Recon

RECON

Updated 4m ago
High-Signal Security Intelligence

2026-04-21

Dark Reading209IN STACK · 7d ago

Exploits Turn Windows Defender Into Attacker Tool

Three proof-of-concept exploits are being used in active attacks against Microsoft's built-in security platform; two are unpatched.
Dark Reading105 · 8d ago

Surge in Bomgar RMM Exploitation Demonstrates Supply Chain Risk

The critical remote code execution flaw (CVE-2026-1731) in the remote monitoring and management tool can be exploited to spread ransomware and compromise supply chains.
Simon Willison60 · 7d ago

Where's the raccoon with the ham radio? (ChatGPT Images 2.0)

OpenAI released ChatGPT Images 2.0 today , their latest image generation model. On the livestream Sam Altman said that the leap from gpt-image-1 to gpt-image-2 was equivalent to jumping from GPT-3 to GPT-5. Here's how I put it to the test. My prompt: Do a where's Waldo style image but it's where is the raccoon holding a ham radio gpt-image-1 First as a baseline here's what I got from the older gpt-image-1 using ChatGPT directly: I wasn't able to spot the raccoon - I quickly realized that test...
Elastic Security Labs52 · 8d ago

The Cost of Understanding: LLM-Driven Reverse Engineering vs Iterative LLM Obfuscation

Elastic Security Labs explores the ongoing arms race between LLM-driven reverse engineering and obfuscation.
Huntress Blog46 · 8d ago

Tradecraft Tuesday Recap: axios npm Supply Chain Compromise

A few weeks after the major axios npm supply chain attack, a group of researchers from Huntress, Wiz, and Aikido Security debriefed on the compromise’s lasting impacts.
Simon Willison45 · 7d ago

scosman/pelicans_riding_bicycles

scosman/pelicans_riding_bicycles I firmly approve of Steve Cosman's efforts to pollute the training set of pelicans riding bicycles. (To be fair, most of the examples I've published count as poisoning too.) Via Hacker News comment Tags: ai , generative-ai , llms , training-data , pelican-riding-a-bicycle
Rapid7 Blog40 · 8d ago

Kyber Ransomware Double Trouble: Windows and ESXi Attacks Explained

Overview For executive leadership, the emergence of Kyber ransomware represents a significant and immediate threat due to its specialized, dual-platform deployment capability targeting mission-critical virtualization infrastructure (VMware ESXi) and core Windows file systems. This cross-platform approach, coupled with effective anti-recovery measures, drastically elevates the risk of a total operational disruption. Organizations should treat Kyber not merely as another ransomware strain, but ...
Rapid7 Blog40 · 8d ago

From Bulk Export to AI-ready Security Workflows: Introducing Rapid7’s Open-Source MCP Server and Agent Skill

Security teams want more from their data than APIs and one-off reports. They want to ask better questions, move faster, and bring security context into the workflows they are already building. That’s especially true as more organizations experiment with private AI assistants, internal copilots, and LLM-powered automation. Part of this experimentation is, of course, attempting to lower the pressure on teams that have to figure out how to prioritize the sheer number of actionable vulnerabilitie...
Microsoft Security Blog37 · 7d ago

Detection strategies across cloud and identities against infiltrating IT workers

The shift to remote and hybrid work since the pandemic expanded global hiring and accelerated digital onboarding, increasing reliance on online identity verification and remote access. The post Detection strategies across cloud and identities against infiltrating IT workers appeared first on Microsoft Security Blog .
The Hacker News35 · 8d ago

5 Places where Mature SOCs Keep MTTR Fast and Others Waste Time

Security teams often present MTTR as an internal KPI. Leadership sees it differently: every hour a threat dwells inside the environment is an hour of potential data exfiltration, service disruption, regulatory exposure, and brand damage.  The root cause of slow MTTR is almost never "not enough analysts." It is almost always the same structural problem: threat intelligence that exists
Hackerman's Hacking Tutorials32 · 7d ago

Harnessing the Wayward Machine-God, 1: Manual Markdown Cleanup Is a Bug

LLMs regularly ignore my Markdown instructions. As the I part of (A)I , I got tired and created some deterministic automation to format the output to my preferences. I will discuss the problem, our solutions, bugs, lessons learned, and the final product. I am going to try a new format here. This blog has the important stuff that I care about. This is for humans. All the AI discussions and the details are in ai-docs (link below) for AI. Simply ask your LLM to fetch those URLs (or clone the rep...
Bruce's Blog32 · 8d ago

wshobson/agents Deep Dive: What 184 Claude Code Agents Actually Do

The 33.9K-star Claude Code plugin marketplace, audited component by component. 78 plugins, 184 agents, 150 skills — a scenario-driven install guide, the 6 moats nobody talks about, and why installing everything is a trap.
BleepingComputer29 · 8d ago

UK probes Telegram, teen chat sites over CSAM sharing concerns

Ofcom, the United Kingdom's independent communications regulator, has launched an investigation into Telegram based on evidence suggesting it's being used to share child sexual abuse material (CSAM). [...]
Help Net Security29 · 8d ago

Silobreaker Mimir adds agentic AI to intelligence workflows with governance and transparency

Silobreaker has announced new agentic AI capabilities that combine faster research and deeper contextual analysis with built-in governance and transparency to ensure trusted intelligence can be safely consumed across the wider enterprise. Silobreaker Mimir is an embedded agentic capability for intelligence operations, working directly within the analyst workflow. It helps teams retrieve evidence, deepen analysis, and turn validated findings into native assets and stakeholder ready outputs, su...
Codrops27 · 8d ago

False Earth: From WebGL Limits to a WebGPU-Driven World

A deep dive into building an infinite procedural landscape using WebGPU and Three.js, where compute shaders and indirect drawing bring millions of interactive grass blades to life.
CERT Recently Published Vulnerability Notes27 · 8d ago

VU#414811: Terrarium contains a vulnerability that allows arbitrary code execution

Overview Terrarium is a sandbox-based code execution platform that enables users to run and execute code in a controlled environment, providing a secure way to test and validate code. However, a vulnerability has been discovered in Terrarium that allows arbitrary code execution with root privileges on the host Node.js process. This vulnerability is caused by a JavaScript prototype chain traversal in the Pyodide WebAssembly environment. Description The root cause of the vulnerability lies in t...
SecurityWeek27 · 8d ago

