IT

SlashDot.org

Microsoft Begins Removing Copilot Branding From Windows 11 Apps

  Openen als pagina
Microsoft has started stripping Copilot branding out of Notepad in Windows 11, replacing the old Copilot menu with a more generic "writing tools" label. The AI features themselves aren't going away, but Microsoft seems to be backing off the heavy-handed Copilot branding and extra entry points. Windows Central reports: As promised, Microsoft is now beginning its effort to reduce and remove Copilot branding across Windows 11, with the latest Notepad update for Insiders outright removing the Copilot icon and phrasing. Now, the AI menu is simply called "writing tools," and maintains the same functionality as before. Additionally, Microsoft has also removed references to AI in the Settings area in Notepad. Now, the ability to turn on or off these AI powered writing tools are now listed under "Advanced features." This change is present in the latest preview build of Notepad which is now rolling out to all Windows Insiders. The app version is 11.2512.28.0, and you'll know you have it if you see the Copilot icon replaced with a pen icon instead. [...] For Notepad, it appears Microsoft has opted to replace the Copilot menu with something more generic. It's still the same functionally, but it's no longer leaning on the tainted Copilot brand. Of course, you can still easily turn off all AI features in Notepad if you don't want them. The Verge reports that the "unnecessary Copilot buttons" are also disappearing from the Snipping Tool, Photos, and Widgets.

Read more of this story at Slashdot.

https://tech.slashdot.org/story/26/04/10/1947203/microsoft-begins-removing-copilot-branding-from-windows-11-apps?utm_source=rss1.0mainlinkanon&utm_medium=feed


FBI Extracts Suspect's Deleted Signal Messages Saved In iPhone Notification Data

  Openen als pagina
An anonymous reader quotes a report from 404 Media: The FBI was able to forensically extract copies of incoming Signal messages from a defendant's iPhone, even after the app was deleted, because copies of the content were saved in the device's push notification database, multiple people present for FBI testimony in a recent trial told 404 Media. The case involved a group of people setting off fireworks and vandalizing property at the ICE Prairieland Detention Facility in Alvarado, Texas in July, and one shooting a police officer in the neck. The news shows how forensic extraction -- when someone has physical access to a device and is able to run specialized software on it -- can yield sensitive data derived from secure messaging apps in unexpected places. Signal already has a setting that blocks message content from displaying in push notifications; the case highlights why such a feature might be important for some users to turn on. "We learned that specifically on iPhones, if one's settings in the Signal app allow for message notifications and previews to show up on the lock screen, [then] the iPhone will internally store those notifications/message previews in the internal memory of the device," a supporter of the defendants who was taking notes during the trial told 404 Media. [...] During one day of the related trial, FBI Special Agent Clark Wiethorn testified about some of the collected evidence. A summary of Exhibit 158 published on a group of supporters' website says, "Messages were recovered from Sharp's phone through Apple's internal notification storage -- Signal had been removed, but incoming notifications were preserved in internal memory. Only incoming messages were captured (no outgoing)." 404 Media spoke to one of the supporters who was taking notes during the trial, and to Harmony Schuerman, an attorney representing defendant Elizabeth Soto. Schuerman shared notes she took on Exhibit 158. "They were able to capture these chats bc [because] of the way she had notifications set up on her phone -- anytime a notification pops up on the lock screen, Apple stores it in the internal memory of the device," those notes read. The supporter added, "I was in the courtroom on the last day of the state's case when they had FBI Special Agent Clark testifying about some Signal messages. One set came from Lynette Sharp's phone (one of the cooperating witnesses), but the interesting detailed messages shown in court were messages that had been set to disappear and had in fact disappeared in the Signal app." Further reading: Apple Gave Governments Data On Thousands of Push Notifications

Read more of this story at Slashdot.

https://mobile.slashdot.org/story/26/04/10/1656218/fbi-extracts-suspects-deleted-signal-messages-saved-in-iphone-notification-data?utm_source=rss1.0mainlinkanon&utm_medium=feed


Google News Now Prominently Featuring Polymarket Bets

  Openen als pagina
Futurism found that Google News is surfacing Polymarket betting pages alongside traditional news sources. "The bets often appear in the 'For you' section of Google News, which is tailored to a user's personal interests," the publication reports. "In one instance, it was even the very top result, as with this bet on the price of Bitcoin." From the report: In our testing, Polymarket bets are also showing up on the Google News home page. But links from the prediction market can pop up all over Google News, including in searches. In further tests, looking up "will ships transit the strait," referring to the Strait of Hormuz, returned numerous credible sources like Financial Times, The Guardian, and Reuters. Just below them, however, was a Polymarket bet on the number of ships that would be allowed to pass through the critical oil passageway. This doesn't appear to be an accident. When searching "Polymarket" in its search bar, Google News now allows users to choose it as a "source," directing them to a page that aggregates other Polymarket hits. It's not the only non-news site that's selectable as a source -- looking up "Reddit" and "X" offers the option, too -- but searching for "Kalshi," another prediction market and Polymarket's main competitor, doesn't give the option to use it as a source. [...] In light of all this, Polymarket appearing in Google News is a major victory for the prediction platform -- rubber-stamping its image as an authority on developing real-world events right alongside genuine real publishers of journalism.

Read more of this story at Slashdot.

https://news.slashdot.org/story/26/04/10/1640225/google-news-now-prominently-featuring-polymarket-bets?utm_source=rss1.0mainlinkanon&utm_medium=feed


Google Rolls Out Gmail End-To-End Encryption On Mobile Devices

  Openen als pagina
Gmail's end-to-end encryption is now available on all Android and iOS devices, letting enterprise users send and read encrypted emails directly in the app without any extra tools. "This launch combines the highest level of privacy and data encryption with a user-friendly experience for all users, enabling simple encrypted email for all customers from small businesses to enterprises and public sector," Google announced in a blog post. BleepingComputer reports: Starting this week, encrypted messages will be delivered as regular emails to Gmail recipients' inboxes if they use the Gmail app. Recipients who don't have the Gmail mobile app and use other email services can read them in a web browser, regardless of the device and service they're using. [...] This feature is now available for all client-side encryption (CSE) users with Enterprise Plus licenses and the Assured Controls or Assured Controls Plus add-on after admins enable the Android and iOS clients in the CSE admin interface via the Admin Console. Gmail's end-to-end encryption (E2EE) feature is powered by the client-side encryption (CSE) technical control, which allows Google Workspace organizations to use encryption keys they control and are stored outside Google's servers to protect sensitive documents and emails.

Read more of this story at Slashdot.

https://it.slashdot.org/story/26/04/10/1620217/google-rolls-out-gmail-end-to-end-encryption-on-mobile-devices?utm_source=rss1.0mainlinkanon&utm_medium=feed


France's Government Is Ditching Windows For Linux

  Openen als pagina
France says it plans to move some government computers from Windows to Linux as part of a broader push for digital sovereignty and reduced dependence on U.S. technology. TechCrunch reports: In a statement, French minister David Amiel said (translated) that the effort was to "regain control of our digital destiny" by relying less on U.S. tech companies. Amiel said that the French government can no longer accept that it doesn't have control over its data and digital infrastructure. The French government did not provide a specific timeline for the switchover, or which distributions it was considering. Microsoft did not immediately comment on the news. [...] France's decision to ditch Windows comes months after the government announced it would stop using Microsoft Teams for video conferencing in favor of French-made Visio, a tool based on the open source end-to-end encrypted video meeting tool Jitsi. The French government said it also plans to migrate its health data platform to a new trusted platform by the end of the year.

