vulnerability
Chrome 148 patches 100 vulnerabilities, including 3 critical flaws
This update matters significantly as it patches over double the vulnerabilities from the previous version, covering high-risk, medium-risk, and low-risk security issues. Chrome automatically updates across Windows, macOS, Android, and iOS platforms, though users can manually check via Help menu for immediate protection.
- Information Technology > Security & Privacy (1.00)
- Leisure & Entertainment > Games > Computer Games (0.55)
- Information Technology > Security & Privacy (1.00)
- Information Technology > Artificial Intelligence (1.00)
- Information Technology > Hardware (0.89)
- Information Technology > Communications > Networks (0.32)
Thousands of Vibe-Coded Apps Expose Corporate and Personal Data on the Open Web
Companies like Lovable, Base44, Replit, and Netlify use AI to let anyone build a web app in seconds--and in thousands of cases, spill highly sensitive data onto the public internet. As AI increasingly takes over the work of modern programmers, the cybersecurity world has warned that automated coding tools are sure to introduce a new bounty of hackable bugs into software. When those same vibe-coding tools invite anyone to create applications hosted on the web with a click, however, it turns out the security implications go beyond bugs to a total absence of any security--even, sometimes, for highly sensitive corporate and personal data. Security researcher Dor Zvi and his team at the cybersecurity firm he cofounded, RedAccess, analyzed thousands of vibe-coded web applications created using the AI software development tools Lovable, Replit, Base44, and Netlify and found more than 5,000 of them that had virtually no security or authentication of any kind. Many of these web apps allowed anyone who merely finds their web URL to access the apps and their data.
- Asia (0.29)
- North America > United States (0.14)
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (0.56)
- Information Technology > Security & Privacy (1.00)
- Information Technology > Communications > Social Media (0.97)
- Information Technology > Artificial Intelligence > Natural Language > Chatbot (0.32)
'No one has done this in the wild': study observes AI replicate itself
Cybersecurity experts said the research was interesting, though not alarming at this stage. Cybersecurity experts said the research was interesting, though not alarming at this stage. 'No one has done this in the wild': study observes AI replicate itself It's the stuff of science fiction cinema, or particularly breathless AI company blogposts: new research finds recent AI systems can independently copy themselves on to other computers. In the doom scenario, this means that when the superintelligent AI goes rogue, it will escape shutdown by seeding itself across the world wide web, lurking outside the reach of frantic IT professionals and continuing to plot world domination or paving over the world with solar panels . "We're rapidly approaching the point where no one would be able to shut down a rogue AI, because it would be able to self-exfiltrate its weights and copy itself to thousands of computers around the world," said Jeffrey Ladish, the director of Palisade research, a Berkeley-based organisation which did the study.
- Europe (0.33)
- North America > United States (0.17)
- Information Technology > Security & Privacy (1.00)
- Government (1.00)
Hackers Hate AI Slop Even More Than You Do
Hackers and other cybercriminals are complaining about "AI shit" flooding platforms where they discuss cyberattacks and other illegal activity. "I'm disappointed that you are working to incorporate AI garbage into the site," one annoyed person, posting anonymously, said in an online message. "No-one is asking for this--we want you to improve the site, stop charging for new features." Only, this is not a regular internet user moaning about AI being forced into their favorite app . Instead, they are complaining about a cybercrime forum's plans to introduce more generative AI.
- North America > United States (0.47)
- Europe (0.47)
- Law > Criminal Law (1.00)
- Law Enforcement & Public Safety > Crime Prevention & Enforcement (1.00)
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (0.36)
- Information Technology > Security & Privacy (1.00)
- Information Technology > Communications > Social Media (0.70)
- Information Technology > Artificial Intelligence > Natural Language > Chatbot (0.50)
- Information Technology > Artificial Intelligence > Machine Learning > Neural Networks > Deep Learning > Generative AI (0.38)
Backlash builds over NHS plan to hide source code from AI hacking risk
NHS England is pulling its open-source software from the internet because of fears around computer-hacking AI models like Mythos. A decision by NHS England to withdraw open-source code created with UK taxpayer funds because of the risk posed by computer-hacking AI models is attracting growing backlash. Last month, Mythos, an AI created by technology firm Anthropic, was widely reported to be capable of discovering flaws in virtually any software, potentially allowing hackers to break into systems running it. NHS England has now told staff that existing and future software must be pulled from public view and kept behind closed doors by 11 May because of this risk. The decision goes against the NHS service standard, which requires that staff make any software they produce open-source so that tools can be built upon, improved and used without the need for duplicated effort.