Unsecured Perforce Servers Expose Sensitive Data From Major Orgs

Things are improving, but a researcher has still identified over 1,500 Perforce P4 instances allowing attackers to read files on the server. The post Unsecured Perforce Servers Expose Sensitive Data From Major Orgs appeared first on SecurityWeek .
OpenAI Blog27 · 8d ago

Introducing ChatGPT Images 2.0

ChatGPT Images 2.0 introduces a state-of-the-art image generation model with improved text rendering, multilingual support, and advanced visual reasoning.
The Hacker News25 · 7d ago

SystemBC C2 Server Reveals 1,570+ Victims in The Gentlemen Ransomware Operation

Threat actors associated with The Gentlemen ransomware‑as‑a‑service (RaaS) operation have been observed attempting to deploy a known proxy malware called SystemBC. According to new research published by Check Point, the command-and-control (C2 or C&C) server linked to SystemBC has led to the discovery of a botnet of more than 1,570 victims. "SystemBC establishes SOCKS5 network tunnels within
The Hacker News25 · 7d ago

22 BRIDGE:BREAK Flaws Expose Thousands of Lantronix and Silex Serial-to-IP Converters

Cybersecurity researchers have identified 22 new vulnerabilities in popular models of serial-to-IP converters from Lantronix and Silex that could be exploited to hijack susceptible devices and tamper with data exchanged by them. The vulnerabilities have been collectively codenamed BRIDGE:BREAK by Forescout Research Vedere Labs, which identified nearly 20,000 Serial-to-Ethernet converters exposed
The Hacker News25 · 8d ago

NGate Campaign Targets Brazil, Trojanizes HandyPay to Steal NFC Data and PINs

Cybersecurity researchers have discovered a new iteration of an Android malware family called NGate that has been found to abuse a legitimate application called HandyPay instead of NFCGate. "The threat actors took the app, which is used to relay NFC data, and patched it with malicious code that appears to have been AI-generated," ESET security researcher Lukáš Štefanko said in a
The Register (Security)23 · 7d ago

macOS ClickFix attacks deliver AppleScript stealers to snarf credentials, wallets

Data from browsers, cryptocurrency wallets, 200+ extensions hoovered up A ClickFix campaign targeting macOS users delivers an AppleScript-based infostealer that collects credentials and live session cookies from 14 browsers, 16 cryptocurrency wallets, and more than 200 extensions.…
ElcomSoft blog22 · 8d ago

Low-Level Extraction for M-Series iPads

With the release of iOS Forensic Toolkit 10.01, we are extending low-level extraction capabilities to Apple tablets running up to iPadOS 18.7.1. This update brings our extraction agent to the latest hardware, supporting not just A-series but also M-series iPads. We have also implemented support for the distinct memory layout found in high-end 1TB and […]
gilesthomas.com20 · 7d ago

Writing an LLM from scratch, part 32m -- Interventions: conclusion

Last November, when I finished the main body of " Build a Large Language Model (from Scratch) ", I set myself a number of follow-on goals . One was "training the full GPT-2 base model myself". I've reached the end of that journey, with a model that is almost -- if not quite -- as good as GPT-2 small, trained in 44 hours on my own machine, so I thought it would be worth summarising how it went. In December, I trained my first model , taking two days, but was disappointed to see that it was wor...
Latest stories for ZDNET in Security20 · 7d ago

I powered my 3,000-sq-ft home with an EcoFlow battery in a blackout - here's how it kept my AC on

The EcoFlow Delta Pro Ultra X is one of the few power stations that has kept my home running like normal without interruption.
Latest stories for ZDNET in Security20 · 7d ago

This Motorola phone deal comes with free Bluetooth trackers and earbuds - how it works

Motorola is offering a deal on its latest Moto G phone that includes a Moto Tag 4-pack and a pair of Moto Buds Plus earbuds, free. Here's what to know.
绿盟科技技术博客20 · 8d ago

OpenClaw安全实战系列三:利用网关劫持实现 OpenClaw控制端1-Click RCE (CVE-2026-25253)

摘要 本文深入解析OpenClaw(原Clawdbot/Moltbot)控制端UI存在的关键逻辑漏洞CVE-2 Read More
The Hacker News18 · 8d ago

No Exploit Needed: How Attackers Walk Through the Front Door via Identity-Based Attacks

The cybersecurity industry has spent the last several years chasing sophisticated threats like zero-days, supply chain compromises, and AI-generated exploits. However, the most reliable entry point for attackers still hasn't changed: stolen credentials. Identity-based attacks remain a dominant initial access vector in breaches today. Attackers obtain valid credentials through credential stuffing
BleepingComputer17 · 7d ago

French govt agency confirms breach as hacker offers to sell data

France Titres, the government agency in France for issuing and managince administrative documents has disclosed a data breach after a threat actor claimed the attack and stealing citizen data. [...]
Ars Technica17 · 7d ago

Mozilla: Anthropic's Mythos found 271 security vulnerabilities in Firefox 150

CTO says new AI model is "every bit as capable" as world's best security researchers.
The Register (Security)17 · 7d ago

Nation-states want to cause harm, not just steal cash - stop handing your cyber defenses to the cheapest contractor

NCSC boss says China's whole-of-state cyber machine has become Britain's peer competitor in cyberspace State-sponsored cyberattacks from Chinese intelligence and military agencies display "an eye-watering level of sophistication," UK National Cyber Security Centre CEO Richard Horne is expected to say in a less-than-cheery opening speech to kick off its annual conference.…
The Register (Security)17 · 7d ago

Murder, she wrote: Ex-FBI chief wants some ransomware crims charged with homicide

Lawmakers decry CISA cuts: 'We are shooting ourselves in the foot' If a cyberattack leads to a death, that's murder. A former FBI cyber division chief urged the US Justice Department to consider felony homicide charges against ransomware actors when attacks on hospitals lead to patient deaths.…
BleepingComputer17 · 7d ago

New Lotus data wiper used against Venezuelan energy, utility firms

A previously undocumented data-wiping malware dubbed Lotus was used last year in targeted attacks against energy and utilities organizations in Venezuela. [...]
The Decoder17 · 7d ago

