Leaders in the United States House of Representatives on Thursday released the text of a negotiated bill to reauthorize a US surveillance program that enables federal agents to read the communications of Americans without a warrant. The agreement—while appearing to contain a slew of new oversight provisions—leaves untouched the kind of warrantless search of Americans' communications that a federal court ruled unconstitutional last year.
The bill aims to extend the embattled program—Section 702 of the Foreign Intelligence Surveillance Act (FISA)—for an additional three years and is the product of a deal cut with House Republican leadership after House speaker Mike Johnson failed to secure a clean 18-month extension last week.
The 702 program has become increasingly controversial due to revelations that federal agents have used it to spy on racial justice protesters, political donors, journalists, and sitting members of Congress. Oversight mechanisms credited with curbing the FBI's prior abuses have also been dismantled under the current administration, even as the bureau has raided the homes of journalists and the FBI director has publicly threatened to investigate the president's perceived enemies.
Data breaches grew larger and more frequent from 2023 to 2025, impacting worldwide users. Attackers used advanced methods, such as ransomware, supply-chain attacks, and cloud misconfigurations. Many organizations faced service outages, financial losses, and regulatory scrutiny. These incidents also caused long-term damage to customer trust and brand reputation.
Below is an overview of some of the most significant data breaches recorded in recent years.
The latest attempt to re-up a controversial expiring surveillance law has failed to placate vocal critics on both the left and right of the political spectrum.
Two House votes failed last week to extend the spying powers under Section 702 of the Foreign Intelligence Surveillance Act (FISA) for 18 months without changes, leading to Congress instead passing a 10-day reauthorization. GOP leaders have been scrambling to find a bill they can pass since with the April 30 deadline approaching.
House Speaker Mike Johnson, R-La., introduced a bill Thursday to extend it for three years, with a section stating that government officials can’t use Section 702 to target Americans. Under Section 702, U.S. spies and law enforcement agencies can warrantlessly search electronic communications of foreign targets. But those targets are sometimes communicating with U.S. persons, and officials can search the communications database using their personal information.
But critics of the latest Johnson proposal say the language about targeting Americans is window dressing.
Vercel said the fallout from an attack on its internal systems hit more customers than previously known, as ongoing analysis uncovered additional evidence of compromise.
The company, which makes tools and hosts cloud infrastructure for developers, maintains a “small number” of accounts were impacted, but it has yet to share a number or range of known incidents linked to the attack. Vercel created and maintains Next.js, a platform supporting AI agents that’s downloaded more than 9 million times per week, and other popular open-source projects.
Vercel CEO Guillermo Rauch said the company and partners have analyzed nearly a petabyte of logs across the Vercel network and API, and learned malicious activity targeting the company and its customers extends beyond an initial attack that originated at Context.ai.
“Threat intel points to the distribution of malware to computers in search of valuable tokens like keys to Vercel accounts and other providers,” Rauch said in a post on X.
ythos matters. It is a significant step forward in AI-assisted vulnerability discovery. But it does not mean cybersecurity changed overnight, nor does it mean enterprises are suddenly facing fully automated exploitation at internet scale tomorrow.
It does mean the offensive side of AI is continuing to improve. The defensive side needs to catch up now.
Mythos is the latest step in a longer trend. Over the next several years, expect the same pattern to repeat: incremental progress, then a jump; incremental progress, then a jump. Models will get more capable and cheaper with each cycle, and each jump will put more pressure on security teams still operating at human speed.
Mythos demonstrated that AI can find software vulnerabilities with unprecedented depth. That is real progress and should be taken seriously. However, this was not a case where AI suddenly made enterprise compromise cheap, easy, or automatic. Even in Anthropic’s own examples, the cost of discovering a critical vulnerability was significant. One example cited roughly $20,000 in token costs to identify a significant OpenBSD issue.
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.