Feeds last updated @: UTC - 06:45 - 21/04/2026
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Iranian media is claiming that the US used backdoors and/or botnets to disable networking equipment during the current war, and Chinese state media is dining out on the allegations....
https://go.theregister.com/feed/www.theregister.com/2026/04/21/iran_claims_us_used_backdoors/
UPDATED Vibe-coding platform Lovable is pooh-poohing a researcher’s finding that anyone could open a free account on the service and read other users' sensitive info, including credentials, chat history, and source code. However, the company’s story keeps changing: First it attributed the publicly exposed info to "intentional behavior" and "unclear documentation," then threw bug-bounty service HackerOne under the bus....
https://go.theregister.com/feed/www.theregister.com/2026/04/20/lovable_denies_data_leak/
One app should not modify another app without asking for and receiving your explicit consent. Yet Anthropic's Claude Desktop for macOS installs files that affect other vendors' applications without disclosure, even before those applications have been installed, and authorizes browser extensions without consent....
A Scottish man linked to the Scattered Spider cybercrime crew has pleaded guilty in the US to a phishing and SIM-swap scheme that stole at least $8 million in cryptocurrency....
Microsoft has pushed out an out-of-band update to address the restart loop that hit some Windows Server devices after its April update....
NCEES explains why licensure matters for engineers and answers your top questions about the FE and PE exams. Source Views: 15
La entrada Thinking About Becoming a Licensed Engineer? Start Here. se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/thinking-about-becoming-a-licensed-engineer-start-here/
View our compilation of online stories and resources highlighting the Hispanic community and their contributions to STEM. Source Views: 14
La entrada Celebrate Hispanic Heritage Month With SWE se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/celebrate-hispanic-heritage-month-with-swe/
Source: www.cyberdefensemagazine.com – Author: News team Software supply chain attacks have emerged as a serious threat in the rapidly evolving field of cybersecurity, especially in medical devices. As these devices become more and more interconnected and dependent on complex software ecosystems, the potential for exploitation through the supply chain has grown exponentially. One powerful tool [...]
La entrada The Critical Role of Sboms (Software Bill of Materials) In Defending Medtech From Software Supply Chain Threats – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.cyberdefensemagazine.com – Author: News team It’s common knowledge in the cybersecurity industry that ransomware is on the rise, with median demands rising 20% year-over-year across virtually all industries. But it’s not only the ransom sums themselves that are escalating; threat actors are engaging in increasingly aggressive tactics and techniques to extort their victims. It’s [...]
La entrada Ransomware Tactics Are Shifting. Here’s How to Keep Up – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.darkreading.com – Author: Rob Wright CERT-FR’s advisory follows last month’s disclosure of a zero-day flaw Apple said was used in “sophisticated” attacks against targeted individuals. Original Post URL: https://www.darkreading.com/vulnerabilities-threats/french-sheds-light-apple-spyware-activity Category & Tags: – Views: 11
La entrada French Advisory Sheds Light on Apple Spyware Activity – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://hackread.com/vercel-breach-context-ai-shinyhunters-not-involved/
https://hackread.com/fake-tiktok-downloaders-chrome-edge-spy-users/
https://hackread.com/how-to-remove-objects-from-video-ai-tools-2026/
https://hackread.com/british-hacker-tyler-buchanan-guilty-hacking-scheme/
https://hackread.com/52m-download-protobuf-js-library-rce-schema-handle/
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21523
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32077
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-4786
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6100
https://www.ncsc.nl/alerts/kwetsbaarheid-in-microsoft-system-center
https://www.ncsc.nl/nieuws/tweede-kamer-stemt-in-met-cyberbeveiligingswet
https://www.ncsc.nl/nieuws/anthropics-frontiermodel-mythos-vraagt-om-directe-actie
https://www.ncsc.nl/alerts/kwetsbaarheid-in-adobe-acrobat-dc-acrobat-reader-dc-en-acrobat-2024
https://www.ncsc.nl/alerts/kwetsbaarheid-in-forticlient-ems-van-fortinet
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1005
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0980
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0930
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0948
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1161
https://thehackernews.com/2026/04/sglang-cve-2026-5760-cvss-98-enables.html
https://thehackernews.com/2026/04/weekly-recap-vercel-hack-push-fraud.html
https://thehackernews.com/2026/04/why-most-ai-deployments-stall-after-demo.html
https://thehackernews.com/2026/04/anthropic-mcp-design-vulnerability.html
https://thehackernews.com/2026/04/researchers-detect-zionsiphon-malware.html
VP.NET makes VPN privacy verifiable, not just policy-based, with secure enclave tech for up to five devices.
