CISA Adds Seven Known Exploited Vulnerabilities to Catalog
CISA has added seven new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog based on evidence of active exploitation. The CVEs affect Microsoft, Adobe, and Fortinet products. Binding Operational Directive 22-01 requires Federal Civilian Executive Branch agencies to remediate these vulnerabilities by specified due dates. CISA strongly urges all organizations to prioritize timely remediation of these vulnerabilities as part of their vulnerability management practice.
ICE Requests Missouri Not Release Illegal Alien Accused of Rape and Kidnapping
U.S. Immigration and Customs Enforcement (ICE) announced the arrest of Cristian Lopez-Gomez, a Honduran illegal alien, in connection with charges of rape and kidnapping of a woman in Kirksville, Missouri on Easter Sunday. Lopez-Gomez allegedly entered the United States illegally in 2024 and was released into American communities by the prior administration. ICE has formally requested Missouri authorities not release him while he faces criminal prosecution.
Multiples vulnérabilités dans les produits Microsoft - 13 CVE
CERT-FR issued advisory CERTFR-2026-AVI-0428 notifying of 13 vulnerabilities (CVE-2026-35385, CVE-2026-35386, CVE-2026-35388, CVE-2026-35535, CVE-2026-28388, CVE-2026-28389, CVE-2026-28390, CVE-2026-31789, CVE-2026-31790, CVE-2026-39881, CVE-2026-40024, CVE-2026-40025, CVE-2026-40026) affecting Microsoft products. Affected systems include azl3 openssh, openssl, sleuthkit, sudo, and vim packages. Risk level not specified by the vendor.
Critical Adobe Acrobat Vulnerability CVE-2026-34621 Actively Exploited
CERT-FR issued advisory CERTFR-2026-AVI-0429 warning of a critical vulnerability in Adobe Acrobat (CVE-2026-34621) that allows arbitrary code execution. The vulnerability affects Acrobat 2024, Acrobat DC, and Acrobat Reader DC on Windows and macOS. Adobe has confirmed the vulnerability is being actively exploited in the wild. Users are advised to apply vendor patches immediately.
Multiple Security Vulnerabilities in Python Allow Security Bypass
CERT-FR issued advisory CERTFR-2026-AVI-0426 on April 13, 2026, alerting that multiple vulnerabilities were discovered in Python (CPython). These vulnerabilities allow attackers to cause security policy bypass and unspecified security issues. Affected systems are CPython installations without the latest security patches. Two CVEs are referenced: CVE-2026-1502 and CVE-2026-3446.
Multiple Microsoft Edge Security Vulnerabilities Affecting Bypass and Remote Code Execution
ANSSI/CERT-FR published advisory CERTFR-2026-AVI-0427 warning of 86+ vulnerabilities in Microsoft Edge (CVE-2026-33118 through CVE-2026-5905 and beyond). Source bulletins were released by Microsoft on April 10, 2026. Vulnerabilities include security bypass and remote code execution risks affecting all organizations and users of Microsoft Edge browser.
Foxit PDF Services API SSRF Vulnerability Advisory
CERT-FR published a security advisory alerting organizations to a Server-Side Request Forgery (SSRF) vulnerability in Foxit PDF Services API. The vulnerability, tracked as CVE-2026-5936 and disclosed by FoxIT on April 7, 2026, could allow attackers to perform SSRF attacks. Affected organizations should apply the vendor's latest security patch.
NADD Dynamic HTTP Configuration For Network Functions
The USPTO published patent application US20260100883A1 by inventors Jay Rajput, Ashish Kumar, Virendra Singh, and Shashikiran Bhalachandra Mahalank. The application covers methods and systems for NADD-assisted dynamic configuration of HTTP parameter settings at Network Functions, including receiving SBI message feeds from producer NFs, determining HTTP parameter settings, and communicating settings to producer NFs for traffic flow control. Patent applications create no compliance obligations as they represent filings seeking intellectual property protection rather than granted rights.
CenturyLink IoD Network Management Patent Application
USPTO published patent application US20260100882A1 assigned to CenturyLink Intellectual Property LLC. The application covers systems and methods for dynamically managing Internet-on-Demand (IoD) services and connected devices through automated network configuration adjustments and priority-based parameter allocation.