Google launches Deep Research and Deep Research Max agents to automate complex research

Google Deepmind is rolling out Deep Research Max, a new AI agent built on Gemini 3.1 Pro that runs autonomous research across the web and proprietary data sources. For the first time, developers can plug in financial feeds and other specialized sources through the Model Context Protocol. The benchmarks come with the usual lack of transparency. The article Google launches Deep Research and Deep Research Max agents to automate complex research appeared first on The Decoder .
Blog | Praetorian17 · 7d ago

500,000 Vulnerabilities, 14 That Matter: How Exploit Chain Analysis Cuts Through the Noise

When 500,000 Findings Hide 14 Real Threats Modern enterprises ingest vulnerability data from dozens of sources: endpoint detection and response platforms, vulnerability scanners, cloud security posture tools, container image scanners. A large organization can easily accumulate hundreds of thousands of individual findings. The standard response is to sort by CVSS score, filter for criticals, and […] The post 500,000 Vulnerabilities, 14 That Matter: How Exploit Chain Analysis Cuts Through the N...
The Register (Security)17 · 8d ago

Yet another ex-ransomware negotiator admits turning rogue after payoff from crimelords

Plus: Court papers reveal nonprofit paid a ransom worth nearly $26.8 million The third of three former ransomware negotiators accused of assisting the ALPHV/BlackCat ransomware gang in extorting US businesses has pleaded guilty, months after his two co-workers did the same.…
IT Security Guru 17 · 8d ago

Forescout Uncovers New Security Risks in Widely Used Industrial Networking Devices

Cybersecurity firm Forescout has identified 22 previously unknown vulnerabilities in serial-to-IP converters, devices commonly used to connect legacy industrial equipment to modern networks. The company warns that thousands of these systems are currently exposed online, potentially increasing the risk of cyberattacks across critical infrastructure sectors. The findings are part of a new research initiative called […] The post Forescout Uncovers New Security Risks in Widely Used Industrial Net...
The Record from Recorded Future News17 · 8d ago

Cloud platform Vercel says company breached through third-party AI tool

Vercel released a statement acknowledging a breach and warning a “limited subset of customers” that their Vercel credentials were compromised.
The Decoder17 · 8d ago

Corporate America's favorite ChatGPT phrase doubled twice since 2024

A new language analysis reveals how one telltale sentence pattern exposes companies that are letting ChatGPT handle their communications. Usage has quadrupled since 2024. The article Corporate America's favorite ChatGPT phrase doubled twice since 2024 appeared first on The Decoder .
The Register (Security)17 · 8d ago

AI-assisted intruders pwned Vercel via OAuth abuse and a pilfered employee account

CEO suspects silicon sidekick behind 'surprising velocity' breach - cyber crims shop stolen data for $2M Vercel's CEO reckons the crooks behind its recent breach likely had a helping hand from AI, saying the attackers moved with "surprising velocity" and a deep understanding of the company's infrastructure.…
The Register (Security)17 · 8d ago

Crook claims to leak 'video surveillance footage' of companies

Mexican IT services firm admits it was hacked, but says client operations weren't affected A Mexican IT infrastructure and digital transformation biz is on clean-up duty after a criminal posted screenshots of what they claimed was company video surveillance footage to a cybercrime forum.…
BleepingComputer17 · 8d ago

Actively exploited Apache ActiveMQ flaw impacts 6,400 servers

Nonprofit security organization Shadowserver found that over 6,400 Apache ActiveMQ servers exposed online are vulnerable to ongoing attacks exploiting a high-severity code injection vulnerability. [...]
The Register (Security)17 · 8d ago

Met police trials snoop tech platform in push to cuff more London shoplifters

No facial recognition privacy intrusions either! Well, maybe a little London's Metropolitan Police is trialing new retail technology to help curtail the city's pervasive shoplifting problem… and it doesn't rely on live facial recognition (LFR).…
BleepingComputer17 · 8d ago

Former ransomware negotiator pleads guilty to BlackCat attacks

41-year-old Angelo Martino, a former employee of cybersecurity incident response company DigitalMint, has pleaded guilty to targeting U.S. companies in BlackCat (ALPHV) ransomware attacks in 2023. [...]
Sploitus.com Exploits RSS Feed17 · 8d ago

PatchChain-Multi-Agent-Agentic-Pipeline-for-Autonomous-Code-Vulnerability-Analysis exploit

PatchChain-Multi-Agent-Agentic-Pipeline-for-Autonomous-Code-Vulnerability-Analysis exploit
BleepingComputer17 · 8d ago

NGate Android malware uses HandyPay NFC app to steal card data

A new variant of the NGate malware that steals NFC payment data is targeting Android users by hiding in a trojanized version of HandyPay, a legitimate mobile payments processing tool. [...]
The Register (Security)17 · 8d ago

Adaptavist Group breach spawns imposter emails as ransomware crew claims mega-haul

Fake emails already doing the rounds as ransomware crew boasts about what it allegedly stole UK enterprise software consultancy The Adaptavist Group is investigating a security breach after an intruder logged in with stolen credentials, while a ransomware crew claims it grabbed far more than the company is currently admitting.…
Der Flounder15 · 7d ago

Apple enforcing stricter network security requirements for future versions of Apple’s platform operating systems

Apple released a new KBase article on April 21st 2026, where the intended audience is IT admins and device management service developers. (For device management service developers, these are the vendors and other folks who build MDM servers.) The KBase article is available via the link below: https://support.apple.com/126655 For more details, please see below the […]
Ars Technica15 · 7d ago

Silo S3 teaser hints at the wasteland's origins

"Before we can know how it will all end, we need to understand how it all began."
Help Net Security15 · 7d ago

VirtualBox 7.2.8 is out with Linux kernel 7.0 support and crash fixes

Oracle shipped VirtualBox 7.2.8 on April 21, 2026, as a maintenance release covering crashes, networking problems, clipboard issues, and extended Linux kernel compatibility. The update touches the VMM layer, NAT networking, graphics, UEFI, and both Linux and Windows guest support. VMM and core stability A Guru Meditation error carrying the code VERR_IEM_IPE_4 is fixed in this release. The condition occurred when a guest attempted to execute the wrong hypercall instruction and injected an unde...
Hacker News Frontpage15 · 7d ago

