<?xml version='1.0' encoding='UTF-8'?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0"><channel><title>Noah News Tech Intelligence</title><link>http://noah.makes.news/</link><description>Noah News Tech Intelligence RSS feed</description><docs>http://www.rssboard.org/rss-specification</docs><language>en</language><lastBuildDate>Fri, 01 May 2026 09:03:41 +0000</lastBuildDate><item><title>US agencies urged to patch Windows flaw fueling zero-day exploits linked to Russian espionage</title><link>http://noah.makes.news/gb/en/tech-intelligence/2026/05/01/us-agencies-urged-to-patch-windows-flaw-fueling-zero-day-exploits-linked-to-russian-espionage</link><description>&lt;p&gt;The US Cybersecurity and Infrastructure Security Agency has ordered federal departments to fix a critical Windows flaw, CVE-2026-32202, after it was linked to active zero-day attacks and espionage by Russian hackers, highlighting escalating cyber threat dynamics.&lt;/p&gt;&lt;p&gt;The US Cybersecurity and Infrastructure Security Agency has told federal departments to secure Windows systems after a flaw linked to active zero-day attacks was added to its Known Exploited Vulnerabilities catalogue. The issue, tracked as CVE-2026-32202, has been described by Akamai as a zero-click NTLM hash leak that remained after Microsoft’s February fix for a separate Windows Remote Code Execution bug proved incomplete.&lt;/p&gt;
&lt;p&gt;According to CISA, the vulnerability was added to the catalogue on 28 April, with civilian agencies required to address it by 12 May. The agency said organisations should apply vendor mitigations where available, follow binding guidance for cloud services, or stop using the affected product if no workable mitigation exists.&lt;/p&gt;
&lt;p&gt;Security researchers say the weakness is tied to an earlier chain of flaws that had already been abused by the Russian espionage group APT28, also known as Fancy Bear and UAC-0001. CERT-UA said that campaign hit targets in Ukraine and EU countries in December 2025 and relied on weaponised LNK files alongside a separate Windows Shell issue, CVE-2026-21513, to reach victims.&lt;/p&gt;
&lt;p&gt;Help Net Security reported that the latest flaw can expose NTLMv2 hashes simply by a user browsing a folder, without needing to open the malicious file. That makes the issue especially dangerous in enterprise environments, where stolen authentication material can be used to move laterally through networks and escalate access.&lt;/p&gt;
&lt;h3&gt;Source Reference Map&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Inspired by headline at:&lt;/strong&gt; &lt;sup&gt;&lt;a href="https://lifeboat.com/blog/2026/04/cisa-orders-feds-to-patch-windows-flaw-exploited-as-zero-day" rel="nofollow" target="_blank"&gt;[1]&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources by paragraph:&lt;/strong&gt;
- Paragraph 1: &lt;sup&gt;&lt;a href="https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-windows-flaw-exploited-in-zero-day-attacks/" rel="nofollow" target="_blank"&gt;[2]&lt;/a&gt;&lt;/sup&gt;, &lt;sup&gt;&lt;a href="https://www.helpnetsecurity.com/2026/04/29/windows-cve-2026-32202-exploited/" rel="nofollow" target="_blank"&gt;[3]&lt;/a&gt;&lt;/sup&gt;
- Paragraph 2: &lt;sup&gt;&lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-32202" rel="nofollow" target="_blank"&gt;[6]&lt;/a&gt;&lt;/sup&gt;
- Paragraph 3: &lt;sup&gt;&lt;a href="https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-windows-flaw-exploited-in-zero-day-attacks/" rel="nofollow" target="_blank"&gt;[2]&lt;/a&gt;&lt;/sup&gt;, &lt;sup&gt;&lt;a href="https://www.helpnetsecurity.com/2026/04/29/windows-cve-2026-32202-exploited/" rel="nofollow" target="_blank"&gt;[3]&lt;/a&gt;&lt;/sup&gt;, &lt;sup&gt;&lt;a href="https://www.notebookcheck.net/Windows-zero-day-CVE-2026-32202-confirmed-as-exploited.1285559.0.html" rel="nofollow" target="_blank"&gt;[4]&lt;/a&gt;&lt;/sup&gt;, &lt;sup&gt;&lt;a href="https://www.hendryadrian.com/cisa-orders-feds-to-patch-windows-flaw-exploited-as-zero-day/" rel="nofollow" target="_blank"&gt;[5]&lt;/a&gt;&lt;/sup&gt;
