close
Skip to main content

Security

Cybersecurity is the rickety scaffolding supporting everything you do online. For every new feature or app, there are a thousand different ways it can break – and a hundred of those can be exploited by criminals for data breaches, identity theft, or outright cyber heists. Staying ahead of those exploits is a full-time job, and one of the most lucrative and sought-after skills in the tech industry. All too often, it’s something up-and-coming companies decide to skip out on, only to pay the price later on.

Richard Lawler
Richard Lawler
AI cybersecurity updates for MDASH, Mythos, and GPT-5.5.

On Wednesday, the AISI, which evaluates AI models for the British government, said both Anthropic’s Claude Mythos Preview and OpenAI’s GPT-5.5 showed progress well above previous trends on cybersecurity testing. Separately, XBOW released data suggesting “frontier models have taken a major step forward in vulnerability discovery.”

Meanwhile, Microsoft said its multi-model agentic setup, MDASH, was used to discover 16 CVEs in this week’s Patch Tuesday updates and is the leader on the CyberGym security evaluation framework.

graph showing the average number of steps completed on a cybersecuirty benchmark comparing various models across how many tokens spent
Image: AISI
A million baby monitors and security cameras were easily viewable by hackers

They should be fixed now. Hopefully.

Sean Hollister
Stevie Bonifield
Stevie Bonifield
All Linux distros are affected by the new “Dirty Frag” vulnerability.

Similar to the “Copy Fail” exploit revealed a week ago, the two “Dirty Frag” exploits (CVE-2026-43284) also allow a local user to give themselves root privileges on nearly any Linux distribution. The researcher who found it says that, “Because the embargo has now been broken, no patches or CVEs exist for these vulnerabilities.”

Ubuntu developer Canonical has detailed mitigations, and Red Hat says it will provide guidance “soon.”

Dominic Preston
Dominic Preston
Watch your nuggets.

Sean Hollister let a hacked robot lawnmower run him over in the name of journalism, but it took a Verge commenter to find the right language that really sets the stakes.

MattMaher_M7Innovations:

There’s investigative journalism, and then there’s ‘get-run-over-by-a-lawnmower-to-prove-a-point’ journalism. Thank you Sean, for almost chopping off your chicken nuggets to give us the gif of the century.

Get the day’s best comment and more in my free newsletter, The Verge Daily.

Jay Peters
Jay Peters
Mozilla is sharing more details about some of the 271 Firefox bugs identified by Claude Mythos Preview.

Ordinarily we keep detailed bug reports private for several months after shipping fixes and issuing security advisories, largely as a precaution to protect any users who, for whatever reason, were slow to update to the latest version of Firefox. Given the extraordinary level of interest in this topic and the urgency of action needed throughout the software ecosystem, we’ve made the calculated decision to unhide a small sample of the reports behind the fixes we recently shipped.

A hacker ran me over with a robot lawn mower

Thousands of Yarbo robot lawnmowers and blowers have massive security flaws that can let any hacker hijack them and possibly your home network.

Sean Hollister
Stevie Bonifield
Stevie Bonifield
Ubuntu’s servers are down after a DDoS attack.

Ubuntu’s web infrastructure remains unavailable after going offline Thursday morning, blocking updates and other access at a time when Linux admins really need to apply a patch.

“Canonical’s web infrastructure is under a sustained, cross-border attack and we are working to address it. We will provide more information in our official channels as soon as we are able to.”

Emma Roth
Emma Roth
Anthropic rolls out its codebase-scanning security tool for businesses.

Claude Security uses the Opus 4.7 model to scan a business’s codebase for vulnerabilities and issue a fix. This tool is rolling out to enterprise customers globally and isn’t to be confused with Anthropic’s Mythos, a powerful AI model that can identify and exploit vulnerabilities across operating systems and web browsers.

BERJAYA
Screenshot: Anthropic via X
Emma Roth
Emma Roth
Ukrainian police arrest three hackers for allegedly stealing over 610,000 Roblox accounts.

The group is accused of using stolen cookies to hijack accounts, targeting profiles with high amounts of in-game currency and items, according to a press release spotted by Bleeping Computer. The hackers allegedly earned around $225,000 after selling the accounts on a Russian website.

Attack of the killer script kiddies

In the aftermath of Mythos, AI-assisted amateur hackers are waiting to strike.

Yael Grauer
Terrence O'Brien
Terrence O'Brien
ADT confirms customer data was stolen in a breach.

The prolific ShinyHunters group is claiming responsibility and threatening to leak the stolen data unless a ransom is paid. ADT has said that the info was mostly limited to names, phone numbers, and addresses, and that credit card or bank account information was not compromised.

The investigation confirmed that the information involved was limited to names, phone numbers, and addresses. In a small percentage of cases, dates of birth and the last four digits of Social Security numbers or Tax IDs were included. Critically, no payment information — including bank accounts or credit cards — was accessed, and customer security systems were not affected or compromised in any way.

Terrence O'Brien
Terrence O'Brien
Vercel says some customer data was stolen before the breach.

The hosting platform provided a new update on the recent compromise. It named Context.AI as the vector for the attack, found more customer data that had been stolen, and said it discovered that some accounts had been broken into during an earlier incident.

