Tag: computer
-
Experts published unpatched Windows zero-day BlueHammer
A researcher leaked the unpatched Windows zero-day “BlueHammer,” letting attackers gain SYSTEM rights; no patch exists yet. A disgruntled researcher released the BlueHammer Windows zero-day, a privilege escalation flaw that allows attackers to gain SYSTEM or admin rights, Bleeping Computer reports. The researcher privately reported the vulnerability to Microsoft but criticized the waythe Microsoft’s Security…
-
North Korea’s hijack of one of the web’s most used open source projects was likely weeks in the making
North Korean hackers pushed out malicious updates to a popular open source project by hacking a top developer’s computer in a long-running campaign. First seen on techcrunch.com Jump to article: techcrunch.com/2026/04/06/north-koreas-hijack-of-one-of-the-webs-most-used-open-source-projects-was-likely-weeks-in-the-making/
-
Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab
An elusive hacker who went by the handle “UNKN” and ran the early Russian ransomware groups GandCrab and REvil now has a name and a face. Authorities in Germany say 31-year-old Russian Daniil Maksimovich Shchukin headed both cybercrime gangs and helped carry out at least 130 acts of computer sabotage and extortion against victims across…
-
Cyberattack Disrupts Massachusetts Emergency Dispatch, 911 Services Remain Active
A Massachusetts emergency cyberattack has temporarily disrupted the operations of the Patriot Regional Emergency Communications Center, affecting several small towns in northern Massachusetts. The breach, which began on Tuesday, has compromised town and public safety computer systems, though 9-1-1 emergency phone lines remain operational. Non-emergency and business phone lines, however, are currently out of service. First seen on thecyberexpress.com…
-
Post-Quantum Cryptography: Moving From Awareness to Execution
Google recently released important research that moves Q-Day, the day quantum computers will be able to “break the Internet”, up to 2029. How should enterprises secure their systems? First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/post-quantum-cryptography-moving-from-awareness-to-execution/
-
After fighting malware for decades, this cybersecurity veteran is now hacking drones
Mikko Hyppönen is one of the most recognizable faces of the cybersecurity industry. After fighting computer viruses, worms, and malware, for more than 35 years, he tells TechCrunch why he is now working on systems to stop killer drones. First seen on techcrunch.com Jump to article: techcrunch.com/2026/04/04/after-fighting-malware-for-decades-this-cybersecurity-veteran-is-now-hacking-drones/
-
LinkedIn Hidden Code Secretly Scans Users’ Computers for Installed Software
A new investigation by Fairlinked e.V. claims that Microsoft-owned LinkedIn is running a massive, undisclosed corporate surveillance operation. According to the >>BrowserGate<< report, hidden code on LinkedIn's website secretly scans the computers of its one billion users to detect installed software and browser extensions. This scanning reportedly happens without user consent, disclosure, or any mention…
-
We know what day it is but these Raspberry Pi price hikes are no joke
Hot DRAM! Who is going to drop nearly $400 on an underpowered Linux computer? First seen on theregister.com Jump to article: www.theregister.com/2026/04/01/raspberry_pi_price_hikes/
-
CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails
The Computer Emergency Response Team of Ukraine (CERT-UA) has disclosed details of a new phishing campaign in which the cybersecurity agency itself was impersonated to distribute a remote administration tool known as AGEWHEEZE.As part of the attacks, the threat actors, tracked as UAC-0255, sent emails on March 26 and 27, 2026, posing as CERT-UA to…
-
Google Warns Quantum Computers Could Crack Crypto Sooner Than Expected
Google warns that quantum computers could break crypto sooner than expected, heightening the urgency for post-quantum security across blockchain networks. The post Google Warns Quantum Computers Could Crack Crypto Sooner Than Expected appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-google-quantum-computing-crypto-security-risk/
-
Norma Rae, Union Activity and Computer Hacking Skywest Sues Pilots for Using its Directory of Employees to Unionize
Does using company portal credentials for union organizing constitute “hacking”? Explore how SkyWest v. Moussaron tests the Computer Fraud and Abuse Act (CFAA) and the Supreme Court’s Van Buren ruling. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/norma-rae-union-activity-and-computer-hacking-skywest-sues-pilots-for-using-its-directory-of-employees-to-unionize/
-
Anthropic employee error exposes Claude Code source
Tags: access, ai, computer, control, credentials, cybercrime, data, data-breach, malicious, open-source, service, technology, tool, vulnerabilityCSO, “no sensitive customer data or credentials were involved or exposed. This was a release packaging issue caused by human error, not a security breach. We’re rolling out measures to prevent this from happening again.”But it wasn’t the first time this had happened; according to Fortune and other news sources, the same thing happened last…
-
Quantum computers need vastly fewer resources than thought to break vital encryption
No, the sky isn’t falling, but Q Day is coming, and it won’t be as expensive as thought. First seen on arstechnica.com Jump to article: arstechnica.com/security/2026/03/new-quantum-computing-advances-heighten-threat-to-elliptic-curve-cryptosystems/
-
Is Your Repository Ready for What’s Next?
