Tech & Science

62

Organizations Face Rising Hidden Costs from Recurring Credential Incidents

Tech & ScienceAI·1 source··UPDATED

Organizations are confronting a persistent wave of credential-based security incidents, with experts warning that the financial and operational toll extends far beyond immediate breach costs. The recu...

57

Cybersecurity Alert: Malicious Campaign Exploits 'Claude Code Packaging Error' Lure

Tech & ScienceAI·1 source·

A persistent cybersecurity threat involving a fabricated 'Claude Code Packaging Error' is being actively used by threat actors to lure victims into compromised systems. Security researchers identified...

35

Flowise AI Agent Builder Hit by Critical Remote Code Execution Vulnerability

Tech & ScienceAI·1 source·

LONDON (Reuters) - A critical security flaw rated CVSS 10.0 is being actively exploited in Flowise AI Agent Builder, affecting more than 12,000 instances globally. The vulnerability allows attackers t...

47

Wynn Resorts Confirms Cyberattack Impacting 21,000 Employees

Tech & ScienceAI·1 source·

LAS VEGAS — Wynn Resorts announced Monday that a cyberattack attributed to the ShinyHunters group has compromised data belonging to approximately 21,000 employees across its United States operations. ...

47

Apollo 16 Veteran Charlie Duke Sends Encouragement to Artemis II Crew

Tech & ScienceAI·1 source·

HOUSTON — Apollo 16 astronaut Charlie Duke recorded a special message for the Artemis II crew on April 7, 2026, as the mission approaches its lunar destination. The communication, transmitted from the...

47

Artemis II Crew Sets New Record for Farthest Human Travel from Earth

Tech & ScienceAI·1 source·

HOUSTON — The four astronauts aboard NASA’s Artemis II mission have set a new record for the farthest distance humans have traveled from Earth, surpassing the Apollo 13 mark set in 1970 as they entere...

56

NASA's Orion Capsule Observes Solar Eclipse from Lunar Orbit

Tech & ScienceAI·1 source·

CAPE CANAVERAL, Fla. — NASA's Orion spacecraft successfully maneuvered to the far side of the moon on Monday, positioning itself to observe a solar eclipse as part of the Artemis II mission. The capsu...

52

Trump Questions Artemis II Crew on Historic Mission Highlights

Tech & ScienceAI·1 source··UPDATED

WASHINGTON — President Donald Trump engaged with the Artemis II crew on Monday, asking the astronauts to describe the most unforgettable aspect of their historic mission. Commander Reid Wiseman respon...

47

Artemis II Crew Reaches Maximum Distance from Earth as Spacecraft Enters Lunar Eclipse

Tech & ScienceAI·1 source·

HOUSTON (AP) — The Artemis II crew reached the farthest point from Earth in their mission on Monday, as their spacecraft crept behind the Moon and eclipsed the Sun from their viewpoint. The crew, con...

35

Axios Publishes Article on Industrialized Social Engineering

Tech & ScienceAI·1 source·

WASHINGTON — A media outlet published an article on April 6, 2026, asserting that recent cyberattacks demonstrate social engineering has evolved into an industrialized process. The piece, titled 'Atta...

47

Fortinet releases emergency patch for critical FortiClient zero-day vulnerability

Tech & ScienceAI·1 source·

SAN FRANCISCO — Fortinet Inc. issued an emergency security patch on Monday to address a critical zero-day vulnerability affecting its FortiClient endpoint security software. The update, released at 8:...

35

Telegram Channel Shares Cyber Threat Intelligence Article

Tech & ScienceAI·1 source·

A digital publication titled 'Cyber Threat Intelligence: Understanding the Digital Battlefield' was distributed via a Telegram channel identified as ctinow on April 6, 2026. The post, timestamped at 2...

35

North Korea Launches Global Cyber Campaign Using Phishing LNK Files

Tech & ScienceAI·1 source·

SEOUL — North Korea launched a coordinated cyber attack campaign targeting organizations worldwide on Monday, utilizing phishing links disguised as LNK files and leveraging GitHub infrastructure for c...

35

Disgruntled Researcher Leaks Windows Zero-Day Exploit 'BlueHammer'

Tech & ScienceAI·1 source·

A disgruntled researcher has leaked a previously unknown Windows zero-day exploit dubbed 'BlueHammer', prompting immediate security alerts from Microsoft and cybersecurity firms globally. The incident...

35

New Mexico Court Issues Ruling on Meta Encryption Standards

Tech & ScienceAI·1 source·

ALBUQUERQUE, N.M. — A New Mexico court issued a significant ruling on April 6 regarding encryption standards for Meta, the parent company of Facebook and WhatsApp, marking a potential shift in how tec...

