Google News Now Prominently Featuring Polymarket Bets
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
https://techcrunch.com/2026/04/10/france-to-ditch-windows-for-linux-to-reduce-reliance-on-us-tech/
https://techcrunch.com/2026/04/10/youtube-premium-youtube-music-subscription-price-increase/
https://techcrunch.com/2026/04/10/every-fusion-startup-that-has-raised-over-100m/
Amazon is ending support for third-party integrations on its Luna cloud gaming service. The most immediate changes mean that it's no longer possible to buy Ubisoft+ and Jackbox Games subscriptions or standalone games through Luna.
Amazon will automatically any cancel active subscriptions bought through Luna at the end of customers' next billing cycle. If you have a Ubisoft+ subscription that you bought directly from Ubisoft instead, you’ll still be able to access games on that service through Luna until June 10.
The Bring Your Own Library option — which allows users to play games they own on the likes of EA, GOG and Ubisoft on Luna — is going away too. You won't be able to access games from on those storefronts via Amazon's streaming service after June 3.
If you bought any games outright on Luna, you'll still be able to play them there until June 10. Unlike Google did when it shut down Stadia, Amazon isn’t offering refunds for those purchases. However, you'll still have access to them through the respective third-party platform that's linked to your account, be it the EA App, GOG Galaxy or Ubisoft Connect.
That doesn't exactly help folks who don't have powerful-enough systems to play more demanding games and were relying on Luna. As such, some people might need to turn to the likes of GeForce Now in order to keep playing games they bought through Luna (and they’ll need to hope GFN actually supports their specific games).
Amazon has been reshaping Luna over the last several months. It rolled out a revamped version of the service back in October, with more of a focus on GameNight party games that you can play with a smartphone.
Prime subscribers will still be able to claim PC games and stream games on the Luna Standard tier at no extra cost. The Luna Premium subscription, which includes a wider range of third-party games, is still available too.
“We’re doubling down on a broad range of gaming experiences, including strong third-party titles, delivered in ways that make great games more accessible, as well as new and unique gaming experiences like GameNight,” Amazon wrote in an email to Luna users. The company also said it will offer some folks a free Luna Premium subscription.
This article originally appeared on Engadget at https://www.engadget.com/gaming/amazon-luna-ends-support-for-third-party-subscriptions-and-game-purchases-171329996.html?src=rssAmerica's Big Tech companies may soon learn that saddling up with Donald Trump doesn't tend to work out in the end. As the president sows chaos and distrust around the globe while taking aim at EU tech regulations, Europe is looking for ways to adopt its own alternatives. The latest example is France, which said it's dropping Microsoft Windows in favor of Linux.
On Wednesday, France said (via TechCrunch) it plans to move its workstations from Windows to the open-source Linux. It's part of a broader movement across Europe toward digital sovereignty, aimed at reducing reliance on foreign tech — especially American and Chinese. Although homegrown alternatives aren't available in many areas, the EU seems prepared to wean itself off where it can.
In January, France announced that it would move its videoconferencing from Zoom and Teams to the French-made Visio. As part of this week’s Linux announcement, France added that it would also migrate its health data to a new platform by the end of 2026.
Since taking office, Trump has used tariffs and other measures to try to bully European nations into dropping their regulations on America's tech industry. In August, he vowed to "stand up to Countries that attack our incredible American Tech Companies." (The strange capitalizations are his, not ours.) His administration has described laws like the EU's Digital Services Act as "censorship" and "a tax."
So far, Europe has stood firm. "I want to be very clear: our digital sovereignty is our digital sovereignty," European Commission President Ursula von der Leyen said at the Munich Security Conference in February. "We have a long tradition in freedom of speech. Actually, the Enlightenment started on our continent."
Christian Kroll, CEO of German search engine Ecosia, foresaw Europe's predicament soon after Trump's 2024 reelection. "We, as a European community, just need to make sure that nobody can blackmail us." He added that "if the US turned off access to search results tomorrow, we would have to go back to phone books." Granted, the guy is selling a European-made search engine, so his bias is clear. But the salience of his point stands.
