Tech & Science

56

European Commission Cloud Breach Exposes Data of 29 EU Entities

Tech & ScienceAI·1 source·

BRUSSELS — A cyberattack on the European Commission's cloud infrastructure has compromised data belonging to at least 29 other European Union entities, security officials confirmed Thursday. The breac...

45

Telegram Post Identifies Aircraft as F-15EX

Tech & ScienceAI·1 source·

A message posted on the messaging platform Telegram on April 2, 2026, identified an aircraft as an F-15EX. The post, attributed to the user handle Alsaa_plus_EN, appeared at 19:38 UTC. The specific lo...

35

China Unveils Heavy-Lift Cargo Drone for Military Logistics

Tech & ScienceAI·1 source·

BEIJING (AP) — China has demonstrated a new heavy-lift cargo drone capable of transporting up to 600 kilograms of supplies on an external sling, marking a significant advancement in unmanned logistics...

35

NEC Identifies Multiple Vulnerabilities in Aterm Router Series

Tech & ScienceAI·1 source·

TOKYO (AP) — NEC Corp. has disclosed the discovery of multiple security vulnerabilities affecting its Aterm series of networking equipment, prompting an urgent advisory for users to update their syste...

35

Cisco Warns of Critical Vulnerabilities in Network Products

Tech & ScienceAI·1 source·

SAN FRANCISCO — Cisco Systems Inc. disclosed multiple security vulnerabilities across its product line on Thursday that could allow attackers to execute arbitrary code on affected systems. The network...

45

Security Firm ctinow Identifies Critical Flaws in ShareFile Enabling Remote Code Execution

Tech & ScienceAI·1 source·

LONDON (AP) — A new set of security vulnerabilities discovered in ShareFile, a popular file-sharing service, can be chained together to allow attackers to execute code remotely without requiring user ...

35

Sky News Reporter Comments on Apollo Mission Diversity During Artemis II Launch

Tech & ScienceAI·1 source·

CAPE CANAVERAL, Fla. — A Sky News correspondent made remarks during live coverage of the Artemis II launch on Tuesday evening, stating that the historic Apollo missions did not represent humanity beca...

35

House Democrats Condemn ICE Use of Paragon Spyware Amid Privacy Concerns

Tech & ScienceAI·1 source·

WASHINGTON — House Democrats on Wednesday sharply criticized U.S. Immigration and Customs Enforcement for confirmed use of Paragon spyware, raising alarms over civil liberties and government surveilla...

47

Threat Actors Exploit Claude Code Leak to Distribute Vidar Malware via Fake GitHub Repositories

Tech & ScienceAI·1 source·

SAN FRANCISCO — Cybersecurity researchers have identified a new campaign in which threat actors are exploiting a recent source code leak from Claude Code to distribute Vidar information-stealing malwa...

47

Hackers Exploit Next.js Vulnerability to Compromise Hundreds of Hosts

Tech & ScienceAI·1 source·

Hackers exploited a newly disclosed software vulnerability to breach 766 Next.js hosts and steal user credentials, security researchers confirmed on Wednesday. The attack leveraged CVE-2025-55182, a ...

35

Wikipedia Faces Potential 'Bot-ocalypse' Amid AI Agent Controversy

Tech & ScienceAI·1 source·

SAN FRANCISCO — Wikipedia's ongoing dispute over artificial intelligence agents has escalated into what observers are describing as the potential beginning of a widespread bot proliferation crisis. Th...

35

Professor Marandi Appears in Live Video Broadcast

Tech & ScienceAI·1 source·

A live video event featuring Professor Marandi is currently being broadcast, drawing attention from viewers across multiple time zones. The transmission began at 20:05 UTC on April 1, 2026, though the...

35

AI Security Takes Center Stage at RSAC 2026 Amid Calls for Collaboration

Tech & ScienceAI·1 source·

SAN FRANCISCO — Artificial intelligence technologies dominated security discussions at the 2026 RSA Conference, with industry leaders emphasizing that community collaboration remains essential to addr...

35

AI-Enhanced Satellite Image Released Amid Uncertainty

Tech & ScienceAI·1 source·

A satellite image enhanced using artificial intelligence was released on April 2, 2026, sparking interest in the capabilities of automated image processing. The image, whose origin and subject remain ...

35

New EvilTokens Service Fuels Microsoft Device Code Phishing Campaign

Tech & ScienceAI·1 source·

A newly identified service known as EvilTokens is driving a surge in phishing attacks targeting Microsoft device codes, security researchers reported Tuesday. The service, which facilitates the theft ...