- Paragraph 4: &lt;sup&gt;&lt;a href="https://www.helpnetsecurity.com/2026/04/29/windows-cve-2026-32202-exploited/" rel="nofollow" target="_blank"&gt;[3]&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;Source: &lt;a href="https://www.noahwire.com" rel="nofollow" target="_blank"&gt;Noah Wire Services&lt;/a&gt;&lt;/p&gt;</description><guid isPermaLink="false">69f465696dab2f97c8184577</guid><enclosure url="https://assets.makes.news/p/663bea31cee334cd1f1a4bc6/tech-intelligence/2026/05/01/us-agencies-urged-to-patch-windows-flaw-fueling-zero-day-exploits-linked-to-russian-espionage/image_7506505.jpg" length="1200" type="image/jpeg"/><pubDate>Fri, 01 May 2026 09:03:40 +0000</pubDate></item><item><title>VECT 2.0 ransomware acts as destructive file wiper due to critical encryption flaws</title><link>http://noah.makes.news/gb/en/tech-intelligence/2026/05/01/vect-2-0-ransomware-acts-as-destructive-file-wiper-due-to-critical-encryption-flaws</link><description>&lt;p&gt;Security researchers warn that the VECT 2.0 ransomware, spreading across Windows, Linux, and VMware ESXi, is so poorly designed that it damages files beyond recovery, blurring the line between extortion and outright data wiping, with potential for future escalation.&lt;/p&gt;&lt;p&gt;Security researchers are warning that VECT 2.0, a ransomware-as-a-service operation that has been spreading across Windows, Linux and VMware ESXi systems, is so badly designed that it behaves less like extortionware and more like a file wiper. Check Point Research says the malware mishandles its encryption routine on files above roughly 131KB, overwriting the data needed for decryption and making recovery impossible even if victims pay. &lt;/p&gt;
&lt;p&gt;That flaw matters because the vast majority of business data falls above that size threshold. According to reporting from The Hacker News and TechRadar, the bug means documents, spreadsheets, backups and other routinely targeted files are not merely locked but effectively destroyed, with only the last fragment of a file sometimes left intact. The decryption keys are discarded during the process, leaving neither victims nor the operators with a working way to restore the data. &lt;/p&gt;
&lt;p&gt;The campaign has already developed into a more organised criminal operation. Secure.com reported that VECT 2.0 surfaced on Russian-language cybercrime forums in late 2025, then expanded into a broader RaaS model with affiliates and partnerships aimed at widening distribution. Its operators have also been linked by researchers to TeamPCP, while some reports say the group is charging an entry fee in Monero. &lt;/p&gt;
&lt;p&gt;Researchers say the technical mistakes go beyond the nonce-handling bug, pointing to inconsistent cipher selection, flawed thread management and other signs that the code may have been assembled from older malware or partly generated with AI assistance. Even so, Check Point cautions that the current failures do not make the threat harmless: the group already has a distribution network in place, and a future update could turn the operation into a more effective tool for disruption and theft. The immediate advice from analysts is to rely on offline backups, tested recovery plans and rapid containment rather than any expectation of ransom payment buying data back. &lt;/p&gt;
&lt;h3&gt;Source Reference Map&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Inspired by headline at:&lt;/strong&gt; &lt;sup&gt;&lt;a href="https://lifeboat.com/blog/2026/04/vect-2-0-ransomware-irreversibly-destroys-files-over-131kb-on-windows-linux-esxi" rel="nofollow" target="_blank"&gt;[1]&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources by paragraph:&lt;/strong&gt;
- Paragraph 1: &lt;sup&gt;&lt;a href="https://www.tomshardware.com/tech-industry/cyber-security/ransomware-accidentally-destroys-all-files-larger-than-128kb-preventing-decryption-vect-code-likely-partly-vibe-coded-with-ai-or-used-an-old-code-base-security-researchers-suggest" rel="nofollow" target="_blank"&gt;[2]&lt;/a&gt;&lt;/sup&gt;, &lt;sup&gt;&lt;a href="https://thehackernews.com/2026/04/vect-20-ransomware-irreversibly.html" rel="nofollow" target="_blank"&gt;[6]&lt;/a&gt;&lt;/sup&gt;
- Paragraph 2: &lt;sup&gt;&lt;a href="https://www.techradar.com/pro/security/vect-is-being-marketed-as-ransomware-but-it-functions-as-a-data-destruction-tool-experts-warn-this-broken-ransomware-is-now-acting-as-a-data-wiper-so-protect-your-files-now" rel="nofollow" target="_blank"&gt;[3]&lt;/a&gt;&lt;/sup&gt;, &lt;sup&gt;&lt;a href="https://www.secure.com/news/vect-2-0-ransomware-targets-windows-linux-esxi" rel="nofollow" target="_blank"&gt;[4]&lt;/a&gt;&lt;/sup&gt;