Giorgos Verdi, policy fellow at the European Council on Foreign Relations, said the Trump administration's behavior underscores the need for Europe to break free. "Could the US use its dominance over AI chips, its dominance over cloud in Europe, its dominance over AI systems in order to exert more pressure?" Verdi asked CNN rhetorically in January. "In order to build more resilience for Europe... there is a geopolitical case for European innovations to emerge."
This article originally appeared on Engadget at https://www.engadget.com/big-tech/french-government-says-au-revoir-windows-bienvenue-linux-165407232.html?src=rssGoogle has announced that end-to-end encryption (E2EE) for Gmail on Android and iOS is now rolling out for its enterprise users. Emails that require E2EE in Workspace can be composed and read within the Gmail app, so eligible users won’t need additional apps or portals.
The new feature expands Google’s client-side encryption (CSE) offering, a little more than a year after E2EE was introduced to Gmail on the web. According to a Google blog post, any encrypted message sent to a recipient who uses the Gmail app will appear in their inbox as any email thread would. If they don’t have the app, they’re still able to read and reply to the email in their browser securely, regardless of their email address.
Google says the new functionality "combines the highest level of privacy and data encryption with a user-friendly experience for all users, enabling simple encrypted email for all customers from small businesses to enterprises and public sector." Of course, "all users" applies only to Enterprise Plus members here, with the millions of people who use Gmail as their personal email service currently unable to take advantage of the highest level of privacy and data protection.
In order for Gmail users to start using E2EE in the app, an admin must first enable Android and iOS clients in the CSE admin interface, which is available in the Admin Console. When sending an email, you have to click the lock icon and select additional encryption before sending. Attachments can then be added as normal.
E2EE is available straight away in the Rapid Release and Scheduled Release domains. Enterprise users will need the Assured Controls or Assured Controls Plus add-on, which provides businesses and organizations that handle sensitive data with extra security and compliance-related tools.
This article originally appeared on Engadget at https://www.engadget.com/cybersecurity/google-adds-e2e-to-gmail-for-ios-and-android-enterprise-users-165345116.html?src=rssGoogle News has begun showing Polymarket bets and odds alongside actual stories, according to a report by Futurism. These look to appear as large blocks that include links to numerous ways for people to lose their money.
Bets tend to appear in the "For you" section of Google News, which is supposed to be tailored to a person's particular interests. Futurism notes that the platform actually placed a Polymarket bet as the top news result when inquiring about the price of Bitcoin.
The publication saw links to the prediction market all over Google News, including in searches. It popped up in queries regarding the Strait of Hormuz, which presents a link that lets people bet on the number of ships that would be allowed to pass through the critical passageway. The report even indicates that users were able to set the gambling platform as a source, which directs readers to an aggregate page of other Polymarket links.
Oof The Top Google News Result Is For Polymarket LOL.
We Cooked. pic.twitter.com/IFBbYFdn2A
There's a caveat here. I wasn't personally able to confirm most of these results. This could indicate that Google has quietly made some changes behind the scenes following Futurism's initial report.
Complaints from users on social media indicate that Google started doing this at the tail-end of March. However, one user noted all the way back in January that Polymarket results had started showing up in the news section of a traditional Google search. I was able to replicate that one.
Lawrence Bonk/Google NewsEngadget has reached out to Google to see just what's going on here and if it plans to continue displaying Polymarket bets alongside actual news stories. The company did announce a partnership with both Polymarket and Kalshi back in November. This deal indicated the two gambling platforms would feed prediction data into Google's finance platform, but didn't say anything about News.
It's pretty easy to see why Polymarket would be attractive to Google's algorithms. The platform generates huge numbers on pages that are constantly updated. This could make these algorithms think the links are leading to valuable news stories and not, you know, a place to bet on human misery.