<div cla Most software teams don’t start out planning to adopt an enterprise artifact repository. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/is-your-repository-ready-for-whats-next/
-
How we made Trail of Bits AI-native (so far)
Tags: access, ai, application-security, attack, automation, blockchain, business, ceo, chatgpt, computer, computing, conference, control, data, email, germany, government, identity, injection, jobs, macOS, marketplace, nvidia, open-source, risk, service, skills, strategy, supply-chain, technology, threat, tool, vulnerabilityThis post is adapted from a talk I gave at [un]prompted, the AI security practitioner conference. Thanks to Gadi Evron for inviting me to speak. You can watch the recorded presentation below or download the slides. Most companies hand out ChatGPT licenses and wait for the productivity numbers to move. We built a system instead.…
-
Google Drive now detects ransomware and helps restore affected files
To help organizations minimize the impact of malware attacks on personal computers, Google launched ransomware detection and file restoration in beta in September 2025. These … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/31/google-drive-ransomware-detection-and-file-restoration/
-
CISO Spotlight: Dimitris Georgiou on Building Security that Serves People First
Dimitris Georgiou has been a self-professed computer geek since the early 80s. At university, he studied the convergence of educational technology with computer science as part of his psychology MA finding, to his disbelief, that systems were perilously insecure. Since then, he’s always worked in and around cybersecurity. He’s had roles as a computer […]…
-
Apple’s last tower topples”¦ and the others will follow
Farewell, Mac Pro: Increasing integration means the end of expandable computers First seen on theregister.com Jump to article: www.theregister.com/2026/03/27/apples_last_tower_topples/
-
European Commission data stolen in a cyberattack on the infrastructure hosting its web sites
Tags: attack, breach, ceo, cloud, computer, cyber, cyberattack, cybersecurity, data, hacking, infrastructure, regulationA ‘grim warning’: Ilia Kolochenko, CEO of Swiss-based ImmuniWeb, said that while the attack “may appear to be pretty banal on its face, there are several things to pay attention to.”Referring to the Bleeping Computer report, he said that, given that the attackers allegedly plan to release the data, their key intention here is to…
-
When Your Best Friend Is a Bot Who Never Says No
Tags: computerIn 1966, an MIT computer scientist named Joseph Weizenbaum built a chatbot called ELIZA. It was extremely simple by today’s standards which simply rephrased whatever you typed as a question. Tell it “my boyfriend made me come here” and it would respond “your boyfriend made you come here?” It was nothing more than a party……
-
The quantum apocalypse is coming sooner than we thought
CSOs can’t afford to watch and wait: Google has upped the ante on PQC migration, Michela Menting, an analyst at ABI Research, tells CSO.That means that enterprises will also need to step up their transition plans, she says, “to align earlier than what they might have originally thought was acceptable based on the NIST deprecation…
-
Google Sets 2029 Deadline as Quantum Computers Threaten Encryption
Google fast-tracks post-quantum cryptography with a 2029 deadline as researchers warn quantum computers could break current encryption sooner than expected. First seen on hackread.com Jump to article: hackread.com/google-2029-deadline-quantum-computers-encryption/
-
Alleged RedLine malware developer extradited to US, faces up to 30 years
Hambardzum Minasyan appeared in an Austin federal court on Tuesday and was indicted on charges of conspiracy to commit access device fraud, conspiracy to violate the Computer Fraud and Abuse Act and conspiracy to commit money laundering. First seen on therecord.media Jump to article: therecord.media/redline-malware-developer-extradited-to-us-faces-30-years
-
Google warns quantum computers could hack encrypted systems by 2029
Banks, governments and tech providers urged to upgrade security because current systems will soon be obsolete Banks, governments and technology providers need to be prepared for quantum computer hackers capable of breaking most existing encryption systems by 2029, <a href=”https://blog.google/innovation-and-ai/technology/safety-security/cryptography-migration-timeline/”>Google has warned.The tech company said in a <a href=”https://blog.google/innovation-and-ai/technology/safety-security/cryptography-migration-timeline/”>blogpost that quantum computers will pose a…
-
Google warns quantum computers could hack encrypted systems by 2029
Banks, governments and tech providers urged to upgrade security because current systems will soon be obsolete Banks, governments and technology providers need to be prepared for quantum computer hackers capable of breaking most existing encryption systems by 2029, <a href=”https://blog.google/innovation-and-ai/technology/safety-security/cryptography-migration-timeline/”>Google has warned.The tech company said in a <a href=”https://blog.google/innovation-and-ai/technology/safety-security/cryptography-migration-timeline/”>blogpost that quantum computers will pose a…
-
Why Your Encrypted Data From 2019 Is Already Compromised: The Quantum Time Bomb
Attackers are harvesting your encrypted data today to decrypt with quantum computers tomorrow. Your 2019 VPN sessions, emails, and trade secrets are already exposed. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/why-your-encrypted-data-from-2019-is-already-compromised-the-quantum-time-bomb/
-
TeamPCP Unleashes Iran-Targeted CanisterWorm Kubernetes Wiper
CanisterWorm’s latest evolution turns TeamPCP’s cloud-native toolkit into a geopolitically tuned wiper, capable of bricking entire Kubernetes clusters when it lands on systems configured for Iran. The campaign reuses the same Internet Computer Protocol (ICP) canister C2 and backdoor infrastructure seen in the earlier Trivy and NPM CanisterWorm incidents. However, it now adds selective destruction…
-
V2X macht das Auto zum Teil des Internets – Das Connected Car wird zum Computer auf vier Rädern
First seen on security-insider.de Jump to article: www.security-insider.de/connected-car-software-defined-vehicle-v2x-a-33c39f2ab5bc9ed046764e3ac3084a12/
-
Hong Kong police can demand phone and computer passwords under amended national security law
Refusing to comply could lead to year in jail and hefty fine, while providing false information carries up to three years in prisonHong Kong police can now demand that people suspected of breaching the city’s national security law provide mobile phone or computer passwords in a further crackdown on dissent.The amendments to the law also…

