Tech & Science

56

Fortinet Issues Emergency Patches for Actively Exploited FortiClient EMS Vulnerability

Tech & ScienceAI·1 source··UPDATED

FORTINET INC. has released emergency security patches for its FortiClient Enterprise Management Server (EMS) following the discovery of active exploitation of a critical vulnerability identified as CV...

56

Malicious npm Packages Target Strapi Users with Database Exploits

Tech & ScienceAI·1 source·

NEW YORK — A campaign involving 36 malicious software packages disguised as plugins for the Strapi content management system has been identified, exploiting database connections to deploy persistent i...

35

GeoPWatch User Challenges Claims on AI Game Footage Quality

Tech & ScienceAI·1 source·

A user on the GeoPWatch platform has publicly disputed assertions that artificial intelligence-generated video game footage suffers from poor visual fidelity and unnatural camera movement. The exchang...

35

NASA Releases Artemis II Image of Earth Sunrise and City Lights

Tech & ScienceAI·1 source·

WASHINGTON — NASA released a photograph on Thursday capturing a sunrise over Earth alongside the glow of human activity, taken by the crew of the Artemis II mission. The image, shared by the space age...

56

North Korean Hackers Target Axios Maintainers in Social Engineering Campaign

Tech & ScienceAI·1 source·

SEOUL — North Korean threat actors launched a targeted social engineering campaign against maintainers of the Axios HTTP client, successfully hijacking a maintainer account through a deceptive Microso...

35

Report Details Potential Malware Pipeline Linked to AI Tool Source Code Exposure

Tech & ScienceAI·1 source·

A document circulating on messaging platforms details a security incident involving the exposure of source code for an artificial intelligence tool, allegedly transforming an accidental leak into a ma...

35

Individual Claims Development of Real-Time Cyber Threat Intelligence Application

Tech & ScienceAI·1 source·

An unidentified individual announced the creation of a real-time cyber threat intelligence application on April 4, 2026, sharing a link to an article detailing the project. The announcement, made at 1...

35

Iranian Drone Manufacturer Displays Tupac Shakur Tribute on Military Hardware

Tech & ScienceAI·1 source·

TEHRAN — An Iranian-manufactured drone bearing a tribute to the late American hip-hop artist Tupac Shakur was photographed in Iran on April 4, 2026, marking an unusual intersection of military hardwar...

35

LinkedIn Scans Thousands of Chrome Extensions, Data Collection Raises Privacy Concerns

Tech & ScienceAI·1 source·

SAN FRANCISCO — LinkedIn is scanning for more than 6,000 Chrome extensions and collecting data from them, a practice that has raised questions about user privacy and data security. The professional n...

35

CrowdStrike Expands Next-Gen SIEM with Microsoft Defender Integration

Tech & ScienceAI·1 source·

SAN FRANCISCO — CrowdStrike announced on Thursday that its Next-Gen SIEM platform now supports the ingestion of telemetry data from Microsoft Defender, marking a significant expansion in cross-platfor...

47

LinkedIn Found Scanning Browsers for Chrome Extensions via Hidden Scripts

Tech & ScienceAI·1 source·

Microsoft-owned professional network LinkedIn is deploying hidden JavaScript scripts to scan visitors' web browsers for installed Chrome extensions and collect device data, a practice that has raised ...

47

TeslaCharging Marks 80,000th Supercharger Stall in France

Tech & ScienceAI·1 source·

SAINT-SATURNIN, France — TeslaCharging activated its 80,000th Supercharger stall on Thursday at a new station just north of Le Mans, marking a significant milestone in the expansion of electric vehicl...

35

Iraq Bans Telegram App Amid Unspecified Government Request

Tech & ScienceAI·1 source·

BAGHDAD — The Iraqi government has ordered a ban on the Telegram messaging application across the country, authorities announced Thursday. The directive, issued on April 3, 2026, marks a significant s...

35

Unidentified Object Intercepted in Space Without Triggering Alerts

Tech & ScienceAI·1 source·

GENEVA — An unidentified object was intercepted in space on April 3, 2026, without triggering any automated alerts or defensive systems, according to BellumActaNews. The incident occurred at 17:59:24 ...

47

MIT, DeepMind Researchers Unveil AI System Capable of Learning Causal Relationships

Tech & ScienceAI·1 source·

CAMBRIDGE, Mass. — Researchers at the Massachusetts Institute of Technology and Google DeepMind have demonstrated a new artificial intelligence system capable of learning causal relationships from obs...