Prediction markets like Polymarket give users the ability to place bets on real world outcomes, which includes wars and other gruesome things. This has led to numerous scandals, which include an incident in which an unknown Polymarket user made more than $400,000 after "predicting" the capture of Venezuela's president Nicolás Maduro just hours before US troops invaded the country and abducted him.
Polymarket has hosted bets on the use of nuclear weapons in current global conflicts, which is pretty dang chilling when you consider the possibility of government employees tipping the scales in their favor. President Trump did, after all, recently threaten to end an entire civilization.
This article originally appeared on Engadget at https://www.engadget.com/big-tech/google-has-reportedly-started-to-add-polymarket-data-to-news-results-161708462.html?src=rssAfter its history-making trip around the Moon, NASA's Artemis II mission is set to return to Earth later today. The Orion spacecraft carrying astronauts Reid Wiseman, Christina Koch, Victor Glover and Jeremy Hansen is scheduled to splash down off the coast of San Diego at approximately 8:07PM ET. NASA will stream the landing on YouTube and its NASA+ website, as will Netflix and HBO Max. The official broadcast will begin at 6:30PM ET.
After leaving Earth on NASA's super heavy-lift SLS rocket and spending nine days in space, the most dangerous part of the Artemis II mission still lies ahead. It will take approximately 13 minutes for the Orion spacecraft to complete re-entry. During that time, it will be subject to temperatures of up to 5,000 degrees Fahrenheit (2,760 degrees Celsius).
Reentry is dangerous for any crewed spacecraft, but is of particular concern here because of a "skip reentry" during the Artemis 1 mission. At that time, the Orion crew vessel briefly used its own lift to "skip" back out of Earth's upper atmosphere before re-entering for the final descent, suffering excess charring in the process. NASA spent months investigating and determined the craft was safe to fly, but Artemis II will take a more gradual approach back to Earth in hopes of reducing its exposure to excess heat.
Still, this is the first time in 53 years that NASA will need to guide a human crew back from the Moon. Once all is said and done, however, the Artemis II crew will have traveled 695,081 miles (1,118,624 km), captured amazing images along the way and reminded the world what’s possible when nations work together.
This article originally appeared on Engadget at https://www.engadget.com/science/space/how-to-watch-the-artemis-ii-landing-145344873.html?src=rsshttps://www.engadget.com/science/space/how-to-watch-the-artemis-ii-landing-145344873.html?src=rss
Firefox-maker Mozilla is calling out Microsoft after Redmond said it would scale back some Copilot features in Windows, arguing the rollback shows the company pushed AI too far without enough regard for user choice....
https://go.theregister.com/feed/www.theregister.com/2026/04/10/mozilla_microsofts_copilot_strategy/
The Global Electronics Association (GEA) warns that the US ban on foreign-made network routers is impractical because few are made domestically, leaving consumers with little choice and delaying access to next-gen products, just as Wi-Fi 7 adoption should be ramping up....
https://go.theregister.com/feed/www.theregister.com/2026/04/10/gea_fcc_routers/
Visitors to the CPUID website were briefly exposed to malware this week after attackers hijacked part of its backend, turning trusted download links into a delivery mechanism for something far less welcome....
https://go.theregister.com/feed/www.theregister.com/2026/04/10/cpuid_site_hijacked/
Amazon's board of directors is urging shareholders to reject a proposal that would have the megacorp disclose more information on the impact of datacenters on its climate commitments....
https://go.theregister.com/feed/www.theregister.com/2026/04/10/amazon_climate_goals/
Most UK business leaders will keep AI at the top of their spending priorities, with 65 percent planning to maintain investment whether they see immediate measurable returns or not....
