RADAR / 보안/개인정보 레이더

보안/개인정보 레이더

A fast, reusable HTML report for lightweight Radar projects: entity distribution, article velocity, and source mix, alongside a clean reading list.

articles200 entities9 errors24 Generated at2026-04-04 01:49 UTC

Visuals

Chart.js dark editorial responsive

Entity Distribution

Top entities by frequency

Article Timeline

Daily volume inferred from article dates

Source Distribution

Share of articles by source

Data Freshness

Collection lag distribution

Entity Extraction Rate

Percentage with matched entities

Source Health

Article count by source (sorted)

">

엔티티 히트맵 (Top 15 × 14일)

Entities

clickable pills top 24 shown
SecurityGeneral 148 Threat 57 Vulnerability 27 DataBreach 21 ConsumerTrust 19 Privacy 16 Malware 14 Compliance 10 CorporateTrust 10

Articles

cards source + date fast scan

Reading List

Click through to the original source

KISA 한국인터넷진흥원>

바로가기 메뉴 컨텐츠 바로가기 주메뉴 바로가기 하단정보 바로가기 페이지에서 오류가 발생했습니다. 일시적인 오류일 경우 잠시 후에 다시 시도해 주시기 바랍니다. 만약 문제가 계속 발생되면 사이트관리자에게 연락해 주시기 바랍니다. (3초 후 자동으로 메인 페이지로 이동합니다.) 이전페이지로 홈으로

source KISA 보안공지 date 2026-04-04

Anthropic is having a moment in the private markets; SpaceX could spoil the party

Glen Anderson, president of Rainmaker Securities, says the secondary market for private shares has never been more active — with Anthropic the hottest trade around, OpenAI losing ground, and SpaceX's looming IPO poised t...

source TechCrunch date 2026-04-03

Lucid blames dip in Q1 sales on seat supplier issue

Lucid said it has resolved the problem and is not changing its guidance for 2026.

source TechCrunch date 2026-04-03

Anthropic essentially bans OpenClaw from Claude by making subscribers pay extra

Using OpenClaw with Claude AI is about to get a lot more expensive, thanks to Anthropic's new policy changes. Beginning April 4th at 3PM ET, users will "no longer be able to use your Claude subscription limits for third-...

source The Verge date 2026-04-03 entities 1

The anonymous social app that thinks it can work in Saudi Arabia

When Fizz quietly debuted in Saudi Arabia, founder and CEO Teddy Solomon wasn’t expecting the app to catch on like it did.

source TechCrunch date 2026-04-03

Friday Squid Blogging: Jurassic Fish Chokes on Squid

Here’s a fossil of a 150-million year old fish that choked to death on a belemnite rostrum : the hard, internal shell of an extinct, squid-like animal. Original paper . As usual, you can also use this squid post to talk ...

source Schneier on Security date 2026-04-03 entities 2

Inconsistent Privacy Labels Don't Tell Users What They Are Getting

Data privacy labels are a great idea for mobile apps, but the current versions just aren't good enough.

source Dark Reading date 2026-04-03 entities 2

NASA did eventually solve Artemis II’s Outlook glitch

On Thursday, during Artemis II's journey to the Moon, commander Reid Wiseman ran into a tech issue some of us back on Earth can relate to: Microsoft Outlook wasn't working. In a conversation captured in NASA's Artemis li...

source The Verge date 2026-04-03

Tesla’s Texas factory workforce reportedly shrunk 22% in 2025

Tesla's headcount fell from 21,191 workers to 16,506 workers in 2025, according to a report, as it grappled with its second straight year of declining sales.

source TechCrunch date 2026-04-03

LinkedIn secretely scans for 6,000+ Chrome extensions, collects data

A new report dubbed "BrowserGate" warns that Microsoft's LinkedIn is using hidden JavaScript scripts on its website to scan visitors' browsers for installed extensions and collect device data. [...]

source Bleeping Computer date 2026-04-03

OpenAI executive shuffle includes new role for COO Brad Lightcap to lead ‘special projects’

In addition to Lightcap's new role, OpenAI CMO Kate Rouch will be stepping away from the company to focus on cancer recovery, with a plan to return when her health allows.

source TechCrunch date 2026-04-03

Anthropic buys biotech startup Coefficient Bio in $400M deal: Reports

Anthropic has purchased the stealth biotech AI startup Coefficient Bio in a $400 million stock deal, according to The Information and Eric Newcomer.

source TechCrunch date 2026-04-03

OpenAI’s AGI boss is taking a leave of absence

OpenAI is undergoing another round of C-suite changes, according to an internal memo viewed by The Verge. Fidji Simo, OpenAI's CEO of AGI deployment - who was until recently the company's CEO of applications - says in th...

source The Verge date 2026-04-03

Anthropic ramps up its political activities with a new PAC

With the midterms right around the corner, the new group is positioned to back candidates who support the AI company's policy agenda.

source TechCrunch date 2026-04-03 entities 1

Best iPad apps to boost productivity and make your life easier

There are many iPad apps to help you organize recipes, sync tasks across devices, be more productive, and manage your notes.

source TechCrunch date 2026-04-03

AI companies are building huge natural gas plants to power data centers. What could go wrong?

Meta, Microsoft, and Google are all betting big on new natural gas power plants to run their AI data centers. They may regret it.

source TechCrunch date 2026-04-03

People would rather have an Amazon warehouse in their backyard than a data center

A new poll shows that the debate over data centers is far from settled.

source TechCrunch date 2026-04-03

Lenovo Legion Go 2 suddenly costs $650 more as RAMageddon lays waste to gaming hardware

Remember when we thought the Legion Go 2 was expensive at $1,099 and up? Those were the days - Best Buy is now listing Lenovo's handheld for $1,499 with a Ryzen Z2 or $1,999 with a Z2 Extreme. The latter originally cost ...

source The Verge date 2026-04-03

Hims & Hers warns of data breach after Zendesk support ticket breach

Telehealth giant Hims & Hers Health is warning that it suffered a data breach after support tickets were stolen from a third-party customer service platform. [...]

source Bleeping Computer date 2026-04-03 entities 3

China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

A China-aligned threat actor has set its sights on European government and diplomatic organizations since mid-2025, following a two-year period of minimal targeting in the region. The campaign has been attributed to TA41...

source The Hacker News date 2026-04-03 entities 2

The best iPad deals you can get right now

While the best iPad deals usually land during major sale events like Black Friday, many great iPad deals are available outside of those moments. The day-to-day discounts come and go like the changing winds, so there’s of...

source The Verge date 2026-04-03

Apple Breaks Precedent, Patches DarkSword for iOS 18

Even organizations with users unwilling or unable to adopt iOS 26 can now protect themselves from a severe mobile OS-cracking tool.

source Dark Reading date 2026-04-03

The final days of the Tesla Model X and S are here. All bets are on the Cybercab.

