IT

SlashDot.org

Oracle Is Walking Away From Expanding Its Stargate Data Center With Oracle

  Openen als pagina
OpenAI is reportedly backing away from expanding its AI data center partnership with Oracle because newer generations of Nvidia GPUs may arrive before the facility is even operational. CNBC reports: Artificial intelligence chips are getting upgraded more quickly than data centers can be built, a market reality that exposes a key risk to the AI trade and Oracle's debt-fueled expansion. OpenAI is no longer planning to expand its partnership with Oracle in Abilene, Texas, home to the Stargate data center, because it wants clusters with newer generations of Nvidia graphics processing units, according to a person familiar with the matter. The current Abilene site is expected to use Nvidia's Blackwell processors, and the power isn't projected to come online for a year. By then, OpenAI is hoping to have expanded access to Nvidia's next-generation chips in bigger clusters elsewhere, said the person, who asked not to be named due to confidentiality. In a post on X, Oracle called the reports "false and incorrect." However, it only said existing projects are on track and didn't address expansion plans. CNBC notes: "Oracle secured the site, ordered the hardware, and spent billions of dollars on construction and staff, with the expectation of going bigger."

Read more of this story at Slashdot.

https://developers.slashdot.org/story/26/03/10/0510223/oracle-is-walking-away-from-expanding-its-stargate-data-center-with-oracle?utm_source=rss1.0mainlinkanon&utm_medium=feed


Claude AI Finds Bugs In Microsoft CTO's 40-Year-Old Apple II Code

  Openen als pagina
An anonymous reader quotes a report from The Register: AI can reverse engineer machine code and find vulnerabilities in ancient legacy architectures, says Microsoft Azure CTO Mark Russinovich, who used his own Apple II code from 40 years ago as an example. Russinovich wrote: "We are entering an era of automated, AI-accelerated vulnerability discovery that will be leveraged by both defenders and attackers." In May 1986, Russinovich wrote a utility called Enhancer for the Apple II personal computer. The utility, written in 6502 machine language, added the ability to use a variable or BASIC expression for the destination of a GOTO, GOSUB, or RESTORE command, whereas without modification Applesoft BASIC would only accept a line number. Russinovich had Claude Opus 4.6, released early last month, look over the code. It decompiled the machine language and found several security issues, including a case of "silent incorrect behavior" where, if the destination line was not found, the program would set the pointer to the following line or past the end of the program, instead of reporting an error. The fix would be to check the carry flag, which is set if the line is not found, and branch to an error. The existence of the vulnerability in Apple II type-in code has only amusement value, but the ability of AI to decompile embedded code and find vulnerabilities is a concern. "Billions of legacy microcontrollers exist globally, many likely running fragile or poorly audited firmware like this," said one comment to Russinovich's post.

Read more of this story at Slashdot.

https://it.slashdot.org/story/26/03/10/0521258/claude-ai-finds-bugs-in-microsoft-ctos-40-year-old-apple-ii-code?utm_source=rss1.0mainlinkanon&utm_medium=feed


Meta Acquires Moltbook, the Social Network For AI Agents

  Openen als pagina
Axios reports that Meta has acquired Moltbook, the viral, Reddit-like social network designed for AI agents. Humans are welcome, but only to observe. Axios reports: The deal brings Moltbook's creators -- Matt Schlicht and Ben Parr -- into Meta Superintelligence Labs (MSL), the unit run by former Scale AI CEO Alexandr Wang. Meta did not disclose Moltbook's purchase price. The deal is expected to close mid-March, Meta says, with the pair starting at MSL on March 16. When it launched in late January, Moltbook was labeled the "most interesting place on the internet" by open-source developer and writer Simon Willison. "Browsing around Moltbook is so much fun. A lot of it is the expected science fiction slop, with agents pondering consciousness and identity. There's also a ton of genuinely useful information, especially on m/todayilearned." In an internal post seen by Axios, Meta's Vishal Shah said existing Moltbook customers can temporarily continue using the platform. "The Moltbook team has given agents a way to verify their identity and connect with one another on their human's behalf," Shah says. "This establishes a registry where agents are verified and tethered to human owners." He added: "Their team has unlocked new ways for agents to interact, share content, and coordinate complex tasks."

Read more of this story at Slashdot.

https://tech.slashdot.org/story/26/03/10/1524229/meta-acquires-moltbook-the-social-network-for-ai-agents?utm_source=rss1.0mainlinkanon&utm_medium=feed


German Publishers Push Regulators To Fine Apple Over App Tracking Transparency

  Openen als pagina
German publishers and advertising groups are urging regulators to fine Apple over its App Tracking Transparency (ATT) system, arguing it unfairly restricts access to advertising data while allowing Apple to remain the central gatekeeper -- without subjecting its own apps to the same restrictions. If Germany's antitrust authority does rule against Apple, the company could face fines of up to 10% of its global revenue. 9to5Mac reports: One of the countries investigating whether ATT is anticompetitive is Germany. Last year, in an attempt to appease the country's antitrust watchdog, the company proposed several changes to the framework's rules. From Reuters' original coverage of Apple's changes proposals: "Apple had agreed to introduce neutral consent prompts for both its own services and third-party apps, and to largely align the wording, content and visual design of these messages, said Andreas Mundt, head of Germany's Bundeskartellamt. The company also proposed simplifying the consent process so developers can obtain user permission for advertising-related data processing in a way that complies with data protection law." [...] At the time, German regulators launched a consultation with industry publications to determine whether the proposals addressed their concerns. As it turns out, the answer was a hard no. As Reuters reported today: "Apple's proposed changes to its app tracking rules do not resolve antitrust issues in the mobile advertising market, associations representing German publishers and advertisers said on Tuesday as they urged the country's antitrust authority to slap a fine on the U.S. tech giant. [...] 'The proposed commitments would not change the negative effects of the App Tracking Transparency Framework,' Bernd Nauen, chief executive of the German Advertising Federation, said in a joint letter signed by the trade bodies. 'Apple would remain the data gatekeeper and would continue to decide who gets access to advertising-relevant data and how companies can communicate with their end customers,' he said."

