PlayStation To Require Age Verification For Messages and Voice Chat
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
https://techcrunch.com/2026/04/20/who-is-john-ternus-the-incoming-apple-ceo/
https://techcrunch.com/2026/04/20/google-rolls-out-gemini-in-chrome-in-seven-new-countries/
https://techcrunch.com/2026/04/20/tim-cook-stepping-down-as-apple-ceo-john-ternus-taking-over/
https://techcrunch.com/2026/04/20/google-photos-adds-new-touch-up-tools-for-quick-fixes/
If Instagram has been turning your color photo posts into black and white recently, don’t worry, there’s no problem with your camera or your account. The Meta-owned app has confirmed to Engadget that the issue is caused by a bug that’s affecting HDR photos in particular. "Earlier today, a technical issue caused some HDR photos to appear incorrectly as black-and-white for a subset of accounts,” Instagram has told us. However, we see complaints dated April 18 and 19, so the issue has been going on a bit longer for some people.
Regardless of when the bug started causing problems, the Instagram team said it has since corrected the issue. If your posts are still showing up in black and white, Instagram said the fix will automatically turn your affected photo posts back to their original state over the next few hours. “We apologize for any inconvenience,” they added.
This article originally appeared on Engadget at https://www.engadget.com/apps/instagram-says-a-bug-turned-your-photos-black-and-white-061802389.html?src=rssAmazon and Anthropic are strengthening their ties once again, with steep financial commitments made on both sides. Today, Amazon announced that it will invest $5 billion in the AI company, along with as much as $20 billion in additional payments if certain milestones are met. This news follows the initial $4 billion investment Amazon made in Anthropic in 2023 and a second $4 billion round from 2024.
On Anthropic's side, it has committed to continued use of Amazon's custom Trainium silicon for its AI models. The latest agreement will see Anthropic promising to spend more than $100 billion on AWS technologies over the coming decade. It will secure up to 5 gigawatts of current and future chip capacity for training and powering its models. Their partnership is also bringing Anthropic's Claude platform to Amazon Web Services customers within the AWS portal, removing the need for additional credentials.
This article originally appeared on Engadget at https://www.engadget.com/ai/amazon-will-invest-up-to-25-billion-in-anthropic-in-a-broad-deal-225239302.html?src=rssAfter debuting in the US, Gemini in Chrome is making its way to more markets. Starting today, Google is rolling out Chrome's built-in chatbot to users in Asia and the Pacific, including Australia, Indonesia, Japan, the Philippines, Singapore, South Korea and Vietnam. The expansion comes after Google earlier this year made Gemini in Chrome available to people in Canada, India and New Zealand.
With the exception of Japan, where Google isn't making the new suite available on iOS just yet, everyone else in the countries mentioned above can access Gemini in Chrome through Chrome's desktop browser, and the app on their iPhone or iPad. To get started, just tap the "Ask Gemini" icon at the top right of the screen. It will open a new sidebar Google introduced at the start of the year where you can chat with Gemini across every open tab. From there, you can also access Google's in-house image generator, Nano Banana 2. As you would expect, the suite offers integrations with Google's other apps, allowing you, for instance, to add events to Calendar without leaving the interface.
If you don't want to use Gemini, you can right click on the shortcut to unpin it from the top of the interface.
Update 7:43PM ET: This article has been updated to reflect the expansion includes the entire Asia-Pacific region.
This article originally appeared on Engadget at https://www.engadget.com/ai/google-brings-gemini-in-chrome-to-users-in-asia-and-the-pacific-220000698.html?src=rssApple CEO Tim Cook is officially stepping down from his role on September 1, the company announced today, while current SVP of hardware engineering John Ternus will take over as the new CEO. Cook will transition to a new role as executive chairman of Apple’s Board of Directors. The company says the move was “approved unanimously” by Apple’s Board, and that Cook will work on transitioning his duties over the summer.
