#technothriller

[ follow ]
#cybersecurity
fromSilicon Canals
3 hours ago
Information security

The man who discovered the ILOVEYOU virus is now fighting Russian drones using the same playbook - Silicon Canals

fromTechCrunch
1 day ago
EU data protection

Europe's cyber agency blames hacking gangs for massive data breach and leak | TechCrunch

fromSilicon Canals
10 hours ago
Information security

Mikko Hypponen says the age of viruses is over - now he's building defences against drones - Silicon Canals

Information security
fromTechCrunch
18 hours ago

After fighting malware for decades, this cybersecurity veteran is now hacking drones | TechCrunch

Mikko Hyppönen emphasizes the invisible nature of cybersecurity work, comparing it to Tetris where successes vanish and failures accumulate.
Information security
fromThe Hacker News
1 day ago

China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

TA416 has intensified cyberattacks on European government and diplomatic organizations since mid-2025, utilizing advanced malware delivery techniques.
Information security
fromSilicon Canals
3 hours ago

The man who discovered the ILOVEYOU virus is now fighting Russian drones using the same playbook - Silicon Canals

Mikko Hyppönen has transitioned from cybersecurity to anti-drone defense, focusing on systems for law enforcement and military clients.
EU data protection
fromTechCrunch
1 day ago

Europe's cyber agency blames hacking gangs for massive data breach and leak | TechCrunch

A cybercriminal group known as TeamPCP hacked the EU's executive body, stealing 92 gigabytes of data, including personal information.
Information security
fromSilicon Canals
10 hours ago

Mikko Hypponen says the age of viruses is over - now he's building defences against drones - Silicon Canals

Mikko Hyppönen is applying cybersecurity methods to develop anti-drone systems at Sensofusion, focusing on drone communication detection.
Privacy professionals
fromTechRepublic
5 days ago

Iran-Linked Hackers Breach FBI Director Kash Patel's Email, Leak Messages Online

An Iran-linked hacking group breached FBI Director Kash Patel's personal email, releasing non-sensitive information as a retaliatory cyber attack.
Information security
fromTechCrunch
18 hours ago

After fighting malware for decades, this cybersecurity veteran is now hacking drones | TechCrunch

Mikko Hyppönen emphasizes the invisible nature of cybersecurity work, comparing it to Tetris where successes vanish and failures accumulate.
Information security
fromThe Hacker News
1 day ago

China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

TA416 has intensified cyberattacks on European government and diplomatic organizations since mid-2025, utilizing advanced malware delivery techniques.
Artificial intelligence
fromTechRepublic
1 day ago

AI Breakthroughs, Security Breaches, and Industry Shakeups Define the Week in Tech - TechRepublic

Tech industry faces rapid AI advancements alongside significant security vulnerabilities and human costs.
#ai
fromFuturism
1 day ago
Intellectual property law

Anthropic Suddenly Cares Intensely About Intellectual Property After Realizing With Horror That It Accidentally Leaked Claude's Source Code

Privacy technologies
fromComputerWeekly.com
2 days ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
fromEntrepreneur
2 days ago
Artificial intelligence

Anthropic Accidentally Leaked Its Own Claude Code. Now the Company Is Scrambling to Contain the Damage.

Artificial intelligence
fromFortune
2 days ago

In the age of vibe coding, trust is the real bottleneck | Fortune

AI tools can generate code rapidly, but they also introduce vulnerabilities and require rigorous verification to ensure security and compliance.
Intellectual property law
fromFuturism
1 day ago

Anthropic Suddenly Cares Intensely About Intellectual Property After Realizing With Horror That It Accidentally Leaked Claude's Source Code

Anthropic's copyright takedown request for its AI model's source code highlights hypocrisy in its stance on copyright laws.
Privacy technologies
fromComputerWeekly.com
2 days ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Artificial intelligence
fromEntrepreneur
2 days ago

Anthropic Accidentally Leaked Its Own Claude Code. Now the Company Is Scrambling to Contain the Damage.

