<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.00">

  <channel>
       <title>Schneier on Security</title>
       <link><![CDATA[https://www.schneier.com/]]></link>
       <description></description>
    <image>
       <title>Schneier on Security</title>
       <url>https://www.schneier.com/wp-content/uploads/2020/06/cropped-favicon-1-32x32.png</url>
       <link><![CDATA[https://www.schneier.com/]]></link>
       <description></description>
    </image>

    <item>
       <title>A Ransomware Negotiator Was Working for a Ransomware Gang</title>
       <link>https://www.schneier.com/blog/archives/2026/05/a-ransomware-negotiator-was-working-for-a-ransomware-gang.html</link>
       <description><p>Someone <a href="https://gizmodo.com/a-ransomware-negotiator-pleads-guilty-to-being-a-double-agent-2000749234">pleaded guilty</a> to secretly working for a ransomware gang as he negotiated ransomware payments for clients.</p></description>
<pubDate>Fri, 1 May 2026 13:18:00 +0200</pubDate><category></category><guid isPermaLink='false'>https://www.schneier.com/?p=72001</guid>    </item>

    <item>
       <title>Fast16 Malware</title>
       <link>https://www.schneier.com/blog/archives/2026/04/fast16-malware.html</link>
       <description><p>Researchers have reverse-engineered a piece of malware named Fast16. It&#8217;s almost certainly state-sponsored, probably US in origin, and was <a href="https://www.wired.com/story/fast16-malware-stuxnet-precursor-iran-nuclear-attack/?_sp=72d58355-e351-43ad-ba73-bc2b546a30a0.1777128353268">deployed</a> against Iran years before Stuxnet:</p>
<blockquote><p>&#8220;&#8230;the Fast16 malware was designed to carry out the most subtle form of sabotage ever seen in an in-the-wild malware tool: By automatically spreading across networks and then silently manipulating computation processes in certain software applications that perform high-precision mathematical calculations and simulate physical phenomena, Fast16 can alter the results of those programs to cause failures that range from faulty research results to catastrophic damage to real-world equipment.&#8221;...</p></blockquote></description>
<pubDate>Thu, 30 Apr 2026 12:22:00 +0200</pubDate><category></category><guid isPermaLink='false'>https://www.schneier.com/?p=72003</guid>    </item>

    <item>
       <title>Claude Mythos Has Found 271 Zero-Days in Firefox</title>
       <link>https://www.schneier.com/blog/archives/2026/04/claude-mythos-has-found-271-zero-days-in-firefox.html</link>
       <description><p>That&#8217;s <a href="https://blog.mozilla.org/en/firefox/ai-security-zero-day-vulnerabilities/">a lot</a>. No, it&#8217;s an extraordinary number:</p>
<blockquote><p>Since February, the Firefox team has been working around the clock using frontier AI models to find and fix latent security vulnerabilities in the browser. We wrote previously about our collaboration with Anthropic to scan Firefox with Opus 4.6, which led to fixes for 22 security-sensitive bugs in Firefox 148.</p>
<p>As part of our continued collaboration with Anthropic, we had the opportunity to apply an early version of Claude Mythos Preview to Firefox. This week&#8217;s release of Firefox 150 includes fixes for 271 vulnerabilities identified during this initial evaluation...</p></blockquote></description>
<pubDate>Wed, 29 Apr 2026 12:12:00 +0200</pubDate><category></category><guid isPermaLink='false'>https://www.schneier.com/?p=71995</guid>    </item>

    <item>
       <title>What Anthropic’s Mythos Means for the Future of Cybersecurity</title>
       <link>https://www.schneier.com/blog/archives/2026/04/what-anthropics-mythos-means-for-the-future-of-cybersecurity.html</link>
       <description><p>Two weeks ago, Anthropic <a href="https://red.anthropic.com/2026/mythos-preview/">announced</a> that its new model, Claude Mythos Preview, can autonomously find and weaponize software vulnerabilities, turning them into working exploits without expert guidance. These were vulnerabilities in key software like operating systems and internet infrastructure that thousands of software developers working on those systems failed to find. This capability will have major security implications, compromising the devices and services we use every day. As a result, <a href="https://spectrum.ieee.org/tag/anthropic">Anthropic</a> is not releasing the model to the general public, but instead to a ...</p></description>
<pubDate>Tue, 28 Apr 2026 13:06:00 +0200</pubDate><category></category><guid isPermaLink='false'>https://www.schneier.com/?p=71990</guid>    </item>

    <item>
       <title>Medieval Encrypted Letter Decoded</title>
       <link>https://www.schneier.com/blog/archives/2026/04/medieval-encrypted-letter-decoded.html</link>
       <description><p>Sent by a Spanish diplomat. Apparently people have been <a href="https://www.medievalists.net/2026/04/secret-letter-detailing-late-medieval-britain-fully-decoded/">working on it</a> since it was rediscovered in 1860.</p></description>
<pubDate>Mon, 27 Apr 2026 13:04:00 +0200</pubDate><category></category><guid isPermaLink='false'>https://www.schneier.com/?p=71986</guid>    </item>

