News
America's cyber defenses are being dismantled from the inside
Opinion We almost lost the Common Vulnerabilities and Exposures (CVE) database system, but that's only the tip of the iceberg of what President Trump and company are doing to US cybersecurity efforts.…
RIP, Google Privacy Sandbox
After six years of work, Google's Privacy Sandbox, technology for delivering ads while protecting privacy, looks like dust in the wind.…
Two CISA officials jump ship, both proud of pushing for Secure by Design software
Two top officials have resigned from Uncle Sam's Cybersecurity and Infrastructure Security Agency, aka CISA, furthering fears of a brain drain amid White House cuts to the federal workforce.…
Fog ransomware channels Musk with demands for work recaps or a trillion bucks
Ransomware scumbags - potentially those behind the Fog gang - are channeling their inner Elon Musk with their latest ransom note, spotted by researchers at Trend Micro.…
A pot of $250K is now available to ransomware researchers, but it feeds a commercial product
Ransomware threat hunters can now collect rewards of $10,000 for each piece of intel they file under a new bug bounty that aims to squash extortionists.…
This is not just any 'cyber incident' … this is an M&S 'cyber incident'
UK high street mainstay Marks & Spencer told the London Stock Exchange this afternoon it has been managing a "cyber incident" for "the past few days."…
UN says Asian scam call center epidemic expanding globally amid political heat
Scam call centers are metastasizing worldwide "like a cancer," according to the United Nations, which warns the epidemic has reached a global inflection point as syndicates scale up and spread out.…
Bug hunter tricked SSL.com into issuing cert for Alibaba Cloud domain in 5 steps
Certificate issuer SSL.com’s domain validation system had an unfortunate bug that was exploited by miscreants to obtain, without authorization, digital certs for legit websites.…
Today's LLMs craft exploits from patches at lightning speed
The time from vulnerability disclosure to proof-of-concept (PoC) exploit code can now be as short as a few hours, thanks to generative AI models.…
Microsoft rated this bug as low exploitability. Miscreants weaponized it in just 8 days
On March 11 - Patch Tuesday - Microsoft rolled out its usual buffet of bug fixes. Just eight days later, miscreants had weaponized one of the vulnerabilities, using it against government and private sector targets in Poland and Romania.…
Hacking US crosswalks to talk like Zuck is as easy as 1234
Video Crosswalk buttons in various US cities were hijacked over the past week or so to – rather than robotically tell people it's safe to walk or wait – instead emit the AI-spoofed voices of Jeff Bezos, Elon Musk, and Mark Zuckerberg.…
Dems fret over DOGE feeding sensitive data into random AI
A group of 48 House Democrats is concerned that Elon Musk's cost-trimmers at DOGE are being careless in their use of AI to help figure out where to slash, creating security risks and giving the oligarch's artificial intelligence lab an inside track to train its models on government info.…
Oracle hopes talk of cloud data theft dies off. CISA just resurrected it for Easter
CISA – the US government's Cybersecurity and Infrastructure Security Agency – has issued an alert for those who missed Oracle grudgingly admitting some customer data was stolen from the database giant's public cloud infrastructure.…
CVE fallout: The splintering of the standard vulnerability tracking system has begun
Comment The splintering of the global system for identifying and tracking security bugs in technology products has begun.…
Krebs throws himself on the grenade, resigns from SentinelOne after Trump revokes clearances
Chris Krebs, the former head of the US Cybersecurity and Infrastructure Security Agency (CISA) and a longtime Trump target, has resigned from SentinelOne following a recent executive order that targeted him and revoked the security clearances of everybody at the company.…
Brit soldiers tune radio waves to fry drone swarms for pennies
British soldiers have successfully taken down drones with a radio-wave weapon.…
Whistleblower describes DOGE IT dept rampage at America's labor watchdog
Democratic lawmakers are calling for an investigation after a tech staffer at the US National Labor Relations Board (NLRB) blew the whistle on the cost-trimming DOGE's activities at the employment watchdog – which the staffer claims included being granted superuser status in contravention of standard operating procedures, exfiltrating data, and seemingly leaking credentials to someone with a Russian IP address.…
Free Blue Screens of Death for Windows 11 24H2 users
Keeping with its rich history of updates that break Windows in unexpected ways, Microsoft has warned that two recent patches for Windows 11 24H2 are triggering blue screen crashes.…
Signalgate chats vanish from CIA chief phone
CIA Director John Ratcliffe's smartphone has almost no trace left of the infamous Signalgate chat – the one in which he and other top US national security officials discussed a secret upcoming military operation in a group Signal conversation a journalist was inadvertently added to.…
Identifying the cyber risks that matter
Partner content A vast majority of security teams are overwhelmed by the large number of security alerts and vulnerabilities.…
Pages
