Harvest-now-decrypt-later threats push organizations toward hybrid cryptography and ML-KEM as quantum risks grow. Learn strategies in a webinar.
Hackers are exploiting a critical vulnerability in the User Registration & Membership plugin, which is installed on more than 60,000 WordPress sites.
Developed by WPEverest, the plugin provides membership and user registration management features, including custom forms, payment integrations with PayPal and Stripe, bank transfers, and analytics.
The security vulnerability is tracked as CVE-2026–1492 and received a critical severity rating of 9.8. Because the plugin accepts a user-supplied role during membership registration, hackers can create administrator accounts without authentication.
Cells in our immune system are best known for providing security against external invaders such as bacteria and viruses. These immune cells also guard against internal threats, including cancerous tumors. Different forms of cancer cells and tumors have their own tricks for avoiding detection by the body’s security system altogether or otherwise sabotaging any attempts to muster an immune response. In the case of the most common and difficult-to-treat form of ovarian cancer, this ability to suppress the immune system also makes the cancer resistant to treatments known as immunotherapies that seek to supercharge immune cells.
“Even if you boost the capability of immune cells, a treatment will have limited success if the cells struggle to recognize and react to the tumor,” said David Schlaepfer, Ph.D., a professor in the department of OBGYN and Reproductive Sciences at the University of California San Diego Moores Cancer Center.
By Chuck Brooks and Bill Bowers.
Every time you send a text, pay for groceries with your phone, or use your health site, you are relying on encryption. It’s an invisible shield that protects your data from prying eyes. Encryption is more than just a technological protection; it is the basis for digital trust.
Encryption is more than just safeguarding data; it is also about protecting people. It helps ensure privacy by protecting persons from spying and exploitation. And it is widely adopted to help ensure digital transaction security. For National Security it serves to protect key infrastructure and government communications. And it has a human rights function by providing citizens with peace of mind by ensuring the safety of their personal information. In places where surveillance is widespread, encryption can even defend free expression and opposition. It is a human right in this digital age.
In my book Inside Cyber: How AI, 5G, IoT, and Quantum Computing Will Transform Privacy and Security, I referred to encryption as the “linchpin of privacy and commerce in a connected society.” Without it, the digital economy would crumble under the strain of criminality, fraud, and spying.
There are currently no details on how the vulnerability is being exploited in the wild. However, Google acknowledged in its monthly Android security bulletin that “there are indications that CVE-2026–21385 may be under limited, targeted exploitation.”
Google’s March 2026 update contains patches for a total of 129 vulnerabilities, including a critical flaw in the System component (CVE-2026–0006) that could lead to remote code execution without requiring any additional privileges or user interaction. In contrast, Google addressed one Android vulnerability in January 2026 and none last month.
Also patched by Google are multiple critical-rated bugs: a privilege escalation bug in Framework (CVE-2026–0047), a denial-of-service (DoS) in System (CVE-2025–48631), and seven privilege escalation flaws in Kernel components (CVE-2024–43859, CVE-2026–0037, CVE-2026–0038, CVE-2026–0027, CVE-2026–0028, CVE-2026–0030, and CVE-2026–0031).
The increasing use of Artificial Intelligence (AI) in the workplace is leading to job displacement and raising concerns among employees about the security of their positions ## Key Insights.
Career Obsolescence Through AI
🔄 AI engineer David becomes obsolete after 7 years and 1,000 lines of code building the AI division, receiving a “sweet pink slip” as the CEO eliminates his role and takes his company car while AI assumes control of the entire division.
Existential Work Motivation.
💭 David questions whether his 7-year dedication was driven by glory, stock options, passion, art, or simply maintaining purpose (“beating heart”), confronting the irony of being replaced by the AI system he built.
Corporate Restructuring Mechanics.