- Paragraph 3: &lt;sup&gt;&lt;a href="https://www.secure.com/news/vect-2-0-ransomware-targets-windows-linux-esxi" rel="nofollow" target="_blank"&gt;[4]&lt;/a&gt;&lt;/sup&gt;, &lt;sup&gt;&lt;a href="https://www.hendryadrian.com/vect-2-0-ransomware-irreversibly-destroys-files-over-131kb-on-windows-linux-esxi/" rel="nofollow" target="_blank"&gt;[5]&lt;/a&gt;&lt;/sup&gt;
- Paragraph 4: &lt;sup&gt;&lt;a href="https://www.tomshardware.com/tech-industry/cyber-security/ransomware-accidentally-destroys-all-files-larger-than-128kb-preventing-decryption-vect-code-likely-partly-vibe-coded-with-ai-or-used-an-old-code-base-security-researchers-suggest" rel="nofollow" target="_blank"&gt;[2]&lt;/a&gt;&lt;/sup&gt;, &lt;sup&gt;&lt;a href="https://www.techradar.com/pro/security/vect-is-being-marketed-as-ransomware-but-it-functions-as-a-data-destruction-tool-experts-warn-this-broken-ransomware-is-now-acting-as-a-data-wiper-so-protect-your-files-now" rel="nofollow" target="_blank"&gt;[3]&lt;/a&gt;&lt;/sup&gt;, &lt;sup&gt;&lt;a href="https://www.secure.com/news/vect-2-0-ransomware-targets-windows-linux-esxi" rel="nofollow" target="_blank"&gt;[4]&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;Source: &lt;a href="https://www.noahwire.com" rel="nofollow" target="_blank"&gt;Noah Wire Services&lt;/a&gt;&lt;/p&gt;</description><guid isPermaLink="false">69f465696dab2f97c8184575</guid><enclosure url="https://assets.makes.news/p/663bea31cee334cd1f1a4bc6/tech-intelligence/2026/05/01/vect-2-0-ransomware-acts-as-destructive-file-wiper-due-to-critical-encryption-flaws/image_5592248.jpg" length="1200" type="image/jpeg"/><pubDate>Fri, 01 May 2026 09:03:39 +0000</pubDate></item><item><title>US and UK warn of increasing risks from overlooked home routers as Russian hackers exploit vulnerabilities</title><link>http://noah.makes.news/gb/en/tech-intelligence/2026/05/01/us-and-uk-warn-of-increasing-risks-from-overlooked-home-routers-as-russian-hackers-exploit-vulnerabilities</link><description>&lt;p&gt;U.S. and British agencies raise alarms over the security of everyday routers following revelations of Russian cyber espionage activities exploiting known device vulnerabilities, urging simple yet critical safeguarding measures for households and small offices.&lt;/p&gt;&lt;p&gt;U.S. and British cyber agencies are again warning that one of the most overlooked devices in homes and small offices may also be one of the easiest to exploit: the internet router. In April, the National Security Agency said it supported an FBI public service announcement after U.S. and international law enforcement disrupted a network of compromised small-office and home-office routers tied to malicious hijacking activity. &lt;/p&gt;
&lt;p&gt;The concern is not theoretical. According to the NSA, Russian military intelligence hackers have been collecting credentials and abusing vulnerable routers worldwide, including some TP-Link devices affected by a known flaw. The FBI said the routers were being used in DNS hijacking schemes, in which internet traffic is quietly diverted through attacker-controlled systems, making it possible to steal passwords, authentication tokens and other sensitive information. &lt;/p&gt;
&lt;p&gt;The Justice Department and FBI said their court-authorised disruption targeted the U.S. portion of a broader router network linked to Russia’s GRU Military Unit 26165, better known as APT28, Fancy Bear or Forest Blizzard. The agencies said the compromised devices were being used against targets of intelligence interest, including people in the military, government and critical infrastructure sectors. The NSA had already warned in 2024 that the same unit was using compromised routers to harvest credentials, proxy traffic and host spearphishing pages. &lt;/p&gt;
&lt;p&gt;For ordinary users, the message is to treat the router as a front door, not an afterthought. The NSA’s earlier home-network guidance and the latest warning both point to the same basic defences: reboot the router, install firmware updates, replace default administrator credentials, disable remote management unless it is genuinely needed and retire devices that no longer receive support. The agency says teleworkers should also make sure home access to employer systems is properly hardened, including through VPNs where appropriate. &lt;/p&gt;
