{"id":124,"date":"2024-12-09T12:12:32","date_gmt":"2024-12-09T17:12:32","guid":{"rendered":"https:\/\/sites.udmercy.edu\/cyberclub\/?page_id=124"},"modified":"2025-02-06T21:15:46","modified_gmt":"2025-02-07T02:15:46","slug":"external-news","status":"publish","type":"page","link":"https:\/\/sites.udmercy.edu\/cyberclub\/external-news\/","title":{"rendered":"External News"},"content":{"rendered":"\n<h2 class=\"has-text-align-center\">Krebs On Security<\/h2>\n\n\n<ul class=\"is-grid columns-3 has-dates has-excerpts wp-block-rss\"><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/krebsonsecurity.com\/2026\/04\/scattered-spider-member-tylerb-pleads-guilty\/'>\u2018Scattered Spider\u2019 Member \u2018Tylerb\u2019 Pleads Guilty<\/a><\/div><time datetime=\"\" class=\"wp-block-rss__item-publish-date\">April 21, 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">A 24-year-old British national and senior member of the cybercrime group &quot;Scattered Spider&quot; has pleaded guilty to wire fraud conspiracy and aggravated identity theft. Tyler [&hellip;]<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/krebsonsecurity.com\/2026\/04\/patch-tuesday-april-2026-edition\/'>Patch Tuesday, April 2026 Edition<\/a><\/div><time datetime=\"\" class=\"wp-block-rss__item-publish-date\">April 14, 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">Microsoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-day [&hellip;]<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/krebsonsecurity.com\/2026\/04\/russia-hacked-routers-to-steal-microsoft-office-tokens\/'>Russia Hacked Routers to Steal Microsoft Office Tokens<\/a><\/div><time datetime=\"\" class=\"wp-block-rss__item-publish-date\">April 7, 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">Hackers linked to Russia&#039;s military intelligence units are using known flaws in older Internet routers to mass harvest authentication tokens from Microsoft Office users, security [&hellip;]<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/krebsonsecurity.com\/2026\/04\/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab\/'>Germany Doxes \u201cUNKN,\u201d Head of RU Ransomware Gangs REvil, GandCrab<\/a><\/div><time datetime=\"\" class=\"wp-block-rss__item-publish-date\">April 6, 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">An elusive hacker who went by the handle &quot;UNKN&quot; and ran the early Russian ransomware groups GandCrab and REvil now has a name and a [&hellip;]<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/krebsonsecurity.com\/2026\/03\/canisterworm-springs-wiper-attack-targeting-iran\/'>\u2018CanisterWorm\u2019 Springs Wiper Attack Targeting Iran<\/a><\/div><time datetime=\"\" class=\"wp-block-rss__item-publish-date\">March 23, 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">A financially motivated data theft and extortion group is attempting to inject itself into the Iran war, unleashing a worm that spreads through poorly secured [&hellip;]<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/krebsonsecurity.com\/2026\/03\/feds-disrupt-iot-botnets-behind-huge-ddos-attacks\/'>Feds Disrupt IoT Botnets Behind Huge DDoS Attacks<\/a><\/div><time datetime=\"\" class=\"wp-block-rss__item-publish-date\">March 20, 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">The U.S. Justice Department joined authorities in Canada and Germany in dismantling the online infrastructure behind four highly disruptive botnets that compromised more than three [&hellip;]<\/div><\/li><\/ul>\n\n\n<h2 class=\"has-text-align-center\">Secure World<\/h2>\n\n\n<ul class=\"is-grid columns-3 has-dates has-excerpts wp-block-rss\"><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.secureworld.io\/industry-news\/microsoft-vulnerabilities-report-2026'>2026 Microsoft Vulnerabilities Report: Why Less Actually Means More Risk<\/a><\/div><time datetime=\"\" class=\"wp-block-rss__item-publish-date\">April 21, 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">In cybersecurity, we often look for comfort in the numbers. If total vulnerability counts are down, we assume the defense [&hellip;]<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.secureworld.io\/industry-news\/leadership-age-of-ai'>Leadership in the Age of AI<\/a><\/div><time datetime=\"\" class=\"wp-block-rss__item-publish-date\">April 20, 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">Last week, I posted an article about how AI makes us more efficient\u00a0but actually makes us work more.