Tech & Science

47

CISA Orders Federal Agencies to Patch Actively Exploited Citrix Vulnerability

Tech & ScienceAI·1 source·

WASHINGTON — The Cybersecurity and Infrastructure Security Agency (CISA) has directed all federal agencies to apply a critical security patch for an actively exploited vulnerability in Citrix systems ...

35

Malicious Code Injected into Popular Axios Packages Following NPM Account Compromise

Tech & ScienceAI·1 source·

LOS ANGELES — A malicious version of the widely used Axios HTTP client library was distributed through the npm registry on March 31, 2026, following the compromise of an account associated with the pa...

35

Israeli Tech Sector Faces Severe Damage as Companies Consider Exit

Tech & ScienceAI·1 source·

JERUSALEM (Reuters) - A significant portion of Israel's technology sector has sustained damage, with 71% of companies reporting harm and 31% considering leaving the country, Israeli media reported on ...

35

FBI warns of Iranian cyber actors using Telegram for malware distribution

Tech & ScienceAI·1 source·

WASHINGTON — The Federal Bureau of Investigation issued a public warning on Monday alerting organizations and individuals to a new campaign by Iranian cyber actors distributing malware through the mes...

35

Apple iPhone 18 Pro Expected to Feature Smaller Dynamic Island

Tech & ScienceAI·1 source·

Apple is preparing to significantly reduce the size of the Dynamic Island on its upcoming iPhone 18 Pro model, a design shift aimed at maximizing screen real estate and creating a cleaner display for ...

47

Healthcare IT firm CareCloud discloses data breach, network disruption

Tech & ScienceAI·1 source·

Healthcare IT firm CareCloud disclosed a data breach incident that exposed sensitive patient data and caused an eight-hour network disruption. The company confirmed the incident on March 30, 2026, fol...

35

DDGeopolitics to Host Live Stream Featuring PMF on YouTube

Tech & ScienceAI·1 source·

LONDON, March 30 (AP) — DDGeopolitics announced Monday it will host a live stream on YouTube featuring PMF. The announcement was made at 8:04 p.m. UTC, with the event scheduled to take place on the vi...

35

Manufacturing and Healthcare Sectors Face Password Management Challenges

Tech & ScienceAI·1 source·

Manufacturing and healthcare organizations are grappling with widespread difficulties in password management, a critical vulnerability that threatens operational security across both industries. The i...

47

OpenAI patches critical vulnerabilities in ChatGPT and Codex

Tech & ScienceAI·1 source·

SAN FRANCISCO — OpenAI addressed two significant security vulnerabilities on Sunday, patching a data exfiltration flaw in its ChatGPT service and a GitHub token vulnerability in its Codex code-generat...

35

Power Restored Across Alborz Province Following Widespread Outage

Tech & ScienceAI·1 source·

TEHRAN — Electricity service has been fully restored across all areas of Alborz province, Iran, following a widespread outage that affected the region late Saturday. The Alborz Electricity Distributio...

35

FBI Confirms Hack of Director Patel's Personal Email

Tech & ScienceAI·1 source·

WASHINGTON — The Federal Bureau of Investigation confirmed Saturday that the personal email inbox of FBI Director Kash Patel was compromised in a cyberattack. The bureau announced the breach late Satu...

35

Officials Report Surge in Cyberattacks Amid Iran-U.S.-Israel Tensions

Tech & ScienceAI·1 source·

WASHINGTON (AP) — U.S. and Israeli officials reported a significant surge in cyberattacks targeting critical infrastructure and data systems across the United States, Israel, and Iran, citing escalati...

35

TeamPCP Executes Supply Chain Attack via Malicious WAV Files

Tech & ScienceAI·1 source·

A cyberattack group known as TeamPCP has launched a supply chain attack by embedding malware within WAV audio files, security researchers confirmed on March 29, 2026. The operation marks a significant...

35

Attackers Probe NetScaler Vulnerability CVE-2026-3055 Amid Data Leak Concerns

Tech & ScienceAI·1 source·

Attackers are actively probing a newly identified vulnerability in NetScaler appliances, designated CVE-2026-3055, raising alarms over potential exposure of sensitive corporate data. The security flaw...

35

Security Affairs Malware Newsletter Round 90 Published

Tech & ScienceAI·1 source·

A new edition of the Security Affairs malware newsletter, designated as Round 90, was published on March 29, 2026. The release marks the latest installment in a recurring series of cybersecurity brief...