https://go.theregister.com/feed/www.theregister.com/2026/04/10/ai_roi_kpmg/
https://www.cnet.com/tech/gaming/elden-ring-tarnished-edition-switch-2-preorder-game-key-cards/
https://arstechnica.com/science/2026/04/oobleck-still-holds-some-surprises/
https://arstechnica.com/science/2026/04/oldest-octopus-fossil-found-to-not-be-an-octopus/
https://www.wired.com/story/the-future-of-the-artemis-program-is-riding-on-reentry/
https://www.wired.com/story/sam-altman-home-attack-openai-san-franisco-office-threat/
https://www.zdnet.com/article/ecoflow-delta-pro-ultra-x-review/
https://www.zdnet.com/article/microsoft-windows-insider-program-simplified/
https://www.zdnet.com/article/apple-ios-26-4-new-features-siri/
https://www.zdnet.com/article/youtube-premium-price-increase/
Alibaba launches a new AI data center powered by 10,000 homegrown chips, signaling a major push toward self-reliance amid US export restrictions.
The post Alibaba Launches AI Data Center Powered by 10,000 Homegrown Chips appeared first on TechRepublic.
https://www.techrepublic.com/article/news-alibaba-10000-ai-chips-data-center-apac/
A flaw in the EngageLab SDK exposed 50 million Android users, allowing malicious apps to exploit trusted permissions and access sensitive data.
The post Microsoft: Third-Party Android Vulnerability Leaves Over 50M Users Exposed appeared first on TechRepublic.
https://www.techrepublic.com/article/news-engagelab-sdk-android-vulnerability-malware-bridge/
Google is rolling out notebooks in Gemini, giving users a new way to organize chats, files, and instructions into AI-powered project hubs.
The post Google Brings NotebookLM to Gemini for Easy Project Organization appeared first on TechRepublic.
https://www.techrepublic.com/article/news-google-gemini-notebooks-update/
See what you missed in Daily Tech Insider from April 6–10.
The post AI Expansion, Security Crises, and Workforce Upheaval Define This Week in Tech appeared first on TechRepublic.
Apple is reportedly pushing ahead with iPhone Air 2 despite weak sales, with upgrades to battery, camera, and performance already in development.
The post New Apple Rumor: iPhone Air 2 Leak Suggests Major Upgrades After First-Gen Criticism appeared first on TechRepublic.
https://www.techrepublic.com/article/news-apple-iphone-air-2-rumors-upgrades-weak-sales/
https://in.mashable.com/tech/108299/samsung-galaxy-a57-review-reliable-where-it-matters-most
https://www.geekwire.com/2026/artemis-2-moon-watch-splashdown/
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Visitors to the CPUID website were briefly exposed to malware this week after attackers hijacked part of its backend, turning trusted download links into a delivery mechanism for something far less welcome....
https://go.theregister.com/feed/www.theregister.com/2026/04/10/cpuid_site_hijacked/
Opinion Anthropic describes Project Glasswing as a coalition of tech giants committing $100 million in AI resources to hunt down and fix long-hidden vulnerabilities in critical open source software that it's finding with its new Mythos AI program. Or as The Reg put it, "an AI model that can generate zero-day vulnerabilities."...
https://go.theregister.com/feed/www.theregister.com/2026/04/10/project_glasswing/
The UK government is seeking views on radiofrequency jammers as it prepares legislation to ban the controversial devices....
https://go.theregister.com/feed/www.theregister.com/2026/04/10/signal_jammer_consultation/
Webinar Promo 2025 was the year of AI experimentation. In 2026, the bills are coming due. AI adoption has moved from isolated pilots to autonomous, enterprise wide deployment, bringing with it a sophisticated new generation of security challenges....
https://go.theregister.com/feed/www.theregister.com/2026/04/10/unpacking_ai_security_2026/
US, UK, and Canadian law enforcement Thursday said that they disrupted a $45 million global cryptocurrency scam, freezing $12 million in stolen funds and identifying more than 20,000 cryptocurrency wallet addresses linked to fraud victims across 30 countries....