“It has been the greatest privilege of my life to be the CEO of Apple and to have been trusted to lead such an extraordinary company,” Cook said in a statement. “I love Apple with all of my being, and I am so grateful to have had the opportunity to work with a team of such ingenious, innovative, creative, and deeply caring people who have been unwavering in their dedication to enriching the lives of our customers and creating the best products and services in the world.”
Cook became CEO of Apple in 2011 following the death of co-founder Steve Jobs, and he led the charge for Apple’s post-iPhone and iPad era by launching the AirPods, Apple Watch and Vision Pro. He also pushed the company into being more of a service provider with the launch of Apple TV and Apple Music. While he’s had a strong reputation as a logistics-oriented executive, Cook has been criticized for lacking the product vision that Jobs was known for.
Ternus, on the other hand, has been focused on product design since joining Apple in 2001. He became VP of hardware engineering in 2013, and later transitioned to a senior executive role in 2021. Ternus was also prominently featured at the MacBook Neo launch a few months ago, where Apple announced a low-cost yet high-quality notebook that encapsulates its unique place in the PC industry.
“I am profoundly grateful for this opportunity to carry Apple’s mission forward,” Ternus said in a statement. “Having spent almost my entire career at Apple, I have been lucky to have worked under Steve Jobs and to have had Tim Cook as my mentor. It has been a privilege to help shape the products and experiences that have changed so much of how we interact with the world and with one another.”
Cook published a community letter timed for the announcement, which we’ve included below:
To the Apple community:
For the past 15 years I’ve started just about every morning the same way. I open my email and I read notes I received the day before from Apple’s users all over the world.
You share little pieces of your lives with me and tell me things you want me to know about how Apple has touched you. About the moment your mom was saved by her Apple Watch. About the perfect selfie you captured at the summit of a mountain that seemed impossible to climb. You thank me for the ways Mac has changed what you can do at work and sometimes give me a hard time because something you care about isn’t working like it should.
In every one of those emails I feel the beating heart of our shared humanity. I feel a sense of deepening obligation to work harder and push further. But most of all, I feel a gratitude that I cannot put into words, that I somehow got to be the person on the other end of those emails, the leader of a company that ignites imaginations and enriches lives in such profound ways it defies description. What an honor and a privilege it has been.
Today we announced that I’m taking the next step in my journey at Apple. Over the coming months I will be transitioning into a new role, leaving the CEO job behind in September and becoming Apple’s executive chairman. A new person will be stepping into what I know in my heart is the best job in the world. That leader is John Ternus, a brilliant engineer and thinker who has spent the past 25 years building the Apple products our users love so much, obsessed with every detail, focused on every possible way we can make something better, bolder, more beautiful, and more meaningful. He is the perfect person for the job.
John cares so much about who we are at Apple, what we do at Apple, who we reach at Apple, and he has the heart and character to lead with extraordinary integrity. I am so proud to call him Apple’s next CEO. This company will reach such incredible heights under his leadership, and you will feel his impact in every bit of delight and discovery that grows out of the products and services to come. I can’t wait for you to get to know him like I do.
This is not goodbye. But at this moment of transition, I wanted to take the opportunity to say thank you. Not on behalf of the company, this time, though there is a wellspring of gratitude for you that overflows inside our walls. But simply on behalf of me. Tim. A person who grew up in a rural place in a different time and, for these magical moments, got to be the CEO of the greatest company in the world. Thank you for the confidence and kindness you’ve shown me. Thank you for saying hi to me on the street and in our stores. Thank you for cheering alongside me when we unveiled a new product or service. Thank you, most of all, for believing in me to lead the company that has always put you at the center of our work. Every day we get up and think about what we can do to make your life a little bit better. And every day, you’ve made mine the best I could have asked for.
Thank you.
This article originally appeared on Engadget at https://www.engadget.com/computing/tim-cook-will-step-down-as-204959434.html?src=rsshttps://www.engadget.com/computing/tim-cook-will-step-down-as-204959434.html?src=rss
Mastodon seems to be recovering after a Distributed Denial of Service (DDoS) attack that took down its primary mastodon.social instance. As TechCrunch notes, the platform began reporting issues early Monday morning as much of the Mastodon-operated server became inaccessible.