Meta to start capturing employee mouse movements, keystrokes for AI training

Alt link: https://tech.yahoo.com/ai/meta-ai/articles/exclusive-meta-st... Comments URL: https://news.ycombinator.com/item?id=47851948 Points: 537 # Comments: 390
Hacker News Frontpage15 · 7d ago

Britannica11.org – a structured edition of the 1911 Encyclopædia Britannica

Article URL: https://britannica11.org/ Comments URL: https://news.ycombinator.com/item?id=47851885 Points: 284 # Comments: 98
Hacker News Frontpage15 · 7d ago

The Vercel breach: OAuth attack exposes risk in platform environment variables

Vercel April 2026 security incident - https://news.ycombinator.com/item?id=47824463 - April 2026 (485 comments) A Roblox cheat and one AI tool brought down Vercel's platform - https://news.ycombinator.com/item?id=47844431 - April 2026 (145 comments) Comments URL: https://news.ycombinator.com/item?id=47851634 Points: 307 # Comments: 108
Hacker News Frontpage15 · 7d ago

Trellis AI (YC W24) Is hiring engineers to build self-improving agents

Article URL: https://www.ycombinator.com/companies/trellis-ai/jobs/SvzJaTH-member-of-technical-staff-product-engineering-full-time Comments URL: https://news.ycombinator.com/item?id=47851456 Points: 0 # Comments: 0
SitePoint15 · 7d ago

Why Is Email Deliverability Important?

Why email deliverability matters for your campaigns. Learn how inbox placement affects engagement, sender reputation, automation performance, and revenue. Continue reading Why Is Email Deliverability Important? on SitePoint .
Hacker News Frontpage15 · 8d ago

CrabTrap: An LLM-as-a-judge HTTP proxy to secure agents in production

https://www.brex.com/journal/building-crabtrap-open-source Comments URL: https://news.ycombinator.com/item?id=47850212 Points: 111 # Comments: 40
Der Flounder15 · 8d ago

Slides from the “Preparing for macOS Next” session at MacAD.UK 2026

For those who wanted a copy of my talk on preparing for new versions of macOS at the MacAD.UK 2026 conference, here are links to the slides in PDF and Keynote format. PDF: https://tinyurl.com/macaduk2026pdfKeynote: https://tinyurl.com/macaduk2026key
SecurityWeek15 · 8d ago

Organizations Warned of Exploited Cisco, Kentico, Zimbra Vulnerabilities

CISA expanded the KEV catalog with eight flaws, but five of them have been flagged as exploited before. The post Organizations Warned of Exploited Cisco, Kentico, Zimbra Vulnerabilities appeared first on SecurityWeek .
SecurityWeek15 · 8d ago

Data Breaches at Healthcare Organizations in Illinois and Texas Affect 600,000

Data breaches were disclosed by Southern Illinois Dermatology, Saint Anthony Hospital, and North Texas Behavioral Health Authority. The post Data Breaches at Healthcare Organizations in Illinois and Texas Affect 600,000 appeared first on SecurityWeek .
Hacker News Frontpage15 · 8d ago

Diverse organic molecules on Mars revealed by the first SAM TMAH experiment

https://www.nature.com/articles/s41467-026-70656-0 Comments URL: https://news.ycombinator.com/item?id=47846861 Points: 64 # Comments: 3
Mike Fogus15 · 8d ago

Mind the van Emden Gap

Whereby I read a paper about Intelligence Augmentation written in 1982 and talk about how it relates to today...
SANS ISC15 · 8d ago

ISC Stormcast For Tuesday, April 21st, 2026 https://isc.sans.edu/podcastdetail/9900, (Tue, Apr 21st)

ISC Stormcast For Tuesday, April 21st, 2026 https://isc.sans.edu/podcastdetail/9900, (Tue, Apr 21st)
Infosecurity14 · 8d ago

Vercel Confirms Cyber Incident After Sophisticated Attacker Exploits Third‑Party Tool

Cloud app developer Vercel appears to have suffered a security breach
Phoronix (Linux)13 · 7d ago

Linux May Drop Old Network Drivers Now That AI-Driven Bug Reports Are Causing A Burden

Old network maintenance drivers are becoming a maintenance burden in the era of fuzzing and predominantly AI-driven bug detection causing an uptick in possible bug/security reports to upstream Linux kernel developers but with these drivers potentially having no actual users...
The Hacker News13 · 8d ago

Ransomware Negotiator Pleads Guilty to Aiding BlackCat Attacks in 2023

A third individual who was employed as a ransomware negotiator has pleaded guilty to conducting ransomware attacks against U.S. companies in 2023. Angelo Martino, 41, of Land O'Lakes, Florida, teamed up with the operators of the BlackCat ransomware starting in April 2023 to assist the e-crime gang in extracting higher amounts as ransoms. "Working as a negotiator on behalf of five different
Phoronix (Linux)13 · 8d ago

AMD Ryzen 9 9950X3D2 Benchmarks: The Best Desktop Performance For Linux Developers, Creators

Today we can finally share performance benchmarks of the long-rumored AMD Ryzen 9 9950X3D2 Dual Edition processor. This new halo product for the Ryzen 9000 series desktop line-up offers captivating performance for developers frequently compiling code, creators, technical computing workloads for students or hobbyists or those not able to afford a Threadripper / EPYC type workstation, or similar heavy computing use. With the 16 cores / 32 threads and both CCDs having 3D V-Cache, the AMD Ryzen 9...
Phoronix (Linux)13 · 8d ago

Intel IRDMA Driver Adds Support For GEN4 Hardware In Linux 7.1

The IRDMA driver as Intel's modern Remote Direct Memory Access (RDMA) Linux driver for their high-end Ethernet network controllers is preparing support for new hardware...
The Hacker News13 · 8d ago

CISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal Deadlines

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added eight new vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, including three flaws impacting Cisco Catalyst SD-WAN Manager, citing evidence of active exploitation. The list of vulnerabilities is as follows - CVE-2023-27351 (CVSS score: 8.2) - An improper authentication vulnerability in PaperCut
MIT Technology Review12 · 7d ago