It's a new era for Tesla — and one that will rely on its ability to launch the Cybercab and mass-produce the Optimus robot.

source TechCrunch date 2026-04-03

Die Linke German political party confirms data stolen by Qilin ransomware

The Qilin ransomware group has claimed responsibility for an attack against Die Linke ('The Left'), forcing an IT systems outage at the political party, and threatening sensitive data leak. [...]

source Bleeping Computer date 2026-04-03 entities 3

Europe’s cyber agency blames hacking gangs for massive data breach and leak

CERT-EU blamed the cybercrime group TeamPCP for the recent hack on the European Commission, and said the notorious ShinyHunters gang was responsible for leaking the stolen data online.

source TechCrunch date 2026-04-03 entities 3

Mercedes adds steer-by-wire — and a dang steering yoke — to the EQS

Steer-by-wire, in which a car can be steered electronically rather than through a physical connection between the steering wheel and steering rack, is coming to Mercedes-Benz. The German automaker says it will use the st...

source The Verge date 2026-04-03

Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers

Threat actors are increasingly using HTTP cookies as a control channel for PHP-based web shells on Linux servers and to achieve remote code execution, according to findings from the Microsoft Defender Security Research T...

source The Hacker News date 2026-04-03 entities 3

Blast Radius of TeamPCP Attacks Expands Amid Hacker Infighting

As organizations disclose breaches tied to TeamPCP's supply chain attacks, ShinyHunters and Lapsus$ are getting involved, taking credit, and creating a murky situation for enterprises.

source Dark Reading date 2026-04-03 entities 1

Anker’s small, five-port travel adapter is down to its best price yet

Few things kill the vibe of your relaxing spring break abroad faster than realizing you forgot a way to keep things charged. Anker’s Nano Travel Adapter makes it easy to charge your phone, camera, e-readers, and other de...

source The Verge date 2026-04-03

I saved a doomed Windows laptop by embracing Linux

Two weeks ago I set aside my M4 MacBook Air and picked up a nine-year-old ThinkPad. It's one of an estimated 200 to 400 million Windows 10 PCs that don't meet Microsoft's requirements for Windows 11. When Microsoft offic...

source The Verge date 2026-04-03

Evolution of Ransomware: Multi-Extortion Ransomware Attacks

Multi-extortion ransomware relies on stolen data to pressure victims with public leaks. Penta Security explains how its D.AMO platform keeps exfiltrated files encrypted and useless to attackers. [...]

source Bleeping Computer date 2026-04-03 entities 2

The Facebook insider building content moderation for the AI era

Moonbounce has raised $12 million to grow its AI control engine that converts content moderation policies into consistent, predictable AI behavior.

source TechCrunch date 2026-04-03

Waiting for Trump Phone

Where's the Trump phone? We're going to keep talking about it every week. We've reached out, as usual, to ask about the Trump phone's whereabouts. Crickets. Despite recent signs of life, another week has come and gone wi...

source The Verge date 2026-04-03

How the Apple Watch defined modern health tech

This is Optimizer, a weekly newsletter sent every Friday from Verge senior reviewer Victoria Song that dissects and discusses the latest gizmos and potions that swear they're going to change your life. Opt in for Optimiz...

source The Verge date 2026-04-03

Picking Up 'Skull Vibrations'? Could Be XR Headset Authentication

"Skull vibration harmonics generated by vital signs" can be used to sign in to VR, AR, and MR headsets, according to emerging research.

source Dark Reading date 2026-04-03 entities 1

TeamPCP Supply Chain Campaign: Update 006 - CERT-EU Confirms European Commission Cloud Breach, Sportradar Details Emerge, and Mandiant Quantifies Campaign at 1,000+ SaaS Environments, (Fri, Apr 3rd)

This is the sixth update to the TeamPCP supply chain campaign threat intelligence report,&#;x26;#;xc2;&#;x26;#;xa0; "When the Security Scanner Became the Weapon" &#;x26;#;xc2;&#;x26;#;xa0;(v3.0, March 25, 2026).&#;x26;#;...

source SANS Internet Storm Center date 2026-04-03 entities 4

Claude Source Code Leak Highlights Big Supply Chain Missteps

Or, why the software supply chain should be treated as critical infrastructure with guardrails built in at every layer.

source Dark Reading date 2026-04-03

Cisco IMC auth bypass vulnerability allows attackers to alter user passwords (CVE-2026-20093)

Cisco has fixed ten vulnerabilities affecting its Integrated Management Controller (IMC), the most critical of which (CVE-2026-20093) could allow an unauthenticated, remote attacker to bypass authentication and gain acce...

source Help Net Security date 2026-04-03 entities 3

Chainguard Unveils Factory 2.0 to Automate Hardening the Software Supply Chain

The rebuilt Chainguard platform adds deeper security designed to continuously reconcile open source artifacts across containers, libraries, agent skills, and GitHub Actions.

source Dark Reading date 2026-04-03 entities 1

CrowdStrike Next-Gen SIEM Can Now Ingest Microsoft Defender Telemetry

Once CrowdStrike's nemesis, Microsoft is now a collaborator. A shared interest in Formula 1 helped thaw the years-long fierce rivalry.

source Dark Reading date 2026-04-03

Windows Security app gets Secure Boot certificate status indicators as 2026 expiration approaches

Microsoft’s Secure Boot certificates, issued in 2011, are approaching expiration in 2026. To help IT administrators track whether devices have received replacement certificates, Microsoft has added new status indicators ...

source Help Net Security date 2026-04-03 entities 2

Microsoft still working to fix Exchange Online mailbox access issues

Microsoft is investigating and working to resolve Exchange Online mailbox access issues that have intermittently affected Outlook mobile and macOS users for weeks. [...]

source Bleeping Computer date 2026-04-03

Company that Secretly Records and Publishes Zoom Meetings

WebinarTV searches the internet for public Zoom invites, joins the meetings, secretly records them, and publishes (alternate link ) the recordings. It doesn’t use the Zoom record feature, so Zoom can’t do anything about ...

source Schneier on Security date 2026-04-03

UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack

The maintainer of the Axios npm package has confirmed that the supply chain compromise was the result of a highly-targeted social engineering campaign orchestrated by North Korean threat actors tracked as UNC1069. Mainta...

source The Hacker News date 2026-04-03 entities 2

Why Third-Party Risk Is the Biggest Gap in Your Clients' Security Posture

The next major breach hitting your clients probably won't come from inside their walls. It'll come through a vendor they trust, a SaaS tool their finance team signed up for, or a subcontractor nobody in IT knows about. T...

source The Hacker News date 2026-04-03 entities 4

Claude Code source leak exploited to spread malware

A source code leak involving Anthropic’s Claude Code tool quickly escalated into a cybersecurity threat, as attackers seized on the exposed files to lure developers into downloading malware disguised as “unlocked” versio...

