Cybersecurity

Feeds last updated @: UTC - 11:45 - 29/04/2026

Security.nl

https://www.security.nl






Slashdot

https://slashdot.org/

FDA Grants Quick Review For 3 Psychedelic Drug Trials

  Pagina openen
An anonymous reader quotes a report from NBC News: The Food and Drug Administration on Friday granted a quick review of three experimental psychedelic drugs meant to treat major depression and post-traumatic stress disorder. It's the latest move by the Trump administration signaling a shift in policy toward treatments that also give users a high -- coming a day after the Justice Department said it would ease restrictions on state-licensed medical marijuana. UK-based biotech company Compass Pathways said Friday it has received an expedited review for its experimental form of synthetic psilocybin for treatment-resistant depression. In a press release the company cited two large, phase 3 studies that had "generated positive data." Usona Institute, headquartered in Wisconsin, also said it's received a voucher for its work with psilocybin to treat major depressive disorder. In an email, a Usona spokesperson said the company expects the review process to last one to two months after it submits its application. "The voucher expedites the timeline only; it does not alter scientific or regulatory standards," the spokesperson wrote. New York-based Transcend Therapeutics has also been granted a priority review voucher for its experimental drug methylone for PTSD, Blake Mandell, the company's chief executive officer, said. "There's a battle still raging in their mind that we don't fully understand biochemically," FDA Commissioner Marty Makary said. "When you see something that looks promising for a community that is suffering with mental health illness, despair and suicidal ideation, you can't help but recognize that." Makary told NBC News that with the priority voucher program, the agency could potentially approve the first psychedelic drug by the end of summer.

Read more of this story at Slashdot.

https://science.slashdot.org/story/26/04/29/0340243/fda-grants-quick-review-for-3-psychedelic-drug-trials?utm_source=rss1.0mainlinkanon&utm_medium=feed


New Report Finds Some Babies Spend Up To Eight Hours a Day on Screens

  Pagina openen
fjo3 shares a report from The Times: More than two-thirds of babies under two use screens, a report has found, and some are exposed for up to eight hours a day. Nearly a third of newborns were found to be watching screens for more than three hours a day, while almost 20 percent of infants of four to 11 months used screens for more than an hour a day. The report comes after the government issued guidance that children under two do not use screens at all, apart from communal activities such as video-calling relatives. In a review of the current research, researchers found evidence linking screen time to poorer outcomes for children, including an increased risk of obesity, short-sightedness, sleep and behavioural difficulties, and later challenges with friendships. [...] The research also revealed why children and parents use screens, with families reporting children doing so for educational purposes, entertainment, play and to communicate and bond with others. Parents, meanwhile, used screens to occupy or distract children, which helped caregivers to complete domestic duties, paid employment and other caring responsibilities. Nearly a quarter of parents -- 23.6 percent -- either had no childcare or were not aware of the government's early years offer.

Read more of this story at Slashdot.

https://mobile.slashdot.org/story/26/04/29/0334222/new-report-finds-some-babies-spend-up-to-eight-hours-a-day-on-screens?utm_source=rss1.0mainlinkanon&utm_medium=feed


Musk Testifies OpenAI Was Created As Nonprofit To Counter Google

  Pagina openen
Elon Musk testified on day two of his trial against OpenAI, saying he helped create the company as a nonprofit counterweight to Google and would not have backed it if the goal had been private profit. CNBC reports: Musk on Tuesday was the first witness called to testify in the trial. He spoke about his upbringing, his many companies, his role in founding OpenAI and his understanding of its structure. Musk said in his testimony that he was not opposed to the creation of a small for-profit subsidiary, "as long as the tail didn't wag the dog." Musk said he was motivated to start OpenAI to serve as a counterweight to Google. He got the idea after an argument he had with Google co-founder Larry Page, who called Musk a "speciesist for being pro-human," he testified. "I could have started it as a for profit and I chose not to," Musk said on the stand. Earlier, attorneys for Musk and OpenAI presented their opening arguments to the jury. Musk's lead trial lawyer, Steven Molo, delivered the opening statement for the Tesla and SpaceX CEO. OpenAI lawyer William Savitt gave the opening statement for the AI company, Altman and Brockman. OpenAI has characterized Musk's lawsuit as a baseless "harassment campaign." The company said Monday in a post on X that it "can't wait to make our case in court where both the truth and the law are on our side." During his testimony on Tuesday, Musk repeatedly emphasized that he founded OpenAI to serve as a counterweight to Google. He said he got the idea after an argument about AI safety with Google co-founder Larry Page, who Musk said called him "a speciesist for being pro-human." Musk said he was concerned Page was not taking AI safety seriously, so he wanted there to be an nonprofit, open source alternative to Google. "I could have started it as a for profit and I chose not to," Musk said on the stand. Further reading: Elon Musk and OpenAI CEO Sam Altman Head To Court

