Hermes
Tuesday 28 April 2026  ·  34 articles scored  ·  1 top scorer  ·  last 24h
1
🔐 security SANS Internet Stormcast
75%

TeamPCP Supply Chain Campaign: Update 008 - 26-Day Pause Ends with Three Concurrent Compromises (Checkmarx KICS, Bitwarden CLI Cascade, xinference PyPI), CanisterSprawl npm Worm Identified, and Tier 1 Coverage Returns, (Mon, Apr 27th)

This update succeeds&#;x26;#;xc2;&#;x26;#;xa0;TeamPCP Supply Chain Campaign Update 007, published April 8, 2026, which left the campaign in credential-monetization mode following the Cisco source cod…

Novelty
80%
Depth
80%
Practical
65%
Surprise
70%
Relevance
80%
https://isc.sans.edu/diary/rss/32926
2
📦 m365 Petri IT Knowledgebase
68%

Microsoft Makes Tenant Configuration Management APIs Generally Available

Microsoft has announced the general availability of Tenant Configuration Management (TCM) APIs for commercial customers. The new APIs give organizations a programmatic way to define, monitor, and mai…

https://petri.com/microsoft-tenant-configuration-management-apis/
3
🤖 ai The Decoder
68%

OpenAI and Microsoft rewrite their deal: no more exclusivity, no more AGI clause

OpenAI is free to distribute its products through any cloud provider, Microsoft loses its exclusive license to OpenAI's technology, and the controversial AGI clause is gone. The article OpenAI and Mi…

https://the-decoder.com/openai-and-microsoft-rewrite-their-deal-no-more-exclusivity-no-more-agi-clause/
4
🔐 security SecurityWeek
64%

Incomplete Windows Patch Opens Door to Zero-Click Attacks

The initial vulnerability was exploited by Russia-linked APT28 in attacks against Ukraine and EU countries. The post Incomplete Windows Patch Opens Door to Zero-Click Attacks appeared first on Securi…

https://www.securityweek.com/incomplete-windows-patch-opens-door-to-zero-click-attacks/
5
🤖 ai MIT Technology Review – AI
63%

Rebuilding the data stack for AI

Artificial intelligence may be dominating boardroom agendas, but many enterprises are discovering that the biggest obstacle to meaningful adoption is the state of their data. While consumer-facing AI…

https://www.technologyreview.com/2026/04/27/1136322/rebuilding-the-data-stack-for-ai/
6
🔐 security SecurityWeek
63%

OpenSSH Flaw Allowing Full Root Shell Access Lurked for 15 Years

A code reuse issue enabled comma characters in certificate principals to be interpreted as list separators. The post OpenSSH Flaw Allowing Full Root Shell Access Lurked for 15 Years appeared first on…

https://www.securityweek.com/openssh-flaw-allowing-full-root-shell-access-lurked-for-15-years/
7
🤖 ai The Decoder
61%

China blocks Meta's $2 billion acquisition of AI startup Manus

Beijing orders the unwinding of the already completed acquisition. The move comes amid intensifying technological rivalry between the US and China. The article China blocks Meta's $2 billion acquisit…

https://the-decoder.com/china-blocks-metas-2-billion-acquisition-of-ai-startup-manus/
8
🔐 security SecurityWeek
58%

Malicious AI Prompt Injection Attacks Increasing, but Sophistication Still Low: Google

The tech giant found that many indirect prompt injection attempts are harmless, but some malicious exploits have also been identified. The post Malicious AI Prompt Injection Attacks Increasing, but S…

https://www.securityweek.com/malicious-ai-prompt-injection-attacks-increasing-but-sophistication-still-low-google/
9
🔐 security SecurityWeek
57%

Easily Exploitable ‘Pack2TheRoot’ Linux Vulnerability Leads to Root Access

A race condition in PackageKit allows unprivileged users to escalate privileges when installing packages. The post Easily Exploitable ‘Pack2TheRoot’ Linux Vulnerability Leads to Root Access appeared …

https://www.securityweek.com/easily-exploitable-pack2theroot-linux-vulnerability-leads-to-root-access/
10
🔐 security SecurityWeek
55%

UNC6692 Uses Email Bombing, Social Engineering to Deploy ‘Snow’ Malware

The threat actor infected victims with the Snow malware family – Snowbelt, Snowglaze, and Snowbasin – for persistent access. The post UNC6692 Uses Email Bombing, Social Engineering to Deploy ‘Snow’ M…

https://www.securityweek.com/unc6692-uses-email-bombing-social-engineering-to-deploy-snow-malware/
11
🔐 security SecurityWeek
48%

Firefox Vulnerability Allows Tor User Fingerprinting

The vulnerability is tracked as CVE-2026-6770 and it has been patched with the release of Firefox 150 and Tor 15.0.10. The post Firefox Vulnerability Allows Tor User Fingerprinting appeared first on …

https://www.securityweek.com/firefox-vulnerability-allows-tor-user-fingerprinting/
12
🤖 ai The Decoder
47%

OpenAI reportedly developing its own smartphone chips with MediaTek and Qualcomm

According to analyst Ming-Chi Kuo, OpenAI is working with MediaTek and Qualcomm on custom smartphone processors, with Luxshare as the exclusive partner for system design and manufacturing. The articl…

https://the-decoder.com/openai-reportedly-developing-its-own-smartphone-chips-with-mediatek-and-qualcomm/
13
🤖 ai MIT Technology Review – AI
46%

The missing step between hype and profit

This story originally appeared in The Algorithm, our weekly newsletter on AI. To get stories like this in your inbox first, sign up here. In February, I picked up a flyer at an anti-AI march in Londo…

https://www.technologyreview.com/2026/04/27/1136456/the-missing-step-between-hype-and-profit/
14
🤖 ai The Decoder
46%

Meta wants to power AI data centers with solar energy from space

Meta has signed a deal with startup Overview Energy for up to 1 gigawatt of space-based solar power. The only catch: the technology doesn't exist yet. The article Meta wants to power AI data centers …

https://the-decoder.com/meta-wants-to-power-ai-data-centers-with-solar-energy-from-space/
15
⚡ tech Stratechery
45%

AI Hardware, Meta Display, Redefining VR and AR

I finally tried the Meta Ray-Ban Display, and it completely changed how I think about AR and VR.

https://stratechery.com/2026/ai-hardware-meta-display-redefining-vr-and-ar/