This tool could show how consciousness works

How does the physical matter in our brains translate into thoughts, sensations, and emotions? It’s hard to explore that question without neurosurgery. But in a recent paper, MIT philosopher Matthias Michel, Lincoln Lab researcher Daniel Freeman, and colleagues outline a strategy for doing so with an emerging tool called transcranial focused ultrasound. This noninvasive technology…
The Register (Security)12 · 7d ago

More Cisco SD-WAN bugs battered in attacks

CISA gives federal agencies 4 days to patch America's lead cyber-defense agency has warned that three Cisco Catalyst SD-WAN Manager bugs are under attack, and given federal agencies just four days to patch the security holes.…
Databricks12 · 8d ago

Introducing the Databricks Excel Add-in for Business Users

Spreadsheets remain the backbone of day-to-day business analysis. Finance teams model...
BleepingComputer12 · 8d ago

CISA flags new SD-WAN flaw as actively exploited in attacks

​CISA has given U.S. government agencies four days to secure their systems against another Catalyst SD-WAN Manager vulnerability it flagged as actively exploited in attacks. [...]
We Live Security » Languages » English12 · 8d ago

New NGate variant hides in a trojanized NFC payment app

ESET researchers discover another iteration of NGate malware, this time possibly developed with the assistance of AI
SearchSecurity12 · 8d ago

Beyond awareness: Human risk management metrics for CISOs

Traditional security training isn't keeping threat actors out. As employee awareness programs fall short, Forrester Research suggests a better approach.
Dark Reading11 · 8d ago

Google Fixes Critical RCE Flaw in AI-Based 'Antigravity' Tool

The prompt-injection vulnerability in the agentic AI product for filesystem operations was a sanitization issue that allowed for sandbox escape and arbitrary code execution.
Infosecurity11 · 8d ago

Unchecked AI Agents Cause Cybersecurity Incidents at Two Thirds of Firms

Data exposure, operational disruption and financial losses among issues faced by businesses struggling with the rapid rise of AI agents, warns Cloud Security Alliance report
Deeplinks11 · 8d ago

Palantir Has a Human Rights Policy. Its ICE Work Tells a Different Story

For years, EFF has pushed technology companies to make real human rights commitments—and to live up to them. In response to growing evidence that Palantir’s tools help power abusive immigration enforcement by ICE, we sent the company a detailed letter asking how the promises in its own human rights framework extends to that work. This post explains what we asked, how Palantir responded, and why we believe those responses fall short. EFF is not alone in raising alarms about Palantir; immigrant...
Hacker News Frontpage10 · 7d ago

Drunk post: Things I've learned as a senior engineer (2021)

Article URL: https://luminousmen.substack.com/p/drunk-post-things-ive-learned-as Comments URL: https://news.ycombinator.com/item?id=47856535 Points: 131 # Comments: 91
Hacker News Frontpage10 · 7d ago

SpaceX says it has agreement to acquire Cursor for $60B

https://www.reuters.com/technology/spacex-says-it-has-option... https://www.nytimes.com/2026/04/21/business/spacex-cursor-de... ( https://archive.ph/c2Tac ) https://www.bloomberg.com/news/articles/2026-04-21/spacex-sa... Comments URL: https://news.ycombinator.com/item?id=47855293 Points: 565 # Comments: 691
Hacker News Frontpage10 · 7d ago

Claude Code to be removed from Anthropic's Pro plan?

https://x.com/TheAmolAvasare/status/2046725498592722972 https://xcancel.com/TheAmolAvasare/status/204672549859272297... Comments URL: https://news.ycombinator.com/item?id=47854477 Points: 551 # Comments: 518
Hacker News Frontpage10 · 7d ago

Another Day Has Come

Article URL: https://daringfireball.net/2026/04/another_day_has_come Comments URL: https://news.ycombinator.com/item?id=47854365 Points: 31 # Comments: 16
Hacker News Frontpage10 · 7d ago

ChatGPT Images 2.0

Livestream: https://openai.com/live/ System card: https://deploymentsafety.openai.com/chatgpt-images-2-0/chatg... Comments URL: https://news.ycombinator.com/item?id=47852835 Points: 778 # Comments: 602
Hacker News Frontpage10 · 7d ago

Framework Laptop 13 Pro

Article URL: https://frame.work/laptop13pro Comments URL: https://news.ycombinator.com/item?id=47852177 Points: 1229 # Comments: 614
Hacker News Frontpage10 · 7d ago

Cal.diy: open-source community edition of cal.com

Article URL: https://github.com/calcom/cal.diy Comments URL: https://news.ycombinator.com/item?id=47852155 Points: 197 # Comments: 51
SecurityWeek10 · 8d ago

Third US Security Expert Admits Helping Ransomware Gang

Angelo Martino of Florida has pleaded guilty to collaborating with the BlackCat cybercrime group while working as a ransomware negotiator. The post Third US Security Expert Admits Helping Ransomware Gang appeared first on SecurityWeek .
Hacker News Frontpage10 · 8d ago

Fusion Power Plant Simulator

Article URL: https://www.fusionenergybase.com/fusion-power-plant-simulator Comments URL: https://news.ycombinator.com/item?id=47849315 Points: 152 # Comments: 101
SecurityWeek10 · 8d ago

Dozens of Malicious Crypto Apps Land in Apple App Store

Masquerading as popular cryptocurrency wallets, the apps can hijack recovery phrases and private keys. The post Dozens of Malicious Crypto Apps Land in Apple App Store appeared first on SecurityWeek .
Dark Reading10 · 8d ago

Chinese APT Targets Indian Banks, Korean Policy Circles

China is spying on India's financial sector, for some reason, and it's not putting much effort into it, judging by some stale TTPs.
Hacker News Frontpage10 · 8d ago

Laws of Software Engineering

Article URL: https://lawsofsoftwareengineering.com Comments URL: https://news.ycombinator.com/item?id=47847179 Points: 980 # Comments: 464
SecurityWeek10 · 8d ago

$290 Million Kelp DAO Crypto Heist Blamed on North Korea

The hackers targeted LayerZero’s DVN, compromising certain RPCs and DDoSing others to trigger failover to the poisoned infrastructure.   The post $290 Million Kelp DAO Crypto Heist Blamed on North Korea appeared first on SecurityWeek .
[DRAGNET]10 · 8d ago