source Help Net Security date 2026-04-03 entities 4

| 개인정보보호위원회

주메뉴 바로가기 본문 바로가기 이 누리집은 개인정보보호위원회 누리집입니다. 네이버블로그 페이스북 인스타그램 유튜브 화면 확대 화면 축소 확대수치 글자크기 100% 언어 KOR ENG 개인정보 보호위원회 통합검색 검색 위원회 소식 정책 · 법령 국정과제 심의 · 의결 정보공개 국민참여 기업참여 위원회 소개 누리집안내 인쇄 공유 전체 1182 건 · 현재페이지 1/119 검색 검색 카테...

source PIPC 개인정보보호위원회 date 2026-04-03 entities 3

New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images

Cybersecurity researchers have discovered a new version of the SparkCat malware on the Apple App Store and Google Play Store, more than a year after the trojan was discovered targeting both the mobile operating systems. ...

source The Hacker News date 2026-04-03 entities 2

Man admits to locking thousands of Windows devices in extortion plot

A former core infrastructure engineer has pleaded guilty to locking Windows admins out of 254 servers as part of a failed extortion plot targeting his employer, an industrial company headquartered in Somerset County, New...

source Bleeping Computer date 2026-04-03

Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK

Solana-based decentralized exchange Drift has confirmed that attackers drained about $285 million from the platform during a security incident that took place on April 1, 2026. "Earlier today, a malicious actor gained un...

source The Hacker News date 2026-04-02 entities 2

New Phishing Platform Used in Credential Theft Campaigns Against C-Suite Execs

A large-scale credential theft campaign targeting senior executives has been linked to a previously unknown automated phishing platform called Venom

source Infosecurity Magazine date 2026-04-02 entities 2

Microsoft now force upgrades unmanaged Windows 11 24H2 PCs

Starting this week, Microsoft has begun force-upgrading unmanaged devices running Windows 11 24H2 Home and Pro editions to Windows 11 25H2. [...]

source Bleeping Computer date 2026-04-02

APERION releases SmartFlow SDK for secure, on-prem AI governance without cloud reliance

APERION launched SmartFlow SDK, providing a secure, on-premises path for enterprises migrating away from compromised cloud-based AI gateways. The launch coincides with a 200% increase in web traffic since the March 24 Li...

source Help Net Security date 2026-04-02 entities 3

Trivy supply chain attack enabled European Commission cloud breach

CERT-EU confirmed that ShinyHunters are behind the recent breach of the cloud infrastructure underpinning websites of the European Commission, and that they stole and subsequently leaked approximately 340 GB of data. “An...

source Help Net Security date 2026-04-02 entities 4

CERT-EU: European Commission hack exposes data of 30 EU entities

The European Union's Cybersecurity Service (CERT-EU) has attributed the European Commission cloud hack to the TeamPCP threat group, saying the resulting breach exposed the data of at least 29 other Union entities. [...]

source Bleeping Computer date 2026-04-02 entities 3

Microsoft releases open-source toolkit to govern autonomous AI agents

AI agents can book travel, execute financial transactions, write and run code, and manage infrastructure without human intervention at each step. Frameworks like LangChain, AutoGen, CrewAI, and Azure AI Foundry Agent Ser...

source Help Net Security date 2026-04-02 entities 1

Which messaging app takes the most limited approach to permissions on Android?

Messaging apps handle sensitive conversations, contacts, and media, and their behavior on a device varies in ways that affect privacy. An analysis of Android versions of Messenger, Signal, and Telegram shows that differe...

source Help Net Security date 2026-04-02 entities 3

Click, wait, repeat: Digital trust erodes one login at a time

Sign-up forms that drag on, login steps that repeat, and access requests that take longer than expected have become a normal part of using digital services. These moments rarely stand out on their own, and over time they...

source Help Net Security date 2026-04-02 entities 2

New infosec products of the month: March 2026

Here’s a look at the most interesting products from the past month, featuring releases from Beazley, Bonfy.AI, Mend.io, Mimecast, NinjaOne, Novee, Intel 471, Singulr AI, Stellar Cyber, Teleport, and Vicarius. Beazley Exp...

source Help Net Security date 2026-04-02 entities 1

ISC Stormcast For Friday, April 3rd, 2026 https://isc.sans.edu/podcastdetail/9878, (Fri, Apr 3rd)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

source SANS Internet Storm Center date 2026-04-02

Amazon hits sellers with ‘fuel surcharge’ as Iran war roils global energy markets

The e-commerce giant called the surcharge "temporary" but couldn't give a date for when the policy would be retired.

source TechCrunch date 2026-04-02 entities 1

AWS, Wasabi, Cloudflare, and Backblaze go head-to-head in new cloud storage test

Cloud storage buyers rarely get vendor-provided performance data that includes the vendor’s own weak spots. Backblaze’s Q1 2026 Performance Stats report, attempts to do exactly that, sharing benchmark results for Backbla...

source Help Net Security date 2026-04-02 entities 1

AO3 is finally out of beta after 17 years

Archive of Our Own (AO3) is officially exiting beta. The Organization for Transformative Works - the nonprofit behind the fanfiction site - announced the update on Thursday, which comes 17 years after AO3's launch in 200...

source The Verge date 2026-04-02

PSA: Anyone with a link can view your Granola notes by default

If you use the AI-powered note-taking app Granola, you might want to double-check your privacy settings. Though Granola says your notes are "private by default," it makes them viewable to anyone with a link, and also use...

source The Verge date 2026-04-02 entities 2

Reddit is moving on from r/all

Reddit is deprecating r/all, one of its feeds that shows popular posts on the platform, as part of "ongoing efforts to simplify Reddit and improve Home feed personalization." Reddit has offered both r/popular and r/all a...

source The Verge date 2026-04-02

Telehealth giant Hims & Hers says its customer support system was hacked

The U.S. telehealth giant says hackers stole customer support ticket data over the course of several days in February.

source TechCrunch date 2026-04-02 entities 2

The best AirPods deals you can get right now

If you know where to look, you can often score deals on Apple’s ever-expanding AirPods lineup. Both the AirPods Pro 3 and the AirPods 4 (with and without ANC) now consistently receive discounts, as do the AirPods Pro 3. ...

source The Verge date 2026-04-02

Geopolitics, AI, and Cybersecurity: Insights From RSAC 2026

AI-driven threats, global leadership shifts, and the future of cybersecurity in a rapidly evolving landscape were among the discussions at RSAC 2026 Conference.

source Dark Reading date 2026-04-02 entities 1

Claude Code leak used to push infostealer malware on GitHub

Threat actors are exploiting the recent Claude Code source code leak by using fake GitHub repositories to deliver Vidar information-stealing malware. [...]

source Bleeping Computer date 2026-04-02 entities 3

Not Toying Around: Hasbro Attack May Take 'Weeks' to Remediate

The company's 8-K filing notes "unauthorized access" and that it has activated business continuity plans and taken some systems offline.