Read more of this story at Slashdot.

https://yro.slashdot.org/story/26/04/29/0311202/musk-testifies-openai-was-created-as-nonprofit-to-counter-google?utm_source=rss1.0mainlinkanon&utm_medium=feed


Electrical Current Might Be the Key To a Better Cup of Coffee

  Pagina openen
An anonymous reader quotes a report from Ars Technica: University of Oregon chemist Christopher Hendon loves his coffee -- so much so that studying all the factors that go into creating the perfect cuppa constitutes a significant area of research for him. His latest project: discovering a novel means of measuring the flavor profile of coffee simply by sending an electrical current through a sample beverage. The results appear in a new paper published in the journal Nature Communications. [...] The coffee industry typically uses a method for measuring the refractive index of coffee -- i.e., how light bends as it travels through the liquid -- to determine strength, but it doesn't capture the contribution of roast color to the overall flavor profile. So for this latest study, Hendon decided to focus on roast color and beverage strength, the two variables most likely to affect the sensory profile of the final cuppa. His solution turned out to be quite simple. Hendon repurposed an electrochemical tool called a potentiostat, typically used to test battery and fuel cell performance. Hendon used the tool to measure how electricity interacted with the liquid. He found that this provided a better measurement of the flavor profile. He even tested it on four different samples of coffee beans and successfully identified the distinctive signature of a batch that had failed the roaster's quality-control process. Granted, one's taste in coffee is fairly subjective, so Hendon's goal was not to achieve a "perfect" cup but to give baristas a simple tool to consistently reproduce flavor profiles more tailored to a given customer's taste. "It's an objective way to make a statement about what people like in a cup of coffee," said Hendon. "The reason you have an enjoyable cup of coffee is almost certainly that you have selected a coffee of a particular roast color and extracted it to a desired strength. Until now, we haven't been able to separate those variables. Now we can diagnose what gives rise to that delicious cup." Outside of his latest electrical-current experiment, Christopher Hendon's coffee research has shown that espresso can be made more consistently by modeling extraction yield -- how much coffee dissolves into the final drink -- and controlling water flow and pressure. He also found that static electricity from grinding causes fine coffee particles to clump, which disrupts brewing. The solution: adding a small squirt of water to beans before grinding (known as the Ross droplet technique) to reduce that static, cut clumping and waste, and lead to a stronger, more consistent espresso.

Read more of this story at Slashdot.

https://developers.slashdot.org/story/26/04/28/1935206/electrical-current-might-be-the-key-to-a-better-cup-of-coffee?utm_source=rss1.0mainlinkanon&utm_medium=feed


Apple Vision Pro Used In World-First Cataract Surgery

  Pagina openen
Apple's Vision Pro has been used in what's described as the world's first cataract surgery performed with the headset. MacRumors reports: [New York opthalmologist] Dr. Eric Rosenberg of SightMD completed the initial procedure in October 2025 and has since performed hundreds of additional cases using ScopeXR, a surgical platform he co-developed for Apple's mixed reality device. ScopeXR streams live feeds from 3D digital surgical microscopes directly into the Vision Pro, which lets the surgeon view the operative field in stereoscopic 3D while overlaying preoperative diagnostic data. The platform also supports real-time remote collaboration, allowing surgeons to virtually join procedures and see exactly what the operating surgeon sees. "We are now able to bring the world's best surgeon into any operating room, at any hour, from anywhere on the planet," said Dr. Rosenberg in a company press release. "From residents performing their first cases to surgeons facing unexpected complications, this technology democratizes access to expertise and that will save vision."

