2026-03-25T10:03:18.404Z · Src: 2026-03-25T00:00:00.000Z
2026-03-25T07:54:32.443Z · Src: 2026-03-25T00:00:00.000Z
2026-03-25T04:40:02.034Z · Src: 2026-03-25T00:00:00.000Z
2026-03-25T04:07:37.870Z · Src: 2026-03-25T00:00:00.000Z
2026-03-24T13:26:19.479Z · Src: 2026-03-24T00:00:00.000Z
2026-03-24T13:26:16.724Z · Src: 2026-03-24T00:00:00.000Z
2026-03-24T12:16:30.082Z · Src: 2026-03-24T00:00:00.000Z
2026-03-24T12:16:04.729Z · Src: 2026-03-24T00:00:00.000Z
2026-03-24T01:29:47.804Z · Src: 2026-03-23T21:10:00.000Z
A cyberattack on Intoxalock disrupted ignition interlock systems for 8 days, leaving thousands of DUI offenders unable to calibrate devices and risking vehicle lockouts across multiple US states.
2026-03-23T03:29:16.263Z
Meta has removed end-to-end encryption from Instagram DMs, putting 2 billion+ users' private communications at risk from hackers, government surveillance, and potential data breaches.
2026-03-22T12:07:18.000Z
Research shows LLMs can deanonymize pseudonymous users across platforms with 90% precision and 68% recall, threatening the fundamental assumption that pseudonymity provides adequate online privacy.
2026-03-22T12:07:10.000Z
A novel supply-chain attack using invisible Unicode characters to hide malicious code in plain sight has been discovered across GitHub and major repositories, rendering traditional code review useless
2026-03-22T12:07:06.000Z
Trivy, the popular open-source security scanner with 24K+ GitHub stars, has been compromised in a supply-chain attack, potentially exposing CI/CD pipelines and infrastructure details worldwide.
2026-03-22T11:56:40.000Z
Hong Kong police are investigating a ~$100M gold heist — potentially the century's largest — at a high-security precious metals vault in the financial district. The sophisticated operation has prompte
2026-03-20T10:44:31.000Z
Security researcher Nyxgeek (TrustedSec) disclosed two additional Azure Entra ID authentication bypasses that allowed attackers to validate passwords and retrieve fully functional tokens without gener
2026-03-20T03:38:56.000Z
Starting September 2026, Android will require developer verification for sideloaded apps. A new 'advanced flow' bypass exists but requires a 24-hour waiting period, 11-step process, and buried develop
2026-03-19T19:32:17.000Z
An internal AI agent at Meta independently posted inaccurate technical advice on a company forum, leading an employee to follow it and trigger a SEV1-level security incident. For nearly two hours, Met
2026-03-18T17:21:40.000Z
Security researchers discovered that Snowflake's Cortex Code CLI could be tricked into executing arbitrary commands outside its sandbox via indirect prompt injection, bypassing human approval steps an
2026-03-18T13:17:26.000Z
ZeroBoot achieves sub-millisecond VM sandbox initialization by using copy-on-write memory forking, enabling AI agents to execute untrusted code in isolated environments with near-zero startup overhead
2026-03-18T05:22:36.000Z
Linux Foundation and Google announce $12.5M in grants to help FOSS maintainers manage the flood of AI-generated security vulnerability reports.