4 – Breaking News & Latest Updates 2026
Skip to main content

Security

Cybersecurity is the rickety scaffolding supporting everything you do online. For every new feature or app, there are a thousand different ways it can break – and a hundred of those can be exploited by criminals for data breaches, identity theft, or outright cyber heists. Staying ahead of those exploits is a full-time job, and one of the most lucrative and sought-after skills in the tech industry. All too often, it’s something up-and-coming companies decide to skip out on, only to pay the price later on.

Richard Lawler
Richard Lawler
BreachForums founder resentenced to three years in prison.

Conor Brian Fitzpatrick, aka PomPompurin, is linked to crimes including the 2021 breach that sent out fake cybersecurity warning emails from the FBI. After pleading guilty to one count of access device conspiracy, one count of access device solicitation, and one count of possession of child sexual abuse material, he was originally sentenced to 20 years of supervised release.

Elissa Welle
Elissa Welle
AI chatbots can help perfect a phishing scam, despite being trained not to.

Six of the major AI chatbots - Grok, ChatGPT, Meta AI, Claude, DeepSeek, and Gemini - effectively guided a team of Reuters reporters through the steps of simulating a phishing scam, down to describing a good time to send a message intended to trick older adults into clicking on a fraudulent link.

Emma Roth
Emma Roth
No, Gmail did not send out a mass security warning.

In a blog post, Google addresses several recent reports that incorrectly state it sent out a widespread security notification about Gmail, calling them “entirely false:”

Our teams invest heavily, innovate constantly, and communicate clearly about the risks and protections we have in place. It’s crucial that conversation in this space is accurate and factual.

Emma Roth
Emma Roth
Coinbase attempts to thwart North Korean hackers with in-person worker orientation.

During the Cheeky Pint podcast, Coinbase CEO Brian Armstrong said the new safeguard comes in response to the wave of North Korean hackers who are snapping up remote IT jobs around the US, allowing them to obtain sensitive company information and funnel paychecks to the North Korean regime.

Emma Roth
Emma Roth
Apple issues a security patch for the iPhone, iPad, and Mac.

A vulnerability (CVE-2025-43300) stemming from Apple’s image processing framework, “may have been exploited in an extremely sophisticated attack against specific targeted individuals,” according to Apple.

Apple has rolled out a patch for iOS 18.6.2, iPadOS 18.6.2, macOS Sequoia 15.6.1, and other OS versions listed here.

Elizabeth Lopatto
Elizabeth Lopatto
Server farm experiences party fowl.

This is just a fun little series of Mastodon posts about a security breach at a “highly secure” data center... by a female mallard.

Pepijn@Pepijn@mastodon.onlineI’m on the server floor of a “highly secure data center with 24/7/365 surveillance, direct access control and robust perimeter security”.An actual duck just walked by. 🦆 The panic is absolutely glorious. I think this just became one of the highlights of my life.
Dominic Preston
Dominic Preston
Federal courts hit by hack.

Politico reports that the courts’ case filing system was accessed. The breach was discovered last month, but its full extent is still unknown — one fear is that hackers may have accessed the identities of confidential informants, while a source told Politico that court dockets may have been tampered with.

Lauren Feiner
Lauren Feiner
Another “tea” app is reportedly leaking users’ personal information.

After 404 Media reported that an app meant to help women exchange dating information for safety purposes was breached, TechCrunch reports that a rival app targeted at men has been exposing users’ personal data including government IDs. “The security lapse will likely affect any user who signed up or shared identity documents with the app,” TechCrunch writes about TeaOnHer, adding that the app has about 53,000 users.

Richard Lawler
Richard Lawler
This is how malicious hackers could exploit Gemini AI to control a smart home.

This Wired article shows how an indirect prompt injection attack against a Gemini-powered AI assistant could cause the bot to curse in responses and take over smart home controls by turning on the heat unexpectedly or opening blinds in response to saying “thanks.”

In a report dubbed “Invitation is all you need” (Sound familiar?), their Google Calendar invite passed instructions to the AI bot that were triggered by asking for a summary. Google was informed of the vulnerabilities they found in February and said it has already introduced “multiple fixes.”

Richard Lawler
Richard Lawler
1Password on Android got updated to fix Chrome autofill problems.