Read more of this story at Slashdot.

https://science.slashdot.org/story/26/04/28/1923255/apple-vision-pro-used-in-world-first-cataract-surgery?utm_source=rss1.0mainlinkanon&utm_medium=feed


theregister.com/security

https://www.theregister.com/security

GoDaddy customer claims registrar transferred 27-year-old domain without any security checks

  Pagina openen
32 phone calls, 17 email chains, a 5-day ordeal, and no help during the daddy of all stuffups, claim those affected

GoDaddy is currently investigating claims that it handed complete control of a valid 27-year-old domain to another customer, without requiring them to pass any authentication processes or upload any supporting documents....

https://go.theregister.com/feed/www.theregister.com/2026/04/29/godaddy_megagaffe_wrongly_transferred_27yearold/



Don't pay Vect a ransom - your data's likely already wiped out

  Pagina openen
'Full recovery is impossible for anyone, including the attacker'

Organizations hit by the wave of Trivy and LiteLLM supply-chain compromises that paid Vect in hopes of recovering their data likely did not get much back, according to Check Point Research. That's because the ransomware Vect uses isn't actually ransomware at all, but a wiper that destroys any file larger than 128KB....

https://go.theregister.com/feed/www.theregister.com/2026/04/28/dont_pay_vect_a_ransom/



SUSE's sovereignty pitch meets an inconvenient $6 billion question

  Pagina openen
Linux vendor touts European independence at SUSECON as majority stakeholder quietly explores its options

European-based SUSE devoted much of the annual SUSECON event to its sovereignty-focused pitch - even as reports swirl that its majority stakeholder is exploring a $6 billion sale which could land the Linux vendor in American hands....

https://go.theregister.com/feed/www.theregister.com/2026/04/28/sovereignty_its_all_about_the/


CISO2CISO.com

https://ciso2ciso.com



The Critical Role of Sboms (Software Bill of Materials) In Defending Medtech From Software Supply Chain Threats – Source: www.cyberdefensemagazine.com

  Pagina openen

Source: www.cyberdefensemagazine.com – Author: News team Software supply chain attacks have emerged as a serious threat in the rapidly evolving field of cybersecurity, especially in medical devices. As these devices become more and more interconnected and dependent on complex software ecosystems, the potential for exploitation through the supply chain has grown exponentially. One powerful tool [...]

La entrada The Critical Role of Sboms (Software Bill of Materials) In Defending Medtech From Software Supply Chain Threats – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

https://ciso2ciso.com/the-critical-role-of-sboms-software-bill-of-materials-in-defending-medtech-from-software-supply-chain-threats-source-www-cyberdefensemagazine-com/


Ransomware Tactics Are Shifting. Here’s How to Keep Up – Source: www.cyberdefensemagazine.com

  Pagina openen

Source: www.cyberdefensemagazine.com – Author: News team It’s common knowledge in the cybersecurity industry that ransomware is on the rise, with median demands rising 20% year-over-year across virtually all industries. But it’s not only the ransom sums themselves that are escalating; threat actors are engaging in increasingly aggressive tactics and techniques to extort their victims. It’s [...]

La entrada Ransomware Tactics Are Shifting. Here’s How to Keep Up – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

https://ciso2ciso.com/ransomware-tactics-are-shifting-heres-how-to-keep-up-source-www-cyberdefensemagazine-com/


French Advisory Sheds Light on Apple Spyware Activity – Source: www.darkreading.com

  Pagina openen

Source: www.darkreading.com – Author: Rob Wright CERT-FR’s advisory follows last month’s disclosure of a zero-day flaw Apple said was used in “sophisticated” attacks against targeted individuals. Original Post URL: https://www.darkreading.com/vulnerabilities-threats/french-sheds-light-apple-spyware-activity Category & Tags: – Views: 12

La entrada French Advisory Sheds Light on Apple Spyware Activity – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

https://ciso2ciso.com/french-advisory-sheds-light-on-apple-spyware-activity-source-www-darkreading-com/


Hackread.com

https://www.hackread.com






Vuldb

https://vuldb.com

CVE-2026-7398 | florensiawidjaja BioinfoMCP up to 7ada7918b9e515604d3c0ae264d3a9af10bf6e54 Upload Endpoint app.py upload Name path traversal