It's not clear who might be behind the attack, but Mastodon's head of communications Andy Piper described it as a "major" incident. A couple hours later, Mastodon shared on a status page that it had implemented countermeasures and that users should be able to access mastodon.social once again. Piper said that "some ongoing instability is a possibility" as the site recovered. It's unclear if any other instances of the service were also targeted; mastodon.social is run directly by the nonprofit and is the largest server on the federated platform.
Mastodon is the second decentralized platform to be targeted with a DDoS in recent days. Last week, Bluesky also dealt with a significant DDoS incident that took parts of the service offline for several hours. The company posted what it said was its final update Monday morning, saying that its service had "remained stable" and that there was "no evidence of unauthorized access to private user data." A few hours later, however, it seemed Bluesky was once again experiencing some issues, though the cause was unclear. Its official status page was down, and a post from its server status account indicated that there were "elevated errors and timeouts on some Bluesky-hosted services." Bluesky said it was investigating.
This article originally appeared on Engadget at https://www.engadget.com/social-media/mastodon-was-hit-by-a-major-ddos-attack-that-briefly-took-down-parts-of-the-service-204823221.html?src=rssIranian media is claiming that the US used backdoors and/or botnets to disable networking equipment during the current war, and Chinese state media is dining out on the allegations....
https://go.theregister.com/feed/www.theregister.com/2026/04/21/iran_claims_us_used_backdoors/
The NASA Office of Inspector General, the aerospace agency’s auditor, fears that work on next-generation spacesuits won’t finish in time to use them for the planned Artemis III Moon landing mission in 2028....
https://go.theregister.com/feed/www.theregister.com/2026/04/21/nasa_oig_spacesuit_report/
Microsoft's GitHub has stopped accepting new Copilot individual subscriptions while the code hosting biz figures out how it can meet its service commitments without breaking the bank....
UPDATED Vibe-coding platform Lovable is pooh-poohing a researcher’s finding that anyone could open a free account on the service and read other users' sensitive info, including credentials, chat history, and source code. However, the company’s story keeps changing: First it attributed the publicly exposed info to "intentional behavior" and "unclear documentation," then threw bug-bounty service HackerOne under the bus....
https://go.theregister.com/feed/www.theregister.com/2026/04/20/lovable_denies_data_leak/
It’s been a weekend filled with dizzying changes in the boardroom at datacenter wannabe Fermi America as it hopes eventually to expand its West Texas campus to about 17 gigawatts of behind-the-meter generation capacity....
https://go.theregister.com/feed/www.theregister.com/2026/04/20/fermi_america_reorg/
https://www.cnet.com/tech/gaming/todays-nyt-mini-crossword-answers-for-tuesday-april-21/
https://www.cnet.com/news-live/tim-cook-steps-down-as-apple-ceo-replaced-john-ternus/
https://arstechnica.com/apple/2026/04/john-ternus-will-replace-tim-cook-as-apple-ceo/
https://www.wired.com/story/a-humanoid-robot-set-a-half-marathon-record-in-china/
https://www.wired.com/story/tim-cook-stepping-down-ceo-apple-john-ternus/
https://www.wired.com/story/wired-at-night-event-ben-mckenzie-reads-mean-tweets/
https://www.zdnet.com/article/best-settings-to-change-on-your-sony-bravia-tv/
https://www.zdnet.com/article/privacybee-data-removal-review/
https://www.zdnet.com/article/surfshark-dausos-vpn-protocol/
https://www.zdnet.com/article/how-to-easily-encrypt-files-on-android-with-openkeychain/
The European Commission is set to designate ChatGPT as a ‘Very Large Online Search Engine,’ subjecting OpenAI to strict Digital Services Act compliance rules.
The post European Commission Moving to Classify ChatGPT as ‘Very Large Online Search Engine’ Under Digital Services Act appeared first on TechRepublic.
https://www.techrepublic.com/article/chatgpt-digital-services-act-vlose-classification/
Square POS stands out for its free entry point, flexible software, and wide hardware range. However, its all-in-one approach can fall short depending on your business type and growth needs.