Encrypted Command Authentication via Cloud Network
USPTO published patent application US20260100081A1 for security systems and methods related to encrypted command authentication via cloud networks. The application, filed October 8, 2025, by inventors Chris Bouchat and Shawn Zabel, covers encrypted command messages with timestamps, validity durations, use counts, user authentication, session key establishment, and command execution security protocols.
System and Method for Interference Mitigation and Congestion Control Through Cross Layer Cognitive Communications and Intelligent Routing
The USPTO published patent application US20260100914A1 assigned to A10 Systems Inc d/b/a AiRANACULUS on May 9, 2025. The application covers a method and system for dynamic packet routing through cognitive communications that detects link statuses across multiple communications modalities and determines optimal routing paths to destination nodes.
Neural Network Parameter Scaling Method for Federated Learning
The USPTO published patent application US20260099768A1 on April 9, 2026. The application discloses a method for scaling model parameters in federated learning systems where a user equipment applies a scaling factor to parameters based on the number of local training samples before transmitting scaled parameters to a network node. The application was filed on October 11, 2023.
NEC Language Model Efficient Training Method, Decision Support
NEC Language Model Efficient Training Method, Decision Support
Multimodal Retrieval Augmented Generation for Visually Rich Documents
USPTO published patent application US20260099698A1 filed by JPMorgan Chase Bank, N.A. The application covers multimodal retrieval augmented generation (RAG) methods for visually rich documents using a page-wise chunking algorithm. The system embeds text, spatial, and visual features from document pages into vectors, retrieves relevant chunks based on query similarity, and generates responses via a generative model.
Training Content Authenticity Validators via Variable Resolution Game
USPTO published patent application US20260099720A1 assigned to D5AI LLC, covering computer-implemented systems and methods for training content authenticity validators using variable resolution game theory in adversarial machine learning. The application, filed on October 25, 2024, describes training generators and discriminators in a simulated multi-player adversarial game relationship, including two-person zero-sum game configurations with non-simultaneous parameter updates.
Generating Three-Dimensional Molecule Structures Using Generative Artificial Intelligence Models
USPTO published patent application US20260100254A1 titled 'Generating Three-Dimensional Molecule Structures Using Generative Artificial Intelligence Models' filed on April 15, 2025 by inventors Daniel Alexander Reidenbach and Filipp Nikitin. The application discloses methods for using transformer layers and graph neural networks in a generative AI model to generate and refine 3D molecular structures for drug discovery based on initial structure, atom type, and bond type inputs.
Adaptive Data Loader for Bridging Legacy Data Sources and Artificial Intelligence Model Training
USPTO published patent application US20260099766A1 titled 'Adaptive Data Loader for Bridging Legacy Data Sources and Artificial Intelligence Model Training.' The application discloses a process for identifying legacy data sources, adapting data loaders to process data into a training format, and training AI models using the processed batches. Application No. 19064832 was filed on February 27, 2025.
AI Apparatus for Machine Operator Performance Feedback Correlation
The USPTO published patent application US20260099769A1 by inventors Bradford Everman and Brian Bradke, assigned to GMECI LLC, covering an AI apparatus for machine operator feedback correlation. The apparatus includes a processor and memory configured to receive performance data from sensing devices, classify performance data into categories, calculate performance determinations, and generate feedback correlations through a machine learning model. The system employs neural network architectures (CPC: G06N 20/00, G06N 3/0442) for correlating operator feedback with performance metrics.
Time Domain Resource Determination for Full-Duplex Operation
USPTO published patent application US20260100811A1 titled 'Time Domain Resource Determination for Full-Duplex Operation' filed on October 8, 2024. The application covers techniques for indicating time resources for full duplex user equipment operation, including configuration of subband full duplex (SBFD) time resources and half duplex (HD) time resources, and signaling to indicate available SBFD time resources for full duplex communication. Inventors: Ahmed Attia ABOTABL, Muhammad Sayed Khairy ABDELGHAFFAR, and Abdelrahman Mohamed Ahmed Mohamed IBRAHIM.
