Trigona ransomware now uses a custom command-line tool to steal data faster and evade detection, replacing tools like Rclone and MegaSync. Symantec researchers report that recent Trigona ransomware attacks used a custom-built data exfiltration tool instead of common utilities like…
IT Security News Hourly Summary 2026-04-26 12h : 3 posts
3 posts were published in the last hour 9:34 : Hot take: AI’s not going to kill open source code security 9:34 : The Great Stay: Why Tech Talent Is Choosing Stability Over Salary 9:9 : Security Affairs newsletter Round…
Hot take: AI’s not going to kill open source code security
Cal.com considers AGPL a license to drill, but not everyone feels that way Opinion Cal.com has closed its commercial codebase, abandoning years of AGPL-3.0 licensing in a move that has alarmed the developer community that helped build it and sent…
The Great Stay: Why Tech Talent Is Choosing Stability Over Salary
How mass layoffs and economic anxiety have upended the talent war, turning “job hugging” into the public sector’s greatest opportunity to fill open tech positions. The post The Great Stay: Why Tech Talent Is Choosing Stability Over Salary appeared first…
Security Affairs newsletter Round 574 by Pierluigi Paganini – INTERNATIONAL EDITION
A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. U.S.…
Week in review: Claude Mythos finds 271 Firefox flaws, Vercel breach
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: SmokedMeat: Open-source tool shows what attackers do inside CI/CD pipelines Boost Security has released SmokedMeat, an open-source framework that runs attack chains against CI/CD infrastructure…
EU Pressures Google to Grant Rival AI Assistants Same Android Access as Gemini Under DMA
The European Union has renewed its pressure on Google to open Android’s ecosystem to competing AI assistants on equal terms with Gemini, citing requirements und Thank you for being a Ghacks reader. The post EU Pressures Google to Grant Rival…
Litecoin Zero-Day Vulnerability Exploited in DoS Attack, Disrupts Major Mining Pools
A critical zero-day vulnerability in the Litecoin network was actively exploited to launch a denial-of-service (DoS) attack, temporarily disrupting operations across major mining pools before developers issued a full patch. Security researchers confirmed the flaw allowed threat actors to inject…
73 Open VSX Sleeper Extensions Linked to GlassWorm Activate New Malware Campaign
The GlassWorm supply chain attack targeting the Open VSX marketplace has escalated with the discovery of 73 new “sleeper” extensions. Identified in April 2026, this cluster marks a dangerous shift in how threat actors distribute malware to software developers. This…
California Engineer Identified in Suspected Shooting at White House Correspondents’ Dinner
The 31-year-old engineer and self-described indie game developer is suspected of firing shots at the annual event attended by President Donald Trump, high-profile media figures, and US government officials. This article has been indexed from Security Latest Read the original…
IT Security News Hourly Summary 2026-04-26 06h : 2 posts
2 posts were published in the last hour 3:9 : Introducing Proactive Hardening and Attack Surface Reduction (PHASR) for Linux and macOS 3:9 : AI Scams Are Becoming Harder to Detect — 7 Warning Signs You Should Watch Closely
Introducing Proactive Hardening and Attack Surface Reduction (PHASR) for Linux and macOS
As Linux dominates cloud-native infrastructure and macOS becomes the standard for high-value targets in development and executive leadership, the attack surface is no longer Windows-centric. Modern attack playbooks weaponize Living off the Land (LOTL) binaries–pre-installed, legitimate system tools–to blend malicious…
AI Scams Are Becoming Harder to Detect — 7 Warning Signs You Should Watch Closely
Artificial intelligence is not only improving everyday technology but also strengthening both traditional and emerging scam techniques. As a result, avoiding fraud now requires greater awareness of how these schemes are taking new shapes. Being able to identify scams…
U.S. CISA adds SimpleHelp, Samsung, and D-Link flaws to its Known Exploited Vulnerabilities catalog
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds SimpleHelp, Samsung, and D-Link flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added SimpleHelp, Samsung, and D-Link flaws to its Known Exploited Vulnerabilities (KEV) catalog. Below…
IT Security News Hourly Summary 2026-04-26 00h : 1 posts
1 posts were published in the last hour 21:55 : IT Security News Daily Summary 2026-04-25
IT Security News Daily Summary 2026-04-25
41 posts were published in the last hour 19:9 : CISA Warns of Multiple SimpleHelp Vulnerabilities Exploited in Attack 19:9 : New Windows RPC Vulnerability Lets Attackers Escalate Privileges Across All Windows Versions 19:5 : IT Security News Hourly Summary…
CISA Warns of Multiple SimpleHelp Vulnerabilities Exploited in Attack
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert regarding two actively exploited vulnerabilities in SimpleHelp remote support software. Remote access tools are highly valued targets for cybercriminals because they provide direct pathways into corporate networks. When…
New Windows RPC Vulnerability Lets Attackers Escalate Privileges Across All Windows Versions
PhantomRPC, a newly identified architectural vulnerability in Windows Remote Procedure Call (RPC) that enables local privilege escalation to SYSTEM-level access, potentially affecting every version of Windows. The research was presented by Kaspersky application security specialist Haidar Kabibo at Black Hat…
IT Security News Hourly Summary 2026-04-25 21h : 1 posts
1 posts were published in the last hour 18:15 : Bengaluru Businessman Duped of Rs 15.45 Crore in Fake CBI ‘Digital Arrest’ Scam
Bengaluru Businessman Duped of Rs 15.45 Crore in Fake CBI ‘Digital Arrest’ Scam
A Bengaluru businessman, Ajit Gopalakrishna Saraf from Belagavi, fell victim to a sophisticated cyber fraud orchestrated by imposters posing as Central Bureau of Investigation (CBI) officials, resulting in a staggering loss of Rs 15.45 crore. The scam unfolded through…
New “optical tornado” technology could transform quantum communication
Scientists have created tiny “optical tornadoes” — swirling beams of light that twist like miniature whirlwinds — using a surprisingly simple setup based on liquid crystals. Instead of relying on complex nanotechnology, the team used self-organizing structures called torons to…
Claude AI Agents Close 186 Deals in Anthropic’s Marketplace Experiment
Anthropic’s “Project Deal” has demonstrated that AI agents can autonomously negotiate and close real-world transactions, but the experiment also surfaced a quiet, troubling asymmetry: not all AI representations are created equal. In December 2025, Anthropic transformed its San Francisco office…
[un]prompted 2026 – Securing Workspace GenAl At Google Speed
Author, Creator & Presenter: Nicolas Lidzborski, Principal Engineer At Google Workspace Security Our thanks to [un]prompted for publishing their Creators, Authors and Presenter’s outstanding [un]prompted 2026 AI Security Practitioner content on the Organizations’ YouTube Channel. Permalink The post [un]prompted 2026…
IT Security News Hourly Summary 2026-04-25 18h : 2 posts
2 posts were published in the last hour 16:2 : Supplier assurance for UK SMEs: a practical guide to checking third parties without overcomplicating it 15:11 : Over 400,000 sites at risk as hackers exploit Breeze Cache plugin flaw (CVE-2026-3844)