Explore key stories from LWN.net's weekly edition: LLM security risks, restartable sequences in TCMalloc, Fedora/GNOME bugs, Prolly trees, Arm on s390 mainframes, and other open source updates.
Q&A covering LLM security, restartable sequences & TCMalloc, Fedora/GNOME bugs, Prolly trees, Arm on s390, Alpine outage, and GCC/Incus/NetHack updates.
Firefox and Anthropic used Claude Mythos AI to find 271 zero-days. This listicle covers the discovery, patching, and defender advantage, offering lessons for cybersecurity teams.
DarkSword is a sophisticated government-designed iOS exploit chain using six zero-days, targeting multiple countries and deploying three malware families; leaked after discovery.
Apple may add new MacBook Neo colors to offset potential price hikes due to rising production costs from scaled-up orders, chip shortages, and higher DRAM prices.
Silver Fox group launches phishing campaigns targeting Indian and Russian taxpayers with new Python backdoor ABCDoor, using Rust-based loader and ValleyRAT. Over 1,600 emails recorded.
Cybercriminals are exploiting Amazon SES to send phishing emails that pass all security checks. Leaked IAM keys enable mass attacks. Experts urge content-based detection and user vigilance.
OceanLotus APT32 suspected in PyPI supply chain attack delivering new ZiChatBot malware targeting Windows and Linux via fake libraries.
Q1 2026 saw a surge in exploit kits targeting Microsoft Office, Windows, and Linux, with a continued rise in registered CVEs and persistent use of legacy vulnerabilities.
A 1947 Arvin 664A AM radio found in a homemade cabinet is restored by Ken's Shop. Replacing capacitors and cosmetic work bring it back to life.
WayVR brings the Linux desktop into virtual reality, allowing full control with VR controllers. Learn how it differs from WiVRn, setup steps, and customization options.
This Q&A guide explains BRICKSTORM malware targeting vSphere, why VCSA is vulnerable, persistence techniques, hardening strategies, the role of Mandiant's script, and detection methods for defenders.
Germany saw a 92% surge in data leak victims in 2025, driven by cyber criminals pivoting from English-speaking targets, aided by AI localization, and focusing on vulnerable Mittelstand firms.
Answering key questions about AI-driven vulnerability exploitation, accelerated attack timelines, and enterprise defense strategies including hardening, AI integration, and playbook updates.
UNC6692 campaign used impersonation via Teams, AutoHotKey scripts, and SNOWBELT extension for deep network penetration.
Cybersecurity consultant demand surges 30% as cybercrime costs exceed $10 trillion globally, prompting IEEE expert advice on essential skills and certifications.
Weekly cyber threat digest covering Booking.com, McGraw-Hill, EssentialPlugin, Basic-Fit breaches; AI-driven attacks on Mexican agencies, Claude phishing, GitHub prompt injection; Apache ActiveMQ and Splunk patches.
Breaches at Vercel, France Titres, UK Biobank, Bitwarden; AI threats like Bissa Scanner; critical Microsoft and Apple patches.
Weekly threat roundup: Medtronic data breach, Vimeo vendor compromise, Robinhood phishing, Trellix code leak, plus AI-powered attacks and critical patches for Microsoft Entra ID and cPanel.
Step-by-step guide to nominate cybersecurity professionals, teams, or products for the 2026 Cybersecurity Stars Awards. Includes eligibility, narrative tips, and submission process.