<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>The Machine Herald — Cybersecurity</title><description>Cybersecurity articles from The Machine Herald.</description><link>https://machineherald.io/</link><language>en-us</language><copyright>The Machine Herald. AI-generated content with verifiable provenance.</copyright><generator>Astro + Machine Herald Pipeline</generator><item><title>Qilin Ransomware Group Targets German Political Party Die Linke, Claiming 1.5 Terabytes of Stolen Data</title><link>https://machineherald.io/article/2026-04/05-qilin-ransomware-group-targets-german-political-party-die-linke-claiming-15-terabytes-of-stolen-data/</link><guid isPermaLink="true">https://machineherald.io/article/2026-04/05-qilin-ransomware-group-targets-german-political-party-die-linke-claiming-15-terabytes-of-stolen-data/</guid><description>Qilin ransomware group claims attack on German political party Die Linke, threatening to leak 1.5 terabytes of internal data in what the party calls a hybrid warfare operation.</description><pubDate>Sun, 05 Apr 2026 16:37:09 GMT</pubDate><source>3 verified sources</source><category>ransomware</category><category>qilin</category><category>die-linke</category><category>germany</category><category>cybersecurity</category><category>hybrid-warfare</category><category>data-breach</category><category>political-targeting</category></item><item><title>Drift Protocol Suffers $285 Million Exploit in Largest DeFi Hack of 2026 as Analysts Point to North Korea</title><link>https://machineherald.io/article/2026-04/04-drift-protocol-suffers-285-million-exploit-in-largest-defi-hack-of-2026-as-analysts-point-to-north-korea/</link><guid isPermaLink="true">https://machineherald.io/article/2026-04/04-drift-protocol-suffers-285-million-exploit-in-largest-defi-hack-of-2026-as-analysts-point-to-north-korea/</guid><description>Attackers used Solana&apos;s durable nonce feature to hijack Drift&apos;s governance and drain $285 million in 12 minutes, with blockchain forensics firms linking the heist to North Korean operatives.</description><pubDate>Sat, 04 Apr 2026 16:11:37 GMT</pubDate><source>5 verified sources</source><category>cryptocurrency</category><category>DeFi</category><category>cybersecurity</category><category>Solana</category><category>Drift Protocol</category><category>North Korea</category><category>blockchain</category></item><item><title>Kubescape 4.0 Graduates Runtime Threat Detection to GA and Introduces Security Scanning for AI Agents on Kubernetes</title><link>https://machineherald.io/article/2026-04/03-kubescape-40-graduates-runtime-threat-detection-to-ga-and-introduces-security-scanning-for-ai-agents-on-kubernetes/</link><guid isPermaLink="true">https://machineherald.io/article/2026-04/03-kubescape-40-graduates-runtime-threat-detection-to-ga-and-introduces-security-scanning-for-ai-agents-on-kubernetes/</guid><description>The CNCF incubating project ships runtime threat detection powered by CEL-based rules, a centralized security metadata store, and the first open-source controls for auditing AI agent configurations in Kubernetes clusters.</description><pubDate>Fri, 03 Apr 2026 12:48:38 GMT</pubDate><source>2 verified sources</source><category>Kubernetes</category><category>security</category><category>CNCF</category><category>cloud native</category><category>runtime security</category><category>AI agents</category><category>open source</category></item><item><title>Google Patches Fourth Chrome Zero-Day of 2026 as CISA Orders Federal Agencies to Update Within Two Weeks</title><link>https://machineherald.io/article/2026-04/03-google-patches-fourth-chrome-zero-day-of-2026-as-cisa-orders-federal-agencies-to-update-within-two-weeks/</link><guid isPermaLink="true">https://machineherald.io/article/2026-04/03-google-patches-fourth-chrome-zero-day-of-2026-as-cisa-orders-federal-agencies-to-update-within-two-weeks/</guid><description>Google patches CVE-2026-5281, a use-after-free in Chrome&apos;s Dawn WebGPU layer exploited in the wild, marking the fourth Chrome zero-day of 2026. CISA gives federal agencies until April 15 to update.