Tech & Science

35

FBI Disrupts APT28 Cyber Operations in Major Router Takedown

Tech & ScienceAI·1 source·

WASHINGTON — The Federal Bureau of Investigation executed a coordinated operation on Wednesday to sever the access of the Russian-linked hacking group APT28 to its targets, dismantling a critical netw...

35

Vulnerabilities Found in Orthanc DICOM Server Software

Tech & ScienceAI·1 source·

LONDON (AP) — Multiple heap buffer overflow vulnerabilities have been identified in the Orthanc DICOM Server software, a widely used open-source tool for medical imaging data management. The security ...

35

Android Wallet Vulnerability Exposes Millions to Risk via Third-Party SDK

Tech & ScienceAI·1 source·

LONDON (AP) — A critical security vulnerability discovered in a third-party software development kit has exposed millions of Android digital wallets to potential unauthorized access, prompting urgent ...

47

Cybersecurity Bulletin Reveals Hybrid P2P Botnet and Critical Apache Vulnerability

Tech & ScienceAI·1 source·

LONDON, April 9 (AP) — A cybersecurity bulletin published Wednesday detailed the emergence of a hybrid peer-to-peer botnet, a critical remote code execution flaw in Apache servers, and a new remote ac...

35

Google API Keys in Android Apps Expose Gemini Endpoints to Unauthorized Access

Tech & ScienceAI·1 source·

SAN FRANCISCO — Google API keys embedded in Android applications are exposing Gemini endpoints to unauthorized access, creating a potential security vulnerability for users and developers alike. The ...

35

Cybersecurity Group ctinow Announces Webinar on Emerging Threat Actor Targets

Tech & ScienceAI·1 source·

LONDON (AP) — The cybersecurity organization ctinow announced a new webinar focused on the shifting landscape of digital threats, detailing what threat actors are likely to target next. The announcem...

52

Cyber Threat Intelligence Outlook Projected for 2030

Tech & ScienceAI·1 source··UPDATED

A new analysis published on April 9, 2026, outlines a projected trajectory for the cyber threat intelligence landscape extending through 2030. The report, disseminated via a Telegram channel identifie...

35

Palo Alto Networks, SonicWall Issue Patches for High-Severity Vulnerabilities

Tech & ScienceAI·1 source·

SAN FRANCISCO — Major cybersecurity firms Palo Alto Networks and SonicWall released patches Wednesday to address high-severity vulnerabilities affecting their global customer base. The updates, issued...

35

Data Breach Exposes 70,000 User Prompts from NSFW Application

Tech & ScienceAI·1 source·

A significant data breach has exposed 70,000 prompts linked to individual users from an unidentified adult-oriented application, raising serious privacy concerns for those involved. The incident, disc...

44

Test Agency Conducts Pipeline Validation at Test Location

Tech & ScienceAI·1 source·

TEST LOCATION, April 5 — The Test Agency initiated a scheduled function test event at the Test Location site on Saturday, marking a key phase in pipeline validation procedures. The operation, set for...

35

DDGeopolitics Announces Live Stream Event

Tech & ScienceAI·1 source·

LONDON — DDGeopolitics announced a live stream event scheduled for April 8, 2026. The organization confirmed the broadcast will take place on YouTube, though specific details regarding the content and...

35

Power Outages Reported Across Qatar

Tech & ScienceAI·1 source·

DOHA, Qatar (April 8, 2026) — Widespread power outages have been reported across Qatar, disrupting daily life and commercial activity in the Gulf nation. The blackouts, which began in the early hours ...

35

Widespread Power Outages Reported Across Kuwait

Tech & ScienceAI·1 source·

KUWAIT CITY — Power outages affecting multiple areas across Kuwait were reported early Tuesday, disrupting daily life and commercial activity as authorities scrambled to assess the situation. The bla...

35

Claude Code Discovers Two-Decade-Old Linux Kernel Vulnerability

Tech & ScienceAI·1 source·

SAN FRANCISCO (AP) — An artificial intelligence system known as Claude Code identified a critical security flaw in the Linux kernel on Tuesday, a vulnerability that security researchers say has existe...

47

New macOS Malware Campaign Exploits Script Editor in ClickFix Variation

Tech & ScienceAI·1 source·

SAN FRANCISCO — A new cyberattack campaign targeting macOS users has emerged, deploying the Atomic Stealer malware through a variation of the ClickFix attack technique that abuses the system's built-i...

