13 Mar

Researchers jimmy OpenAI’s and Google’s closed models

Boffins have managed to pry open closed AI services from OpenAI and Google with an attack that recovers an otherwise hidden portion of transformer models.

Author rabih
13 Mar

March Patch Tuesday sees Hyper-V join the guest-host escape club

Patch Tuesday Microsoft’s monthly patch drop has arrived, delivering a mere 61 CVE-tagged vulnerabilities – none listed as under active attack or already known to

Author rabih
12 Mar

Meta sues ex infra VP for allegedly stealing top-secret datacenter blueprints

An ex-Meta veep has been sued by his former bosses for “brazenly disloyal and dishonest conduct” – and by that, they mean he allegedly stole

Author rabih
12 Mar

15,000+ Roku Accounts Compromised — Take These Steps to Protect Yourself

Hackers used one of the oldest tricks in the book to turn a buck. All the expense of several thousand Roku users. Roku notified users

Author rabih
12 Mar

Biden’s budget proposal boosts CISA funding to $3b

US President Joe Biden has asked Congress to approve an extra $103 million in funding for the Cybersecurity and Infrastructure Security Agency, bringing CISA’s total

Author rabih
12 Mar

Scam or Not? How to Tell Whether Your Text Message Is Real 

According to reports from the Federal Trade Commission’s Consumer Sentinel database, text message scams swindled $330 million from Americans in 2022 alone. The staggering figure

Author rabih
12 Mar

JetBrains is still mad at Rapid7 for the ransomware attacks on its customers

Last week, we wrote about how security outfit Rapid7 threw JetBrains, the company behind the popular CI/CD platform TeamCity, under the bus over allegations of

Author rabih
12 Mar

UK council yanks IT systems and phone lines offline following cyber ambush

Leicester City Council says IT systems and a number of its critical service phone lines will remain down until later this week at the earliest

Author rabih
12 Mar

Election cybersecurity: Protecting the ballot box and building trust in election integrity

Critical Infrastructure What cyberthreats could wreak havoc on elections this year and how worried should we as voters be about the integrity of our voting

Author rabih
12 Mar

French government sites disrupted by très grande DDoS

Several French government websites have been disrupted by a severe distributed denial of service attack. A statement from prime minister Gabriel Attal’s office acknowledged that

Author rabih
12 Mar

White House and lawmakers increase pressure on UnitedHealth to ease providers’ pain

The Biden administration and US lawmakers are turning up the pressure on UnitedHealth group to ease medical providers’ pain after the ransomware attack on Change

Author rabih
11 Mar

Kremlin accuses America of plotting cyberattack on Russian voting systems

The Kremlin has accused the United States of meddling in Russia’s upcoming presidential election, and even accused Uncle Sam of planning a cyberattack on the

Author rabih
11 Mar

British Library pushes the cloud button, says legacy IT estate cause of hefty rebuild

The British Library says legacy IT is the overwhelming factor delaying efforts to recover from the Rhysida ransomware attack in late 2023. Rhysida broke into

Author rabih
11 Mar

How do you lot feel about Pay or say OK to ads model, asks ICO

The UK’s Information Commissioner’s Office (ICO) has opened a consultation on “consent or pay” business models. We’re sure readers of The Register will have a

Author rabih
11 Mar

Microsoft waited 6 months to patch actively exploited admin-to-kernel vulnerability

Infosec in brief Cybersecurity researchers informed Microsoft that Notorious North Korean hackers Lazarus Group discovered the “holy grail” of rootkit vulnerabilities in Windows last year,

Author rabih
08 Mar

Cybercrime crew Magnet Goblin bursts onto the scene exploiting Ivanti holes

There’s yet another group of miscreants out there hijacking insecure Ivanti devices: A new, financially motivated gang dubbed Magnet Goblin has emerged from the shadowy

Author rabih
08 Mar

What are Pig Butchering Scams and How Do They Work?

“Jessica” cost him one million dollars.   In an account to Forbes, one man described how he met “Jessica” online.i Readily, they formed a friendship. Turns

Author rabih
08 Mar

Microsoft confirms Russian spies stole source code, accessed internal systems

Microsoft has now confirmed that the Russian cyberspies who broke into its executives’ email accounts stole source code and gained access to internal systems. The

Author rabih
Load moreLoadingAll items loaded