Recon

RECON

Updated 4m ago
High-Signal Security Intelligence

2026-04-28

Phoronix (Linux)216IN STACK · 1d ago

Ubuntu 26.04 LTS Leads Over Windows 11 In Creator Workstation Performance

The past few weeks I have been testing out the new HP Z6 G5 A workstation desktop PC. It's a beast in being powered by the AMD Ryzen Threadripper PRO 9975WX, eight channels of DDR5-5600 memory, and paired with a NVIDIA RTX PRO 6000 Max-Q workstation graphics card. The full review on the HP Z6 G5 A workstation will be published on Phoronix in the next week or so but given the timing and that it shipped with WIndows 11 Pro, here is a look at how Windows 11 Pro is competing against the newly-rel...
CISA Alerts212IN STACK · 1d ago

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CISA has added two new vulnerabilities to its  Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2024-1708  ConnectWise ScreenConnect Path Traversal Vulnerability CVE-2026-32202  Microsoft Windows Protection Mechanism Failure Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.  Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk...
The Hacker News190 · 1d ago

Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202

Microsoft on Monday revised its advisory for a now-patched, high-severity security flaw impacting Windows Shell to acknowledge that it has been actively exploited in the wild. The vulnerability in question is CVE-2026-32202 (CVSS score: 4.3), a spoofing vulnerability that could allow an attacker to access sensitive information. It was addressed as part of its Patch Tuesday update for this
Laravel165 · 1d ago

Polyscope for Windows is Now Available

Polyscope is now available for Windows, bringing the same app and architecture as the macOS version to Windows users. The post Polyscope for Windows is Now Available appeared first on Laravel News . Join the Laravel Newsletter to get Laravel articles like this directly in your inbox.
Hacker News Frontpage45 · 23h ago

GitHub RCE Vulnerability: CVE-2026-3854 Breakdown

Article URL: https://www.wiz.io/blog/github-rce-vulnerability-cve-2026-3854 Comments URL: https://news.ycombinator.com/item?id=47936479 Points: 55 # Comments: 23
The Hacker News40 · 21h ago

Researchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git Push

Cybersecurity researchers have disclosed details of a critical security vulnerability impacting GitHub.com and GitHub Enterprise Server that could allow an authenticated user to obtain remote code execution with a single "git push" command. The flaw, tracked as CVE-2026-3854 (CVSS score: 8.7), is a case of command injection that could allow an attacker with push access to a repository to achieve
Rapid7 Blog40 · 1d ago

Get Motivated: What to Expect from Our Keynote at Rapid7's Global Cybersecurity Summit

Security teams prepare for incidents every day. Alerts are tuned, playbooks are built, and processes are tested. But when something actually happens, the challenge shifts. It becomes not just about making decisions under pressure, but how well that preparation has set teams up to make the right decisions when things heat up. At this year’s Rapid7 Global Cybersecurity Summit , Persistence Under Pressure explores that shift directly. Former Special Forces operator Jason Fox draws on real-world ...
Rapid7 Blog35 · 1d ago

MDR Selection is a Partnership Decision

Managed Detection and Response (MDR) is a cybersecurity service that combines human expertise and technology to detect, investigate, and respond to threats 24/7. I write this as a Field CISO at Rapid7, but also as someone who has had to live with the operational reality of MDR on the customer side. I have seen what happens when a service is a black box, when technology and service drift apart, and when cost, retention, and accountability are misaligned. That experience shapes the view in this...
ElcomSoft blog34 · 1d ago

Digital Triage Masterclass

For decades, the forensic “gold standard” was straightforward: isolate the machine, pull the plug, and image the drive. In that era, what you saw on the screen was exactly what you would extract, bit by bit, from the magnetic platters. Today, that assumption is outdated, and is actively detrimental to an investigation. The digital forensics […]
Microsoft Security Blog32 · 1d ago

Simplifying AWS defense with Microsoft Sentinel UEBA

Learn how Microsoft Sentinel UEBA helps defenders distinguish benign AWS activity from attacker behavior by enriching raw CloudTrail logs with clear, binary behavioral signals derived from baseline user, peer, and device behavior patterns. The post Simplifying AWS defense with Microsoft Sentinel UEBA appeared first on Microsoft Security Blog .
OpenAI Blog30 · 1d ago

Our commitment to community safety

Learn how OpenAI protects community safety in ChatGPT through model safeguards, misuse detection, policy enforcement, and collaboration with safety experts.
BleepingComputer29 · 18h ago

Broken VECT 2.0 ransomware acts as a data wiper for large files

Researchers are warning that the VECT 2.0 ransomware has a problem in the way it handles encryption nonces that leads to permanently destroying larger files rather than encrypt them. [...]
The Register (Security)29 · 21h ago

Don't pay Vect a ransom - your data's likely already wiped out

'Full recovery is impossible for anyone, including the attacker' Organizations hit by the wave of Trivy and LiteLLM supply-chain compromises that paid Vect in hopes of recovering their data likely did not get much back, according to Check Point Research. That's because the ransomware Vect uses isn't actually ransomware at all, but a wiper that destroys any file larger than 128KB.…
The Decoder29 · 1d ago

Researchers find AI text is making the internet more uniform and weirdly cheerful

A large-scale analysis of websites from the Internet Archive shows just how much AI text already saturates the web. According to the researchers, though, the actual effects look quite different from what the public assumes. The article Researchers find AI text is making the internet more uniform and weirdly cheerful appeared first on The Decoder .
The Record from Recorded Future News29 · 1d ago

China-linked hackers led phishing campaigns targeting journalists and activists, researchers say

The aim of the campaigns was to steal credentials and likely enable “follow-on operations in the interest of the Chinese government,” the report said.
OpenAI Blog27 · 1d ago

OpenAI models, Codex, and Managed Agents come to AWS

OpenAI GPT models, Codex, and Managed Agents are now available on AWS, enabling enterprises to build secure AI in their AWS environments.
The Hacker News25 · 1d ago

Why Secure Data Movement Is the Zero Trust Bottleneck Nobody Talks About

Every security program is betting on the same assumption: once a system is connected, the problem is solved. Open a ticket, stand up a gateway, push the data through. Done. That assumption is wrong. It is also a major reason Zero Trust programs stall. New research my team just published puts numbers on it. The Cyber360: Defending the Digital Battlespace report, based on a survey of 500 security
The Hacker News25 · 1d ago

Critical Unpatched Flaw Leaves Hugging Face LeRobot Open to Unauthenticated RCE

Cybersecurity researchers have disclosed details of a critical security flaw impacting LeRobot, Hugging Face's open-source robotics platform with nearly 24,000 GitHub stars, that could be exploited to achieve remote code execution. The vulnerability in question is CVE-2026-25874 (CVSS score: 9.3), which has been described as a case of untrusted data deserialization stemming from the use of the
The Hacker News25 · 1d ago

Chinese Silk Typhoon Hacker Extradited to U.S. Over COVID Research Cyberattacks

A Chinese national accused of being a member of the Silk Typhoon hacking group has been extradited to the U.S. from Italy.  Xu Zewei, 34, was arrested in July 2025 by Italian authorities for his alleged links to the Chinese state-sponsored threat group and for orchestrating cyber attacks against American organizations and government agencies between February 2020 and June 2021, including
The Register (Security)23 · 1d ago