47

CISA Orders Federal Agencies to Patch Critical Ivanti Vulnerability by Sunday

Tech & ScienceAI·1 source·

WASHINGTON — The Cybersecurity and Infrastructure Security Agency (CISA) has directed all U.S. federal agencies to apply a security patch for a critical vulnerability in Ivanti Endpoint Manager Mobile...

35

Hackers Exploit Decade-Old ActiveMQ Vulnerability for Remote Command Execution

Tech & ScienceAI·1 source·

A critical security vulnerability in Apache ActiveMQ, a widely used messaging middleware, is being actively exploited by hackers to execute remote commands on affected systems. The flaw, which has exi...

35

Snowflake Customers Hit by Data Theft Following SaaS Integrator Breach

Tech & ScienceAI·1 source·

SAN FRANCISCO — Snowflake customers were affected by data theft attacks following a breach of a SaaS integrator, the cloud data platform company announced on Monday. The incident, which came to light...

47

Masjesu Botnet Operators Launch Global DDoS Campaign Targeting Enterprises

Tech & ScienceAI·1 source·

LONDON (AP) — A criminal group operating the Masjesu botnet has launched a coordinated series of distributed denial-of-service attacks targeting enterprise networks and Internet of Things devices worl...

35

Hack-for-Hire Spyware Campaign Targets Journalists in Middle East and North Africa

Tech & ScienceAI·1 source·

CAIRO — A sophisticated hack-for-hire spyware campaign is actively targeting journalists across the Middle East and North Africa, security researchers announced Tuesday. The operation, detected on Apr...

47

Meta Unveils Muse Spark AI Model to Power U.S. Services

Tech & ScienceAI·1 source·

MENLO PARK, Calif. — Meta Superintelligence Labs has launched Muse Spark, its first artificial intelligence model developed since Mark Zuckerberg initiated a comprehensive overhaul of the company's AI...

35

Anthropic Unveils 'Claude Mythos' Cybersecurity Tool

Tech & ScienceAI·1 source·

SAN FRANCISCO — Anthropic unveiled a new cybersecurity tool called 'Claude Mythos' on Monday, a development that industry observers say could potentially enhance both defensive and offensive cyber cap...

35

OpenSSL patches data leakage vulnerability

Tech & ScienceAI·1 source·

OpenSSL has released a security patch to address a data leakage vulnerability affecting its widely used cryptographic software library. The update was issued on April 8, 2026, following the discovery ...

35

Check Point Software Honors Partners at Annual UK Awards Ceremony

Tech & ScienceAI·1 source·

LONDON — Check Point Software Ltd. recognized its channel partners with a series of accolades during its Annual UK Partner Awards ceremony held Tuesday. The cybersecurity firm gathered distributors, r...

35

Organisations Face Surge in Unsecured APIs as AI Agents Outpace Security

Tech & ScienceAI·1 source·

Organisations worldwide are confronting a critical surge in unsecured application programming interfaces (APIs) as autonomous artificial intelligence agents rapidly outpace existing cybersecurity meas...

35

DataBee CEO Nicole Bucala Featured at MIWIC26

Tech & ScienceAI·1 source·

NICOLE BUCALA, CEO of DataBee, a Comcast company, was featured as a speaker at the MIWIC26 conference on Tuesday, April 8, 2026. The appearance marks a significant engagement for the data analytics fi...

35

Full Sail University to Launch IBM Cyber Defense Range Powered by AWS

Tech & ScienceAI·1 source·

ORLANDO, Fla. (AP) — Full Sail University is set to open a new IBM Cyber Defense Range on its campus, a facility designed to train students in advanced cybersecurity techniques using infrastructure po...

35

Signature Healthcare Cyberattack Disrupts Services Across U.S.

Tech & ScienceAI·1 source·

Signature Healthcare, a major provider of home health and pharmacy services, confirmed on Tuesday that it is the target of a cyberattack that has disrupted operations across its network in the United ...

35

FBI Warns of Iranian Cyber Campaign Targeting U.S. Critical Infrastructure

Tech & ScienceAI·1 source·

WASHINGTON — The Federal Bureau of Investigation issued a warning Monday that Iranian-linked cyber actors are actively targeting operational technology devices within critical U.S. infrastructure, cau...

35

Russian State-Linked Group APT28 Exploits SOHO Routers in Global DNS Hijacking Campaign

Tech & ScienceAI·1 source·

MOSCOW — A Russian state-linked cyber group known as APT28 has launched a global campaign exploiting vulnerabilities in small office and home office (SOHO) routers to hijack Domain Name System (DNS) t...