Category: EN

Rare Earth Supply Constraints Hit German Manufacturers

German companies manufacturing electronic, optical gear report increased supply constraints amidst rising restrictions on rare-earths This article has been indexed from Silicon UK Read the original article: Rare Earth Supply Constraints Hit German Manufacturers

US Senate Proposes AI Companion Ban For Minors

Character.ai to restrict use by under-18s, after Senate proposes banning minors from use of ‘treacherous chatbots’ This article has been indexed from Silicon UK Read the original article: US Senate Proposes AI Companion Ban For Minors

How neighbors could spy on smart homes

Even with strong wireless encryption, privacy in connected homes may be thinner than expected. A new study from Leipzig University shows that someone in an adjacent apartment could learn personal details about a household without breaking any encryption. By monitoring…

Your photo could be all AI needs to clone your voice

A photo of someone’s face may be all an attacker needs to create a convincing synthetic voice. A new study from Australia’s national science agency explores this possibility, testing how well deepfake detectors perform against FOICE (Face-to-Voice), an attack attack…

WordPress Plugin Vulnerability Lets Attackers Read Any Server File

A critical security flaw has been discovered in the Anti-Malware Security and Brute-Force Firewall WordPress plugin, putting more than 100,000 websites at risk. The vulnerability, identified as CVE-2025-11705, allows authenticated attackers with basic subscriber-level access to read any file stored…

CISA Alerts on Active Exploitation of WSUS Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning about active exploitation of a critical vulnerability affecting Windows Server Update Service (WSUS). The agency updated its alert on October 29, 2025, adding crucial information about identifying vulnerable…

Hottest cybersecurity open-source tools of the month: October 2025

This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. Chekov: Open-source static code analysis tool Checkov is an open-source tool designed to help teams secure their cloud infrastructure and code. At…

PolarEdge Botnet Hits 25K IoT Devices in Major Cyber Campaign

Cybersecurity researchers at XLab have uncovered a sophisticated infrastructure-as-a-service botnet operation called PolarEdge, which has compromised over 25,000 Internet of Things devices and established 140 command-and-control servers through systematic exploitation of vulnerable edge devices. The newly exposed RPX relay system…