35

CTINOW Releases AI Threat Landscape Digest for Early 2026

Tech & ScienceAI·1 source·

LONDON (AP) — CTINOW published a comprehensive AI Threat Landscape Digest on Sunday, covering security developments and emerging risks from January through February 2026. The report, released at 10:29...

35

Windows Applications Show Higher Instability Rates Than macOS, Analysts Find

Tech & ScienceAI·1 source·

SAN FRANCISCO — Windows applications experience hangs 7.5 times more frequently than those running on macOS, according to new analysis from Omnissa. The findings, released on Saturday, also indicate t...

35

Pro-Palestinian Hacktivist Group Handala Claims Breach of FBI Director's Email

Tech & ScienceAI·1 source·

WASHINGTON — The pro-Palestinian hacktivist group Handala claimed on Thursday to have breached the personal email account of the FBI director and disrupted federal law enforcement systems across the U...

35

CYBERDUDEBIVASH Unveils Sentinel APEX™ AI Cyber Threat Platform

Tech & ScienceAI·1 source·

LONDON (March 27, 2026) — A new real-time artificial intelligence cyber threat intelligence platform, Sentinel APEX™, was announced Thursday by the entity known as CYBERDUDEBIVASH. The announcement ma...

35

Malware Hidden in Audio Files Found in Compromised Telnyx Package

Tech & ScienceAI·1 source·

A malicious software payload concealed within WAV audio files was discovered embedded in a compromised Telnyx package on the Python Package Index (PyPI), cybersecurity researchers confirmed Thursday. ...

35

Fibonar Posts Detailed Response to LiteLLM Malware Incident

Tech & ScienceAI·1 source·

Fibonar published a new comment on March 27, 2026, detailing a minute-by-minute response to the recent LiteLLM malware attack. The statement, posted at 21:09 UTC, marks the first public account of the...

35

Microsoft Defender Demonstrates Protection Capabilities in Real-World Attack Scenarios

Tech & ScienceAI·1 source·

Microsoft Defender has demonstrated its capacity to protect high-value assets during simulated real-world attack scenarios, according to a report dated March 27, 2026. The cybersecurity division of th...

35

Vice President Vance Attributes UFOs to Demons, Not Aliens

Tech & ScienceAI·1 source·

WASHINGTON — Vice President JD Vance stated on Thursday that he does not believe unidentified flying objects are extraterrestrial in origin, asserting instead that they are likely demonic entities. V...

35

Citrix NetScaler Vulnerability Exploited as Patch Deadline Approaches

Tech & ScienceAI·1 source·

LONDON — A critical security flaw in Citrix NetScaler appliances is being actively exploited worldwide as the deadline for organizations to apply patches approaches. The vulnerability, which affects w...

35

Coruna and DarkSword Linked to Democratization of Nation-State Exploit Kits

Tech & ScienceAI·1 source·

LONDON (Reuters) - Two entities identified as Coruna and DarkSword have been linked to efforts aimed at democratizing access to nation-state exploit kits, cybersecurity researchers announced on Thursd...

47

Apple Warns Users of Exploit Kits Targeting Older iOS Versions

Tech & ScienceAI·1 source·

SAN FRANCISCO — Apple issued urgent Lock Screen alerts on Thursday to users of outdated iPhones, warning that active web-based exploit kits are targeting devices running iOS versions 13.0 through 18.7...

35

Compromised IP Cameras Deployed in Active Conflict Zone

Tech & ScienceAI·1 source·

UNIDENTIFIED ACTORS UTILIZED COMPROMISED IP CAMERAS FOR SURVEILLANCE DURING ACTIVE HOSTILITIES DATELINE: MARCH 27, 2026 Unidentified actors deployed compromised Internet Protocol (IP) cameras to mon...

35

FBI Director's Private Email Compromised in Cyberattack

Tech & ScienceAI·1 source·

WASHINGTON — The U.S. Department of Justice confirmed Thursday that the private email account of FBI Director Kash Patel was compromised by the Handala Hackers, a cyber group linked to a series of hig...

52

Iranian Handala Group Claims Breach of Kash Patel's Personal Email

Tech & ScienceAI·1 source··UPDATED

WASHINGTON (AP) — The Iranian Handala Group claimed responsibility on Thursday for hacking into the personal email account of Kash Patel, a former White House official and current legal advisor to the...

47

Sony Raises Global Prices for PlayStation Consoles Amid Economic Pressures

Tech & ScienceAI·1 source·

TOKYO — Sony announced a global price increase for its PlayStation 5, PlayStation 5 Pro, and PlayStation Portal consoles, effective immediately. The adjustment, which takes hold across all major marke...