Tech & Science
Hackers Exploit Critical Flaw in Breeze Cache WordPress Plugin
LONDON (AP) — Hackers are actively exploiting a critical vulnerability in the Breeze Cache WordPress plugin, enabling unauthorized file uploads and potential remote code execution on more than 400,000...
Microsoft Rolls Out New Windows Update Controls to Reduce Forced Restarts
REDMOND, Wash. (AP) — Microsoft is implementing new controls for Windows updates designed to give users greater autonomy over installation schedules and eliminate forced system restarts, a move aimed ...
Northrop Grumman Unveils New F/A-XX Fighter Footage Amid Funding Debate
WASHINGTON — Northrop Grumman released new footage on Friday showcasing its concept for the future sixth-generation carrier-based multirole fighter under the F/A-XX program, as the defense contractor ...
NATO-led Locked Shields 2026 cyber exercise concludes in Tallinn
TALLINN, Estonia (AP) — The world's largest live-fire cyber defense exercise, Locked Shields 2026, concluded Thursday in Tallinn with over 4,000 participants from 41 nations simulating coordinated cyb...
Russia launches Angara-1.2 rocket from Plesetsk cosmodrome
MOSCOW — The Russian Aerospace Forces successfully launched an Angara-1.2 carrier rocket carrying a military spacecraft from the Plesetsk cosmodrome on Thursday evening. The launch occurred at 21:21 ...
UK Cyber Security Centre Ditches Passwords in Favor of Passkeys
LONDON (AP) — The United Kingdom’s National Cyber Security Centre has officially withdrawn its recommendation for traditional passwords, declaring them obsolete in the face of modern cyber threats and...
NCSC Chief Warns of 'Perfect Storm' of Cyber Threats Amid AI and Geopolitical Tensions
GLASGOW (Reuters) — The United Kingdom's National Cyber Security Centre (NCSC) chief Richard Horne warned on Thursday that the nation faces a "perfect storm" of intensifying cyber threats driven by ra...
Unauthorized Users Breach Anthropic's Claude Mythos Security Model
SAN FRANCISCO — Unauthorized users gained access to Anthropic's Claude Mythos security model for a period of two weeks, the company confirmed on Friday. The breach, discovered on April 24, 2026, expos...
Security Firm ctinow Investigates Phishing Campaign Leading to Malware Execution
Security firm ctinow has launched an investigation into a sophisticated phishing attack that successfully resulted in malware execution and established command-and-control communication channels. The ...
Handala Hacking Group Warns of Imminent US Navy Cyber Vulnerability
BEIJING (AP) — The Handala hacking group issued a stark warning on Sunday, claiming the United States Navy will face heightened vulnerability to cyberattacks within hours of the message's release. The...
Researchers Uncover 20-Year-Old Malware Framework Predating Stuxnet
SAN FRANCISCO — Security researchers at SentinelOne have identified a sophisticated malware framework known as 'fast16,' a tool developed approximately two decades ago that predates the infamous Stuxn...
SANS Internet Storm Center Issues Weekly Security Update on HTTP Headers, GitHub and Microsoft Vulnerabilities
JACKSONVILLE, Fla. (AP) — The SANS Internet Storm Center released its weekly security update Tuesday, alerting cybersecurity professionals to a series of emerging threats including unusual HTTP header...
MES Issues Call for New Profile Picture Logos
A public invitation has been issued by @Elias_MES, calling on individuals to submit new profile picture logos for the organization. The announcement, released on April 27, 2026, at 13:29 UTC, promises...
AI Security CEO Emphasizes Human Role Amid Model Advances
SINGAPORE — Ari Herbert-Voss, chief executive of RunSybil, stated on Sunday that human expertise remains essential for cybersecurity validation despite rapid advancements in artificial intelligence mo...
LETNER Unveils Label-Efficient NER System for Cyber Threat Intelligence
LETNER announced the development of Label-EfficienT named entity recognition technology designed specifically for cyber threat intelligence applications on April 27, 2026. The system aims to improve t...