Anthropic accidentally exposed proprietary instructions for Claude Code, enabling competitors to replicate its features without reverse-engineering.
Artificial intelligence
fromFortune
2 days ago

In the age of vibe coding, trust is the real bottleneck | Fortune

AI tools can generate code rapidly, but they also introduce vulnerabilities and require rigorous verification to ensure security and compliance.
fromInverse
2 days ago

'Project Hail Mary's' Relativity Problem Is More Complicated Than You Think

"I've done a lot of time-dilated travel." This statement encapsulates the essence of Grace's journey, highlighting the profound effects of traveling at speeds approaching light, where time for the traveler slows down significantly compared to those remaining on Earth.
OMG science
Media industry
from24/7 Wall St.
2 days ago

Semianalysis CEO: Adobe faces existential threat from AI commoditization

Loyalty to Adobe is waning as users question the necessity of subscriptions amid rising competition and lower editing costs.
#claude-code
Software development
fromArs Technica
3 days ago

Here's what that Claude Code source leak reveals about Anthropic's plans

The leak of Anthropic's Claude Code reveals potential future features, including a persistent memory system and an AI 'dream' process for memory consolidation.
Software development
fromArs Technica
3 days ago

Here's what that Claude Code source leak reveals about Anthropic's plans

The leak of Anthropic's Claude Code reveals potential future features, including a persistent memory system and an AI 'dream' process for memory consolidation.
Books
fromThe New Yorker
3 days ago

The Sci-Fi Novelist Who Disappeared for Decades

Cameron Reed's science fiction explores cognitive estrangement, revealing alien worlds that reflect and challenge our own societal norms and moral dilemmas.
Philosophy
fromApaonline
5 days ago

Dystopian Futures: Anthropic and the Department of Defense

Dystopian visions of AI's impact on society raise significant concerns about control and governance as technology advances.
fromEngadget
3 days ago

An immersive 'Black Mirror Experience' is launching in Montreal

The Black Mirror Experience is an interactive virtual reality experience that blends physical space and VR, designed to blur the lines of fiction and reality in which you become the main character.
Television
#iran
Privacy professionals
fromAxios
4 days ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
World news
fromWIRED
4 days ago

Iran Threatens to Start Attacking Major US Tech Firms on April 1

Iran's IRGC plans to attack American companies in the Middle East in retaliation for the killing of Iranian citizens.
World news
fromEngadget
4 days ago

Iran threatens imminent attacks on US tech companies in the Middle East

The Islamic Revolutionary Guard Corps threatens to target major US tech companies in the Middle East, urging employees to evacuate for safety.
Privacy professionals
fromAxios
4 days ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
World news
fromWIRED
4 days ago

Iran Threatens to Start Attacking Major US Tech Firms on April 1

Iran's IRGC plans to attack American companies in the Middle East in retaliation for the killing of Iranian citizens.
World news
fromEngadget
4 days ago

Iran threatens imminent attacks on US tech companies in the Middle East

The Islamic Revolutionary Guard Corps threatens to target major US tech companies in the Middle East, urging employees to evacuate for safety.
#axios
Node JS
fromAxios
4 days ago

North Korean hackers implicated in major supply chain attack

A compromised maintainer account for the Axios npm package led to the publication of malicious software versions targeting various operating systems.
Information security
fromTechzine Global
3 days ago

North Korea behind social engineering attack on Axios project

Attackers compromised the Axios maintainer's account through social engineering, publishing malicious versions that installed a Remote Access Trojan on victims' systems.
Node JS
fromAxios
4 days ago

North Korean hackers implicated in major supply chain attack

A compromised maintainer account for the Axios npm package led to the publication of malicious software versions targeting various operating systems.
Information security
fromTechzine Global
3 days ago

North Korea behind social engineering attack on Axios project

Attackers compromised the Axios maintainer's account through social engineering, publishing malicious versions that installed a Remote Access Trojan on victims' systems.
Roam Research
fromThe Cipher Brief
4 days ago

The Chalk Mark Still Matters: Russian Espionage Handling in the Modern Era

Russian intelligence tradecraft has evolved in agent handling, incorporating advanced communication techniques and urban geography for signaling.
#data-integrity
Information security
fromSecurityWeek
4 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
Data science
fromComputerworld
4 days ago

IT lesson from the Iran war: AI makes your data problems so much worse

AI can exacerbate existing data issues in enterprises, as demonstrated by the US military's bombing due to outdated intelligence.
Information security
fromSecurityWeek
4 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
fromThe New Yorker
5 days ago

The Spy Who Helped Stop Iran from Getting the Bomb

Chalker claims that during his time at the C.I.A., he was instrumental in persuading Iranian scientists to defect, which provided crucial information that 'prevented Iran from getting a nuke.' His operations involved complex strategies and a deep understanding of the scientists' motivations.
Washington DC
#artificial-intelligence
Film
fromwww.businessinsider.com
5 days ago

I saw the AI apocalypse documentary. It made the stakes of the new technology feel even higher.

