Recon

RECON

Updated 4m ago
High-Signal Security Intelligence

2026-04-29

Cybersecurity News335IN STACK · 13h ago

CISA Sounds the Alarm: State-Sponsored Hackers Weaponize New Windows and ScreenConnect Flaws

The post CISA Sounds the Alarm: State-Sponsored Hackers Weaponize New Windows and ScreenConnect Flaws appeared first on Daily CyberSecurity . Related posts: The Zero-Click Vulnerability: Akamai Uncovers Incomplete Patch for APT28 Exploit CISA Adds 5 Actively Exploited Vulnerabilities to KEV Catalog: ASUS Routers, Craft CMS, and ConnectWise Targeted CISA Adds 2008 Windows Flaw & Chrome Zero-Day to KEV
unSafe.sh - 不安全223IN STACK · 8h ago

How I Fixed Windows Installation - BitLocker, a Write-Protected USB, and the IRST Rabbit Hole

New StorybySarath Chandra Vidya Sagar MachupallibySarath Chandra Vidya Sagar Machupalli@vidyasagarm
[DRAGNET]208IN STACK · 2h ago

VECT 2.0 Ransomware Wipes Large Files Across Windows, Linux & ESXi

VECT 2.0 Ransomware Wipes Large Files Across Windows, Linux & ESXi    gbhackers.com
unSafe.sh - 不安全208IN STACK · 7h ago

U.S. CISA adds Microsoft Windows Shell and ConnectWise ScreenConnect flaws to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Microsoft Windows Shell and ConnectWise ScreenConnect flaws to its Kno
Latest stories for ZDNET in Security205IN STACK · 3h ago

5 ways your Windows updates are about to get a lot less painful

Microsoft wants to fix 'pain points' in Windows 11 PCs. The first batch of changes, targeting the Windows Update experience, is hitting Insider preview channels and coming soon to your desktop.
unSafe.sh - 不安全200IN STACK · 4h ago

代码编辑器Notepad++登陆macOS平台

代码编辑器Notepad++登陆macOS平台备受欢迎的Notepad++代码编辑器现已推出原生的macOS应用。这得益于开源社区成功将其原始的Windows代码库移植过来。此替代方案作为一个通用二进
VulDB Recent Entries139 · 11h ago

CVE-2026-7344 | Google Chrome up to 147.0.7727.117 on Windows Accessibility use after free (ID 503419)

A vulnerability was found in Google Chrome on Windows and classified as critical . The impacted element is an unknown function of the component Accessibility . Executing a manipulation can lead to use after free. This vulnerability is registered as CVE-2026-7344 . It is possible to launch the attack remotely. No exploit is available. It is suggested to upgrade the affected component.
VulDB Recent Entries139 · 11h ago

CVE-2026-7343 | Google Chrome up to 147.0.7727.117 on Windows Views use after free (ID 503645)

A vulnerability has been found in Google Chrome on Windows and classified as critical . The affected element is an unknown function of the component Views . Performing a manipulation results in use after free. This vulnerability is cataloged as CVE-2026-7343 . It is possible to initiate the attack remotely. There is no exploit available. The affected component should be upgraded.
VulDB Recent Entries139 · 11h ago

CVE-2026-7340 | Google Chrome up to 147.0.7727.117 on Windows ANGLE integer overflow (ID 497896 / EUVD-2026-26166)

A vulnerability, which was classified as critical , has been found in Google Chrome on Windows. This issue affects some unknown processing of the component ANGLE . This manipulation causes integer overflow. This vulnerability is tracked as CVE-2026-7340 . The attack is possible to be carried out remotely. No exploit exists. It is advisable to upgrade the affected component.
Cybersecurity News102 · 14h ago

Chrome Security Alert: Google Patches 30 Vulnerabilities in Massive Desktop Update

The post Chrome Security Alert: Google Patches 30 Vulnerabilities in Massive Desktop Update appeared first on Daily CyberSecurity . Related posts: Google Patches Actively Exploited Chrome Zero-Day Flaw (CVE-2025-13223) in Emergency Update Critical Alert: Chrome Zero-Day (CVE-2026-2441) Exploited in the Wild Urgent Patch: Massive Google Chrome Update Patches 26 Flaws, Including 3 Critical Bugs
Cybersecurity News101 · 14h ago

cPanel Issues Emergency Patch for All Supported Versions

The post cPanel Issues Emergency Patch for All Supported Versions appeared first on Daily CyberSecurity . Related posts: Leaving the Doors Unlocked: Critical 9.0 CVSS ScreenConnect Flaw Exposes Machine Keys Urgent Patch: Massive Google Chrome Update Patches 26 Flaws, Including 3 Critical Bugs CVE-2026-4631: Critical 9.8 RCE Flaw in Cockpit Allows Unauthenticated Server Takeover
Rapid7 Blog73 · 3h ago

Experts on Experts: The 2026 Threat Landscape is Moving Faster than Defenders Expect

This week on Experts on Experts, I’m joined by Christiaan Beek, Rapid7’s VP of Threat Analytics, to talk through what we’re seeing in the 2026 threat landscape and how it connects to recent research coming out of Rapid7 Labs. We start with the report, but quickly move into what’s already playing out in active campaigns. What stands out is not a change in attacker technique, but the pace. Weak credentials, missing MFA, exposed services, and unpatched systems still drive most intrusions. What h...
Cybersecurity News36 · 2h ago

Label Leak: Hardcoded Credentials in Snap One WattBox Devices Open Door to Root Access