Read more of this story at Slashdot.

https://linux.slashdot.org/story/26/04/10/1545234/frances-government-is-ditching-windows-for-linux?utm_source=rss1.0mainlinkanon&utm_medium=feed


Techcrunch.com




TechCrunch is heading to Tokyo — and bringing the Startup Battlefield with it

  Openen als pagina
SusHi Tech 2026 is zeroing in on four technology domains reshaping society: AI, Robotics, Resilience, and Entertainment. Expect live demos of humanoid robots, sessions on autonomous driving's software revolution, deep dives into cyber defense and climate tech, and candid conversations about how AI is rewriting the global music and anime industries.

https://techcrunch.com/2026/04/10/techcrunch-is-heading-to-tokyo-and-bringing-the-startup-battlefield-with-it/



Engadget.com

Estonia is the rare EU country opposing child social media bans

  Openen als pagina

As child social media bans spread across Europe and beyond, Estonia isn't having it. On Friday, the country's education minister said the bans won't "actually solve problems," while warning that the kids will find a way regardless.

Although companies like Meta would love for you to believe it’s a fairy tale, social media addiction is associated with tangible negative repercussions for children. Studies show that its harms range from depression and anxiety to sleep deprivation and obesity. (The latter is from all the targeted junk food advertising.) On the other hand, teens can find community and support from social media.

A growing list of countries looked at the negative data and concluded that the answer was to ban social media altogether for children. Although the age cutoff varies, legislation has been floated or enacted in Australia, Greece, France, Austria, Spain, Indonesia, Malaysia, the UK and Denmark — just to name a few.

Estonia's education minister believes these countries are coming at the very real problem from the wrong angle. "The way to approach this, to me, is not to make kids responsible for that harm and start self-regulating," Kristina Kallas said at a Politico forum in Barcelona. She added that "kids will find very quickly the ways to go around and to still use social media."

Instead, she said the responsibility lies with governments and corporations. "Europe pretends to be weak when it comes to big American and international corporations," she added. But she called that a "pretense," challenging the EU to "actually take this power and start regulating the big American corporations."

To be fair, the EU regulates the tech industry more effectively than anywhere else in the world. But the point on childhood social bans stands.

Another argument against the bans is that it’s a short path from the well-meaning to a more sinister erosion of basic freedoms. In February, France suggested that the next logical step after passing an under-15 social media ban would be to go after VPNs. After all, once you pass the ban, you need to enforce it — and that can mean snuffing out the tools children could use to work around it.

This article originally appeared on Engadget at https://www.engadget.com/social-media/estonia-is-the-rare-eu-country-opposing-child-social-media-bans-194620916.html?src=rss

https://www.engadget.com/social-media/estonia-is-the-rare-eu-country-opposing-child-social-media-bans-194620916.html?src=rss


Garmin may be working on a Whoop competitor

  Openen als pagina

Whoop, the makers of a screen-free fitness tracker of the same name, could soon have some competition. Fitbit teased its take on a Whoop-style band with the help of Steph Curry at the end of March, and based on a trademark filing spotted by Gadgets & Wearables, Garmin appears to be working on its own band that tracks similar health metrics.

This new Garmin wearable, called "CIRQA" in the trademark filing submitted in February, is designed to measure "the body's physical parameters and other physiological data, bio-signals, and bodily behavior." That could broadly describe the smartwatches and fitness trackers Garmin already sells. But the CIRQA apparently goes further, by also measuring "recovery from physical and emotional stress, human alertness level, and performance," a set of more granular, wellness-focused features that could bring the unreleased wearable into the same ballpark as a Whoop.

Garmin accidentally leaked that it was working on a new wearable via a hastily removed store page in January, Android Authority reports. While some phantom web pages and a trademark do not guarantee Garmin is working on a new device, or that the band will be screen-free in the same way the Whoop is. If the company is preparing a competitor, though, the timing makes sense. Where other devices try to split the difference between tracking biometrics and offering real-time information or other smartwatch features, Whoop is decidedly data-first. Its wearables monitor as much information as possible through a nondescript band, and then analyze and display what it learned via a smartphone app. The approach is attractive to anyone tired of dealing with screens, and the growing number of people obsessed with optimizing their health. In fact, Whoop just raised $575 million on the back of its current success. It would make sense that Garmin and Google (via its Fitbit brand) would want a piece of the company's audience, too.

Whoop-style bands are also a perfect fit for future uses of AI in health and fitness tracking. Google is interested in having users turn to Fitbit's AI-powered health coach for everything from workout tracking to nutrition advice. If health data processing is going to happen in the cloud, and you're going to have to pull out your smartphone to view that data anyway, it makes sense to sell a tracker without a screen.

This article originally appeared on Engadget at https://www.engadget.com/wearables/garmin-may-be-working-on-a-whoop-competitor-191802041.html?src=rss

https://www.engadget.com/wearables/garmin-may-be-working-on-a-whoop-competitor-191802041.html?src=rss


Amazon Luna ends support for third-party subscriptions and game purchases

  Openen als pagina

Amazon is ending support for third-party integrations on its Luna cloud gaming service. The most immediate changes mean that it's no longer possible to buy Ubisoft+ and Jackbox Games subscriptions or standalone games through Luna.

Amazon will automatically any cancel active subscriptions bought through Luna at the end of customers' next billing cycle. If you have a Ubisoft+ subscription that you bought directly from Ubisoft instead, you’ll still be able to access games on that service through Luna until June 10.

The Bring Your Own Library option — which allows users to play games they own on the likes of EA, GOG and Ubisoft on Luna — is going away too. You won't be able to access games from on those storefronts via Amazon's streaming service after June 3.

If you bought any games outright on Luna, you'll still be able to play them there until June 10. Unlike Google did when it shut down Stadia, Amazon isn’t offering refunds for those purchases. However, you'll still have access to them through the respective third-party platform that's linked to your account, be it the EA App, GOG Galaxy or Ubisoft Connect.

That doesn't exactly help folks who don't have powerful-enough systems to play more demanding games and were relying on Luna. As such, some people might need to turn to the likes of GeForce Now in order to keep playing games they bought through Luna (and they’ll need to hope GFN actually supports their specific games).

Amazon has been reshaping Luna over the last several months. It rolled out a revamped version of the service back in October, with more of a focus on GameNight party games that you can play with a smartphone.

Prime subscribers will still be able to claim PC games and stream games on the Luna Standard tier at no extra cost. The Luna Premium subscription, which includes a wider range of third-party games, is still available too.

“We’re doubling down on a broad range of gaming experiences, including strong third-party titles, delivered in ways that make great games more accessible, as well as new and unique gaming experiences like GameNight,” Amazon wrote in an email to Luna users. The company also said it will offer some folks a free Luna Premium subscription.

This article originally appeared on Engadget at https://www.engadget.com/gaming/amazon-luna-ends-support-for-third-party-subscriptions-and-game-purchases-171329996.html?src=rss

https://www.engadget.com/gaming/amazon-luna-ends-support-for-third-party-subscriptions-and-game-purchases-171329996.html?src=rss


French government says au revoir Windows, bienvenue Linux

  Openen als pagina

America's Big Tech companies may soon learn that saddling up with Donald Trump doesn't tend to work out in the end. As the president sows chaos and distrust around the globe while taking aim at EU tech regulations, Europe is looking for ways to adopt its own alternatives. The latest example is France, which said it's dropping Microsoft Windows in favor of Linux.

