique can track Tor users, undermining anonymity assumptions
  • Intellexa reportedly had an American exploit provider, raising supply chain concerns
  • US router ban scope expanded to cover WiFi hotspots
  • ๐Ÿ“– Read full article

    Researchers Identify Fast16 Sabotage Malware That Pre-Dates Stuxnet

    Infosecurity Magazine ยท Apr 27 ยท Relevance: โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–‘โ–‘โ–‘โ–‘ 6/10

    Why it matters to CISOs: The discovery of ICS sabotage malware predating Stuxnet underscores how long nation-state actors have targeted industrial control systems โ€” relevant context for CISOs defending OT environments and assessing long-dwell-time threats.

    • Newly identified 'fast16' malware may have targeted Iran's nuclear program before Stuxnet
    • Discovery rewrites the timeline of nation-state ICS/OT cyber operations
    • Highlights the long history and sophistication of state-sponsored industrial sabotage
    • ๐Ÿ“– Read full article

      ๐Ÿ“ก Macro Trends
      Mythos Changed the Math on Vulnerability Discovery. Most Teams Aren't Ready for the Remediation Side

      The Hacker News ยท Apr 27 ยท Relevance: โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–‘โ–‘ 8/10

      Why it matters to CISOs: Anthropic's Claude Mythos Preview is fundamentally changing the volume and speed of vulnerability discovery, creating an asymmetric remediation burden that CISOs must plan for โ€” teams need to rethink prioritization workflows, SLAs, and staffing models now.

      • Anthropic's Claude Mythos Preview can identify vulnerabilities at scale using AI
      • The core challenge has shifted from discovery to remediation capacity
      • Most security teams lack the processes and resources to handle the volume of findings AI-driven discovery generates
      • ๐Ÿ“– Read full article

        Most Cybersecurity Professionals Feel Undervalued and Underpaid

        Infosecurity Magazine ยท Apr 27 ยท Relevance: โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–‘โ–‘โ–‘โ–‘ 6/10

        Why it matters to CISOs: With 75% of cybersecurity staff pessimistic on pay and half actively job hunting, CISOs face acute retention risk โ€” this data is critical for workforce planning conversations with HR and the board.

        • Harvey Nash report found 75% of cybersecurity staff are pessimistic about pay
        • Half of cybersecurity professionals surveyed are looking for a new job
        • Talent retention is becoming a top operational risk for security programs
        • ๐Ÿ“– Read full article

          ๐Ÿ”“ Data Breach
          Critical infrastructure giant Itron says it was hacked

          TechCrunch Security ยท Apr 27 ยท Relevance: โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–‘โ–‘ 8/10

          Why it matters to CISOs: Itron serves hundreds of millions of homes and businesses with water/energy monitoring infrastructure โ€” a breach here has potential cascading effects on critical infrastructure supply chains and raises questions about OT/IT segmentation for any utility CISO or CISO with critical infrastructure dependencies.

          • Itron provides water and energy monitoring and utility meters to hundreds of millions of homes and businesses
          • The company disclosed the breach via an SEC 8-K filing, indicating unauthorized third-party access to internal systems
          • The breach affects a major critical infrastructure technology provider
          • ๐Ÿ“– Read full article

            โš–๏ธ Governance & Policy
            Poor Risk Analysis Cost 4 Firms $1.7 Million in HIPAA Fines

            BankInfoSecurity ยท Apr 27 ยท Relevance: โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–‘โ–‘โ–‘ 7/10

            Why it matters to CISOs: HHS OCR continues to enforce heavily on inadequate risk analysis โ€” the single most common HIPAA violation. CISOs in healthcare and adjacent industries should use this as ammunition to secure investment in formal risk assessment programs and documentation.