The post Label Leak: Hardcoded Credentials in Snap One WattBox Devices Open Door to Root Access appeared first on Daily CyberSecurity . Related posts: Race Against the Clock: The 10-Minute Window Granting Root RCE in Nginx UI Linux Kernel Flaw (CVE-2023-0386) Actively Exploited for Root Privilege Escalation, PoC Available Maximum 10.0 CVSS Flaws in OneUptime Allow Full Account Takeovers and RCE
BleepingComputer35 · 2h ago

GitHub fixes RCE flaw that gave access to millions of private repos

In early March, GitHub patched a critical remote code execution vulnerability (CVE-2026-3854) that could have allowed attackers to access millions of private repositories. [...]
Elastic Security Labs35 · 15h ago

CI/CD pipeline abuse: the problem no one is watching

How we built an open-source, drop-in CI template that uses signal extraction and LLM reasoning to catch CI/CD abuse in GitHub Actions, GitLab CI, and Azure DevOps pipelines.
The Hacker News34 · 3h ago

Webinar: How to Automate Exposure Validation to Match the Speed of AI Attacks

In February 2026, researchers uncovered a shift that completely changed the game: threat actors are now using custom AI setups to automate attacks directly into the kill chain. We aren't just talking about AI writing better phishing emails anymore. We’re talking about autonomous agents mapping Active Directory and seizing Domain Admin credentials in minutes. The problem? Most defensive workflows
The Register (Security)32 · 2h ago

GitHub: Woah, a genuinely helpful AI-assisted bug report that isn't total slop. Here, Wiz, take this wad of cash

Claude ploughs through months of work in rapid time, helps Wiz researchers nab lucrative award Wiz researchers are set for a tidy payday thanks to their discovery of a high-severity flaw in GitHub's git infrastructure that handed remote attackers full read/write access to private GitHub repositories using a single command.…
The Hacker News28 · 10h ago

LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure

In yet another instance of threat actors quickly jumping on the exploitation bandwagon, a newly disclosed critical security flaw in BerriAI's LiteLLM Python package has come under active exploitation in the wild within 36 hours of the bug becoming public knowledge. The vulnerability, tracked as CVE-2026-42208 (CVSS score: 9.3), is an SQL injection that could be exploited to modify the underlying
Infosecurity24 · 2h ago

Researchers Track 2.9 Billion Compromised Credentials

KELA claims infostealers remained the primary access vector for attacks in 2025
OpenAI Blog24 · 11h ago

Cybersecurity in the Intelligence Age

OpenAI outlines a five-part action plan for strengthening cybersecurity in the Intelligence Age, focused on democratizing AI-powered cyber defense and protecting critical systems.
Bitdefender Labs23 · 2h ago

Operation Road Trap: Fake toll and parking texts are spreading worldwide

A new mass smishing campaign uncovered by Bitdefender Labs shows that scammers are sending tens of thousands of fraudulent text messages to mobile users across 12 countries, impersonating transport authorities, toll operators, and parking services. Key takeaways * Since December 2025, Bitdefender Labs researchers have been tracking smishing campaigns targeting drivers on a global scale. The scam campaigns are still active as of April 2026 * Over 79,000 fraudulent messages have already been
Security Boulevard23 · 3h ago

Deploying SafePaaS in Oracle E‑Business Suite: A 90‑Day Blueprint to Continuous, Independent Control Monitoring

This blueprint shows how a large Oracle E‑Business Suite (EBS) enterprise deploys SafePaaS as an independent control layer alongside EBS, identity providers, and identity governance and administration (IGA), and how it operates day to day once live. It is designed for complex, audit‑intensive EBS environments with multiple operating units, sets of books and ledgers, recurring […] The post Deploying SafePaaS in Oracle E‑Business Suite: A 90‑Day Blueprint to Continuous, Independent Control Moni...
ElcomSoft blog22 · 7h ago

New Security Features and Low-Level Extraction of iOS 26

We updated iOS Forensic Toolkit, adding low-level extraction support for iOS 26 and 26.0.1 via the extraction agent. This support is available for most iPhones and iPads compatible with the iOS 26 branch with a notable exception of the iPhone 17 range and M5-based iPads. Why exactly are these devices exempt, and what else did […]
BleepingComputer21 · 2h ago

Learning from the Vercel breach: Shadow AI & OAuth sprawl

A single third-party OAuth integration can become a direct path into your environment. Push explains how the Vercel breach shows a compromised OAuth app can lead to widespread impact across downstream customers. [...]
Hacker News Frontpage21 · 3h ago

Show HN: Adblock-rust Manager – Firefox extension to enable the Brave ad blocker

Firefox 149 ships adblock-rust (Brave's Rust engine, MPL-2.0) completely disabled with no UI. It's controlled by two about:config prefs with no WebExtension API, so you can't touch them programmatically from a standard extension. This extension gives it a UI: ETP toggle (via browser.privacy API, instant), filter list manager with clipboard helpers for the manual about:config steps, and 8 preset lists. You can also add your own if you so desire. Comments URL: https://news.ycombinator.com/item?...
The Record from Recorded Future News20 · 1h ago

Swiss police arrest 10 suspected members of Nigeria-linked crime group Black Axe

Swiss and German law enforcement have arrested 10 suspected members of the Nigerian criminal network Black Axe, including a regional leader believed to oversee operations in Southern Europe.
Dark Reading20 · 2h ago

Lotus Wiper Attack Targets Venezuelan Energy Firms, Utilities

An analysis of the destructive malware reveals sophisticated living-off-the-land (LotL) techniques and detailed strategies for the widespread deletion of data.
Security Boulevard20 · 3h ago

Deploying SafePaaS for Oracle ERP Cloud: A 90‑Day Blueprint to Strengthen Risk Management