On Wednesday, France said (via TechCrunch) it plans to move its workstations from Windows to the open-source Linux. It's part of a broader movement across Europe toward digital sovereignty, aimed at reducing reliance on foreign tech — especially American and Chinese. Although homegrown alternatives aren't available in many areas, the EU seems prepared to wean itself off where it can.

In January, France announced that it would move its videoconferencing from Zoom and Teams to the French-made Visio. As part of this week’s Linux announcement, France added that it would also migrate its health data to a new platform by the end of 2026.

Since taking office, Trump has used tariffs and other measures to try to bully European nations into dropping their regulations on America's tech industry. In August, he vowed to "stand up to Countries that attack our incredible American Tech Companies." (The strange capitalizations are his, not ours.) His administration has described laws like the EU's Digital Services Act as "censorship" and "a tax."

So far, Europe has stood firm. "I want to be very clear: our digital sovereignty is our digital sovereignty," European Commission President Ursula von der Leyen said at the Munich Security Conference in February. "We have a long tradition in freedom of speech. Actually, the Enlightenment started on our continent."

Christian Kroll, CEO of German search engine Ecosia, foresaw Europe's predicament soon after Trump's 2024 reelection. "We, as a European community, just need to make sure that nobody can blackmail us." He added that "if the US turned off access to search results tomorrow, we would have to go back to phone books." Granted, the guy is selling a European-made search engine, so his bias is clear. But the salience of his point stands.

Giorgos Verdi, policy fellow at the European Council on Foreign Relations, said the Trump administration's behavior underscores the need for Europe to break free. "Could the US use its dominance over AI chips, its dominance over cloud in Europe, its dominance over AI systems in order to exert more pressure?" Verdi asked CNN rhetorically in January. "In order to build more resilience for Europe... there is a geopolitical case for European innovations to emerge."

This article originally appeared on Engadget at https://www.engadget.com/big-tech/french-government-says-au-revoir-windows-bienvenue-linux-165407232.html?src=rss

https://www.engadget.com/big-tech/french-government-says-au-revoir-windows-bienvenue-linux-165407232.html?src=rss


Google adds E2E encryption to Gmail for iOS and Android enterprise users

  Openen als pagina

Google has announced that end-to-end encryption (E2EE) for Gmail on Android and iOS is now rolling out for its enterprise users. Emails that require E2EE in Workspace can be composed and read within the Gmail app, so eligible users won’t need additional apps or portals.

The new feature expands Google’s client-side encryption (CSE) offering, a little more than a year after E2EE was introduced to Gmail on the web. According to a Google blog post, any encrypted message sent to a recipient who uses the Gmail app will appear in their inbox as any email thread would. If they don’t have the app, they’re still able to read and reply to the email in their browser securely, regardless of their email address.

Google says the new functionality "combines the highest level of privacy and data encryption with a user-friendly experience for all users, enabling simple encrypted email for all customers from small businesses to enterprises and public sector." Of course, "all users" applies only to Enterprise Plus members here, with the millions of people who use Gmail as their personal email service currently unable to take advantage of the highest level of privacy and data protection.

In order for Gmail users to start using E2EE in the app, an admin must first enable Android and iOS clients in the CSE admin interface, which is available in the Admin Console. When sending an email, you have to click the lock icon and select additional encryption before sending. Attachments can then be added as normal.

E2EE is available straight away in the Rapid Release and Scheduled Release domains. Enterprise users will need the Assured Controls or Assured Controls Plus add-on, which provides businesses and organizations that handle sensitive data with extra security and compliance-related tools.

This article originally appeared on Engadget at https://www.engadget.com/cybersecurity/google-adds-e2e-to-gmail-for-ios-and-android-enterprise-users-165345116.html?src=rss

https://www.engadget.com/cybersecurity/google-adds-e2e-to-gmail-for-ios-and-android-enterprise-users-165345116.html?src=rss


TheRegister.com

Microsoft's Copilot strategy is just more user abuse from Redmond, says Mozilla

  Openen als pagina
Firefox maker warns old web tactics are now shaping AI at the expense of user choice

Firefox-maker Mozilla is calling out Microsoft after Redmond said it would scale back some Copilot features in Windows, arguing the rollback shows the company pushed AI too far without enough regard for user choice....

https://go.theregister.com/feed/www.theregister.com/2026/04/10/mozilla_microsofts_copilot_strategy/


Electronics industry says FCC's foreign-made router policy is a bit of a mesh

  Openen als pagina
Trade group warns onshoring demands will leave Americans stuck with older gear

The Global Electronics Association (GEA) warns that the US ban on foreign-made network routers is impractical because few are made domestically, leaving consumers with little choice and delaying access to next-gen products, just as Wi-Fi 7 adoption should be ramping up....

https://go.theregister.com/feed/www.theregister.com/2026/04/10/gea_fcc_routers/





Cnet.com






Wired.com






ZDNet.com






TechRepublic.com






mashable.com






Geekwire.com





Flush with cash: Washington startup lands up to $500M to deploy facilities treating sewage, dairy waste

  Openen als pagina

Wastewater treatment startup Sedron Technologies - a company that once served Bill Gates a glass of water purified from sewage - is being acquired by Ara Partners. The firm is investing up to $500 million in Sedron to facilitate the deployment of its sewage and manure cleaning technologies. Read More

https://www.geekwire.com/2026/flush-with-cash-washington-startup-lands-up-500m-to-deploy-facilities-treating-sewage-dairy-waste/


Latest from TechRadar



‘Computers are no longer a bicycle for the mind’: Frameworks founder says the Steve Jobs era is over and PCs are now a ‘self-driving car that takes you directly to the destination’




Cybersecurity

Security.nl






Slashdot

Microsoft Begins Removing Copilot Branding From Windows 11 Apps

  Openen als pagina
Microsoft has started stripping Copilot branding out of Notepad in Windows 11, replacing the old Copilot menu with a more generic "writing tools" label. The AI features themselves aren't going away, but Microsoft seems to be backing off the heavy-handed Copilot branding and extra entry points. Windows Central reports: As promised, Microsoft is now beginning its effort to reduce and remove Copilot branding across Windows 11, with the latest Notepad update for Insiders outright removing the Copilot icon and phrasing. Now, the AI menu is simply called "writing tools," and maintains the same functionality as before. Additionally, Microsoft has also removed references to AI in the Settings area in Notepad. Now, the ability to turn on or off these AI powered writing tools are now listed under "Advanced features." This change is present in the latest preview build of Notepad which is now rolling out to all Windows Insiders. The app version is 11.2512.28.0, and you'll know you have it if you see the Copilot icon replaced with a pen icon instead. [...] For Notepad, it appears Microsoft has opted to replace the Copilot menu with something more generic. It's still the same functionally, but it's no longer leaning on the tainted Copilot brand. Of course, you can still easily turn off all AI features in Notepad if you don't want them. The Verge reports that the "unnecessary Copilot buttons" are also disappearing from the Snipping Tool, Photos, and Widgets.