Read more of this story at Slashdot.

https://apple.slashdot.org/story/26/03/10/050253/german-publishers-push-regulators-to-fine-apple-over-app-tracking-transparency?utm_source=rss1.0mainlinkanon&utm_medium=feed


EQT Eyes $6 Billion Sale of SUSE

  Openen als pagina
Private equity firm EQT AB is reportedly exploring a sale of SUSE that could value the open-source Linux pioneer at up to $6 billion, roughly doubling the valuation since EQT took the company private in 2023. Reuters reports: EQT "has hired investment bank Arma Partners to sound out a group of private equity investors for a possible sale of the company, said the sources, who requested anonymity to discuss confidential matters. The deliberations are at "an early stage and there is no certainty that EQT will proceed with "a transaction, the sources said. [...] The potential deal comes amid a broader selloff in software stocks, which has disrupted mergers and acquisitions activity. Investors are "concerned that new artificial intelligence tools could displace many existing software products, weighing on technology "valuations and making deals harder to price. Some investors, however, see Luxembourg-headquartered SUSE as a potential beneficiary of AI adoption, arguing that demand for enterprise-grade infrastructure software is likely to grow as companies build and deploy more AI applications. The company generates about $800 million in revenue and more than $250 million in earnings before interest, taxes, depreciation, and amortization (EBITDA) and could fetch between $4 billion and $6 billion in a sale, the sources said.

Read more of this story at Slashdot.

https://linux.slashdot.org/story/26/03/10/0450204/eqt-eyes-6-billion-sale-of-suse?utm_source=rss1.0mainlinkanon&utm_medium=feed


Techcrunch.com



ChatGPT can now create interactive visuals to help you understand math and science concepts

  Openen als pagina
On Tuesday, OpenAI introduced dynamic visual explanations, a new ChatGPT feature that allows users to see how formulas, variables, and mathematical relationships change in real time. Instead of just reading an explanation or looking at a static diagram, users can now interact directly with interactive visuals. For example, when exploring the Pythagorean theorem, you can [...]

https://techcrunch.com/2026/03/10/chatgpt-can-now-create-interactive-visuals-to-help-you-understand-math-and-science-concepts/




Engadget.com

Amazon wins a temporary injunction against Perplexity's Comet browser

  Openen als pagina

Amazon has secured a temporary win in its fight with Perplexity over the use of AI shopping bots. Bloomberg reported that a San Francisco federal court has determined that Perplexity must stop using its Comet web browser's AI agent to make purchases for users on Amazon's marketplace. The AI company will have a week to appeal the decision, otherwise it has been ordered to stop accessing any password-protected areas of Amazon's systems and destroy its copies of Amazon's data while the two companies continue to argue their cases.

"Amazon has provided strong evidence that Perplexity, through its Comet browser, accesses with the Amazon user's permission but without authorization by Amazon, the user's password-protected account," District Judge Maxine Chesney wrote in placing the temporary block.

"The preliminary injunction will prevent Perplexity’s unauthorized access to the Amazon store and is an important step in maintaining a trusted shopping experience for Amazon customers," an Amazon spokesperson told Bloomberg.

Amazon sent a cease-and-desist letter to Perplexity over the AI company's shopping bots in November. According to Amazon, use of the Comet agent to make purchases is a violation of its terms of service. "Perplexity will continue to fight for the right of internet users to choose whatever AI they want," a representative from Perplexity said of this week's decision.

This article originally appeared on Engadget at https://www.engadget.com/ai/amazon-wins-a-temporary-injunction-against-perplexitys-comet-browser-184000462.html?src=rss

https://www.engadget.com/ai/amazon-wins-a-temporary-injunction-against-perplexitys-comet-browser-184000462.html?src=rss


Wordle’s creator is back with a new game, and it’s a real chin scratcher

  Openen als pagina

Josh Wardle had a hell of a tough act to follow. His last game, Wordle, became incredibly popular thanks to its blend of simplicity, clarity and shareability. Over four years (and a seven-figure sale of Wordle to The New York Times) later, Wardle has released his follow-up game.

Like Wordle and its myriad clones, Parseword offers up one puzzle per day. It taps into the mechanics of cryptic crossword clues. So it might ask you to replace one of the words with a synonym, reverse it or find a homophone. You may need to remove letters from a word or combine it with another one to find the answer. There’s a tutorial to help you get to grips with things and hints are available.

Wardle told The New Yorker he was inspired by The Last of Us showrunner Craig Mazin, who he heard discuss the logic behind cryptics on a podcast. Wardle brought in two friends, Chris Dary and Matt Lee, whom he worked with at Reddit to collaborate on the new game. They received permission to use clues from long-time cryptic constructors Emily Cox and Henry Rathvon.

After playing the tutorial and today's puzzle, it seems you may need to be wired in a certain way to play Parseword. It’s certainly less approachable than Wordle. At first glance, it’s hard to see this reaching the same kind of mass appeal as Wardle’s previous game. (Fittingly enough, Parseword feels like a game geared toward New Yorker readers.)

Of course, countless other casual daily games that aim to replicate the success of Wordle have popped up over the last few years, from Quordle, Bracket City and Framed to the Times’ own Connections, Strands and Pips. Catfishing, which asks you to guess Wikipedia article subjects based on their categories, is a new favorite of mine. I still miss the original Heardle, though.

This article originally appeared on Engadget at https://www.engadget.com/gaming/wordles-creator-is-back-with-a-new-game-and-its-a-real-chin-scratcher-182639801.html?src=rss

https://www.engadget.com/gaming/wordles-creator-is-back-with-a-new-game-and-its-a-real-chin-scratcher-182639801.html?src=rss


Here's the final trailer for The Super Mario Galaxy Movie

  Openen als pagina

The Super Mario Galaxy Movie is nearly upon us, as the hotly-anticipated sequel arrives in theaters on April 1. Nintendo recently dropped the final trailer for the film, which is filled with quick visual gags and nods to the source material.

There aren't too many actual reveals in this footage, as it covers a lot of the same ground as previous trailers. However, it does show that fan favorite Lumalee is returning as a prison guard of some sort, reversing the storyline from the original film in which the cheerfully nihilistic creature was trapped in a cage.

Nintendo also released a larger presentation that featured the aforementioned trailer, but also included interviews with actors and franchise creator Shigeru Miyamoto. We did get some news in this video.

It was revealed that the long-tongued dinosaur Yoshi will be voiced by Donald Glover. So it's likely the dino will be saying a lot more than "Yoshi" over and over. Actor Luis Guzman will also be playing Wart, the primary antagonist from Super Mario Bros. 2. Issa Rae will be on hand to voice Honey Queen, the gigantic bee character from the Super Mario Galaxy games.

It was even confirmed by lead actors Chris Pratt and Charlie Day that Luigi would be on hand for the entire adventure this time, and not confined to a cage-based subplot. I didn't realize Luigi's role in the first film was enough of a controversy to warrant this kind of mention, but here we are.

Illumination CEO Chris Meledandri also appeared in the video, assuring viewers that there are still "some big surprises" waiting in the actual film. To that end, there's been a rumor floating around that Fox McCloud from the Starfox franchise would be showing up. Is this the start of a Nintendo cinematic universe that will culminate in 10 years with a Super Smash Bros. movie? Stranger things have happened.

