Wednesday · May 13, 2026 Vol. I · No. 132
Independent · Aggregated · Daily
"All the news that's worth your time"
Established 2026
The

Krull Report

A Daily News Brief · Curated by Vladimir Krull
Live
Trump arrives in China for high-stakes meeting with Xi Jinping Deadly Russian drone attacks on Ukraine resume after ceasefire expires Ex-Spurs chief Levy never imagined relegation fight Is the Pentagon’s UFO dump a political distraction? India’s salt workers brave brutal heat on Gujarat’s desert plains More than 1,000 passengers held on cruise after gastrointestinal illness outbreak Starmer has ‘full confidence’ in Streeting despite health secretary’s allies saying he is planning … Levy optimistic Tottenham will avoid relegation Trump arrives in China for high-stakes meeting with Xi Jinping Deadly Russian drone attacks on Ukraine resume after ceasefire expires Ex-Spurs chief Levy never imagined relegation fight Is the Pentagon’s UFO dump a political distraction? India’s salt workers brave brutal heat on Gujarat’s desert plains More than 1,000 passengers held on cruise after gastrointestinal illness outbreak Starmer has ‘full confidence’ in Streeting despite health secretary’s allies saying he is planning … Levy optimistic Tottenham will avoid relegation

Technology

Technology · Cybersecurity

⚡ Weekly Recap: Linux Rootkit, macOS Crypto Stealer, WebSocket Skimmers and More

Rough Monday. Somebody poisoned a trusted download again, somebody else turned cloud servers into public housing, and a few crews are still getting into boxes with bugs that shoul…

TECHNOLOGY
Technology · Software & Apps

Venmo’s biggest makeover in years comes at a very interesting time

The timing is notable. PayPal, which owns Venmo, is restructuring to spin Venmo off as a stand-alone business unit — a move widely seen as laying the groundwork for a potential sa…

Technology · Cybersecurity

Your Purple Team Isn't Purple — It's Just Red and Blue in the Same Room

Defending a network at 2 am looks a lot like this: an analyst copy-pasting a hash from a PDF into a SIEM query. A red team script is being rewritten by hand so the blue team can u…

TECHNOLOGY
Technology · Software & Apps

Korea’s biggest manufacturers back Config, the TSMC of robot data

Instead of building robots themselves, the team is focused on a simpler goal — providing data that robots need to learn and operate. They believe that better data will be key to m…

Technology · Cybersecurity

Fake OpenAI Privacy Filter Repo Hits #1 on Hugging Face, Draws 244K Downloads

A malicious Hugging Face repository managed to take a spot in the platform's trending list by impersonating OpenAI's Privacy Filter open-weight model to deliver a Rust-based infor…

TECHNOLOGY
Technology · Software & Apps

Get ready for the whisper-filled office of the future

How will work setups change if we spend more and more time talking to our computers?

TECHNOLOGY
Technology · Software & Apps

Anthropic says ‘evil’ portrayals of AI were responsible for Claude’s blackmail attempts

Fictional portrayals of artificial intelligence can have a real effect on AI models, according to Anthropic.

TECHNOLOGY
Technology · Software & Apps

Uber has always wanted to be more than a ride; now it has reason to hurry

The company has been trying to embed itself inside the AV industry — as a data provider, an investor, and a distribution platform — but the consumer-facing bet may be just as impo…

TECHNOLOGY
Technology · Software & Apps

TechCrunch Mobility: Lime’s IPO gamble

Welcome back to TechCrunch Mobility, your hub for the future of transportation and now, more than ever, how AI is playing a part.  

TECHNOLOGY
Technology · Software & Apps

We’re feeling cynical about xAI’s big deal with Anthropic

On the latest episode of the Equity podcast, we discussed what xAI's deal with Anthropic might mean for parent company SpaceX.

TECHNOLOGY
Technology · Software & Apps

The hottest place for startups to strike a deal? The F1 paddock

F1 Grands Prix have emerged as a new place to see and be seen if you are a founder or investor.

Technology · Cybersecurity

Ollama Out-of-Bounds Read Vulnerability Allows Remote Process Memory Leak

Cybersecurity researchers have disclosed a critical security vulnerability in Ollama that, if successfully exploited, could allow a remote, unauthenticated attacker to leak its en…

TECHNOLOGY
Technology · Software & Apps

Voice AI in India is hard — Wispr Flow is betting on it anyway

Wispr Flow says growth accelerated in India after its Hinglish rollout, even as voice AI products continue to face challenges.

Technology · Cybersecurity

cPanel, WHM Release Fixes for Three New Vulnerabilities — Patch Now

cPanel has released updates to address three vulnerabilities in cPanel and Web Host Manager (WHM) that could be exploited to achieve privilege escalation, code execution, and deni…

Technology · Cybersecurity

TCLBANKER Banking Trojan Targets Financial Platforms via WhatsApp and Outlook Worms

Threat hunters have flagged a previously undocumented Brazilian banking trojan dubbed TCLBANKER that's capable of targeting 59 banking, fintech, and cryptocurrency platforms. The …

Technology · Cybersecurity

Fake Call History Apps Stole Payments From Users After 7.3 Million Play Store Downloads

Cybersecurity researchers have discovered fraudulent apps on the official Google Play Store for Android that falsely claimed to offer access to call histories for any phone number…

Technology · Cybersecurity

One Click, Total Shutdown: The "Patient Zero" Webinar on Killing Stealth Breaches

The hardest part of cybersecurity isn't the technology, it’s the people. Every major breach you’ve read about lately usually starts the same way: one employee, one clever email, a…

Technology · Cybersecurity

Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise

A previously undocumented Linux implant codenamed Quasar Linux RAT (QLNX) is targeting developers' systems to establish a silent foothold as well as facilitate a broad range of po…

Technology · Cybersecurity

One Missed Threat Per Week: What 25M Alerts Reveal About Low-Severity Risk

The dark secret of enterprise security operations is that defenders have quietly institutionalized the practice of not looking. This is not just anecdotal, but rather backed by a …

Technology · Cybersecurity

New Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentials

Cybersecurity researchers have disclosed details of a new Linux backdoor named PamDOORa that's being advertised on the Rehub Russian cybercrime forum for $1,600 by a threat actor …

Technology · Cybersecurity

Linux Kernel Dirty Frag LPE Exploit Enables Root Access Across Major Distributions

Details have emerged about a new, unpatched local privilege escalation (LPE) vulnerability impacting the Linux kernel. Dubbed Dirty Frag, it has been described as a successor to C…

Technology · Cybersecurity

Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access

Ivanti is warning that a new security flaw impacting Endpoint Manager Mobile (EPMM) has been explored in limited attacks in the wild. The high-severity vulnerability, CVE-2026-697…

Technology · Cybersecurity

PCPJack Credential Stealer Exploits 5 CVEs to Spread Worm-Like Across Cloud Systems

Cybersecurity researchers have disclosed details of a new credential theft framework dubbed PCPJack that targets exposed cloud infrastructure and ousts any artifacts linked to Tea…

Technology · Cybersecurity

PAN-OS RCE Exploit Under Active Use Enabling Root Access and Espionage

Palo Alto Networks has disclosed that threat actors may have attempted to unsuccessfully exploit a recently disclosed critical security flaw as early as April 9, 2026. The vulnera…