https://go.theregister.com/feed/www.theregister.com/2026/04/09/crypto_fraud_scam_45_million/
NCEES explains why licensure matters for engineers and answers your top questions about the FE and PE exams. Source Views: 15
La entrada Thinking About Becoming a Licensed Engineer? Start Here. se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/thinking-about-becoming-a-licensed-engineer-start-here/
View our compilation of online stories and resources highlighting the Hispanic community and their contributions to STEM. Source Views: 14
La entrada Celebrate Hispanic Heritage Month With SWE se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/celebrate-hispanic-heritage-month-with-swe/
Source: www.cyberdefensemagazine.com – Author: News team Software supply chain attacks have emerged as a serious threat in the rapidly evolving field of cybersecurity, especially in medical devices. As these devices become more and more interconnected and dependent on complex software ecosystems, the potential for exploitation through the supply chain has grown exponentially. One powerful tool [...]
La entrada The Critical Role of Sboms (Software Bill of Materials) In Defending Medtech From Software Supply Chain Threats – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.cyberdefensemagazine.com – Author: News team It’s common knowledge in the cybersecurity industry that ransomware is on the rise, with median demands rising 20% year-over-year across virtually all industries. But it’s not only the ransom sums themselves that are escalating; threat actors are engaging in increasingly aggressive tactics and techniques to extort their victims. It’s [...]
La entrada Ransomware Tactics Are Shifting. Here’s How to Keep Up – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.darkreading.com – Author: Rob Wright CERT-FR’s advisory follows last month’s disclosure of a zero-day flaw Apple said was used in “sophisticated” attacks against targeted individuals. Original Post URL: https://www.darkreading.com/vulnerabilities-threats/french-sheds-light-apple-spyware-activity Category & Tags: – Views: 11
La entrada French Advisory Sheds Light on Apple Spyware Activity – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://hackread.com/graphalgo-scam-lazarus-hackers-us-llcs-malware/
https://hackread.com/unc6783-hackers-fake-okta-pages-corporate-breach/
https://hackread.com/adobe-reader-zero-day-exploit-data-malicious-pdfs/
https://hackread.com/claude-code-claude-md-sql-injection-attacks/
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-24302
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23411
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23410
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23409
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23408
https://www.ncsc.nl/alerts/kwetsbaarheid-in-forticlient-ems-van-fortinet
https://www.ncsc.nl/alerts/ontwikkelaars-opgelet-gecompromitteerde-npm-en-python-packages
https://www.ncsc.nl/nieuws/ruim-twee-miljoen-bezoeken-aan-kwaadaardige-websites-voorkomen-in-pilot
https://www.ncsc.nl/alerts/ernstige-kwetsbaarheden-in-cisco-secure-firewall-management-center
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1050
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1049
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1048
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1030
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1047
https://thehackernews.com/2026/04/glassworm-campaign-uses-zig-dropper-to.html
https://thehackernews.com/2026/04/browser-extensions-are-new-ai.html
https://thehackernews.com/2026/04/google-rolls-out-dbsc-in-chrome-146-to.html
https://thehackernews.com/2026/04/marimo-rce-flaw-cve-2026-39987.html
https://thehackernews.com/2026/04/backdoored-smart-slider-3-pro-update.html
A flaw in the EngageLab SDK exposed 50 million Android users, allowing malicious apps to exploit trusted permissions and access sensitive data.
The post Microsoft: Third-Party Android Vulnerability Leaves Over 50M Users Exposed appeared first on TechRepublic.
https://www.techrepublic.com/article/news-engagelab-sdk-android-vulnerability-malware-bridge/
See what you missed in Daily Tech Insider from April 6–10.
The post AI Expansion, Security Crises, and Workforce Upheaval Define This Week in Tech appeared first on TechRepublic.
A critical Adobe Acrobat zero-day has been exploited for months via malicious PDFs to steal data and potentially take over systems, with no patch yet available.
The post Hackers Exploit Adobe PDF Flaw for Months to Steal Data, No Fix Yet appeared first on TechRepublic.
https://www.techrepublic.com/article/news-adobe-acrobat-zero-day-pdf-exploit-months/
Apple warns of a new scam targeting millions of iPhone users. Learn the red flags, how it works, and how to protect your account and finances.
