Tech & Science

47

Security Researcher Exposes Widespread Misconfiguration of Perforce Servers

Tech & ScienceAI·1 source·

SYDNEY — A security researcher has identified a widespread vulnerability affecting internet-facing Perforce P4 servers, revealing that numerous major organizations have inadvertently exposed sensitive...

63

CISA Adds Eight Actively Exploited Vulnerabilities to Catalog

Tech & ScienceAI·1 source·

WASHINGTON — The Cybersecurity and Infrastructure Security Agency (CISA) updated its Known Exploited Vulnerabilities (KEV) catalog on Monday, adding eight new flaws that are being actively exploited b...

35

Trump Praises Cook, Draws Comparison to Jobs Following Call

Tech & ScienceAI·1 source·

WASHINGTON — President Donald Trump on Monday publicly praised Apple Inc. CEO Tim Cook following a phone conversation, drawing favorable comparisons between the technology executive and the company’s ...

56

Google Discloses Critical AI Agent Vulnerability Exploiting Prompt Injection

Tech & ScienceAI·1 source·

SAN FRANCISCO — Google disclosed a critical security vulnerability in its Antigravity AI agent manager on Sunday, confirming that the flaw allowed attackers to escape the system's sandbox and achieve ...

47

NSA Deploys Anthropic AI Model Despite Defense Supply-Chain Risk Classification

Tech & ScienceAI·1 source·

WASHINGTON — The U.S. National Security Agency is actively utilizing Anthropic's Claude Mythos artificial intelligence model, a move that proceeds despite the Department of Defense formally categorizi...

47

Three U.S. Healthcare Providers Report Data Breaches Affecting Nearly 600,000

Tech & ScienceAI·1 source·

CHICAGO (AP) — Three healthcare organizations in Illinois and Texas disclosed cybersecurity incidents on Monday that exposed the personal and medical information of nearly 600,000 individuals. The Nor...

47

Google Overhauls Android Contact Permissions in Major Privacy Shift

Tech & ScienceAI·1 source·

SAN FRANCISCO — Google on Monday introduced a new Contact Picker feature in Android 17, fundamentally changing how mobile applications access user contact data. The update replaces the longstanding al...

45

Anthropic Restricts Access to AI Tool Mythos Over Cybersecurity Risks

Tech & ScienceAI·1 source·

SAN FRANCISCO (AP) — Anthropic has restricted access to its advanced artificial intelligence tool, Mythos Preview, limiting availability to a select group of organizations following concerns over cybe...

56

Pro-Iran Group Claims Responsibility for 24-Hour DDoS Attack on Bluesky

Tech & ScienceAI·1 source·

A coordinated distributed denial-of-service attack disrupted services on the Bluesky social media platform for 24 hours beginning April 15, 2026. The 313 Team, a hacking collective also known as Islam...

56

Apple CEO Tim Cook to Step Down, John Ternus Named Successor

Tech & ScienceAI·1 source··UPDATED

CUPERTINO, Calif. — Apple Inc. announced Monday that Chief Executive Officer Tim Cook will step down from his role, with Senior Vice President of Hardware Engineering John Ternus set to take over as C...

47

Malicious Code Injected into Axios npm Packages, Compromising Software Supply Chain

Tech & ScienceAI·1 source·

WASHINGTON — A cyber threat actor injected malicious code into the widely used Axios Node Package Manager packages, compromising the software supply chain and distributing a remote access trojan to un...

47

Israel to Expand Drone Fleet with 12,000 New Units

Tech & ScienceAI·1 source·

JERUSALEM — Israel is procuring 12,000 new unmanned aerial vehicles for its military, a move that will more than double its current fleet of 5,000 units. The acquisition, announced on April 20, 2026, ...

56

Critical Remote Code Execution Flaw Found in SGLang Open-Source Framework

Tech & ScienceAI·1 source·

A critical remote code execution vulnerability has been identified in the SGLang open-source framework, allowing attackers to execute arbitrary Python code through a compromised reranking endpoint. Th...

47

Critical Vulnerabilities Found in Serial-to-IP Converters Used Globally

Tech & ScienceAI·1 source·

Researchers from Forescout Technologies have identified 20 new security vulnerabilities in serial-to-IP converters manufactured by Lantronix and Silex, exposing critical infrastructure and healthcare ...

47

Musk Absent from French Hearing on X Platform Investigation

Tech & ScienceAI·1 source·

PARIS (AP) — Elon Musk did not appear before French judicial authorities Monday for a scheduled open hearing regarding a public investigation into the social media platform X. The hearing, held at th...