This blueprint shows how an Oracle ERP Cloud customer deploys SafePaaS as an independent control layer and how it operates day to day once live. It is designed for complex, audit‑intensive Oracle Cloud environments with multi‑entity footprints, connected SaaS applications, recurring external audits, and growing pressure to prove that Oracle‑generated evidence is complete, accurate, and […] The post Deploying SafePaaS for Oracle ERP Cloud: A 90‑Day Blueprint to Strengthen Risk Management appea...
The Register (Security)20 · 3h ago

EU waves through open source age-check tool to keep kids safe online

'Online platforms can rely on our app,' says Commish, 'there are no more excuses' The European Commission has recommended EU member states adopt an age verification app designed to protect children from harmful online content.…
[DRAGNET]20 · 3h ago

VECT ransomware, which is used by the masses, is incapable of file decryption, researchers warn

VECT ransomware, which is used by the masses, is incapable of file decryption, researchers warn    Cybernews
The Verge20 · 4h ago

Meta isn’t doing enough to keep kids off Facebook and Instagram, rules EU

Meta is breaching Europe's Digital Services Act (DSA) rules by failing to prevent children under 13 from using Facebook and Instagram, according to a preliminary decision issued by the European Commission. The Commission announced the ruling on Wednesday after an almost two-year investigation, saying that Meta doesn't have adequate measures in place to stop under-13s […]
HackerNoon20 · 8h ago

How I Fixed Windows Installation - BitLocker, a Write-Protected USB, and the IRST Rabbit Hole

Friend's HP laptop locked behind BitLocker — no recovery key, no choice but to reinstall Windows. Three things broke in sequence: USB write-protected — FAT32 format was the culprit. Fixed with diskpart clean and reformatting as exFAT. SSD invisible to the installer — HP's 11th-gen Intel processor needs IRST drivers the Media Creation Tool doesn't ship with. Downloaded from HP Support, extracted the F6 folder, loaded iaStorVD.inf during setup. Install froze at 15% — FAT32's 4 GB file size limi...
The Hacker News19 · 4h ago

What to Look for in an Exposure Management Platform (And What Most of Them Get Wrong)

Every security team has a version of the same story. The quarter ends with hundreds of vulnerabilities closed. The dashboards are bursting with green. Then someone in a leadership meeting asks: "So, are we actually safer now?" Crickets. The room goes quiet because an honest answer requires context – which is something that patch counts and CVSS scores were never designed to provide. Exposure
Hacker News Frontpage18 · 2h ago

Improving ICU handovers by learning from Scuderia Ferrari F1 team

Article URL: https://healthmanagement.org/c/icu/IssueArticle/improving-handovers-by-learning-from-scuderia-ferrari Comments URL: https://news.ycombinator.com/item?id=47947834 Points: 3 # Comments: 0
Hacker News Frontpage18 · 2h ago

Letting AI play my game – building an agentic test harness to help play-testing

Article URL: https://blog.jeffschomay.com/letting-ai-play-my-game Comments URL: https://news.ycombinator.com/item?id=47947525 Points: 3 # Comments: 0
Hacker News Frontpage18 · 2h ago

He asked AI to count carbs 27000 times. It couldn't give the same answer twice

Article URL: https://www.diabettech.com/i-asked-ai-to-count-my-carbs-27000-times-it-couldnt-give-me-the-same-answer-twice/ Comments URL: https://news.ycombinator.com/item?id=47947490 Points: 82 # Comments: 79
Hacker News Frontpage18 · 4h ago

GitHub – DOS 1.0: Transcription of Tim Paterson's DOS Printouts

Article URL: https://github.com/DOS-History/Paterson-Listings Comments URL: https://news.ycombinator.com/item?id=47946813 Points: 16 # Comments: 0
BleepingComputer17 · 5h ago

CISA orders feds to patch Windows flaw exploited as zero-day

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ordered federal agencies to secure their Windows systems against a vulnerability exploited in zero-day attacks. [...]
[DRAGNET]17 · 5h ago

Ransomware accidentally destroys all files larger than 128KB, preventing decryption — VECT code likely partly vibe coded with AI or used an old code base, security researchers suggest

Ransomware accidentally destroys all files larger than 128KB, preventing decryption — VECT code likely partly vibe coded with AI or used an old code base, security researchers suggest    Tom's Hardware
The Verge17 · 5h ago

GitHub rushed to fix a critical vulnerability in less than six hours

GitHub employees fixed a critical remote code execution vulnerability in less than six hours last month. Wiz Research used AI models to uncover a vulnerability in GitHub's internal git infrastructure that could have allowed attackers to access millions of public and private code repositories. "Our security team immediately began validating the bug bounty report. Within […]
The Register (Security)17 · 5h ago

GoDaddy customer claims registrar transferred 27-year-old domain without any security checks

32 phone calls, 17 email chains, a 5-day ordeal, and no help during the daddy of all stuffups, claim those affected GoDaddy is currently investigating claims that it handed complete control of a valid 27-year-old domain to another customer, without requiring them to pass any authentication processes or upload any supporting documents.…
The Register (Security)17 · 9h ago

30 ClawHub skills secretly turn AI agents into a crypto swarm

Yet another reason not to feast on OpenClaw Thirty ClawHub skills published by a single author are silently co-opting AI agents and creating a mass cryptocurrency mining swarm – without any malware or user consent.…
Phoronix (Linux)16 · 15h ago

Valve Updates GameNetworkingSockets After Nearly Four Year Hiatus

Back in 2018, Valve open-sourced their Steam networking sockets library as a basic network transport layer for games. This library is used by games from Counter-Strike to Dota 2 and since its public open-source drop has been picked up elsewhere. Finally after going nearly four years without a new version, GameNetworkingSockets v1.5 dropped today...
Hacker News Frontpage15 · 3h ago