&lt;p&gt;The latest alert is less a call for alarm than for maintenance. A router that is patched, properly locked down and still supported by its maker is far harder to abuse than one left on autopilot for years. For households, churches, charities and small businesses alike, the practical fix may be as simple as closing the digital door before anyone tries the handle. &lt;/p&gt;
&lt;h3&gt;Source Reference Map&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Inspired by headline at:&lt;/strong&gt; &lt;sup&gt;&lt;a href="https://baltimoretimes-online.com/living-well/2026/05/01/your-router-may-be-the-front-door-hackers-are-trying-to-open/" rel="nofollow" target="_blank"&gt;[1]&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources by paragraph:&lt;/strong&gt;
- Paragraph 1: &lt;sup&gt;&lt;a href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/4453919/nsa-supports-fbi-in-highlighting-russian-gru-threats-against-routers/" rel="nofollow" target="_blank"&gt;[2]&lt;/a&gt;&lt;/sup&gt;, &lt;sup&gt;&lt;a href="https://www.fbi.gov/investigate/cyber/alerts" rel="nofollow" target="_blank"&gt;[3]&lt;/a&gt;&lt;/sup&gt;
- Paragraph 2: &lt;sup&gt;&lt;a href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/4453919/nsa-supports-fbi-in-highlighting-russian-gru-threats-against-routers/" rel="nofollow" target="_blank"&gt;[2]&lt;/a&gt;&lt;/sup&gt;, &lt;sup&gt;&lt;a href="https://www.fbi.gov/investigate/cyber/alerts" rel="nofollow" target="_blank"&gt;[3]&lt;/a&gt;&lt;/sup&gt;, &lt;sup&gt;&lt;a href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3688119/russian-cyber-actors-use-compromised-routers-to-facilitate-cyber-operations/" rel="nofollow" target="_blank"&gt;[4]&lt;/a&gt;&lt;/sup&gt;
- Paragraph 3: &lt;sup&gt;&lt;a href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3688119/russian-cyber-actors-use-compromised-routers-to-facilitate-cyber-operations/" rel="nofollow" target="_blank"&gt;[4]&lt;/a&gt;&lt;/sup&gt;, &lt;sup&gt;&lt;a href="https://www.justice.gov/opa/pr/justice-department-conducts-court-authorized-disruption-dns-hijacking-network-controlled" rel="nofollow" target="_blank"&gt;[6]&lt;/a&gt;&lt;/sup&gt;
- Paragraph 4: &lt;sup&gt;&lt;a href="https://www.nsa.gov/Press-Room/News-Highlights/Article/Article/3304674/nsa-releases-best-practices-for-securing-your-home-network/" rel="nofollow" target="_blank"&gt;[5]&lt;/a&gt;&lt;/sup&gt;, &lt;sup&gt;&lt;a href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/4453919/nsa-supports-fbi-in-highlighting-russian-gru-threats-against-routers/" rel="nofollow" target="_blank"&gt;[2]&lt;/a&gt;&lt;/sup&gt;
- Paragraph 5: &lt;sup&gt;&lt;a href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/4453919/nsa-supports-fbi-in-highlighting-russian-gru-threats-against-routers/" rel="nofollow" target="_blank"&gt;[2]&lt;/a&gt;&lt;/sup&gt;, &lt;sup&gt;&lt;a href="https://www.nsa.gov/Press-Room/News-Highlights/Article/Article/3304674/nsa-releases-best-practices-for-securing-your-home-network/" rel="nofollow" target="_blank"&gt;[5]&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;Source: &lt;a href="https://www.noahwire.com" rel="nofollow" target="_blank"&gt;Noah Wire Services&lt;/a&gt;&lt;/p&gt;</description><guid isPermaLink="false">69f465696dab2f97c8184579</guid><enclosure url="https://assets.makes.news/p/663bea31cee334cd1f1a4bc6/tech-intelligence/2026/05/01/us-and-uk-warn-of-increasing-risks-from-overlooked-home-routers-as-russian-hackers-exploit-vulnerabilities/image_3805254.jpg" length="1200" type="image/jpeg"/><pubDate>Fri, 01 May 2026 09:03:38 +0000</pubDate></item><item><title>US Army accelerates integration of autonomous AI in cyber defence amid simulated enemy threat</title><link>http://noah.makes.news/gb/en/tech-intelligence/2026/05/01/us-army-accelerates-integration-of-autonomous-ai-in-cyber-defence-amid-simulated-enemy-threat</link><description>&lt;p&gt;The US Army is advancing its use of autonomous artificial intelligence to combat simulated cyber threats in the Indo-Pacific, signalling a shift towards machine-led defensive measures in future conflicts.&lt;/p&gt;&lt;p&gt;The US Army is treating artificial intelligence as a live operational threat, not just a productivity tool, after a recent tabletop exercise imagined an enemy AI probing communications and data networks in the Indo-Pacific and adjusting its tactics faster than human defenders could react. According to Business Insider, the scenario was designed around a hypothetical September 2027 crisis, with the aim of understanding how a machine-speed cyber campaign might unfold against Army systems.&lt;/p&gt;