The post This VPN Lets You Verify Your Business Privacy For $130 appeared first on TechRepublic.
https://www.techrepublic.com/article/vpnet-3-year-subscription/
Amtrak data breach exposes over 2.1 million customer records after CRM access. Learn what was leaked, risks, and steps users and IT teams should take now.
The post Amtrak Data Breach Exposes 2.1M Records, Reports Suggest Larger Leak appeared first on TechRepublic.
https://www.techrepublic.com/article/news-amtrak-data-breach-2-1m-records/
The MCP flaw reveals a systemic AI security gap, exposing enterprise systems to supply chain attacks and forcing a shift toward data-layer governance.
The post The MCP Disclosure Is the AI Era’s ‘Open Redirect’ Moment appeared first on TechRepublic.
https://www.techrepublic.com/article/news-mcp-ai-security-vulnerability-data-layer-governance/
Although the team with Microsoft moved swiftly to patch the BlueHammer vulnerability, other exploits still threaten Microsoft Defender and Windows users.
The post Microsoft Defender Flaws Exploited on Windows, Two Left Unpatched appeared first on TechRepublic.
https://www.techrepublic.com/article/news-microsoft-defender-flaws-exploited-windows-10-11/
Four Android banking malware campaigns are targeting more than 800 apps by abusing overlays, Accessibility permissions, and sideloaded fake apps to steal PINs.
The post Over 800 Android Apps Targeted in PIN-Stealing Trojan Campaign appeared first on TechRepublic.
https://www.techrepublic.com/article/news-android-malware-stealing-pin-overlay-attack/
Scammers dressed up like Catholic Charities and legitimate pro bone legal services on social media platforms are targeting immigrants and bilking them for money. Manhattan DA Alvin Bragg is pressing Meta to follow its own terms and shut them down.
The post Manhattan DA Bragg Pushes Meta to Put a Stop to Immigration Scams appeared first on Security Boulevard.
Learn how ML-based anomaly detection stops metadata exfiltration in post-quantum AI environments and secures MCP infrastructure against advanced threats.
The post ML-Based Anomaly Detection for Post-Quantum Metadata Exfiltration appeared first on Security Boulevard.
Key Takeaways It’s surprising that traditional risk registers (spreadsheets or basic databases) persist in a world racing toward AI-infused technology. But the states speak for themselves: 59% of GRC practitioners use no commercial tool, with 52% spending 30-50% of time on admin tasks like data entry. Although reliable for basic checklists, traditional risk registers are [...]
The post AI-Powered Risk Registers vs. Traditional Risk Management: What’s the Difference? appeared first on Centraleyes.
The post AI-Powered Risk Registers vs. Traditional Risk Management: What’s the Difference? appeared first on Security Boulevard.
There is a certain kind of argument that appears every time encryption comes up. Yes, yes, privacy is lovely. But think of the children!!! And just like that, the conversation is over. Because once someone has wheeled in children, terrorists, organised crime, and a shadowy man in a basement who definitely has a beard, anyone ... Continue reading Why We Actually Need End-to-End Encryption →
The post Why We Actually Need End-to-End Encryption appeared first on Security Boulevard.
https://securityboulevard.com/2026/04/why-we-actually-need-end-to-end-encryption/
Author, Creator & Presenter: Rob T. Lee, Glenn Thorpe, Dan Hubbard & Sergej Epp
Our thanks to [un]prompted for publishing their Creators, Authors and Presenter’s outstanding [un]prompted 2026 AI Security Practitioner content on the Organizations' YouTube Channel.
The post [un]prompted 2026 – Rob T. Lee, Glenn Thorpe, Dan Hubbard & Sergej Epp – Vibe Coded (Micro-Talks) appeared first on Security Boulevard.
https://krebsonsecurity.com/2026/04/patch-tuesday-april-2026-edition/
https://krebsonsecurity.com/2026/04/russia-hacked-routers-to-steal-microsoft-office-tokens/
https://krebsonsecurity.com/2026/04/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab/
https://krebsonsecurity.com/2026/03/canisterworm-springs-wiper-attack-targeting-iran/
https://krebsonsecurity.com/2026/03/feds-disrupt-iot-botnets-behind-huge-ddos-attacks/
I love cutting-edge tech, but I hate hyperbole, so I find AI to be a real paradox. Somewhere in that whole mess of overnight influencers, disinformation and ludicrous claims is some real "gold" - AI stuff that's genuinely useful and makes a meaningful difference. This blog
https://www.troyhunt.com/heres-what-agentic-ai-can-do-with-have-i-been-pwneds-apis/
I'm starting to become pretty fond of Bruce. Actually, I've had a bit of an epiphany: an AI assistant like Bruce isn't just about auto-responding to tickets in an entirely autonomous manner; it's also pretty awesome at responding with just a little
This week, more time than I'd have liked to spend went on talking about the trials of chasing invoices. This is off the back of a customer (who, for now, will remain unnamed), who had invoices stacking back more than 6 months overdue and despite payment terms of
Day by day, I find we're eeking more goodness out of OpenClaw and finding the sweet spot between what the humans do well and the agent can run off and do on its own. Significantly, we're shifting more and more of the workload to the latter
For a hobby project built in my spare time to provide a simple community service, Have I Been Pwned sure has, well, "escalated". Today, we support hundreds of thousands of website visitors each day, tens of millions of API queries, and hundreds of millions of password searches. We&
The New York Times has a long article where the author lays out an impressive array of circumstantial evidence that the inventor of Bitcoin is the cypherpunk Adam Back.