Coffee with a splash of physics: how to make the most out of your brew

Article URL: https://physicsworld.com/a/coffee-with-a-splash-of-physics-how-to-make-the-most-out-of-your-brew/ Comments URL: https://news.ycombinator.com/item?id=47947318 Points: 4 # Comments: 0
Hacker News Frontpage15 · 3h ago

HashiCorp co-founder says GitHub 'no longer a place for serious work'

Article URL: https://www.theregister.com/2026/04/29/mitchell_hashimoto_ghostty_quitting_github/ Comments URL: https://news.ycombinator.com/item?id=47946958 Points: 24 # Comments: 5
Hacker News Frontpage15 · 4h ago

Two-thirds of babies watch screens – some for eight hours a day

Article URL: https://www.thetimes.com/uk/technology-uk/article/babies-and-under-2s-screen-time-6jbdmnjlg Comments URL: https://news.ycombinator.com/item?id=47946657 Points: 12 # Comments: 4
Hacker News Frontpage15 · 8h ago

Low-Compilation-Cost Register Allocation in LLVM-Based Binary Translation

Article URL: https://dl.acm.org/doi/abs/10.1145/3767295.3803591 Comments URL: https://news.ycombinator.com/item?id=47944931 Points: 22 # Comments: 0
SecurityWeek15 · 9h ago

Critical GitHub Vulnerability Exposed Millions of Repositories

The remote code execution flaw CVE-2026-3854 was found to impact GitHub.com and GitHub Enterprise Server. The post Critical GitHub Vulnerability Exposed Millions of Repositories appeared first on SecurityWeek .
SANS ISC15 · 13h ago

ISC Stormcast For Wednesday, April 29th, 2026 https://isc.sans.edu/podcastdetail/9910, (Wed, Apr 29th)

ISC Stormcast For Wednesday, April 29th, 2026 https://isc.sans.edu/podcastdetail/9910, (Wed, Apr 29th)
Hacker News Frontpage13 · 20m ago

Mistral Medium 3.5

Article URL: https://mistral.ai/news/vibe-remote-agents-mistral-medium-3-5 Comments URL: https://news.ycombinator.com/item?id=47949642 Points: 11 # Comments: 1
Hacker News Frontpage13 · 1h ago

Zed is 1.0

Article URL: https://zed.dev/blog/zed-1-0 Comments URL: https://news.ycombinator.com/item?id=47949027 Points: 249 # Comments: 70
Hacker News Frontpage13 · 1h ago

Tangled – We need a federation of forges

Article URL: https://blog.tangled.org/federation/ Comments URL: https://news.ycombinator.com/item?id=47948603 Points: 180 # Comments: 107
Hacker News Frontpage13 · 2h ago

Notepad++ Code Editor Comes to Mac After 20-Year Wait

Article URL: https://www.macrumors.com/2026/04/29/notepad-plus-plus-editor-comes-to-mac/ Comments URL: https://news.ycombinator.com/item?id=47947740 Points: 9 # Comments: 1
unSafe.sh - 不安全13 · 5h ago

Claude Mythos Preview 模型能力解析:大模型攻防实测与企业应对建议

阅读: 0本文为绿盟科技针对 AI 威胁的安全研究报告,聚焦 Anthropic 发布的 Claude Mythos Preview 模型。该模型具备自主 0day
The Hacker News13IoCs DETECTED · 6h ago

Critical cPanel Authentication Vulnerability Identified — Update Your Server Immediately

cPanel has released security updates to address a security issue impacting various authentication paths that could allow an attacker to obtain access to the control panel software. The problem affects all currently supported versions, according to an alert released by cPanel on Tuesday. The issue has been addressed in the following versions - 11.110.0.97 11.118.0.63 11.126.0.54 11.132.0.29
The Hacker News13 · 6h ago

CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting ConnectWise ScreenConnect and Microsoft Windows to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerabilities are listed below - CVE-2024-1708 (CVSS score: 8.4) - A path traversal vulnerability in  ConnectWise ScreenConnect
[DRAGNET]11 · 2h ago

Over 2.8 billion credentials stolen in 2025 as ransomware evolves

Over 2.8 billion credentials stolen in 2025 as ransomware evolves    BetaNews
Security Boulevard11 · 3h ago

Hackernoon | Why Cloud Monitoring Has Become K–12’s Most Critical Cyber Defense Tool

This article was originally published in Hackernoon on 04/23/26 by Charlie Sander. It starts with a simple student login… One account gets phished, a file is dropped into a shared drive, and within minutes, malware has synced and spread across the entire network. By the time IT teams notice, the damage is already systemic – ... The post Hackernoon | Why Cloud Monitoring Has Become K–12’s Most Critical Cyber Defense Tool appeared first on ManagedMethods Cybersecurity, Safety & Compliance for K...
Security Boulevard11 · 3h ago

Inside the SafePaaS + Oracle ERP Architecture: Security Context and Data Flows

SafePaaS sits alongside Oracle ERP, not inside it. It acts as an independent, policy‑driven control plane that ingests Oracle configuration and activity, ties it to your identity sources and connected apps, and continuously turns that data into evidence auditors can trust. The goal of this guide is to show, in practical terms, how that architecture […] The post Inside the SafePaaS + Oracle ERP Architecture: Security Context and Data Flows appeared first on SafePaaS . The post Inside the SafeP...
The Decoder11 · 3h ago

Google rolls out Gemini memory in Europe and wants you to bring your ChatGPT data along

Gemini can now remember your preferences and import your chat history from other AI apps. The article Google rolls out Gemini memory in Europe and wants you to bring your ChatGPT data along appeared first on The Decoder .
Phoronix (Linux)11 · 5h ago