            • Four organizations fined a collective $1.7M for faulty or non-existent security risk analyses
            • Fines followed federal investigations into ransomware attacks
            • Affected entities include a medical imaging provider, women's healthcare group, health plan, and third-party insurance administrator
            • ๐Ÿ“– Read full article

              ๐Ÿš€ Startup Ecosystem
              Why Cisco Is Eyeing Buy of Non-Human Identity Startup Astrix

              BankInfoSecurity ยท Apr 27 ยท Relevance: โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–‘โ–‘ 8/10

              Why it matters to CISOs: Non-human identity management is a fast-growing blind spot for enterprises; a $250M-$350M Cisco acquisition of Astrix would signal market validation and likely reshape how NHI is bundled into enterprise security stacks, affecting procurement and architecture decisions.

              • Cisco reportedly in talks to acquire non-human identity startup Astrix Security for $250M-$350M
              • Astrix was last valued at approximately $200M, so the deal represents at least a 25% premium
              • The acquisition would expand Cisco's identity security portfolio beyond authentication, ITDR, and ISPM
              • ๐Ÿ“– Read full article

                ๐Ÿšจ Critical Vulnerability
                Researchers Uncover 73 Fake VS Code Extensions Delivering GlassWorm v2 Malware

                The Hacker News ยท Apr 27 ยท Relevance: โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–‘โ–‘โ–‘ 7/10

                Why it matters to CISOs: Software supply chain attacks via developer tooling represent a serious enterprise risk โ€” 73 malicious VS Code extensions targeting developers could compromise source code and CI/CD pipelines, and CISOs should ensure extension governance policies are in place.

                • 73 fake VS Code extensions discovered on the Open VSX repository linked to 'GlassWorm' info-stealing campaign
                • Extensions are cloned versions of legitimate counterparts; six confirmed malicious
                • The campaign targets developers, potentially compromising development environments and supply chains
                • ๐Ÿ“– Read full article

                  Further Reading
                  • ๐ŸŒ Risky Bulletin: New fingerprinting technique can track Tor users โ€” Risky Business News
                  • ๐ŸŒ Researchers Identify Fast16 Sabotage Malware That Pre-Dates Stuxnet โ€” Infosecurity Magazine
                  • ๐Ÿ“ก Mythos Changed the Math on Vulnerability Discovery. Most Teams Aren't Ready for the Remediation Side โ€” The Hacker News
                  • ๐Ÿ“ก Most Cybersecurity Professionals Feel Undervalued and Underpaid โ€” Infosecurity Magazine
                  • ๐Ÿ”“ Critical infrastructure giant Itron says it was hacked โ€” TechCrunch Security
                  • โš–๏ธ Poor Risk Analysis Cost 4 Firms $1.7 Million in HIPAA Fines โ€” BankInfoSecurity
                  • ๐Ÿš€ Why Cisco Is Eyeing Buy of Non-Human Identity Startup Astrix โ€” BankInfoSecurity
                  • ๐Ÿšจ Researchers Uncover 73 Fake VS Code Extensions Delivering GlassWorm v2 Malware โ€” The Hacker News
                  • Full Transcript
                    Click to expand full episode transcript

                    Jordan: A critical infrastructure company serving hundreds of millions of homes just filed an 8-K disclosing it was hacked. That's not a threat model exercise. That's Monday morning.

                    Alex: Welcome to Cleartext. I'm Alex Chen.

                    Jordan: And I'm Jordan Reeves.

                    Alex: It's Monday, April 27th, 2026, and we have a dense one today. The Itron breach, the AI vulnerability discovery gap that's about to break most security teams, new research rewriting the history of nation-state OT attacks, a Cisco acquisition that tells you where identity security is headed, HIPAA fines that should be on your CFO's desk, and a developer supply chain campaign that flew under the radar for too long. Let's get into it.

                    Jordan: So Itron. For anyone who doesn't immediately recognize the name โ€” this is the company behind the smart meters and monitoring infrastructure in water and energy utilities across hundreds of millions of homes and businesses. They disclosed unauthorized third-party access to internal systems via an SEC 8-K filing over the weekend. No confirmed operational disruption yet, but the filing itself tells you the legal team assessed this as material.

