Tech & Science

47

UK Biobank Revokes Access After Medical Data Appears on Alibaba

Tech & ScienceAI·1 source·

LONDON — The UK Biobank charity revoked access to its medical database and paused new data approvals after health records from 500,000 volunteers were listed for sale on Alibaba, Chinese authorities c...

47

Turkiye Parliament Approves Ban on Social Media for Under-15s

Tech & ScienceAI·1 source·

ANKARA, April 24, 2026 — Turkiye's parliament approved legislation Thursday that prohibits social media use for individuals under the age of 15 and establishes new regulations for digital platforms, i...

47

Researchers Identify 'fast16' Malware Targeting Engineering Software

Tech & ScienceAI·1 source·

Researchers from cybersecurity firm SentinelOne have identified a new class of cyber-sabotage malware dubbed 'fast16,' which appears to target high-precision engineering and physics simulation softwar...

47

FIRST Concludes Sold-Out 2026 Cyber Threat Intelligence Conference in Munich

Tech & ScienceAI·1 source·

MUNICH, Germany — The Forum of Incident Response and Security Teams (FIRST) concluded its 2026 Cyber Threat Intelligence Conference in Munich on Wednesday, marking a sold-out event focused on advancin...

47

CrowdStrike, Tenable Patch Critical Vulnerabilities in Security Products

Tech & ScienceAI·1 source·

SAN FRANCISCO (AP) — Cybersecurity firms CrowdStrike and Tenable on Thursday notified customers of critical vulnerabilities discovered in their LogScale and Nessus products, releasing patches to addre...

47

Attackers Exploit Critical LMDeploy Vulnerability Within Hours of Disclosure

Tech & ScienceAI·1 source·

LONDON (AP) — Cyber attackers successfully exploited a high-severity security flaw in the LMDeploy open-source project within 13 hours of its public disclosure, gaining unauthorized access to sensitiv...

54

Self-Propagating npm Malware Campaign Targets Developer Credentials

Tech & ScienceAI·1 source·

A self-propagating malware campaign identified as CanisterSprawl is actively compromising developer machines and attempting to distribute malicious software packages within the global npm ecosystem. S...

47

Hackers Exploit LMDeploy Flaw Within Hours of Disclosure

Tech & ScienceAI·1 source·

BEIJING — Unknown attackers exploited a critical security vulnerability in the open-source LMDeploy toolkit within 13 hours of its public disclosure, enabling the theft of cloud credentials and unauth...

47

Copperhelm Emerges from Stealth with $7 Million Seed Round for Cloud Security Platform

Tech & ScienceAI·1 source·

JERUSALEM (April 24, 2026) — Copperhelm, an Israel-based cybersecurity startup, announced Thursday that it has raised $7 million in seed funding to launch its agentic cloud security platform. The comp...

47

Anthropic Delays AI Security Tool Release to Allow Tech Giants to Patch Vulnerabilities

Tech & ScienceAI·1 source·

SAN FRANCISCO (AP) — Anthropic has postponed the public release of Project Glasswing, an artificial intelligence model designed to identify software vulnerabilities, after coordinating with major tech...

35

USMC to retain F/A-18 Hornet as other branches phase out legacy fighter

Tech & ScienceAI·1 source·

WASHINGTON — The United States Marine Corps will be the only branch of the U.S. Armed Forces to continue operating the F/A-18 Hornet fighter jet as the aircraft is formally phased out of service acros...

35

White House Accuses China of Stealing U.S. AI Models

Tech & ScienceAI·1 source·

WASHINGTON — The White House announced Wednesday that it has evidence China is systematically stealing artificial intelligence models and proprietary data from American technology laboratories. The di...

47

Meta Announces Layoffs of 8,000 Employees Amid Workforce Reduction

Tech & ScienceAI·1 source·

MENLO PARK, Calif. (AP) — Meta Platforms Inc. announced Wednesday it is laying off 8,000 employees, representing approximately 10% of its global workforce, in a significant reduction of its staff. The...

35

US Officials Warn of Coordinated Efforts to Extract Advanced AI Models

Tech & ScienceAI·1 source·

WASHINGTON — The United States government has identified information indicating that foreign entities, primarily based in China, are conducting deliberate, industrial-scale campaigns to distill fronti...

47

Hackers Compromise Checkmarx KICS Tool to Harvest Developer Credentials

Tech & ScienceAI·1 source·

LONDON (AP) — Hackers have compromised Docker images and software extensions for a popular code security tool, gaining unauthorized access to sensitive developer credentials and cloud keys worldwide. ...

