The European Union has renewed its pressure on Google to open Android’s ecosystem to competing AI assistants on equal terms with Gemini, citing requirements und Thank you for being a Ghacks reader. The post EU Pressures Google to Grant Rival…
Tag: EN
Litecoin Zero-Day Vulnerability Exploited in DoS Attack, Disrupts Major Mining Pools
A critical zero-day vulnerability in the Litecoin network was actively exploited to launch a denial-of-service (DoS) attack, temporarily disrupting operations across major mining pools before developers issued a full patch. Security researchers confirmed the flaw allowed threat actors to inject…
73 Open VSX Sleeper Extensions Linked to GlassWorm Activate New Malware Campaign
The GlassWorm supply chain attack targeting the Open VSX marketplace has escalated with the discovery of 73 new “sleeper” extensions. Identified in April 2026, this cluster marks a dangerous shift in how threat actors distribute malware to software developers. This…
California Engineer Identified in Suspected Shooting at White House Correspondents’ Dinner
The 31-year-old engineer and self-described indie game developer is suspected of firing shots at the annual event attended by President Donald Trump, high-profile media figures, and US government officials. This article has been indexed from Security Latest Read the original…
Introducing Proactive Hardening and Attack Surface Reduction (PHASR) for Linux and macOS
As Linux dominates cloud-native infrastructure and macOS becomes the standard for high-value targets in development and executive leadership, the attack surface is no longer Windows-centric. Modern attack playbooks weaponize Living off the Land (LOTL) binaries–pre-installed, legitimate system tools–to blend malicious…
AI Scams Are Becoming Harder to Detect — 7 Warning Signs You Should Watch Closely
Artificial intelligence is not only improving everyday technology but also strengthening both traditional and emerging scam techniques. As a result, avoiding fraud now requires greater awareness of how these schemes are taking new shapes. Being able to identify scams…
U.S. CISA adds SimpleHelp, Samsung, and D-Link flaws to its Known Exploited Vulnerabilities catalog
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds SimpleHelp, Samsung, and D-Link flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added SimpleHelp, Samsung, and D-Link flaws to its Known Exploited Vulnerabilities (KEV) catalog. Below…
CISA Warns of Multiple SimpleHelp Vulnerabilities Exploited in Attack
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert regarding two actively exploited vulnerabilities in SimpleHelp remote support software. Remote access tools are highly valued targets for cybercriminals because they provide direct pathways into corporate networks. When…
New Windows RPC Vulnerability Lets Attackers Escalate Privileges Across All Windows Versions
PhantomRPC, a newly identified architectural vulnerability in Windows Remote Procedure Call (RPC) that enables local privilege escalation to SYSTEM-level access, potentially affecting every version of Windows. The research was presented by Kaspersky application security specialist Haidar Kabibo at Black Hat…
Bengaluru Businessman Duped of Rs 15.45 Crore in Fake CBI ‘Digital Arrest’ Scam
A Bengaluru businessman, Ajit Gopalakrishna Saraf from Belagavi, fell victim to a sophisticated cyber fraud orchestrated by imposters posing as Central Bureau of Investigation (CBI) officials, resulting in a staggering loss of Rs 15.45 crore. The scam unfolded through…
New “optical tornado” technology could transform quantum communication
Scientists have created tiny “optical tornadoes” — swirling beams of light that twist like miniature whirlwinds — using a surprisingly simple setup based on liquid crystals. Instead of relying on complex nanotechnology, the team used self-organizing structures called torons to…
Claude AI Agents Close 186 Deals in Anthropic’s Marketplace Experiment
Anthropic’s “Project Deal” has demonstrated that AI agents can autonomously negotiate and close real-world transactions, but the experiment also surfaced a quiet, troubling asymmetry: not all AI representations are created equal. In December 2025, Anthropic transformed its San Francisco office…
[un]prompted 2026 – Securing Workspace GenAl At Google Speed
Author, Creator & Presenter: Nicolas Lidzborski, Principal Engineer At Google Workspace Security Our thanks to [un]prompted for publishing their Creators, Authors and Presenter’s outstanding [un]prompted 2026 AI Security Practitioner content on the Organizations’ YouTube Channel. Permalink The post [un]prompted 2026…
Supplier assurance for UK SMEs: a practical guide to checking third parties without overcomplicating it
Supplier assurance for UK SMEs: a practical guide to checking third parties without overcomplicating it Most UK SMEs rely on suppliers in some way. That might be payroll software, a managed IT provider, a marketing agency, a logistics partner, or…
Over 400,000 sites at risk as hackers exploit Breeze Cache plugin flaw (CVE-2026-3844)
Attackers exploit a Breeze Cache flaw (CVE-2026-3844) to upload files without login. Wordfence researchers detected over 170 attacks. Threat actors are exploiting a critical flaw, tracked as CVE-2026-3844 (CVSS score of 9.8), in the Breeze Cache WordPress plugin, allowing them…
Physical AI Talent War Drives Salaries Surge Across Robotics And Autonomous Vehicle Industry
Salaries climb fast as demand surges for experts who blend AI know-how with hands-on hardware skills. Firms in robotics, military tech, and self-operating machines now pay between three hundred thousand and five hundred thousand dollars just to attract top…
GPT‑5.5 Bio Bug Bounty to Strengthen Advanced AI Capabilities
OpenAI has announced a new Bio Bug Bounty program for GPT-5.5 as part of its efforts to improve safety controls for advanced AI systems and to address misuse in biology. The initiative invites qualified researchers to test whether GPT-5.5 can…
Best of the Worst: Five Attacks That Looked Broken (and Worked)
I skipped last week’s roundup. Holiday weekend, family stuff, the usual. So this is a two-week-ish view of what we’ve published in the Threat Intelligence series since Edition 03 dropped on April 13. The post Best of the Worst: Five…
Fake CAPTCHA Scam Abuses Verification Clicks to Send Costly International Texts
Research from Infoblox reveals a massive Click2SMS fraud scheme using fake CAPTCHAs and back button hijacking to trick victims into sending costly international texts. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI and More Read…
IRDAI 2026 Cybersecurity Guidelines for Insurance Companies
The Insurance Regulatory and Development Authority of India (IRDAI) has introduced significant amendments to its cybersecurity guidelines in 2026, marking a shift from static compliance to continuous cyber resilience. For insurers, IRDAI compliance is no longer just about implementing baseline…