- Information Technology > Software (1.00)
- Information Technology > Communications > Social Media (1.00)
- Information Technology > Artificial Intelligence (1.00)
Disneyland Now Uses Face Recognition on Visitors
Plus: The NSA tests Anthropic's Mythos Preview to find vulnerabilities, a Finnish teen is charged over the Scattered Spider hacking spree, and more. A gunman attempted to enter the White House Correspondents' Dinner in Washington, DC, last weekend, while President Donald Trump, Vice President JD Vance, and other administration officials were in attendance. Media reports and Trump himself quickly identified the suspected shooter as 31-year-old engineer and computer scientist Cole Tomas Allen. The California resident was arrested at the scene on Saturday and appeared Monday in the US District Court for the District of Columbia to face three federal charges: attempting to assassinate the president, transportation of a firearm in interstate commerce, and discharge of a firearm during a crime of violence. The authentication standards body known as the FIDO Alliance announced working groups this week along with Google and Mastercard to develop technical guardrails for validating and protecting transactions initiated by an AI agent .
- North America > United States > California (0.36)
- North America > United States > District of Columbia > Washington (0.25)
Dangerous New Linux Exploit Gives Attackers Root Access to Countless Computers
The exploit, dubbed CopyFail and tracked as CVE-2026-31431, allows hackers to take over PCs and data center servers. The Linux vulnerabilities have been patched--but many machines remain at risk. Publicly released exploit code for an effectively unpatched vulnerability that gives root access to virtually all releases of Linux is setting off alarm bells as defenders scramble to ward off severe compromises inside data centers and on personal devices. The vulnerability and exploit code that exploits it were released Wednesday evening by researchers from security firm Theori, five weeks after privately disclosing it to the Linux kernel security team. The critical flaw, tracked as CVE-2026-31431 and the name CopyFail, is a local privilege escalation, a vulnerability class that allows unprivileged users to elevate themselves to administrators.
- Information Technology > Software > Programming Languages (1.00)
- Information Technology > Security & Privacy (1.00)
- Information Technology > Artificial Intelligence (1.00)
- Information Technology > Communications > Social Media (0.98)
Anthropic's Mythos AI found over 2,000 unknown software vulnerabilities in just seven weeks of testing
This material may not be published, broadcast, rewritten, or redistributed. Quotes displayed in real-time or delayed by at least 15 minutes. Market data provided by Factset . Powered and implemented by FactSet Digital Solutions . Mutual Fund and ETF data provided by LSEG . Toyota's CUE7 robot shoots hoops using AI You don't need an SSN to open a credit card: Scammers know that Mexico's climate supercomputer could change forecasting Watters' Cooler: America got catfished US has to'get creative' in combat in Iranian waters: Joey Jones Michael Easter and Gary Brecka discuss the'choice' to live to be 100 Microsoft Anthropic's Mythos AI found over 2,000 unknown software vulnerabilities in just seven weeks of testing Fox News Flash top headlines are here. Check out what's clicking on FoxNews.com.
- Media > News (1.00)
- Government > Regional Government > North America Government > United States Government (0.69)
- Government > Military > Cyberwarfare (0.48)
Discord Sleuths Gained Unauthorized Access to Anthropic's Mythos
Plus: Spy firms tap into a global telecom weakness to track targets, 500,000 UK health records go up for sale on Alibaba, Apple patches a revealing notification bug, and more. As researchers and practitioners debate the impact that new AI models will have on cybersecurity, Mozilla said on Tuesday it used early access to Anthropic's Mythos Preview to find and fix 271 vulnerabilities in its new Firefox 150 browser release. Meanwhile, researchers identified a group of moderately successful North Korean hackers using AI for everything from vibe coding malware to creating fake company websites--stealing up to $12 million in three months. Researchers have finally cracked disruptive malware known as Fast16 that predates Stuxnet and may have been used to target Iran's nuclear program. It was created in 2005 and was likely deployed by the US or an ally.
- North America > United States (1.00)
- Europe (0.95)
- Asia > Middle East > Iran (0.25)
Do you need to worry about Mythos, Anthropic's computer-hacking AI?
Do you need to worry about Mythos, Anthropic's computer-hacking AI? A powerful AI kept from public access because of its ability to hack computers with impunity is making headlines around the world. But what is Mythos, does it really represent a risk and might it even be used to improve cybersecurity? Anthropic's Project Glasswing aims to improve online security The past few weeks have brought apparently alarming news of Mythos, an AI that can identify cybersecurity flaws in a matter of moments, leaving operating systems and software vulnerable to hackers. The cybersecurity community is now beginning to get a better sense of how Mythos may change the face of cybersecurity - and not necessarily for the worse.
- Europe > United Kingdom > England > Surrey (0.05)
- Asia > Middle East > Iran (0.05)
- Information Technology > Security & Privacy (1.00)
- Government > Military (0.98)