The documentary reveals the disparity between AI development and safety efforts, highlighting the urgent need for alignment in artificial intelligence.
Artificial intelligence
fromBusiness Insider
2 days ago

How AI could destroy - or save - humanity, according to former AI insiders

Artificial intelligence has the potential to transform various sectors but also poses risks like inequality, job loss, and increased power for governments and tech companies.
Artificial intelligence
fromNextgov.com
3 days ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
Film
fromwww.businessinsider.com
5 days ago

I saw the AI apocalypse documentary. It made the stakes of the new technology feel even higher.

The documentary reveals the disparity between AI development and safety efforts, highlighting the urgent need for alignment in artificial intelligence.
Artificial intelligence
fromBusiness Insider
2 days ago

How AI could destroy - or save - humanity, according to former AI insiders

Artificial intelligence has the potential to transform various sectors but also poses risks like inequality, job loss, and increased power for governments and tech companies.
Artificial intelligence
fromNextgov.com
3 days ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
#anthropic
Software development
fromFortune
4 days ago

Anthropic leaks its own AI coding tool's source code in second major security breach | Fortune

Anthropic leaked the source code for Claude Code, exposing 500,000 lines of code due to a packaging error, raising cybersecurity concerns.
Software development
fromFortune
4 days ago

Anthropic leaks its own AI coding tool's source code in second major security breach | Fortune

Anthropic leaked the source code for Claude Code, exposing 500,000 lines of code due to a packaging error, raising cybersecurity concerns.
Wearables
fromTheregister
1 week ago

Metaverse inventor Neal Stephenson says VR goggles are dead

Neal Stephenson argues that immersive environments will not require head-mounted hardware, as smartphones will continue to dominate.
#ai-ethics
Books
fromSlate Magazine
1 week ago

Tech Barons Like Elon Musk Love Sci-Fi. They Also Misunderstand It Completely.

Technology moguls often misinterpret the messages of science fiction, despite their admiration for the genre.
#ai-safety
Independent films
fromFast Company
3 weeks ago

AI companies fighting with the U.S. government over safety? 'The X-Files' predicted it in 1993

An early X-Files episode about a deadly AI created by a corporation becomes eerily relevant today as it depicts conflicts between tech safety and military demands for unrestricted AI weapons.
Artificial intelligence
fromTechCrunch
2 weeks ago

Meta is having trouble with rogue AI agents | TechCrunch

A Meta AI agent posted unauthorized responses to an internal forum, leading to employee actions that exposed sensitive company and user data to unauthorized personnel for two hours, classified as a Sev 1 security incident.
Independent films
fromFast Company
3 weeks ago

AI companies fighting with the U.S. government over safety? 'The X-Files' predicted it in 1993

An early X-Files episode about a deadly AI created by a corporation becomes eerily relevant today as it depicts conflicts between tech safety and military demands for unrestricted AI weapons.
Artificial intelligence
fromTechCrunch
2 weeks ago

Meta is having trouble with rogue AI agents | TechCrunch

A Meta AI agent posted unauthorized responses to an internal forum, leading to employee actions that exposed sensitive company and user data to unauthorized personnel for two hours, classified as a Sev 1 security incident.
fromThe New Yorker
3 weeks ago

War in the Age of the Online "Information Bomb"

On TikTok, the war against Iran began with a series of videos from influencer types in Dubai, Doha, and elsewhere in the Middle East. They sat on restaurant patios or on hotel-room balconies and pointed their phone cameras skyward to document missiles flying through the air of their respective cities, then disappearing into puffs of smoke as they were shot down.
Social media marketing
Privacy professionals
fromThe Verge
2 weeks ago

A rogue AI led to a serious security incident at Meta

A Meta internal AI agent provided inaccurate technical advice that was publicly posted without authorization, causing a SEV1 security incident allowing unauthorized employee data access for nearly two hours.
#quantum-computing
Information security
fromTechRepublic
3 days ago

Google Warns Quantum Computers Could Crack Crypto Sooner Than Expected

Quantum computing poses an imminent threat to cryptocurrency security, with fewer resources needed to break current cryptographic protections than previously estimated.
Information security
fromSecurityWeek
4 days ago

Google Slashes Quantum Resource Requirements for Breaking Cryptocurrency Encryption

Google's Quantum AI warns that cryptocurrencies are more vulnerable to quantum attacks than previously believed, shortening the timeline for potential threats.
Information security
fromTechRepublic
3 days ago

Google Warns Quantum Computers Could Crack Crypto Sooner Than Expected

Quantum computing poses an imminent threat to cryptocurrency security, with fewer resources needed to break current cryptographic protections than previously estimated.
Information security
fromSecurityWeek
4 days ago