source Dark Reading date 2026-04-02 entities 1

Artemis II is NASA’s last moon mission without Silicon Valley

Next time around, the pressure will be on SpaceX and Blue Origin.

source TechCrunch date 2026-04-02

This bike rack pioneer is selling Bluetooth suction cups to stick bikes to your car

Richard Allen didn't invent the automobile bike rack - his 1967 patent application makes it clear that others came before. But after nearly sixty years selling popular and simple mechanical bike carriers, his company All...

source The Verge date 2026-04-02

The ABS Challenge System is exposing the worst umpire in baseball

During Wednesday's game between the Tampa Bay Rays and the Milwaukee Brewers, umpire CB Bucknor took a foul ball to the mask and had to be helped off the field. It was the cap to what has been a particularly bad week for...

source The Verge date 2026-04-02

Gateway Capital announces first close of $25M Fund II

Gateway Capital, the Milwaukee-based venture firm founded by Dana Guthrie, can now begin investment operations for its $25M Fund II.

source TechCrunch date 2026-04-02

Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials

A large-scale credential harvesting operation has been observed exploiting the React2Shell vulnerability as an initial infection vector to steal database credentials, SSH private keys, Amazon Web Services (AWS) secrets, ...

source The Hacker News date 2026-04-02 entities 4

Pinterest said he violated laid-off colleagues’ privacy. Now he’s going public

It was late January, and Pinterest engineer Teddy Martin was on edge about recent layoffs at the company. Martin had just survived a round of cuts, but he and other employees were confused about who was being let go and ...

source The Verge date 2026-04-02 entities 3

OpenAI acquires TBPN, the buzzy founder-led business talk show

TBPN, Silicon Valley's cult-favorite tech podcast, will operate independently, even as it's overseen by chief political operative Chris Lehane.

source TechCrunch date 2026-04-02

Flipboard’s new ‘social websites’ help publishers and creators tap into the open social web

Flipboard's social websites consolidate profiles and posts from Bluesky, Mastodon, Threads, YouTube, podcasts, blogs, and RSS feeds into a single, shared destination.

source TechCrunch date 2026-04-02

Security Bosses Are All-In on AI. Here's Why

CISOs are bullish on AI and have big plans to roll out future tools. We talk to Reddit CISO Frederick Lee and leading analyst Dave Gruber about how AI is working out in the real world, as well as its future promise.

source Dark Reading date 2026-04-02 entities 1

Trump fires US attorney general Pam Bondi

Taking a break from calling Bruce Springsteen a boring loser on Thursday, Donald Trump followed that up with another Truth Social post saying "loyal friend" Pam Bondi will transition to a yet-to-be-announced job in the p...

source The Verge date 2026-04-02

Drift loses $280 million as hackers seize Security Council powers

The Drift Protocol lost at least $280 million after a threat actor took control of its Security Council administrative powers in a planned, sophisticated operation. [...]

source Bleeping Computer date 2026-04-02 entities 2

Drift loses $280 million as North Korean hackers seize Security Council powers

The Drift Protocol lost at least $280 million after a threat actor took control of its Security Council administrative powers in a planned, sophisticated operation. [...]

source Bleeping Computer date 2026-04-02 entities 2

ElevenLabs releases a new AI-powered music-generation app

ElevenMusic lets users create and remix songs using text prompts. The new app suggests ElevenLabs wants to be more than just a voice model company.

source TechCrunch date 2026-04-02

Five questions for the guys who made a compass that points to the Times Square Olive Garden

Here's a question almost nobody is asking: how do you get to the Times Square Olive Garden? Well, these beautiful weirdos are answering it - the team that made the Times Square Olive Garden compass. If that's not clear e...

source The Verge date 2026-04-02

NASA astronauts prove that sending an email really is rocket science

NASA Artemis II commander Reid Wiseman faced the most earthly possible conflict while in outer space: his Outlook wasn't working.

source TechCrunch date 2026-04-02

Elon Musk is about to be a very busy boy!

To be honest, I thought Elon Musk would confidentially file for SpaceX's IPO on the 20th of this month, rather than the 1st. But maybe that just means he's moved on to other numbers, and we should all mark our calendars ...

source The Verge date 2026-04-02

US Bans All Foreign-Made Consumer Routers

This is for new routers ; you don’t have to throw away your existing ones: The Executive Branch determination noted that foreign-produced routers (1) introduce “a supply chain vulnerability that could disrupt the U.S. ec...

source Schneier on Security date 2026-04-02 entities 3

Microsoft takes on AI rivals with three new foundational models

MAI released models that can transcribe voice into text as well as generate audio and images after the group's formation six months ago.

source TechCrunch date 2026-04-02

Money transfer app Duc exposed thousands of driver’s licenses and passports to the open web

An exposed Amazon-hosted server allowed anyone to access reams of customer data without needing a password.

source TechCrunch date 2026-04-02 entities 2

Google now lets you direct avatars through prompts in its Vids app

Google is adding a way to customize and instruct avatars for video creation in the Vids app.

source TechCrunch date 2026-04-02

RSAC 2026: AI Dominates, But Community Remains Key to Security

As AI took center stage at this year's conference, experts debated automation, oversight and the evolving role of human intelligence in cybersecurity — despite the US government's notable absence.

source Dark Reading date 2026-04-02 entities 1

ICE says it bought Paragon’s spyware to use in drug trafficking cases

The acting director of U.S. Immigration and Customs Enforcement told lawmakers that the use of Paragon spyware is necessary to counter terrorists’ “thriving exploitation of encrypted communications platforms.”

source TechCrunch date 2026-04-02 entities 2

Residential proxies evaded IP reputation checks in 78% of 4B sessions

Researchers warn that residential proxies used to route malicious traffic are a big problem for IP reputation systems, as there is no clear distinction between attackers and legitimate users. [...]

source Bleeping Computer date 2026-04-02 entities 1

Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise

Cisco has released updates to address a critical security flaw in the Integrated Management Controller (IMC) that, if successfully exploited, could allow an unauthenticated, remote attacker to bypass authentication and g...

source The Hacker News date 2026-04-02 entities 2

Software supply chain hacks trigger wave of intrusions, data theft

After linking the Axios npm supply chain attack to North Korean hackers, Google researchers warned that “hundreds of thousands of stolen secrets could potentially be circulating” as a result of this and the Trivy, KICS, ...

source Help Net Security date 2026-04-02 entities 4

New 'Storm' Infostealer Remotely Decrypts Stolen Credentials

This modern infostealer adopted server-side decryption of stolen credentials to bypass security controls

source Infosecurity Magazine date 2026-04-02 entities 1

Attempts to Exploit Exposed "Vite" Installs (CVE-2025-30208), (Thu, Apr 2nd)

From its GitHub repo: "Vite (French word for "quick", pronounced /vi?t/, like "veet") is a new breed of frontend build tooling that significantly improves the frontend development experience" [ https://github.com/vitejs/...