Read more of this story at Slashdot.

https://tech.slashdot.org/story/26/04/10/1947203/microsoft-begins-removing-copilot-branding-from-windows-11-apps?utm_source=rss1.0mainlinkanon&utm_medium=feed


FBI Extracts Suspect's Deleted Signal Messages Saved In iPhone Notification Data

  Openen als pagina
An anonymous reader quotes a report from 404 Media: The FBI was able to forensically extract copies of incoming Signal messages from a defendant's iPhone, even after the app was deleted, because copies of the content were saved in the device's push notification database, multiple people present for FBI testimony in a recent trial told 404 Media. The case involved a group of people setting off fireworks and vandalizing property at the ICE Prairieland Detention Facility in Alvarado, Texas in July, and one shooting a police officer in the neck. The news shows how forensic extraction -- when someone has physical access to a device and is able to run specialized software on it -- can yield sensitive data derived from secure messaging apps in unexpected places. Signal already has a setting that blocks message content from displaying in push notifications; the case highlights why such a feature might be important for some users to turn on. "We learned that specifically on iPhones, if one's settings in the Signal app allow for message notifications and previews to show up on the lock screen, [then] the iPhone will internally store those notifications/message previews in the internal memory of the device," a supporter of the defendants who was taking notes during the trial told 404 Media. [...] During one day of the related trial, FBI Special Agent Clark Wiethorn testified about some of the collected evidence. A summary of Exhibit 158 published on a group of supporters' website says, "Messages were recovered from Sharp's phone through Apple's internal notification storage -- Signal had been removed, but incoming notifications were preserved in internal memory. Only incoming messages were captured (no outgoing)." 404 Media spoke to one of the supporters who was taking notes during the trial, and to Harmony Schuerman, an attorney representing defendant Elizabeth Soto. Schuerman shared notes she took on Exhibit 158. "They were able to capture these chats bc [because] of the way she had notifications set up on her phone -- anytime a notification pops up on the lock screen, Apple stores it in the internal memory of the device," those notes read. The supporter added, "I was in the courtroom on the last day of the state's case when they had FBI Special Agent Clark testifying about some Signal messages. One set came from Lynette Sharp's phone (one of the cooperating witnesses), but the interesting detailed messages shown in court were messages that had been set to disappear and had in fact disappeared in the Signal app." Further reading: Apple Gave Governments Data On Thousands of Push Notifications

Read more of this story at Slashdot.

https://mobile.slashdot.org/story/26/04/10/1656218/fbi-extracts-suspects-deleted-signal-messages-saved-in-iphone-notification-data?utm_source=rss1.0mainlinkanon&utm_medium=feed


Google News Now Prominently Featuring Polymarket Bets

  Openen als pagina
Futurism found that Google News is surfacing Polymarket betting pages alongside traditional news sources. "The bets often appear in the 'For you' section of Google News, which is tailored to a user's personal interests," the publication reports. "In one instance, it was even the very top result, as with this bet on the price of Bitcoin." From the report: In our testing, Polymarket bets are also showing up on the Google News home page. But links from the prediction market can pop up all over Google News, including in searches. In further tests, looking up "will ships transit the strait," referring to the Strait of Hormuz, returned numerous credible sources like Financial Times, The Guardian, and Reuters. Just below them, however, was a Polymarket bet on the number of ships that would be allowed to pass through the critical oil passageway. This doesn't appear to be an accident. When searching "Polymarket" in its search bar, Google News now allows users to choose it as a "source," directing them to a page that aggregates other Polymarket hits. It's not the only non-news site that's selectable as a source -- looking up "Reddit" and "X" offers the option, too -- but searching for "Kalshi," another prediction market and Polymarket's main competitor, doesn't give the option to use it as a source. [...] In light of all this, Polymarket appearing in Google News is a major victory for the prediction platform -- rubber-stamping its image as an authority on developing real-world events right alongside genuine real publishers of journalism.

Read more of this story at Slashdot.

https://news.slashdot.org/story/26/04/10/1640225/google-news-now-prominently-featuring-polymarket-bets?utm_source=rss1.0mainlinkanon&utm_medium=feed


Google Rolls Out Gmail End-To-End Encryption On Mobile Devices

  Openen als pagina
Gmail's end-to-end encryption is now available on all Android and iOS devices, letting enterprise users send and read encrypted emails directly in the app without any extra tools. "This launch combines the highest level of privacy and data encryption with a user-friendly experience for all users, enabling simple encrypted email for all customers from small businesses to enterprises and public sector," Google announced in a blog post. BleepingComputer reports: Starting this week, encrypted messages will be delivered as regular emails to Gmail recipients' inboxes if they use the Gmail app. Recipients who don't have the Gmail mobile app and use other email services can read them in a web browser, regardless of the device and service they're using. [...] This feature is now available for all client-side encryption (CSE) users with Enterprise Plus licenses and the Assured Controls or Assured Controls Plus add-on after admins enable the Android and iOS clients in the CSE admin interface via the Admin Console. Gmail's end-to-end encryption (E2EE) feature is powered by the client-side encryption (CSE) technical control, which allows Google Workspace organizations to use encryption keys they control and are stored outside Google's servers to protect sensitive documents and emails.

Read more of this story at Slashdot.

https://it.slashdot.org/story/26/04/10/1620217/google-rolls-out-gmail-end-to-end-encryption-on-mobile-devices?utm_source=rss1.0mainlinkanon&utm_medium=feed


France's Government Is Ditching Windows For Linux

  Openen als pagina
France says it plans to move some government computers from Windows to Linux as part of a broader push for digital sovereignty and reduced dependence on U.S. technology. TechCrunch reports: In a statement, French minister David Amiel said (translated) that the effort was to "regain control of our digital destiny" by relying less on U.S. tech companies. Amiel said that the French government can no longer accept that it doesn't have control over its data and digital infrastructure. The French government did not provide a specific timeline for the switchover, or which distributions it was considering. Microsoft did not immediately comment on the news. [...] France's decision to ditch Windows comes months after the government announced it would stop using Microsoft Teams for video conferencing in favor of French-made Visio, a tool based on the open source end-to-end encrypted video meeting tool Jitsi. The French government said it also plans to migrate its health data platform to a new trusted platform by the end of the year.

Read more of this story at Slashdot.

https://linux.slashdot.org/story/26/04/10/1545234/frances-government-is-ditching-windows-for-linux?utm_source=rss1.0mainlinkanon&utm_medium=feed


theregister.com/security


Project Glasswing and open source software: The good, the bad, and the ugly

  Openen als pagina
Just what FOSS developers need – a flood of AI-discovered vulnerabilities

Opinion Anthropic describes Project Glasswing as a coalition of tech giants committing $100 million in AI resources to hunt down and fix long-hidden vulnerabilities in critical open source software that it's finding with its new Mythos AI program. Or as The Reg put it, "an AI model that can generate zero-day vulnerabilities."...

https://go.theregister.com/feed/www.theregister.com/2026/04/10/project_glasswing/



Unpacking AI security in 2026 from experimentation to the agentic era

  Openen als pagina
Cut through the noise and understand the real risks, responsibilities, and responses shaping enterprise AI today.