Have I Been Pwned claims Pitney Bowes hit by 8.2M email address leak

Names, phone numbers, physical addresses also included in Shiny Hunters alleged data dump Updated   Logistics technology company Pitney Bowes, which makes franking machines for US postage, is the latest scalp claimed by ShinyHunters and its ongoing spree of pay-or-leak attacks against major organizations.…
Cyber Kendra23 · 1d ago

LAPSUS$ Dumps Checkmarx Data on Dark Web — Source Code, API Keys, and Credentials Exposed

The Checkmarx supply chain nightmare just got worse. The LAPSUS$ cybercrime group has publicly dumped data stolen from the Israeli application security company on its dark web leak site — and Checkmarx has now confirmed it's real. On April 25, dark web threat intelligence account @DarkWebInformer flagged on X that LAPSUS$ added Checkmarx to its victim roster alongside MAPFRE and Vodafone. The exposed data reportedly includes source code, an employee database, API keys, and database credential...
unSafe.sh - 不安全22 · 1d ago

Tracehound and the case for a forensic readiness

Tracehound and the case for a forensic readiness
Security Boulevard22 · 1d ago

Endpoint and memory forensics fundamentals for UK SMEs

When a security incident is suspected, many SMEs focus first on stopping the immediate problem. That is sensible. But if you want to understand what happened, what was affected, and how to reduce the chance of a repeat, you also need to preserve evidence in a way that keeps it useful. That is where endpoint […] The post Endpoint and memory forensics fundamentals for UK SMEs appeared first on Clear Path Security Ltd . The post Endpoint and memory forensics fundamentals for UK SMEs appeared fir...
Hacker News Frontpage20 · 15h ago

How ChatGPT serves ads

Article URL: https://www.buchodi.com/how-chatgpt-serves-ads-heres-the-full-attribution-loop/ Comments URL: https://news.ycombinator.com/item?id=47942437 Points: 253 # Comments: 155
Latest stories for ZDNET in Security20 · 21h ago

I was not expecting a Razer keyboard to enhance my office productivity - here's how it did

Razer's Pro Type Ergo keyboard features a split ergonomic design and a plush wrist rest, while still being great for gaming.
Security Boulevard20 · 23h ago

How Identity, Geopolitics and Data Integrity Define Cyber Resilience

A good cyber framework is built on the assumption that disruption is inevitable, so it must be capable of anticipating, absorbing, and adapting to it.  The post How Identity, Geopolitics and Data Integrity Define Cyber Resilience  appeared first on Security Boulevard .
BleepingComputer20 · 23h ago

US reportedly charges Scattered Spider hacker arrested in Finland

A 19-year-old dual United States and Estonian citizen arrested in Finland earlier this month faces federal charges in the U.S. alleging he was a prolific member of the notorious Scattered Spider hacking collective. [...]
BleepingComputer20 · 1d ago

Microsoft to deprecate legacy TLS in Exchange Online starting July

Microsoft says it will start blocking legacy TLS connections for POP and IMAP email clients in Exchange Online starting in July 2026. [...]
BleepingComputer20 · 1d ago

Microsoft asks iPhone users to reauthenticate after Outlook outage

After addressing a widespread outage that affected Outlook.com users worldwide on Monday, Microsoft has asked iPhone users to re-enter their credentials to regain access to their Outlook and Hotmail accounts via the default Mail app. [...]
HackerNoon20 · 1d ago

How inDrive Detects Silent Android Resource Overrides Before Merge

inDrive added a lightweight GitHub Actions workflow that detects duplicate Android resources in pull requests. It warns engineers about possible silent resource overrides before merge, reducing hidden risks without slowing down CI or forcing a strict naming migration.
Phoronix (Linux)19 · 1d ago

AMDXDNA Driver Preps Hardware Scheduler Time Quantum For Ryzen AI Multi-User Fairness

The AMDXDNA accelerator driver for Ryzen AI NPUs is preparing a new feature called hardware scheduler time quantum for ensuring fairness between multiple users/contexts wanting to leverage this neural processing unit for AI workloads...
BleepingComputer18 · 1d ago

Inside an OPSEC Playbook: How Threat Actors Evade Detection

Threat actors are now publishing structured OPSEC playbooks to stay undetected. Flare reveals how these guides outline layered infrastructure, identity separation, and long-term evasion strategies. [...]
HackerNoon17 · 18h ago

Rooftop Solar Could Power 40% of Europe—So What’s Holding It Back?

This article explores the paradox of renewable energy: despite solar power being significantly cheaper than fossil fuels, adoption remains constrained by logistical and infrastructural challenges. Using Europe as a case study, it highlights the untapped potential of rooftop solar and the role of policy, grid limitations, and permitting delays in slowing progress. The key takeaway is that cost is no longer the barrier—execution is.
HackerNoon17 · 19h ago

SenseAI: The Research That Proves Half of AI Financial Predictions Need Fixing

A new dataset called SenseAI reveals that AI models consistently misread financial news in predictable ways, often hedging sentiment and showing misplaced confidence. By combining human corrections, reasoning data, and real market outcomes, it creates a powerful training tool to fine-tune AI for finance—where small errors can have real monetary impact.
The Verge17 · 20h ago

The FCC is going after the broadcast licenses of Disney-owned ABC stations

The Federal Communications Commission has ordered the ABC stations owned and operated by Disney to file for an early license renewal, as reported earlier by The New York Times. In a filing on Tuesday, the FCC claims it made the decision as part of an investigation into Disney's policies on diversity, equity, and inclusivity (DEI). […]

Can You Turn “What I Want to Do” into a Runnable SeaTunnel Config with AI?

This article argues that the real challenge in AI-generated configurations is not generation, but ensuring they are runnable, reviewable, and maintainable. Using SeaTunnel as a case study, it proposes a structured pipeline approach that translates natural language into intermediate representations, validates configurations, and enables iterative fixes. The key takeaway is that reliable AI-assisted engineering requires controlled pipelines, not just raw generation.
The Verge17 · 20h ago

You can get dragged into a police investigation by proximity alone — for now

A years-old bank heist may soon have major privacy implications for every American who owns a cellphone. On Monday, the Supreme Court heard arguments in Chatrie v. United States, a case involving police's use of controversial "geofence warrants" to find and arrest Okello Chatrie, the suspect of a 2019 bank robbery outside Richmond, Virginia. At […]
ProjectDiscovery.io | Blog17 · 21h ago

The Trust Gap Behind the AI Coding Boom: What 200 Security Practitioners Just Told Us

New research from ProjectDiscovery surfaces an uncomfortable truth: Engineering has accelerated, and Security has been left to absorb the impact, mostly by hand. If you work in application security right now, you already know the shape of the problem. Pull requests are landing faster than they used to. The diffs are bigger. The author on the commit is increasingly your engineering team's AI assistant, not the engineer themselves. And somewhere downstream, you and a small team are expected to ke
Cyber Kendra17 · 22h ago

A Single Git Push Was All It Took to Compromise GitHub — Millions of Repos Were Exposed