Medieval Spanish Diplomat Letter Decoded After Rediscovery
A medieval encrypted letter sent by a Spanish diplomat has been successfully decoded following its rediscovery in 1860, researchers announced Monday. The breakthrough comes more than a century and a h...
Investigator Identifies Fileless Malware on Finance Workstation
An investigator identified a fileless malware attack on a finance department workstation using memory forensics, bypassing traditional antivirus detection. The incident occurred on April 27, 2026, at ...
miniOrange CEO Releases Cybersecurity Checklist for Indian Users Amid Rising Fraud
NEW DELHI — Anirban Mukherji, founder and CEO of identity management firm miniOrange, released a comprehensive cybersecurity checklist on Sunday aimed at helping Indian consumers protect themselves fr...
Operation Golden Phantom: Malgent Trojan Supply Chain Attack Analyzed
A sophisticated supply chain attack utilizing the Malgent Trojan, designated Operation Golden Phantom, has been identified in a comprehensive analysis released on April 27, 2026. The operation represe...
Malware in WordPress Plugins Triggers Global SEO Collapse
LONDON — A coordinated supply chain attack targeting the WordPress ecosystem has caused widespread search engine optimization failures for thousands of websites globally. Hidden malware injected into ...
DDGeopolitics Schedules Live Stream with Analyst Larry Johnson
ATLANTA (April 26, 2026) — DDGeopolitics announced Saturday that it will host a live YouTube stream featuring former intelligence analyst Larry Johnson. The event is scheduled to begin at 20:31 UTC on...
Global Cybersecurity Threats Escalate as New Malware Campaigns Emerge
Multiple sophisticated threat actors have launched a coordinated wave of cyberattacks targeting organizations worldwide, according to a newly published cybersecurity bulletin. The 'SECURITY AFFAIRS MA...
Paganini Publishes Weekly Security Newsletter Amidst International Cyber Focus
GENEVA — Cybersecurity expert Pierluigi Paganini released his weekly 'Security Affairs' newsletter, Round 574, on Saturday, April 26, 2026. The publication, distributed internationally, aggregates rec...
Developer Launches Atom-Based Video Game 'Bohrdom' in U.S.
LOS ANGELES — Cole Tomas Allen has unveiled a new video game titled "Bohrdom," a title built around the mechanics of atomic elements. The project was announced on Saturday, April 26, 2026, marking a u...
Scientists decode squid evolution mystery using global genome data
Scientists have solved a long-standing mystery regarding the evolution of squid and cuttlefish by analyzing newly sequenced genomes and global datasets. The research, released Thursday, traces how the...
AI-Driven Phishing Emerges as Leading Cyberattack Vector
LONDON, April 24 (AP) — Artificial intelligence-powered phishing campaigns have overtaken traditional methods to become the primary tool in global cyberattacks, marking a significant shift in digital ...
Cyber Defenders Analyze Weaponized PowerPoint Malware Campaign
LONDON, April 24 (AP) — Cybersecurity analysts have identified a sophisticated malware campaign utilizing weaponized PowerPoint documents to exfiltrate user credentials and establish command-and-contr...
AI Model Uncovers Decades-Old Software Vulnerabilities Missed by Traditional Tools
SAN FRANCISCO — A new artificial intelligence model developed by Anthropic has identified critical security flaws in widely used open-source software that conventional automated tools failed to detect...
Cybersecurity Leaders Propose Treating AI as Identity at RSA Conference
SAN FRANCISCO — Cybersecurity industry leaders and artificial intelligence experts gathered at the RSA Conference on Thursday to address a critical shift in digital defense: the need to treat autonomo...
Unpatched Windows RPC Vulnerability Enables System-Level Privilege Escalation
A critical security vulnerability has been disclosed in the Microsoft Windows Remote Procedure Call (RPC) architecture, allowing attackers to escalate local privileges to the SYSTEM level across all v...