Senate Extends Surveillance Powers Until April 30 After Chaotic Votes in House

SecurityWeek

Overview

The Senate has approved a short-term extension of a controversial surveillance program used by U.S. intelligence agencies, allowing it to remain in effect until April 30. This decision comes after a series of contentious votes in the House, where lawmakers debated the implications of the program on privacy and civil liberties. The surveillance powers in question are part of a broader debate about national security and the balance between safety and individual rights. Critics argue that such programs can infringe on personal privacy, while supporters claim they are essential for national security. This extension reflects ongoing tensions in Congress over how to handle surveillance in an increasingly digital age.

Key Takeaways

  • Affected Systems: U.S. surveillance programs
  • Timeline: Ongoing since April 2023

Original Article Summary

The Senate approved a short-term renewal until April 30 of a controversial surveillance program used by U.S. spy agencies. The post Senate Extends Surveillance Powers Until April 30 After Chaotic Votes in House appeared first on SecurityWeek.

Impact

U.S. surveillance programs

Exploitation Status

No active exploitation has been reported at this time. However, organizations should still apply patches promptly as proof-of-concept code may exist.

Timeline

Ongoing since April 2023

Remediation

Not specified

Additional Information

This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.

Related Coverage

CVE-2023-33538 under attack for a year, but exploitation still unsuccessful

Security Affairs

For over a year, hackers have aimed to exploit a serious vulnerability known as CVE-2023-33538, affecting older TP-Link routers. This flaw, which has a high CVSS score of 8.8, allows attackers to execute commands remotely on the devices. Despite the ongoing attempts, researchers have not reported any successful exploitation thus far. This situation is concerning for users of these outdated routers, as the vulnerability could potentially expose them to various cyber threats. It serves as a reminder for users to keep their devices updated and secure against known vulnerabilities.

Apr 20, 2026

Attackers Exploit DVR Command Injection Flaw to Deploy Mirai-Based Botnet

Infosecurity Magazine

FortiGuard Labs has reported that attackers are exploiting a command injection vulnerability (CVE-2024-3721) in TBK DVR devices, utilizing it to deploy a Mirai-based botnet. This vulnerability allows unauthorized commands to be executed on the affected devices, potentially turning them into part of a larger network of compromised devices. Users of TBK DVR systems should be particularly vigilant, as this exploitation could lead to significant disruptions or unauthorized access to their networks. The presence of this botnet in the wild raises concerns about the broader implications for IoT security and the need for manufacturers to address such vulnerabilities swiftly. It’s crucial for users to stay informed and take appropriate action to protect their devices.

Apr 20, 2026

Hackers Abuse QEMU for Defense Evasion

SecurityWeek

Hackers have been exploiting the QEMU machine emulator in at least two separate campaigns aimed at deploying ransomware and remote access tools. This abuse allows attackers to bypass security measures, making it harder for organizations to detect their malicious activities. The implications are significant, as this could potentially lead to data breaches and unauthorized access to sensitive information. Companies using QEMU should be vigilant and assess their defenses against these types of attacks to safeguard their systems. Researchers are urging affected organizations to review their security protocols and update their defenses accordingly.

Apr 20, 2026

Bluesky Disrupted by Sophisticated DDoS Attack

SecurityWeek

Bluesky, a social media platform, was hit by a significant distributed denial-of-service (DDoS) attack that lasted around 24 hours. A pro-Iran hacker group has claimed responsibility for this disruption. Users experienced difficulties accessing the platform during the attack, impacting their ability to communicate and interact online. This incident raises concerns about the security of social media platforms and the potential for politically motivated cyberattacks to affect users worldwide. As cyber threats become more sophisticated, it emphasizes the need for companies to bolster their defenses against such attacks.

Apr 20, 2026

Third-party AI hack triggers Vercel breach, internal environments accessed

Security Affairs

Vercel experienced a security breach due to a compromise of a third-party AI tool called Context.ai, which was being used by one of its employees. The breach occurred when attackers gained access to the employee's Google Workspace account, enabling them to infiltrate limited internal systems and access non-sensitive data. While the breach did not expose highly sensitive information, it raises concerns about the security of third-party tools and their impact on corporate networks. Vercel has reported this incident, and it serves as a reminder for companies to scrutinize the security measures of any external tools they integrate into their operations. Users and organizations relying on third-party applications must remain vigilant to protect their data and systems.

Apr 20, 2026

Network ‘background noise’ may predict the next big edge-device vulnerability

CyberScoop

Researchers from GreyNoise have identified a pattern in network activity that may indicate upcoming vulnerabilities in edge devices, particularly those used in security tools. This trend could serve as an early-warning system for organizations to prepare for potential attacks. By analyzing what they call 'background noise' in network traffic, these researchers aim to help defenders anticipate where threats might emerge. This proactive approach is crucial as it allows companies to bolster their defenses before vulnerabilities can be exploited. The findings emphasize the need for continuous monitoring and analysis of network behavior to stay ahead of cyber threats.

Apr 20, 2026