35

Cybersecurity Sector Announces 38 Mergers and Acquisitions in March 2026

Tech & ScienceAI·1 source·

The cybersecurity industry announced 38 mergers and acquisitions deals during March 2026, marking a significant consolidation period for the sector. The wave of transactions reflects ongoing strategic...

35

Telegram Post Circulates RSAC 2026 Insights on Geopolitics, AI

Tech & ScienceAI·1 source·

SAN FRANCISCO — A post shared on the messaging platform Telegram on Wednesday distributed a link purportedly containing insights from the 2026 RSA Conference, covering topics including geopolitics, ar...

35

NoVoice Malware Infects 2.3 Million Android Devices on Google Play

Tech & ScienceAI·1 source·

LONDON — A sophisticated Android malware strain known as NoVoice has infected approximately 2.3 million mobile devices distributed through the Google Play Store, marking one of the largest known compr...

35

Stryker Restores Operations Following Data-Wiping Cyberattack

Tech & ScienceAI·1 source·

GRAND RAPIDS, Mich. — Medical technology giant Stryker Corp. announced Wednesday that it has fully restored operations following a disruptive data-wiping cyberattack that temporarily halted critical s...

35

New 'Casbaneiro' Bank Trojan Detected Spreading Across Latin America

Tech & ScienceAI·1 source·

SÃO PAULO — A new banking Trojan identified as 'Casbaneiro' is actively spreading across Latin America, targeting financial institutions and individual users in the region. The malware was detected on...

52

Cisco Issues Critical Security Patches for Network Infrastructure

Tech & ScienceAI·1 source··UPDATED

SAN JOSE, Calif. — Cisco Systems released emergency security patches on Wednesday to address critical and high-severity vulnerabilities affecting its network infrastructure products. The updates, issu...

35

Link to Open Source Security Report Circulates on Messaging Platform

Tech & ScienceAI·1 source·

A digital link directing users to The State of Trusted Open Source Report was distributed on the Telegram messaging service on April 2, 2026. The dissemination of the report occurred at approximately ...

35

Nacogdoches Memorial Hospital Data Breach Affects 250,000

Tech & ScienceAI·1 source·

NACOGDOCHES, Texas — Nacogdoches Memorial Hospital confirmed Tuesday that a data breach has compromised the personal information of approximately 250,000 individuals. The incident, discovered on April...

47

WhatsApp Warns 200 Italian Users of Spyware from Fake iOS App

Tech & ScienceAI·1 source·

MILAN — WhatsApp notified approximately 200 users in Italy on Wednesday that their devices had been compromised by spyware installed through a fraudulent iOS application. The alert, issued by the mess...

35

Mercor Hit by Supply Chain Attack Involving LiteLLM

Tech & ScienceAI·1 source·

SAN FRANCISCO — Artificial intelligence platform Mercor disclosed on Wednesday that it was the target of a supply chain attack involving the open-source proxy server LiteLLM, marking a significant sec...

35

Talos Releases 2025 Year in Review on Data Implications for Cyber Defenders

Tech & ScienceAI·1 source·

SAN FRANCISCO (AP) — Talos, the global threat intelligence division of Cisco, released its 2025 Year in Review report on Wednesday, outlining the evolving implications of data for cybersecurity defend...

35

Cybersecurity Alert: 'Qilin EDR Killer' Infection Chain Emerges on Messaging Platform

Tech & ScienceAI·1 source·

A new cyber threat targeting endpoint detection and response systems has surfaced on the messaging platform Telegram, raising concerns among cybersecurity professionals about the potential for widespr...

35

Global Cybersecurity Alert Issued Following Large-Scale Credential Harvesting Campaign

Tech & ScienceAI·1 source·

A coordinated, large-scale automated campaign targeting web applications to harvest user credentials was detected on April 2, 2026. The operation, identified by cybersecurity monitoring systems, repre...

47

Judge Blocks Pentagon Ban on Anthropic's AI Model

Tech & ScienceAI·1 source·

WASHINGTON — A federal judge issued a temporary restraining order on Wednesday blocking the Pentagon from designating Anthropic as a supply chain risk and prohibiting federal agencies from using its C...

35

Leaked Tool Allegedly Used by U.S. Government to Hack iPhones Surfaces Online

Tech & ScienceAI·1 source·

WASHINGTON — A sophisticated hacking tool allegedly used by the United States government to compromise iPhones has been leaked online, raising immediate concerns about national security and digital pr...