Webinar Promo 2025 was the year of AI experimentation. In 2026, the bills are coming due. AI adoption has moved from isolated pilots to autonomous, enterprise wide deployment, bringing with it a sophisticated new generation of security challenges....

https://go.theregister.com/feed/www.theregister.com/2026/04/10/unpacking_ai_security_2026/


Crypto? Huh. Good gawd y'all, what is it good for? $45M in this case

  Openen als pagina
Cops bust latest scam, return $12m to bilked victims

US, UK, and Canadian law enforcement Thursday said that they disrupted a $45 million global cryptocurrency scam, freezing $12 million in stolen funds and identifying more than 20,000 cryptocurrency wallet addresses linked to fraud victims across 30 countries....

https://go.theregister.com/feed/www.theregister.com/2026/04/09/crypto_fraud_scam_45_million/


CISO2CISO.com



The Critical Role of Sboms (Software Bill of Materials) In Defending Medtech From Software Supply Chain Threats – Source: www.cyberdefensemagazine.com

  Openen als pagina

Source: www.cyberdefensemagazine.com – Author: News team Software supply chain attacks have emerged as a serious threat in the rapidly evolving field of cybersecurity, especially in medical devices. As these devices become more and more interconnected and dependent on complex software ecosystems, the potential for exploitation through the supply chain has grown exponentially. One powerful tool [...]

La entrada The Critical Role of Sboms (Software Bill of Materials) In Defending Medtech From Software Supply Chain Threats – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

https://ciso2ciso.com/the-critical-role-of-sboms-software-bill-of-materials-in-defending-medtech-from-software-supply-chain-threats-source-www-cyberdefensemagazine-com/


Ransomware Tactics Are Shifting. Here’s How to Keep Up – Source: www.cyberdefensemagazine.com

  Openen als pagina

Source: www.cyberdefensemagazine.com – Author: News team It’s common knowledge in the cybersecurity industry that ransomware is on the rise, with median demands rising 20% year-over-year across virtually all industries. But it’s not only the ransom sums themselves that are escalating; threat actors are engaging in increasingly aggressive tactics and techniques to extort their victims. It’s [...]

La entrada Ransomware Tactics Are Shifting. Here’s How to Keep Up – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

https://ciso2ciso.com/ransomware-tactics-are-shifting-heres-how-to-keep-up-source-www-cyberdefensemagazine-com/


French Advisory Sheds Light on Apple Spyware Activity – Source: www.darkreading.com

  Openen als pagina

Source: www.darkreading.com – Author: Rob Wright CERT-FR’s advisory follows last month’s disclosure of a zero-day flaw Apple said was used in “sophisticated” attacks against targeted individuals. Original Post URL: https://www.darkreading.com/vulnerabilities-threats/french-sheds-light-apple-spyware-activity Category & Tags: – Views: 11

La entrada French Advisory Sheds Light on Apple Spyware Activity – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

https://ciso2ciso.com/french-advisory-sheds-light-on-apple-spyware-activity-source-www-darkreading-com/


Hackread.com






Vuldb



CVE-2026-40191 | craigjbass clearancekit up to 5.0.3 Destination authorization

  Openen als pagina
A vulnerability labeled as problematic has been found in craigjbass clearancekit up to 5.0.3. Affected by this issue is some unknown functionality of the component Destination Handler. The manipulation results in incorrect authorization. This vulnerability is known as CVE-2026-40191. Attacking locally is a requirement. No exploit is available. The affected component should be upgraded.

https://vuldb.com/vuln/356941


CVE-2026-39922 | GeoNode up to 4.4.4/5.0.1 WMS Service server-side request forgery

  Openen als pagina
A vulnerability identified as critical has been detected in GeoNode up to 4.4.4/5.0.1. Affected by this vulnerability is an unknown functionality of the component WMS Service. The manipulation leads to server-side request forgery. This vulnerability is traded as CVE-2026-39922. It is possible to initiate the attack remotely. There is no exploit available. You should upgrade the affected component.

https://vuldb.com/vuln/356940


CVE-2026-33737 | Chamilo LMS up to 1.11.37/2.0.0-RC.2 simplexml_load_string xml external entity reference (GHSA-c4ww-qgf2-v89j)

  Openen als pagina
A vulnerability categorized as problematic has been discovered in Chamilo LMS up to 1.11.37/2.0.0-RC.2. Affected is the function simplexml_load_string. Executing a manipulation can lead to xml external entity reference. This vulnerability appears as CVE-2026-33737. The attack may be performed from remote. There is no available exploit. It is advisable to upgrade the affected component.

https://vuldb.com/vuln/356939


Microsoft Security






advisories.ncsc.nl

NCSC-2026-0110 [1.00] [M/H] Kwetsbaarheid verholpen in Cisco Smart Software Manager On-Prem

  Openen als pagina
Cisco heeft een kwetsbaarheid verholpen in Cisco Smart Software Manager On-Prem. Een kwaadwillende kan deze kwetsbaarheid misbruiken doordat in Cisco Smart Software Manager On-Prem (SSM On-Prem) een intern servicecomponent onbedoeld extern toegankelijk is. Hierdoor kan een aanvaller op afstand via een gemanipuleerde API-request commando’s uitvoeren op het onderliggende besturingssysteem met root-rechten.

https://advisories.ncsc.nl/advisory?id=NCSC-2026-0110


NCSC-2026-0109 [1.00] [M/H] Kwetsbaarheden verholpen in Synology SSL VPN Client

  Openen als pagina
Synology heeft kwetsbaarheden verholpen in Synology SSL VPN Client. Een kwaadwillende kan deze kwetsbaarheden misbruiken doordat Synology SSL VPN Client met versie vóór 1.4.5-0684 de PIN-code onveilig opslaat en bestanden via een lokaal HTTP-servercomponent onvoldoende afschermt. Dit kan leiden tot ongeautoriseerde configuratiewijzigingen aan de VPN-client en onderschepping van VPN-verkeer. De kwetsbaarheid beïnvloedt mogelijk de vertrouwelijkheid en integriteit van VPN-sessies.

https://advisories.ncsc.nl/advisory?id=NCSC-2026-0109


NCSC-2026-0108 [1.00] [M/H] Kwetsbaarheid verholpen in Juniper Networks Junos OS Evolved

  Openen als pagina
Juniper heeft een kwetsbaarheid verholpen in Junos OS Evolved draaiend op PTX Series apparaten. Een kwaadwillende kan deze kwetsbaarheid misbruiken om zijn rechten te verhogen. De kwetsbaarheid zit in de Flexible PIC Concentrators (FPC’s) van Juniper Networks Junos OS Evolved op PTX-systemen. De kwetsbaarheid kan leiden tot volledige compromittering van de Flexible PIC Concentrator component. De oorzaak ligt in onvoldoende access controls binnen de Junos OS Evolved omgeving op PTX Series hardware.

https://advisories.ncsc.nl/advisory?id=NCSC-2026-0108


NCSC-2026-0107 [1.00] [H/H] Kwetsbaarheid verholpen in FortiClient EMS van Fortinet

  Openen als pagina
Fortinet heeft een kwetsbaarheid verholpen in FortiClient EMS. De kwetsbaarheid betreft een onjuiste toegangscontrole in FortiClient EMS. Ongeauthenticeerde aanvallers kunnen door het versturen van speciaal opgemaakte verzoeken beveiligingscontroles omzeilen en ongeautoriseerde code of commando's uitvoeren. De kwetsbaarheid kan op afstand worden misbruikt zonder authenticatie, wat kan leiden tot ongeautoriseerde manipulatie van het systeem. Fortinet meldt informatie te hebben dat de kwetsbaarheid actief wordt misbruikt. Er is (nog) geen publieke Proof-of-Concept-code of exploit bekend. Het NCSC verwacht op korte termijn wel publieke Proof-of-Concept-code of exploits, waardoor de kans op scanverkeer en grootschalig misbruik toeneemt.