  Pagina openen
A vulnerability classified as critical has been found in florensiawidjaja BioinfoMCP up to 7ada7918b9e515604d3c0ae264d3a9af10bf6e54. This vulnerability affects the function Upload of the file bioinfo_mcp_platform/app.py of the component Upload Endpoint. This manipulation of the argument Name causes path traversal. This vulnerability is handled as CVE-2026-7398. The attack can be initiated remotely. Additionally, an exploit exists. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The project was informed of the problem early through an issue report but has not responded yet.

https://vuldb.com/vuln/360122


CVE-2026-7397 | NousResearch hermes-agent 0.8.0 tools/file_tools.py _check_sensitive_path symlink (Issue 8734)

  Pagina openen
A vulnerability described as critical has been identified in NousResearch hermes-agent 0.8.0. This affects the function _check_sensitive_path of the file tools/file_tools.py. The manipulation results in symlink following. This vulnerability is known as CVE-2026-7397. Attacking locally is a requirement. Furthermore, an exploit is available. Upgrading the affected component is recommended.

https://vuldb.com/vuln/360121


CVE-2026-7396 | NousResearch hermes-agent 0.8.0 WeChat Work Platform Adapter wecom.py path traversal (Issue 8733)

  Pagina openen
A vulnerability marked as critical has been reported in NousResearch hermes-agent 0.8.0. Affected by this issue is some unknown functionality of the file gateway/platforms/wecom.py of the component WeChat Work Platform Adapter. The manipulation leads to path traversal. This vulnerability is traded as CVE-2026-7396. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.

https://vuldb.com/vuln/360120


CVE-2026-7394 | SourceCodester Pizzafy Ecommerce System 1.0 GET Parameter /admin/view_order.php ID sql injection

  Pagina openen
A vulnerability labeled as critical has been found in SourceCodester Pizzafy Ecommerce System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/view_order.php of the component GET Parameter Handler. Executing a manipulation of the argument ID can lead to sql injection. This vulnerability appears as CVE-2026-7394. The attack may be performed from remote. In addition, an exploit is available.

https://vuldb.com/vuln/360119


CVE-2026-7393 | SourceCodester Pizzafy Ecommerce System 1.0 File Extension admin_class_novo.php save_menu img unrestricted upload

  Pagina openen
A vulnerability identified as critical has been detected in SourceCodester Pizzafy Ecommerce System 1.0. Affected is the function save_menu of the file /admin/admin_class_novo.php of the component File Extension Handler. Performing a manipulation of the argument img results in unrestricted upload. This vulnerability is reported as CVE-2026-7393. The attack is possible to be carried out remotely. Moreover, an exploit is present.

https://vuldb.com/vuln/360118


advisories.ncsc.nl

https://advisories.ncsc.nl/

NCSC-2026-0129 [1.00] [M/H] Kwetsbaarheden verholpen in Apache Camel

  Pagina openen
Apache Software Foundation heeft kwetsbaarheden verholpen in Apache Camel. De kwetsbaarheden bevinden zich in verschillende componenten van Apache Camel. De problemen betreffen onder andere onveilige deserialisatie, onvoldoende filtering van e-mailheaders, onjuiste authenticatiepadmatching, en onjuiste verwerking van interne headers. De meest ernstige kwetsbaarheid stelt kwaadwillenden in staat om ongeauthenticeerd op afstand willekeurige code uit te voeren. De kwetsbaarheden zijn aanwezig in diverse versies van Apache Camel, met name vanaf versie 3.0.0 tot net voor de gepatchte versies 4.14.6, 4.14.7, 4.18.1, 4.18.2, 4.19.0 en 4.20.0, afhankelijk van de component. De fixes omvatten onder meer het toepassen van veilige deserialisatie, correcte filtering van headers, en verbeterde authenticatiecontroles.

