Feeds last updated @: UTC - 11:45 - 29/04/2026
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
https://www.theregister.com/security
GoDaddy is currently investigating claims that it handed complete control of a valid 27-year-old domain to another customer, without requiring them to pass any authentication processes or upload any supporting documents....
Thirty ClawHub skills published by a single author are silently co-opting AI agents and creating a mass cryptocurrency mining swarm – without any malware or user consent....
https://go.theregister.com/feed/www.theregister.com/2026/04/29/30_clawhub_skills_mine_crypto/
Organizations hit by the wave of Trivy and LiteLLM supply-chain compromises that paid Vect in hopes of recovering their data likely did not get much back, according to Check Point Research. That's because the ransomware Vect uses isn't actually ransomware at all, but a wiper that destroys any file larger than 128KB....
https://go.theregister.com/feed/www.theregister.com/2026/04/28/dont_pay_vect_a_ransom/
Updated Logistics technology company Pitney Bowes, which makes franking machines for US postage, is the latest scalp claimed by ShinyHunters and its ongoing spree of pay-or-leak attacks against major organizations....
https://go.theregister.com/feed/www.theregister.com/2026/04/28/pitney_bowes_is_the_latest/
European-based SUSE devoted much of the annual SUSECON event to its sovereignty-focused pitch - even as reports swirl that its majority stakeholder is exploring a $6 billion sale which could land the Linux vendor in American hands....
https://go.theregister.com/feed/www.theregister.com/2026/04/28/sovereignty_its_all_about_the/
NCEES explains why licensure matters for engineers and answers your top questions about the FE and PE exams. Source Views: 15
La entrada Thinking About Becoming a Licensed Engineer? Start Here. se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/thinking-about-becoming-a-licensed-engineer-start-here/
View our compilation of online stories and resources highlighting the Hispanic community and their contributions to STEM. Source Views: 14
La entrada Celebrate Hispanic Heritage Month With SWE se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/celebrate-hispanic-heritage-month-with-swe/
Source: www.cyberdefensemagazine.com – Author: News team Software supply chain attacks have emerged as a serious threat in the rapidly evolving field of cybersecurity, especially in medical devices. As these devices become more and more interconnected and dependent on complex software ecosystems, the potential for exploitation through the supply chain has grown exponentially. One powerful tool [...]
La entrada The Critical Role of Sboms (Software Bill of Materials) In Defending Medtech From Software Supply Chain Threats – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.cyberdefensemagazine.com – Author: News team It’s common knowledge in the cybersecurity industry that ransomware is on the rise, with median demands rising 20% year-over-year across virtually all industries. But it’s not only the ransom sums themselves that are escalating; threat actors are engaging in increasingly aggressive tactics and techniques to extort their victims. It’s [...]
La entrada Ransomware Tactics Are Shifting. Here’s How to Keep Up – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.darkreading.com – Author: Rob Wright CERT-FR’s advisory follows last month’s disclosure of a zero-day flaw Apple said was used in “sophisticated” attacks against targeted individuals. Original Post URL: https://www.darkreading.com/vulnerabilities-threats/french-sheds-light-apple-spyware-activity Category & Tags: – Views: 12
La entrada French Advisory Sheds Light on Apple Spyware Activity – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://hackread.com/us-estonian-suspect-arrest-scattered-spider-cyberattacks/
https://hackread.com/cursor-ai-ide-vulnerability-code-execution-git-hooks/
https://hackread.com/ai-powered-vendor-risk-management-platforms-saas-companies-2026/
https://hackread.com/dhl-phishing-scam-attack-chain-steal-passwords/
https://hackread.com/decoding-q1-2026s-152-9b-crypto-custody-concentration/
https://www.debian.org/security/
https://msrc.microsoft.com/update-guide/vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34591
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23388
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31619
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31658
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31592
https://www.ncsc.nl/alerts/kwetsbaarheid-in-microsoft-system-center
https://www.ncsc.nl/nieuws/tweede-kamer-stemt-in-met-cyberbeveiligingswet
https://www.ncsc.nl/nieuws/anthropics-frontiermodel-mythos-vraagt-om-directe-actie
https://www.ncsc.nl/alerts/kwetsbaarheid-in-adobe-acrobat-dc-acrobat-reader-dc-en-acrobat-2024
https://www.ncsc.nl/alerts/kwetsbaarheid-in-forticlient-ems-van-fortinet
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0880
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1233
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1304
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1310
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1309
https://thehackernews.com/2026/04/critical-cpanel-authentication.html
https://thehackernews.com/2026/04/cisa-adds-actively-exploited.html
https://thehackernews.com/2026/04/litellm-cve-2026-42208-sql-injection.html
https://thehackernews.com/2026/04/researchers-discover-critical-github.html
https://thehackernews.com/2026/04/brazilian-lofygang-resurfaces-after.html
https://techrepublic.com/topic/security
A hardcoded ClickUp API key exposed hundreds of corporate and government emails for over a year, raising new SaaS security concerns.
