Tech & Science

47

Hackers Exploit Critical Flaw in Breeze Cache WordPress Plugin

Tech & ScienceAI·1 source·

LONDON (AP) — Hackers are actively exploiting a critical vulnerability in the Breeze Cache WordPress plugin, enabling unauthorized file uploads and potential remote code execution on more than 400,000...

47

Microsoft Rolls Out New Windows Update Controls to Reduce Forced Restarts

Tech & ScienceAI·1 source·

REDMOND, Wash. (AP) — Microsoft is implementing new controls for Windows updates designed to give users greater autonomy over installation schedules and eliminate forced system restarts, a move aimed ...

47

Northrop Grumman Unveils New F/A-XX Fighter Footage Amid Funding Debate

Tech & ScienceAI·1 source·

WASHINGTON — Northrop Grumman released new footage on Friday showcasing its concept for the future sixth-generation carrier-based multirole fighter under the F/A-XX program, as the defense contractor ...

47

NATO-led Locked Shields 2026 cyber exercise concludes in Tallinn

Tech & ScienceAI·1 source·

TALLINN, Estonia (AP) — The world's largest live-fire cyber defense exercise, Locked Shields 2026, concluded Thursday in Tallinn with over 4,000 participants from 41 nations simulating coordinated cyb...

47

Russia launches Angara-1.2 rocket from Plesetsk cosmodrome

Tech & ScienceAI·1 source·

MOSCOW — The Russian Aerospace Forces successfully launched an Angara-1.2 carrier rocket carrying a military spacecraft from the Plesetsk cosmodrome on Thursday evening. The launch occurred at 21:21 ...

47

UK Cyber Security Centre Ditches Passwords in Favor of Passkeys

Tech & ScienceAI·1 source·

LONDON (AP) — The United Kingdom’s National Cyber Security Centre has officially withdrawn its recommendation for traditional passwords, declaring them obsolete in the face of modern cyber threats and...

47

NCSC Chief Warns of 'Perfect Storm' of Cyber Threats Amid AI and Geopolitical Tensions

Tech & ScienceAI·1 source·

GLASGOW (Reuters) — The United Kingdom's National Cyber Security Centre (NCSC) chief Richard Horne warned on Thursday that the nation faces a "perfect storm" of intensifying cyber threats driven by ra...

47

Unauthorized Users Breach Anthropic's Claude Mythos Security Model

Tech & ScienceAI·1 source·

SAN FRANCISCO — Unauthorized users gained access to Anthropic's Claude Mythos security model for a period of two weeks, the company confirmed on Friday. The breach, discovered on April 24, 2026, expos...

45

Security Firm ctinow Investigates Phishing Campaign Leading to Malware Execution

Tech & ScienceAI·1 source·

Security firm ctinow has launched an investigation into a sophisticated phishing attack that successfully resulted in malware execution and established command-and-control communication channels. The ...

45

Handala Hacking Group Warns of Imminent US Navy Cyber Vulnerability

Tech & ScienceAI·1 source·

BEIJING (AP) — The Handala hacking group issued a stark warning on Sunday, claiming the United States Navy will face heightened vulnerability to cyberattacks within hours of the message's release. The...

45

Researchers Uncover 20-Year-Old Malware Framework Predating Stuxnet

Tech & ScienceAI·1 source·

SAN FRANCISCO — Security researchers at SentinelOne have identified a sophisticated malware framework known as 'fast16,' a tool developed approximately two decades ago that predates the infamous Stuxn...

44

SANS Internet Storm Center Issues Weekly Security Update on HTTP Headers, GitHub and Microsoft Vulnerabilities

Tech & ScienceAI·1 source·

JACKSONVILLE, Fla. (AP) — The SANS Internet Storm Center released its weekly security update Tuesday, alerting cybersecurity professionals to a series of emerging threats including unusual HTTP header...

35

MES Issues Call for New Profile Picture Logos

Tech & ScienceAI·1 source·

A public invitation has been issued by @Elias_MES, calling on individuals to submit new profile picture logos for the organization. The announcement, released on April 27, 2026, at 13:29 UTC, promises...

35

AI Security CEO Emphasizes Human Role Amid Model Advances

Tech & ScienceAI·1 source·

SINGAPORE — Ari Herbert-Voss, chief executive of RunSybil, stated on Sunday that human expertise remains essential for cybersecurity validation despite rapid advancements in artificial intelligence mo...

35

LETNER Unveils Label-Efficient NER System for Cyber Threat Intelligence

Tech & ScienceAI·1 source·

LETNER announced the development of Label-EfficienT named entity recognition technology designed specifically for cyber threat intelligence applications on April 27, 2026. The system aims to improve t...

