Not a very smart home: crims could hijack smart-home boiler, open and close powered windows and more. Now fixed Black hat A trio of researchers has disclosed a major prompt injection vulnerability in Google’s Gemini large language model-powered applications.… This…
Category: The Register – Security
UK secretly allows facial recognition scans of passport, immigration databases
Campaigners brand Home Office’s lack of transparency as ‘astonishing’ and ‘dangerous’ Privacy groups report a surge in UK police facial recognition scans of databases secretly stocked with passport photos lacking parliamentary oversight.… This article has been indexed from The Register…
UK proxy traffic surges as users consider VPN alternatives amid Online Safety Act
It’s ‘more than a temporary trend,’ Decodo claims Amid the furor around surging VPN usage in the UK, many users are eyeing proxies as a potential alternative to the technology.… This article has been indexed from The Register – Security…
Prohibition never works, but that didn’t stop the UK’s Online Safety Act
Will someone think of the deals politicians are making? Opinion You might think, since I write about tech all the time, my degrees are in computer science. Nope. I’m a bona fide, degreed historian, which is why I can say…
Why blow up satellites when you can just hack them?
A pair of German researchers showed how easy it is Black Hat Four countries have now tested anti-satellite missiles (the US, China, Russia, and India), but it’s much easier and cheaper just to hack them.… This article has been indexed…
German security researchers say ‘Windows Hell No’ to Microsoft biometrics for biz
Hello loophole could let a rogue admin, or a pwned one, inject new facial scans Black Hat Microsoft is pushing hard for Windows users to shift from using passwords to its Hello biometrics system, but researchers sponsored by the German…
Microsoft, CISA warn yet another Exchange server bug can lead to ‘total domain compromise’
No reported in-the-wild exploits…yet Microsoft and the feds late Wednesday sounded the alarm on another high-severity bug in Exchange Server hybrid deployments that could allow attackers to escalate privileges from on-premises Exchange to the cloud.… This article has been indexed…
Black Hat’s network ops center brings rivals together for a common cause
The Reg goes behind the scenes of the conference NOC, where volunteers ‘look for a needle in a needle stack’ Black Hat Neil “Grifter” Wyler is spending the week “looking for a needle in a needle stack,” a task he’ll…
CISA releases malware analysis for Sharepoint Server attack
Indications of compromise and Sigma rules report for your security scanners amid ongoing ‘ToolShell’ blitz CISA has published a malware analysis report with compromise indicators and Sigma rules for “ToolShell” attacks targeting specific Microsoft SharePoint Server versions.… This article has…
KLM, Air France latest major organizations looted for customer data
Watch out, the phishermen are about, customers told European airline giants Air France and KLM say they are the latest in a string of major organizations to have their customers’ data stolen by way of a break-in at a third…
Meta training AI on social media posts? Only 7% in Europe think it’s OK
Privacy campaigner Max Schrem’s NOYB is back on Zuck’s back Meta’s enthusiasm for training its AI on user data is not shared by the users themselves – at least for some Europeans – according a study commissioned by Facebook legal…
Amnesty slams Elon Musk’s X for ‘central role’ in fueling 2024 UK riots
Human rights org calls for greater accountability and stronger enforcement of Online Safety Act Amnesty International claims Elon Musk’s X platform “played a central role” in pushing the misinformation that stoked racially charged violence following last year’s Southport murders.… This…
Could agentic AI save us from the cybercrisis?
Many hands make light work in the SOC Sponsored feature The cyberthreat landscape is evolving fast, with highly organized bad actors launching ever more devastating and sophisticated attacks against often ill-prepared targets.… This article has been indexed from The Register…
Microsoft researchers bullish on AI security agent even though it let 74% of malware slip through
Project Ire promises to use LLMs to detect whether code is malicious or benign Microsoft has rolled out an autonomous AI agent that it claims can detect malware without human assistance.… This article has been indexed from The Register –…
Google says the group behind last year’s Snowflake attack slurped data from one of its Salesforce instances
ShinyHunters suspected in rash of intrusions Google confirmed that criminals breached one of its Salesforce databases and stole info belonging to some of its small-and-medium-business customers.… This article has been indexed from The Register – Security Read the original article:…
Vibe coding tool Cursor’s MCP implementation allows persistent code execution
More evidence that AI expands the attack surface Check Point researchers uncovered a remote code execution bug in popular vibe-coding AI tool Cursor that could allow an attacker to poison developer environments by secretly modifying a previously approved Model Context…
Patch now: Millions of Dell PCs with Broadcom chips vulnerable to attack
Psst, wanna steal someone’s biometrics? black hat Critical security flaws in Broadcom chips used in more than 100 models of Dell computers could allow attackers to take over tens of millions of users’ devices, steal passwords, and access sensitive data,…
Study finds humans not completely useless at malware detection
Some pinpointed software nasties but were suspicious of printer drivers too Researchers from the Universities of Guelph and Waterloo have discovered exactly how users decide whether an application is legitimate or malware before installing it – and the good news…
Chained bugs in Nvidia’s Triton Inference Server lead to full system compromise
Wiz Research details flaws in Python backend that expose AI models and enable remote code execution Security researchers have lifted the lid on a chain of high-severity vulnerabilities that could lead to remote code execution (RCE) on Nvidia’s Triton Inference…
Hacker summer camp: What to expect from BSides, Black Hat, and DEF CON
These are the conference events to keep an eye on. You can even stream a few The security industry is hitting Vegas hard this week with three conferences in Sin City that bring the world’s largest collection of security pros…