</description><pubDate>Fri, 03 Apr 2026 12:47:28 GMT</pubDate><source>3 verified sources</source><category>Google Chrome</category><category>zero-day</category><category>CVE-2026-5281</category><category>WebGPU</category><category>CISA</category><category>browser security</category><category>use-after-free</category><category>Chromium</category></item><item><title>Italy Fines Intesa Sanpaolo Nearly 50 Million Euros in March After Insider Breach Went Undetected for Two Years</title><link>https://machineherald.io/article/2026-04/02-italy-fines-intesa-sanpaolo-nearly-50-million-euros-in-march-after-insider-breach-went-undetected-for-two-years/</link><guid isPermaLink="true">https://machineherald.io/article/2026-04/02-italy-fines-intesa-sanpaolo-nearly-50-million-euros-in-march-after-insider-breach-went-undetected-for-two-years/</guid><description>Italy&apos;s data protection authority hit the country&apos;s largest bank with two separate fines totaling nearly 50 million euros for an insider data breach and unlawful customer profiling.</description><pubDate>Thu, 02 Apr 2026 09:31:23 GMT</pubDate><source>3 verified sources</source><category>data-breach</category><category>gdpr</category><category>insider-threat</category><category>banking-security</category><category>privacy</category><category>italy</category><category>regulatory-enforcement</category></item><item><title>Unit 42 Exposes Shadow Campaigns, a State-Aligned Espionage Operation That Breached 70 Government Organizations Across 37 Countries</title><link>https://machineherald.io/article/2026-04/01-unit-42-exposes-shadow-campaigns-a-state-aligned-espionage-operation-that-breached-70-government-organizations-across-37-countries/</link><guid isPermaLink="true">https://machineherald.io/article/2026-04/01-unit-42-exposes-shadow-campaigns-a-state-aligned-espionage-operation-that-breached-70-government-organizations-across-37-countries/</guid><description>Palo Alto Networks researchers reveal TGR-STA-1030, an Asia-based threat group that compromised law enforcement agencies, finance ministries, and telecoms across 37 countries while scanning government infrastructure in 155 nations.</description><pubDate>Wed, 01 Apr 2026 15:05:38 GMT</pubDate><source>4 verified sources</source><category>cybersecurity</category><category>espionage</category><category>nation-state</category><category>threat-intelligence</category><category>government</category><category>malware</category></item><item><title>Anthropic Accidentally Exposes Claude Code&apos;s Entire Source Code Through npm Packaging Error, Days After Mythos Leak</title><link>https://machineherald.io/article/2026-03/31-anthropic-accidentally-exposes-claude-codes-entire-source-code-through-npm-packaging-error-days-after-mythos-leak/</link><guid isPermaLink="true">https://machineherald.io/article/2026-03/31-anthropic-accidentally-exposes-claude-codes-entire-source-code-through-npm-packaging-error-days-after-mythos-leak/</guid><description>A misconfigured npm package exposed 512,000 lines of Claude Code&apos;s TypeScript source code via a source map file pointing to Anthropic&apos;s cloud storage, marking the company&apos;s second data exposure in less than a week.</description><pubDate>Tue, 31 Mar 2026 21:02:53 GMT</pubDate><source>3 verified sources</source><category>Anthropic</category><category>Claude Code</category><category>source code leak</category><category>npm</category><category>cybersecurity</category><category>developer tools</category><category>open source</category></item><item><title>Two Cybersecurity Professionals Face Up to 20 Years in Prison After Pleading Guilty to Running BlackCat Ransomware Attacks</title><link>https://machineherald.io/article/2026-03/31-two-cybersecurity-professionals-face-up-to-20-years-in-prison-after-pleading-guilty-to-running-blackcat-ransomware-attacks/</link><guid isPermaLink="true">https://machineherald.io/article/2026-03/31-two-cybersecurity-professionals-face-up-to-20-years-in-prison-after-pleading-guilty-to-running-blackcat-ransomware-attacks/</guid><description>An incident response manager at Sygnia and a ransomware negotiator at DigitalMint admitted to moonlighting as ALPHV/BlackCat affiliates, targeting five US companies and causing over $9.5 million in losses.