https://advisories.ncsc.nl/advisory?id=NCSC-2026-0129


NCSC-2026-0128 [1.00] [M/H] Kwetsbaarheden verholpen in GitLab EE en CE

  Pagina openen
GitLab Inc. heeft meerdere kwetsbaarheden verholpen in GitLab Community Edition en Enterprise Edition, specifiek in versies variërend van 9.2 tot voor 18.11.1, inclusief diverse 18.x releases. De kwetsbaarheden betreffen verschillende componenten van GitLab, waaronder de discussions endpoint, GraphQL API, note retrieval, issue import, Mermaid sandbox, Storybook development environment, issue rendering, web interface en Virtual Registries. Geauthenticeerde gebruikers kunnen door onvoldoende resource limits of onjuiste inputvalidatie resource-exhaustie veroorzaken, wat leidt tot Denial-of-Service. Daarnaast zijn er problemen met onjuiste autorisatiecontroles waardoor project owners group fork preventie kunnen omzeilen, en met onvoldoende CSRF-bescherming waardoor ongeauthenticeerde gebruikers GraphQL mutaties kunnen uitvoeren. Verder is er een cross-site scripting (XSS) kwetsbaarheid die ongeauthenticeerde gebruikers toestaat om JavaScript code in de browser van een gebruiker uit te voeren. Ook kunnen gebruikers door onjuiste toegangscontrole de titels van vertrouwelijke issues in publieke projecten inzien en toegang krijgen tot Virtual Registries via onjuist gescopeerde credentials. Sommige kwetsbaarheden maken het mogelijk om ongeautoriseerde content te injecteren in browser sessies van andere gebruikers. De kwetsbaarheden zijn aanwezig in meerdere opeenvolgende versies en betreffen zowel Community als Enterprise edities van GitLab.

https://advisories.ncsc.nl/advisory?id=NCSC-2026-0128



NCSC-2026-0126 [1.00] [M/H] Kwetsbaarheden verholpen in Oracle E-Business Suite

  Pagina openen
Oracle heeft kwetsbaarheden verholpen in Oracle E-Business Suite. De kwetsbaarheden bevinden zich in verschillende componenten van Oracle E-Business Suite, waaronder Oracle Advanced Inbound Telephony, Oracle Enterprise Command Center Framework, Oracle Advanced Supply Chain Planning en Oracle Flow Manufacturing. Deze kwetsbaarheden kunnen worden misbruikt door ongeauthenticeerde of hooggeprivilegieerde aanvallers, wat kan leiden tot ongeautoriseerde toegang en gegevensmanipulatie.

https://advisories.ncsc.nl/advisory?id=NCSC-2026-0126



NCSC Nieuws

https://www.ncsc.nl/actueel

Kwetsbaarheid in Microsoft System Center

  Pagina openen
Er is een ernstige kwetsbaarheid gevonden in Microsoft System Center, aangeduid als CVE-2026-33825. Deze kwetsbaarheid wordt beoordeeld als hoog risico, met een CVSS-score van 7.8, en wordt actief misbruikt. Daarnaast is er een publieke exploitcode beschikbaar, waardoor het risico op grootschalige aanvallen hoog is. We adviseren daarom om meteen de updates uit te voeren.

https://www.ncsc.nl/alerts/kwetsbaarheid-in-microsoft-system-center



Anthropic’s frontiermodel Mythos vraagt om directe actie

  Pagina openen
Het Amerikaanse AI-bedrijf Anthropic kondigde onlangs het AI model Mythos aan, een model voor kwetsbaarheidsopsporing en chaining. Volgens de gepresenteerde resultaten kan Mythos kwetsbaarheden sneller opsporen en koppelen tot volledige exploits en aanvalsketens. Dit kan de verdediging versterken, maar kan ook digitale aanvallen versnellen. De boodschap van het NCSC is simpel: Wacht niet af. Verkort je reactietijden, versnel patch processen, en zorg dat basisbeveiliging op orde is.

https://www.ncsc.nl/nieuws/anthropics-frontiermodel-mythos-vraagt-om-directe-actie


Kwetsbaarheid in Adobe Acrobat DC, Acrobat Reader DC en Acrobat 2024

  Pagina openen
Er is een ernstige kwetsbaarheid, CVE-2026-34621, gevonden in Adobe Acrobat DC, Acrobat Reader DC en Acrobat 2024. Deze kwetsbaarheid wordt beoordeeld als zeer ernstig, CVSS-score van 9,6, en wordt actief misbruikt. Daarnaast is er een publieke exploitcode beschikbaar, waardoor het risico op grootschalige aanvallen hoog is. We adviseren daarom om meteen de updates uit te voeren.