This article originally appeared on Engadget at https://www.engadget.com/entertainment/tv-movies/heres-the-final-trailer-for-the-super-mario-galaxy-movie-181819593.html?src=rss

https://www.engadget.com/entertainment/tv-movies/heres-the-final-trailer-for-the-super-mario-galaxy-movie-181819593.html?src=rss


ChatGPT will now generate interactive visuals to help you with math and science concepts

  Openen als pagina

OpenAI is rolling out new interactive responses in ChatGPT it says are designed to make the chatbot more useful for learners. Starting today, ChatGPT will generate dynamic visuals when you ask it to explain select scientific and mathematical concepts, including the Pythagorean theorem, Coulomb's law and lens equations. When ChatGPT responds with an interactive visual, you'll be able to tweak any variables and the equation itself, allowing you to see how those changes affect the solution.

With today's release, OpenAI says ChatGPT will respond with interactive visuals when asked about more than 70 concepts, with support for additional topics to come down the line. The visuals are available to all ChatGPT users, regardless of subscription status. However, OpenAI notes high school- and college-aged students are likely to get the most out of the new feature.

ChatGPT explains Ohm's law.OpenAI

The more interactive responses from ChatGPT follow the release of Study Mode last summer. Released in response to the sheer amount of students using chatbots to complete their coursework, that feature guides the user toward finding an answer themselves, rather than provide an outright solution. "This is just the beginning," OpenAI says of its latest feature. "Over time, we plan to expand interactive learning with additional subjects and continue building tools that strengthen learning with ChatGPT."

This article originally appeared on Engadget at https://www.engadget.com/ai/chatgpt-will-now-generate-interactive-visuals-to-help-you-with-math-and-science-concepts-170000520.html?src=rss

https://www.engadget.com/ai/chatgpt-will-now-generate-interactive-visuals-to-help-you-with-math-and-science-concepts-170000520.html?src=rss


Yoshi and the Mysterious Book will be released for Switch 2 on May 21

  Openen als pagina

Nintendo's next platform adventure, Yoshi and the Mysterious Book, will be released for Switch 2 on May 21. The company announced the release date as part of its annual Mar10 Day celebration. This is a made-up holiday that exists because the date spelled out like that sort of looks like the word Mario.

In any event, there's a new trailer for the perpetually hungry dinosaur's latest adventure. It looks super cute. It sort of resembles a children's picture book come to life. Yoshi games typically boast unique graphical styles, with past entries featuring entire worlds made of yarn, cardboard and more. Even the very first Yoshi platformer, Super Mario World 2: Yoshi's Island, featured a kind of hand-drawn aesthetic.

The gameplay looks to be somewhat unique, with a reduced emphasis on chucking eggs. Many of the game's creatures grant Yoshi special abilities when they hop on the dino for a ride. This reminds me of another Nintendo-branded glutton, Kirby.

Today's trailer also shows Yoshi gobbling up an enemy and encountering a foul and bitter taste, giving the little cutie a momentary stomach ache. I guess Yoshi's palette has become more refined since the last game.

This has already been a big week for the anthropomorphic dinosaur. Nintendo recently dropped another trailer for The Super Mario Galaxy Movie and it was revealed that Donald Glover will be voicing Yoshi. That film hits theaters on April 1, which is just a few weeks away.

This article originally appeared on Engadget at https://www.engadget.com/gaming/nintendo/yoshi-and-the-mysterious-book-will-be-released-for-switch-2-on-may-21-164753150.html?src=rss

https://www.engadget.com/gaming/nintendo/yoshi-and-the-mysterious-book-will-be-released-for-switch-2-on-may-21-164753150.html?src=rss


TheRegister.com

Cybercrime isn't just a cover for Iran's government goons - it's a key part of their operations

  Openen als pagina
Ransomware, malware-as-a-service, infostealers benefit MOIS, too

Iranian government-backed snoops are increasingly using cybercrime malware and ransomware infrastructure in their operations - not just hiding behind criminal masks as a cover for destructive cyber activity, according to security researchers....

https://go.theregister.com/feed/www.theregister.com/2026/03/10/cybercrime_iran_mois/






Cnet.com






Arstechnica.com






Wired.com






ZDNet.com






TechRepublic.com


Russian Hackers Target Signal and WhatsApp Accounts, Dutch Intelligence Warns

  Openen als pagina

Dutch intelligence says Russian state hackers are compromising Signal and WhatsApp accounts with phishing and linked-device tricks, underscoring how account security can fail even when encryption holds.

The post Russian Hackers Target Signal and WhatsApp Accounts, Dutch Intelligence Warns appeared first on TechRepublic.

https://www.techrepublic.com/article/news-russian-signal-whatsapp-hacked/





mashable.com






Geekwire.com






Latest from TechRadar






Cybersecurity

Security.nl






Slashdot

Oracle Is Walking Away From Expanding Its Stargate Data Center With Oracle

  Openen als pagina
OpenAI is reportedly backing away from expanding its AI data center partnership with Oracle because newer generations of Nvidia GPUs may arrive before the facility is even operational. CNBC reports: Artificial intelligence chips are getting upgraded more quickly than data centers can be built, a market reality that exposes a key risk to the AI trade and Oracle's debt-fueled expansion. OpenAI is no longer planning to expand its partnership with Oracle in Abilene, Texas, home to the Stargate data center, because it wants clusters with newer generations of Nvidia graphics processing units, according to a person familiar with the matter. The current Abilene site is expected to use Nvidia's Blackwell processors, and the power isn't projected to come online for a year. By then, OpenAI is hoping to have expanded access to Nvidia's next-generation chips in bigger clusters elsewhere, said the person, who asked not to be named due to confidentiality. In a post on X, Oracle called the reports "false and incorrect." However, it only said existing projects are on track and didn't address expansion plans. CNBC notes: "Oracle secured the site, ordered the hardware, and spent billions of dollars on construction and staff, with the expectation of going bigger."