https://advisories.ncsc.nl/advisory?id=NCSC-2026-0107


NCSC-2026-0106 [1.00] [M/H] Kwetsbaarheden verholpen in Cisco Integrated Management Controller

  Openen als pagina
Cisco heeft meerdere kwetsbaarheden verholpen in Cisco Integrated Management Controller (IMC). De kwetsbaarheden bevinden zich in de webgebaseerde managementinterface van Cisco IMC. Een onbevoegde externe aanvaller kan via de functionaliteit voor het wijzigen van wachtwoorden de authenticatie omzeilen door speciaal opgemaakte HTTP-verzoeken te versturen, wat leidt tot ongeautoriseerde administratieve toegang. Daarnaast kunnen geauthenticeerde aanvallers, waaronder gebruikers met alleen leesrechten, door onvoldoende inputvalidatie command injection uitvoeren en willekeurige root-commando's of code uitvoeren, wat resulteert in privilege-escalatie en volledige controle over het systeem. Verder zijn er meerdere cross-site scripting (XSS) kwetsbaarheden, waaronder opgeslagen en gereflecteerde XSS, die geauthenticeerde gebruikers met administratieve rechten in staat stellen om kwaadaardige scripts te injecteren en uit te voeren in browsers van gebruikers die met de interface werken. Ook kunnen onbevoegde externe aanvallers via gereflecteerde XSS kwetsbaarheden kwaadaardige scripts injecteren door gebruikers te verleiden op speciaal opgemaakte links te klikken, wat kan leiden tot sessiekaping en ongeautoriseerde acties binnen de context van de getroffen gebruikers. Alle kwetsbaarheden zijn het gevolg van onvoldoende inputvalidatie in de webinterface van Cisco IMC. Voor succesvol misbruik moet de kwaadwillende toegang hebben tot de management-interface. Het is goed gebruik een dergelijke interface niet publiek toegankelijk te hebben, maar af te steunen in een separate beheeromgeving.

https://advisories.ncsc.nl/advisory?id=NCSC-2026-0106


NCSC Nieuws



Ruim twee miljoen bezoeken aan kwaadaardige websites voorkomen in pilot

  Openen als pagina
Dagelijks worden Nederlanders misleid met nepberichten en valse websites. Phishing is nog altijd één van de grootste vormen van online criminaliteit. Om internetgebruikers hier beter tegen te beschermen, hebben publieke en private partijen samen een nieuwe aanpak getest in een pilot. Het zogeheten Anti Phishing Shield laat zien dat de aanpak werkt: sinds de start van de pilot in juli 2025 zijn ruim twee miljoen pogingen om phishing- en frauduleuze websites te bezoeken geblokkeerd, onder een groep van ruim 200.000 gebruikers.

https://www.ncsc.nl/nieuws/ruim-twee-miljoen-bezoeken-aan-kwaadaardige-websites-voorkomen-in-pilot



Ernstige kwetsbaarheden in Cisco Secure Firewall Management Center

  Openen als pagina
Er zijn twee ernstige kwetsbaarheden ontdekt in de webinterface van Cisco Secure Firewall Management Center, aangeduid als CVE-2026-20079 en CVE-2026-20131, beide met een maximale CVSS-score van 10.0. Hoewel webinterfaces van dit soort producten niet publiekelijk toegankelijk horen te zijn, is het raadzaam zo spoedig mogelijk actie te ondernemen en de beschikbaar gestelde updates uit te voeren.*

https://www.ncsc.nl/alerts/ernstige-kwetsbaarheden-in-cisco-secure-firewall-management-center


NIST Cybersecurity

wid.cert-bund.de






cert.ssi.gouv.fr






theHackerNews

GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs

  Openen als pagina
Cybersecurity researchers have flagged yet another evolution of the ongoing GlassWorm campaign, which employs a new Zig dropper that's designed to stealthily infect all integrated development environments (IDEs) on a developer's machine. The technique has been discovered in an Open VSX extension named "specstudio.code-wakatime-activity-tracker," which masquerades as WakaTime, a

https://thehackernews.com/2026/04/glassworm-campaign-uses-zig-dropper-to.html


Browser Extensions Are the New AI Consumption Channel That No One Is Talking About

  Openen als pagina
While much of the discussion on AI security centers around protecting ‘shadow’ AI and GenAI consumption, there's a wide-open window nobody's guarding: AI browser extensions. A new report from LayerX exposes just how deep this blind spot goes, and why AI extensions may be the most dangerous AI threat surface in your network that isn't on anyone's

https://thehackernews.com/2026/04/browser-extensions-are-new-ai.html


Google Rolls Out DBSC in Chrome 146 to Block Session Theft on Windows

  Openen als pagina
Google has made Device Bound Session Credentials (DBSC) generally available to all Windows users of its Chrome web browser, months after it began testing the security feature in open beta. The public availability is currently limited to Windows users on Chrome 146, with macOS expansion planned in an upcoming Chrome release. "This project represents a significant

https://thehackernews.com/2026/04/google-rolls-out-dbsc-in-chrome-146-to.html


Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure

  Openen als pagina
A critical security vulnerability in Marimo, an open-source Python notebook for data science and analysis, has been exploited within 10 hours of public disclosure, according to findings from Sysdig. The vulnerability in question is CVE-2026-39987 (CVSS score: 9.3), a pre-authenticated remote code execution vulnerability impacting all versions of Marimo prior to and including

https://thehackernews.com/2026/04/marimo-rce-flaw-cve-2026-39987.html


Backdoored Smart Slider 3 Pro Update Distributed via Compromised Nextend Servers

  Openen als pagina
Unknown threat actors have hijacked the update system for the Smart Slider 3 Pro plugin for WordPress and Joomla to push a poisoned version containing a backdoor. The incident impacts Smart Slider 3 Pro version 3.5.1.35 for WordPress, per WordPress security company Patchstack. Smart Slider 3 is a popular WordPress slider plugin with more than 800,000 active installations across its free and Pro

https://thehackernews.com/2026/04/backdoored-smart-slider-3-pro-update.html


Techrepublic






BleepingComputer.com






securityboulevard.com

MITRE Gave XDR a Perfect Score. Then the Analyst Had to Investigate Alone

  Openen als pagina

XDR detects threats. It does not investigate them. 80% of analyst time is investigation, and XDR provides zero autonomous capability. Here's the structural analysis.

The post MITRE Gave XDR a Perfect Score. Then the Analyst Had to Investigate Alone appeared first on D3 Security.

The post MITRE Gave XDR a Perfect Score. Then the Analyst Had to Investigate Alone appeared first on Security Boulevard.

https://securityboulevard.com/2026/04/mitre-gave-xdr-a-perfect-score-then-the-analyst-had-to-investigate-alone/


Anthropic Claude Mythos Will Break Vulnerability Management

  Openen als pagina

Anthropic’s latest AI Model, Claude Mythos, will break the cybersecurity vulnerability management operational models. Mythos is so good at discovering and building viable exploits it is currently being rolled-out in a controlled manner under “Project Glasswing“. Those cybersecurity companies who have early access are attesting to the blazing speed and accuracy of the model and have declared the traditional processes the industry uses to manage vulnerabilities in their systems is no longer viable.