The post New Apple Scam Hits Millions of iPhone Users Worldwide, Draining Bank Accounts appeared first on TechRepublic.
https://www.techrepublic.com/article/news-apple-iphone-scam-targeting-millions-2026/
A massive breach exposed 337K LAPD-linked files, raising concerns over third-party risk, sensitive data exposure, and law enforcement cybersecurity gaps.
The post Massive Data Breach Exposes 337K LAPD-Linked Records appeared first on TechRepublic.
https://www.techrepublic.com/article/news-lapd-data-breach-337k-files-exposed/
The recent supply chain attack involving Mercor and the LiteLLM vulnerability serves as a massive wake-up call for enterprise security teams. While the security industry has spent the last year fixating on prompt injections and model jailbreaks, this breach highlights a far more systemic vulnerability.
The weakest link in enterprise AI is not necessarily the model itself. It is the middleware connecting the models to your data.
As organizations race to adopt AI, they are relying heavily on proxies, gateways, and Model Context Protocol (MCP) servers to route traffic between their proprietary internal systems and external Large Language Models (LLMs). These integration points form the "Agentic Action Layer." When an API gateway like LiteLLM is compromised, attackers gain the keys to the kingdom, bypassing the model entirely to access the raw data streams flowing underneath.
Tools like LiteLLM are incredibly popular because they solve a real engineering problem. They act as a universal proxy, allowing developers to standardize API calls across dozens of different LLM providers (such as OpenAI, Anthropic, and Google) using a single, unified format.
However, this creates a highly sensitive, centralized chokepoint. If an attacker compromises this middleware, they do not need to trick the AI model with a clever prompt. Instead, they gain direct access to the API keys, the unencrypted prompts containing proprietary data, and the raw model responses. The attacker can intercept, exfiltrate, or manipulate the data in transit.
This is the stark reality of the Agentic Era. The AI supply chain is fundamentally an API supply chain.
When a third-party proxy or MCP server is compromised, the resulting lateral movement is entirely machine-to-machine.
As highlighted in the newly released 1H 2026 State of AI and API Security Report, organizations are completely unprepared for this architectural shift:
When an attacker hijacks a legitimate AI proxy, legacy Web Application Firewalls (WAFs) and standard API gateways fail completely. These tools are designed to inspect inbound external traffic from human users. They are architecturally blind to internal machine identities communicating with external LLM endpoints.
To a legacy WAF, a compromised LiteLLM server exfiltrating data looks exactly like a legitimate AI workload executing a scheduled task.
To defend against these next-generation supply chain attacks, organizations must secure the Agentic Action Layer. You cannot secure an infrastructure you cannot see, and you cannot rely on static signatures to catch compromised machine identities acting maliciously.
The Salt Agentic Security Platform neutralizes these proxy breaches through two purpose-built capabilities:
1. Agentic Security Posture Management (AG-SPM) and the Security Graph. To prevent vulnerable middleware from exposing your enterprise, you must first map it. Salt builds a dynamic Agentic Security Graph that continuously maps the multi-pronged relationships between LLMs, external proxies, MCP servers, and foundational APIs. By scanning repositories and runtime environments, Salt identifies risky third-party LLM integrations and uncovers "Shadow AI" infrastructure. If developers spin up an unauthorized or vulnerable LLM proxy, AG-SPM flags it before it can be weaponized by an attacker.
2. Agentic Detection and Response (AG-DR) via Intent Analysis. Even with perfect posture, zero-day supply chain vulnerabilities will occur. When middleware is compromised, security teams need to detect anomalous behavior instantly. Salt AG-DR establishes agentic-aware baselines for all LLM connectivity. It performs Identity-Aware Intent Analysis, correlating 100% of traffic back to the specific machine identity (in this case, the LiteLLM proxy).