                    Alex: And that's the first thing I'd flag for anyone listening. The 8-K trigger. Itron made a judgment call that this clears the materiality bar under the SEC's incident disclosure rules. That's not a technicality โ€” that's a signal. If you're a CISO at a utility, at a municipality, or at any organization with Itron in your supply chain, your question this week is: what data, what credentials, what network access did Itron hold that touches your environment?

                    Jordan: The IT/OT segmentation question is real here. Itron sits at the seam between enterprise IT and operational infrastructure. A breach of their internal systems doesn't automatically mean meter networks are compromised, but the attack surface for lateral movement into customer environments is worth mapping right now. Don't wait for Itron's investigation to conclude.

                    Alex: Agreed. Vendor notification letters are coming โ€” eventually. Don't let that be your trigger to start the assessment.

                    Jordan: Let's move to the research that rewrites history a little. Security researchers have identified a piece of malware called Fast16 that appears to predate Stuxnet and may have been used to target Iran's nuclear program. If that's confirmed, it pushes the start date of nation-state ICS sabotage operations back meaningfully โ€” we're talking about a timeline that predates what most people treat as the origin point of this category of threat.

                    Alex: The strategic implication here isn't historical curiosity. It's that nation-state actors have been developing and deploying ICS-targeted capabilities for longer than most OT security programs have even existed. If you're defending industrial infrastructure and your threat model starts at Stuxnet, you're already behind the curve on dwell time assumptions, detection gaps, and the sophistication of what's already potentially in your environment.

                    Jordan: Exactly. Fast16 is a reminder that these programs have institutional memory. They iterate. They go dormant. And the teams defending critical infrastructure need to assume adversary capabilities that are significantly older and more patient than the incident reports suggest.

                    Alex: Now let's talk about something that I think is the most strategically significant story of the week, even though it reads like a product news item. Anthropic's Claude Mythos Preview has been live for about three weeks, and the security community has been wrestling with what it actually means in practice. The headline from The Hacker News today is blunt: Mythos changed the math on vulnerability discovery, and most teams aren't ready for the remediation side.

                    Jordan: This is the asymmetry problem. AI-driven discovery at scale means the front end of the vulnerability management pipeline just got dramatically more productive. That sounds good until you realize your remediation capacity โ€” the developers, the patch processes, the SLAs, the prioritization workflows โ€” hasn't changed. You've widened the intake valve without touching the drain.

                    Alex: I've been thinking about this as a debt acceleration problem. Most organizations are already carrying remediation backlogs they can't close. Mythos-class tooling doesn't solve that โ€” it accelerates the accumulation. And when your board asks you about vulnerability exposure, you're going to have a much harder time explaining why you have ten times the findings and the same closure rate.

                    Jordan: The teams that get ahead of this are the ones having the resource conversation now. Not after they've run the tool, generated three thousand findings, and watched their SLA compliance crater. The question to take to your CISO peers: what does your prioritization model look like when discovery volume doubles or triples? If the answer is "we'll triage harder," that's not an answer.

                    Alex: Related to that talent conversation โ€” Harvey Nash dropped a workforce survey today that every CISO should print out and bring to their next HR meeting. Seventy-five percent of cybersecurity staff are pessimistic about pay. Half are actively job hunting. Half.

                    Jordan: And that's not a surprise if you've been paying attention, but the timing is brutal. You've got AI tools creating more work, not less. You've got an expanding attack surface. And you're trying to retain the people who actually know where the bodies are buried in your environment โ€” which is irreplaceable institutional knowledge โ€” while competing against companies that are paying significantly above market.

                    Alex: This is a board conversation. Not an HR conversation. If half your security team is interviewing elsewhere, that is an operational risk that belongs in your risk register. Frame it that way.