The Problem is Twofold

First, new AI models like Mythos, are incredibly proficient at identifying weaknesses in code that could be leveraged by cyber attackers. Mythos has found over 2000 high-severity vulnerabilities, including in every major operating system and web browser!

The second issue is how fast workable exploits can be created to take advantages of discovered vulnerabilities. The latest AI models are highly proficient and quickly figuring out how to leverage weakness and chain them together across multiple vulnerabilities to gain unprecedented access to targeted systems and infrastructures.

The speed of discovery and exploitation of vulnerabilities is now well beyond what defenders can address. Currently, the industry must become aware of vulnerabilities through industry announcements, direct notification by researchers, or in rare cases by self-discovery efforts. They must then verify the vulnerability and understand its potential applicability to their environment. It gets rated and based upon that rating; resources will be committed to develop a patch. The patch must be tested and then scheduled for roll-out in a way that it can be withdrawn if something unforeseen occurs.

This takes time and may incur downtime for impacted systems.

Legacy Patching Fails

Most organizations have a cadence for addressing different severity vulnerabilities. A patch calendar may bundle fixes to control the disruption and prioritize the most urgent fixes. High risk may be fixed in weeks or a month, medium in several months, and low, perhaps every year if they choose to fix them at all.

The goal is simply to fix the vulnerabilities before the attackers could create and deploy an exploit in the wild, which typically took months.

No longer.

Now, what took months will take minutes with Mythos and other AI models.

That breaks the entire vulnerability management system that protects our digital world.

For those who read my annual cybersecurity predictions (video version), we can check off prediction number 2, which outlined how AI acceleration would shrink the time-to-patch window dramatically, beyond what is currently possible for cybersecurity teams.

Predicting Strategic Outcomes

First, organizations will cut corners to speed up patch release for the impactful vulnerabilities most likely to be exploited. This will shrink the patch window a little, but not enough, and introduce errors in patches which will have undesired impacts on users. Essentially, the number of ‘bad patches’ will increase.

Secondly, the increased attack velocity will drive software developers to commit much more to using AI tools to proactively detect and resolve vulnerabilities prior to product release. This should have happened long ago, but in the race to market, security vetting often gets deferred to later. The outcome will be slower product release timelines from responsible vendors. The haphazard companies will want to take advantage and continue to push vulnerable code to get into the market faster. But that will eventually have consequences.

Third, there will be massive shift for cybersecurity teams to adopt these AI tools to compete with attackers by trying to detect and address vulnerabilities before the hackers. The tools, processes, and operating models will need to be entirely redrawn. The window of exposure will be the metric that must shrink, from months to hours.

Adaptation Required

The latest AI tools will compress the vulnerability lifecycle from discovery to exploitation at a pace that challenges the foundations of today’s security operations. Organizations that continue to rely on legacy processes will find themselves operating outside the window of safety. Defenders can no longer rely on traditional disclosure cycles, patch cadences, or reactive security models when intelligent systems can discover and weaponize weaknesses in hours. To survive this new era, organizations must reinvent their processes around AI-driven velocity. The signals are clear; it is time to radically adapt vulnerability management or be victimized.

The post Anthropic Claude Mythos Will Break Vulnerability Management appeared first on Security Boulevard.

https://securityboulevard.com/2026/04/anthropic-claude-mythos-will-break-vulnerability-management/


The Engagement Ratchet: How YouTube, Instagram, and Amazon Trained Users to Accept Less Control

  Openen als pagina

Earlier this year, YouTube began rolling out a row of algorithmically recommended videos at the top of the Subscriptions page. The section, labeled "most relevant," surfaces content the algorithm predicts the user will engage with, pulled from channels the user already follows. The subscription feed still exists below it. But the default view, the first thing a user sees when navigating to a page they built through deliberate choices, now leads with what YouTube's algorithm thinks they should watch.

The post The Engagement Ratchet: How YouTube, Instagram, and Amazon Trained Users to Accept Less Control appeared first on Security Boulevard.

https://securityboulevard.com/2026/04/the-engagement-ratchet-how-youtube-instagram-and-amazon-trained-users-to-accept-less-control/


The Engagement Ratchet: How YouTube, Instagram, and Amazon Trained Users to Accept Less Control

  Openen als pagina

Earlier this year, YouTube began rolling out a row of algorithmically recommended videos at the top of the Subscriptions page. The section, labeled "most relevant," surfaces content the algorithm predicts the user will engage with, pulled from channels the user already follows. The subscription feed still exists below it. But the default view, the first thing a user sees when navigating to a page they built through deliberate choices, now leads with what YouTube's algorithm thinks they should watch.

The post The Engagement Ratchet: How YouTube, Instagram, and Amazon Trained Users to Accept Less Control appeared first on Security Boulevard.

https://securityboulevard.com/2026/04/the-engagement-ratchet-how-youtube-instagram-and-amazon-trained-users-to-accept-less-control-2/


[un]prompted 2026 – Black-Hat LLMs

  Openen als pagina

Author, Creator & Presenter: Nicholas Carlini, Research Scientist, Anthropic

____________________________________________________

Our thanks to [un]prompted for publishing their Creators, Authors and Presenter’s outstanding [un]prompted 2026 AI Security Practitioner content on the Organizations' YouTube Channel.

Permalink

The post [un]prompted 2026 – Black-Hat LLMs appeared first on Security Boulevard.

https://securityboulevard.com/2026/04/unprompted-2026-black-hat-llms/


CXSecurity.com






Brian Krebs

Russia Hacked Routers to Steal Microsoft Office Tokens

  Openen als pagina
Hackers linked to Russia's military intelligence units are using known flaws in older Internet routers to mass harvest authentication tokens from Microsoft Office users, security experts warned today. The spying campaign allowed state-backed Russian hackers to quietly siphon authentication tokens from users on more than 18,000 networks without deploying any malicious software or code.

https://krebsonsecurity.com/2026/04/russia-hacked-routers-to-steal-microsoft-office-tokens/


Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab

  Openen als pagina
An elusive hacker who went by the handle "UNKN" and ran the early Russian ransomware groups GandCrab and REvil now has a name and a face. Authorities in Germany say 31-year-old Russian Daniil Maksimovich Shchukin headed both cybercrime gangs and helped carry out at least 130 acts of computer sabotage and extortion against victims across the country between 2019 and 2021.

https://krebsonsecurity.com/2026/04/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab/



Feds Disrupt IoT Botnets Behind Huge DDoS Attacks

  Openen als pagina
The U.S. Justice Department joined authorities in Canada and Germany in dismantling the online infrastructure behind four highly disruptive botnets that compromised more than three million hacked Internet of Things (IoT) devices, such as routers and web cameras. The feds say the four botnets -- named Aisuru, Kimwolf, JackSkid and Mossad -- are responsible for a series of recent record-smashing distributed denial-of-service (DDoS) attacks capable of knocking nearly any target offline.

https://krebsonsecurity.com/2026/03/feds-disrupt-iot-botnets-behind-huge-ddos-attacks/


Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker

  Openen als pagina
A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker's largest hub outside of the United States, said the company sent home more than 5,000 workers there today. Meanwhile, a voicemail message at Stryker's main U.S. headquarters says the company is currently experiencing a building emergency.

