Toggle light / dark theme

Google Confirms CVE-2026–21385 in Qualcomm Android Component Exploited

There are currently no details on how the vulnerability is being exploited in the wild. However, Google acknowledged in its monthly Android security bulletin that “there are indications that CVE-2026–21385 may be under limited, targeted exploitation.”

Google’s March 2026 update contains patches for a total of 129 vulnerabilities, including a critical flaw in the System component (CVE-2026–0006) that could lead to remote code execution without requiring any additional privileges or user interaction. In contrast, Google addressed one Android vulnerability in January 2026 and none last month.

Also patched by Google are multiple critical-rated bugs: a privilege escalation bug in Framework (CVE-2026–0047), a denial-of-service (DoS) in System (CVE-2025–48631), and seven privilege escalation flaws in Kernel components (CVE-2024–43859, CVE-2026–0037, CVE-2026–0038, CVE-2026–0027, CVE-2026–0028, CVE-2026–0030, and CVE-2026–0031).

REPLACED BY AI! | Seedance 2 + Kling 3.0 Short Film

The increasing use of Artificial Intelligence (AI) in the workplace is leading to job displacement and raising concerns among employees about the security of their positions ## Key Insights.

Career Obsolescence Through AI

🔄 AI engineer David becomes obsolete after 7 years and 1,000 lines of code building the AI division, receiving a “sweet pink slip” as the CEO eliminates his role and takes his company car while AI assumes control of the entire division.

Existential Work Motivation.

💭 David questions whether his 7-year dedication was driven by glory, stock options, passion, art, or simply maintaining purpose (“beating heart”), confronting the irony of being replaced by the AI system he built.

Corporate Restructuring Mechanics.

Association of Systemic Inflammatory Markers With Cerebral Small Vessel Disease ProgressionA Community-Based Prospective Study

This study investigated the associations between neutrophil-to-lymphocyte ratio, monocyte-to-lymphocyte ratio, and systemic immune-inflammation index with progression of CSVD.


This website uses a security service to protect against malicious bots. This page is displayed while the website verifies you are not a bot.

Microsoft testing Windows 11 batch file security improvements

Microsoft is rolling out new Windows 11 Insider Preview builds that improve security and performance during batch file or CMD script execution.

As Microsoft explained today, IT administrators can now enable a more secure processing mode that prevents batch files from being modified while they run by adding the LockBatchFilesInUse registry value under HKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor.

Policy authors can also enable this mode using the LockBatchFilesWhenInUse application manifest control.

NIK-driven IL-23 production by myeloid cells is a key factor in the development of autoimmune inflammation

Nishada Ramphal, Ari Waisman et al. (Johannes Gutenberg-Universität Mainz) reveal that NIK drives neuroantigen-specific T cell priming by regulating antigen presentation and IL-23 production, identifying NIK as a key orchestrator of myeloid-driven CNS autoimmunity.

Neuroinflammation.


This website uses a security service to protect against malicious bots. This page is displayed while the website verifies you are not a bot.

AI Is The 21st Century Force Multiplier

Ease see my latest Forbes article and have a great weekend! Chuck Brooks by Chuck Brooks.

#artificialIntelligence #ai #future #tech Forbes


AI is redefining power, productivity, security, and sovereignty. Dual-use, convergent, and autonomous AI is the 21st-century force multiplier. Not only is technology advancing, but civilization is about to change.

The 1956 Dartmouth Conference invented the term “artificial intelligence.” Alan Turing and other pioneers shaped the conceptualization of AI. The first systems used symbolic logic and determinism. Certain expert systems excelled but struggled in dynamic, uncertain environments. Fragility, computational capacity, and data accessibility caused “AI winters.”

UAT-10027 Targets U.S. Education and Healthcare with Dohdoor Backdoor

A previously undocumented threat activity cluster has been attributed to an ongoing malicious campaign targeting education and healthcare sectors in the U.S. since at least December 2025.

The campaign is being tracked by Cisco Talos under the moniker UAT-10027. The end goal of the attacks is to deliver a never-before-seen backdoor codenamed Dohdoor.

“Dohdoor utilizes the DNS-over-HTTPS (DoH) technique for command-and-control (C2) communications and has the ability to download and execute other payload binaries reflectively,” security researchers Alex Karkins and Chetan Raghuprasad said in a technical report shared with The Hacker News.

Hoi1 targets BLTP2 to ER–PM contact sites to regulate lipid homeostasis

Samantha K. Dziurdzik, Vaishnavi Sridhar, Elizabeth Conibear et al. (University of British Columbia) identify a conserved adaptor that recruits BLTP2-like proteins to ER–plasma membrane contacts by binding helical projections on their lipid transfer channel to maintain lipid homeostasis.

MembraneContactSites.


This website uses a security service to protect against malicious bots. This page is displayed while the website verifies you are not a bot.

/* */