Hong Kong Bourse Plans to Start Zero-Day Options in Early 2027

Hong Kong Bourse Plans to Start Zero-Day Options in Early 2027    Bloomberg.com
Phoronix (Linux)8 · 7d ago

AlmaLinux Comments On California Age Verification Law

The RHEL-derived AlmaLinux is the latest Linux distribution commenting on the recent age verification laws led by California with their Digital Age Assurance Act...
Phoronix (Linux)8 · 7d ago

NTFS-3G FUSE Driver Sees First New Release In Four Years

Coming today as a big surprise -- one week after the new NTFS file-system driver was merged for Linux 7.1 and separately the existing NTFS3 kernel driver seeing some fixes -- is a new release of the NTFS-3G driver providing a FUSE-based user-space driver for NTFS on Linux and other platforms...
Pen Test Partners8 · 8d ago

AI can help in DFIR, but it cannot replace investigator judgement

TL;DR  Introduction   In my previous blog post, I wrote about finding your path into DFIR; how to get started, where to focus your time, and why curiosity and good fundamentals matter more than just chasing every certification.  That is still true, but once you have been in the field for a while, you start to realise that getting into DFIR is only […] The post AI can help in DFIR, but it cannot replace investigator judgement appeared first on Pen Test Partners .
Malwarebytes Unpacked8IoCs DETECTED · 8d ago

Fake Google Antigravity downloads are stealing accounts in minutes

Another AI launch, another trap. A trojanized Google Antigravity installer runs like normal, but secretly hands over your accounts to the attackers.
Kotlin8 · 8d ago

Kotlin Professional Certificate by JetBrains – Now on LinkedIn Learning

JetBrains has partnered with LinkedIn Learning to offer the Kotlin Professional Certificate. This is a structured learning path that covers the full scope of modern software development – from Kotlin essentials all the way to building full-stack, multiplatform applications for mobile, desktop, web, and backend environments. Start Learning Who it’s for This certification is designed […]
IEEE Spectrum8 · 8d ago

The Forgotten History of Hershey’s Electric Railway in Cuba

Why does a chocolatier build a railroad? For Milton S. Hershey, it was a logical response to a sugar shortage brought on by World War I. The Hershey Chocolate Co. was by then a chocolate-making powerhouse, having refined the automation and mass production of its products, including the eponymous Hershey’s Milk Chocolate Bar and the bite-size Hershey’s Kiss. To satisfy its many customers, the company needed a steady supply of sugar. Plus, it wanted a way to circumvent the American Sugar Refini...
The Hacker News7 · 8d ago

Google Patches Antigravity IDE Flaw Enabling Prompt Injection Code Execution

Cybersecurity researchers have discovered a vulnerability in Google's agentic integrated development environment (IDE), Antigravity, that could be exploited to achieve code execution. The flaw, since patched, combines Antigravity's permitted file-creation capabilities with an insufficient input sanitization in Antigravity's native file-searching tool, find_by_name, to bypass the program's Strict
Dark Reading6 · 7d ago

Ransomware Negotiator Pleads Guilty to BlackCat Scheme

A cautionary tale illustrates why the person negotiating should never be involved with any part of the ransom payment process.
Fidelis Security6 · 7d ago

How to Detect & Prevent Remote Code Execution (RCE)

Learn how to detect and prevent remote code execution across on-prem and cloud environments. The post How to Detect & Prevent Remote Code Execution (RCE) appeared first on Fidelis Security .
Infosecurity6 · 7d ago

Trojanized Android App Fuels New Wave of NFC Fraud

NGate malware abuses HandyPay app to steal NFC card data and PINs in Brazil
Cloudflare6IoCs DETECTED · 8d ago

Moving past bots vs. humans

As AI assistants and privacy proxies challenge the capabilities of traditional bot detection, the Web needs new models for accountability. We believe that control should remain with the client, and that an open ecosystem of anonymous credentials is key to preserving user privacy while protecting origins from abuse.
CISA Alerts6 · 8d ago

Silex Technology SD-330AC and AMC Manager

View CSAF Summary Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code, cause a denial-of-service, or configuration information may be altered without authentication. The following versions of Silex Technology SD-330AC and AMC Manager are affected: SD-330AC AMC Manager CVSS Vendor Equipment Vulnerabilities v3 9.8 Silex Technology Silex Technology SD-330AC and AMC Manager Stack-based Buffer Overflow, Heap-based Buffer Overflow, Missing Authenticati...
CISA Alerts6 · 8d ago

SenseLive X3050

View CSAF Summary Successful exploitation of these vulnerabilities could allow an attacker to take complete control of the device. The following versions of SenseLive X3050 are affected: X3050 V1.523 (CVE-2026-40630, CVE-2026-25720, CVE-2026-35503, CVE-2026-39462, CVE-2026-27843, CVE-2026-40431, CVE-2026-40623, CVE-2026-27841, CVE-2026-40620, CVE-2026-35064, CVE-2026-25775) CVSS Vendor Equipment Vulnerabilities v3 9.8 SenseLive SenseLive X3050 Authentication Bypass Using an Alternate Path or ...
CISA Alerts6 · 8d ago

Siemens Industrial Edge Management

View CSAF Summary Industrial Edge Management contains an authorization bypass vulnerability that could be exploited by an unauthenticated remote attacker to circumvent authentication and to access connected Industrial Edge Devices through the remote connection feature. Siemens has released new versions for the affected products and recommends to update to the latest versions. The following versions of Siemens Industrial Edge Management are affected: Industrial Edge Management Pro V1 vers:intd...
[DRAGNET]5 · 7d ago

Data breach: Citizens flags limited customer impact after vendor data incident amid ransomware claims

Data breach: Citizens flags limited customer impact after vendor data incident amid ransomware claims    InvestmentNews
[DRAGNET]5 · 7d ago

Data breach: Citizens flags limited customer impact after vendor data incident amid ransomware claims

Data breach: Citizens flags limited customer impact after vendor data incident amid ransomware claims    InvestmentNews
[DRAGNET]5 · 7d ago