Wayland Developers Target June For Weston 16 Release

Weston 16.0 could ship by the end of June with good color management and HDR support along with other new features for this reference Wayland compositor...
Exploit-DB.com RSS Feed11 · 15h ago

[local] OpenWrt 23.05 - Authenticated Remote Code Execution (RCE)

OpenWrt 23.05 - Authenticated Remote Code Execution (RCE)
Exploit-DB.com RSS Feed11 · 15h ago

[webapps] GUnet OpenEclass E-learning platform < 4.2 - Remote Code Execution (RCE)

GUnet OpenEclass E-learning platform < 4.2 - Remote Code Execution (RCE)
SecurityWeek10 · 3h ago

Hundreds of Internet-Facing VNC Servers Expose ICS/OT

Forescout has identified tens of thousands of exposed RDP and VNC servers that can be mapped to specific industries. The post Hundreds of Internet-Facing VNC Servers Expose ICS/OT appeared first on SecurityWeek .
Hacker News Frontpage10 · 3h ago

Stardex Is Hiring a Founding Customer Success Lead

Article URL: https://www.ycombinator.com/companies/stardex/jobs/6GCK1HC-founding-customer-success-lead Comments URL: https://news.ycombinator.com/item?id=47947125 Points: 0 # Comments: 0
SecurityWeek10 · 4h ago

Checkmarx Confirms Data Stolen in Supply Chain Attack

The hackers exfiltrated the data from Checkmarx’s GitHub environment on March 30, a week after publishing malicious code. The post Checkmarx Confirms Data Stolen in Supply Chain Attack appeared first on SecurityWeek .
SecurityWeek10 · 5h ago

Iranian Cyber Group Handala Targets US Troops in Bahrain

US service members received WhatsApp messages claiming they would be targeted with drones and missiles. The post Iranian Cyber Group Handala Targets US Troops in Bahrain appeared first on SecurityWeek .

Ghost Bits,Java WAF之殇?

在前两天的BlacksetHat Asia 2026上,@浅蓝和@1ua分享一个非常有趣的议题,Java中的GhostBits漏洞 https://i.blackhat.com/Asia-26/Presentations/Asia-26-Bai-Cast-Attack-Ghost-Bits-4.23.pdf 探究深度非常深,影响范围非常之广,内容非常有意思
[DRAGNET]10 · 5h ago

CISA Alerts on Microsoft Windows Shell Zero-Day Under Active Exploitation

CISA Alerts on Microsoft Windows Shell Zero-Day Under Active Exploitation    cyberpress.org
SecurityWeek10 · 5h ago

38 Vulnerabilities Found in OpenEMR Medical Software

Some of the vulnerabilities discovered by Aisle can be exploited to access and alter sensitive patient information. The post 38 Vulnerabilities Found in OpenEMR Medical Software appeared first on SecurityWeek .
SecurityWeek10 · 6h ago

Chrome 147, Firefox 150 Security Updates Rolling Out

The browser refreshes resolve critical and high-severity vulnerabilities that could lead to arbitrary code execution. The post Chrome 147, Firefox 150 Security Updates Rolling Out appeared first on SecurityWeek .
Hacker News Frontpage10 · 6h ago

Show HN: Rip.so – a graveyard for dead internet things

Article URL: https://rip.so Comments URL: https://news.ycombinator.com/item?id=47945955 Points: 5 # Comments: 3
Hacker News Frontpage10 · 6h ago

Soft launch of open-source code platform for government

Article URL: https://www.nldigitalgovernment.nl/news/soft-launch-for-government-open-source-code-platform/ Comments URL: https://news.ycombinator.com/item?id=47945918 Points: 3 # Comments: 0
Hacker News Frontpage10 · 6h ago

Why Law Is Law-Shaped

Article URL: https://lawvm.org/why-law-is-law-shaped/ Comments URL: https://news.ycombinator.com/item?id=47945861 Points: 4 # Comments: 0
Hacker News Frontpage10 · 8h ago

Wire to Replace Signal as Standard in the Bundestag

Article URL: https://www.heise.de/en/news/Digital-Sovereignty-Wire-to-Replace-Signal-as-Standard-in-the-Bundestag-11275755.html Comments URL: https://news.ycombinator.com/item?id=47945192 Points: 39 # Comments: 32
Hacker News Frontpage10 · 8h ago

Germany Overtakes US in Ammunition Production Capacity

Article URL: https://www.newsweek.com/germany-overtakes-us-in-ammunition-production-capacity-11886409 Comments URL: https://news.ycombinator.com/item?id=47944924 Points: 10 # Comments: 0
Hacker News Frontpage10 · 8h ago

HardenedBSD Is Now Officially on Radicle

Article URL: https://hardenedbsd.org/article/shawn-webb/2026-04-26/hardenedbsd-officially-radicle Comments URL: https://news.ycombinator.com/item?id=47944864 Points: 11 # Comments: 1
Hacker News Frontpage10 · 13h ago

Bugs Rust won't catch

Article URL: https://corrode.dev/blog/bugs-rust-wont-catch/ Comments URL: https://news.ycombinator.com/item?id=47943499 Points: 141 # Comments: 46
Hacker News Frontpage10 · 14h ago

When the Internet Was a Place

Article URL: https://www.frontporchrepublic.com/2025/09/when-the-internet-was-a-place/ Comments URL: https://news.ycombinator.com/item?id=47943190 Points: 30 # Comments: 4
Hacker News Frontpage10 · 14h ago