The post Square POS Review 2026: Pricing, Features, Pros and Cons appeared first on TechRepublic.
Apple CEO Tim Cook steps down, handing leadership to hardware chief John Ternus in a major shift that could shape the company’s next era.
The post End of an Era: Tim Cook Steps Down as Apple CEO, John Ternus to Take Over appeared first on TechRepublic.
https://www.techrepublic.com/article/news-apple-tim-cook-steps-down-john-ternus-ceo/
VP.NET makes VPN privacy verifiable, not just policy-based, with secure enclave tech for up to five devices.
The post This VPN Lets You Verify Your Business Privacy For $130 appeared first on TechRepublic.
https://www.techrepublic.com/article/vpnet-3-year-subscription/
Apple’s Mac Studio 2026 may be delayed due to supply chain issues and memory shortages, with reports pointing to a later-than-expected release timeline.
The post Mac Studio 2026: Apple’s New Desktop Faces a Delayed Timeline appeared first on TechRepublic.
https://www.techrepublic.com/article/news-mac-studio-2026-delay-october-2026/
BookCon 2026 returned for the first time in six years, and fans returned in droves, selling out the event fast. We were on the ground at the event, covering panels and chatting with authors and BookTok creators. But just like the attendees, we also hit ...
https://in.mashable.com/tech/108740/all-the-literary-tech-and-gear-we-spotted-at-bookcon-2026
https://www.geekwire.com/2026/powerlight-laser-power-beaming-drone-pentagon-test/
https://www.techradar.com/home/coffee-machines/philips-baristina-milk-frother-review
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Iranian media is claiming that the US used backdoors and/or botnets to disable networking equipment during the current war, and Chinese state media is dining out on the allegations....
https://go.theregister.com/feed/www.theregister.com/2026/04/21/iran_claims_us_used_backdoors/
UPDATED Vibe-coding platform Lovable is pooh-poohing a researcher’s finding that anyone could open a free account on the service and read other users' sensitive info, including credentials, chat history, and source code. However, the company’s story keeps changing: First it attributed the publicly exposed info to "intentional behavior" and "unclear documentation," then threw bug-bounty service HackerOne under the bus....
https://go.theregister.com/feed/www.theregister.com/2026/04/20/lovable_denies_data_leak/
One app should not modify another app without asking for and receiving your explicit consent. Yet Anthropic's Claude Desktop for macOS installs files that affect other vendors' applications without disclosure, even before those applications have been installed, and authorizes browser extensions without consent....
A Scottish man linked to the Scattered Spider cybercrime crew has pleaded guilty in the US to a phishing and SIM-swap scheme that stole at least $8 million in cryptocurrency....
Microsoft has pushed out an out-of-band update to address the restart loop that hit some Windows Server devices after its April update....
NCEES explains why licensure matters for engineers and answers your top questions about the FE and PE exams. Source Views: 15
La entrada Thinking About Becoming a Licensed Engineer? Start Here. se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/thinking-about-becoming-a-licensed-engineer-start-here/
View our compilation of online stories and resources highlighting the Hispanic community and their contributions to STEM. Source Views: 14
La entrada Celebrate Hispanic Heritage Month With SWE se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/celebrate-hispanic-heritage-month-with-swe/
Source: www.cyberdefensemagazine.com – Author: News team Software supply chain attacks have emerged as a serious threat in the rapidly evolving field of cybersecurity, especially in medical devices. As these devices become more and more interconnected and dependent on complex software ecosystems, the potential for exploitation through the supply chain has grown exponentially. One powerful tool [...]
La entrada The Critical Role of Sboms (Software Bill of Materials) In Defending Medtech From Software Supply Chain Threats – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.cyberdefensemagazine.com – Author: News team It’s common knowledge in the cybersecurity industry that ransomware is on the rise, with median demands rising 20% year-over-year across virtually all industries. But it’s not only the ransom sums themselves that are escalating; threat actors are engaging in increasingly aggressive tactics and techniques to extort their victims. It’s [...]