&lt;p&gt;The exercise brought together 14 companies, including Google, OpenAI, Microsoft, Amazon Web Services and Palo Alto Networks, alongside Army and Pentagon officials. Gen. Chris Eubank, who leads Army Cyber Command, said the discussion centred on how frontier models and AI agents could help defenders spot intrusions, misdirect hostile systems and buy time when adversaries are adapting continuously. Axios reported that participants also explored whether the Army can bypass slower procurement habits to field these tools more quickly.&lt;/p&gt;
&lt;p&gt;The drill reflected a wider shift inside the service, which has already used earlier AI tabletop events to test ideas ranging from logistics to paperwork reduction. But this latest version pushed harder on the question of autonomy: where machines should be allowed to act on their own, and where a human must remain in control. Brandon Pugh, the Army's principal cyber adviser, said the premise was an adversary launching repeated waves of attacks that learned from each defensive response, exposing weaknesses in real time.&lt;/p&gt;
&lt;p&gt;That concern fits a broader military effort to weave AI into Indo-Pacific planning. Defence One reported last year that Indo-Pacific Command had begun using AI in wargaming to improve speed and decision-making, while Army Pacific and Army Futures Command have been building out multi-domain exercises that span cyber, space, air, land and sea. The Army's latest message is clear: in a future conflict, cyber defence may move too quickly for people alone, and the service wants AI not only to assist, but eventually to shoulder some defensive tasks itself.&lt;/p&gt;
&lt;h3&gt;Source Reference Map&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Inspired by headline at:&lt;/strong&gt; &lt;sup&gt;&lt;a href="https://www.businessinsider.com/how-us-army-is-readying-for-enemy-ai-cyberspace-attack-2026-5" rel="nofollow" target="_blank"&gt;[1]&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources by paragraph:&lt;/strong&gt;
- Paragraph 1: &lt;sup&gt;&lt;a href="https://www.businessinsider.com/how-us-army-is-readying-for-enemy-ai-cyberspace-attack-2026-5" rel="nofollow" target="_blank"&gt;[1]&lt;/a&gt;&lt;/sup&gt;, &lt;sup&gt;&lt;a href="https://www.businessinsider.com/how-us-army-is-readying-for-enemy-ai-cyberspace-attack-2026-5" rel="nofollow" target="_blank"&gt;[2]&lt;/a&gt;&lt;/sup&gt;
- Paragraph 2: &lt;sup&gt;&lt;a href="https://www.businessinsider.com/how-us-army-is-readying-for-enemy-ai-cyberspace-attack-2026-5" rel="nofollow" target="_blank"&gt;[2]&lt;/a&gt;&lt;/sup&gt;, &lt;sup&gt;&lt;a href="https://www.axios.com/2026/04/30/army-cybersecurity-artificial-intelligence-military" rel="nofollow" target="_blank"&gt;[3]&lt;/a&gt;&lt;/sup&gt;
- Paragraph 3: &lt;sup&gt;&lt;a href="https://www.businessinsider.com/how-us-army-is-readying-for-enemy-ai-cyberspace-attack-2026-5" rel="nofollow" target="_blank"&gt;[1]&lt;/a&gt;&lt;/sup&gt;, &lt;sup&gt;&lt;a href="https://www.axios.com/2026/04/30/army-cybersecurity-artificial-intelligence-military" rel="nofollow" target="_blank"&gt;[3]&lt;/a&gt;&lt;/sup&gt;
- Paragraph 4: &lt;sup&gt;&lt;a href="https://www.defenseone.com/technology/2025/05/indopacom-brings-ai-wargaming-exercise/405708/" rel="nofollow" target="_blank"&gt;[4]&lt;/a&gt;&lt;/sup&gt;, &lt;sup&gt;&lt;a href="https://www.pacom.mil/Media/News/News-Articles/Article/4163276/project-convergence-capstone-5-delivering-future-capabilities-through-multi-dom/" rel="nofollow" target="_blank"&gt;[5]&lt;/a&gt;&lt;/sup&gt;, &lt;sup&gt;&lt;a href="https://warroom.armywarcollege.edu/podcasts/data-deterrence-diplomacy/" rel="nofollow" target="_blank"&gt;[6]&lt;/a&gt;&lt;/sup&gt;, &lt;sup&gt;&lt;a href="https://www.army.mil/article/285570/from_concept_to_capability_us_army_rises_to_meet_the_challenge_in_the_indo_pacific" rel="nofollow" target="_blank"&gt;[7]&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;Source: &lt;a href="https://www.noahwire.com" rel="nofollow" target="_blank"&gt;Noah Wire Services&lt;/a&gt;&lt;/p&gt;</description><guid