We decreased our LLM costs with Opus

Article URL: https://www.mendral.com/blog/frontier-model-lower-costs Comments URL: https://news.ycombinator.com/item?id=47942903 Points: 78 # Comments: 25
404 Media8 · 2h ago

Apple Fixes Bug That Let FBI Extract Deleted Signal Messages After 404 Media Coverage

The move comes directly in response to 404 Media’s coverage about how the FBI was able to recover incoming Signal messages from an iPhone because the messages were saved in the device’s notification storage.
Freek Van der Herten8 · 3h ago

How to monitor your Laravel app for critical vulnerabilities using Oh Dear

This practical guide shows how to use spatie/laravel-health together with Oh Dear to detect vulnerable Composer dependencies in production and get alerted quickly. It also shows how adding composer audit in CI gives you an extra early warning layer. Read more
Security Boulevard8 · 3h ago

AI-Powered Legacy System Transformation: Solving Technical Debt & Integration Challenges

Your legacy systems are not just outdated. They are actively slowing down growth, inflating costs, and limiting your ability to compete. Every workaround, every patch,... Read More The post AI-Powered Legacy System Transformation: Solving Technical Debt & Integration Challenges appeared first on ISHIR | Custom AI Software Development Dallas Fort-Worth Texas . The post AI-Powered Legacy System Transformation: Solving Technical Debt & Integration Challenges appeared first on Security Boulevard .
Ars Technica8 · 3h ago

School-shooting lawsuits accuse OpenAI of hiding violent ChatGPT users

Lawsuits: OpenAI didn't report ChatGPT user to cops to protect Altman, IPO.
The Verge8 · 3h ago

Electric air taxis are finally taking flight — just not with passengers

It was the perfect day for an electric air taxi demonstration - albeit one without passengers. On Monday, an electric aircraft from Joby Aviation took off from JFK Airport for a flight demonstrating the company's future air taxi route to Manhattan. The aircraft - egg-shaped cabin, six tilt-rotor propellers, electric motor - made its way […]
Security Boulevard8 · 3h ago

Oracle Control Evidence: What Auditors Really Want You to Prove

When auditors ask where your Oracle control evidence comes from, the answer is often more complex than it appears. For most Oracle application and platform teams, it’s a mix of Oracle reports, Oracle Risk Management Cloud dashboards, identity exports, and a spreadsheet layer that only a few people fully understand. That’s exactly where independence and […] The post Oracle Control Evidence: What Auditors Really Want You to Prove appeared first on SafePaaS . The post Oracle Control Evidence: Wh...
[DRAGNET]8 · 4h ago

Experts warn this "broken" ransomware is now acting as a data wiper

Experts warn this "broken" ransomware is now acting as a data wiper    TechRadar
爱范儿8 · 4h ago

开源版的 GPT Image 2,信息图、连续图文、本地部署全拿下|商汤SenseNova U1实测

国产开源版的「最强平替」 #欢迎关注爱范儿官方微信公众号:爱范儿(微信号:ifanr),更多精彩内容第一时间为您奉上。
[DRAGNET]8 · 4h ago

TeamPCP-linked VECT 2.0 ransomware unintentionally destroys files larger than 128 KB

TeamPCP-linked VECT 2.0 ransomware unintentionally destroys files larger than 128 KB    SC Media
Malwarebytes Unpacked8IoCs DETECTED · 4h ago

Scam-checking just got a lot easier: Malwarebytes is now in Claude

We're in Claude! Now everyone can use our threat intel to check suspicious links, phone numbers, or email addresses. We're committed to helping you spot scams.
unSafe.sh - 不安全8 · 4h ago

Scam-checking just got a lot easier: Malwarebytes is now in Claude

The post Scam-checking just got a lot easier: Malwarebytes is now in Claude  appeared first on M
unSafe.sh - 不安全8 · 4h ago

Scam-checking just got a lot easier: Malwarebytes is now in Claude

For years, Malwarebytes has protected people by going where they are, and where people are to
Infosecurity8 · 4h ago

Critical Flaw Turns Vect Ransomware into Data Destroying Wiper

The Vect 2.0 ransomware wipes large files instead of merely encrypting them, making recovery impossible – even for the attackers
[DRAGNET]8 · 4h ago

Critical Flaw Turns Vect Ransomware into Data Destroying Wiper

Critical Flaw Turns Vect Ransomware into Data Destroying Wiper    Infosecurity Magazine
Phoronix (Linux)8 · 5h ago

Libcamera 0.7.1 Released With Improved Software ISP

Libcamera 0.7.1 released on Tuesday as the newest feature release for this open-source library for camera image signal processors (ISPs) that has grown of importance for the likes of Raspberry Pi and Chrome OS and modern desktop Linux distributions with modern laptop hardware like recent Intel Core (Ultra) laptops...
unSafe.sh - 不安全8 · 5h ago

Claude Mythos Has Found 271 Zero-Days in Firefox

The post Claude Mythos Has Fo
unSafe.sh - 不安全8 · 5h ago

Claude Mythos Has Found 271 Zero-Days in Firefox

That’s a lot. No, it’s an extraordinary number:Since February, the Firefox team has been
SitePoint8 · 5h ago

7 Best Design Tools and Resources to Speed Up Your Workflow in 2026

Discover the best design tools and resources for 2026. Build faster with AI, optimize workflows, and create high-performing websites with ease. Continue reading 7 Best Design Tools and Resources to Speed Up Your Workflow in 2026 on SitePoint .
Phoronix (Linux)8 · 5h ago

Devuan Developer Working On Reviving GTK2 With Modern Fixes

A Devuan developer, the Linux distribution that provides a Debian-based operating system without dependence on systemd, is working on "gtk2-ng" for providing modern fixes and improvements to the old GTK2 toolkit...
Latest stories for ZDNET in Security8 · 5h ago