La entrada Ransomware Tactics Are Shifting. Here’s How to Keep Up – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.darkreading.com – Author: Rob Wright CERT-FR’s advisory follows last month’s disclosure of a zero-day flaw Apple said was used in “sophisticated” attacks against targeted individuals. Original Post URL: https://www.darkreading.com/vulnerabilities-threats/french-sheds-light-apple-spyware-activity Category & Tags: – Views: 11
La entrada French Advisory Sheds Light on Apple Spyware Activity – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://hackread.com/vercel-breach-context-ai-shinyhunters-not-involved/
https://hackread.com/fake-tiktok-downloaders-chrome-edge-spy-users/
https://hackread.com/how-to-remove-objects-from-video-ai-tools-2026/
https://hackread.com/british-hacker-tyler-buchanan-guilty-hacking-scheme/
https://hackread.com/52m-download-protobuf-js-library-rce-schema-handle/
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21523
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32077
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-4786
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6100
https://www.ncsc.nl/alerts/kwetsbaarheid-in-microsoft-system-center
https://www.ncsc.nl/nieuws/tweede-kamer-stemt-in-met-cyberbeveiligingswet
https://www.ncsc.nl/nieuws/anthropics-frontiermodel-mythos-vraagt-om-directe-actie
https://www.ncsc.nl/alerts/kwetsbaarheid-in-adobe-acrobat-dc-acrobat-reader-dc-en-acrobat-2024
https://www.ncsc.nl/alerts/kwetsbaarheid-in-forticlient-ems-van-fortinet
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1005
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0980
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0930
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0948
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1161
https://thehackernews.com/2026/04/sglang-cve-2026-5760-cvss-98-enables.html
https://thehackernews.com/2026/04/weekly-recap-vercel-hack-push-fraud.html
https://thehackernews.com/2026/04/why-most-ai-deployments-stall-after-demo.html
https://thehackernews.com/2026/04/anthropic-mcp-design-vulnerability.html
https://thehackernews.com/2026/04/researchers-detect-zionsiphon-malware.html
VP.NET makes VPN privacy verifiable, not just policy-based, with secure enclave tech for up to five devices.
The post This VPN Lets You Verify Your Business Privacy For $130 appeared first on TechRepublic.
https://www.techrepublic.com/article/vpnet-3-year-subscription/
Amtrak data breach exposes over 2.1 million customer records after CRM access. Learn what was leaked, risks, and steps users and IT teams should take now.
The post Amtrak Data Breach Exposes 2.1M Records, Reports Suggest Larger Leak appeared first on TechRepublic.
https://www.techrepublic.com/article/news-amtrak-data-breach-2-1m-records/
The MCP flaw reveals a systemic AI security gap, exposing enterprise systems to supply chain attacks and forcing a shift toward data-layer governance.
The post The MCP Disclosure Is the AI Era’s ‘Open Redirect’ Moment appeared first on TechRepublic.
https://www.techrepublic.com/article/news-mcp-ai-security-vulnerability-data-layer-governance/
Although the team with Microsoft moved swiftly to patch the BlueHammer vulnerability, other exploits still threaten Microsoft Defender and Windows users.
The post Microsoft Defender Flaws Exploited on Windows, Two Left Unpatched appeared first on TechRepublic.
https://www.techrepublic.com/article/news-microsoft-defender-flaws-exploited-windows-10-11/
Four Android banking malware campaigns are targeting more than 800 apps by abusing overlays, Accessibility permissions, and sideloaded fake apps to steal PINs.
The post Over 800 Android Apps Targeted in PIN-Stealing Trojan Campaign appeared first on TechRepublic.
https://www.techrepublic.com/article/news-android-malware-stealing-pin-overlay-attack/
Scammers dressed up like Catholic Charities and legitimate pro bone legal services on social media platforms are targeting immigrants and bilking them for money. Manhattan DA Alvin Bragg is pressing Meta to follow its own terms and shut them down.
