Tech & Science

47

Criminal IP and Securonix ThreatQ Announce Strategic Integration

Tech & ScienceAI·1 source·

Criminal IP and Securonix ThreatQ announced a strategic collaboration on May 1, 2026, to integrate Criminal IP's threat intelligence data directly into the ThreatQ platform. The partnership aims to en...

47

Ukraine's Ministry of Defence Reveals Use of GTA V Mods for FPV Drone Training

Tech & ScienceAI·1 source·

KYIV, May 1 — Ukraine's Ministry of Defence released footage on Wednesday demonstrating the use of modified Grand Theft Auto V software to train soldiers in first-person view drone operations. The mi...

47

OpenAI President Says AI Now Writes 80% of Code

Tech & ScienceAI·1 source·

SAN FRANCISCO — OpenAI President Greg Brockman announced Wednesday that artificial intelligence coding tools have evolved from writing 20% of software code to generating 80% of it, marking a fundament...

47

New DDoS Botnet Targets Valve Game Servers via Exposed Jenkins Infrastructure

Tech & ScienceAI·1 source·

LONDON (AP) — A new distributed denial-of-service botnet is actively targeting video game servers running on Valve's Source Engine, exploiting unsecured Jenkins automation servers to launch coordinate...

47

Threat Actors Exploit AI Platforms to Distribute Malware

Tech & ScienceAI·1 source·

LONDON (AP) — Cybercriminals are exploiting popular artificial intelligence distribution platforms to spread malware, trojans, and cryptominers by disguising malicious code within shared files and AI ...

47

Software Supply Chain Attack Targets Developers via Poisoned Code Packages

Tech & ScienceAI·1 source·

SAN FRANCISCO — A malicious actor operating under the GitHub handle BufferZoneCorp launched a coordinated software supply chain attack on Wednesday, distributing compromised Ruby gems and Go modules d...

47

AI-Driven Phishing Attacks Now Account for 86% of Campaigns, Research Shows

Tech & ScienceAI·1 source·

Cybercriminals are increasingly leveraging artificial intelligence to execute phishing campaigns, with 86% of attacks now utilizing AI-driven tactics, according to new research released by security pr...

47

Cisco Releases Open Source Tool to Verify Third-Party AI Model Lineage

Tech & ScienceAI·1 source·

SAN FRANCISCO — Cisco Systems Inc. on Thursday released an open source software tool designed to help organizations track and verify the security and lineage of third-party artificial intelligence mod...

47

SonicWall Issues Urgent Firmware Updates for Critical Firewall Vulnerabilities

Tech & ScienceAI·1 source·

SAN FRANCISCO — Network security firm SonicWall released emergency firmware updates on Wednesday to address three critical vulnerabilities affecting its Gen 6, Gen 7, and Gen 8 firewall series. The co...

47

M-346FA Aircraft Makes Maiden Flight in Nigerian Air Force Colors

Tech & ScienceAI·1 source·

ROME, Italy (May 1, 2026) — An M-346FA advanced jet trainer, manufactured for the Nigerian Air Force, completed its first flight bearing the official markings of the Nigerian military on Thursday. The...

47

Microsoft Unveils AI Security Enhancements Across Agent 365, Defender and GitHub

Tech & ScienceAI·1 source·

REDMOND, Wash. (AP) — Microsoft Security announced a suite of new capabilities on Wednesday designed to protect organizations against emerging artificial intelligence threats through enhanced integrat...

47

Microsoft Reports 15% Drop in Tycoon2FA Phishing Attacks Amid Evolving Email Threats

Tech & ScienceAI·1 source·

Microsoft Threat Intelligence reported a 15% decline in phishing attacks attributed to the Tycoon2FA group during the first quarter of 2026, following coordinated disruption efforts. The findings, rel...

47

US Commerce Agent's Claims on WhatsApp Encryption Spark Security Concerns Before Investigation Ends

Tech & ScienceAI·1 source·

WASHINGTON — A U.S. Commerce Department special agent's allegations that Meta's WhatsApp platform allows access to unencrypted user messages have triggered significant security concerns before the fed...

47

Cybersecurity Breach Targets PyTorch Lightning and Intercom Packages

Tech & ScienceAI·1 source·

LONDON (AP) — Two prominent cybersecurity threat groups, TeamPCP and LAPSUS$, have been linked to a coordinated supply chain attack targeting the PyTorch Lightning and Intercom-client software package...

47

Forescout Launches Global Partner Tour to Boost Cybersecurity Ecosystem

Tech & ScienceAI·1 source·

LONDON (AP) — Cybersecurity firm Forescout has launched Mission:Possible Global Partner Tour, a channel-focused initiative spanning 90 cities worldwide designed to drive growth and strengthen its part...