A critical vulnerability in GitHub's internal infrastructure allowed any authenticated user to execute arbitrary commands on GitHub's backend servers using nothing more than a standard git push command — potentially exposing millions of public and private repositories belonging to other users and organizations. Discovered by Wiz Research and tracked as CVE-2026-385 4, the flaw stems from an injection vulnerability in GitHub's internal X-Stat header — a semicolon-delimited protocol that passes...
.NET17 · 22h ago

High-Performance Distributed Caching with .NET and Postgres on Azure

Adding caching to your application architecture can significantly improve key performance metrics, cut latency, and reduce load across downstream systems. In this walkthrough, we highlight the latest caching best practices and incorporate these design patterns into a reusable .NET application that you can reference when adding new capabilities to your application stack. The post High-Performance Distributed Caching with .NET and Postgres on Azure appeared first on .NET Blog .
Cyber Kendra17 · 23h ago

Hackers Targeted LiteLLM's AI Gateway Just 36 Hours After Critical SQL Injection Flaw Went Public

A critical, unauthenticated SQL injection vulnerability in LiteLLM — the open-source gateway that tens of thousands of organisations use to manage API access to OpenAI, Anthropic, and other AI providers — drew targeted exploitation attempts within 36 hours of its public disclosure, according to new research from Sysdig 's Threat Research Team. The flaw, tracked as CVE-2026-42208 , affects LiteLLM versions 1.81.16 through 1.83.6. The vulnerability lies within the proxy's authentication step: t...
Security Boulevard17 · 1d ago

[un]prompted 2026 – Detection & Deception Engineering In The Matrix

Author, Creator & Presenter: Bob Rudis, V.P. Data Science, Security Research, & Detection+Deception Engineering At GreyNoise Labs & Glenn Thorpe, Sr. Director, Security Research & Detection Engineering At GreyNoise Intelligence Our thanks to [un]prompted for publishing their Creators, Authors and Presenter’s outstanding [un]prompted 2026 AI Security Practitioner content on the Organizations' YouTube Channel . Permalink The post [un]prompted 2026 – Detection & Deception Engineering In The Matr...
BleepingComputer17 · 1d ago

Checkmarx confirms LAPSUS$ hackers leaked its stolen GitHub data

Application security company Checkmarx has confirmed that the LAPSUS$ threat group leaked data stolen from its private GitHub repository. [...]
36氪17 · 1d ago

ADP:截至4月11日四周美国私营部门就业人数平均每周增加3.925万

4月28日,根据ADP Research和斯坦福数字经济实验室的初步估计,截至4月11日的四周,美国私营部门就业人数平均每周增加3.925万人。(界面)
Horizon3.ai17 · 1d ago

Horizon3.ai Research Reveals Growing Divide Between Security Leaders and Practitioners

New Horizon3.ai research reveals a disconnect between executive confidence and real-world security risk as validation lags behind activity.
NowSecure17 · 1d ago

The Third-Party Mobile App Risk Hidden Inside Your Approved Apps

When Frederick County, Maryland, reviewed a mobile app used by its fire and rescue team, it passed every traditional check. The app connected to an ultrasound device, looked legitimate and had been approved. Binary-level analysis told a different story: the app was exposing protected health information, violating HIPAA in ways that no privacy label, MDM […] The post The Third-Party Mobile App Risk Hidden Inside Your Approved Apps appeared first on NowSecure .
SecurityWeek RSS Feed17 · 1d ago

Germany Suspects Russia Is Behind Signal Phishing That Targeted Top Officials

Federal prosecutors have been conducting a preliminary investigation since mid-February 2026 into alleged cyberattacks on Signal accounts. The post Germany Suspects Russia Is Behind Signal Phishing That Targeted Top Officials appeared first on SecurityWeek .
The Register (Security)17 · 1d ago

SUSE's sovereignty pitch meets an inconvenient $6 billion question

Linux vendor touts European independence at SUSECON as majority stakeholder quietly explores its options European-based SUSE devoted much of the annual SUSECON event to its sovereignty-focused pitch - even as reports swirl that its majority stakeholder is exploring a $6 billion sale which could land the Linux vendor in American hands.…
BleepingComputer17 · 1d ago

Microsoft: New Remote Desktop warnings may display incorrectly

Microsoft has confirmed a new issue causing newly introduced Windows security warnings to display incorrectly when opening Remote Desktop (.rdp) files. [...]
Malwarebytes Unpacked17 · 1d ago

Chinese engineer stole US military and NASA software for years

He created Gmail accounts, impersonated real US researchers, and convinced NASA, the military, and universities to hand over sensitive code.
Security Boulevard17 · 1d ago

Chinese engineer stole US military and NASA software for years

He created Gmail accounts, impersonated real US researchers, and convinced NASA, the military, and universities to hand over sensitive code. The post Chinese engineer stole US military and NASA software for years appeared first on Security Boulevard .
rtl-sdr.com17 · 1d ago

Detecting Hidden GPS Trackers via Electromagnetic Unintentional Emissions with a HackRF

Researchers from Hunan University, Boise State, and UT Arlington have published a paper called "GPSBuster" (PDF link), demonstrating how a HackRF One can sniff out covert GPS trackers by their unintended electromagnetic radiation. Hidden trackers are hard to find since they only receive satellite signals and may store coordinates locally rather than transmit. Instead of […]
rtl-sdr.com17 · 1d ago

Fixing a Locked-Up RTL-SDR 700 km Away Using uhubctl USB Power Cycling

Over on Medium, Jugy depin has shared a useful troubleshooting write-up describing how they recovered a frozen RTL-SDR on a remote Raspberry Pi station located 700 km away, with no physical access available. The dongle had stopped responding with  usb_claim_interface error -6 and Failed to open rtlsdr device #0 errors, while still showing up in […]
Phoronix (Linux)16 · 1d ago

Sovereign Tech Agency Launches New Initiative To Help Open Standards

Germany's Sovereign Tech Agency (Sovereign Tech Fund) has provided critical financial resources to open-source software projects and maintainers the past several years. This has proven to be an incredible effort and today they announced their newest initiative as the Sovereign Tech Standards...
Phoronix (Linux)16 · 1d ago

WayVNC 0.10 Released For Advancing This Leading VNC Server For Wayland

WayVNC 0.10 is out today as the newest feature release for this VNC server that works with Wayland compositors leveraging the wlroots library...
HackerNoon15 · 19h ago

Why 2026’s Megadeals Are Colliding With a Hidden IT Crisis

This article explores how IT has become a critical success factor in modern M&A deals, especially as megadeals rise in value and complexity. From mismatched tech stacks to communication system failures, poor integration can disrupt operations and delay ROI. The key takeaway is that IT due diligence and early integration planning are no longer optional—they are central to realizing the value of acquisitions.
Hacker News Frontpage15 · 19h ago

200 Journalists Applaud the Internet Archive's Role in Preserving Public Record

Article URL: https://www.savethearchive.com/journalists/ Comments URL: https://news.ycombinator.com/item?id=47939695 Points: 52 # Comments: 0
Hacker News Frontpage15 · 21h ago