Read more of this story at Slashdot.

https://developers.slashdot.org/story/26/03/10/0510223/oracle-is-walking-away-from-expanding-its-stargate-data-center-with-oracle?utm_source=rss1.0mainlinkanon&utm_medium=feed


Claude AI Finds Bugs In Microsoft CTO's 40-Year-Old Apple II Code

  Openen als pagina
An anonymous reader quotes a report from The Register: AI can reverse engineer machine code and find vulnerabilities in ancient legacy architectures, says Microsoft Azure CTO Mark Russinovich, who used his own Apple II code from 40 years ago as an example. Russinovich wrote: "We are entering an era of automated, AI-accelerated vulnerability discovery that will be leveraged by both defenders and attackers." In May 1986, Russinovich wrote a utility called Enhancer for the Apple II personal computer. The utility, written in 6502 machine language, added the ability to use a variable or BASIC expression for the destination of a GOTO, GOSUB, or RESTORE command, whereas without modification Applesoft BASIC would only accept a line number. Russinovich had Claude Opus 4.6, released early last month, look over the code. It decompiled the machine language and found several security issues, including a case of "silent incorrect behavior" where, if the destination line was not found, the program would set the pointer to the following line or past the end of the program, instead of reporting an error. The fix would be to check the carry flag, which is set if the line is not found, and branch to an error. The existence of the vulnerability in Apple II type-in code has only amusement value, but the ability of AI to decompile embedded code and find vulnerabilities is a concern. "Billions of legacy microcontrollers exist globally, many likely running fragile or poorly audited firmware like this," said one comment to Russinovich's post.

Read more of this story at Slashdot.

https://it.slashdot.org/story/26/03/10/0521258/claude-ai-finds-bugs-in-microsoft-ctos-40-year-old-apple-ii-code?utm_source=rss1.0mainlinkanon&utm_medium=feed


Meta Acquires Moltbook, the Social Network For AI Agents

  Openen als pagina
Axios reports that Meta has acquired Moltbook, the viral, Reddit-like social network designed for AI agents. Humans are welcome, but only to observe. Axios reports: The deal brings Moltbook's creators -- Matt Schlicht and Ben Parr -- into Meta Superintelligence Labs (MSL), the unit run by former Scale AI CEO Alexandr Wang. Meta did not disclose Moltbook's purchase price. The deal is expected to close mid-March, Meta says, with the pair starting at MSL on March 16. When it launched in late January, Moltbook was labeled the "most interesting place on the internet" by open-source developer and writer Simon Willison. "Browsing around Moltbook is so much fun. A lot of it is the expected science fiction slop, with agents pondering consciousness and identity. There's also a ton of genuinely useful information, especially on m/todayilearned." In an internal post seen by Axios, Meta's Vishal Shah said existing Moltbook customers can temporarily continue using the platform. "The Moltbook team has given agents a way to verify their identity and connect with one another on their human's behalf," Shah says. "This establishes a registry where agents are verified and tethered to human owners." He added: "Their team has unlocked new ways for agents to interact, share content, and coordinate complex tasks."

Read more of this story at Slashdot.

https://tech.slashdot.org/story/26/03/10/1524229/meta-acquires-moltbook-the-social-network-for-ai-agents?utm_source=rss1.0mainlinkanon&utm_medium=feed


German Publishers Push Regulators To Fine Apple Over App Tracking Transparency

  Openen als pagina
German publishers and advertising groups are urging regulators to fine Apple over its App Tracking Transparency (ATT) system, arguing it unfairly restricts access to advertising data while allowing Apple to remain the central gatekeeper -- without subjecting its own apps to the same restrictions. If Germany's antitrust authority does rule against Apple, the company could face fines of up to 10% of its global revenue. 9to5Mac reports: One of the countries investigating whether ATT is anticompetitive is Germany. Last year, in an attempt to appease the country's antitrust watchdog, the company proposed several changes to the framework's rules. From Reuters' original coverage of Apple's changes proposals: "Apple had agreed to introduce neutral consent prompts for both its own services and third-party apps, and to largely align the wording, content and visual design of these messages, said Andreas Mundt, head of Germany's Bundeskartellamt. The company also proposed simplifying the consent process so developers can obtain user permission for advertising-related data processing in a way that complies with data protection law." [...] At the time, German regulators launched a consultation with industry publications to determine whether the proposals addressed their concerns. As it turns out, the answer was a hard no. As Reuters reported today: "Apple's proposed changes to its app tracking rules do not resolve antitrust issues in the mobile advertising market, associations representing German publishers and advertisers said on Tuesday as they urged the country's antitrust authority to slap a fine on the U.S. tech giant. [...] 'The proposed commitments would not change the negative effects of the App Tracking Transparency Framework,' Bernd Nauen, chief executive of the German Advertising Federation, said in a joint letter signed by the trade bodies. 'Apple would remain the data gatekeeper and would continue to decide who gets access to advertising-relevant data and how companies can communicate with their end customers,' he said."

Read more of this story at Slashdot.

https://apple.slashdot.org/story/26/03/10/050253/german-publishers-push-regulators-to-fine-apple-over-app-tracking-transparency?utm_source=rss1.0mainlinkanon&utm_medium=feed


EQT Eyes $6 Billion Sale of SUSE

  Openen als pagina
Private equity firm EQT AB is reportedly exploring a sale of SUSE that could value the open-source Linux pioneer at up to $6 billion, roughly doubling the valuation since EQT took the company private in 2023. Reuters reports: EQT "has hired investment bank Arma Partners to sound out a group of private equity investors for a possible sale of the company, said the sources, who requested anonymity to discuss confidential matters. The deliberations are at "an early stage and there is no certainty that EQT will proceed with "a transaction, the sources said. [...] The potential deal comes amid a broader selloff in software stocks, which has disrupted mergers and acquisitions activity. Investors are "concerned that new artificial intelligence tools could displace many existing software products, weighing on technology "valuations and making deals harder to price. Some investors, however, see Luxembourg-headquartered SUSE as a potential beneficiary of AI adoption, arguing that demand for enterprise-grade infrastructure software is likely to grow as companies build and deploy more AI applications. The company generates about $800 million in revenue and more than $250 million in earnings before interest, taxes, depreciation, and amortization (EBITDA) and could fetch between $4 billion and $6 billion in a sale, the sources said.

