One more time, with feeling … Garbage in, garbage out, in training and inference Researchers have found that large language models (LLMs) tend to parrot buggy code when tasked with completing flawed snippets.… This article has been indexed from The…
Tag: The Register – Security
CISA fires, now rehires and immediately benches security crew on full pay
DOGE efficiency in action The upheaval at the US government’s Cybersecurity and Infrastructure Security Agency, aka CISA, took another twist on Tuesday, as it moved to reinstate staffers it had fired over the past few weeks – specifically those still…
US tech jobs outlook clouded by DOGE cuts, Trump tariffs
Hiring remains relatively strong as analysts warn of slowdown A pair of reports on tech sector employment trends in the United States suggest out-of-work techies right now have relatively decent prospects, but economic uncertainty and rapid policy changes initiated by…
Microsoft isn’t fixing 8-year-old shortcut exploit abused for spying
‘Only’ a local access bug but important part of N Korea, Russia, and China attack picture An exploitation avenue found by Trend Micro has been used in an eight-year-long spying campaign, but there’s no sign of a fix from Microsoft,…
Google acquisition target Wiz links fresh supply chain attack to 23K pwned GitHub repos
Ad giant’s cloudy arm to pay $30B in security shop deal Wiz security researchers think they’ve found the root cause of the GitHub supply chain attack that unfolded over the weekend, and they say that a separate attack may have…
UK wants dirt on data brokers before criminals get there first
Govt wants to learning mistakes of serially breached record holders so it can, er, liberalize data sharing regs under new law The UK government is inviting experts to provide insights about the data brokerage industry and the potential risks it…
Extortion crew threatened to inform Edward Snowden (?!) if victim didn’t pay up
Don’t laugh. This kind of warning shows crims are getting desperate Dark web analysts at infosec software vendor Fortra have discovered an extortion crew named Ox Thief that threatened to contact Edward Snowden if a victim didn’t pay to protect…
‘Dead simple’ hijacking hole in Apache Tomcat ‘now actively exploited in the wild’
One PUT request, one poisoned session file, and the server’s yours A trivial flaw in Apache Tomcat that allows remote code execution and access to sensitive files is said to be under attack in the wild within a week of…
Court filing: DOGE aide broke Treasury policy by emailing unencrypted database
More light shed on what went down with Marko Elez, thanks to NY AG and co’s lawsuit A now-former DOGE aide violated US Treasury policy by emailing an unencrypted database containing people’s private information to two Trump administration officials, according…
Amazon to kill off local Alexa processing, all voice requests shipped to the cloud
Web souk says Echo hardware doesn’t have the oomph for next-gen AI anyway Come March 28, those who opted to have their voice commands for Amazon’s AI assistant Alexa processed locally on their Echo devices will lose that option, with…
Amazon boots local Alexa processing: All your voice requests shipped to the cloud
Web souk says Echo hardware doesn’t have the oomph for next-gen AI anyway Come March 28, those who opted to have their voice commands for Amazon’s AI assistant Alexa processed locally on their Echo devices will lose that option, with…
GitHub supply chain attack spills secrets from 23,000 projects
Large organizations among those cleaning up the mess It’s not such a happy Monday for defenders wiping the sleep from their eyes only to deal with the latest supply chain attack.… This article has been indexed from The Register –…
UK government to open £16B IT services competition after 6-month delay
Technology Services 4 framework expands by £4B, with procurement to begin this week UK government is set to crack open the pork barrel for up to £16 billion in contracts for a range of IT services. The buying framework was…
Microsoft wouldn’t look at a bug report without a video. Researcher maliciously complied
Maddening techno loop, Zoolander reference, and 14 minutes of time wasted A vulnerability analyst and prominent member of the infosec industry has blasted Microsoft for refusing to look at a bug report unless he submitted a video alongside a written…
FCC stands up Council on National Security to fight China in ways that CISA used to
PLUS: Alleged Garantex admin arrested in India; Google deletes more North Korean malware Infosec In Brief United States Federal Communications Commission chair Brendan Carr has unveiled plans to form a Council on National Security that will combat foreign threats to…
Apple’s alleged UK encryption battle sparks political and privacy backlash
National security defense being used to keep appeal behind closed doors US politicians and privacy campaigners are calling for the private hearing between Apple and the UK government regarding its alleged encryption-busting order to be aired in public.… This article…
New kids on the ransomware block channel Lockbit to raid Fortinet firewalls
It’s March already and you haven’t patched? Researchers are tracking a newly discovered ransomware group with suspected links to LockBit after a series of intrusions were reported starting in January.… This article has been indexed from The Register – Security…
Dems ask federal agencies for reassurance DOGE isn’t feeding data into AI willy-nilly
Pouring sensitive info into unapproved, unaccountable, unsafe models would be a ‘severe’ cybersecurity fail House Democrats have sent letters to 24 federal agencies asking for assurances that Elon Musk’s DOGE team is not feeding sensitive government data into “unapproved and…
Google says it’s rolling out a fix for stricken Chromecasts
It’ll take a few days, give or take your situation Google has told The Register it’s beginning to roll out a fix for Chromecast devices that were bricked due to an expired security certificate authority. We’re assured this deployment will…
That ‘angry guest’ email from Booking.com? It’s a scam, not a 1-star review
Phishers check in, your credentials check out, Microsoft warns An ongoing phishing campaign disguised as a Booking.com email casts keystroke and credential-stealing malware into hospitality employees’ inboxes for financial fraud and theft, according to Microsoft Threat Intelligence.… This article has…