Mozilla: Anthropic’s Mythos found 271 security vulnerabilities in Firefox 150

Mozilla: Anthropic’s Mythos found 271 security vulnerabilities in Firefox 150    Ars Technica
[DRAGNET]5 · 7d ago

Former DigitalMint ransomware negotiator pleads guilty to extortion scheme

Former DigitalMint ransomware negotiator pleads guilty to extortion scheme    CyberScoop
[DRAGNET]5 · 7d ago

The zero-days are numbered

The zero-days are numbered    blog.mozilla.org
[DRAGNET]5 · 7d ago

Ex-FBI Cyber Official Proposes Terrorism Designations for Hospital Ransomware Attacks

Ex-FBI Cyber Official Proposes Terrorism Designations for Hospital Ransomware Attacks    MeriTalk
[DRAGNET]5 · 7d ago

Lawmakers ponder terrorism designations, homicide charges over hospital ransomware attacks

Lawmakers ponder terrorism designations, homicide charges over hospital ransomware attacks    CyberScoop
[DRAGNET]5 · 7d ago

SystemBC C2 Server Reveals 1,570+ Victims in The Gentlemen Ransomware Operation

SystemBC C2 Server Reveals 1,570+ Victims in The Gentlemen Ransomware Operation    The Hacker News
[DRAGNET]5 · 7d ago

Florida ransomware negotiator pleads guilty to betraying clients to hackers, DOJ says

Florida ransomware negotiator pleads guilty to betraying clients to hackers, DOJ says    Washington Times
[DRAGNET]5 · 7d ago

Ransomware negotiator pleads guilty to helping ransomware gang

Ransomware negotiator pleads guilty to helping ransomware gang    TechCrunch
[DRAGNET]5 · 8d ago

The United States to press Felony charges against ransomware hackers

The United States to press Felony charges against ransomware hackers    Cybersecurity Insiders
[DRAGNET]5 · 8d ago

From floppy discs to Claude Mythos, how ransomware grew into a multibillion-dollar industry

From floppy discs to Claude Mythos, how ransomware grew into a multibillion-dollar industry    The Conversation
[DRAGNET]5 · 8d ago

Ransomware negotiator admits role in attacks he was hired to resolve

Ransomware negotiator admits role in attacks he was hired to resolve    Help Net Security
[DRAGNET]5 · 8d ago

Ransomware Negotiator Pleads Guilty to Aiding BlackCat Attacks in 2023

Ransomware Negotiator Pleads Guilty to Aiding BlackCat Attacks in 2023    The Hacker News
[DRAGNET]5 · 8d ago

Former FBI official proposes terror designations for ransomware hackers targeting hospitals

Former FBI official proposes terror designations for ransomware hackers targeting hospitals    Nextgov/FCW
[DRAGNET]5 · 8d ago

Most Organizations Fail to Fully Recover After Ransomware Attacks

Most Organizations Fail to Fully Recover After Ransomware Attacks    Petri IT Knowledgebase
[DRAGNET]5 · 8d ago

How a Compromised eScan Update Enabled Multi‑Stage Malware and Blockchain C2

How a Compromised eScan Update Enabled Multi‑Stage Malware and Blockchain C2    Darktrace
[DRAGNET]5 · 8d ago

How a Compromised eScan Update Enabled Multi‑Stage Malware and Blockchain C2

How a Compromised eScan Update Enabled Multi‑Stage Malware and Blockchain C2    Darktrace
[DRAGNET]5 · 8d ago

Cognyte 2026 Threat Landscape Report: AI Accelerates Cyber Threats as Ransomware Surges Worldwide

Cognyte 2026 Threat Landscape Report: AI Accelerates Cyber Threats as Ransomware Surges Worldwide    Yahoo! Finance Canada
[DRAGNET]5 · 8d ago

Cognyte 2026 Threat Landscape Report: AI Accelerates Cyber Threats as Ransomware Surges Worldwide

Cognyte 2026 Threat Landscape Report: AI Accelerates Cyber Threats as Ransomware Surges Worldwide    Business Wire
[DRAGNET]5 · 8d ago

Law enforcement seize $10 million in assets from ransomware negotiator following cybercrime offence

Law enforcement seize $10 million in assets from ransomware negotiator following cybercrime offence    PC Gamer
[DRAGNET]5 · 8d ago

Law enforcement seize $10 million in assets from ransomware negotiator following cybercrime offence

Law enforcement seize $10 million in assets from ransomware negotiator following cybercrime offence    Yahoo
[DRAGNET]5 · 8d ago

Vect formalizes BreachForums and TeamPCP alliance to push model for industrialized ransomware, scale RaaS operations

Vect formalizes BreachForums and TeamPCP alliance to push model for industrialized ransomware, scale RaaS operations    Industrial Cyber
[DRAGNET]5 · 8d ago

Former ransomware negotiator pleads guilty to BlackCat attacks

Former ransomware negotiator pleads guilty to BlackCat attacks    BleepingComputer
[DRAGNET]5 · 8d ago

Adaptavist Group breach spawns imposter emails as ransomware crew claims mega-haul

Adaptavist Group breach spawns imposter emails as ransomware crew claims mega-haul    theregister.com
[DRAGNET]5 · 8d ago

Adobe Reader Zero-Day Vulnerability Exposed

Adobe Reader Zero-Day Vulnerability Exposed    varindia.com
[DRAGNET]5 · 8d ago

Florida man pleads guilty in ransomware conspiracy targeting U.S. companies: DOJ

Florida man pleads guilty in ransomware conspiracy targeting U.S. companies: DOJ    Tampa Bay 28
[DRAGNET]5 · 8d ago

Qilin Ransomware Targets Roman Catholic Archdiocese of St John

Qilin Ransomware Targets Roman Catholic Archdiocese of St John    DeXpose
[DRAGNET]5 · 8d ago

CoinbaseCartel Targets Hong Kong’s Playmates Toys in Ransomware Attack

CoinbaseCartel Targets Hong Kong’s Playmates Toys in Ransomware Attack    DeXpose
[DRAGNET]0 · 7d ago

Tampa Man Pleads Guilty In BlackCat Ransomware Case

Tampa Man Pleads Guilty In BlackCat Ransomware Case    Hoodline
[DRAGNET]0 · 7d ago