47

Security Flaws in EnOcean SmartServer Expose Building Systems to Remote Attacks

Tech & ScienceAI·1 source·

BERLIN — Critical security vulnerabilities discovered in EnOcean's SmartServer IoT platform could allow remote attackers to compromise building management systems worldwide, researchers from cybersecu...

47

Critical Vulnerability Found in Google's Gemini CLI Tool

Tech & ScienceAI·1 source·

LONDON (AP) — A critical security flaw discovered in Google's Gemini CLI, an open-source artificial intelligence agent, allows attackers to execute arbitrary commands on developer systems and potentia...

47

Japanese Developer Releases 'Cat Gatekeeper' Extension to Combat Social Media Overuse

Tech & ScienceAI·1 source·

TOKYO (AP) — A Japanese developer has released a free browser extension designed to interrupt social media usage by blocking feeds with a virtual cat when users exceed their time limits. ZOKUZOKU, th...

47

AWS Confirms Cloud Infrastructure Damage in Bahrain and UAE Following Iranian Strikes

Tech & ScienceAI·1 source·

Amazon Web Services confirmed on Wednesday that its cloud regions in Bahrain and the United Arab Emirates sustained damage from Iranian military strikes, disrupting critical services and suspending bi...

47

EU Accuses Meta of DSA Violations Over Minors' Safety

Tech & ScienceAI·1 source·

BRUSSELS — The European Commission has formally accused Meta of violating the Digital Services Act by failing to protect children under the age of 13 on its Instagram and Facebook platforms. The preli...

47

Sandhills Medical Foundation Breach Exposes Data of 170,000

Tech & ScienceAI·1 source·

COLUMBIA, S.C. — The Sandhills Medical Foundation disclosed a ransomware breach that compromised the personal and health information of nearly 170,000 individuals, following a cyberattack attributed t...

47

Ukrainian Tech Firm Unveils Domestic Tactical Camera for Drone Systems

Tech & ScienceAI·1 source·

KYIV, Ukraine — Ukrainian defense technology company Odd Systems introduced its first domestically developed daytime tactical digital camera, the Svitlych-662, on Wednesday, marking a significant step...

47

Ricoh Issues Alert for Printer Vulnerability Allowing Phishing Redirects

Tech & ScienceAI·1 source·

TOKYO — Ricoh Company, Ltd. has acknowledged a security vulnerability in its laser printers and multifunction peripherals (MFPs) that could allow attackers to redirect users to malicious websites. The...

47

SANS ISC Releases Weekly Security Update Highlighting Zero-Day Exploits and APT28 Activity

Tech & ScienceAI·1 source·

JACKSONVILLE, Fla. (AP) — The SANS Internet Storm Center issued a comprehensive weekly security update on Wednesday detailing a surge in cyber threats, including an actively exploited zero-day vulnera...

47

University of Toronto Researchers Unveil 'Talkie,' AI Chatbot Trained Exclusively on Pre-1930 Texts

Tech & ScienceAI·1 source·

TORONTO — A team of researchers at the University of Toronto has developed a 13-billion-parameter artificial intelligence chatbot named Talkie, trained exclusively on English-language texts published ...

47

Wiz Identifies Critical GitHub Vulnerability Using AI Reverse-Engineering Tool

Tech & ScienceAI·1 source·

SAN FRANCISCO — Wiz, a cloud security company, used an artificial intelligence reverse-engineering tool to identify a high-severity remote code execution vulnerability in GitHub Enterprise Server and ...

47

Lawmakers Push for Standalone Data Center Designation to Bolster Security

Tech & ScienceAI·1 source·

WASHINGTON — Members of the House Homeland Security Subcommittee on Cybersecurity and Infrastructure Protection convened Tuesday with industry leaders to advocate for a standalone critical infrastruct...

47

Malware Campaign Targets Developer Environments in Global Credential Theft Operation

Tech & ScienceAI·1 source·

A sophisticated credential-stealing malware campaign has compromised several SAP-related npm packages, targeting developer environments and continuous integration pipelines across the globe. The attac...

47

North Korean Hackers Deploy AI-Enhanced Malware in Global Crypto Heist Campaign

Tech & ScienceAI·1 source·

SEOUL — A North Korean cyber espionage group known as Famous Chollima has launched a sophisticated new campaign targeting cryptocurrency wallets and software developers worldwide, utilizing artificial...

47

Cybersecurity Leaders Urged to Scrutinize Exposure Management Platforms Amid Market Growth

Tech & ScienceAI·1 source·

NEW YORK (AP) — Security leaders are being advised to carefully evaluate the architectural differences of exposure management platforms as the cybersecurity market expands, a new analysis published Tu...