35

Medieval Spanish Diplomat Letter Decoded After Rediscovery

Tech & ScienceAI·1 source·

A medieval encrypted letter sent by a Spanish diplomat has been successfully decoded following its rediscovery in 1860, researchers announced Monday. The breakthrough comes more than a century and a h...

35

Investigator Identifies Fileless Malware on Finance Workstation

Tech & ScienceAI·1 source·

An investigator identified a fileless malware attack on a finance department workstation using memory forensics, bypassing traditional antivirus detection. The incident occurred on April 27, 2026, at ...

35

miniOrange CEO Releases Cybersecurity Checklist for Indian Users Amid Rising Fraud

Tech & ScienceAI·1 source·

NEW DELHI — Anirban Mukherji, founder and CEO of identity management firm miniOrange, released a comprehensive cybersecurity checklist on Sunday aimed at helping Indian consumers protect themselves fr...

35

Operation Golden Phantom: Malgent Trojan Supply Chain Attack Analyzed

Tech & ScienceAI·1 source·

A sophisticated supply chain attack utilizing the Malgent Trojan, designated Operation Golden Phantom, has been identified in a comprehensive analysis released on April 27, 2026. The operation represe...

35

Malware in WordPress Plugins Triggers Global SEO Collapse

Tech & ScienceAI·1 source·

LONDON — A coordinated supply chain attack targeting the WordPress ecosystem has caused widespread search engine optimization failures for thousands of websites globally. Hidden malware injected into ...

35

DDGeopolitics Schedules Live Stream with Analyst Larry Johnson

Tech & ScienceAI·1 source·

ATLANTA (April 26, 2026) — DDGeopolitics announced Saturday that it will host a live YouTube stream featuring former intelligence analyst Larry Johnson. The event is scheduled to begin at 20:31 UTC on...

35

Global Cybersecurity Threats Escalate as New Malware Campaigns Emerge

Tech & ScienceAI·1 source·

Multiple sophisticated threat actors have launched a coordinated wave of cyberattacks targeting organizations worldwide, according to a newly published cybersecurity bulletin. The 'SECURITY AFFAIRS MA...

35

Paganini Publishes Weekly Security Newsletter Amidst International Cyber Focus

Tech & ScienceAI·1 source·

GENEVA — Cybersecurity expert Pierluigi Paganini released his weekly 'Security Affairs' newsletter, Round 574, on Saturday, April 26, 2026. The publication, distributed internationally, aggregates rec...

35

Developer Launches Atom-Based Video Game 'Bohrdom' in U.S.

Tech & ScienceAI·1 source·

LOS ANGELES — Cole Tomas Allen has unveiled a new video game titled "Bohrdom," a title built around the mechanics of atomic elements. The project was announced on Saturday, April 26, 2026, marking a u...

35

Scientists decode squid evolution mystery using global genome data

Tech & ScienceAI·1 source·

Scientists have solved a long-standing mystery regarding the evolution of squid and cuttlefish by analyzing newly sequenced genomes and global datasets. The research, released Thursday, traces how the...

35

AI-Driven Phishing Emerges as Leading Cyberattack Vector

Tech & ScienceAI·1 source·

LONDON, April 24 (AP) — Artificial intelligence-powered phishing campaigns have overtaken traditional methods to become the primary tool in global cyberattacks, marking a significant shift in digital ...

35

Cyber Defenders Analyze Weaponized PowerPoint Malware Campaign

Tech & ScienceAI·1 source·

LONDON, April 24 (AP) — Cybersecurity analysts have identified a sophisticated malware campaign utilizing weaponized PowerPoint documents to exfiltrate user credentials and establish command-and-contr...

35

AI Model Uncovers Decades-Old Software Vulnerabilities Missed by Traditional Tools

Tech & ScienceAI·1 source·

SAN FRANCISCO — A new artificial intelligence model developed by Anthropic has identified critical security flaws in widely used open-source software that conventional automated tools failed to detect...

35

Cybersecurity Leaders Propose Treating AI as Identity at RSA Conference

Tech & ScienceAI·1 source·

SAN FRANCISCO — Cybersecurity industry leaders and artificial intelligence experts gathered at the RSA Conference on Thursday to address a critical shift in digital defense: the need to treat autonomo...

35

Unpatched Windows RPC Vulnerability Enables System-Level Privilege Escalation

Tech & ScienceAI·1 source·

A critical security vulnerability has been disclosed in the Microsoft Windows Remote Procedure Call (RPC) architecture, allowing attackers to escalate local privileges to the SYSTEM level across all v...