Ransomware Negotiator Pleads Guilty to BlackCat Scheme

Ransomware Negotiator Pleads Guilty to BlackCat Scheme    Dark Reading
[DRAGNET]0 · 7d ago

Ransomware and Crypto: Why Paying Isn’t Always the Answer

Ransomware and Crypto: Why Paying Isn’t Always the Answer    FinanceFeeds
[DRAGNET]0 · 7d ago

Qilin Ransomware Is Disabling EDR to Evade Detection

Qilin Ransomware Is Disabling EDR to Evade Detection    Security Boulevard
[DRAGNET]0 · 8d ago

Third US Security Expert Admits Helping Ransomware Gang

Third US Security Expert Admits Helping Ransomware Gang    SecurityWeek
[DRAGNET]0 · 8d ago

SystemBC botnet linked to Gentlemen ransomware attacks

SystemBC botnet linked to Gentlemen ransomware attacks    SC Media
[DRAGNET]0 · 8d ago

Land O' Lakes man pleads guilty to ransomware scheme

Land O' Lakes man pleads guilty to ransomware scheme    TampaBeacon.com
[DRAGNET]0 · 8d ago

Third ransomware pro pleads guilty to cybercrime U-turn

Third ransomware pro pleads guilty to cybercrime U-turn    theregister.com
[DRAGNET]0 · 8d ago

AI now drives most phishing as ransomware victims hit 7,809

AI now drives most phishing as ransomware victims hit 7,809    Stock Titan
[DRAGNET]0 · 8d ago

Genesis Ransomware Strikes K2 Electric, Inc

Genesis Ransomware Strikes K2 Electric, Inc    DeXpose
[DRAGNET]0 · 8d ago

Qilin Ransomware Targets Spanish Logistics Firm Avitrans

Qilin Ransomware Targets Spanish Logistics Firm Avitrans    DeXpose
[DRAGNET]0 · 8d ago

Qilin Ransomware Strikes Safety Engineering Laboratories

Qilin Ransomware Strikes Safety Engineering Laboratories    DeXpose
[DRAGNET]0 · 8d ago

Qilin Targets Heartland Steel Products in Ransomware Attack

Qilin Targets Heartland Steel Products in Ransomware Attack    DeXpose
[DRAGNET]0 · 8d ago

Why Your Backups Might Not Save You When Ransomware Hits

Why Your Backups Might Not Save You When Ransomware Hits    The Hacker News
[DRAGNET]0 · 8d ago

Krybit Ransomware Attack Targets Imbrie Family Law Firm

Krybit Ransomware Attack Targets Imbrie Family Law Firm    DeXpose
[DRAGNET]0 · 8d ago

Qilin Ransomware Hits The Go Solution

Qilin Ransomware Hits The Go Solution    DeXpose
[DRAGNET]0 · 8d ago

Qilin Ransomware Targets French Law Firm GUEGUEN Avocats

Qilin Ransomware Targets French Law Firm GUEGUEN Avocats    DeXpose
[DRAGNET]0 · 8d ago

Qilin Ransomware Attack on SEL Exposes Critical Data

Qilin Ransomware Attack on SEL Exposes Critical Data    DeXpose
[DRAGNET]0 · 8d ago

Incransom Strikes Rheem Manufacturing with Ransomware Attack

Incransom Strikes Rheem Manufacturing with Ransomware Attack    DeXpose
[DRAGNET]0 · 8d ago

Payload Ransomware Strikes JOH Investments Limited

Payload Ransomware Strikes JOH Investments Limited    DeXpose
[DRAGNET]0 · 8d ago

DragonForce Ransomware Attack on Champion Homes

DragonForce Ransomware Attack on Champion Homes    DeXpose
[DRAGNET]0 · 8d ago

Qilin Ransomware Hits ATKINSON RITSON SOLICITORS LIMITED

Qilin Ransomware Hits ATKINSON RITSON SOLICITORS LIMITED    DeXpose
[DRAGNET]0 · 8d ago

Nova Ransomware Targets French Consulting Firm 3CCC

Nova Ransomware Targets French Consulting Firm 3CCC    DeXpose
[DRAGNET]0 · 8d ago

Morpheus Ransomware Strikes GGI Insurance in Myanmar

Morpheus Ransomware Strikes GGI Insurance in Myanmar    DeXpose
[DRAGNET]0 · 8d ago

Chaos Ransomware Targets Canadian Manufacturer Polycorp Ltd

Chaos Ransomware Targets Canadian Manufacturer Polycorp Ltd    DeXpose
[DRAGNET]0 · 8d ago

Qilin Ransomware Targets Industrial Leader SafeRain

Qilin Ransomware Targets Industrial Leader SafeRain    DeXpose
[DRAGNET]0 · 8d ago

Anubis Ransomware Attack on ViaQuest

Anubis Ransomware Attack on ViaQuest    DeXpose
[DRAGNET]0 · 8d ago

Qilin Ransomware Group Attacks Rusk County, Wisconsin

Qilin Ransomware Group Attacks Rusk County, Wisconsin    DeXpose
[DRAGNET]-8 · 7d ago

Adobe Patches Actively Exploited Acrobat Reader Zero-Day Vulnerability

Adobe Patches Actively Exploited Acrobat Reader Zero-Day Vulnerability    Security Boulevard
[DRAGNET]-35 · 7d ago

The Wrap: Interview: DAF CTO; Navy’s PAE Push; Can Ransomware be Terrorism?

The Wrap: Interview: DAF CTO; Navy’s PAE Push; Can Ransomware be Terrorism?    LinkedIn
[DRAGNET]-40 · 8d ago

Frost Bank, Citizens Bank data leak: Hackers set 6-day deadline for full dump

Frost Bank, Citizens Bank data leak: Hackers set 6-day deadline for full dump    Cybernews
[DRAGNET]-40 · 8d ago

Most Firms Overestimate Cyber Recovery Readiness, Survey Finds

Most Firms Overestimate Cyber Recovery Readiness, Survey Finds    Tech Observer Magazine
[DRAGNET]-45 · 8d ago

Chinese APT Targets Indian Banks, Korean Policy Circles

Chinese APT Targets Indian Banks, Korean Policy Circles    Dark Reading