https://www.ncsc.nl/alerts/kwetsbaarheid-in-adobe-acrobat-dc-acrobat-reader-dc-en-acrobat-2024



NIST Cybersecurity

https://www.nist.gov

wid.cert-bund.de

https://wid.cert-bund.de






cert.ssi.gouv.fr

https://www.cert.ssi.gouv.fr






theHackerNews

https://thehackernews.com

Critical cPanel Authentication Vulnerability Identified — Update Your Server Immediately

  Pagina openen
cPanel has released security updates to address a security issue impacting various authentication paths that could allow an attacker to obtain access to the control panel software. The problem affects all currently supported versions, according to an alert released by cPanel on Tuesday. The issue has been addressed in the following versions - 11.110.0.97 11.118.0.63 11.126.0.54 11.132.0.29

https://thehackernews.com/2026/04/critical-cpanel-authentication.html


CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV

  Pagina openen
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting ConnectWise ScreenConnect and Microsoft Windows to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerabilities are listed below - CVE-2024-1708 (CVSS score: 8.4) - A path traversal vulnerability in ConnectWise ScreenConnect

https://thehackernews.com/2026/04/cisa-adds-actively-exploited.html


LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure

  Pagina openen
In yet another instance of threat actors quickly jumping on the exploitation bandwagon, a newly disclosed critical security flaw in BerriAI's LiteLLM Python package has come under active exploitation in the wild within 36 hours of the bug becoming public knowledge. The vulnerability, tracked as CVE-2026-42208 (CVSS score: 9.3), is an SQL injection that could be exploited to modify the underlying

https://thehackernews.com/2026/04/litellm-cve-2026-42208-sql-injection.html


Researchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git Push

  Pagina openen
Cybersecurity researchers have disclosed details of a critical security vulnerability impacting GitHub.com and GitHub Enterprise Server that could allow an authenticated user to obtain remote code execution with a single "git push" command. The flaw, tracked as CVE-2026-3854 (CVSS score: 8.7), is a case of command injection that could allow an attacker with push access to a repository to achieve

https://thehackernews.com/2026/04/researchers-discover-critical-github.html


Brazilian LofyGang Resurfaces After Three Years With Minecraft LofyStealer Campaign

  Pagina openen
A cybercrime group of Brazilian origin has resurfaced after more than three years to orchestrate a campaign that targets Minecraft players with a new stealer called LofyStealer (aka GrabBot). "The malware disguises itself as a Minecraft hack called 'Slinky,'" Brazil-based cybersecurity company ZenoX said in a technical report. "It uses the official game icon to induce voluntary execution,

https://thehackernews.com/2026/04/brazilian-lofygang-resurfaces-after.html


Techrepublic

https://techrepublic.com/topic/security






BleepingComputer.com

https://www.bleepingcomputer.com/






securityboulevard.com

https://securityboulevard.com

Data Privacy Leaks – The Drip, Drip, Drip of Exposure

  Pagina openen

Beyond the "headline breach," modern enterprises face a persistent threat: steady-state data leakage. Learn why traditional privacy definitions fail and how "authorized" data flows in workplace apps create continuous legal and operational risk.

The post Data Privacy Leaks – The Drip, Drip, Drip of Exposure appeared first on Security Boulevard.

https://securityboulevard.com/2026/04/data-privacy-leaks-the-drip-drip-drip-of-exposure/



Claude Mythos Has Found 271 Zero-Days in Firefox

  Pagina openen

That’s a lot. No, it’s an extraordinary number:

Since February, the Firefox team has been working around the clock using frontier AI models to find and fix latent security vulnerabilities in the browser. We wrote previously about our collaboration with Anthropic to scan Firefox with Opus 4.6, which led to fixes for 22 security-sensitive bugs in Firefox 148.

As part of our continued collaboration with Anthropic, we had the opportunity to apply an early version of Claude Mythos Preview to Firefox. This week’s release of Firefox 150 includes fixes for 271 vulnerabilities identified during this initial evaluation...