47

Check Point Research Details Global Cyber Threats, AI Weaponization in New Report

Tech & ScienceAI·1 source·

AMSTERDAM — Check Point Research released a comprehensive threat intelligence report on Monday detailing a surge in cyber incidents, including major data breaches at Booking.com, McGraw-Hill, Essentia...

56

Microsoft Warns of Teams Impersonation Campaigns Targeting Enterprise Networks

Tech & ScienceAI·1 source·

Microsoft issued a global alert on April 20, 2026, warning that threat actors are increasingly exploiting external Microsoft Teams collaboration features to impersonate IT and helpdesk personnel. The ...

56

Datto Report Warns Backups Alone Insufficient for Business Continuity

Tech & ScienceAI·1 source·

LONDON — Relying exclusively on data backups is no longer sufficient to ensure business continuity during major disruptions such as ransomware attacks or system outages, according to a new report rele...

47

Hackers Hijack Intel Utility to Target Middle East, EMEA Organizations

Tech & ScienceAI·1 source·

LONDON (AP) — Cybersecurity researchers have identified a sophisticated attack campaign in which threat actors hijacked a legitimate Intel utility to deploy advanced malware against organizations acro...

47

Microsoft Deploys Windows Explorer Performance Updates to Insider Program

Tech & ScienceAI·1 source·

REDMOND, Wash. — Microsoft is rolling out a series of performance enhancements to Windows Explorer for users enrolled in the Windows 11 Insider program, aiming to address long-standing issues regardin...

47

Ransomware Group Exploits QEMU for Covert Backdoors in Global Campaign

Tech & ScienceAI·1 source·

LONDON — A ransomware group known as PayoutsKing, also identified as Gold Encounter, has launched a series of cyberattacks exploiting the open-source machine emulator QEMU to establish covert reverse ...

47

Security Researchers Flag Critical Design Flaw in Anthropic's Model Context Protocol

Tech & ScienceAI·1 source·

SAN FRANCISCO — A team of cybersecurity researchers has identified a critical vulnerability in Anthropic's Model Context Protocol (MCP) architecture, a flaw that enables remote code execution across t...

47

Swiss Citizens Express Growing Concern Over AI-Driven Cyber Fraud

Tech & ScienceAI·1 source·

ZURICH — Swiss citizens are increasingly worried about the rising threat of artificial intelligence-supported cyber fraud, with new data indicating a surge in anxiety over financial damage linked to a...

47

Microsoft Reverts Teams Update Following Widespread Launch Failures

Tech & ScienceAI·1 source·

Microsoft on Sunday rolled back a recent service update for its Teams desktop client after the change triggered launch failures for a subset of users. The tech giant confirmed the rollback was necessa...

47

Half of Global FTP Servers Lack Encryption, Exposing Data to Risks

Tech & ScienceAI·1 source·

WASHINGTON — Approximately half of the 6 million internet-facing File Transfer Protocol (FTP) servers currently in operation lack encryption, leaving sensitive data vulnerable to interception and secu...

47

Microsoft Issues Emergency Patches for Windows Server After April Update Glitches

Tech & ScienceAI·1 source·

REDMOND, Wash. (AP) — Microsoft released emergency security updates Tuesday to address critical failures affecting Windows Server systems following the installation of its April 2026 monthly security ...

47

New ZionSiphon Malware Targets Israeli Water Infrastructure

Tech & ScienceAI·1 source·

JERUSALEM — Cybersecurity researchers identified a new malware strain dubbed ZionSiphon targeting operational technology systems within Israel’s water and desalination infrastructure. The discovery, a...

47

Microsoft Issues Emergency Updates for Windows Server Following April Patch Failures

Tech & ScienceAI·1 source·

REDMOND, Wash. — Microsoft released emergency out-of-band security updates Tuesday to address critical installation failures affecting Windows Server systems following the deployment of its April 2026...

47

Hackers Fail to Exploit Known Vulnerability in Discontinued TP-Link Routers

Tech & ScienceAI·1 source·

Hackers have failed to successfully exploit a known vulnerability in discontinued TP-Link routers after a year-long campaign tracked by cybersecurity firm Palo Alto Networks. The attempted attacks ta...

35

Malwarebytes Labs Releases Weekly Cyber Threat Report for April 13-19

Tech & ScienceAI·1 source·

Malwarebytes Labs released its weekly security report on Monday, detailing a surge in global cyber threats and incidents recorded between April 13 and April 19, 2026. The cybersecurity firm's analysis...