    <item>
       <title>Friday Squid Blogging: How Squid Survived Extinction Events</title>
       <link>https://www.schneier.com/blog/archives/2026/04/friday-squid-blogging-how-squid-survived-extinction-events.html</link>
       <description><p>Science <a href="https://www.sciencedaily.com/releases/2026/03/260331001100.htm">news</a>:</p>
<blockquote><p>Scientists have finally cracked a long-standing mystery about squid and cuttlefish evolution by analyzing newly sequenced genomes alongside global datasets. The research reveals that these bizarre, intelligent creatures likely originated deep in the ocean over 100 million years ago, surviving mass extinction events by retreating into oxygen-rich deep-sea refuges. For millions of years, their evolution barely changed&#8212;until a dramatic post-extinction boom sparked rapid diversification as they moved into new shallow-water habitats. ...</p></blockquote></description>
<pubDate>Fri, 24 Apr 2026 23:03:00 +0200</pubDate><category></category><guid isPermaLink='false'>https://www.schneier.com/?p=71981</guid>    </item>

    <item>
       <title>Hiding Bluetooth Trackers in Mail</title>
       <link>https://www.schneier.com/blog/archives/2026/04/hiding-bluetooth-trackers-in-mail.html</link>
       <description><p>It was used to <a href="https://www.tomshardware.com/tech-industry/cyber-security/bluetooth-tracker-hidden-in-a-postcard-and-mailed-to-a-warship-exposed-its-location-a-eur5-gadget-put-a-eur500-million-dutch-ship-at-risk-for-24-hours">track</a> a Dutch naval ship:</p>
<blockquote><p>Dutch journalist Just Vervaart, working for regional media network Omroep Gelderland, followed the directions posted on the Dutch government website and mailed a postcard with a hidden tracker inside. Because of this, they were able to track the ship for about a day, watching it sail from Heraklion, Crete, before it turned towards Cyprus. While it only showed the location of that one vessel, knowing that it was part of a carrier strike group sailing in the Mediterranean could potentially put the entire fleet at risk...</p></blockquote></description>
<pubDate>Fri, 24 Apr 2026 13:01:00 +0200</pubDate><category></category><guid isPermaLink='false'>https://www.schneier.com/?p=71983</guid>    </item>

    <item>
       <title>FBI Extracts Deleted Signal Messages from iPhone Notification Database</title>
       <link>https://www.schneier.com/blog/archives/2026/04/fbi-extracts-deleted-signal-messages-from-iphone-notification-database.html</link>
       <description><p>404 Media <a href="https://www.404media.co/fbi-extracts-suspects-deleted-signal-messages-saved-in-iphone-notification-database-2/">reports</a> (alternate <a href="https://archive.ph/bSQhD">site</a>):</p>
<blockquote><p>The FBI was able to forensically extract copies of incoming Signal messages from a defendant’s iPhone, even after the app was deleted, because copies of the content were saved in the device’s push notification database&#8230;.</p>
<p>The news shows how forensic extraction&#8212;­when someone has physical access to a device and is able to run specialized software on it&#8212;­can yield sensitive data derived from secure messaging apps in unexpected places. Signal already has a setting that blocks message content from displaying in push notifications; the case highlights why such a feature might be important for some users to turn on...</p></blockquote></description>
<pubDate>Thu, 23 Apr 2026 13:05:00 +0200</pubDate><category></category><guid isPermaLink='false'>https://www.schneier.com/?p=71971</guid>    </item>

    <item>
       <title>ICE Uses Graphite Spyware</title>
       <link>https://www.schneier.com/blog/archives/2026/04/ice-uses-graphite-spyware.html</link>
       <description><p>ICE has <a href="https://www.npr.org/2026/04/07/nx-s1-5776799/ice-spyware-privacy">admitted</a> that it uses spyware from the Israeli company Graphite.</p></description>
<pubDate>Wed, 22 Apr 2026 13:02:00 +0200</pubDate><category></category><guid isPermaLink='false'>https://www.schneier.com/?p=71969</guid>    </item>

    <item>
       <title>Mexican Surveillance Company</title>
       <link>https://www.schneier.com/blog/archives/2026/04/mexican-surveillance-company.html</link>
       <description><p><a href="https://restofworld.org/2026/mexico-seguritech-government-surveillance-profile/">Grupo Seguritech</a> is a Mexican surveillance company that is expanding into the US.</p></description>
<pubDate>Tue, 21 Apr 2026 13:04:00 +0200</pubDate><category></category><guid isPermaLink='false'>https://www.schneier.com/?p=71967</guid>    </item>

  </channel>

</rss>