A good AGENTS.md is a model upgrade. A bad one is worse than no docs at all

Article URL: https://www.augmentcode.com/blog/how-to-write-good-agents-dot-md-files Comments URL: https://news.ycombinator.com/item?id=47938417 Points: 16 # Comments: 1
Hacker News Frontpage15 · 22h ago

Show HN: Auto-Architecture: Karpathy's Loop, pointed at a CPU

Article URL: https://github.com/FeSens/auto-arch-tournament/blob/main/docs/auto-arch-tournament-blog-post.md Comments URL: https://news.ycombinator.com/item?id=47937380 Points: 86 # Comments: 19
Hacker News Frontpage15 · 22h ago

Infisical (YC W23) Is Hiring Full Stack Software Engineers (Remote)

Article URL: https://jobs.ashbyhq.com/infisical/782b9da8-20e1-48b2-919e-6c5430c58628 Comments URL: https://news.ycombinator.com/item?id=47937203 Points: 0 # Comments: 0
Hacker News Frontpage15 · 23h ago

Cybersec is a thankless job: expanding workload and shrinking pay packet

Article URL: https://www.theregister.com/2026/04/27/from_a_massive_skills_gap/ Comments URL: https://news.ycombinator.com/item?id=47936411 Points: 21 # Comments: 8
Hacker News Frontpage15 · 23h ago

Anthropic Joins the Blender Development Fund as Corporate Patron

Article URL: https://www.blender.org/press/anthropic-joins-the-blender-development-fund-as-corporate-patron/ Comments URL: https://news.ycombinator.com/item?id=47936370 Points: 136 # Comments: 110
Hacker News Frontpage15 · 23h ago

AI uncovers 38 vulnerabilities in largest open source medical record software

Article URL: https://aisle.com/blog/aisle-discovers-38-critical-security-vulnerabilities-in-healthcare-software-used-by-100000-providers Comments URL: https://news.ycombinator.com/item?id=47936347 Points: 52 # Comments: 41
Hacker News Frontpage15 · 23h ago

After Spain's blackout, its shift to renewables and grid evolution power on

Article URL: https://www.theguardian.com/world/2026/apr/28/blackout-spain-renewable-energy-grid-solar-wind Comments URL: https://news.ycombinator.com/item?id=47936236 Points: 25 # Comments: 1
Hacker News Frontpage15 · 23h ago

FCC Funding Application Notes Paramount Will Be 49.5% Foreign-Owned Post-Merger

Article URL: https://deadline.com/2026/04/paramount-fcc-request-wbd-merger-middle-east-1236873732/ Comments URL: https://news.ycombinator.com/item?id=47936210 Points: 62 # Comments: 21
Hacker News Frontpage15 · 23h ago

Google and Pentagon reportedly agree on deal for 'any lawful' use of AI

Article URL: https://www.theverge.com/ai-artificial-intelligence/919494/google-pentagon-classified-ai-deal Comments URL: https://news.ycombinator.com/item?id=47936156 Points: 112 # Comments: 88
Hacker News Frontpage15 · 1d ago

OpenAI CEO's Identity Verification Company Announced Fake Bruno Mars Partnership

Article URL: https://www.vice.com/en/article/openai-ceo-identity-verification-company-fake-bruno-mars-partnership-mistaken-identity/ Comments URL: https://news.ycombinator.com/item?id=47934269 Points: 9 # Comments: 1
SecurityWeek15 · 1d ago

Dozens of Open VSX Extension Clones Linked to GlassWorm Malware

Over 70 cloned Open VSX extensions are likely sleeper extensions designed to distribute malware. The post Dozens of Open VSX Extension Clones Linked to GlassWorm Malware appeared first on SecurityWeek .
SecurityWeek15 · 1d ago

Sevii Launches Cyber Swarm Defense to Make Agentic AI Security Costs Predictable

Agentic AI can be expensive to use, causing further and unpredictable pressure on tight budgets. The post Sevii Launches Cyber Swarm Defense to Make Agentic AI Security Costs Predictable appeared first on SecurityWeek .
SecurityWeek15 · 1d ago

Electric Motorcycles and Scooters Face Hacking Risks to Security and Rider Safety

Vulnerabilities in Zero Motorcycles electric motorcycles and Yadea electric scooters can pose physical security and safety risks. The post Electric Motorcycles and Scooters Face Hacking Risks to Security and Rider Safety appeared first on SecurityWeek .
Hacker News Frontpage15 · 1d ago

Localsend: An open-source cross-platform alternative to AirDrop

Article URL: https://github.com/localsend/localsend Comments URL: https://news.ycombinator.com/item?id=47933208 Points: 29 # Comments: 7
SecurityWeek15 · 1d ago

No Patch for New PhantomRPC Privilege Escalation Technique in Windows

A fake RPC server can be used to listen for RPC requests and impersonate the target service to elevate privileges to System. The post No Patch for New PhantomRPC Privilege Escalation Technique in Windows appeared first on SecurityWeek .
Hacker News Frontpage15 · 1d ago

New Gas-Powered Data Centers Could Emit More Greenhouse Gases Than Whole Nations

Article URL: https://www.wired.com/story/new-gas-powered-data-centers-could-emit-more-greenhouse-gases-than-entire-nations/ Comments URL: https://news.ycombinator.com/item?id=47932977 Points: 12 # Comments: 1
Hacker News Frontpage15 · 1d ago

The Social Edge of Intellgience: Individual Gain, Collective Loss

Article URL: https://www.theideasletter.org/essay/the-social-edge-of-intelligence/ Comments URL: https://news.ycombinator.com/item?id=47932446 Points: 6 # Comments: 0
Hacker News Frontpage15 · 1d ago

GitHub Copilot code review will start consuming GitHub Actions minutes

Article URL: https://github.blog/changelog/2026-04-27-github-copilot-code-review-will-start-consuming-github-actions-minutes-on-june-1-2026/ Comments URL: https://news.ycombinator.com/item?id=47932028 Points: 12 # Comments: 2
SecurityWeek15 · 1d ago

Medtronic Hack Confirmed After ShinyHunters Threatens Data Leak

The ShinyHunters cybercrime group claimed to have stolen 9 million records containing personal information from Medtronic. The post Medtronic Hack Confirmed After ShinyHunters Threatens Data Leak appeared first on SecurityWeek .
Hacker News Frontpage15 · 1d ago

LingBot-Map: Streaming 3D reconstruction with geometric context transformer

Article URL: https://technology.robbyant.com/lingbot-map Comments URL: https://news.ycombinator.com/item?id=47930170 Points: 22 # Comments: 2
SANS ISC15 · 1d ago

ISC Stormcast For Tuesday, April 28th, 2026 https://isc.sans.edu/podcastdetail/9908, (Tue, Apr 28th)

ISC Stormcast For Tuesday, April 28th, 2026 https://isc.sans.edu/podcastdetail/9908, (Tue, Apr 28th)
The Hacker News13 · 21h ago

Brazilian LofyGang Resurfaces After Three Years With Minecraft LofyStealer Campaign

A cybercrime group of Brazilian origin has resurfaced after more than three years to orchestrate a campaign that targets Minecraft players with a new stealer called LofyStealer (aka GrabBot). "The malware disguises itself as a Minecraft hack called 'Slinky,'" Brazil-based cybersecurity company ZenoX said in a technical report. "It uses the official game icon to induce voluntary execution,
Phoronix (Linux)13 · 1d ago