If that proxy suddenly begins routing traffic to an unauthorized external IP address or executing massive data pulls that fall outside its expected behavior, Salt recognizes the malicious "Sequence of Intent." The platform immediately interrupts the machine-speed attack and automatically triggers blocking actions, stopping data exfiltration in its tracks.
The Mercor and LiteLLM incident is not an outlier; it is a preview of the new attacker playbook. Securing AI innovation requires more than just sanitizing prompts. It requires absolute visibility and behavioral control over the API supply chain that connects your data to the models.
If you want to learn more about Salt and how we can help you, please contact us, schedule a demo, or visit our website. You can also get a free API Attack Surface Assessment from Salt Security's research team and learn what attackers already know.
The post The AI Supply Chain is Actually an API Supply Chain: Lessons from the LiteLLM Breach appeared first on Security Boulevard.
Google has expanded its encryption capabilities in Gmail to mobile devices, enabling enterprise customers to transmit encrypted emails directly within the app on both Android and iOS. The update removes a limitation that previously restricted native encrypted email use on mobile devices. The rollout allows eligible users to compose and read encrypted messages natively, without..
The post Google Extends Gmail Encryption to Mobile, but Limits Access to Enterprise Tier appeared first on Security Boulevard.
via the comic artistry and dry wit of Randall Munroe, creator of XKCD
The post Randall Munroe’s XKCD ‘Electric Vehicles’ appeared first on Security Boulevard.
https://securityboulevard.com/2026/04/randall-munroes-xkcd-electric-vehicles/
Flashpoint analysts, working with partner financial institutions, have observed a growing number of PhaaS operations operating with a level of coordination and specialization more commonly associated with legitimate software platforms. These ecosystems bring together phishing kit developers, infrastructure providers, spam delivery services, and financially motivated actors into a single, scalable pipeline for fraud.
The post The Phishing-as-a-Service Pipeline: How a Scalable Fraud Ecosystem Is Driving Global Attacks appeared first on Flashpoint.
The post The Phishing-as-a-Service Pipeline: How a Scalable Fraud Ecosystem Is Driving Global Attacks appeared first on Security Boulevard.
We found a convincing fake site that installs a trojanized Claude app while quietly deploying PlugX malware.
The post Fake Claude site installs malware that gives attackers access to your computer appeared first on Security Boulevard.
https://krebsonsecurity.com/2026/04/russia-hacked-routers-to-steal-microsoft-office-tokens/
https://krebsonsecurity.com/2026/04/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab/
https://krebsonsecurity.com/2026/03/canisterworm-springs-wiper-attack-targeting-iran/
https://krebsonsecurity.com/2026/03/feds-disrupt-iot-botnets-behind-huge-ddos-attacks/
https://krebsonsecurity.com/2026/03/iran-backed-hackers-claim-wiper-attack-on-medtech-firm-stryker/
This week, more time than I'd have liked to spend went on talking about the trials of chasing invoices. This is off the back of a customer (who, for now, will remain unnamed), who had invoices stacking back more than 6 months overdue and despite payment terms of
Day by day, I find we're eeking more goodness out of OpenClaw and finding the sweet spot between what the humans do well and the agent can run off and do on its own. Significantly, we're shifting more and more of the workload to the latter
For a hobby project built in my spare time to provide a simple community service, Have I Been Pwned sure has, well, "escalated". Today, we support hundreds of thousands of website visitors each day, tens of millions of API queries, and hundreds of millions of password searches. We&
Watching OpenClaw do its thing must be like watching the first plane take flight. It's a bit rickety and stuck together with a lot of sticky tape, but squint and you can see the potential for agentic AI to change the world as we know it. And I
In the beginning, it was simple. A website, a database and 150M+ email addresses to search. Time has added serverless functions (which run on servers 🤷♂️), code on the edge, new data storage constructs and a completely different mechanism for even just querying a simple email address.
