Tech & Science

56

FBI warns Americans against foreign mobile apps over data security risks

Tech & ScienceAI·1 source·

WASHINGTON (April 1, 2026) — The Federal Bureau of Investigation issued a public advisory Monday warning Americans against using mobile applications developed by foreign entities, with a specific focu...

63

Google patches fourth Chrome zero-day exploited in 2026 attacks

Tech & ScienceAI·1 source·

Google has released a security update to address the fourth zero-day vulnerability discovered in its Chrome browser this year, following confirmed exploitation in the wild. The patch, issued on April ...

56

Google Enables AI Ransomware Detection by Default for Paying Drive Users

Tech & ScienceAI·1 source·

SAN FRANCISCO — Google has activated its artificial intelligence-powered ransomware detection feature by default for all paying Google Drive users, marking a significant shift in the company's approac...

35

GeoPWatch Removes Image Citing AI Generation Concerns

Tech & ScienceAI·1 source·

LONDON, April 1 — GeoPWatch, an open-source intelligence group, removed a previously published image on Monday after determining it was likely generated by artificial intelligence. The group issued a ...

56

Microsoft Issues Emergency Patch to Fix Windows 11 Update Installation Failures

Tech & ScienceAI·1 source·

REDMOND, Wash. (AP) — Microsoft released an emergency update on Wednesday to address widespread installation failures affecting users attempting to install the March 2026 non-security preview update f...

35

FUJI Electric V-SFT System Found Vulnerable to Multiple Security Flaws

Tech & ScienceAI·1 source·

TOKYO — FUJI Electric disclosed on Monday that multiple security vulnerabilities have been identified in its V-SFT system, a product released in April 2026. The announcement marks a significant securi...

63

Anthropic Accidentally Leaks Claude Code Source Code in NPM Package

Tech & ScienceAI·1 source·

SAN FRANCISCO — Anthropic, the artificial intelligence company behind the Claude chatbot, accidentally released the source code for its proprietary tool, Claude Code, within a public NPM package on Ap...

56

GIGABYTE Control Center Software Vulnerable to Remote File-Write Flaw

Tech & ScienceAI·1 source·

TAIPEI — GIGABYTE Technology Co. has confirmed a critical security vulnerability in its Control Center software that allows remote, unauthenticated attackers to write arbitrary files to affected syste...

47

AI Assistant Discovers Remote Code Execution Flaws in Popular Text Editors

Tech & ScienceAI·1 source·

LONDON (AP) — A widely used artificial intelligence assistant identified critical security vulnerabilities in two of the world's most popular text editors, enabling attackers to execute remote code si...

35

Miller Addresses Intelligence Operation Involving Oracle Data Systems

Tech & ScienceAI·1 source·

SAN FRANCISCO — David Miller addressed an intelligence operation involving Oracle's data systems and governmental organizations on Monday, marking a significant development in the ongoing scrutiny of ...

35

AI-Driven Cyber Fraud Surge Prompts Global Security Concerns

Tech & ScienceAI·1 source·

GENEVA — The rapid integration of artificial intelligence into criminal operations has triggered a significant escalation in global cyber fraud, prompting urgent calls for coordinated international co...

47

Google Attributes Axios Supply Chain Attack to North Korean Threat Actor UNC1069

Tech & ScienceAI·1 source·

SEOUL — Google on Monday attributed a sophisticated supply chain attack targeting the popular HTTP client library Axios to a suspected North Korean threat actor it has designated UNC1069. The disclosu...

35

ctinow Shares AI Agent Risk Categorization Guide on Telegram

Tech & ScienceAI·1 source·

A digital entity identified as ctinow published an article titled 'How to Categorize AI Agents and Prioritize Risk' on the messaging platform Telegram on Monday. The document outlines a framework for ...

35

Google Cloud Vertex AI Vulnerability Exposes Private Data

Tech & ScienceAI·1 source·

SAN FRANCISCO (AP) — A security vulnerability in Google Cloud's Vertex AI platform is exposing sensitive customer data and private artifacts, prompting urgent action from the tech giant. The flaw, id...

35

WordPress Security Alert: Article on Fraud Signals Circulates Online

Tech & ScienceAI·1 source·

LONDON (AP) — A security advisory titled 'The Invisible Attack Surface: 10 Fraud Signals Every WordPress Developer Misses' has emerged online, raising concerns among web developers about potential vul...