AMD's Lemonade SDK 10.3 Now 10x Smaller By Getting Rid Of Electron

Lemonade as the open-source local AI server backed by AMD and supported across AMD CPUs / GPUs / NPUs on Windows and Linux is out with a big update...
The Hacker News13 · 1d ago

VECT 2.0 Ransomware Irreversibly Destroys Files Over 131KB on Windows, Linux, ESXi

Threat hunters are warning that the cybercriminal operation known as VECT 2.0 acts more like a wiper than a ransomware due to a critical flaw in its encryption implementation across Windows, Linux, and ESXi variants that renders recovery impossible even for the threat actors. The fact that VECT's locker permanently destroys large files rather than encrypting them means even victims who opt to
Phoronix (Linux)13 · 1d ago

Fedora 44 Released For Living On The Leading-Edge Of Linux Innovations

Fedora 44 is officially released for providing the very latest Linux innovations with GNOME 50 being the default desktop of Fedora Workstation 44, an improved KDE experience with Plasma 6.6 complete with the Plasma Log-in Manager, and other up-to-date software packages...
Phoronix (Linux)13 · 1d ago

Red Hat's Stratis Storage 3.9 Released With Online Encryption/Decryption/Reencryption

It's crazy to realize it has been ten years already since Red Hat abandoned their Btrfs plans for Red Hat Enterprise Linux and dropped it, which was a technology preview feature since RHEL6. In its place Red Hat engineers began developing Stratis for next-gen Linux storage with ZFS/Btrfs-like features but instead building atop XFS, LUKS, Device Mapper, and Clevis. After a while since the last major release, Stratis Storage 3.9 released today...
BleepingComputer12 · 18h ago

Hackers are exploiting a critical LiteLLM pre-auth SQLi flaw

Hackers are targeting sensitive information stored in the LiteLLM open-source large-language model (LLM) gateway by exploiting a critical vulnerability  tracked as CVE-2026-42208. [...]
HackerNoon12 · 18h ago

Solana’s Quantum-Readiness Post: A Deeper Analysis

Solana's 27 April 2026 'Quantum Readiness' post calls the work 'manageable,' the chain 'ahead in its preparation,' and the performance impact negligible. The engineering signal (two validator clients converging on Falcon) is real. The framing softens implementation maturity, Falcon side-channel hazards, migration mechanics, and Solana's position relative to Bitcoin and especially Ethereum. Reassurance and fear-selling are the same anti-pattern from opposite ends; both substitute confidence fo...
BleepingComputer12 · 20h ago

Video service Vimeo confirms Anodot breach exposed user data

Vimeo has disclosed that data belonging to some of its customers and users has been accessed without authorization following the recent breach at the Anodot data anomaly detection company. [...]
The Record from Recorded Future News12 · 23h ago

Video site Vimeo blames security incident on Anodot breach

The hackers did not access video content, user logins or payment card information, and there was no disruption to Vimeo’s services,
[DRAGNET]12 · 1d ago

VECT: Ransomware by design, Wiper by accident

VECT: Ransomware by design, Wiper by accident    Check Point Research
Check Point Research12IoCs DETECTED · 1d ago

VECT: Ransomware by design, Wiper by accident

Key Takeaways Background VECT Ransomware is a Ransomware-as-a-Service (RaaS) program that made its first appearance in December 2025 on a Russian-language cybercrime forum. After claiming their first two victims in January 2026, the group got back into the public eye due to an announcement of a partnership with TeamPCP, the actor behind several supply-chain attacks […] The post VECT: Ransomware by design, Wiper by accident appeared first on Check Point Research .
Nordic APIs12 · 1d ago

10 Tips for Securing Your API Keys From AI

In February 2026, nearly 3,000 Google API keys were accidentally exposed. Data breaches are always damaging, but a data breach due to an authenticated, active API key can be catastrophic. An active API key allows actors to access uploaded files, cached data, and charge LLM-usage to your account, as noted by cybersecurity researcher Joe Leon. ...
Cyber Kendra11 · 22h ago

Google Wallet Now Stores Your Aadhaar ID in India — and Expands Digital IDs to Three More Countries

Google just made carrying a physical ID one step closer to optional. Starting today, Indian users can save their Aadhaar Verifiable Credential directly inside Google Wallet — stored on-device — while users in Singapore, Taiwan, and Brazil gain access to passport-based digital ID passes for the first time. The Aadhaar integration, built in partnership with UIDAI (the government body that manages India's national identity system), lets users add their credential in a few taps and present it dig...
Phoronix (Linux)11 · 1d ago

GCC 16's Improved Error Messages, Experimental HTML Output

GCC 16.1 as the first stable version of the GCC 16 compiler is releasing as soon as later this week if all goes well. Among the many improvements in this year's open-source compiler update are continued enhancements to the error messages as well as having an experimental HTML output option for messages...
Hacker News Frontpage10 · 15h ago

Claude for Creative Work

Article URL: https://www.anthropic.com/news/claude-for-creative-work Comments URL: https://news.ycombinator.com/item?id=47942386 Points: 105 # Comments: 77
Hacker News Frontpage10 · 15h ago

Apple CMF (Color-Matching Functions) 2026

Article URL: https://www.lttlabs.com/articles/2026/04/11/apple-studio-display-xdr-display-testing-results Comments URL: https://news.ycombinator.com/item?id=47942353 Points: 43 # Comments: 1
Hacker News Frontpage10 · 18h ago

Before GitHub

Article URL: https://lucumr.pocoo.org/2026/4/28/before-github/ Comments URL: https://news.ycombinator.com/item?id=47940921 Points: 377 # Comments: 115
Hacker News Frontpage10 · 18h ago

I won a championship that doesn't exist

Article URL: https://ron.stoner.com/How_I_Won_a_Championship_That_Doesnt_Exist/ Comments URL: https://news.ycombinator.com/item?id=47940389 Points: 123 # Comments: 69
Hacker News Frontpage10 · 19h ago

Ghostty is leaving GitHub

Article URL: https://mitchellh.com/writing/ghostty-leaving-github Comments URL: https://news.ycombinator.com/item?id=47939579 Points: 2203 # Comments: 663
Hacker News Frontpage10 · 20h ago

C, Just In Time!