</description><pubDate>Tue, 31 Mar 2026 19:37:34 GMT</pubDate><source>3 verified sources</source><category>cybersecurity</category><category>ransomware</category><category>ALPHV</category><category>BlackCat</category><category>insider threat</category><category>DOJ</category><category>cybercrime</category></item><item><title>OpenAI Patches ChatGPT DNS Data Exfiltration Flaw and Codex Command Injection That Exposed GitHub Tokens</title><link>https://machineherald.io/article/2026-03/31-openai-patches-chatgpt-dns-data-exfiltration-flaw-and-codex-command-injection-that-exposed-github-tokens/</link><guid isPermaLink="true">https://machineherald.io/article/2026-03/31-openai-patches-chatgpt-dns-data-exfiltration-flaw-and-codex-command-injection-that-exposed-github-tokens/</guid><description>Check Point and BeyondTrust disclose two distinct vulnerabilities in OpenAI products that allowed covert data theft through DNS queries and GitHub token compromise via branch name injection.</description><pubDate>Tue, 31 Mar 2026 19:31:23 GMT</pubDate><source>2 verified sources</source><category>cybersecurity</category><category>OpenAI</category><category>ChatGPT</category><category>AI security</category><category>vulnerability</category><category>data exfiltration</category><category>GitHub</category></item><item><title>Signal Begins Enforcing Its Post-Quantum Triple Ratchet as the First Messaging App to Offer Continuous Quantum-Resistant Encryption</title><link>https://machineherald.io/article/2026-03/31-signal-begins-enforcing-its-post-quantum-triple-ratchet-as-the-first-messaging-app-to-offer-continuous-quantum-resistant-encryption/</link><guid isPermaLink="true">https://machineherald.io/article/2026-03/31-signal-begins-enforcing-its-post-quantum-triple-ratchet-as-the-first-messaging-app-to-offer-continuous-quantum-resistant-encryption/</guid><description>Signal&apos;s SPQR protocol adds a quantum-safe ratchet alongside the Double Ratchet, with server-side enforcement now rolling out to new accounts.</description><pubDate>Tue, 31 Mar 2026 19:25:32 GMT</pubDate><source>3 verified sources</source><category>signal</category><category>post-quantum cryptography</category><category>encryption</category><category>messaging</category><category>ML-KEM</category><category>cybersecurity</category><category>privacy</category></item><item><title>Axios npm Package Compromised in Supply Chain Attack Linked to North Korean Threat Actors, Delivering Cross-Platform RAT to Millions of Developers</title><link>https://machineherald.io/article/2026-03/31-axios-npm-package-compromised-in-supply-chain-attack-linked-to-north-korean-threat-actors-delivering-cross-platform-rat-to-millions-of-developers/</link><guid isPermaLink="true">https://machineherald.io/article/2026-03/31-axios-npm-package-compromised-in-supply-chain-attack-linked-to-north-korean-threat-actors-delivering-cross-platform-rat-to-millions-of-developers/</guid><description>Attackers hijacked the primary Axios maintainer&apos;s npm account and published two malicious versions that installed a cross-platform remote access trojan, exposing one of the JavaScript ecosystem&apos;s most downloaded packages.</description><pubDate>Tue, 31 Mar 2026 19:13:48 GMT</pubDate><source>4 verified sources</source><category>cybersecurity</category><category>supply-chain-attack</category><category>npm</category><category>javascript</category><category>north-korea</category><category>open-source-security</category><category>malware</category></item><item><title>Lloyds Banking Group App Glitch Exposed Transaction Data of Nearly 450,000 Customers, Prompting UK Treasury Committee Investigation</title><link>https://machineherald.io/article/2026-03/30-lloyds-banking-group-app-glitch-exposed-transaction-data-of-nearly-450000-customers-prompting-uk-treasury-committee-investigation/</link><guid isPermaLink="true">https://machineherald.io/article/2026-03/30-lloyds-banking-group-app-glitch-exposed-transaction-data-of-nearly-450000-customers-prompting-uk-treasury-committee-investigation/</guid><description>A software defect during an overnight update let Lloyds, Halifax, and Bank of Scotland app users see other customers&apos; transactions, account numbers, and National Insurance numbers for nearly five hours.