source SANS Internet Storm Center date 2026-04-02 entities 2

OpenSSH 10.3 patches five security bugs and drops legacy rekeying support

OpenSSH 10.3 shipped carrying five security fixes alongside feature additions and a set of behavior changes that will break compatibility with older SSH implementations that do not support rekeying. Rekeying compatibilit...

source Help Net Security date 2026-04-02 entities 1

United’s mobile app now shows TSA wait times at select airports

The TSA wait times feature is one of many new additions to the United app, including automatic rebooking assistance and real-time time weather radar maps.

source TechCrunch date 2026-04-02

Tesla’s cheaper vehicles aren’t helping its declining sales

The company's deliveries in the first quarter were just 6% higher than last year, and Tesla now faces a third straight year of falling sales.

source TechCrunch date 2026-04-02

Commonwealth Fusion Systems leans on magnets for near-term revenue

Realta Fusion is buying magnets from Commonwealth Fusion Systems, providing a revenue stopgap.

source TechCrunch date 2026-04-02

NCSC Issues Security Alert Over Hackers Targeting WhatsApp and Signal Accounts

The UK’s cybersecurity agency offered advice to “high-risk’ individuals” on how to protect against social engineering and cyber-attacks

source Infosecurity Magazine date 2026-04-02 entities 2

Adversaries Exploit Vacant Homes to Intercept Mail in Hybrid Cybercrime

Threat actors are exploiting vacant homes as "drop addresses" to intercept mail and enable fraud. Flare shows how postal services and fake identities are abused to turn mail into a fraud vector. [...]

source Bleeping Computer date 2026-04-02 entities 4

Diverse teams start with diverse VCs

It is the path of least resistance for a growth-stage company to hire from the familiar Silicon Valley pipelines but if a founder wants a diverse team, that value has to be put into practice from the very first hire.

source TechCrunch date 2026-04-02

New Progress ShareFile flaws can be chained in pre-auth RCE attacks

Two vulnerabilities in Progress ShareFile, an enterprise-grade secure file transfer solution, can be chained to enable unauthenticated file exfiltration from affected environments. [...]

source Bleeping Computer date 2026-04-02

Apple Expands iOS 18 Security Updates Amid DarkSword Threat

iOS/iPadOS 18.7.7 updates expanded to protect older devices from DarkSword web exploit kit

source Infosecurity Magazine date 2026-04-02 entities 3

Medtech giant Stryker fully operational after data-wiping attack

Stryker Corporation, one of the world's leading medical technology companies, says it's fully operational three weeks after many of its systems were wiped out in a cyberattack claimed by the Iranian-linked Handala hackti...

source Bleeping Computer date 2026-04-02 entities 1

New Red Hat subscription simplifies long-term enterprise Linux support

Red Hat has announced Red Hat Enterprise Linux Extended Life Cycle Premium, a new subscription that provides a predictable 14-year life cycle for major Red Hat Enterprise Linux releases. This stand-alone subscription con...

source Help Net Security date 2026-04-02 entities 1

GitHub Used as Covert Channel in Multi-Stage Malware Campaign

LNK files use GitHub C2, embedded decoders and PowerShell for persistence and data exfiltration

source Infosecurity Magazine date 2026-04-02 entities 2

Researchers Observe Sub-One-Hour Ransomware Attacks

Halcyon says Akira is now capable of carrying out an entire ransomware attack in less than an hour

source Infosecurity Magazine date 2026-04-02 entities 3

Bank Trojan 'Casbaneiro' Worms Through Latin America

Augmented Marauder's multipronged banking-Trojan cyber campaigns are targeting Spanish speakers, evading detection, and replicating rapidly.

source Dark Reading date 2026-04-02 entities 1

Beehiiv expands into podcasting, taking aim at Patreon

One way Beehiiv is convincing creators to switch from rivals like Substack and Patreon is by not taking a cut of revenue.

source TechCrunch date 2026-04-02

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

The latest ThreatsDay Bulletin is basically a cheat sheet for everything breaking on the internet right now. No corporate fluff or boring lectures here, just a quick and honest look at the messy reality of keeping system...

source The Hacker News date 2026-04-02

Cash App launches ‘pay later’ feature for P2P transfers

Block says that the new feature has strong built-in protections to keep users from so-called debt spirals.

source TechCrunch date 2026-04-02

Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners

A financially motivated operation codenamed REF1695 has been observed leveraging fake installers to deploy remote access trojans (RATs) and cryptocurrency miners since November 2023. "Beyond cryptomining, the threat acto...

source The Hacker News date 2026-04-02 entities 3

The State of Trusted Open Source Report

In December 2025, we shared the first-ever The State of Trusted Open Source report, featuring insights from our product data and customer base on open source consumption across our catalog of container image projects, ve...

source The Hacker News date 2026-04-02 entities 1

DarkSword exploit forces Apple to loosen its patching policy

Apple has extended security updates to a wider range of devices still running iOS 18, aiming to protect users from the DarkSword exploit kit. This is not the first time Apple has backported fixes for older devices based ...

source Help Net Security date 2026-04-02 entities 3

Critical Cisco IMC auth bypass gives attackers Admin access

Cisco has patched several critical and high-severity vulnerabilities, including an Integrated Management Controller (IMC) authentication bypass that enables attackers to gain Admin access. [...]

source Bleeping Computer date 2026-04-02 entities 1

Possible US Government iPhone Hacking Tool Leaked

Wired writes (alternate source ): Security researchers at Google on Tuesday released a report describing what they’re calling “Coruna,” a highly sophisticated iPhone hacking toolkit that includes five complete hacking te...

source Schneier on Security date 2026-04-02 entities 4

WhatsApp Alerts 200 Users After Fake iOS App Installed Spyware; Italian Firm Faces Action

Meta-owned messaging platform WhatsApp said it alerted about 200 users who were tricked into installing a bogus version of its iOS app that was infected with spyware. According to reports from Italian newspaper La Repubb...

source The Hacker News date 2026-04-02 entities 2

Microsoft links Classic Outlook issue to email delivery problems

Microsoft is investigating a known issue that prevents some Classic Outlook users from sending emails via Outlook.com. [...]

source Bleeping Computer date 2026-04-02

TrueConf zero-day vulnerability exploited to target government networks

Suspected China-nexus attackers have leveraged a zero-day vulnerability (CVE-2026-3502) in the TrueConf client application to distribute malware within government networks in Southeast Asia, Check Point researchers disco...

source Help Net Security date 2026-04-01 entities 4

Most CNI Firms Face Up to £5m in Downtime from OT Attacks

E2e-assure says 80% of critical infrastructure providers could face millions in downtime from cyber-attacks

source Infosecurity Magazine date 2026-04-01

Over 14,000 F5 BIG-IP APM instances still exposed to RCE attacks

Internet security watchdog Shadowserver has found over 14,000 BIG-IP APM instances exposed online amid ongoing attacks exploiting a critical-severity remote code execution (RCE) vulnerability. [...]