Article URL: https://dyne.org/cjit/ Comments URL: https://news.ycombinator.com/item?id=47939105 Points: 6 # Comments: 0
Hacker News Frontpage10 · 20h ago

DOOM running in ChatGPT and Claude

Article URL: https://chrisnager.com/blog/doom-runs-in-chatgpt-and-claude/ Comments URL: https://news.ycombinator.com/item?id=47939079 Points: 16 # Comments: 3
Hacker News Frontpage10 · 20h ago

Bankruptcies increase 11.9 percent

Article URL: https://www.uscourts.gov/data-news/judiciary-news/2026/04/23/bankruptcies-increase-119-percent Comments URL: https://news.ycombinator.com/item?id=47938756 Points: 91 # Comments: 40
SecurityWeek10 · 21h ago

Cyber Insurance Data Gives CISOs New Ammo for Budget Talks

Boards may ignore alerts, but they listen to losses: new data from Resilience links security gaps directly to financial impact. The post Cyber Insurance Data Gives CISOs New Ammo for Budget Talks appeared first on SecurityWeek .
Hacker News Frontpage10 · 21h ago

Waymo in Portland

Article URL: https://waymo.com/blog/shorts/waymo-in-portland/ Comments URL: https://news.ycombinator.com/item?id=47938184 Points: 66 # Comments: 29
Hacker News Frontpage10 · 21h ago

Claude.ai is unavailable

Article URL: https://status.claude.com/incidents/9l93x2ht4s5w Comments URL: https://news.ycombinator.com/item?id=47938097 Points: 127 # Comments: 94
Hacker News Frontpage10 · 22h ago

BookStack Moves from GitHub to Codeberg

Article URL: https://github.com/BookStackApp/BookStack/issues/4551 Comments URL: https://news.ycombinator.com/item?id=47937641 Points: 56 # Comments: 10
Hacker News Frontpage10 · 22h ago

GB Electricity Bills

Article URL: https://www.electricitybills.uk/ Comments URL: https://news.ycombinator.com/item?id=47937403 Points: 3 # Comments: 1
SecurityWeek10 · 22h ago

Vimeo Confirms User and Customer Data Breach

The ShinyHunters group is threatening to leak stolen files unless Vimeo agrees to pay a ransom. The post Vimeo Confirms User and Customer Data Breach appeared first on SecurityWeek .
Hacker News Frontpage10 · 22h ago

Warp is now Open-Source

Article URL: https://github.com/warpdotdev/warp Comments URL: https://news.ycombinator.com/item?id=47937349 Points: 25 # Comments: 2
Hacker News Frontpage10 · 22h ago

AI's Economics Don't Make Sense

Article URL: https://www.wheresyoured.at/ais-economics-dont-make-sense/ Comments URL: https://news.ycombinator.com/item?id=47936867 Points: 27 # Comments: 5
Hacker News Frontpage10 · 23h ago

Greece to ban anonymity on social media

Article URL: https://www.euractiv.com/news/greece-to-ban-anonymity-on-social-media/ Comments URL: https://news.ycombinator.com/item?id=47936616 Points: 49 # Comments: 19
Hacker News Frontpage10 · 23h ago

Laguna XS.2 and M.1

Article URL: https://poolside.ai/blog/laguna-a-deeper-dive Comments URL: https://news.ycombinator.com/item?id=47936511 Points: 22 # Comments: 7
Hacker News Frontpage10 · 23h ago

Warp is now open-source

Article URL: https://www.warp.dev/blog/warp-is-now-open-source Comments URL: https://news.ycombinator.com/item?id=47936264 Points: 223 # Comments: 66
Hacker News Frontpage10 · 23h ago

Physicists Discover the Most Complex Forms of Ice Yet

Article URL: https://www.quantamagazine.org/physicists-discover-the-most-complex-forms-of-ice-yet-20260427/ Comments URL: https://news.ycombinator.com/item?id=47936167 Points: 14 # Comments: 6
SecurityWeek10 · 23h ago

The Mythos Moment: Enterprises Must Fight Agents with Agents

Only with the right platform and an agentic, AI-driven defense, will enterprises be able to protect themselves in the agentic era. The post The Mythos Moment: Enterprises Must Fight Agents with Agents appeared first on SecurityWeek .
Hacker News Frontpage10 · 1d ago

Your phone is about to stop being yours

Article URL: https://keepandroidopen.org/en/ Comments URL: https://news.ycombinator.com/item?id=47935853 Points: 250 # Comments: 124
SecurityWeek10 · 1d ago

Robinhood Vulnerability Exploited for Phishing Attacks

Legitimate-looking emails coming from Robinhood systems lured recipients to phishing websites. The post Robinhood Vulnerability Exploited for Phishing Attacks appeared first on SecurityWeek .
SecurityWeek10 · 1d ago

Alleged Chinese State Hacker Extradited to US

A member of Silk Typhoon, Xu Zewei is accused of launching cyberattacks against universities in the US. The post Alleged Chinese State Hacker Extradited to US appeared first on SecurityWeek .
Hacker News Frontpage10 · 1d ago

United Arab Emirates to quit oil cartel OPEC

Article URL: https://www.bbc.co.uk/news/articles/cj4pxwlr52yo Comments URL: https://news.ycombinator.com/item?id=47934281 Points: 7 # Comments: 0
Hacker News Frontpage10 · 1d ago

Show HN: Live Sun and Moon Dashboard with NASA Footage

Article URL: https://www.lumara-space.app/ Comments URL: https://news.ycombinator.com/item?id=47934261 Points: 85 # Comments: 19
Hacker News Frontpage10 · 1d ago

UAE Leaves OPEC and OPEC+

Article URL: https://www.reuters.com/markets/commodities/uae-says-it-quits-opec-opec-statement-2026-04-28/ Comments URL: https://news.ycombinator.com/item?id=47934120 Points: 18 # Comments: 0
Hacker News Frontpage10 · 1d ago

UAE to leave OPEC in blow to oil cartel

Article URL: https://www.ft.com/content/8c354f2d-3e66-47f1-aad4-9b4aa30e386d Comments URL: https://news.ycombinator.com/item?id=47933983 Points: 26 # Comments: 7
Hacker News Frontpage10 · 1d ago

GitHub Actions is the weakest link

Article URL: https://nesbitt.io/2026/04/28/github-actions-is-the-weakest-link.html Comments URL: https://news.ycombinator.com/item?id=47933257 Points: 77 # Comments: 14
Hacker News Frontpage10 · 1d ago

Microsoft VibeVoice: Open-Source Frontier Voice AI

Article URL: https://github.com/microsoft/VibeVoice Comments URL: https://news.ycombinator.com/item?id=47933236 Points: 3 # Comments: 0
Hacker News Frontpage10 · 1d ago

Period tracking app has been yapping about your flow to Meta

Article URL: https://femtechdesigndesk.substack.com/p/your-period-tracking-app-has-been Comments URL: https://news.ycombinator.com/item?id=47932990 Points: 5 # Comments: 1
Hacker News Frontpage10 · 1d ago

Who owns the code Claude Code wrote?