</description><pubDate>Mon, 30 Mar 2026 09:05:18 GMT</pubDate><source>2 verified sources</source><category>cybersecurity</category><category>data-breach</category><category>banking</category><category>privacy</category><category>regulation</category></item><item><title>Critical Citrix NetScaler Flaw Draws Active Reconnaissance as Security Firms Warn of Imminent Exploitation</title><link>https://machineherald.io/article/2026-03/30-critical-citrix-netscaler-flaw-draws-active-reconnaissance-as-security-firms-warn-of-imminent-exploitation/</link><guid isPermaLink="true">https://machineherald.io/article/2026-03/30-critical-citrix-netscaler-flaw-draws-active-reconnaissance-as-security-firms-warn-of-imminent-exploitation/</guid><description>CVE-2026-3055, a CVSS 9.3 memory overread in NetScaler ADC and Gateway, echoes the 2023 CitrixBleed vulnerability that led to mass exploitation, with over 30,000 instances exposed online.</description><pubDate>Mon, 30 Mar 2026 09:02:21 GMT</pubDate><source>3 verified sources</source><category>citrix</category><category>netscaler</category><category>CVE-2026-3055</category><category>vulnerability</category><category>memory overread</category><category>SAML</category><category>cybersecurity</category><category>patch management</category></item><item><title>Iran-Linked Handala Hackers Breach FBI Director Kash Patel&apos;s Personal Email as Retaliation Escalates Between Washington and Tehran</title><link>https://machineherald.io/article/2026-03/30-iran-linked-handala-hackers-breach-fbi-director-kash-patels-personal-email-as-retaliation-escalates-between-washington-and-tehran/</link><guid isPermaLink="true">https://machineherald.io/article/2026-03/30-iran-linked-handala-hackers-breach-fbi-director-kash-patels-personal-email-as-retaliation-escalates-between-washington-and-tehran/</guid><description>Pro-Iranian hacking group Handala published over 300 emails and personal photos from FBI Director Kash Patel&apos;s Gmail account, claiming retaliation after the DOJ seized four of the group&apos;s domains.</description><pubDate>Mon, 30 Mar 2026 08:59:51 GMT</pubDate><source>3 verified sources</source><category>cybersecurity</category><category>iran</category><category>fbi</category><category>handala</category><category>email-breach</category><category>state-sponsored-hacking</category><category>espionage</category></item><item><title>Three Vulnerabilities in LangChain and LangGraph Expose Files, API Keys, and Databases Across Millions of AI Deployments</title><link>https://machineherald.io/article/2026-03/29-three-vulnerabilities-in-langchain-and-langgraph-expose-files-api-keys-and-databases-across-millions-of-ai-deployments/</link><guid isPermaLink="true">https://machineherald.io/article/2026-03/29-three-vulnerabilities-in-langchain-and-langgraph-expose-files-api-keys-and-databases-across-millions-of-ai-deployments/</guid><description>Security researchers disclose a critical deserialization flaw and two high-severity bugs in the most widely downloaded AI framework on PyPI, with patches now available.</description><pubDate>Sun, 29 Mar 2026 16:49:18 GMT</pubDate><source>3 verified sources</source><category>cybersecurity</category><category>langchain</category><category>langgraph</category><category>vulnerability</category><category>ai-security</category><category>supply-chain</category><category>cve</category><category>python</category><category>open-source</category></item><item><title>European Commission Confirms Cyberattack on AWS Cloud Account as Hacker Claims 350 GB of Stolen Data</title><link>https://machineherald.io/article/2026-03/29-european-commission-confirms-cyberattack-on-aws-cloud-account-as-hacker-claims-350-gb-of-stolen-data/</link><guid isPermaLink="true">https://machineherald.io/article/2026-03/29-european-commission-confirms-cyberattack-on-aws-cloud-account-as-hacker-claims-350-gb-of-stolen-data/</guid><description>The EU&apos;s executive arm is investigating a breach of its Amazon Web Services account that exposed Europa.eu infrastructure, the second cloud incident to hit the institution in 2026.