The post Manhattan DA Bragg Pushes Meta to Put a Stop to Immigration Scams appeared first on Security Boulevard.
Learn how ML-based anomaly detection stops metadata exfiltration in post-quantum AI environments and secures MCP infrastructure against advanced threats.
The post ML-Based Anomaly Detection for Post-Quantum Metadata Exfiltration appeared first on Security Boulevard.
Key Takeaways It’s surprising that traditional risk registers (spreadsheets or basic databases) persist in a world racing toward AI-infused technology. But the states speak for themselves: 59% of GRC practitioners use no commercial tool, with 52% spending 30-50% of time on admin tasks like data entry. Although reliable for basic checklists, traditional risk registers are [...]
The post AI-Powered Risk Registers vs. Traditional Risk Management: What’s the Difference? appeared first on Centraleyes.
The post AI-Powered Risk Registers vs. Traditional Risk Management: What’s the Difference? appeared first on Security Boulevard.
There is a certain kind of argument that appears every time encryption comes up. Yes, yes, privacy is lovely. But think of the children!!! And just like that, the conversation is over. Because once someone has wheeled in children, terrorists, organised crime, and a shadowy man in a basement who definitely has a beard, anyone ... Continue reading Why We Actually Need End-to-End Encryption →
The post Why We Actually Need End-to-End Encryption appeared first on Security Boulevard.
https://securityboulevard.com/2026/04/why-we-actually-need-end-to-end-encryption/
Author, Creator & Presenter: Rob T. Lee, Glenn Thorpe, Dan Hubbard & Sergej Epp
Our thanks to [un]prompted for publishing their Creators, Authors and Presenter’s outstanding [un]prompted 2026 AI Security Practitioner content on the Organizations' YouTube Channel.
The post [un]prompted 2026 – Rob T. Lee, Glenn Thorpe, Dan Hubbard & Sergej Epp – Vibe Coded (Micro-Talks) appeared first on Security Boulevard.
https://krebsonsecurity.com/2026/04/patch-tuesday-april-2026-edition/
https://krebsonsecurity.com/2026/04/russia-hacked-routers-to-steal-microsoft-office-tokens/
https://krebsonsecurity.com/2026/04/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab/
https://krebsonsecurity.com/2026/03/canisterworm-springs-wiper-attack-targeting-iran/
https://krebsonsecurity.com/2026/03/feds-disrupt-iot-botnets-behind-huge-ddos-attacks/
I love cutting-edge tech, but I hate hyperbole, so I find AI to be a real paradox. Somewhere in that whole mess of overnight influencers, disinformation and ludicrous claims is some real "gold" - AI stuff that's genuinely useful and makes a meaningful difference. This blog
https://www.troyhunt.com/heres-what-agentic-ai-can-do-with-have-i-been-pwneds-apis/
I'm starting to become pretty fond of Bruce. Actually, I've had a bit of an epiphany: an AI assistant like Bruce isn't just about auto-responding to tickets in an entirely autonomous manner; it's also pretty awesome at responding with just a little
This week, more time than I'd have liked to spend went on talking about the trials of chasing invoices. This is off the back of a customer (who, for now, will remain unnamed), who had invoices stacking back more than 6 months overdue and despite payment terms of
Day by day, I find we're eeking more goodness out of OpenClaw and finding the sweet spot between what the humans do well and the agent can run off and do on its own. Significantly, we're shifting more and more of the workload to the latter
For a hobby project built in my spare time to provide a simple community service, Have I Been Pwned sure has, well, "escalated". Today, we support hundreds of thousands of website visitors each day, tens of millions of API queries, and hundreds of millions of password searches. We&
The New York Times has a long article where the author lays out an impressive array of circumstantial evidence that the inventor of Bitcoin is the cypherpunk Adam Back.
I don’t know. The article is convincing, but it’s written to be convincing.