First, we have identified a small number of additional accounts that were compromised as part of this incident. Second, we have uncovered a small number of customer accounts with evidence of prior compromise that is independent of and predates this incident, potentially as a result of social engineering, malware, or other methods.

Terrence O'Brien
Terrence O'Brien
The NSA reportedly has access to Anthropic’s Mythos despite being labeled a supply-chain risk.

Sources told Axios that the agency was among the roughly 40 organizations granted access. This, despite the Pentagon arguing that Anthropic is a threat to national security. The NSA has reportedly been using it primarily to identify vulnerabilities in its own network, but considering its track record, it’s understandable if you’re wary.

Mia Sato
Mia Sato
Madison Square Garden surveillance state.

A new Wired investigation details the lengths Jim Dolan, owner of the New York Knicks and venues like MSG and the Las Vegas Sphere, goes to to spy on perceived enemies, fans, and critics. The vast surveillance apparatus includes dossiers, social media posts, and facial recognition tech.

Last year I wrote about one fan who believes a t-shirt design he had made resulted in a lifetime ban from Dolan’s venues — and that facial recognition picked him out of the crowd.

Richard Lawler
Richard Lawler
Now the White House is reportedly preparing for access to Mythos.

Despite Anthropic’s ongoing battle with the Pentagon, Bloomberg reports that the White House Office of Management and Budget’s CIO told government officials that it is preparing for their agencies to use Anthropic’s cybersecurity-focused AI model.

Terrence O'Brien
Terrence O'Brien
OpenAI responds to Axios HTTP hack by updating security certificates.

When hackers got access to an account belonging to the maintainer of Axios, they inserted a script that granted remote access to users’ Windows, macOS, and Linux devices. This malicious version potentially compromised ChatGPT’s macOS apps, so OpenAI is issuing an update and new certificates to mitigate any risks.

Stevie Bonifield
Stevie Bonifield
Gmail’s end-to-end encryption is now available on its mobile app.

Starting this week, enterprise users will be able to send encrypted messages from Gmail’s Android and iOS apps if their organization has the feature enabled. Gmail’s version of E2EE, which uses client-side encryption, has been available since last year, but is still limited to users with enterprise accounts.

Thomas Ricker
Thomas Ricker
Chrome combats session theft.

Google is officially rolling out Device Bound Session Credentials (DBSC) to Windows users in Chrome 146. The new security feature cryptographically binds your login cookies to your device’s hardware. So, even if malware steals your browser cookies, they should be useless to remote hackers. MacOS support is coming soon.

Emma Roth
Emma Roth
Delve and Y Combinator have “parted ways” amid fraud accusations.

The AI-powered compliance startup is no longer listed on YC’s directory after an anonymous report alleged Delve “fakes compliance” and leaked audit reports, as reported by TechCrunch. Delve responded by claiming a bad actor “maliciously exfiltrated data” as part of a “coordinated, targeted cyberattack.”

Jay Peters
Jay Peters
A company that makes AI training data has been hit by a security breach.

Meta has paused work with the company, Mercor (which The Verge has profiled), while OpenAI is investigating the security incident, Wired reports.

Emma Roth
Emma Roth
Apple is making its iOS 18.7.7 security patch available to more iPhones.

The update adds protections against DarkSword, a security vulnerability that can steal information from your phone if you visit an infected link. Apple previously released iOS 18.7.7 to the iPhone XS and XR, but if you have a newer phone and don’t want to download iOS 26, now you can install the patch without worrying about getting Liquid Glass.

Emma Roth
Emma Roth
Hasbro identified “unauthorized access” on its network.

A disclosure spotted by TechCrunch says the incident prompted the toymaker to activate “its security response protocols.” Hasbro says it’s currently working to determine the impact of the breach, but it will continue to “take orders, ship product and conduct other key operations.”

Jess Weatherbed
Jess Weatherbed
Apple is patching the iOS 18 DarkSword exploit.

iOS 26 devices are already protected against the hacking tool that targets iPhones when visiting malicious links, and today Apple is pushing out a new security update for older, vulnerable versions of iOS. That means iOS 18 users can protect their phones and avoid the Liquid Glass design update.

Emma Roth
Emma Roth
A hacker hijacked a popular coding tool to deliver malware.

A hacker took over an account belonging to the lead maintainer of the JavaScript library, Axios, which is used to handle HTTP requests, as reported by Cybernews. Security researchers found that versions 1.14.1 and 0.30.4 contained the script for a remote access trojan capable of giving hackers access to a user’s Windows, macOS, or Linux device.

If you buy something from a Verge link, Vox Media may earn a commission. See our ethics statement.

Jay Peters
Jay Peters
Proton now offers an entire bundle of office services.

The bundle, Proton Workspace, includes a new end-to-end encrypted video chat service called Proton Meet. But even encryption can’t guarantee the company will keep your payment info private from government requests.

A photo of the Proton Meet service.
Image: Proton
Richard Lawler
Richard Lawler
What’s inside the White House app?

That includes enabling location tracking and other monitoring via OneSignal’s analytics (which the company says are opt-in at the OS level), JavaScript loaded from some guy’s GitHub, an injected script to hide things like consent dialogs on pages users open in the app, and other hooks to non-government third-party services.