source Bleeping Computer date 2026-04-01 entities 2

Apple Expands iOS 18.7.7 Update to More Devices to Block DarkSword Exploit

Apple on Wednesday expanded the availability of iOS 18.7.7 and iPadOS 18.7.7 to a broader range of devices to protect users from the risk posed by a recently disclosed exploit kit known as DarkSword. "We enabled the avai...

source The Hacker News date 2026-04-01 entities 2

Trust, friction, and ROI: A CISO’s take on making security work for the business

In this Help Net Security interview, John O’Rourke, CISO at PPG, talks about what it means for security to drive business value. He explains how mature security programs reduce friction in sales cycles and M&A processes,...

source Help Net Security date 2026-04-01 entities 2

Tracking drones with the 5G tower down the street

Drone detection in cities is expensive. Dedicated radar installations are cost-prohibitive at scale, cameras have limited range and stop working well at night, and LiDAR systems have the same cost problem as radar. A gro...

source Help Net Security date 2026-04-01 entities 2

Microsoft adds high-volume email sending to Exchange Online

Organizations that rely on Exchange Online for internal communications have long needed a way to send large volumes of automated messages, such as payroll notifications, IT alerts, and security advisories, without runnin...

source Help Net Security date 2026-04-01 entities 1

Your customer passed authentication. So why are they sending money to a scammer?

In this Help Net Security video, Lenny Gusel, Head of Fraud Solutions in North America at Feedzai, explains how customer identity and access management has converged with digital fraud detection, and why treating them as...

source Help Net Security date 2026-04-01 entities 3

ISC Stormcast For Thursday, April 2nd, 2026 https://isc.sans.edu/podcastdetail/9876, (Thu, Apr 2nd)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

source SANS Internet Storm Center date 2026-04-01

Group Pushing Age Verification Requirements for AI Turns Out to Be Sneakily Backed by OpenAI

submitted by /u/EmbarrassedHelp [link] [comments]

source Reddit r/privacy date 2026-04-01

I've encountered mandatory ID and facial scan biometric data two times in the past half-year and it's incredibly depressing.

If you rent a car with Turo you consent to give them your facial data for a long time. I forget the exact time period but it was unnecessarily long. This was incredibly depressing to go through but I was in a rush and ha...

source Reddit r/privacy date 2026-04-01 entities 1

My gym wants me to download an app to check-in

I go to a gym 5 minutes from my house and In January, they started having members check in using an app and deactivated all the key cards. I didn’t want to download the app, so I would just check in by giving the front d...

source Reddit r/privacy date 2026-04-01 entities 1

Age verifying to protect kids makes no sense

Unless the kids parents work in the Youtube, Google, Roblox backend how are they supposed to know who their kids are talking to? How is sending a picture of my face to Google supposed to stop kids or pedophiles from enga...

source Reddit r/privacy date 2026-04-01

Experience with Kroll?

I’m in the process of evaluating vendors to do a third-party pen test. So far, Kroll is the only one I vibe with, but they’re pricey. Does anyone have any experience working with them? Did they meet your expectations? su...

source Reddit r/cybersecurity date 2026-04-01

CVE-2026-3502 - TrueConf Client Download of Code Without Integrity Check Vulnerability

TrueConf Client contains a download of code without integrity check vulnerability. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or ins...

source CIRCL KEV Feed date 2026-04-01 entities 3

I was doxxed

Hi guys. I (yes, i know this is dumb, don’t yell at me please) clicked on a link on discord and the dude found out my town, (and said it publicly) I left the server immediately but idk what to do now. Please help, I’m re...

source Reddit r/privacy date 2026-04-01

Trump’s birthright citizenship ban may fail — but the administration already got too far

On Wednesday morning, the Supreme Court heard arguments in Trump v. Barbara, a case challenging President Donald Trump's 2025 executive order banning birthright citizenship. Justices seemed skeptical of the administratio...

source The Verge date 2026-04-01

Is Cybersecurity in a similar boat to CompSci?

I'm currently a CS student with around two years left. I have a lot of fears of leaving school only to find most junior roles gone due to coding agents and just a generally bad and over saturated market. I've heard Cyber...

source Reddit r/cybersecurity date 2026-04-01

New CrystalRAT malware adds RAT, stealer and prankware features

A new malware-as-a-service called CrystalRAT is being promoted on Telegram, offering remote access, data theft, keylogging, and clipboard hijacking capabilities. [...]

source Bleeping Computer date 2026-04-01 entities 2

Minimal now provides easy CVE count details page

Minimal - the open source collection of hardened container images now provides easy visibility in the CVE count for all its supported images. It is visible at https://rtvkiz.github.io/minimal/ submitted by /u/Trick_Face_...

source Reddit r/cybersecurity date 2026-04-01 entities 1

Cybersecurity or embedded systems

Between cybersecurity and embedded systems, which one do you think is more fun, more AI-resistant long term, and more genuinely challenging? submitted by /u/thetrio0 [link] [comments]

source Reddit r/cybersecurity date 2026-04-01

De-fi platform Drift suspends deposits and withdrawals after millions in crypto stolen in hack

Blockchain trackers put the cryptocurrency heist in the hundreds of millions of dollars and is already on track to be the largest crypto theft in 2026 so far.

source TechCrunch date 2026-04-01

Massachusetts cyberattack hits Pepperell and regional dispatch

A cyberattack disrupted some town and public safety computer systems in Pepperell, Massachusetts, and affected nearby communities tied to its regional dispatch center, though officials said 911 was operating normally Wed...

source Reddit r/cybersecurity date 2026-04-01 entities 1

NASA launches four astronauts toward the Moon on the Artemis II mission

NASA's Artemis II flight, which is set to take four astronauts toward the Moon for the first time in more than 50 years, successfully launched on Wednesday evening. The Artemis II mission, part of NASA's Artemis program ...

source The Verge date 2026-04-01

Could age verification be bypassed easily by submitting a photo of a famous person?

Title. submitted by /u/Nintendo_Pro_03 [link] [comments]

source Reddit r/privacy date 2026-04-01

Anthropic took down thousands of GitHub repos trying to yank its leaked source code — a move the company says was an accident

Anthropic executives said it was an accident and retracted the bulk of the takedown notices.

source TechCrunch date 2026-04-01 entities 1

Are smart contract audits becoming more simulation-driven?

Been noticing an interesting shift in how smart contract security is handled lately. Traditionally, audits felt closer to code review. Expensive, slow, but understandable from a security perspective. Now a lot of workflo...

source Reddit r/cybersecurity date 2026-04-01 entities 1

Does anyone recall a case in which the state used location info to accuse a man of a crime he didn’t commit?