I can’t remember if I ever met Adam. I was a member of the Cypherpunks mailing list for a while, but I was never really an active participant. I spent more time on the Usenet newsgroup sci.crypt. I knew a bunch of the Cypherpunks, though, from various conferences around the world at the time. I really have no opinion about who Satoshi Nakamoto really is...
https://www.schneier.com/blog/archives/2026/04/is-satoshi-nakamoto-really-adam-back.html
Pretty fantastic video from Japan of a giant squid eating another squid.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
https://www.schneier.com/blog/archives/2026/04/friday-squid-blogging-new-giant-squid-video-2.html
Last week, Anthropic pulled back the curtain on Claude Mythos Preview, an AI model so capable at finding and exploiting software vulnerabilities that the company decided it was too dangerous to release to the public. Instead, access has been restricted to roughly 50 organizations—Microsoft, Apple, Amazon Web Services, CrowdStrike and other vendors of critical infrastructure—under an initiative called Project Glasswing.
The announcement was accompanied by a barrage of hair-raising anecdotes: thousands of vulnerabilities uncovered across every major...
https://www.schneier.com/blog/archives/2026/04/mythos-and-cybersecurity.html
Interesting research: “Humans expect rationality and cooperation from LLM opponents in strategic games.”
Abstract: As Large Language Models (LLMs) integrate into our social and economic interactions, we need to deepen our understanding of how humans respond to LLMs opponents in strategic settings. We present the results of the first controlled monetarily-incentivised laboratory experiment looking at differences in human behaviour in a multi-player p-beauty contest against other humans and LLMs. We use a within-subject design in order to compare behaviour at the individual level. We show that, in this environment, human subjects choose significantly lower numbers when playing against LLMs than humans, which is mainly driven by the increased prevalence of ‘zero’ Nash-equilibrium choices. This shift is mainly driven by subjects with high strategic reasoning ability. Subjects who play the zero Nash-equilibrium choice motivate their strategy by appealing to perceived LLM’s reasoning ability and, unexpectedly, propensity towards cooperation. Our findings provide foundational insights into the multi-player human-LLM interaction in simultaneous choice games, uncover heterogeneities in both subjects’ behaviour and beliefs about LLM’s play when playing against them, and suggest important implications for mechanism design in mixed human-LLM systems...
https://www.schneier.com/blog/archives/2026/04/human-trust-of-ai-agents.html
This article on the walls of Constantinople is fascinating.
The system comprised four defensive lines arranged in formidable layers:
https://www.schneier.com/blog/archives/2026/04/defense-in-depth-medieval-style.html
Following a long-established pattern, the fourth month of the year is one of the cruelest
Categories: X-ops, Threat Research
Tags: Patch Tuesday
https://www.sophos.com/en-us/blog/april-2026-microsoft-patch-tuesday
The use of hidden virtual machines (VMs) enables long-term access, credential harvesting, data exfiltration, and PayoutsKing ransomware deployment
Categories: Threat Research
Tags: virtual machine, QEMU, PayoutsKing, GOLD ENCOUNTER, CitrixBleed2
https://www.sophos.com/en-us/blog/qemu-abused-to-evade-detection-and-enable-ransomware-delivery
An explainer of why this philosophy matters and how it reduces attack surface from the inside
Categories: Sophos Insights, Products & Services
Tags: Secure by Design, Thought Leadership
https://www.sophos.com/en-us/blog/building-cybersecurity-into-the-foundation
Following our article on the challenges posed by agentic AI, we gave OpenClaw access to one of our legacy networks
Categories: Threat Research
Tags: OpenClaw, LLM, AI, penetration testing, Red Team, CISO, Sophos X-Ops
https://www.sophos.com/en-us/blog/we-let-openclaw-loose-on-an-internal-network-heres-what-it-found
We can't control the pace of AI-driven vulnerability discovery, but we can control how fast we respond.
Categories: Sophos Insights
Tags: LLM, AI, Exploit, vulnerability, Active Adversary, Pacific Rim
https://www.sophos.com/en-us/blog/vulnerability-flood-is-here