                    Jordan: A few items worth moving through at speed. First: HHS OCR just handed out $1.7 million in HIPAA fines across four organizations โ€” a medical imaging provider, a women's healthcare group, a health plan, and a third-party insurance administrator. The violation in every case: inadequate or nonexistent security risk analysis.

                    Alex: OCR has been beating this drum for years. Risk analysis failures are the single most cited HIPAA violation, and regulators keep finding the same gap after every ransomware investigation. If you're in healthcare or adjacent to it, this is your documentation audit moment. The fine isn't the real cost โ€” it's that OCR found ransomware AND no defensible risk analysis. That combination is what escalates from fine to consent decree.

                    Jordan: On the supply chain front โ€” researchers uncovered 73 fake VS Code extensions on the Open VSX repository tied to an infostealing campaign called GlassWorm. Six confirmed malicious, the rest acting as sleepers or decoys. These are cloned versions of legitimate extensions. Developers install them thinking they're getting the real thing.

                    Alex: Developer tooling as an attack vector is not new, but the scale here matters. VS Code is everywhere. If you don't have an extension governance policy โ€” an approved list, enforcement at the IDE level, monitoring for unapproved installs โ€” this is a gap that could put source code and CI/CD credentials at risk. Your dev teams are a high-value target. Treat their environments accordingly.

                    Jordan: Now for the acquisition story. Cisco is reportedly in talks to acquire Astrix Security โ€” a non-human identity startup โ€” for somewhere between two-fifty and three-fifty million. That's a meaningful premium on their last valuation.

                    Alex: Non-human identities โ€” service accounts, API keys, OAuth tokens, machine credentials โ€” are the identity management problem most organizations have barely started solving. The ratio of non-human to human identities in a typical enterprise is now somewhere between ten-to-one and fifty-to-one depending on how cloud-native you are. If Cisco closes this deal, it signals that NHI is graduating from niche product category to core platform feature. Watch how this affects your Cisco negotiations and your identity architecture roadmap.

                    Jordan: And briefly on the Risky Business roundup from today โ€” two items worth flagging. First, there's a new fingerprinting technique that can de-anonymize Tor users. For most enterprise CISOs this is background noise, but for anyone with threat intelligence operations or staff using anonymization infrastructure for sensitive research, that anonymity assumption just got weaker. Second, the US router ban has been expanded to include WiFi hotspots. That's supply chain hygiene at the network edge โ€” worth a review of what's deployed in remote offices and field locations.

                    Alex: So what's the theme coming out of today? I think it's capacity. Every major story this week is a capacity problem in disguise. Itron is about the capacity of critical infrastructure vendors to secure their own environments. Mythos is about the capacity of security teams to remediate what AI discovers. The workforce data is about the capacity of organizations to retain the people doing the work. The HIPAA fines are about the capacity โ€” or failure โ€” to document risk analysis properly.

                    Jordan: The adversaries are scaling. The tools are scaling. The regulatory expectations are scaling. The question every CISO should be asking this week is: what's my actual throughput? Not what's my posture on paper โ€” what can my team actually process, validate, and close in a given sprint?

                    Alex: If the answer makes you uncomfortable, that discomfort belongs in front of your board. That's the conversation that unlocks budget.

                    Jordan: Watch the Itron investigation this week. If scope expands into customer environments, this gets significantly more complex for utility CISOs.

                    Alex: That's Cleartext for Monday, April 27th. If this was useful, share it with a peer who needs the brief. We're back tomorrow. Stay sharp.

                    Cleartext is an automated daily podcast for CISOs and security leaders. Generated 2026-04-27.

                    Sources are pulled from: CyberScoop, The Record, SecurityWeek, Krebs on Security, Dark Reading, Cybersecurity Dive, BleepingComputer, Wired, Ars Technica, TechCrunch, Help Net Security, VentureBeat, Risky Business News, The Hacker News, CISA, and BankInfoSecurity.

                    ...more
                    View all episodesView all episodes
                    Download on the App Store

                    CleartextBy Cleartext