Thanks. submitted by /u/Inevitable-Move4941 [link] [comments]

source Reddit r/privacy date 2026-04-01 entities 1

Ransomware Will Hit Hospitals. Rehearsals Are Key to Defense

A chief medical information officer describes what hospitals face when they inevitably suffer a ransomware attack—whether it leads to short- or long-term outages.

source Dark Reading date 2026-04-01 entities 3

Apple expands iOS 18 updates to more iPhones to block DarkSword attacks

Apple has now made it possible for more iPhones still running iOS 18 to receive security updates that protect against the actively exploited DarkSword exploit kit. [...]

source Bleeping Computer date 2026-04-01 entities 2

LogSentinol

I built a free log analysis tool for detecting suspicious activity. Would love feedback from security professionals. #cybersecurity logsentinol.com submitted by /u/Few-Conversation8525 [link] [comments]

source Reddit r/cybersecurity date 2026-04-01

Embedding inversion attacks make hosted vector databases a real data exposure risk, here's an encrypted alternative

Hey r/cybersecurity , Want to flag a threat model that doesn't get enough attention: embedding inversion on vector databases. A lot of organizations are building retrieval-augmented generation (RAG) systems — essentially...

source Reddit r/cybersecurity date 2026-04-01 entities 4

Coolest (New?) Cyber Security Media Companies

I started listening to Darknet diaries a few months ago and read 404Media pretty often (I'm subbed to their newsletter). I am wondering what other cool / new cyber media companies (or individual creators) are out there. ...

source Reddit r/cybersecurity date 2026-04-01

Hackers exploit TrueConf zero-day to push malicious software updates

Hackers have targeted TrueConf conference servers in attacks that exploit a zero-day vulnerability, allowing them to execute arbitrary files on all connected endpoints. [...]

source Bleeping Computer date 2026-04-01 entities 3

'NoVoice' Android malware on Google Play infected 2.3 million devices

submitted by /u/rkhunter_ [link] [comments]

source Reddit r/cybersecurity date 2026-04-01 entities 1

Reddit just pasted from my clipboard

Needless to say, probably, but I didn't paste anything. As I was typing a response, a pop-up window said, "Reddit pasted from your clipboard." I don't recall ever seeing that before. submitted by /u/heninthefoxhouse [lin...

source Reddit r/privacy date 2026-04-01 entities 1

The reputation of troubled YC startup Delve has gotten even worse

Delve faces new allegations that it violated the open source license of its customer, Sim.ai, by taking the customers's tool and passing it off as its own.

source TechCrunch date 2026-04-01 entities 2

‘System failure’ paralyzes Baidu robotaxis in China

Passengers in Baidu's robotaxis were trapped for up to two hours.

source TechCrunch date 2026-04-01

Am I weird for using an adblocker or are all of my coworkers weird for not using one?

For context, I just started on a small security team of about ten teammates. I'm younger than everyone else. I noticed one of my teammates didn't use an adblocker on his browser when he was screensharing during a casual ...

source Reddit r/cybersecurity date 2026-04-01

A new dating app, Sonder, has a deliberately annoying sign-up process (and it’s working)

Sonder profiles are completely unstructured, encouraging users to build something that looks like a mood board or a digital collage. Think MySpace rather than LinkedIn.

source TechCrunch date 2026-04-01

Startup funding shatters all records in Q1

The record quarterly fundraise largely fueled four mega-deals into OpenAI, Anthropic, xAI, and Waymo. But it also indicates a generally hot market.

source TechCrunch date 2026-04-01

Hasbro says it was hacked, and may take 'several weeks' to recover

submitted by /u/No_Diver_3351 [link] [comments]

source Reddit r/cybersecurity date 2026-04-01

Malicious Script That Gets Rid of ADS, (Wed, Apr 1st)

Today, most malware are called “fileless” because they try to reduce their footprint on the infected computer filesystem to the bare minimum. But they need to write something… think about persistence. They can use ...

source SANS Internet Storm Center date 2026-04-01 entities 2

identity verification without biometrics?

Hi all, I've spent way too much time today trying to find non-PayPal ways to take credit cards online for my business (because I have a client whose university bars them using official cards on PayPal). As far as I can t...

source Reddit r/privacy date 2026-04-01 entities 1

New EvilTokens service fuels Microsoft device code phishing attacks

A new malicious kit called EvilTokens integrates device code phishing capabilities, allowing attackers to hijack Microsoft accounts and provide advanced features for business email compromise attacks. [...]

source Bleeping Computer date 2026-04-01 entities 2

Flock PR rep admits Flock has backdoor access to resident travel data, uses it to train their AI models at Oshkosh, WI City Council meeting 3/31/26

Start at 6:14:28 This entire presentation from Flock shows that communities need to be prepared for this slick PR doublespeak from these ghouls. Flock's claim of using "end-to-end encryption" is not true in the strict cy...

source Reddit r/cybersecurity date 2026-04-01 entities 1

The Artemis Moon base project is legally dubious

With NASA planning to launch four astronauts on Wednesday on its Artemis II mission, the race to return to the Moon is back on. The current mission will see astronauts aboard the Orion capsule travel around the Moon befo...

source The Verge date 2026-04-01

Apple releases security fix for older iPhones and iPads to protect against DarkSword attacks

The security update protects a raft of older iPhones and iPads from attacks linked to leaked hacking tools called DarkSword.

source TechCrunch date 2026-04-01 entities 3

Can I work full time for free?

As no one want to hire anybody and very competitive and I'm tired of that! Can I work full time for free? At least I can get a full time experience on my resume then I can get something paid later? Is that possible? If y...

source Reddit r/cybersecurity date 2026-04-01

LatAm's Self-Taught Cyber Talent Overlooked Amid Cyberattack Glut

A newly released study exclusively shared with Dark Reading details the unique circumstances that make up Latin America's labor pool, and why organizations may want to expand their talent search.

source Dark Reading date 2026-04-01

Meta’s natural gas binge could power South Dakota

Meta's upcoming Hyperion AI data center will be powered by 10 new natural gas plants.

source TechCrunch date 2026-04-01

Best Sources for Threat Intelligence

In your opinion, which companies/orgs are providing the best Threat Intel updates and thought leadership and why? Who do you look to as the most reputable source in Threat Intelligence? Not thinking about product here. J...

source Reddit r/cybersecurity date 2026-04-01 entities 1

Ex girlfriends phone number showed up on my current girlfriends Goibibo account. Please help with an explanation ?