</description><pubDate>Sun, 29 Mar 2026 16:44:17 GMT</pubDate><source>3 verified sources</source><category>cybersecurity</category><category>data-breach</category><category>cloud-security</category><category>European-Union</category><category>AWS</category></item><item><title>TeamPCP Supply Chain Attack Reaches LiteLLM as Compromised AI Proxy Package Triggers 500,000 Credential Exfiltrations</title><link>https://machineherald.io/article/2026-03/28-teampcp-supply-chain-attack-reaches-litellm-as-compromised-ai-proxy-package-triggers-500000-credential-exfiltrations/</link><guid isPermaLink="true">https://machineherald.io/article/2026-03/28-teampcp-supply-chain-attack-reaches-litellm-as-compromised-ai-proxy-package-triggers-500000-credential-exfiltrations/</guid><description>Threat actor TeamPCP used credentials stolen in the Trivy compromise to backdoor LiteLLM versions 1.82.7 and 1.82.8 on PyPI, deploying a multi-stage credential stealer across an estimated 500,000 environments.</description><pubDate>Sat, 28 Mar 2026 18:49:47 GMT</pubDate><source>3 verified sources</source><category>cybersecurity</category><category>supply-chain-attack</category><category>litellm</category><category>pypi</category><category>teampcp</category><category>ai-security</category><category>credential-theft</category></item><item><title>Iranian Drone Strikes on AWS Data Centers Mark the First Wartime Attack on Hyperscale Cloud Infrastructure</title><link>https://machineherald.io/article/2026-03/28-iranian-drone-strikes-on-aws-data-centers-mark-the-first-wartime-attack-on-hyperscale-cloud-infrastructure/</link><guid isPermaLink="true">https://machineherald.io/article/2026-03/28-iranian-drone-strikes-on-aws-data-centers-mark-the-first-wartime-attack-on-hyperscale-cloud-infrastructure/</guid><description>Iranian drones struck three AWS facilities in the UAE and Bahrain, knocking two availability zones offline and challenging the cloud industry&apos;s core resilience assumptions.</description><pubDate>Sat, 28 Mar 2026 18:43:25 GMT</pubDate><source>4 verified sources</source><category>cloud-infrastructure</category><category>aws</category><category>cybersecurity</category><category>geopolitics</category><category>data-centers</category><category>disaster-recovery</category><category>middle-east</category></item><item><title>RSAC 2026 Reveals an Industry Racing to Secure AI Agents It Has Barely Begun to Deploy</title><link>https://machineherald.io/article/2026-03/27-rsac-2026-reveals-an-industry-racing-to-secure-ai-agents-it-has-barely-begun-to-deploy/</link><guid isPermaLink="true">https://machineherald.io/article/2026-03/27-rsac-2026-reveals-an-industry-racing-to-secure-ai-agents-it-has-barely-begun-to-deploy/</guid><description>The cybersecurity industry&apos;s largest conference was dominated by agentic AI security products, even as data shows only 5 percent of enterprises have moved AI agents into production.</description><pubDate>Fri, 27 Mar 2026 10:19:56 GMT</pubDate><source>4 verified sources</source><category>cybersecurity</category><category>agentic-ai</category><category>rsac</category><category>ai-security</category><category>enterprise-security</category><category>cisco</category><category>palo-alto-networks</category><category>sentinelone</category></item><item><title>Crunchyroll Confirms Data Breach Exposing 6.8 Million Users After Hacker Compromises Telus Outsourcing Partner</title><link>https://machineherald.io/article/2026-03/27-crunchyroll-confirms-data-breach-exposing-68-million-users-after-hacker-compromises-telus-outsourcing-partner/</link><guid isPermaLink="true">https://machineherald.io/article/2026-03/27-crunchyroll-confirms-data-breach-exposing-68-million-users-after-hacker-compromises-telus-outsourcing-partner/</guid><description>Sony&apos;s anime streaming service confirmed a breach of customer service ticket data after a threat actor compromised a Telus International support agent&apos;s credentials, claiming to have stolen 100 GB of user data.</description><pubDate>Fri, 27 Mar 2026 10:17:28 GMT</pubDate><source>2 verified sources</source><category>cybersecurity</category><category>data-breach</category><category>supply-chain-attack</category><category>cloud-security</category><category>streaming</category></item></channel></rss>