Configurable Packet Switch for Handling Data Packet Traffic
USPTO published patent application US20260100918A1 for a configurable packet switch system. The invention relates to handling network traffic in a packet switch having multiple ports and a switch fabric. The technique involves receiving data packets at a second port, routing through the switch fabric to a third port, and then routing to a first port for transmission to a recipient.
Rate Controller for ECN Patent, Network Congestion Management
The USPTO published patent application US20260100915A1 for a Rate Controller for Explicit Congestion Notification (ECN) system developed by inventors Simone Bolettieri and Koen De Schepper. The invention describes a communication node that marks packets based on network congestion levels, using adaptive marking-related parameters and smoothed measurement values to manage network traffic. The application was filed on September 23, 2025.
Effective LAG Load Distribution via L2 Source Forwarding/Routing
The USPTO published patent application US20260100908A1 filed by Ciena Corporation on October 7, 2024. The application covers systems and methods for Link Aggregation Group (LAG) load distribution via Layer 2 source forwarding/routing in networks. The published application includes claims for an apparatus with circuitry configured to monitor network status and determine paths through LAGs for new traffic from access nodes.
Critical Vulnerability in Apache ActiveMQ Classic
The Cyber Security Agency of Singapore issued an urgent advisory alerting users to a critical code injection vulnerability (CVE-2026-34197) in Apache ActiveMQ Classic. The flaw affects versions 5.x prior to 5.19.4 and versions 6.0.0 through 6.2.2. Successful exploitation could allow authenticated attackers to perform arbitrary code execution, with unauthenticated exploitation possible on versions 6.0.0 through 6.1.1 when chained with CVE-2024-32114, potentially resulting in full system compromise.
Multiple Vulnerabilities in SonicWall SMA1000 Series
The Cyber Security Agency of Singapore has issued an alert advising users to immediately update SonicWall SMA1000 series appliances due to four critical vulnerabilities (CVE-2026-4112, CVE-2026-4113, CVE-2026-4114, CVE-2026-4116). These flaws allow remote authenticated attackers to escalate privileges, enumerate SSL VPN credentials, and bypass TOTP authentication. Affected versions are prior to 12.4.3-03245 and 12.5.0-02283.
Critical Adobe Acrobat Vulnerability, Update Now
The Cyber Security Agency of Singapore issued an advisory on 13 April 2026 warning of active exploitation of a critical prototype pollution vulnerability (CVE-2026-34621) in Adobe Acrobat and Reader for Windows and macOS. Successful exploitation could allow unauthenticated attackers to perform arbitrary code execution. Users and administrators of affected products on continuous and classic tracks are advised to update to the latest versions immediately.
Audi Patent for Data Transmission Quality Indicator
Audi AG has obtained a published patent application (US20260100910A1) for a method of generating a data transmission quality indicator. The method involves detecting processing signals containing messages from functional units of a transmitter, determining a receiver message count, and verifying it against a predefined reference message count based on periodicity to assess wireless data transmission quality between transmitter and receiver.
Reliable Message Transmission Using Automatic Protection Switching
The USPTO published patent application US20260100903A1 on April 9, 2026, covering methods and systems for reliable message transmission using automatic protection switching (APS) in packet networks. Inventors Bharath Vasudevan and Christian Schmützer developed techniques for synchronizing APS states between network nodes based on priority and timer information. The published application establishes intellectual property rights for the applicants and may affect how competitors design similar protection switching mechanisms.
TSN Network Integrates Wired, Wireless for IoT
USPTO published patent application US20260100913A1 for a Time Sensitive Networking (TSN) system integrating wired and wireless TSN agents for mission-critical IoT applications. The system uses reinforcement learning and QoS feedback to dynamically generate optimized flow schedules for deterministic communication. Inventors are Subhasri Duttagupta and Abhilash Gopalakrishnan.
Samsung Electronics - Electronic Device Encrypted Content Decryption Method
The USPTO published Samsung Electronics Co., Ltd.'s patent application US20260100829A1 for an electronic device and control method involving encrypted content decryption. The method includes receiving playback schedule information with disclosure restrictions and validity periods, identifying encrypted content, transmitting decryption requests to a server, receiving encryption keys, decrypting content, and displaying decrypted content based on validity information.