Article URL: https://legallayer.substack.com/p/who-owns-the-claude-code-wrote Comments URL: https://news.ycombinator.com/item?id=47932937 Points: 8 # Comments: 0
Hacker News Frontpage10 · 1d ago

An Update on GitHub Availability

Article URL: https://github.blog/news-insights/company-news/an-update-on-github-availability/ Comments URL: https://news.ycombinator.com/item?id=47932422 Points: 31 # Comments: 4
Hacker News Frontpage10 · 1d ago

$1,605: average annual ad value of a U.S. Google user

Article URL: https://proton.me/blog/what-is-your-data-worth-to-google Comments URL: https://news.ycombinator.com/item?id=47932060 Points: 12 # Comments: 6
SecurityWeek10 · 1d ago

Spectrum Security Emerges From Stealth Mode With $19 Million

The threat detection startup will invest in accelerating its engineering and go-to-market efforts. The post Spectrum Security Emerges From Stealth Mode With $19 Million appeared first on SecurityWeek .
Hacker News Frontpage10 · 1d ago

GTFOBins

Article URL: https://gtfobins.org/ Comments URL: https://news.ycombinator.com/item?id=47931035 Points: 51 # Comments: 12
Hacker News Frontpage10 · 1d ago

WASM is not quite a stack machine

Article URL: https://purplesyringa.moe/blog/wasm-is-not-quite-a-stack-machine/ Comments URL: https://news.ycombinator.com/item?id=47930493 Points: 7 # Comments: 1
Hacker News Frontpage10 · 1d ago

Show HN: AgentSwift – Open-source iOS builder agent

I'm working on a coding agent for building iOS apps. It's built on openspec and xcodebuildmcp. It's free and open source. Comments URL: https://news.ycombinator.com/item?id=47929375 Points: 36 # Comments: 7
Hacker News Frontpage10 · 1d ago

High Performance Git

Article URL: https://gitperf.com/ Comments URL: https://news.ycombinator.com/item?id=47929035 Points: 101 # Comments: 11
[DRAGNET]10 · 1d ago

RunSafe Security Emphasizes Zero-Day Mitigation Amid Shifts in Vulnerability Data

RunSafe Security Emphasizes Zero-Day Mitigation Amid Shifts in Vulnerability Data    TipRanks
Jake Trent10 · 1d ago

Put Localhost on HTTPS with Nginx

Put Localhost on HTTPS with Nginx
Dark Reading9 · 19h ago

Feuding Ransomware Groups Leak Each Other's Data

When 0APT and KryBit attacked each other, they exposed infrastructure and operational data, giving defenders rare insight into ransomware operations.
Dark Reading9 · 20h ago

Vidar Rises to Top of Chaotic Infostealer Market

The malware has filled the gap created by last year's law enforcement takedowns of Lumma and Rhadamanthys.
Ars Technica8 · 16h ago

Anti-Trump Instagram pic of seashells now enough to indict ex-FBI directors

The clown car is all gassed up.
The Verge8 · 17h ago

James Comey indicted over Instagram seashell photo that allegedly threatened Trump

The US Department of Justice has once again indicted James Comey - this time, for an alleged threat the former FBI director made toward President Donald Trump on Instagram, as reported earlier by CNN. In its indictment, filed in a North Carolina federal court on Tuesday, the DOJ cites the now-deleted image Comey posted to […]
Dark Reading8 · 17h ago

BlueNoroff Uses Fake Zoom Calls to Turn Victims Into Attack Lures

The North Korean group is using stolen victim videos, AI-generated avatars, and fake Zoom calls to scale malware attacks against cryptocurrency executives.
Dark Reading8 · 18h ago

NSA Chief During Snowden Affair Shares Regrets, Reflections 13 Years Later

Chris Inglis was the head civilian in charge at the NSA when the Snowden leaks exploded. He gets candid about mistakes the organization made, and what CISOs need to know about spotting potential threats, media disclosures, and "enculturation."
Ars Technica8 · 19h ago

Flesh-eating bacteria devour man's arm and leg in just three days

When doctors saw him, his limbs were discolored and crackling.
Latest stories for ZDNET in Security8 · 20h ago

Over 80% of US government agencies already use AI agents - and it's only the beginning

A new survey finds most government leaders believe that by 2030, the public sector will consist of humans and AI agents working together.
Latest stories for ZDNET in Security8 · 20h ago

Microsoft finally open sources DOS 1.0 - and it's so much more than the code

Want a blast from the past? Microsoft just open-sourced its very first operating system, offering a rare insight into the PC's earliest days.
The Decoder8 · 21h ago

Here is what an LLM that knows nothing after 1930 thinks our world looks like in 2026

"Talkie" is a 13B-parameter language model trained only on texts written before 1931. It doubts a second world war will happen and pictures 2026 as a world of steamships, railroads, and penny novels. The article Here is what an LLM that knows nothing after 1930 thinks our world looks like in 2026 appeared first on The Decoder .
Security on TechRepublic8 · 22h ago

ADT Confirms Major Data Breach Exposing Millions of Names, Partial SSNs

ADT confirmed a data breach exposing customer names, addresses, phone numbers, and partial SSNs, with millions of records reportedly affected. The post ADT Confirms Major Data Breach Exposing Millions of Names, Partial SSNs appeared first on TechRepublic .
Dark Reading8 · 1d ago

Fresh Wave of GlassWorm VS Code Extensions Slices Through Supply Chain

Attackers continue to scale a campaign to seed Open VSX with seemingly benign VS Code extensions that spread self-propagating malware.
SANS ISC8 · 1d ago

HTTP Requests with X-Vercel-Set-Bypass-Cookie Header, (Tue, Apr 28th)

This weekend, we saw a few requests to our honeypot that included an "X-Vercel-Set-Bypass-Cookie" header. A sample request:
Malwarebytes Unpacked8IoCs DETECTED · 1d ago

Fake CAPTCHA scam turns a quick click into a costly phone bill

Scammers are using fake CAPTCHA pages to rack up international SMS charges on victims’ phone bills, and then take a cut.
The Hacker News8 · 1d ago

After Mythos: New Playbooks For a Zero-Window Era

When patching isn’t fast enough, NDR helps contain the next era of threats. If you’ve been tracking advancements in AI, you know the exploit window, the short buffer that organizations relied on to patch and protect after a vulnerability disclosure, is closing fast. Anthropic’s new model, Claude Mythos, and its Project Glasswing, showed that finding exploitable vulnerabilities and subtle cracks
IT Security Guru 8 · 1d ago

Beyond the perimeter: Why identity and cyber security are one single story

By James Odom, Director of Cyber, and Jim Small, Director of Identity at Hippo Digital   For years, identity and cyber security have been treated as separate disciplines, with identity focusing on authentication, onboarding and access and cyber security focusing on networks, monitoring and threat response. That separation made sense when systems had clearer boundaries. […] The post Beyond the perimeter: Why identity and cyber security are one single story appeared first on IT Security Guru .
Infosecurity8 · 1d ago

North Korean Hackers Target Crypto Firms with ClickFix and AI-Made Zoom Lures

Arctic Wolf attributed this large-scale spear-phishing campaign to BlueNoroff, a financially motivated subgroup of the Lazarus Group
Cyber Kendra8 · 1d ago

AI Agent Wiped a Startup's Entire Database in 9 Seconds — Then Confessed Every Rule It Broke

When Jer Crane sat down to run a routine infrastructure task on a Friday afternoon, he had no idea he was about to spend the entire weekend manually reconstructing three months of customer data from Stripe receipts and email confirmations. His AI coding agent had other plans — and it executed them in under 10 seconds. Crane is the founder of PocketOS, a SaaS platform that car rental businesses depend on for reservations, payments, and vehicle management. On April 24, his Cursor agent — runnin...
Latest stories for ZDNET in Security8 · 1d ago

My 5 favorite open source operating systems that aren't Linux

Looking for non-Linux open-source options? From ghosts of past operating systems to fascinating works in progress, here are my top picks.
Latest stories for ZDNET in Security8 · 1d ago