Read more of this story at Slashdot.

https://linux.slashdot.org/story/26/03/10/0450204/eqt-eyes-6-billion-sale-of-suse?utm_source=rss1.0mainlinkanon&utm_medium=feed


theregister.com/security

Cybercrime isn't just a cover for Iran's government goons - it's a key part of their operations

  Openen als pagina
Ransomware, malware-as-a-service, infostealers benefit MOIS, too

Iranian government-backed snoops are increasingly using cybercrime malware and ransomware infrastructure in their operations - not just hiding behind criminal masks as a cover for destructive cyber activity, according to security researchers....

https://go.theregister.com/feed/www.theregister.com/2026/03/10/cybercrime_iran_mois/




Ericsson blames vendor vishing slip-up for breach exposing thousands of records

  Openen als pagina
Crooks used simple phone scam to compromise vendor account, spilling personal and financial data belonging to more than 15,000 people

A voice-phishing scam targeting one of Ericsson's service providers has exposed the personal data of more than 15,000 individuals after attackers sweet-talked an employee into handing over access....

https://go.theregister.com/feed/www.theregister.com/2026/03/10/ericsson_blames_vendor_vishing_slipup/


Protecting democracy means democratizing cybersecurity. Bring on the hackers

  Openen als pagina
Digital freedom needs a Kali Linux for the rest of us

Opinion The hacker mind is a curious way to be. To have it means to embody endless analytical curiosity, an awareness of any given rule set as just one system among many, and an ability to see any system in ways that its creators never expected. Combine this with a drive to find the bad and make things better, and you become one of the fundamental forces of the technological universe....

https://go.theregister.com/feed/www.theregister.com/2026/03/10/democratizing_security_opinion/


CISO2CISO.com



The Critical Role of Sboms (Software Bill of Materials) In Defending Medtech From Software Supply Chain Threats – Source: www.cyberdefensemagazine.com

  Openen als pagina

Source: www.cyberdefensemagazine.com – Author: News team Software supply chain attacks have emerged as a serious threat in the rapidly evolving field of cybersecurity, especially in medical devices. As these devices become more and more interconnected and dependent on complex software ecosystems, the potential for exploitation through the supply chain has grown exponentially. One powerful tool [...]

La entrada The Critical Role of Sboms (Software Bill of Materials) In Defending Medtech From Software Supply Chain Threats – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

https://ciso2ciso.com/the-critical-role-of-sboms-software-bill-of-materials-in-defending-medtech-from-software-supply-chain-threats-source-www-cyberdefensemagazine-com/


Ransomware Tactics Are Shifting. Here’s How to Keep Up – Source: www.cyberdefensemagazine.com

  Openen als pagina

Source: www.cyberdefensemagazine.com – Author: News team It’s common knowledge in the cybersecurity industry that ransomware is on the rise, with median demands rising 20% year-over-year across virtually all industries. But it’s not only the ransom sums themselves that are escalating; threat actors are engaging in increasingly aggressive tactics and techniques to extort their victims. It’s [...]

La entrada Ransomware Tactics Are Shifting. Here’s How to Keep Up – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

https://ciso2ciso.com/ransomware-tactics-are-shifting-heres-how-to-keep-up-source-www-cyberdefensemagazine-com/


French Advisory Sheds Light on Apple Spyware Activity – Source: www.darkreading.com

  Openen als pagina

Source: www.darkreading.com – Author: Rob Wright CERT-FR’s advisory follows last month’s disclosure of a zero-day flaw Apple said was used in “sophisticated” attacks against targeted individuals. Original Post URL: https://www.darkreading.com/vulnerabilities-threats/french-sheds-light-apple-spyware-activity Category & Tags: – Views: 11

La entrada French Advisory Sheds Light on Apple Spyware Activity – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

https://ciso2ciso.com/french-advisory-sheds-light-on-apple-spyware-activity-source-www-darkreading-com/


Hackread.com






Vuldb

CVE-2025-69615 | Deutsche Telekom Account Management Portal prior 2025-10-24/2025-11-03 access control

  Openen als pagina
A vulnerability identified as critical has been detected in Deutsche Telekom Account Management Portal. Affected by this issue is some unknown functionality. This manipulation causes improper access controls. This vulnerability is registered as CVE-2025-69615. Remote exploitation of the attack is possible. No exploit is available. You should upgrade the affected component.

https://vuldb.com/?id.350066


CVE-2026-1286 | Schneider Electric EcoStruxure Foxboro DCS up to 8.0 Project File deserialization (SEVD-2026-069-03)

  Openen als pagina
A vulnerability categorized as critical has been discovered in Schneider Electric EcoStruxure Foxboro DCS up to 8.0. Affected by this vulnerability is an unknown functionality of the component Project File Handler. The manipulation results in deserialization. This vulnerability is cataloged as CVE-2026-1286. The attack may be launched remotely. There is no exploit available. It is advisable to upgrade the affected component.

https://vuldb.com/?id.350065


CVE-2025-55717 | Fortinet FortiVoice/FortiMail/FortiRecorder up to 7.0.6/7.2.0 cleartext storage (FG-IR-26-080)

  Openen als pagina
A vulnerability was found in Fortinet FortiVoice, FortiMail and FortiRecorder up to 7.0.6/7.2.0. It has been rated as problematic. Affected is an unknown function. The manipulation leads to cleartext storage of sensitive information. This vulnerability is listed as CVE-2025-55717. The attack must be carried out locally. There is no available exploit.

https://vuldb.com/?id.350064



CVE-2025-54659 | Fortinet FortiSOAR Agent Communication Bridge up to 1.0.2/1.1.0 Request path traversal (FG-IR-26-084)

  Openen als pagina
A vulnerability was found in Fortinet FortiSOAR Agent Communication Bridge up to 1.0.2/1.1.0. It has been classified as critical. This affects an unknown function of the component Request Handler. Performing a manipulation results in path traversal. This vulnerability is identified as CVE-2025-54659. The attack can be initiated remotely. There is not any exploit available. Upgrading the affected component is recommended.

https://vuldb.com/?id.350062


Microsoft Security






advisories.ncsc.nl

NCSC-2026-0059 [1.01] [M/H] Kwetsbaarheden verholpen in Ivanti Endpoint Manager

  Openen als pagina
Ivanti heeft kwetsbaarheden verholpen in Ivanti Endpoint Manager (Specifiek voor versies vóór 2024 SU5). De kwetsbaarheid met kenmerk CVE-2026-1603 betreft een authenticatie-bypass die het mogelijk maakt voor externe, niet-geauthenticeerde aanvallers om toegang te krijgen tot bepaalde opgeslagen inloggegevens, wat kan leiden tot compromittering van gevoelige data. De kwetsbaarheid met kenmerk CVE-2026-1602 betreft een SQL-injectie die het mogelijk maakt voor externe, geauthenticeerde aanvallers om willekeurige SQL-query's uit te voeren, wat kan leiden tot ongeautoriseerde toegang tot gevoelige database-informatie. Beide kwetsbaarheden kunnen de integriteit en vertrouwelijkheid van de gegevens in het systeem in gevaar brengen. Van de kwetsbaarheid met kenmerk CVE-2026-1603 meldt het Amerikaanse CISA dat deze binnen een Amerikaanse overheidsorganisatie is misbruikt. Verdere details zijn niet vrijgegeven en er is (nog) geen publieke Proof-of-Concept-code of exploit bekend.