The best VPN services for iPhone in 2026: Expert tested and reviewed

Your iPhone content and web activities say a lot about you. Use one of our top tried-and-tested VPNs to keep your information private and to boost your online security.
unSafe.sh - 不安全8 · 5h ago

AI Usage Monitoring: How to See Everything Your Employees Are Doing with AI – FireTail Blog

The post AI Usage Monitoring:
The Decoder8 · 6h ago

With Nemotron 3 Nano Omni, Nvidia reveals what really goes into a modern multimodal model

Nvidia releases Nemotron 3 Nano Omni, an open multimodal model for text, image, video and audio. Not only the performance is exciting, but also a look at the training data: it comes from Qwen, GPT-OSS, Kimi and DeepSeek OCR, among others. The article With Nemotron 3 Nano Omni, Nvidia reveals what really goes into a modern multimodal model appeared first on The Decoder .
unSafe.sh - 不安全8 · 6h ago

Deepak Kole Is Quietly Building One of Silicon Valley's Most Valuable Tech Forums

New StorybyJon Stojan JournalistbyJon Stojan Journalist@jonstojanjournalistJon Stojan is a professi
unSafe.sh - 不安全8 · 7h ago

AI for the Next Billion Users: Building Intelligent Products That Work Everywhere

New StorybyGAURAV SAVLAbyGAURAV SAVLA@gauravsavlaAI Product Management at Meta lead building AI Age
unSafe.sh - 不安全8 · 7h ago

A un anno dallo scandalo sullo spionaggio di giornalisti e attivisti, Paragon non ha ancora dato risposte sull'uso dei suoi spyware alla giustizia italiana

*Rosita Rijtano è Bertha Challenge Fellow 2026Ancora nessuna collaborazione. Paragon, società israel
unSafe.sh - 不安全8 · 8h ago

RapidClaw Earns a 44.89 Proof of Usefulness Score by Building AI Co-Founder Agents

New StorybyTijo GaucherbyTijo Gaucher@rapidclawI am building www.rapidclaw.dev an AI agent hosting
爱范儿8 · 9h ago

ChatGPT 拎包入住云计算一哥,你的下一任好同事可能是 AI

云计算一哥开了一场发布会,把 SaaS 转型的那些事全说透了 #欢迎关注爱范儿官方微信公众号:爱范儿(微信号:ifanr),更多精彩内容第一时间为您奉上。
36氪8 · 14h ago

前米哈游高管创业,AI 原生增长 Agent LeapMind Growth 获 CMC 资本领投

2026 年 4 月 29 日,上海讯 —— AI 原生增长 Agent LeapMind Growth  今日宣布完成天使 + 轮融资,由 CMC 资本领投。本轮融资将主要用于核心产品 GrowthGPT 的研发迭代、产研团队扩充及早期市场拓展。 LeapMind Growth 成立于 2025 年 4 月,由前米哈游全球用户增长负责人、前快手增长策略中心负责人 马如平(Rubin) 创立,此前也曾在 TikTok 负责用户增长,累计主导规模超 50 亿美元的用户增长项目。公司核心成员均来自字节跳动、米哈游、快手、美团等企业,核心团队兼具超大规模增长管理、AI 系统工程化与全球化发行的复合能力。 公司核心产品为 AI 原生的 自主迭代增长 Agent ——GrowthGPT,旨在以 AI Agent 接管增长执行全链路:用户只需设定目标与边界,GrowthGPT 即可完成后续的策略制定、落地执行与持续优化全流程。 GrowthGPT 覆盖增长执行全链路:从跨平台数据诊断发现问题,到创意洞察驱动内容迭代,再到自动下达执行指令并完成效果优化。系统内置预算安全防护机制,可有效防范超支...
unSafe.sh - 不安全8 · 14h ago

Post-Quantum Cryptographic Agility in Model Context Protocol Transport

好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内,并且直接写描述,不需要特定的开头。首先,我得仔细阅读文章,抓住主要观点。 文章主要讨论了模型上下文协议(MCP)在后量子时代面临的安全威胁。MCP用于连接AI模型和数据源,但目前使用的RSA和ECC加密在量子计算机面前不堪一击。作者强调了“现在收割,以后解密”的策略,意味着当前加密的数据未来会被破解。 接下来,文章提出了应对策略: cryptographic agility(加密敏捷性),即能够无缝切换加密算法而不影响系统运行。ML-KEM被推荐为后量子时代的解决方案,并建议采用双层加密以确保安全过渡。 此外,文章还提到了实施量子抗性点对点连接、政策执行以及合规性的重要性。通过4D安全框架(发现、防御、检测、部署)来保护数据传输,并使用深度数据包检测来防止潜在攻击。 最后,文章指出未来的审计需求,强调使用不可变日志和自动化证书轮换来应对合规挑战。 总结下来,文章的核心是MCP在后量子时代的安全威胁及解决方案:从加密敏捷性到具体实施策略和合规措施。我需要将这些要点浓缩到100字以内,确保涵盖主要风险和应对措施。 文章讨...
爱范儿8 · 15h ago

早报|Claude官宣接入Adobe全家桶等生产力软件/微信朋友圈灰测改版/曝索尼PS5数字版游戏新增「30天联网验证」机制

· OpenAI 官宣 GPT-5.5、Codex 上线亚马逊云 · 法拉第未来获 4500 万美元融资,累计融资超 230 亿元 · 比亚迪今年一季度净利润腰斩 #欢迎关注爱范儿官方微信公众号:爱范儿(微信号:ifanr),更多精彩内容第一时间为您奉上。
Exploit-DB.com RSS Feed8 · 15h ago

