US judge dismisses Musk’s fraud claims in OpenAI case at his request
A US judge has dismissed Elon Musk’s fraud claims in his lawsuit accusing OpenAI and co-founder Sam Altman of betraying OpenAI’s original mission, but plans…
A US judge has dismissed Elon Musk’s fraud claims in his lawsuit accusing OpenAI and co-founder Sam Altman of betraying OpenAI’s original mission, but plans…
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Morpheus: A new Spyware linked to…
The Italian government has decided to extradite a Chinese man wanted by US authorities on hacking charges that include stealing Covid-19 medical research, a person…
On November 8, 2023, SysAid published an advisory expressing that their on-premise server software had a previously undisclosed vulnerability and is aware of public in-the-wild…
Cybersecurity researchers at the identity protection firm Silverfort found a vulnerability in a Microsoft platform built to manage AI. The issue involved Microsoft Entra Agent…
Ravie LakshmananApr 22, 2026Vulnerability / Container Security A critical security vulnerability has been disclosed in a Python-based sandbox called Terrarium that could result in arbitrary…
The US State Department has ordered a global push to bring attention to what it says are widespread efforts by Chinese companies, including AI startup DeepSeek,…
Critical bug in CrowdStrike LogScale let attackers access files Pierluigi Paganini April 26, 2026 CrowdStrike fixed CVE-2026-40050 in LogScale self-hosted, a critical flaw allowing unauthenticated…
Small and medium-sized businesses (SMBs) often find themselves in the crosshairs of today’s cybercriminals. While the spotlight often shines on high-profile breaches affecting corporate giants,…
Utility technology company Itron, Inc. has disclosed that an unauthorized third party accessed some of its internal systems during a cyberattack. The company states that…
State-sponsored threat actors are actively targeting Cisco Firepower devices by chaining known vulnerabilities to deploy a highly customized backdoor. Cisco Talos recently discovered that the…
Ravie LakshmananApr 22, 2026Cyber Espionage / Malware Cybersecurity researchers have discovered a new variant of a known malware called LOTUSLITE that’s distributed via a theme…