https://advisories.ncsc.nl/advisory?id=NCSC-2026-0059


NCSC-2026-0079 [1.00] [M/H] Kwetsbaarheden verholpen in Siemens producten

  Openen als pagina
Siemens heeft kwetsbaarheden verholpen in diverse producten als Heliox, Ruggedcom, SICAM, SIDIS en SIMATIC. De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade: - Denial-of-Service (DoS) - Manipulatie van gegevens - Omzeilen van een beveiligingsmaatregel - (Remote) code execution (root/admin rechten) - Toegang tot systeemgegevens - Verhogen van rechten Voor succesvol misbruik van de genoemde kwetsbaarheden moet de kwaadwillende toegang hebben tot de productie-omgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.

https://advisories.ncsc.nl/advisory?id=NCSC-2026-0079


NCSC-2026-0071 [1.02] [H/H] Kwetsbaarheden verholpen in Cisco Catalyst SD-WAN Manager

  Openen als pagina
Cisco heeft meerdere kwetsbaarheden verholpen in de Cisco Catalyst SD-WAN Manager. De kwetsbaarheden bevinden zich in de peering authenticatiemechanismen van de Cisco Catalyst SD-WAN Controller en Manager producten. Deze kwetsbaarheden stellen een niet-geauthenticeerde externe aanvaller in staat om het authenticatieproces te omzeilen, waardoor administratieve privileges op de getroffen systemen kunnen worden verkregen. Daarnaast kunnen aanvallers root-level privileges verkrijgen, wat kan leiden tot ongeautoriseerde toegang tot gevoelige informatie en de mogelijkheid om willekeurige bestanden te overschrijven, wat kan resulteren in verdere exploitatie of systeeminstabiliteit. De meest ernstige kwetsbaarheid, met kenmerk CVE-2026-20127, kan door een ongeauthenticeerde kwaadwillende worden misbruikt om op afstand willekeurige code uit te voeren met hoge administratieve rechten. Cisco geeft aan dat actief misbruik van deze kwetsbaarheid bekend is. Na misbruik van deze kwetsbaarheid zou de kwaadwillende de kwetsbaarheid met kenmerk CVE-2022-20775 gebruiken om de rechten te escaleren tot root. Dit doet de actor door het systeem te downgraden naar een versie waarin CVE-2022-20775 niet verholpen is, de rechten middels deze kwetsbaarheid te verhogen naar root en vervolgens het systeem weer terug te zetten in de oorspronkelijke versie. Er is publieke Proof-of-Concept-code (PoC) verschenen die de kwetsbaarheid met kenmerk CVE-2026-20127 aantoont en mogelijk misbruikt. De kans op grootschalig misbruik neemt hierdoor toe en het NCSC verwacht een significante toename in scan- en misbruikverkeer. Het NCSC adviseert met klem de update zo spoedig mogelijk te installeren. Ook van de kwetsbaarheden met kenmerk CVE-2026-20122 en CVE-2026-20128 meldt Cisco berichten te ontvangen dat deze actief worden misbruikt. Voor deze kwetsbaarheden is (nog) geen publieke Proof-of-Concept-code of exploit beschikbaar.

https://advisories.ncsc.nl/advisory?id=NCSC-2026-0071


NCSC-2026-0078 [1.00] [M/H] Kwetsbaarheden verholpen in Kibana

  Openen als pagina
Elastic heeft kwetsbaarheden verholpen in Kibana. De kwetsbaarheden bevinden zich in verschillende componenten van Kibana. Een geauthenticeerde gebruiker met alleen weergaveprivileges kan een fout in de invoervalidatie misbruiken om een Denial of Service-voorwaarde te veroorzaken door speciaal vervaardigde, verkeerd gevormde payloads te verzenden. Dit leidt tot overmatig gebruik van resources en kan resulteren in crashes. Daarnaast bevat de zoekendpoint van Kibana's interne Content Connectors een kwetsbaarheid die het mogelijk maakt voor aanvallers om gemanipuleerde invoergegevens te leveren, wat ook kan leiden tot een Denial of Service. De AI Inference Anonymization Engine maakt gebruik van een inefficiënt geconstrueerde reguliere expressie, wat kan worden misbruikt om een Denial of Service te veroorzaken door de regex-processor te overweldigen. De Timelion-component kan ook worden misbruikt om ongecontroleerd middelenverbruik te veroorzaken, wat de beschikbaarheid van de Kibana-service beïnvloedt. Ten slotte staat de kwetsbaarheid in de workflow template engine geauthenticeerde gebruikers met executeWorkflow-rechten toe om code in te voegen die willekeurige bestanden van het serversysteem kan lezen en server-side request forgery (SSRF) aanvallen mogelijk maakt.

https://advisories.ncsc.nl/advisory?id=NCSC-2026-0078


NCSC-2026-0077 [1.00] [M/H] Kwetsbaarheden verholpen in Cisco Secure Firewall systemen

  Openen als pagina
Cisco heeft meerdere kwetsbaarheden verholpen in Cisco Secure Firewall (inclusief ASA en FTD software). De kwetsbaarheden omvatten SQL-injectie, privilege-escalatie, denial-of-service, cross-site scripting, en onjuist beheer van invoer in verschillende componenten van de Cisco Secure Firewall. Authenticated remote attackers kunnen deze kwetsbaarheden misbruiken om ongeautoriseerde toegang te krijgen, systeemintegriteit te compromitteren, of netwerkdiensten te verstoren. De kwetsbaarheden zijn aanwezig in de webinterfaces, REST API's, en andere functionaliteiten van de firewall software.

https://advisories.ncsc.nl/advisory?id=NCSC-2026-0077


NIST Cybersecurity

wid.cert-bund.de






cert.ssi.gouv.fr






theHackerNews

How to Stop AI Data Leaks: A Webinar Guide to Auditing Modern Agentic Workflows

  Openen als pagina
Artificial Intelligence (AI) is no longer just a tool we talk to; it is a tool that does things for us. These are called AI Agents. They can send emails, move data, and even manage software on their own. But there is a problem. While these agents make work faster, they also open a new "back door" for hackers. The Problem: "The Invisible Employee" Think of an AI Agent like a new employee who has

https://thehackernews.com/2026/03/how-to-stop-ai-data-leaks-webinar-guide.html


FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials

  Openen als pagina
Cybersecurity researchers are calling attention to a new campaign where threat actors are abusing FortiGate Next-Generation Firewall (NGFW) appliances as entry points to breach victim networks. The activity involves the exploitation of recently disclosed security vulnerabilities or weak credentials to extract configuration files containing service account credentials and network topology

https://thehackernews.com/2026/03/fortigate-devices-exploited-to-breach.html


KadNap Malware Infects 14,000+ Edge Devices to Power Stealth Proxy Botnet

  Openen als pagina
Cybersecurity researchers have discovered a new malware called KadNap that's primarily targeting Asus routers to enlist them into a botnet for proxying malicious traffic. The malware, first detected in the wild in August 2025, has expanded to over 14,000 infected devices, with more than 60% of victims located in the U.S., according to the Black Lotus Labs team at Lumen. A lesser number of

https://thehackernews.com/2026/03/kadnap-malware-infects-14000-edge.html


New "LeakyLooker" Flaws in Google Looker Studio Could Enable Cross-Tenant SQL Queries

