And yes, that means (retch) catering to AI searchers The job market is queasy and since you’re reading this, you need to upgrade your CV. It’s going to require some work to game the poorly trained AIs now doing so…
Category: The Register – Security
Trend Micro offers weak workaround for already-exploited critical vuln in management console
PLUS: Crypto mixer founders plead guilty; Another French telco hacked; Meta fights WhatsApp scams; And more! Infosec In Brief A critical vulnerability in the on-prem version of Trend Micro’s Apex One endpoint security platform is under active exploitation, the company…
DEF CON hackers plug security holes in US water systems amid tsunami of threats
Five pilot deployments are just a drop in the bucket, so it’s time to turbo scale def con A DEF CON hacker walks into a small-town water facility…no, this is not the setup for a joke or a (super-geeky) odd-couple…
The inside story of the Telemessage saga, and how you can view the data
It turns out no one was clean on OPSEC DEF CON On Saturday at DEF CON, security boffin Micah Lee explained just how he hacked into TeleMessage, the supposedly secure messaging app used by White House officials, which in turn…
Chinese biz using AI to hit US politicians, influencers with propaganda
In misinformation, Russia might be the top dog but the Chinese are coming warns former NSA boss DEF CON A cache of documents uncovered by Vanderbilt University has revealed disturbing details about how a Chinese company is building up a…
Star leaky app of the week: StarDict
Fun feature found in Debian 13: send your selected text to China – in plaintext As Trixie gets ready to début, a little-known app is hogging the limelight: StarDict, which sends whatever text you select, unencrypted, to servers in China.……
Ex-White House cyber, counter-terrorism guru: Microsoft considers security an annoyance, not a necessity
Tells The Reg China’s ability to p0wn Redmond’s wares ‘gives me a political aneurysm’ Comment Roger Cressey served two US presidents as a senior cybersecurity and counter-terrorism advisor and currently worries he’ll experience a “political aneurysm” due to Microsoft’s many…
Infosec hounds spot prompt injection vuln in Google Gemini apps
Not a very smart home: crims could hijack smart-home boiler, open and close powered windows and more. Now fixed Black hat A trio of researchers has disclosed a major prompt injection vulnerability in Google’s Gemini large language model-powered applications.… This…
UK secretly allows facial recognition scans of passport, immigration databases
Campaigners brand Home Office’s lack of transparency as ‘astonishing’ and ‘dangerous’ Privacy groups report a surge in UK police facial recognition scans of databases secretly stocked with passport photos lacking parliamentary oversight.… This article has been indexed from The Register…
UK proxy traffic surges as users consider VPN alternatives amid Online Safety Act
It’s ‘more than a temporary trend,’ Decodo claims Amid the furor around surging VPN usage in the UK, many users are eyeing proxies as a potential alternative to the technology.… This article has been indexed from The Register – Security…
Prohibition never works, but that didn’t stop the UK’s Online Safety Act
Will someone think of the deals politicians are making? Opinion You might think, since I write about tech all the time, my degrees are in computer science. Nope. I’m a bona fide, degreed historian, which is why I can say…
Why blow up satellites when you can just hack them?
A pair of German researchers showed how easy it is Black Hat Four countries have now tested anti-satellite missiles (the US, China, Russia, and India), but it’s much easier and cheaper just to hack them.… This article has been indexed…
German security researchers say ‘Windows Hell No’ to Microsoft biometrics for biz
Hello loophole could let a rogue admin, or a pwned one, inject new facial scans Black Hat Microsoft is pushing hard for Windows users to shift from using passwords to its Hello biometrics system, but researchers sponsored by the German…
Microsoft, CISA warn yet another Exchange server bug can lead to ‘total domain compromise’
No reported in-the-wild exploits…yet Microsoft and the feds late Wednesday sounded the alarm on another high-severity bug in Exchange Server hybrid deployments that could allow attackers to escalate privileges from on-premises Exchange to the cloud.… This article has been indexed…
Black Hat’s network ops center brings rivals together for a common cause
The Reg goes behind the scenes of the conference NOC, where volunteers ‘look for a needle in a needle stack’ Black Hat Neil “Grifter” Wyler is spending the week “looking for a needle in a needle stack,” a task he’ll…
CISA releases malware analysis for Sharepoint Server attack
Indications of compromise and Sigma rules report for your security scanners amid ongoing ‘ToolShell’ blitz CISA has published a malware analysis report with compromise indicators and Sigma rules for “ToolShell” attacks targeting specific Microsoft SharePoint Server versions.… This article has…
KLM, Air France latest major organizations looted for customer data
Watch out, the phishermen are about, customers told European airline giants Air France and KLM say they are the latest in a string of major organizations to have their customers’ data stolen by way of a break-in at a third…
Meta training AI on social media posts? Only 7% in Europe think it’s OK
Privacy campaigner Max Schrem’s NOYB is back on Zuck’s back Meta’s enthusiasm for training its AI on user data is not shared by the users themselves – at least for some Europeans – according a study commissioned by Facebook legal…
Amnesty slams Elon Musk’s X for ‘central role’ in fueling 2024 UK riots
Human rights org calls for greater accountability and stronger enforcement of Online Safety Act Amnesty International claims Elon Musk’s X platform “played a central role” in pushing the misinformation that stoked racially charged violence following last year’s Southport murders.… This…
Could agentic AI save us from the cybercrisis?
Many hands make light work in the SOC Sponsored feature The cyberthreat landscape is evolving fast, with highly organized bad actors launching ever more devastating and sophisticated attacks against often ill-prepared targets.… This article has been indexed from The Register…