The post ClickUp Data Leak Exposes Enterprise Emails for Over a Year appeared first on TechRepublic.
https://www.techrepublic.com/article/news-clickup-api-key-email-exposure/
ADT confirmed a data breach exposing customer names, addresses, phone numbers, and partial SSNs, with millions of records reportedly affected.
The post ADT Confirms Major Data Breach Exposing Millions of Names, Partial SSNs appeared first on TechRepublic.
https://www.techrepublic.com/article/news-adt-data-breach-millions-customer-records/
Health data from 500,000 UK Biobank participants was found listed for sale online in China, raising concerns over research access misuse and data security.
The post Health Records of 500,000 UK Biobank Volunteers Listed Online in China appeared first on TechRepublic.
https://www.techrepublic.com/article/uk-biobank-data-500k-sale-china/
Learn what cloud security is, why it matters in 2026, and the best practices for protecting data, identities, workloads, and cloud infrastructure.
The post What Is Cloud Security? A 2026 Guide appeared first on TechRepublic.
https://www.techrepublic.com/article/what-is-cloud-security/
Enterprise VPN solutions are critical for connecting remote workers to company resources via reliable and secure links to foster communication and productivity. Read about seven viable choices for businesses.
The post The Top 8 Enterprise VPN Solutions appeared first on TechRepublic.
https://www.bleepingcomputer.com/
Beyond the "headline breach," modern enterprises face a persistent threat: steady-state data leakage. Learn why traditional privacy definitions fail and how "authorized" data flows in workplace apps create continuous legal and operational risk.
The post Data Privacy Leaks – The Drip, Drip, Drip of Exposure appeared first on Security Boulevard.
https://securityboulevard.com/2026/04/data-privacy-leaks-the-drip-drip-drip-of-exposure/
We're in Claude! Now everyone can use our threat intel to check suspicious links, phone numbers, or email addresses. We're committed to helping you spot scams.
The post Scam-checking just got a lot easier: Malwarebytes is now in Claude appeared first on Security Boulevard.
That’s a lot. No, it’s an extraordinary number:
Since February, the Firefox team has been working around the clock using frontier AI models to find and fix latent security vulnerabilities in the browser. We wrote previously about our collaboration with Anthropic to scan Firefox with Opus 4.6, which led to fixes for 22 security-sensitive bugs in Firefox 148.
As part of our continued collaboration with Anthropic, we had the opportunity to apply an early version of Claude Mythos Preview to Firefox. This week’s release of Firefox 150 includes fixes for 271 vulnerabilities identified during this initial evaluation...
The post Claude Mythos Has Found 271 Zero-Days in Firefox appeared first on Security Boulevard.
https://securityboulevard.com/2026/04/claude-mythos-has-found-271-zero-days-in-firefox/
Articles related to cyber risk quantification, cyber risk management, and cyber resilience.
The post AI Governance and Risk Insights for Enterprises | Kovrr appeared first on Security Boulevard.
https://securityboulevard.com/2026/04/ai-governance-and-risk-insights-for-enterprises-kovrr/
Articles related to cyber risk quantification, cyber risk management, and cyber resilience.
The post AI Governance and Risk Insights for Enterprises | Kovrr appeared first on Security Boulevard.