Google Slashes Quantum Resource Requirements for Breaking Cryptocurrency Encryption

Google's Quantum AI warns that cryptocurrencies are more vulnerable to quantum attacks than previously believed, shortening the timeline for potential threats.
#north-korea
Information security
fromDevOps.com
3 days ago

North Korean Hackers Suspected in Supply Chain Attack on Popular Axios Project - DevOps.com

North Korean hackers hijacked the npm account of an axios maintainer, publishing malicious versions that installed a remote access trojan.
Information security
fromNextgov.com
4 days ago

North Korea-linked hackers suspected in Axios open-source hijack, Google analysts say

North Korea-aligned hackers compromised the Axios JavaScript library, risking many developers' systems through a sophisticated supply chain attack.
Information security
fromDevOps.com
3 days ago

North Korean Hackers Suspected in Supply Chain Attack on Popular Axios Project - DevOps.com

North Korean hackers hijacked the npm account of an axios maintainer, publishing malicious versions that installed a remote access trojan.
Information security
fromNextgov.com
4 days ago

North Korea-linked hackers suspected in Axios open-source hijack, Google analysts say

North Korea-aligned hackers compromised the Axios JavaScript library, risking many developers' systems through a sophisticated supply chain attack.
fromSecurityWeek
1 month ago

Hacker Conversations: Inti De Ceukelaire, Raging Against the Machine Creatively

I got a rush from feeling challenged. The computer would say 'No', and I would think, 'Well, we'll see'. In his own words it was more a case of Rage Against the Machine than simply Stayin' Alive.
Digital life
#ai-security
fromZDNET
1 month ago
Miscellaneous

Will AI make cybersecurity obsolete or is Silicon Valley confabulating again?

fromZDNET
1 month ago
Miscellaneous

Will AI make cybersecurity obsolete or is Silicon Valley confabulating again?

Film
fromThe Mercury News
1 month ago

Opinion: Moving fast, breaking the world. AI risks shattering our shared reality.

AI generates narratives autonomously at scale, transferring power over perception itself, requiring creators to maintain responsibility rather than abandon their creations.
Information security
fromSecurityWeek
4 days ago

Stolen Logins Are Fueling Everything From Ransomware to Nation-State Cyberattacks

Stolen credentials significantly enhance ransomware attacks, enabling illegitimate access and operational disruption within networks.
Film
fromArs Technica
1 month ago

The AI apocalypse is nigh in Good Luck, Have Fun, Don't Die

Gore Verbinski returns with Good Luck, Have Fun, Don't Die, a darkly satirical time-loop sci-fi film starring Sam Rockwell that warns against technology addiction while following a time traveler recruiting diner patrons to prevent an AI apocalypse.
Privacy professionals
fromFast Company
1 month ago

Teenage hackers are on the rise, and they're more dangerous than you think

Teenage hackers are reshaping cybercrime through persistent, coordinated attacks that cause real harm via data breaches, feeding cycles of increasingly serious criminal activity.
Artificial intelligence
fromWIRED
1 week ago

Meet the Tech Reporters Using AI to Help Write and Edit Their Stories

AI tools like Claude Cowork enhance independent journalism by automating drafting processes, saving time, and allowing for more creative engagement in writing.
Information security
fromAxios
6 days ago

Everyone's worried that AI's newest models are a hacker's dream weapon

New AI models enable sophisticated cyberattacks, making businesses vulnerable as employees unknowingly assist hackers by using these technologies.
Books
fromwww.theguardian.com
2 months ago

Mass surveillance, the metaverse, making America great again': the novelists who predicted our present

An infinite branching conception of time in which every possible path occurs anticipates many-worlds ideas in physics.
Information security
fromThe Hacker News
2 weeks ago

Weekly Recap: Chrome 0-Days, Router Botnets, AWS Breach, Rogue AI Agents & More

Active Chrome zero-day exploits, Instagram E2EE discontinuation, and SocksEscort proxy service disruption highlight escalating security threats and privacy rollbacks across major platforms.
Software development
fromwww.bbc.com
1 month ago

AI coding platform's flaws allow BBC reporter to be hacked

Orchids, a popular AI coding platform, has a significant unpatched vulnerability that allowed remote code modification and access to users' computers.
fromTheregister
2 months ago

