This update succeeds TeamPCP Supply Chain Campaign Update 007 , published April 8, 2026, which left the campaign in credential-monetization mode following the Cisco source code theft via Trivy-linked …
Homepage-Fragments
** Ravie Lakshmanan ** Apr 27, 2026 Malware / Software Supply Chain Cybersecurity researchers have flagged dozens of Microsoft Visual Studio Code (VS Code) extensions on the Open VSX repository that …
A pro-Ukrainian hacktivist group called PhantomCore has been attributed to attacks actively targeting servers running TrueConf video conferencing software in Russia since September 2025. That’s …
Mythos Changed the Math on Vulnerability Discovery. Most Teams Aren't Ready for the Remediation Side
Anthropic’s Claude Mythos Preview has dominated security discussions since its April 7 announcement. Early reporting describes a powerful cybersecurity-focused AI system capable of identifying …
Medieval Encrypted Letter Decoded Sent by a Spanish diplomat. Apparently people have been working on it since it was rediscovered in 1860. Tags: history of cryptography Posted on April 27, 2026 at …
Cybersecurity researchers have disclosed details of a telecommunications fraud campaign that uses fake CAPTCHA verification tricks to dupe unsuspecting users into sending international text messages …
News diary 27 April – 3 May: Royal visit to US, Devil Wears Prada 2, World Press Freedom Day
BERLIN, GERMANY – MAY 7, 2019: Charles, Prince of Wales and Camilla, Duchess of Cornwall, in front of Brandenburg Gate. Picture: Chris Ghinda/Shutterstock The news agenda for the week is likely to …
Bringing frontier AI models to Koreaâs scientific community Koreaâs Ministry of Science and ICT (MSIT) has recently launched the K-Moonshot Missions, an initiative aimed at unlocking step-change …
Due to the explosive growth of artificial intelligence, it is estimated that data centers will consume up to 12 percent of total U.S. electricity by 2028 , according to the Lawrence Berkeley National …
Cybersecurity researchers have discovered a new Lua-based malware created years before the notorious Stuxnet worm that aimed to sabotage Iran’s nuclear program by destroying uranium enrichment …
** Ravie Lakshmanan ** Apr 25, 2026 Network Security / Infrastructure Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added four vulnerabilities impacting …
Former co-owner of Panama Papers law firm convicted of aiding and abetting tax evasion
A German court has convicted the former co-owner of Panamanian law firm Mossack Fonseca — the subject of the International Consortium of Investigative Journalists’ Panama Papers investigation — for …
Friday Squid Blogging: How Squid Survived Extinction Events Science news : Scientists have finally cracked a long-standing mystery about squid and cuttlefish evolution by analyzing newly sequenced …
MIT scientists build the world’s largest collection of Olympiad-level math problems, and open it to everyone
Every year, the countries competing in the International Mathematical Olympiad (IMO) arrive with a booklet of their best, most original problems. Those booklets get shared among delegations, then …
Relatives and journalists bid farewell to journalist Hassan Aslih, who was killed in an Israeli airstrike, at Nasser Hospital in Khan Yunis, southern Gaza Strip, on 13 May 2025. Picture: …
Employees across every function are expected to make faster, better-informed decisions, but the information that they need rarely lives in one place. Workforce intelligence (who is in your …
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has revealed that an unnamed federal civilian agency’s Cisco Firepower device running Adaptive Security Appliance (ASA) software …
Four stories cited in Press Gazette round-up of AI going wrong in news publications
“Make Iran Ungovernable” – Tracking Efforts To Destroy Iran’s Police Infrastructure
Bellingcat has identified at least 80 police stations or infrastructure related to law enforcement agencies and the Basij paramilitary group that has been damaged or destroyed in the first three weeks …
** Ravie Lakshmanan ** Apr 24, 2026 Espionage / National Security, The Office of Inspector General (OIG) of the U.S. National Aeronautics and Space Administration (NASA) has revealed how a Chinese …
Telegraph columnist Allison Pearson’s libel case against Essex Police is likely to go to trial after a judge said statements about her had been defamatory in meaning. Pearson sued Essex Police over …
Hiding Bluetooth Trackers in Mail It was used to track a Dutch naval ship: Dutch journalist Just Vervaart, working for regional media network Omroep Gelderland, followed the directions posted on the …
The AI Agent Authority Gap - From Ungoverned to Delegation As discussed in our previous article, AI agents are exposing a structural gap in enterprise security, but the problem is often framed too …
Cybersecurity researchers have discovered a set of malicious apps on the Apple App Store that impersonate popular cryptocurrency wallets in an attempt to steal recovery phrases and private keys since …
** Ravie Lakshmanan ** Apr 24, 2026 Malware / Threat Intelligence Chinese-speaking individuals are the target of a new campaign that uses a trojanized version of SumatraPDF reader to deploy the …