Background - I have an old android Motorola phone. Once I gave it to my current gf to use. She used it with her sim on it but never logged into her google account on that phone. But that same Motorola phone had messages ...

source Reddit r/privacy date 2026-04-01

'NoVoice' Android malware on Google Play infected 2.3 million devices

A new Android malware dubbed NoVoice exploited known vulnerabilities to gain root access and has been distributed through more than 50 apps on Google Play Store, with at least 2.3 million downloads. [...]

source Bleeping Computer date 2026-04-01 entities 2

Everything is iPhone now

This is part of our package about Apple's 50th anniversary. Read more here. The thing about the iPhone is that everyone knew it was going to be a big deal, and then it was an even bigger deal than that. Hell, it's still ...

source The Verge date 2026-04-01

April Fools’ Day 2026: the best and cringiest pranks

Welcome to the worst day on the internet! As Chaim Gartenberg pointed out years ago, brands and a holiday dedicated to hoaxes are rarely a winning combo. If you’re a company with any kind of social media, internet, or AI...

source The Verge date 2026-04-01

Kia’s compact EV3 is coming to the US this year, with 320 miles of range

At the New York International Auto Show on Wednesday, Kia announced that its compact electric SUV, the EV3, will be available in the US "in late 2026." The EV3 has been available overseas since 2024, when it launched in ...

source The Verge date 2026-04-01

Has AI actually made a noticeable impact in your cybersecurity work?

I keep hearing all this hype about AI "revolutionizing cybersecurity ," but Im really curious about what it’s actually doing on the ground. For folks working in SOCs, data security or threat monitoring: Have you ever see...

source Reddit r/cybersecurity date 2026-04-01 entities 1

The Shokz OpenRun Pro 2 are now at their lowest price in months

As the days get warmer, it’s tempting to take your workouts outside. Bone conduction headphones let you listen while staying aware of your surroundings, making them ideal for runs, walks, and more. Through April 7th, Sho...

source The Verge date 2026-04-01

Cameo partners with TikTok to boost popularity

Cameo launched a new TikTok integration that allows U.S. creators to offer personalized videos through the app.

source TechCrunch date 2026-04-01

Is “Hackback” Official US Cybersecurity Strategy?

The 2026 US “ Cyber Strategy for America ” document is mostly the same thing we’ve seen out of the White House for over a decade, but with a more aggressive tone. But one sentence stood out: “We will unleash the private ...

source Schneier on Security date 2026-04-01 entities 1

Cyberattacks Intensify Pressure on Latin American Governments

Cyber threats across Latin America are increasingly targeting government systems, from disruptive attacks in Puerto Rico to a surge of probes against Colombia’s health sector.

source Dark Reading date 2026-04-01

Google fixes fourth Chrome zero-day exploited in attacks in 2026

submitted by /u/rkhunter_ [link] [comments]

source Reddit r/cybersecurity date 2026-04-01 entities 2

WhatsApp notifies hundreds of users who installed a fake app made by government spyware maker

The Meta-owned company said it identified around 200 users who were tricked into installing a fake version of WhatsApp that was actually Italian-made spyware.

source TechCrunch date 2026-04-01 entities 1

I tested a living room full of cheap Ikea speakers against Sonos and Bose

Ikea's $10 Kallsup Bluetooth speaker is fun and colorful and sounds better than its price suggests. It's not mind-blowing (it is a $10 speaker, after all), and there are no features to speak of, other than the ability to...

source The Verge date 2026-04-01

Cybercriminals take aim at Hasbro, weeks of recovery ahead

Hasbro, an American toy maker with more than 5,000 employees, confirmed a cyberattack and proactively took certain systems offline. The intrusion was detected on March 28, and the company promptly activated its incident ...

source Help Net Security date 2026-04-01 entities 2

Snapchat’s ‘Reals’ joke mocks Instagram’s many ripoffs

It's April Fools' Day, and Snap is using the occasion to "announce" that it's switching the name of Snapchat's Spotlight feed, the app's Instagram Reels-like feed of shortform vertical videos, to "Reals." In a video feat...

source The Verge date 2026-04-01

CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails

The Computer Emergency Response Team of Ukraine (CERT-UA) has disclosed details of a new phishing campaign in which the cybersecurity agency itself was impersonated to distribute a remote administration tool known as AGE...

source The Hacker News date 2026-04-01 entities 3

Detect Axious and LiteLLM compromise and future compromises -- OreNPMGuard to Opensource OreWatch: Continuous monitoring for malicious packages using Threat Intelligence

So we took OreNPMGuard and turned it into Opensource OreWatch — multi-ecosystem, local-first, fed by automated threat intel instead of static lists that go stale in a week. It runs in the background and catches all the b...

source Reddit r/cybersecurity date 2026-04-01 entities 1

Cognichip wants AI to design the chips that power AI, and just raised $60M to try

The firm says it can reduce the cost of chip development by more than 75% and cut the timeline by more than half.

source TechCrunch date 2026-04-01

The Trump administration’s antitrust honeymoon is over

"It's not personal, Sonny, it's strictly business." That quote was first delivered by mob boss Michael Corleone in The Godfather, but last Monday, it became the title of a speech by the Justice Department's acting antitr...

source The Verge date 2026-04-01 entities 1

SpaceX files confidentially for IPO in mega listing potentially valued at $1.75 trillion, report says

The company has also lined up an unusually large number of 21 banks to manage the mega IPO, internally codenamed “Project Apex."

source TechCrunch date 2026-04-01

Google Introduces Android Dev Verification Amid Openness Debate

Android requires dev identity verification for sideloaded apps; phased global rollout from September

source Infosecurity Magazine date 2026-04-01

Venom Stealer MaaS Platform Commoditizes ClickFix Attacks

A new service on the cybercrime market provides automated capabilities to create persistent information-stealing social engineering attacks.

source Dark Reading date 2026-04-01 entities 1

Hasbro says it was hacked, and may take ‘several weeks’ to recover

The American toy-making giant noted that it was continuing to "implement measures to secure its business operations," suggesting that the hackers may still be in the company's systems.

source TechCrunch date 2026-04-01 entities 1

North Korean hackers linked to Axios npm supply chain compromise

The software supply chain attack that resulted in the compromise of npm packages of Axios, an extremely popular HTTP client library, is believed to be the work of financially-motivated North Korean attackers. Links to UN...

source Help Net Security date 2026-04-01 entities 2

Microsoft Warns of WhatsApp-Delivered VBS Malware Hijacking Windows via UAC Bypass

Microsoft is calling attention to a new campaign that has leveraged WhatsApp messages to distribute malicious Visual Basic Script (VBS) files. The activity, beginning in late February 2026, leverages these scripts to ini...

source The Hacker News date 2026-04-01 entities 3

Routine Access Is Powering Modern Intrusions, a New Threat Report Finds

Modern intrusions increasingly start with valid credentials and routine access, not exploits. Blackpoint Cyber's upcoming threat report shows how VPN abuse, RMM tools, and social engineering drive most incidents. [...]

source Bleeping Computer date 2026-04-01 entities 1

Less than a month: StrictlyVC San Francisco brings leaders from TDK Ventures, Replit, and more together

StrictlyVC San Francisco brings leaders from TDK Ventures, Replit, and more together on April 30. Space is limited. Register here for your pass.

source TechCrunch date 2026-04-01