<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.secureworld.io\/industry-news\/nist-nvd-course-correction'>The NVD Course Correction: Navigating NIST\u2019s Strategic Pivot for 2026<\/a><\/div><time datetime=\"\" class=\"wp-block-rss__item-publish-date\">April 17, 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">For the better part of the last two years, the cybersecurity community has watched the National Vulnerability Database (NVD) with [&hellip;]<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.secureworld.io\/industry-news\/openai-launches-gpt-5.4-cyber-expands-trusted-access-program-as-ai-defense-race-heats-up'>OpenAI Launches GPT-5.4-Cyber, Expands Trusted Access Program as AI Defense Race Heats Up<\/a><\/div><time datetime=\"\" class=\"wp-block-rss__item-publish-date\">April 16, 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">One week after Anthropic unveiled its Mythos frontier model \u2014 deployed in a controlled manner through Project Glasswing \u2014 OpenAI [&hellip;]<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.secureworld.io\/industry-news\/anthropics-claude-mythos-signals-a-new-era-in-ai-powered-cybersecurity-and-a-race-no-one-is-ready-for'>Anthropic&#039;s Claude Mythos Signals a New Era in AI-Powered Cybersecurity\u2014and a Race No One Is Ready For<\/a><\/div><time datetime=\"\" class=\"wp-block-rss__item-publish-date\">April 16, 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">On March 26, 2026, a routine configuration error at Anthropic inadvertently left thousands of unpublished internal assets publicly accessible on [&hellip;]<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.secureworld.io\/industry-news\/zionsiphon-ot-warfare'>ZionSiphon: The Prototype for the Next Generation of OT Warfare<\/a><\/div><time datetime=\"\" class=\"wp-block-rss__item-publish-date\">April 16, 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">As geopolitical tensions between the U.S., Israel, and Iran continue to simmer, the cybersecurity front has often been characterized by [&hellip;]<\/div><\/li><\/ul>\n\n\n<h2 class=\"has-text-align-center\">Dark Reading<\/h2>\n\n\n<ul class=\"is-grid columns-3 has-dates has-excerpts wp-block-rss\"><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.darkreading.com\/cyberattacks-data-breaches\/surge-bomgar-rmm-exploitation-demonstrates-supply-chain-risk'>Surge in Bomgar RMM Exploitation Demonstrates Supply Chain Risk<\/a><\/div><time datetime=\"\" class=\"wp-block-rss__item-publish-date\">April 21, 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">The critical remote code execution flaw (CVE-2026-1731) in the remote monitoring and management tool can be exploited to spread ransomware [&hellip;]<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.darkreading.com\/vulnerabilities-threats\/google-fixes-critical-rce-flaw-ai-based-antigravity-tool'>Google Fixes Critical RCE Flaw in AI-Based Antigravity Tool<\/a><\/div><time datetime=\"\" class=\"wp-block-rss__item-publish-date\">April 21, 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">The prompt injection vulnerability in the agentic AI product for filesystem operations was a sanitization issue that allowed for sandbox [&hellip;]<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.darkreading.com\/cyberattacks-data-breaches\/chinese-apt-indian-banks-korean-policy'>Chinese APT Targets Indian Banks, Korean Policy Circles<\/a><\/div><time datetime=\"\" class=\"wp-block-rss__item-publish-date\">April 21, 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">China is spying on India&#039;s financial sector, for some reason, and it&#039;s not putting much effort into it, judging by [&hellip;]<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.darkreading.com\/application-security\/vercel-employees-ai-tool-access-data-breach'>Vercel Employee&#039;s AI Tool Access Led to Data Breach<\/a><\/div><time datetime=\"\" class=\"wp-block-rss__item-publish-date\">April 20, 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">Stolen OAuth tokens, which are at the root of these breaches, &quot;are the new attack surface, the new lateral movement,&quot; [&hellip;]<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.darkreading.com\/ics-ot-security\/serial-ip-devices-thousands-of-bugs'>Serial-to-IP Devices Hide Thousands of Old &amp;amp; New Bugs<\/a><\/div><time datetime=\"\" class=\"wp-block-rss__item-publish-date\">April 20, 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">The OT devices that translate machine talk into Internet-speak are riddled with vulnerabilities and more frequently targeted for attacks, researchers [&hellip;]<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.darkreading.com\/endpoint-security\/whatsapp-leaks-user-metadata'>WhatsApp Leaks User Metadata to Attackers<\/a><\/div><time datetime=\"\" class=\"wp-block-rss__item-publish-date\">April 20, 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">Strangers can infer limited info about you without knowing or messaging you, which could theoretically aid certain kinds of malicious [&hellip;]<\/div><\/li><\/ul>","protected":false},"excerpt":{"rendered":"<p>Krebs On Security Secure World Dark Reading<\/p>\n","protected":false},"author":65,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ngg_post_thumbnail":0},"_links":{"self":[{"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/pages\/124"}],"collection":[{"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/comments?post=124"}],"version-history":[{"count":4,"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/pages\/124\/revisions"}],"predecessor-version":[{"id":254,"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/pages\/124\/revisions\/254"}],"wp:attachment":[{"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/media?parent=124"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}