https://krebsonsecurity.com/2026/03/iran-backed-hackers-claim-wiper-attack-on-medtech-firm-stryker/


Troy Hunt

Weekly Update 498

  Openen als pagina

Presently sponsored by: Report URI: Guarding you from rogue JavaScript! Don’t get pwned; get real-time alerts & prevent breaches #SecureYourSite

This week, more time than I'd have liked to spend went on talking about the trials of chasing invoices. This is off the back of a customer (who, for now, will remain unnamed), who had invoices stacking back more than 6 months overdue and despite payment terms of

https://www.troyhunt.com/weekly-update-498/



HIBP Mega Update: Passkeys, k-Anonymity Searches, Massive Speed Enhancements and a Bulk Domain Verification API

  Openen als pagina

Presently sponsored by: Report URI: Guarding you from rogue JavaScript! Don’t get pwned; get real-time alerts & prevent breaches #SecureYourSite

For a hobby project built in my spare time to provide a simple community service, Have I Been Pwned sure has, well, "escalated". Today, we support hundreds of thousands of website visitors each day, tens of millions of API queries, and hundreds of millions of password searches. We&

https://www.troyhunt.com/passkeys-k-anonymity-searches-massive-speed-enhancements-bulk-domain-verification-api/



Weekly Update 495

  Openen als pagina

Presently sponsored by: Report URI: Guarding you from rogue JavaScript! Don’t get pwned; get real-time alerts & prevent breaches #SecureYourSite

In the beginning, it was simple. A website, a database and 150M+ email addresses to search. Time has added serverless functions (which run on servers 🤷‍♂️), code on the edge, new data storage constructs and a completely different mechanism for even just querying a simple email address.

https://www.troyhunt.com/weekly-update-495/


Bruce Schneier


On Microsoft’s Lousy Cloud Security

  Openen als pagina

ProPublica has a scoop:

In late 2024, the federal government’s cybersecurity evaluators rendered a troubling verdict on one of Microsoft’s biggest cloud computing offerings.

The tech giant’s “lack of proper detailed security documentation” left reviewers with a “lack of confidence in assessing the system’s overall security posture,” according to an internal government report reviewed by ProPublica.

Or, as one member of the team put it: “The package is a pile of shit.”

For years, reviewers said, Microsoft had tried and failed to fully explain how it protects sensitive information in the cloud as it hops from server to server across the digital terrain. Given that and other unknowns, government experts couldn’t vouch for the technology’s security...

https://www.schneier.com/blog/archives/2026/04/on-microsofts-lousy-cloud-security.html


Python Supply-Chain Compromise

  Openen als pagina

This is news:

A malicious supply chain compromise has been identified in the Python Package Index package litellm version 1.82.8. The published wheel contains a malicious .pth file (litellm_init.pth, 34,628 bytes) which is automatically executed by the Python interpreter on every startup, without requiring any explicit import of the litellm module.

There are a lot of really boring things we need to do to help secure all of these critical libraries: SBOMs, SLSA, SigStore. But we have to do them.

https://www.schneier.com/blog/archives/2026/04/python-supply-chain-compromise.html


Cybersecurity in the Age of Instant Software

  Openen als pagina

AI is rapidly changing how software is written, deployed, and used. Trends point to a future where AIs can write custom software quickly and easily: “instant software.” Taken to an extreme, it might become easier for a user to have an AI write an application on demand—a spreadsheet, for example—and delete it when you’re done using it than to buy one commercially. Future systems could include a mix: both traditional long-term software and ephemeral instant software that is constantly being written, deployed, modified, and deleted.

AI is changing cybersecurity as well. In particular, AI systems are getting better at finding and patching vulnerabilities in code. This has implications for both attackers and defenders, depending on the ways this and related technologies improve...

https://www.schneier.com/blog/archives/2026/04/cybersecurity-in-the-age-of-instant-software.html


Hong Kong Police Can Force You to Reveal Your Encryption Keys

  Openen als pagina

According to a new law, the Hong Kong police can demand that you reveal the encryption keys protecting your computer, phone, hard drives, etc.—even if you are just transiting the airport.

In a security alert dated March 26, the U.S. Consulate General said that, on March 23, 2026, Hong Kong authorities changed the rules governing enforcement of the National Security Law. Under the revised framework, police can require individuals to provide passwords or other assistance to access personal electronic devices, including cellphones and laptops.

...

https://www.schneier.com/blog/archives/2026/04/hong-kong-police-can-force-you-to-reveal-your-encryption-keys.html


Security Affairs

Ransomware attack on ChipSoft knocks EHR services offline across hospitals in the Netherlands and Belgium

  Openen als pagina
Dutch healthcare IT firm ChipSoft suffered a ransomware attack, forcing services and its HiX platform offline, impacting hospitals and patients. ChipSoft, a major Dutch provider of EHR systems, was hit by a ransomware attack that forced it to take its website and digital services offline, disrupting access for hospitals, healthcare providers, and patients. EHR (Electronic [...]

https://securityaffairs.com/190615/cyber-crime/ransomware-attack-on-chipsoft-knocks-ehr-services-offline-across-hospitals-in-the-netherlands-and-belgium.html


UAT-10362 linked to LucidRook attacks targeting Taiwan-based institutions

  Openen als pagina
LucidRook is Lua malware used in phishing attacks on NGOs and universities in Taiwan, linked to UAT-10362, spread via password-protected emails. LucidRook is a new Lua-based malware used in targeted phishing attacks against NGOs and universities in Taiwan. Cisco Talos links it to a skilled group tracked as UAT-10362. In Oct 2025, attackers used password-protected [...]

https://securityaffairs.com/190598/security/uat-10362-linked-to-lucidrook-attacks-targeting-taiwan-based-institutions.html


EngageLab SDK flaw opens door to private data on 50M Android devices

  Openen als pagina
A flaw in EngageLab SDK exposed up to 50M Android users, including 30M crypto wallets, letting apps bypass security and access private data. Microsoft researchers found a critical flaw in EngageSDK that lets apps bypass Android sandbox protections and access private data. The flaw put millions of users, including over 30M crypto wallet installs, at [...]

https://securityaffairs.com/190586/hacking/engagelab-sdk-flaw-opens-door-to-private-data-on-50m-android-devices.html


Bitcoin Depot hack leads to $3.6M Bitcoin theft via stolen credentials

  Openen als pagina
Hackers breached Bitcoin Depot, stole credentials, and took about 50 BTC worth $3.6M from its wallets after a March 23 intrusion. Hackers breached the largest US Bitcoin ATM operator, Bitcoin Depot, on March 23, stole login credentials, and drained about 50.9 BTC worth $3.6M from company wallets. Bitcoin Depot told the SEC that a hacker [...]

https://securityaffairs.com/190578/cyber-crime/bitcoin-depot-hack-leads-to-3-6m-bitcoin-theft-via-stolen-credentials.html


Eurail data breach impacted 308,777 people

  Openen als pagina
Hackers breached Eurail in Dec 2025, stole names and passport data, and exposed over 300,000 travelers’ personal information. Threat actors breached Eurail in December 2025 and stole names and passport numbers from its network. The company now notifies 308,777 people that attackers exposed their personal data, raising concerns about identity theft and misuse of sensitive [...]

https://securityaffairs.com/190570/data-breach/eurail-data-breach-impacted-308777-people.html


news.sophos.com