  Openen als pagina
Cybersecurity researchers have disclosed nine cross-tenant vulnerabilities in Google Looker Studio that could have permitted attackers to run arbitrary SQL queries on victims' databases and exfiltrate sensitive data within organizations' Google Cloud environments. The shortcomings have been collectively named LeakyLooker by Tenable. There is no evidence that the vulnerabilities were exploited in

https://thehackernews.com/2026/03/new-leakylooker-flaws-in-google-looker.html


The Zero-Day Scramble is Avoidable: A Guide to Attack Surface Reduction

  Openen als pagina
You can't control when the next critical vulnerability drops. You can control how much of your environment is exposed when it does. The problem is that most teams have more internet-facing exposure than they realise. Intruder's Head of Security digs into why this happens and how teams can manage it deliberately. Time-to-exploit is shrinking The larger and less controlled your attack surface is,

https://thehackernews.com/2026/03/the-zero-day-scramble-is-avoidable.html


Techrepublic




Veeam’s ‘Agent Commander’: Bringing Guardrails and Resilience to the Wild West of AI

  Openen als pagina

Veeam’s Agent Commander turns backup into an AI-era command center, giving enterprises the guardrails, visibility, and precision “undo” they need to safely scale autonomous agents.

The post Veeam’s ‘Agent Commander’: Bringing Guardrails and Resilience to the Wild West of AI appeared first on TechRepublic.

https://www.techrepublic.com/article/news-veeam-agent-commander-ai-resilience/



BleepingComputer.com






securityboulevard.com

Zero Trust for B2B SaaS: What Every Founder and CTO Needs to Know

  Openen als pagina

For B2B SaaS companies, Zero Trust isn't an optional enterprise security concept. It's what enterprise buyers are demanding, what audit frameworks require, and increasingly what separates companies that close deals from those that don't.

The post Zero Trust for B2B SaaS: What Every Founder and CTO Needs to Know appeared first on Security Boulevard.

https://securityboulevard.com/2026/03/zero-trust-for-b2b-saas-what-every-founder-and-cto-needs-to-know/


OpenAI Acquires Security Startup Promptfoo to Fortify AI Agents

  Openen als pagina

OpenAI has snapped up Promptfoo, a specialized artificial intelligence (AI) security startup, to bolster the safety of autonomous digital workers and convince enterprise clients that AI co-workers are ready for high-stakes business environments. OpenAI did not disclose financial terms of the transaction. PitchBook data indicates Promptfoo was valued at $119 million following a $22 million..

The post OpenAI Acquires Security Startup Promptfoo to Fortify AI Agents appeared first on Security Boulevard.

https://securityboulevard.com/2026/03/openai-acquires-security-startup-promptfoo-to-fortify-ai-agents/


How MSPs Bridge the Gap Between Cloud Potential and Day‐to‐Day Reality

  Openen als pagina

Managed service providers (MSPs) bridge the gap between what the cloud makes possible and what most organizations can realistically run, secure, and scale with their current teams. MSPs turn AWS capabilities into reliable services that drive customer value instead of sitting unused on a roadmap.

The post How MSPs Bridge the Gap Between Cloud Potential and Day‐to‐Day Reality appeared first on Security Boulevard.

https://securityboulevard.com/2026/03/how-msps-bridge-the-gap-between-cloud-potential-and-day%e2%80%91to%e2%80%91day-reality/


USENIX Security ’25 (Enigma Track) – Security Theater Is Canceled: Time For A Real Show


Phishing Scammers Impersonating City, County Officials, Demanding Payment: FBI

  Openen als pagina

Scammers are impersonating local municipal officials around the country with seemingly legitimate phishing messages demanding payment for permits. The bad actors grab publicly available information and use them in their emails to fool their targets.

The post Phishing Scammers Impersonating City, County Officials, Demanding Payment: FBI appeared first on Security Boulevard.

https://securityboulevard.com/2026/03/phishing-scammers-impersonating-city-county-officials-demanding-payment-fbi/


CXSecurity.com






Brian Krebs

How AI Assistants are Moving the Security Goalposts

  Openen als pagina
AI-based assistants or "agents" -- autonomous programs that have access to the user's computer, files, online services and can automate virtually any task -- are growing in popularity with developers and IT workers. But as so many eyebrow-raising headlines over the past few weeks have shown, these powerful and assertive new tools are rapidly shifting the security priorities for organizations, while blurring the lines between data and code, trusted co-worker and insider threat, ninja hacker and novice code jockey.

https://krebsonsecurity.com/2026/03/how-ai-assistants-are-moving-the-security-goalposts/


Who is the Kimwolf Botmaster “Dort”?

  Openen als pagina
In early January 2026, KrebsOnSecurity revealed how a security researcher disclosed a vulnerability that was used to assemble Kimwolf, the world's largest and most disruptive botnet. Since then, the person in control of Kimwolf -- who goes by the handle "Dort" -- has coordinated a barrage of distributed denial-of-service (DDoS), doxing and email flooding attacks against the researcher and this author, and more recently caused a SWAT team to be sent to the researcher's home. This post examines what is knowable about Dort based on public information.

https://krebsonsecurity.com/2026/02/who-is-the-kimwolf-botmaster-dort/


‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA

  Openen als pagina
Most phishing websites are little more than static copies of login pages for popular online destinations, and they are often quickly taken down by anti-abuse activists and security firms. But a stealthy new phishing-as-a-service offering lets customers sidestep both of these pitfalls: It uses cleverly disguised links to load the target brand's real website, and then acts as a relay between the target and the legitimate site -- forwarding the victim's username, password and multi-factor authentication (MFA) code to the legitimate site and returning its responses.

https://krebsonsecurity.com/2026/02/starkiller-phishing-service-proxies-real-login-pages-mfa/


Kimwolf Botnet Swamps Anonymity Network I2P

  Openen als pagina
For the past week, the massive "Internet of Things" (IoT) botnet known as Kimwolf has been disrupting the The Invisible Internet Project (I2P), a decentralized, encrypted communications network designed to anonymize and secure online communications. I2P users started reporting disruptions in the network around the same time the Kimwolf botmasters began relying on it to evade takedown attempts against the botnet's control servers.

https://krebsonsecurity.com/2026/02/kimwolf-botnet-swamps-anonymity-network-i2p/



Troy Hunt



Weekly Update 492

  Openen als pagina

Presently sponsored by: Report URI: Guarding you from rogue JavaScript! Don’t get pwned; get real-time alerts & prevent breaches #SecureYourSite

The recurring theme this week seems to be around the gap between breaches happening and individual victims finding out about them. It's tempting to blame this on the corporate victim of the breach (the hacked company), but they're simultaneously dealing with a criminal intrusion, a ransom

https://www.troyhunt.com/weekly-update-492/




Bruce Schneier


New Attack Against Wi-Fi

  Openen als pagina

It’s called AirSnitch:

Unlike previous Wi-Fi attacks, AirSnitch exploits core features in Layers 1 and 2 and the failure to bind and synchronize a client across these and higher layers, other nodes, and other network names such as SSIDs (Service Set Identifiers). This cross-layer identity desynchronization is the key driver of AirSnitch attacks.