47

State-Linked Group UAT-4356 Deploys FIRESTARTER Backdoor on Cisco Firepower Devices

Tech & ScienceAI·1 source·

A cyber threat actor known as UAT-4356 has targeted Cisco Firepower network security appliances by exploiting unpatched vulnerabilities to install a custom backdoor named FIRESTARTER. The attack was d...

47

TeamPCP Compromises Bitwarden CLI in Supply Chain Attack

Tech & ScienceAI·1 source·

LONDON (AP) — A sophisticated supply chain attack targeting the Bitwarden command-line interface has exposed developer credentials and secrets globally, security researchers confirmed Wednesday. The ...

47

CISA Orders Federal Agencies to Patch Active Microsoft Zero-Day Exploit

Tech & ScienceAI·1 source·

WASHINGTON — The Cybersecurity and Infrastructure Security Agency (CISA) has directed all U.S. federal agencies to immediately patch a critical vulnerability in Microsoft Defender that is being active...

47

FBI Recovers Deleted Signal Messages from iPhone Notification Database

Tech & ScienceAI·1 source·

WASHINGTON (AP) — Federal investigators successfully forensically extracted deleted Signal messages from a defendant's iPhone notification database, marking a significant development in digital eviden...

63

Luxury Cosmetics Firm Rituals Confirms Data Breach Affecting Members

Tech & ScienceAI·1 source··UPDATED

AMSTERDAM — Dutch luxury cosmetics company Rituals disclosed on Wednesday that a data breach has compromised the personal information of its My Rituals members. The company confirmed that unauthorized...

47

Dobot Unveils Third-Generation Sinornithosaurus Robot with Artificial Muscles

Tech & ScienceAI·1 source·

BEIJING — Chinese robotics firm Dobot unveiled the third version of its Sinornithosaurus robot on Wednesday, featuring realistic artificial muscles, synthetic skin, and advanced interactive capabiliti...

47

House Republicans Unveil Draft National Privacy Bill

Tech & ScienceAI·1 source·

WASHINGTON — House Republicans unveiled a draft national privacy bill on Tuesday, aiming to establish clear, enforceable protections for Americans' data and hold companies accountable for its safekeep...

47

India Issues National Cyber Alert Over 'Android God Mode' Malware Surge

Tech & ScienceAI·1 source·

NEW DELHI — The National Cybercrime Threat Analytics Unit (NCTAU) under the Ministry of Home Affairs has issued a national cyber alert warning of a surge in sophisticated Android malware dubbed 'Andro...

45

Decentralized Social Platform Mastodon Hit by Major DDoS Attack

Tech & ScienceAI·1 source·

LONDON (Reuters) - The decentralized social media platform Mastodon suffered a significant outage on Sunday after falling victim to a major distributed denial-of-service (DDoS) attack targeting its pr...

47

AI System Zealot Successfully Hacks Cloud Environment in Autonomous Test

Tech & ScienceAI·1 source·

SUNNYVALE, Calif. — Researchers at cybersecurity firm Palo Alto Networks have developed and tested an autonomous artificial intelligence system capable of hacking a cloud environment and exfiltrating ...

77

Apple Issues Emergency Update to Fix iOS Notification Data Retention Flaw

Tech & ScienceAI·1 source··UPDATED

SAN FRANCISCO (AP) — Apple released out-of-band security updates Tuesday for iPhone and iPad devices to address a critical flaw in iOS that allowed deleted notification data to remain stored on user d...

47

Supreme Court to Rule on Geofence Warrants in Chatrie Case

Tech & ScienceAI·1 source·

WASHINGTON — The Supreme Court is set to decide on the scope and constitutionality of geofence warrants in the case Chatrie v. The United States, a ruling expected to define the limits of government s...

47

Roblox Agrees to $35 Million Settlement, New Safety Measures Following State Lawsuits

Tech & ScienceAI·1 source·

SAN FRANCISCO — Roblox Corp. agreed Wednesday to implement sweeping safety reforms and pay more than $35 million in settlements with state attorneys general following allegations that the popular gami...

47

CyberSmart Partners with Irish Reseller Renaissance to Expand SME Cybersecurity Reach

Tech & ScienceAI·1 source·

DUBLIN — CyberSmart, a United Kingdom-based cybersecurity provider, announced a strategic partnership with Irish reseller Renaissance on Tuesday, aiming to deliver comprehensive security solutions to ...

47

GROWI Inc. Software Vulnerable to ReDoS Attack

Tech & ScienceAI·1 source·

SEOUL — GROWI, Inc. disclosed on Wednesday that its collaborative knowledge base software contains a critical vulnerability allowing attackers to execute a Regular expression Denial-of-Service (ReDoS)...