isPermaLink="false">69f465696dab2f97c818457b</guid><enclosure url="https://assets.makes.news/p/663bea31cee334cd1f1a4bc6/tech-intelligence/2026/05/01/us-army-accelerates-integration-of-autonomous-ai-in-cyber-defence-amid-simulated-enemy-threat/image_9426884.jpg" length="1200" type="image/jpeg"/><pubDate>Fri, 01 May 2026 09:03:36 +0000</pubDate></item><item><title>South Africa’s King V signals a decisive shift in AI governance for boards</title><link>http://noah.makes.news/gb/en/tech-intelligence/2026/05/01/south-africas-king-v-signals-a-decisive-shift-in-ai-governance-for-boards</link><description>&lt;p&gt;South Africa's updated King V code and draft AI policy mark a pivotal move towards integrating artificial intelligence oversight into corporate governance, compelling boards to proactively oversee digital systems and ethical AI use amidst rising automation risks.&lt;/p&gt;&lt;p&gt;South Africa’s move to King V is being framed as a fresh chapter in corporate governance, but its real significance may lie in how directly it confronts the rise of artificial intelligence. The new code, effective for financial years beginning on or after 1 January 2026, broadens the boardroom’s brief beyond people and processes to include the digital systems increasingly shaping decisions, risks and outcomes, according to commentary from advisers on the code’s evolution.&lt;/p&gt;
&lt;p&gt;At the centre of that shift is information governance. King V condenses governance expectations into a smaller set of core principles and places stronger emphasis on ethical leadership, compliance and the responsible use of technology. Recommended Practice 109, as described by governance specialists, makes clear that boards are expected to oversee the ethical acquisition, development and use of information systems, a framing that brings AI squarely into the board’s remit.&lt;/p&gt;
&lt;p&gt;That is becoming more urgent as organisations embed machine-learning tools into forecasting, customer service, fraud detection and operational planning. The risks are not theoretical. In Australia, a government-commissioned report was found to contain AI-generated errors, including fabricated references, which triggered reputational harm and repayment obligations for the consultancy involved. In another case, reported in February 2026, a global consulting firm partner was fined for using AI to cheat during internal training, while more than two dozen staff were found to have misused AI in assessments. The lesson, governance experts say, is that technology can accelerate failure just as easily as efficiency if oversight is weak.&lt;/p&gt;
&lt;p&gt;South Africa is also moving towards a broader policy framework. The Draft National AI Policy, approved by Cabinet in March 2026 and released for public comment in April, signals that government sees AI governance as a national priority rather than a niche technical issue. Legal commentators say the draft points to a sector-specific, multi-regulator model that would place oversight inside existing supervisory structures rather than create a single central AI regulator. Supporters argue that approach better reflects South Africa’s institutional landscape and the need for context-specific expertise.&lt;/p&gt;
&lt;p&gt;For boards, the practical implication is clear: AI governance cannot be left to IT teams alone. Directors are being urged to identify where automated systems already influence decisions, define accountability for oversight and test whether the data feeding those systems is reliable, lawful and ethically sourced. As firms and regulators race to catch up with the speed of automation, King V is likely to be judged not just on compliance, but on whether it helps boards govern intelligent systems with the same seriousness they apply to executives and balance sheets.&lt;/p&gt;
&lt;h3&gt;Source Reference Map&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Inspired by headline at:&lt;/strong&gt; &lt;sup&gt;&lt;a href="https://southafricanlifestylemag.co.za/2026/05/01/why-boards-must-govern-algorithms-not-just-people/" rel="nofollow" target="_blank"&gt;[1]&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources by paragraph:&lt;/strong&gt;