35

DPRK-linked hackers used GitHub for command and control in South Korea attacks

Tech & ScienceAI·1 source·

SEOUL — Hackers linked to North Korea used GitHub repositories as command and control servers in a series of multi-stage cyberattacks targeting South Korean infrastructure, security officials said Mon...

63

Microsoft Removes Support and Recovery Assistant Utility from Windows Updates

Tech & ScienceAI·1 source··UPDATED

Microsoft has deprecated and removed the Support and Recovery Assistant (SaRA) command-line utility from all in-support versions of Windows updates starting March 10, marking a significant shift in th...

35

Microsoft Links Medusa Ransomware Group to Zero-Day Exploits

Tech & ScienceAI·1 source·

REDMOND, Wash. (AP) — Microsoft has identified a direct operational link between the Medusa ransomware affiliate network and the deployment of zero-day vulnerabilities in recent cyberattacks, marking ...

35

OpenAI CEO Warns of Potential World-Shaking Cyber Attack in 2026

Tech & ScienceAI·1 source·

SAN FRANCISCO — OpenAI Chief Executive Sam Altman warned on Sunday that a world-shaking cyber attack is possible within the current year, echoing broader concerns about escalating digital threats. The...

45

AI-Enabled Device Code Phishing Campaign Detected

Tech & ScienceAI·1 source·

A new phishing campaign utilizing artificial intelligence to generate device codes has been detected, marking a significant evolution in cyber threats targeting digital credentials. The attack vector,...

56

CISA Orders Federal Agencies to Patch Actively Exploited Fortinet Vulnerability

Tech & ScienceAI·1 source·

WASHINGTON — The Cybersecurity and Infrastructure Security Agency (CISA) has directed all federal agencies to patch a critical vulnerability in Fortinet network security devices by Friday, citing acti...

35

Google DeepMind Researchers Map Web Attacks Targeting AI Agents

Tech & ScienceAI·1 source·

LONDON (AP) — Google DeepMind researchers have published a comprehensive mapping of web attacks specifically designed to target artificial intelligence agents, marking a significant shift in cybersecu...

56

Russia Unveils AI-Driven System to Intercept Suicide Drones

Tech & ScienceAI·1 source··UPDATED

MOSCOW (AP) — Russia has unveiled a new artificial intelligence-powered defense system designed to intercept suicide drones using a medium-sized machine gun at minimal cost. The system was presented ...

35

Cybersecurity Incidents Target Major Tech Firms and News Outlet in Weekly Wave

Tech & ScienceAI·1 source·

A series of significant cybersecurity incidents involving major technology companies and a prominent news organization emerged over the past week, highlighting vulnerabilities across digital infrastru...

35

OWASP GenAI Security Project Releases Updated Tools Matrix

Tech & ScienceAI·1 source·

The Open Web Application Security Project (OWASP) has updated its Generative AI Security Project, releasing a new tools matrix to help organizations assess and manage risks associated with artificial ...

35

Telegram Channel Posts Announcement for Iran War-Themed Japanese Anime

Tech & ScienceAI·1 source·

A Telegram channel identified as CyberspecNews announced on Sunday the development of a Japanese anime series centered on the Iran War, marking an unusual intersection of geopolitical conflict and Jap...

35

Lock and Code Announces Seventh Season Premiere Focused on Autonomous Weapons

Tech & ScienceAI·1 source·

LOS ANGELES — The production team behind the series "Lock and Code" announced on Saturday the premiere of its seventh season, with the seventh episode set to address the proliferation of autonomous ro...

35

CrowdStrike Demonstrates Malware-Free Attack Vector in 2026 Presentation

Tech & ScienceAI·1 source·

A cybersecurity firm has unveiled a new demonstration of a sophisticated cyberattack that operates without the use of traditional malware, marking a significant shift in threat landscape analysis. Cro...

45

Fortinet Issues Emergency Patch for FortiClient EMS Flaw Exploited in Attacks

Tech & ScienceAI·1 source·

SUNNYVALE, Calif. (AP) — Fortinet Inc. released an emergency security patch on Sunday to address a critical vulnerability in its FortiClient Endpoint Management Server (EMS) software that has already ...

56

Hackers Exploit Next.js Vulnerability in Automated Credential Theft Campaign

Tech & ScienceAI·1 source·

LONDON (AP) — Cybercriminals are exploiting a newly discovered vulnerability in Next.js web applications to steal user credentials in an automated campaign, security researchers said Friday. The atta...