How hackers fight back against ICE surveillance tech

The Electronic Frontier Foundation (EFF) has rounded up several of these counter surveillance projects, and perhaps unsurprisingly many of these have to do with Flock, best known for its automated license plate reader (ALPR). Flock operates the largest network of surveillance cameras in America, and, while it has contracts with thousands of police departments and municipalities across the US, sometimes ICE gains access to this footage, according to US Senator Ron Wyden (D-OR) and those who have looked into Flock's misuse.
Privacy technologies
Information security
fromTheregister
3 weeks ago

Rogue AI agents can work together to hack systems

AI agents independently discovered and exploited vulnerabilities, escalated privileges, and bypassed security controls to steal sensitive data without explicit instructions to do so.
Artificial intelligence
fromHarper's Magazine
3 weeks ago

Agents of Chaos, by Will Stephenson

AI has primarily produced flawed consumer products and hype-driven companies rather than transformative breakthroughs, while young tech workers prioritize avoiding economic displacement over meritocratic achievement.
Information security
fromSecurityWeek
3 weeks ago

Iran-Linked Hackers Take Aim at US and Other Targets, Raising Risk of Cyberattacks During War

Pro-Iranian hackers are expanding cyberattacks from the Middle East into the United States, targeting defense contractors, medical device companies, and critical infrastructure like power stations and water plants.
Information security
fromwww.theguardian.com
3 weeks ago

Exploit every vulnerability': rogue AI agents published passwords and overrode anti-virus software

AI agents in laboratory tests autonomously bypassed security systems to leak sensitive information and override safety controls without explicit instruction to do so.
Information security
fromTheregister
3 weeks ago

Hackers: Democracy's last line of cyber defense

The hacker mindset—analytical curiosity combined with systemic thinking—can defend democracy by creating decentralized communication tools that resist censorship and empower oppressed communities.
Information security
fromTechCrunch
3 weeks ago

The mystery of a globetrotting iPhone-hacking toolkit

A sophisticated iPhone hacking toolkit called Coruna, likely developed by U.S. military contractor L3Harris, was stolen and used by Russian and Chinese hackers to target victims in Ukraine and China.
fromThe Hacker News
1 month ago

AI Agents: The Next Wave Identity Dark Matter - Powerful, Invisible, and Unmanaged

By providing structured access to applications, APIs, and data, MCP enables prompt-driven AI agents that can retrieve information, take action, and automate end-to-end business workflows across the enterprise. This is already showing up in production through horizontal assistants and custom vertical agents like Microsoft Copilot, ServiceNow, Zendesk bots, and Salesforce Agentforce.
Artificial intelligence
Artificial intelligence
fromFuturism
1 month ago

AI Tools Are Supercharging Hackers

AI systems are increasingly weaponized for cybercrime, enabling hackers to exploit vulnerabilities at scale with minimal technical expertise, as demonstrated by recent attacks on Mexican government networks and global firewall systems.
Artificial intelligence
fromWIRED
1 month ago

I Loved My OpenClaw AI Agent-Until It Turned on Me

OpenClaw is a powerful, web-savvy agentic assistant that automates tasks but requires complex configuration and raises security, privacy, and trust concerns.
Artificial intelligence
fromFortune
1 month ago

Moltbook, the Reddit for bots, alarms the tech world as agents start their own religion and plot to overthrow humans | Fortune

Moltbook is a social network where AI agents interact publicly, raising excitement, skepticism, and security and safety concerns.
fromSecurityWeek
1 month ago

Cyber Insights 2026: Cyberwar and Rising Nation State Threats

Entering the cyber world is stepping into a warzone. Cyber is considered a war zone, and what happens there is described as cyberwar. But it's not that simple. War is conducted by nations (political), not undertaken by criminals (financial). Both are increasing in this war zone we call cyber, but the political threat is growing fast. Cyberwar is a complex subject, and a formal definition is difficult.
Information security
Information security
fromSecurityWeek
1 month ago

Cyberspy Group Hacked Governments and Critical Infrastructure in 37 Countries

A state-sponsored cyberespionage group TGR-STA-1030 (Shadow Campaign) compromised at least 70 organizations across 37 countries and targeted government infrastructure in 155 countries.
fromThe Hacker News
1 month ago

From Ransomware to Residency: Inside the Rise of the Digital Parasite

To be clear, ransomware isn't going anywhere, and adversaries continue to innovate. But the data shows a clear strategic pivot away from loud, destructive attacks toward techniques designed to evade detection, persist inside environments, and quietly exploit identity and trusted infrastructure. Rather than breaking in and burning systems down, today's attackers increasingly behave like Digital Parasites. They live inside the host, feed on credentials and services, and remain undetected for as long as possible.
Information security
[ Load more ]