- Paragraph 1: &lt;sup&gt;&lt;a href="https://www.dbmlaw.com/Our-Insights/ArticleDetail.aspx?Title=King-V-A-new-era-for-Corporate-Governance" rel="nofollow" target="_blank"&gt;[2]&lt;/a&gt;&lt;/sup&gt;, &lt;sup&gt;&lt;a href="https://www.clydeco.com/en/insights/2025/11/king-v-code-enhances-principles-regarding-ai-gover" rel="nofollow" target="_blank"&gt;[6]&lt;/a&gt;&lt;/sup&gt;
- Paragraph 2: &lt;sup&gt;&lt;a href="https://southafricanlifestylemag.co.za/2026/05/01/why-boards-must-govern-algorithms-not-just-people/" rel="nofollow" target="_blank"&gt;[1]&lt;/a&gt;&lt;/sup&gt;, &lt;sup&gt;&lt;a href="https://www.clydeco.com/en/insights/2025/11/king-v-code-enhances-principles-regarding-ai-gover" rel="nofollow" target="_blank"&gt;[6]&lt;/a&gt;&lt;/sup&gt;
- Paragraph 3: &lt;sup&gt;&lt;a href="https://southafricanlifestylemag.co.za/2026/05/01/why-boards-must-govern-algorithms-not-just-people/" rel="nofollow" target="_blank"&gt;[1]&lt;/a&gt;&lt;/sup&gt;, &lt;sup&gt;&lt;a href="https://www.iitpsa.org.za/executive-ai-literacy-ai-governance-crucial-for-the-future-of-automation-in-sa/" rel="nofollow" target="_blank"&gt;[7]&lt;/a&gt;&lt;/sup&gt;
- Paragraph 4: &lt;sup&gt;&lt;a href="https://www.adams.africa/intellectual-property/south-africas-draft-national-ai-policy-building-a-framework-for-responsible-and-inclusive-ai-governance/" rel="nofollow" target="_blank"&gt;[4]&lt;/a&gt;&lt;/sup&gt;, &lt;sup&gt;&lt;a href="https://www.bakermckenzie.com/en/insight/publications/2026/02/south-african-ai-policy-moves-towards-approval" rel="nofollow" target="_blank"&gt;[5]&lt;/a&gt;&lt;/sup&gt;, &lt;sup&gt;&lt;a href="https://www.itweb.co.za/article/the-cios-case-for-south-africas-ai-governance-model/Pero3MZ3QgDqQb6m" rel="nofollow" target="_blank"&gt;[3]&lt;/a&gt;&lt;/sup&gt;
- Paragraph 5: &lt;sup&gt;&lt;a href="https://southafricanlifestylemag.co.za/2026/05/01/why-boards-must-govern-algorithms-not-just-people/" rel="nofollow" target="_blank"&gt;[1]&lt;/a&gt;&lt;/sup&gt;, &lt;sup&gt;&lt;a href="https://www.adams.africa/intellectual-property/south-africas-draft-national-ai-policy-building-a-framework-for-responsible-and-inclusive-ai-governance/" rel="nofollow" target="_blank"&gt;[4]&lt;/a&gt;&lt;/sup&gt;, &lt;sup&gt;&lt;a href="https://www.iitpsa.org.za/executive-ai-literacy-ai-governance-crucial-for-the-future-of-automation-in-sa/" rel="nofollow" target="_blank"&gt;[7]&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;Source: &lt;a href="https://www.noahwire.com" rel="nofollow" target="_blank"&gt;Noah Wire Services&lt;/a&gt;&lt;/p&gt;</description><guid isPermaLink="false">69f465696dab2f97c8184573</guid><enclosure url="https://assets.makes.news/p/663bea31cee334cd1f1a4bc6/tech-intelligence/2026/05/01/south-africas-king-v-signals-a-decisive-shift-in-ai-governance-for-boards/image_9954051.jpg" length="1200" type="image/jpeg"/><pubDate>Fri, 01 May 2026 09:03:31 +0000</pubDate></item><item><title>European AI project aims to transform air traffic control with trust-enhancing teamwork tools</title><link>http://noah.makes.news/gb/en/tech-intelligence/2026/05/01/european-ai-project-aims-to-transform-air-traffic-control-with-trust-enhancing-teamwork-tools</link><description>&lt;p&gt;The European DIALOG project is developing a 'Teamwork Assistant' to support air traffic controllers through real-time inference of intent and workload, promoting safer, more efficient skies without replacing human decision-making.&lt;/p&gt;&lt;p&gt;The European DIALOG project is exploring a deceptively simple idea: that artificial intelligence in air traffic control should behave less like a replacement and more like a dependable colleague. Coordinated by SINTEF and backed by EU research funding through the SESAR 3 Joint Undertaking, the initiative is building a "Teamwork Assistant" intended to support controllers rather than take decisions away from them. According to the project partners, the system is being designed to infer intent, track workload and respond to the controller’s needs in real time.&lt;/p&gt;
&lt;p&gt;That ambition matters because aviation is one of the most demanding environments in which to introduce automation. As traffic grows and pressure rises to cut emissions, AI tools are being looked at for route optimisation, lower fuel burn and better use of airspace. But the DIALOG team argues that safety-critical operations depend on trust, transparency and human authority. The project’s central premise is that controllers must understand what the digital assistant is doing, be able to override it instantly and remain accountable for the final call.&lt;/p&gt;