[local] GNU InetUtils 2.6 - Telnetd Remote Privilege Escalation

GNU InetUtils 2.6 - Telnetd Remote Privilege Escalation
Exploit-DB.com RSS Feed8 · 15h ago

[webapps] JuzaWeb CMS 3.4.2 - Authenticated Remote Code Execution

JuzaWeb CMS 3.4.2 - Authenticated Remote Code Execution
Trend Micro Simply Security6 · 15h ago

Kuse Web App Abused to Host Phishing Document

Bad actors took advantage of the legitimate name and services of Kuse, a popular AI-based app designed for workplaces. The attackers exploited the users’ trust in Kuse to carry out a phishing attack.
[DRAGNET]5 · 5h ago

CISA orders feds to patch Windows flaw exploited as zero-day

CISA orders feds to patch Windows flaw exploited as zero-day    BleepingComputer
[DRAGNET]5 · 5h ago

Manufacturers face severe ransomware losses as cyber controls fail

Manufacturers face severe ransomware losses as cyber controls fail    strategic-risk-global.com
[DRAGNET]5 · 6h ago

New VECT 2.0 Ransomware Destroys Files Over 128 KB Across Windows, Linux, and ESXi

New VECT 2.0 Ransomware Destroys Files Over 128 KB Across Windows, Linux, and ESXi    CyberSecurityNews
[DRAGNET]5 · 7h ago

Europol IOCTA 2026 report flags shift to industrialised cybercrime powered by AI, ransomware and data theft

Europol IOCTA 2026 report flags shift to industrialised cybercrime powered by AI, ransomware and data theft    Industrial Cyber
[DRAGNET]5 · 7h ago

Critical Flaw In VECT 2.0 Ransomware: Large Files Being Permanently Destroyed

Critical Flaw In VECT 2.0 Ransomware: Large Files Being Permanently Destroyed    The420.in
[DRAGNET]5 · 7h ago

Resilience report finds manufacturing leads global cyberattack targets, with ransomware dominating losses

Resilience report finds manufacturing leads global cyberattack targets, with ransomware dominating losses    Industrial Cyber
[DRAGNET]5 · 7h ago

CISA Warns of Windows Shell Zero-Day Exploited in Attacks

CISA Warns of Windows Shell Zero-Day Exploited in Attacks    gbhackers.com
[DRAGNET]5 · 7h ago

Vect 2.0 RaaS Expands Attacks Across Windows, Linux, and ESXi

Vect 2.0 RaaS Expands Attacks Across Windows, Linux, and ESXi    gbhackers.com
[DRAGNET]5 · 9h ago

Floppy to Mythos, how ransomware grew into multibillion-dollar industry

Floppy to Mythos, how ransomware grew into multibillion-dollar industry    Business Standard
[DRAGNET]5 · 9h ago

ShinyHunters Ransomware strikes Vimeo and Carnival Corporation

ShinyHunters Ransomware strikes Vimeo and Carnival Corporation    Cybersecurity Insiders
[DRAGNET]5 · 12h ago

Vect unveiled: Inside an emerging ransomware group’s affiliate network

Vect unveiled: Inside an emerging ransomware group’s affiliate network    Cyber Daily
[DRAGNET]5 · 13h ago

Your Data Under Siege: Ransomware Threatens Millions; Smart Ways to Protect Yourself from Digital Blackmail

Your Data Under Siege: Ransomware Threatens Millions; Smart Ways to Protect Yourself from Digital Blackmail    صوت الإمارات
[DRAGNET]5 · 14h ago

Ardmore notifies residents about recent ransomware attack possibly impacting some personal information

Ardmore notifies residents about recent ransomware attack possibly impacting some personal information    KXII
[DRAGNET]5 · 14h ago

Ardmore notifies residents about recent ransomware attack possibly impacting some personal information

Ardmore notifies residents about recent ransomware attack possibly impacting some personal information    KXII
[DRAGNET]3 · 1h ago

Stelia Aerospace hacked in apparent ransomware attack

Stelia Aerospace hacked in apparent ransomware attack    Aviation Business News
[DRAGNET]3 · 8h ago

New Sandworm Tradecraft Enables Long-Term Hidden Access

New Sandworm Tradecraft Enables Long-Term Hidden Access    cyberpress.org
[DRAGNET]0 · 5h ago

New VECT 2.0 Ransomware Targets Multi-Platform Systems

New VECT 2.0 Ransomware Targets Multi-Platform Systems    cyberpress.org
[DRAGNET]0 · 6h ago

With VECT ransomware, paying is not an option

With VECT ransomware, paying is not an option    it-online.co.za
[DRAGNET]0 · 6h ago

From Floppy Disks to AI: The Evolution of Ransomware

From Floppy Disks to AI: The Evolution of Ransomware    The Hans India
[DRAGNET]0 · 7h ago

Industrial manufacturing tops Digitain cyber risk ranking

Industrial manufacturing tops Digitain cyber risk ranking    SecurityBrief UK
[DRAGNET]0 · 7h ago

Ransomware posts rise 22% as leak sites proliferate

Ransomware posts rise 22% as leak sites proliferate    SecurityBrief UK
[DRAGNET]0 · 11h ago

DragonForce Ransomware Attack on Promotion AB in Sweden

DragonForce Ransomware Attack on Promotion AB in Sweden    DeXpose
[DRAGNET]0 · 13h ago

KDL branches back open after ransomware attack

KDL branches back open after ransomware attack    AOL.com
[DRAGNET]0 · 15h ago

Incransom Strikes Sumac Inc. in Major Ransomware Attack

Incransom Strikes Sumac Inc. in Major Ransomware Attack    DeXpose