The most powerful such attack is a full, bidirectional machine-in-the-middle (MitM) attack, meaning the attacker can view and modify data before it makes its way to the intended recipient. The attacker can be on the same SSID, a separate one, or even a separate network segment tied to the same AP. It works against small Wi-Fi networks in both homes and offices and large networks in enterprises...

https://www.schneier.com/blog/archives/2026/03/new-attack-against-wi-fi.html


Friday Squid Blogging: Squid in Byzantine Monk Cooking

  Openen als pagina

This is a very weird story about how squid stayed on the menu of Byzantine monks by falling between the cracks of dietary rules.

At Constantinople’s Monastery of Stoudios, the kitchen didn’t answer to appetite.

It answered to the “typikon”: a manual for ensuring that nothing unexpected happened at mealtimes. Meat: forbidden. Dairy: forbidden. Eggs: forbidden. Fish: feast-day only. Oil: regulated. But squid?

Squid had eight arms, no bones, and a gift for changing color. Nobody had bothered writing a regulation for that. This wasn’t a loophole born of legal creativity but an oversight rooted in taxonomic confusion. Medieval monks, confronted with a creature that was neither fish nor fowl, gave up and let it pass...

https://www.schneier.com/blog/archives/2026/03/friday-squid-blogging-squid-in-byzantine-monk-cooking.html


Anthropic and the Pentagon

  Openen als pagina

OpenAI is in and Anthropic is out as a supplier of AI technology for the US defense department. This news caps a week of bluster by the highest officials in the US government towards some of the wealthiest titans of the big tech industry, and the overhanging specter of the existential risks posed by a new technology powerful enough that the Pentagon claims it is essential to national security. At issue is Anthropic’s insistence that the US Department of Defense (DoD) could not use its models to facilitate “mass surveillance” or “fully autonomous weapons,” provisions the defense secretary Pete Hegseth ...

https://www.schneier.com/blog/archives/2026/03/anthropic-and-the-pentagon.html


Claude Used to Hack Mexican Government

  Openen als pagina

An unknown hacker used Anthropic’s LLM to hack the Mexican government:

The unknown Claude user wrote Spanish-language prompts for the chatbot to act as an elite hacker, finding vulnerabilities in government networks, writing computer scripts to exploit them and determining ways to automate data theft, Israeli cybersecurity startup Gambit Security said in research published Wednesday.

[...]

Claude initially warned the unknown user of malicious intent during their conversation about the Mexican government, but eventually complied with the attacker’s requests and executed thousands of commands on government computer networks, the researchers said...

https://www.schneier.com/blog/archives/2026/03/claude-used-to-hack-mexican-government.html


Security Affairs

APT28 conducts long-term espionage on Ukrainian forces using custom malware

  Openen als pagina
APT28 used BEARDSHELL and COVENANT malware to spy on Ukrainian military personnel, enabling long-term surveillance since April 2024. The Russia-linked group APT28 (aka UAC-0001, aka Fancy Bear, Pawn Storm, Sofacy Group, Sednit, BlueDelta, and STRONTIUM) has used BEARDSHELL and COVENANT malware to conduct long-term surveillance of Ukrainian military personnel. According to ESET, the campaign began in April 2024 and relies on [...]

https://securityaffairs.com/189230/apt/apt28-conducts-long-term-espionage-on-ukrainian-forces-using-custom-malware.html


Threat actors use custom AuraInspector to harvest data from Salesforce systems

  Openen als pagina
Attackers are mass-scanning Salesforce Experience Cloud sites using a modified AuraInspector tool to exploit misconfigurations and access sensitive data. Salesforce CSOC warns that threat actors are mass-scanning publicly accessible Experience Cloud sites using a modified version of the AuraInspector tool. AuraInspector is an open‐source command‐line tool released by Google/Mandiant to audit Salesforce Aura and Experience [...]

https://securityaffairs.com/189214/security/threat-actors-use-custom-aurainspector-to-harvest-data-from-salesforce-systems.html


U.S. CISA adds Ivanti EPM, SolarWinds, and Omnissa Workspace One flaws to its Known Exploited Vulnerabilities catalog

  Openen als pagina
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds EPM, SolarWinds, and Omnissa Workspace One flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Apple, Rockwell, and Hikvision flaws to its Known Exploited Vulnerabilities (KEV) catalog. Below are the flaws added to the catalog: The first vulnerability added to the catalog is [...]

https://securityaffairs.com/189172/security/u-s-cisa-adds-ivanti-epm-solarwinds-and-omnissa-workspace-one-flaws-to-its-known-exploited-vulnerabilities-catalog.html


Ericsson US confirms breach after third-party provider attack

  Openen als pagina
Ericsson US reports a data breach after attackers hacked a service provider, exposing employee and customer information. Ericsson Inc., the U.S. branch of the Swedish telecom giant, disclosed a data breach after a service provider was hacked. The attack compromised the personal information of an unspecified number of employees and customers. “On April 28, 2025, [...]

https://securityaffairs.com/189197/data-breach/ericsson-us-confirms-breach-after-third-party-provider-attack.html


Law enforcement disrupted Tycoon 2FA phishing-as-a-service platform

  Openen als pagina
Authorities disrupted the Tycoon 2FA phishing-as-a-service platform used to send millions of phishing emails to over 500,000 orgs worldwide. The joint effort, led by Microsoft, Europol, and industry partners, aimed to target the infrastructure of Tycoon 2FA phishing-as-a-service platform responsible for tens of millions of fraudulent emails reaching over 500,000 organizations each month worldwide. By [...]

https://securityaffairs.com/189205/cyber-crime/law-enforcement-disrupted-tycoon-2fa-phishing-as-a-service-platform.html


news.sophos.com