The post Claude Mythos Has Found 271 Zero-Days in Firefox appeared first on Security Boulevard.

https://securityboulevard.com/2026/04/claude-mythos-has-found-271-zero-days-in-firefox/




CXSecurity.com

https://cxsecurity.com/






Brian Krebs

https://krebsonsecurity.com

‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty

  Pagina openen
A 24-year-old British national and senior member of the cybercrime group "Scattered Spider" has pleaded guilty to wire fraud conspiracy and aggravated identity theft. Tyler Robert Buchanan admitted his role in a series of text-message phishing attacks in the summer of 2022 that allowed the group to hack into at least a dozen major technology companies and steal tens of millions of dollars worth of cryptocurrency from investors.

https://krebsonsecurity.com/2026/04/scattered-spider-member-tylerb-pleads-guilty/


Patch Tuesday, April 2026 Edition

  Pagina openen
Microsoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-day and a publicly disclosed weakness in Windows Defender dubbed "BlueHammer." Separately, Google Chrome fixed its fourth zero-day of 2026, and an emergency update for Adobe Reader nixes an actively exploited flaw that can lead to remote code execution.

https://krebsonsecurity.com/2026/04/patch-tuesday-april-2026-edition/


Russia Hacked Routers to Steal Microsoft Office Tokens

  Pagina openen
Hackers linked to Russia's military intelligence units are using known flaws in older Internet routers to mass harvest authentication tokens from Microsoft Office users, security experts warned today. The spying campaign allowed state-backed Russian hackers to quietly siphon authentication tokens from users on more than 18,000 networks without deploying any malicious software or code.

https://krebsonsecurity.com/2026/04/russia-hacked-routers-to-steal-microsoft-office-tokens/


Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab

  Pagina openen
An elusive hacker who went by the handle "UNKN" and ran the early Russian ransomware groups GandCrab and REvil now has a name and a face. Authorities in Germany say 31-year-old Russian Daniil Maksimovich Shchukin headed both cybercrime gangs and helped carry out at least 130 acts of computer sabotage and extortion against victims across the country between 2019 and 2021.

https://krebsonsecurity.com/2026/04/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab/



Troy Hunt

https://www.troyhunt.com



Here's What Agentic AI Can Do With Have I Been Pwned's APIs

  Pagina openen

Presently sponsored by: Report URI: Guarding you from rogue JavaScript! Don’t get pwned; get real-time alerts & prevent breaches #SecureYourSite

I love cutting-edge tech, but I hate hyperbole, so I find AI to be a real paradox. Somewhere in that whole mess of overnight influencers, disinformation and ludicrous claims is some real "gold" - AI stuff that's genuinely useful and makes a meaningful difference. This blog

https://www.troyhunt.com/heres-what-agentic-ai-can-do-with-have-i-been-pwneds-apis/



Weekly Update 498

  Pagina openen

Presently sponsored by: Report URI: Guarding you from rogue JavaScript! Don’t get pwned; get real-time alerts & prevent breaches #SecureYourSite

This week, more time than I'd have liked to spend went on talking about the trials of chasing invoices. This is off the back of a customer (who, for now, will remain unnamed), who had invoices stacking back more than 6 months overdue and despite payment terms of

https://www.troyhunt.com/weekly-update-498/


Bruce Schneier

https://www.schneier.com

Claude Mythos Has Found 271 Zero-Days in Firefox

  Pagina openen

That’s a lot. No, it’s an extraordinary number:

Since February, the Firefox team has been working around the clock using frontier AI models to find and fix latent security vulnerabilities in the browser. We wrote previously about our collaboration with Anthropic to scan Firefox with Opus 4.6, which led to fixes for 22 security-sensitive bugs in Firefox 148.

As part of our continued collaboration with Anthropic, we had the opportunity to apply an early version of Claude Mythos Preview to Firefox. This week’s release of Firefox 150 includes fixes for 271 vulnerabilities identified during this initial evaluation...

https://www.schneier.com/blog/archives/2026/04/claude-mythos-has-found-271-zero-days-in-firefox.html


What Anthropic’s Mythos Means for the Future of Cybersecurity

  Pagina openen

Two weeks ago, Anthropic announced that its new model, Claude Mythos Preview, can autonomously find and weaponize software vulnerabilities, turning them into working exploits without expert guidance. These were vulnerabilities in key software like operating systems and internet infrastructure that thousands of software developers working on those systems failed to find. This capability will have major security implications, compromising the devices and services we use every day. As a result, Anthropic is not releasing the model to the general public, but instead to a ...