I don’t know. The article is convincing, but it’s written to be convincing.
I can’t remember if I ever met Adam. I was a member of the Cypherpunks mailing list for a while, but I was never really an active participant. I spent more time on the Usenet newsgroup sci.crypt. I knew a bunch of the Cypherpunks, though, from various conferences around the world at the time. I really have no opinion about who Satoshi Nakamoto really is...
https://www.schneier.com/blog/archives/2026/04/is-satoshi-nakamoto-really-adam-back.html
Pretty fantastic video from Japan of a giant squid eating another squid.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
https://www.schneier.com/blog/archives/2026/04/friday-squid-blogging-new-giant-squid-video-2.html
Last week, Anthropic pulled back the curtain on Claude Mythos Preview, an AI model so capable at finding and exploiting software vulnerabilities that the company decided it was too dangerous to release to the public. Instead, access has been restricted to roughly 50 organizations—Microsoft, Apple, Amazon Web Services, CrowdStrike and other vendors of critical infrastructure—under an initiative called Project Glasswing.
The announcement was accompanied by a barrage of hair-raising anecdotes: thousands of vulnerabilities uncovered across every major...
https://www.schneier.com/blog/archives/2026/04/mythos-and-cybersecurity.html
Interesting research: “Humans expect rationality and cooperation from LLM opponents in strategic games.”
Abstract: As Large Language Models (LLMs) integrate into our social and economic interactions, we need to deepen our understanding of how humans respond to LLMs opponents in strategic settings. We present the results of the first controlled monetarily-incentivised laboratory experiment looking at differences in human behaviour in a multi-player p-beauty contest against other humans and LLMs. We use a within-subject design in order to compare behaviour at the individual level. We show that, in this environment, human subjects choose significantly lower numbers when playing against LLMs than humans, which is mainly driven by the increased prevalence of ‘zero’ Nash-equilibrium choices. This shift is mainly driven by subjects with high strategic reasoning ability. Subjects who play the zero Nash-equilibrium choice motivate their strategy by appealing to perceived LLM’s reasoning ability and, unexpectedly, propensity towards cooperation. Our findings provide foundational insights into the multi-player human-LLM interaction in simultaneous choice games, uncover heterogeneities in both subjects’ behaviour and beliefs about LLM’s play when playing against them, and suggest important implications for mechanism design in mixed human-LLM systems...
https://www.schneier.com/blog/archives/2026/04/human-trust-of-ai-agents.html
This article on the walls of Constantinople is fascinating.
The system comprised four defensive lines arranged in formidable layers:
https://www.schneier.com/blog/archives/2026/04/defense-in-depth-medieval-style.html
Following a long-established pattern, the fourth month of the year is one of the cruelest
Categories: X-ops, Threat Research
Tags: Patch Tuesday
https://www.sophos.com/en-us/blog/april-2026-microsoft-patch-tuesday
The use of hidden virtual machines (VMs) enables long-term access, credential harvesting, data exfiltration, and PayoutsKing ransomware deployment
Categories: Threat Research
Tags: virtual machine, QEMU, PayoutsKing, GOLD ENCOUNTER, CitrixBleed2
https://www.sophos.com/en-us/blog/qemu-abused-to-evade-detection-and-enable-ransomware-delivery
An explainer of why this philosophy matters and how it reduces attack surface from the inside
Categories: Sophos Insights, Products & Services
Tags: Secure by Design, Thought Leadership
https://www.sophos.com/en-us/blog/building-cybersecurity-into-the-foundation
Following our article on the challenges posed by agentic AI, we gave OpenClaw access to one of our legacy networks
Categories: Threat Research
Tags: OpenClaw, LLM, AI, penetration testing, Red Team, CISO, Sophos X-Ops
https://www.sophos.com/en-us/blog/we-let-openclaw-loose-on-an-internal-network-heres-what-it-found
We can't control the pace of AI-driven vulnerability discovery, but we can control how fast we respond.
Categories: Sophos Insights
Tags: LLM, AI, Exploit, vulnerability, Active Adversary, Pacific Rim
https://www.sophos.com/en-us/blog/vulnerability-flood-is-here