This hidden TV feature tracks your viewing - here's how to turn it off (no matter what brand)

Samsung, LG, and Sony TVs can pose privacy risks - here's how to avoid a major one.
The Hacker News7 · 1d ago

Microsoft Patches Entra ID Role Flaw That Enabled Service Principal Takeover

An administrative role meant for artificial intelligence (AI) agents within Microsoft Entra ID could enable privilege escalation and identity takeover attacks, according to new findings from Silverfort. Agent ID Administrator is a privileged built-in role introduced by Microsoft as part of its agent identity platform to handle all aspects of an AI agent's identity lifecycle operations in a
Infosecurity6 · 1d ago

Ransomware Turf War as 0APT and KryBit Groups Trade Blows

Ransomware groups 0APT and KryBit have doxxed each other online
Stack Overflow6 · 1d ago

Your LLM issues are really data issues

Ryan welcomes Harsha Chintalapani, co-founder and CTO at Collate and co-creator of Open Metadata, to the show to discuss why AI and LLMs struggle with real-time, structured production data.
[DRAGNET]5 · 18h ago

Broken VECT 2.0 ransomware acts as a data wiper for large files

Broken VECT 2.0 ransomware acts as a data wiper for large files    BleepingComputer
[DRAGNET]5 · 22h ago

Carnival Corporation Investigating Possible Ransomware Attack

Carnival Corporation Investigating Possible Ransomware Attack    TravelPulse
[DRAGNET]5 · 23h ago

Kent District Library says network outage was due to ransomware attack

Kent District Library says network outage was due to ransomware attack    WZZM13.com
[DRAGNET]5 · 23h ago

Ex-Ransomware Negotiator Pleads Guilty to Extorting U.S. Victims, $10M in Assets Seized

Ex-Ransomware Negotiator Pleads Guilty to Extorting U.S. Victims, $10M in Assets Seized    Carrier Management
[DRAGNET]5 · 1d ago

CPE Webcast: Defending yourself from ransomware third-party risks

CPE Webcast: Defending yourself from ransomware third-party risks    Compliance Week
[DRAGNET]5 · 1d ago

VECT 2.0 Ransomware Irreversibly Destroys Files Over 131KB on Windows, Linux, ESXi

VECT 2.0 Ransomware Irreversibly Destroys Files Over 131KB on Windows, Linux, ESXi    The Hacker News
[DRAGNET]5 · 1d ago

Some Kent District Library branches reopen as library system handles ransomware event

Some Kent District Library branches reopen as library system handles ransomware event    FOX 17 West Michigan News
[DRAGNET]5 · 1d ago

Iranian APT OilRig Hides Malware Config Inside Google Drive Image

Iranian APT OilRig Hides Malware Config Inside Google Drive Image    cyberpress.org
[DRAGNET]5 · 1d ago

Qilin Ransomware Attack Targets French IT Distributor Exclusive Networks

Qilin Ransomware Attack Targets French IT Distributor Exclusive Networks    DeXpose
[DRAGNET]0 · 19h ago

Feuding Ransomware Groups Leak Each Other's Data

Feuding Ransomware Groups Leak Each Other's Data    Dark Reading
[DRAGNET]0 · 23h ago

How Dell PowerMaxOS 10.4 Bakes in Ransomware Resilience

How Dell PowerMaxOS 10.4 Bakes in Ransomware Resilience    Cyber Magazine
[DRAGNET]0 · 1d ago

Guardz Warns MSPs of Cloud Ransomware and BEC Risks

Guardz Warns MSPs of Cloud Ransomware and BEC Risks    Channel Insider
[DRAGNET]0 · 1d ago

Ransomware accounts for 90% of cyber losses in manufacturing

Ransomware accounts for 90% of cyber losses in manufacturing    Intelligent Insurer
[DRAGNET]0 · 1d ago

ANZ Ransomware Threats Rise as Attacks Grow More Advanced

ANZ Ransomware Threats Rise as Attacks Grow More Advanced    Cyble
[DRAGNET]0 · 1d ago

Charities hit by more ransomware attacks than any other SME

Charities hit by more ransomware attacks than any other SME    Charity Times
[DRAGNET]0 · 1d ago

Qilin Ransomware Attack on Inspira in Puerto Rico

Qilin Ransomware Attack on Inspira in Puerto Rico    DeXpose
[DRAGNET]0 · 1d ago

Incransom Targets Reddy Cardiology in Ransomware Attack

Incransom Targets Reddy Cardiology in Ransomware Attack    DeXpose
[DRAGNET]0 · 1d ago

DragonForce Targets FAT Brands Inc. in Ransomware Attack

DragonForce Targets FAT Brands Inc. in Ransomware Attack    DeXpose
[DRAGNET]0 · 1d ago

DragonForce Ransomware Attack on Wm. Sopko & Sons Co.

DragonForce Ransomware Attack on Wm. Sopko & Sons Co.    DeXpose
[DRAGNET]0 · 1d ago

Payload Ransomware Strikes Rural Municipality of Gimli

Payload Ransomware Strikes Rural Municipality of Gimli    DeXpose
[DRAGNET]0 · 1d ago

TridentLocker Ransomware Targets UK-Based RT Software

TridentLocker Ransomware Targets UK-Based RT Software    DeXpose
[DRAGNET]0 · 1d ago

Qilin Ransomware Strikes Lifeline PCS

Qilin Ransomware Strikes Lifeline PCS    DeXpose
[DRAGNET]0 · 1d ago

Rhysida Ransomware Attack on Stelia North America

Rhysida Ransomware Attack on Stelia North America    DeXpose
[DRAGNET]0 · 1d ago

Qilin Ransomware Targets Leone Film Group SpA

Qilin Ransomware Targets Leone Film Group SpA    DeXpose
[DRAGNET]0 · 1d ago

APT73/Bashe Ransomware Attack on Medika Plaza

APT73/Bashe Ransomware Attack on Medika Plaza    DeXpose
[DRAGNET]-35 · 22h ago

Vect ransomware actually destructive wiper malware

Vect ransomware actually destructive wiper malware    Computer Weekly
[DRAGNET]-40 · 23h ago

Lesli Linka Glatter on Making 'Zero Day,' Anti-Trump Robert De Niro

Lesli Linka Glatter on Making 'Zero Day,' Anti-Trump Robert De Niro    Variety
[DRAGNET]-40 · 1d ago

77% of Organizations Hit by Insider Data Loss in 2025: New Report Reveals Widening Recovery Gap

77% of Organizations Hit by Insider Data Loss in 2025: New Report Reveals Widening Recovery Gap    The Globe and Mail
[DRAGNET]-45 · 21h ago

Don’t pay VECT a ransom - your big files are likely gone

Don’t pay VECT a ransom - your big files are likely gone    theregister.com
[DRAGNET]-80 · 22h ago

Lesli Linka Glatter Talks Decades-Spanning Career, Working With Anti-Trump Robert De Niro on ‘Zero Day’ – and Why Everyone Needs a Moose Head on the Table

Lesli Linka Glatter Talks Decades-Spanning Career, Working With Anti-Trump Robert De Niro on ‘Zero Day’ – and Why Everyone Needs a Moose Head on the Table    IMDb