Claude is actually pretty good on the issues.
https://www.schneier.com/blog/archives/2026/04/sen-sanders-talks-to-claude-about-ai-and-privacy.html
ProPublica has a scoop:
In late 2024, the federal government’s cybersecurity evaluators rendered a troubling verdict on one of Microsoft’s biggest cloud computing offerings.
The tech giant’s “lack of proper detailed security documentation” left reviewers with a “lack of confidence in assessing the system’s overall security posture,” according to an internal government report reviewed by ProPublica.
Or, as one member of the team put it: “The package is a pile of shit.”
For years, reviewers said, Microsoft had tried and failed to fully explain how it protects sensitive information in the cloud as it hops from server to server across the digital terrain. Given that and other unknowns, government experts couldn’t vouch for the technology’s security...
https://www.schneier.com/blog/archives/2026/04/on-microsofts-lousy-cloud-security.html
This is news:
A malicious supply chain compromise has been identified in the Python Package Index package litellm version 1.82.8. The published wheel contains a malicious .pth file (litellm_init.pth, 34,628 bytes) which is automatically executed by the Python interpreter on every startup, without requiring any explicit import of the litellm module.
There are a lot of really boring things we need to do to help secure all of these critical libraries: SBOMs, SLSA, SigStore. But we have to do them.
https://www.schneier.com/blog/archives/2026/04/python-supply-chain-compromise.html
AI is rapidly changing how software is written, deployed, and used. Trends point to a future where AIs can write custom software quickly and easily: “instant software.” Taken to an extreme, it might become easier for a user to have an AI write an application on demand—a spreadsheet, for example—and delete it when you’re done using it than to buy one commercially. Future systems could include a mix: both traditional long-term software and ephemeral instant software that is constantly being written, deployed, modified, and deleted.
AI is changing cybersecurity as well. In particular, AI systems are getting better at finding and patching vulnerabilities in code. This has implications for both attackers and defenders, depending on the ways this and related technologies improve...
https://www.schneier.com/blog/archives/2026/04/cybersecurity-in-the-age-of-instant-software.html
According to a new law, the Hong Kong police can demand that you reveal the encryption keys protecting your computer, phone, hard drives, etc.—even if you are just transiting the airport.
In a security alert dated March 26, the U.S. Consulate General said that, on March 23, 2026, Hong Kong authorities changed the rules governing enforcement of the National Security Law. Under the revised framework, police can require individuals to provide passwords or other assistance to access personal electronic devices, including cellphones and laptops.
...https://securityaffairs.com/190570/data-breach/eurail-data-breach-impacted-308777-people.html
Following our article on the challenges posed by agentic AI, we gave OpenClaw access to one of our legacy networks
Categories: Threat Research
Tags: OpenClaw, LLM, AI, penetration testing, Red Team, CISO, Sophos X-Ops
https://www.sophos.com/en-us/blog/we-let-openclaw-loose-on-an-internal-network-here-s-what-it-found
No matter the country, industry, or company size, IT and cybersecurity teams report a heavy regulatory load and worry about staying aligned with requirements
Categories: Products & Services
Tags: CISO, Compliance
https://www.sophos.com/en-us/blog/is-compliance-complexity-outpacing-it-capacity
Third consecutive time being named a Customers’ Choice for MDR
Categories: Products & Services
Tags: Gartner, Gartner Peer Insights, MDR, Sophos MDR, Third-Party Reviews
https://www.sophos.com/en-us/blog/sophos-gartner-peer-insights-mdr
Amazon has integrated Sophos threat intelligence into Amazon GuardDuty, expanding the breadth and accuracy of malicious threat detection for customers running workloads on Amazon Web Services (AWS).
Categories: Products & Services
Tags: AWS, Sophos Intelix, amazon, Amazon GuardDuty, Sophos OEM
New Sophos survey reveals only 5% of IT leaders say they fully trust their cybersecurity vendors
Categories: Products & Services, Sophos Insights
Tags: Trust, Privacy, Trust Center
https://www.sophos.com/en-us/blog/the-cybersecurity-trust-reality-in-2026