Tech & Science
FBI warns Americans against foreign mobile apps over data security risks
WASHINGTON (April 1, 2026) — The Federal Bureau of Investigation issued a public advisory Monday warning Americans against using mobile applications developed by foreign entities, with a specific focu...
Google patches fourth Chrome zero-day exploited in 2026 attacks
Google has released a security update to address the fourth zero-day vulnerability discovered in its Chrome browser this year, following confirmed exploitation in the wild. The patch, issued on April ...
Google Enables AI Ransomware Detection by Default for Paying Drive Users
SAN FRANCISCO — Google has activated its artificial intelligence-powered ransomware detection feature by default for all paying Google Drive users, marking a significant shift in the company's approac...
GeoPWatch Removes Image Citing AI Generation Concerns
LONDON, April 1 — GeoPWatch, an open-source intelligence group, removed a previously published image on Monday after determining it was likely generated by artificial intelligence. The group issued a ...
Microsoft Issues Emergency Patch to Fix Windows 11 Update Installation Failures
REDMOND, Wash. (AP) — Microsoft released an emergency update on Wednesday to address widespread installation failures affecting users attempting to install the March 2026 non-security preview update f...
FUJI Electric V-SFT System Found Vulnerable to Multiple Security Flaws
TOKYO — FUJI Electric disclosed on Monday that multiple security vulnerabilities have been identified in its V-SFT system, a product released in April 2026. The announcement marks a significant securi...
Anthropic Accidentally Leaks Claude Code Source Code in NPM Package
SAN FRANCISCO — Anthropic, the artificial intelligence company behind the Claude chatbot, accidentally released the source code for its proprietary tool, Claude Code, within a public NPM package on Ap...
GIGABYTE Control Center Software Vulnerable to Remote File-Write Flaw
TAIPEI — GIGABYTE Technology Co. has confirmed a critical security vulnerability in its Control Center software that allows remote, unauthenticated attackers to write arbitrary files to affected syste...
AI Assistant Discovers Remote Code Execution Flaws in Popular Text Editors
LONDON (AP) — A widely used artificial intelligence assistant identified critical security vulnerabilities in two of the world's most popular text editors, enabling attackers to execute remote code si...
Miller Addresses Intelligence Operation Involving Oracle Data Systems
SAN FRANCISCO — David Miller addressed an intelligence operation involving Oracle's data systems and governmental organizations on Monday, marking a significant development in the ongoing scrutiny of ...
AI-Driven Cyber Fraud Surge Prompts Global Security Concerns
GENEVA — The rapid integration of artificial intelligence into criminal operations has triggered a significant escalation in global cyber fraud, prompting urgent calls for coordinated international co...
Google Attributes Axios Supply Chain Attack to North Korean Threat Actor UNC1069
SEOUL — Google on Monday attributed a sophisticated supply chain attack targeting the popular HTTP client library Axios to a suspected North Korean threat actor it has designated UNC1069. The disclosu...
ctinow Shares AI Agent Risk Categorization Guide on Telegram
A digital entity identified as ctinow published an article titled 'How to Categorize AI Agents and Prioritize Risk' on the messaging platform Telegram on Monday. The document outlines a framework for ...
Google Cloud Vertex AI Vulnerability Exposes Private Data
SAN FRANCISCO (AP) — A security vulnerability in Google Cloud's Vertex AI platform is exposing sensitive customer data and private artifacts, prompting urgent action from the tech giant. The flaw, id...
WordPress Security Alert: Article on Fraud Signals Circulates Online
LONDON (AP) — A security advisory titled 'The Invisible Attack Surface: 10 Fraud Signals Every WordPress Developer Misses' has emerged online, raising concerns among web developers about potential vul...
Google Cloud Vertex AI Vulnerability Exposes Credentials, Unit 42 Finds
LONDON (AP) — Google Cloud’s Vertex AI platform contained a security flaw that allowed attackers to steal credentials and expose sensitive cloud data, according to a security advisory released Monday ...
Cyberattack Campaign Targets Southeast Asian Government Systems
SINGAPORE — A sophisticated cyberattack campaign dubbed Operation TrueChaos has been detected targeting government systems across Southeast Asia, exploiting a previously unknown vulnerability in criti...
Proton Launches Encrypted Video Conferencing and Unified Workspace to Challenge Tech Giants
GENEVA — Proton, the Swiss-based privacy technology company, launched a new suite of encrypted video conferencing tools and a unified workspace on Monday, positioning itself as a direct competitor to ...
Silver Fox Expands Asia Cyber Campaign with New Tools
SEOUL (AP) — The cyber espionage group known as Silver Fox has expanded its operations across Asia, deploying a new remote access trojan and establishing a network of fraudulent domains, security rese...
Cohesity Integrates Sophos Malware Scanning at RSAC 2026
SAN FRANCISCO (AP) — Cohesity announced Monday at the RSAC 2026 security conference that it has integrated next-generation malware scanning capabilities powered by Sophos into its data management plat...
Hacktivist Group Handala Claims Breach of IranWire
BEIRUT — The Handala hacktivist group announced Monday that it has successfully breached the digital infrastructure of IranWire, an online news outlet known for its critical coverage of the Iranian go...
AI Arms Race Forces Corporate Boards to Prioritize Unified Exposure Management
Corporate boards are increasingly recognizing the urgent need for unified exposure management as artificial intelligence accelerates the speed of cyberattacks, according to a new analysis by The Hacke...
Google Reduces Quantum Computing Resources Needed to Break Cryptocurrency Encryption
Google announced on Monday that it has significantly reduced the quantum computing resources required to break the encryption protocols currently securing cryptocurrency transactions. The development ...
Critical Flaw in Fortinet Software Exploited in Active Attacks
SUNNYVALE, Calif. (AP) — A critical security vulnerability in Fortinet's FortiClient Endpoint Management Server (EMS) software is being actively exploited in the wild, prompting urgent warnings from c...
Ransomware Groups Shift Tactics to Blend In Amid 2025 Cyber Threat Landscape
Ransomware attackers are increasingly adopting a strategy of blending in with legitimate network activity as a primary tactic in 2025, marking a significant evolution in cyber threat methodologies. Th...
Gizem Acar Tekin Named CEO and Co-founder of Photarix
ISTANBUL — Gizem Acar Tekin has been identified as the chief executive officer and co-founder of Photarix, a technology firm operating in the emerging sector of digital imaging solutions. The announce...
StrongSwan VPN Software Vulnerable to Crash Attack
LONDON (Reuters) - A critical security flaw in StrongSwan, a widely used open-source virtual private network (VPN) software, allows unauthenticated attackers to remotely crash systems, developers anno...
Supply Chain Attack Exposes Developers to Hidden Malware
A sophisticated supply chain attack has compromised software development environments, exposing developers to hidden malware embedded within trusted code repositories. The incident, first reported by ...
Critical Application Control Bypass Vulnerability Reported
A significant security vulnerability allowing for data exfiltration through application control bypass has been reported, raising concerns among cybersecurity professionals regarding potential unautho...
Axios Compromised in npm Supply Chain Attack
NEW YORK (AP) — Axios confirmed Monday that its software infrastructure was compromised in a supply chain attack originating from the npm directory, resulting in the distribution of malicious code to ...