56

Hims & Hers Health Warns of Data Breach Following Stolen Support Tickets

Tech & ScienceAI·1 source·

SAN FRANCISCO — Hims & Hers Health Inc. disclosed a data breach on Thursday after unauthorized parties gained access to customer support tickets stored on a third-party service platform. The telehealt...

35

T-Mobile clarifies details in latest data breach filing

Tech & ScienceAI·1 source·

LOS ANGELES (AP) — T-Mobile issued a statement Thursday clarifying details regarding its latest data breach filing, addressing discrepancies in information previously submitted to regulators. The wir...

35

Iran-linked cyberattack disrupts AWS services in Bahrain

Tech & ScienceAI·1 source·

MANAMA, Bahrain (AP) — Amazon Web Services (AWS) infrastructure in Bahrain was taken offline Thursday following a cyberattack attributed to Iran, disrupting digital services across the Gulf nation. T...

35

Sejil-2 Missile Launched Amidst Uncertainty

Tech & ScienceAI·1 source·

TEHRAN — The Sejil-2 missile was launched Thursday, marking a significant development in regional military activity. The launch occurred at 17:13 UTC, though the specific location of the launch site r...

35

Artemis II mission releases first high-resolution Earth image from Orion capsule

Tech & ScienceAI·1 source·

CAPE CANAVERAL, Fla. (AP) — The Artemis II mission has released the first high-resolution photograph of Earth captured from the Orion capsule, marking a significant milestone in the spacecraft's journ...

35

Security Leaders Accelerate AI Adoption Amid Evolving Threat Landscape

Tech & ScienceAI·1 source·

Security executives across the industry are rapidly integrating artificial intelligence technologies into their operational frameworks, marking a significant shift in how organizations manage risk and...

35

Hasbro Investigates Possible Data Breach Following Cyberattack

Tech & ScienceAI·1 source·

NEW YORK — Hasbro Inc. announced Wednesday that it is investigating a possible data breach following a cyberattack on its systems. The toy and game manufacturer confirmed the incident in a statement r...

35

Penta Security Details D.AMO Platform Defense Against Multi-Extortion Ransomware

Tech & ScienceAI·1 source·

Penta Security has detailed how its D.AMO platform neutralizes exfiltrated files in multi-extortion ransomware attacks, rendering stolen data useless to attackers even after encryption. The cybersecur...

35

Artifex Discloses Integer Overflow Vulnerability in MuPDF Software

Tech & ScienceAI·1 source·

LONDON (AP) — Artifex has disclosed a critical security vulnerability in its MuPDF software library, identified as an integer overflow flaw that could allow attackers to execute arbitrary code on affe...

35

Threat Actors Exploit AI Tools to Accelerate Cyberattacks

Tech & ScienceAI·1 source·

Threat actors are increasingly leveraging artificial intelligence tools to accelerate and enhance cyberattacks, marking a significant shift in the cyber threat landscape. The technology, once primaril...

35

Global Cybersecurity Incidents Escalate with Water Facility Ransomware and AI Data Breach

Tech & ScienceAI·1 source·

A series of significant cybersecurity incidents were reported Thursday, including a ransomware attack on a critical water infrastructure facility, a data leak involving the artificial intelligence pla...

35

Lawmakers Renew Push for Labor Department Cyber Apprenticeship Grants

Tech & ScienceAI·1 source·

WASHINGTON — Lawmakers are renewing their push for Labor Department-backed cyber apprenticeship grants, seeking to secure funding for programs designed to bolster the nation’s cybersecurity workforce....

35

Security Firm ctinow Reports Exploitation Attempts Against Vite Vulnerability

Tech & ScienceAI·1 source·

LONDON — Security firm ctinow reported on Wednesday that attempts were made to exploit exposed installations of the Vite web development tool, leveraging a newly disclosed vulnerability identified as ...

35

TTP Releases New Video Detailing Insider Threat Tactics

Tech & ScienceAI·1 source·

LONDON (AP) — The TTP, a group known for sophisticated cyber operations, released a new video on Tuesday titled 'The TTP Ep 21: When Attackers Become Trusted Users,' outlining methods for compromising...

45

U.S. Unveils New National Cyber Strategy

Tech & ScienceAI·1 source·

WASHINGTON — The United States government announced a new National Cyber Strategy on Wednesday, marking a significant shift in the nation's approach to digital defense and global cybersecurity posture...