https://securityboulevard.com/2026/04/ai-governance-and-risk-insights-for-enterprises-kovrr-2/
https://krebsonsecurity.com/2026/04/scattered-spider-member-tylerb-pleads-guilty/
https://krebsonsecurity.com/2026/04/patch-tuesday-april-2026-edition/
https://krebsonsecurity.com/2026/04/russia-hacked-routers-to-steal-microsoft-office-tokens/
https://krebsonsecurity.com/2026/04/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab/
https://krebsonsecurity.com/2026/03/canisterworm-springs-wiper-attack-targeting-iran/
This is so "peak 2026" - writing an equality policy to ensure people treat our AI bot with the same respect as they do their human counterparts. It's intentionally a bit tongue-in-cheek, but it's there for a purpose: we simply don't have
Looking back at this milestone video, it's the audience question towards the end I liked most: "are you happy"? Charlotte and I have chosen a path that's non-traditional, intense and at times, pretty stressful. There's no clear delineation of when work starts
I love cutting-edge tech, but I hate hyperbole, so I find AI to be a real paradox. Somewhere in that whole mess of overnight influencers, disinformation and ludicrous claims is some real "gold" - AI stuff that's genuinely useful and makes a meaningful difference. This blog
https://www.troyhunt.com/heres-what-agentic-ai-can-do-with-have-i-been-pwneds-apis/
I'm starting to become pretty fond of Bruce. Actually, I've had a bit of an epiphany: an AI assistant like Bruce isn't just about auto-responding to tickets in an entirely autonomous manner; it's also pretty awesome at responding with just a little
This week, more time than I'd have liked to spend went on talking about the trials of chasing invoices. This is off the back of a customer (who, for now, will remain unnamed), who had invoices stacking back more than 6 months overdue and despite payment terms of
That’s a lot. No, it’s an extraordinary number:
Since February, the Firefox team has been working around the clock using frontier AI models to find and fix latent security vulnerabilities in the browser. We wrote previously about our collaboration with Anthropic to scan Firefox with Opus 4.6, which led to fixes for 22 security-sensitive bugs in Firefox 148.
As part of our continued collaboration with Anthropic, we had the opportunity to apply an early version of Claude Mythos Preview to Firefox. This week’s release of Firefox 150 includes fixes for 271 vulnerabilities identified during this initial evaluation...
https://www.schneier.com/blog/archives/2026/04/claude-mythos-has-found-271-zero-days-in-firefox.html
Two weeks ago, Anthropic announced that its new model, Claude Mythos Preview, can autonomously find and weaponize software vulnerabilities, turning them into working exploits without expert guidance. These were vulnerabilities in key software like operating systems and internet infrastructure that thousands of software developers working on those systems failed to find. This capability will have major security implications, compromising the devices and services we use every day. As a result, Anthropic is not releasing the model to the general public, but instead to a ...
Sent by a Spanish diplomat. Apparently people have been working on it since it was rediscovered in 1860.
https://www.schneier.com/blog/archives/2026/04/medieval-encrypted-letter-decoded.html
Science news:
Scientists have finally cracked a long-standing mystery about squid and cuttlefish evolution by analyzing newly sequenced genomes alongside global datasets. The research reveals that these bizarre, intelligent creatures likely originated deep in the ocean over 100 million years ago, surviving mass extinction events by retreating into oxygen-rich deep-sea refuges. For millions of years, their evolution barely changed—until a dramatic post-extinction boom sparked rapid diversification as they moved into new shallow-water habitats. ...
It was used to track a Dutch naval ship:
Dutch journalist Just Vervaart, working for regional media network Omroep Gelderland, followed the directions posted on the Dutch government website and mailed a postcard with a hidden tracker inside. Because of this, they were able to track the ship for about a day, watching it sail from Heraklion, Crete, before it turned towards Cyprus. While it only showed the location of that one vessel, knowing that it was part of a carrier strike group sailing in the Mediterranean could potentially put the entire fleet at risk...
https://www.schneier.com/blog/archives/2026/04/hiding-bluetooth-trackers-in-mail.html
Two supply chain attacks, same day, same command-and-control domain
Categories: Threat Research
Tags: Supply chain, Sophos X-Ops, pipeline, Bitwarden, Checkmarx
https://www.sophos.com/en-us/blog/supply-chain-attacks-hit-checkmarx-and-bitwarden-developer-tools
Our passkey rollout took three tries. Here's a playbook to make your implementation smoother.
Categories: Security Operations
Tags: CISO, playbook, toolkit, passkeys
https://www.sophos.com/en-us/blog/strengthening-authentication-with-passkeys-a-ciso-playbook
Check out the full release notes for more details and a list of fixes.
Categories: Products & Services
Tags: Firewall, network, v22
https://www.sophos.com/en-us/blog/sophos-firewall-v22-mr1-is-now-available
Following a long-established pattern, the fourth month of the year is one of the cruelest
Categories: X-ops, Threat Research
Tags: Patch Tuesday
https://www.sophos.com/en-us/blog/april-2026-microsoft-patch-tuesday
The use of hidden virtual machines (VMs) enables long-term access, credential harvesting, data exfiltration, and PayoutsKing ransomware deployment
Categories: Threat Research
Tags: virtual machine, QEMU, PayoutsKing, GOLD ENCOUNTER, CitrixBleed2
https://www.sophos.com/en-us/blog/qemu-abused-to-evade-detection-and-enable-ransomware-delivery