Tech & Science
Russian Cyberattack Targets Microsoft Office Tokens via Router Compromise
MOSCOW — Russian state-linked actors have launched a cyberattack targeting Microsoft Office authentication tokens by compromising internet routers, security researchers disclosed Monday. The operation...
Trent AI Emerges from Stealth Mode Following $13 Million Funding Round
SAN FRANCISCO — Trent AI officially ended its stealth period on Monday, announcing the launch of operations after securing $13 million in funding. The artificial intelligence startup, which has remain...
Critical Remote Code Execution Flaw Found in Apache ActiveMQ Classic
SAN FRANCISCO — A critical remote code execution vulnerability has been identified in Apache ActiveMQ Classic, a widely used open-source messaging system, with evidence indicating the flaw existed und...
Small Businesses Turn to AI for Cybersecurity Amid Rising Threats
Small businesses are increasingly adopting artificial intelligence-driven fraud detection and cybersecurity measures to defend against a surge in cyber attacks targeting smaller enterprises. The shift...
Human vs. AI Debate Takes Center Stage at RSAC 2026
SAN FRANCISCO — The balance between human expertise and artificial intelligence is defining the cybersecurity landscape as industry leaders gather for the 2026 RSA Conference. Organizers and experts a...
Android Patches Severe StrongBox Security Vulnerability
Android developers and security researchers have confirmed the patching of a severe vulnerability within the StrongBox security feature, a critical component of the mobile operating system's encryptio...
Debate Emerges Over Efficacy of High-End GPU for Password Cracking
SAN FRANCISCO — A technical discussion has emerged regarding the practical utility of a $30,000 graphics processing unit (GPU) specifically marketed for password cracking operations. The debate center...
Russian hacking group targets home routers for surveillance
A Russian hacking group has launched a campaign targeting home and small office routers to spy on users, cybersecurity officials announced Monday. The operation, detected on April 8, 2026, exploits vu...
Nearly Half of Identity Activity Remains Invisible to Enterprise Security Systems
WASHINGTON — A significant portion of digital identity activity within enterprise environments operates outside the visibility of standard Identity and Access Management (IAM) systems, creating substa...
Mozilla Addresses Critical Vulnerabilities in Software Products
SAN FRANCISCO — Mozilla has identified multiple security vulnerabilities across its software products that could allow attackers to execute arbitrary code on affected systems. The technology company ...
Nokia Researcher Shares Link for Upcoming MIWIC26 Security Event
HELSINKI (AP) — Anmol Agarwal, a senior security researcher at Nokia, shared a link related to MIWIC26, a security research event, on Monday. The announcement comes as the telecommunications industry ...
Developers Address Multiple Vulnerabilities in MATCHA Series Software
SAN FRANCISCO — Developers of the MATCHA series software announced on Tuesday that multiple security vulnerabilities have been discovered within the system, prompting immediate attention from maintain...
AI Accelerates Cybersecurity Shift at 2026 RSAC Conference
SAN FRANCISCO — Artificial intelligence is reshaping the cybersecurity landscape at a pace that outstrips traditional defensive measures, industry leaders declared at the 2026 RSA Conference on Monday...
Iranian Cyber Offensive Report Circulates Online
TEHRAN — A document titled 'Iranian Cyber Offensive — April 2026 Threat Intelligence Report' appeared online on Wednesday, detailing a coordinated digital campaign attributed to Iranian state actors. ...
New ClickFix Malware Campaign Targets Cryptocurrency via Tor Network
A new variant of the ClickFix malware campaign has emerged, utilizing Node.js-based malicious code distributed through the Tor network to steal cryptocurrency from victims. The attack was detected on ...
Artemis II Captures Image of Earth from Lunar Far Side
HOUSTON — The Artemis II mission transmitted a photograph of planet Earth taken from the far side of the Moon on Monday, marking a significant milestone in the ongoing lunar exploration campaign. The...
Microsoft Deploys Server-Side Fix for Windows 11 Start Menu Search Issue
Microsoft has deployed a server-side fix to address a malfunction affecting the Start Menu search feature on certain Windows 11 23H2 devices. The update, implemented on April 8, 2026, aims to resolve ...
Anthropic AI Uncovers Thousands of Zero-Day Vulnerabilities in Project Glasswing
SAN FRANCISCO (AP) — Anthropic launched Project Glasswing on Tuesday, a security initiative during which its artificial intelligence system, Claude Mythos, identified thousands of previously unknown z...
Unidentified Launch Fails in Early Hours of April 8
An unidentified launch failed or was intercepted in the early hours of April 8, 2026, according to initial observations. The incident occurred at approximately 23:31 UTC on April 7, marking a signific...
Iranian-Affiliated Cyber Actors Exploit US Critical Infrastructure PLCs
WASHINGTON — Iranian-affiliated cyber actors successfully exploited programmable logic controllers across United States critical infrastructure systems, marking a significant escalation in state-spons...
Missile Launch Fails Shortly After Liftoff
A missile failed shortly after its launch on Monday, April 7, 2026. The incident occurred at 23:33 UTC, though the specific location of the launch site remains unconfirmed. Details regarding the type ...
SaaS Provider Breach Exposes Dozen Companies to Data Theft
A security breach at an unspecified software-as-a-service (SaaS) integration provider has resulted in data theft attacks affecting more than a dozen companies, security officials confirmed on Monday. ...
Cybercriminals Exploit SaaS Notification Pipelines as Trojan Horse
A new cybercrime tactic has emerged involving the weaponization of Software as a Service (SaaS) notification pipelines, according to a post published on the messaging platform Telegram. The disclosure...
GrafanaGhost Bypasses Grafana AI Defenses in Untraceable Breach
LOS ANGELES — An unidentified actor known as GrafanaGhost successfully bypassed the artificial intelligence security defenses of data visualization platform Grafana on April 7, 2026, without leaving a...
NASA Astronauts Share First Images of Moon's Far Side Since 1972
HOUSTON — NASA astronauts orbiting the Moon for the first time since 1972 released new images of Earth's satellite on Monday, including views of its far side that have never been captured from orbit b...
New GPU Rowhammer Attack Enables System Takeover
A new cybersecurity threat has emerged, enabling attackers to seize control of computer systems through a vulnerability in graphics processing units. The attack, identified as GPUBreach, exploits a ha...
Hackers Exploit Critical Vulnerability in Flowise Platform
Hackers are actively exploiting a maximum-severity vulnerability in the open-source platform Flowise, allowing them to execute arbitrary code on affected systems. The security flaw, identified on Apri...
New GPU Memory Exploit Enables Full System Takeover
LONDON (AP) — A critical new vulnerability dubbed GPUBreach has been discovered that allows attackers to seize complete control of computer systems by manipulating graphics processing unit memory. The...
Over 1,000 ComfyUI Instances Compromised in Global Cryptomining Attack
LONDON — More than 1,000 instances of the open-source AI image generation tool ComfyUI were compromised on Monday, allowing attackers to execute unauthenticated code for cryptomining and botnet expans...
New GDDR6 Vulnerability Allows Full CPU Privilege Escalation in Cloud AI Systems
LONDON (AP) — A critical security vulnerability discovered in cloud-based artificial intelligence systems allows attackers to escalate privileges to full CPU control by exploiting a flaw in GDDR6 memo...