47

Google Cloud Vertex AI Vulnerability Exposes Credentials, Unit 42 Finds

Tech & ScienceAI·1 source·

LONDON (AP) — Google Cloud’s Vertex AI platform contained a security flaw that allowed attackers to steal credentials and expose sensitive cloud data, according to a security advisory released Monday ...

52

Cyberattack Campaign Targets Southeast Asian Government Systems

Tech & ScienceAI·1 source··UPDATED

SINGAPORE — A sophisticated cyberattack campaign dubbed Operation TrueChaos has been detected targeting government systems across Southeast Asia, exploiting a previously unknown vulnerability in criti...

47

Proton Launches Encrypted Video Conferencing and Unified Workspace to Challenge Tech Giants

Tech & ScienceAI·1 source·

GENEVA — Proton, the Swiss-based privacy technology company, launched a new suite of encrypted video conferencing tools and a unified workspace on Monday, positioning itself as a direct competitor to ...

35

Silver Fox Expands Asia Cyber Campaign with New Tools

Tech & ScienceAI·1 source·

SEOUL (AP) — The cyber espionage group known as Silver Fox has expanded its operations across Asia, deploying a new remote access trojan and establishing a network of fraudulent domains, security rese...

35

Cohesity Integrates Sophos Malware Scanning at RSAC 2026

Tech & ScienceAI·1 source·

SAN FRANCISCO (AP) — Cohesity announced Monday at the RSAC 2026 security conference that it has integrated next-generation malware scanning capabilities powered by Sophos into its data management plat...

35

Hacktivist Group Handala Claims Breach of IranWire

Tech & ScienceAI·1 source·

BEIRUT — The Handala hacktivist group announced Monday that it has successfully breached the digital infrastructure of IranWire, an online news outlet known for its critical coverage of the Iranian go...

45

AI Arms Race Forces Corporate Boards to Prioritize Unified Exposure Management

Tech & ScienceAI·1 source·

Corporate boards are increasingly recognizing the urgent need for unified exposure management as artificial intelligence accelerates the speed of cyberattacks, according to a new analysis by The Hacke...

35

Google Reduces Quantum Computing Resources Needed to Break Cryptocurrency Encryption

Tech & ScienceAI·1 source·

Google announced on Monday that it has significantly reduced the quantum computing resources required to break the encryption protocols currently securing cryptocurrency transactions. The development ...

35

Critical Flaw in Fortinet Software Exploited in Active Attacks

Tech & ScienceAI·1 source·

SUNNYVALE, Calif. (AP) — A critical security vulnerability in Fortinet's FortiClient Endpoint Management Server (EMS) software is being actively exploited in the wild, prompting urgent warnings from c...

57

Ransomware Groups Shift Tactics to Blend In Amid 2025 Cyber Threat Landscape

Tech & ScienceAI·1 source··UPDATED

Ransomware attackers are increasingly adopting a strategy of blending in with legitimate network activity as a primary tactic in 2025, marking a significant evolution in cyber threat methodologies. Th...

35

Gizem Acar Tekin Named CEO and Co-founder of Photarix

Tech & ScienceAI·1 source·

ISTANBUL — Gizem Acar Tekin has been identified as the chief executive officer and co-founder of Photarix, a technology firm operating in the emerging sector of digital imaging solutions. The announce...

35

StrongSwan VPN Software Vulnerable to Crash Attack

Tech & ScienceAI·1 source·

LONDON (Reuters) - A critical security flaw in StrongSwan, a widely used open-source virtual private network (VPN) software, allows unauthenticated attackers to remotely crash systems, developers anno...

35

Supply Chain Attack Exposes Developers to Hidden Malware

Tech & ScienceAI·1 source·

A sophisticated supply chain attack has compromised software development environments, exposing developers to hidden malware embedded within trusted code repositories. The incident, first reported by ...

35

Critical Application Control Bypass Vulnerability Reported

Tech & ScienceAI·1 source·

A significant security vulnerability allowing for data exfiltration through application control bypass has been reported, raising concerns among cybersecurity professionals regarding potential unautho...

52

Axios Compromised in npm Supply Chain Attack

Tech & ScienceAI·1 source··UPDATED

NEW YORK (AP) — Axios confirmed Monday that its software infrastructure was compromised in a supply chain attack originating from the npm directory, resulting in the distribution of malicious code to ...