If you also use 1Password and have an Android device, you may have also been dealing with autofill problems lately. However, updating to version 8.11.4 or higher and following the instructions to make sure Chrome is set to use third-party autofill seems to have worked on my phone to make the app more reliable again.

According to 1Password, the need to update its app and an uneven update rollout from Google caused a gap as Chrome switched from the old compatibility mode approach to the new native autofill experience.

Elizabeth Lopatto
Elizabeth Lopatto
The Anime Nazi has bank accounts and routing numbers for Columbia applicants.

As well as class schedules, scholarship disbursements, and student loan information. Neat! At least Bloomberg finally got around to telling its audience that the alleged hacker’s X account “includes a racist handle and racist remarks.” I wonder what a Nazi can accomplish with all this sensitive information? I guess we’ll find out.

Tom Warren
Tom Warren
Microsoft has an AI agent that can detect malware.

Microsoft is announcing Project Ire today, an autonomous AI agent that can analyze and classify malware without assistance. Developed by Microsoft Research, Microsoft Defender Research, and Microsoft Discovery & Quantum, Project Ire is the first agent at Microsoft to independently author a conviction case “strong enough to justify automatic blocking” of an APT malware sample.

Tom Warren
Tom Warren
Microsoft’s Black Hat-like hacking event returns with bigger rewards.

Microsoft’s hacking event, Zero Day Quest, is back and accepting nominations today until October 4th. This year there is up to $5 million in bounty awards, up $1 million on last year’s figure. Microsoft is even offering multiplied bounty awards for the most critical issues in products like Azure, Copilot, and Microsoft 365. Security researchers will also get a chance to qualify for a live hacking event at Microsoft’s headquarters in spring 2026.

Emma Roth
Emma Roth
Proton is adding yet another privacy-focused app to its arsenal.

The company has introduced Proton Authenticator, an open-source two-factor authentication app that can sync 2FA codes across devices using end-to-end encryption. Though Proton’s password manager already comes with a built-in 2FA feature, Proton says using its standalone Authenticator offers an “extra layer of security” by generating codes in a separate app.

Proton Authentication is available for free on Android, iOS, Windows, macOS, and Linux.

Image: Proton
Dominic Preston
Dominic Preston
Google says the UK never ordered encryption access.

Until now it’s stayed quiet on whether it received the same order to open a backdoor to user data as Apple, but a spokesperson confirmed to TechCrunch that it never did. If it had, Google wouldn’t be allowed to say so.

Apple has pulled iCloud encryption from the UK and appealed its order in the courts. Last week it was reported that the UK is ready to give up the fight following US political pressure.

Women’s ‘red flag’ app Tea is a privacy nightmare

After last week’s hack, the app has been breached again.

Tanya Tianyi Chen
Emma Roth
Emma Roth
Microsoft uncovered a security flaw affecting macOS’s Spotlight.

The vulnerability (CVE-2025-31199), which Apple patched in a March 31st update, could give bad actors access to files inside a device’s Downloads folder and data cached by Apple Intelligence. That includes geolocation data, media metadata, and facial recognition info, according to a report from Microsoft Threat Intelligence.

Security researchers discovered the flaw after using Spotlight plugins to bypass a security feature made to prevent third-party services from gaining access to user data.

Elizabeth Lopatto
Elizabeth Lopatto
I just wanted to do a little media criticism!

I appeared on On the Media to discuss our story about the Anime Nazi who allegedly hacks universities. I explain why the identity of the alleged hacker is important, why the Times’ obfuscation of its sources is troubling, and what’s at stake in the Republican war on higher education: upward mobility.

Lauren Feiner
Lauren Feiner
A senator is trying to find out how secure US telecom networks are after a major hack.

Senate Commerce Committee Ranking Member Maria Cantwell (D-WA) is hunting for answers about the state of US telecom network security after the Salt Typhoon hack first reported late last year. The attack was so massive that US officials encouraged Americans to use encrypted apps to prevent their conversations from being seen by hackers. Cantwell is asking digital forensics firm Mandiant to hand over assessments behind AT&T and Verizon’s claims that their networks are now secure.

Cantwell letter to Mandiant

[commerce.senate.gov]