https://www.schneier.com/blog/archives/2026/04/what-anthropics-mythos-means-for-the-future-of-cybersecurity.html



Friday Squid Blogging: How Squid Survived Extinction Events

  Pagina openen

Science news:

Scientists have finally cracked a long-standing mystery about squid and cuttlefish evolution by analyzing newly sequenced genomes alongside global datasets. The research reveals that these bizarre, intelligent creatures likely originated deep in the ocean over 100 million years ago, surviving mass extinction events by retreating into oxygen-rich deep-sea refuges. For millions of years, their evolution barely changed—until a dramatic post-extinction boom sparked rapid diversification as they moved into new shallow-water habitats. ...

https://www.schneier.com/blog/archives/2026/04/friday-squid-blogging-how-squid-survived-extinction-events.html


Hiding Bluetooth Trackers in Mail

  Pagina openen

It was used to track a Dutch naval ship:

Dutch journalist Just Vervaart, working for regional media network Omroep Gelderland, followed the directions posted on the Dutch government website and mailed a postcard with a hidden tracker inside. Because of this, they were able to track the ship for about a day, watching it sail from Heraklion, Crete, before it turned towards Cyprus. While it only showed the location of that one vessel, knowing that it was part of a carrier strike group sailing in the Mediterranean could potentially put the entire fleet at risk...

https://www.schneier.com/blog/archives/2026/04/hiding-bluetooth-trackers-in-mail.html


Security Affairs

https://securityaffairs.co

U.S. CISA adds Microsoft Windows Shell and ConnectWise ScreenConnect flaws to its Known Exploited Vulnerabilities catalog

  Pagina openen
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Windows Shell and ConnectWise ScreenConnect flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Windows Shell and ConnectWise ScreenConnect flaws to its Known Exploited Vulnerabilities (KEV) catalog. Below are the flaws added to the catalog: CVE-2024-02-21 is a path traversal vulnerability [...]

https://securityaffairs.com/191442/security/u-s-cisa-adds-microsoft-windows-shell-and-connectwise-screenconnect-flaws-to-its-known-exploited-vulnerabilities-catalog.html


ShinyHunters exploit Anodot incident to target Vimeo

  Pagina openen
The video platform Vimeo confirmed a security breach via Anodot that exposed metadata, video titles, and some user emails. Vimeo said some user data was accessed after a breach at Anodot. Anodot is a company that provides AI-driven data analytics and anomaly detection tools. Most of the exposed information includes technical data, video titles, and [...]

https://securityaffairs.com/191448/security/shinyhunters-exploit-anodot-incident-to-target-vimeo.html


CVE-2026-3854 GitHub flaw enables remote code execution

  Pagina openen
Critical GitHub flaw CVE-2026-3854 lets attackers run code with a single git push, exploiting a command injection bug. Researchers found a critical vulnerability in GitHub, tracked as CVE-2026-3854, that allows remote code execution through a simple git push. The vulnerability affects GitHub Enterprise Cloud, GitHub Enterprise Cloud with Data Residency, GitHub Enterprise Cloud with Enterprise [...]

https://securityaffairs.com/191434/security/cve-2026-3854-github-flaw-enables-remote-code-execution.html


Signal Phishing Campaign Targets German Officials in Suspected Russian Operation

  Pagina openen
Suspected Russian phishing via Signal targeted German officials, exploiting trust to access accounts and sensitive political communications. A new wave of cyber operations targeting European political leadership is once again highlighting how modern espionage increasingly relies on deception rather than technical exploits. Recent investigations by German authorities point to a large-scale phishing campaign conducted via [...]

https://securityaffairs.com/191425/intelligence/signal-phishing-campaign-targets-german-officials-in-suspected-russian-operation.html


Microsoft fixes Entra ID flaw enabling privilege escalation

  Pagina openen
Microsoft fixed a Microsoft Entra ID flaw where the Agent ID Administrator role could enable privilege escalation and account takeover. Microsoft addressed a flaw in Microsoft Entra ID that could let attackers take over service accounts. The issue involved the Agent ID Administrator role, which manages AI agent identities and access, and could be abused [...]

https://securityaffairs.com/191414/security/microsoft-fixes-entra-id-flaw-enabling-privilege-escalation.html


news.sophos.com

https://news.sophos.com