&lt;p&gt;The technical work is built around speech recognition, analysis of pilot-controller exchanges and machine-learning methods that assess attention and workload from voice, physiological signals and behavioural cues, according to SINTEF and the SESAR project pages. In practical terms, the assistant is meant to adapt to the controller’s state, the traffic picture and the wider operational context, rather than forcing staff to adapt to the machine’s logic. The aim is to preserve situational awareness while easing repetitive tasks that can drain focus over long shifts.&lt;/p&gt;
&lt;p&gt;In March 2026, the project reached an important validation stage when Deep Blue led simulation exercises with licensed air traffic controllers in realistic test conditions. The early feedback, as described by the project, was positive: controllers said the assistant helped them stay oriented and reduce fatigue during routine work, while leaving them freer to concentrate on higher-risk decisions. The broader goal is not automation for its own sake, but a model of human-AI teaming that can support safer, more efficient airspace management and, in turn, contribute to lower-emissions flying.&lt;/p&gt;
&lt;h3&gt;Source Reference Map&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Inspired by headline at:&lt;/strong&gt; &lt;sup&gt;&lt;a href="https://www.innovationnewsnetwork.com/safe-skies-and-smart-systems-the-dialog-vision-for-human-ai-teaming/69123/?utm_source=rss&amp;amp;utm_medium=rss&amp;amp;utm_campaign=safe-skies-and-smart-systems-the-dialog-vision-for-human-ai-teaming" rel="nofollow" target="_blank"&gt;[1]&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources by paragraph:&lt;/strong&gt;
- Paragraph 1: &lt;sup&gt;&lt;a href="https://www.sintef.no/en/projects/2024/dialog-deciphering-intents-of-air-traffic-controllers-workload-assessment-and-gaze-analysis-to-enable-their-efficient-and-trustworthy-collaboration-with-ai/" rel="nofollow" target="_blank"&gt;[2]&lt;/a&gt;&lt;/sup&gt;, &lt;sup&gt;&lt;a href="https://sesar.eu/projects/DIALOG" rel="nofollow" target="_blank"&gt;[3]&lt;/a&gt;&lt;/sup&gt;
- Paragraph 2: &lt;sup&gt;&lt;a href="https://www.innovationnewsnetwork.com/safe-skies-and-smart-systems-the-dialog-vision-for-human-ai-teaming/69123/?utm_source=rss&amp;amp;utm_medium=rss&amp;amp;utm_campaign=safe-skies-and-smart-systems-the-dialog-vision-for-human-ai-teaming" rel="nofollow" target="_blank"&gt;[1]&lt;/a&gt;&lt;/sup&gt;
- Paragraph 3: &lt;sup&gt;&lt;a href="https://www.sintef.no/en/projects/2024/dialog-deciphering-intents-of-air-traffic-controllers-workload-assessment-and-gaze-analysis-to-enable-their-efficient-and-trustworthy-collaboration-with-ai/" rel="nofollow" target="_blank"&gt;[2]&lt;/a&gt;&lt;/sup&gt;, &lt;sup&gt;&lt;a href="https://sesar.eu/projects/DIALOG" rel="nofollow" target="_blank"&gt;[3]&lt;/a&gt;&lt;/sup&gt;, &lt;sup&gt;&lt;a href="https://cordis.europa.eu/project/id/101166886" rel="nofollow" target="_blank"&gt;[4]&lt;/a&gt;&lt;/sup&gt;
- Paragraph 4: &lt;sup&gt;&lt;a href="https://www.innovationnewsnetwork.com/safe-skies-and-smart-systems-the-dialog-vision-for-human-ai-teaming/69123/?utm_source=rss&amp;amp;utm_medium=rss&amp;amp;utm_campaign=safe-skies-and-smart-systems-the-dialog-vision-for-human-ai-teaming" rel="nofollow" target="_blank"&gt;[1]&lt;/a&gt;&lt;/sup&gt;, &lt;sup&gt;&lt;a href="https://www.sintef.no/en/projects/2024/dialog-deciphering-intents-of-air-traffic-controllers-workload-assessment-and-gaze-analysis-to-enable-their-efficient-and-trustworthy-collaboration-with-ai/" rel="nofollow" target="_blank"&gt;[2]&lt;/a&gt;&lt;/sup&gt;, &lt;sup&gt;&lt;a href="https://sesar.eu/projects/DIALOG" rel="nofollow" target="_blank"&gt;[3]&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;Source: &lt;a href="https://www.noahwire.com" rel="nofollow" target="_blank"&gt;Noah Wire Services&lt;/a&gt;&lt;/p&gt;</description><guid isPermaLink="false">69f465696dab2f97c8184571</guid><enclosure url="https://assets.makes.news/p/663bea31cee334cd1f1a4bc6/tech-intelligence/2026/05/01/european-ai-project-aims-to-transform-air-traffic-control-with-trust-enhancing-teamwork-tools/image_6260038.jpg" length="1200" type="image/jpeg"/><pubDate>Fri, 01 May 2026 09:03:28 +0000</pubDate></item></channel></rss>