Panasonic Will No Longer Make Its Own TVs
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
https://techcrunch.com/2026/02/23/uber-autonomous-solutions-av-robotaxi/
https://techcrunch.com/2026/02/23/googles-cloud-ai-lead-on-the-three-frontiers-of-model-capability/
Anthropic is issuing a call to action against AI "distillation attacks," after accusing three AI companies of misusing its Claude chatbot. On its website, Anthropic claimed that DeepSeek, Moonshot and MiniMax have been conducting "industrial-scale campaigns...to illicitly extract Claude’s capabilities to improve their own models."
Distillation in the AI world refers to when less capable models lean on the responses of more powerful ones to train themselves. While distillation isn't a bad thing across the board, Anthropic said that these types of attacks can be used in a more nefarious way. According to Anthropic, these three Chinese AI firms were responsible for more than "16 million exchanges with Claude through approximately 24,000 fraudulent accounts." From Anthropic's perspective, these competing companies were using Claude as a shortcut to develop more advanced AI models, which could also lead to circumventing certain safeguards.
Anthropic said in its post that it was able to link each of these distilling attack campaigns to the specific companies with "high confidence" thanks to IP address correlation, metadata requests and infrastructure indicators, along with corroborating with others in the AI industry who have noticed similar behaviors.
Early last year, OpenAI made similar claims of rival firms distilling its models and banned suspected accounts in response. As for Anthropic, the company behind Claude said it would upgrade its system to make distillation attacks harder to do and easier to identify. While Anthropic is pointing fingers at these other firms, it's also facing a lawsuit from music publishers who accused the AI company of using illegal copies of songs to train its Claude chatbot.
This article originally appeared on Engadget at https://www.engadget.com/ai/anthropic-accuses-three-chinese-ai-labs-of-abusing-claude-to-improve-their-own-models-205210613.html?src=rssIt's getting to be that time of year again. Summer Game Fest officially kicks off on June 5 and will go until June 8. The Live Kickoff show will once again be hosted by Geoff Keighley and takes place on June 5 at 5PM ET. This is where we'll see all of those juicy reveals and trailers.
The opening event will be streamed globally on just about every digital platform, including YouTube, Twitch, X and even Steam. Those in the Los Angeles area will be able to pick up tickets for the live show sometime in the Spring.
The kickoff event is just the beginning. There's something called Play Days, which is an expo in downtown LA produced by iam8bit. This invite-only event promises "immersive exhibits and hands-on experiences from the industry's leading publishers and developers." Coverage of this will be shared across digital and social platforms.
There is, of course, another Day of the Devs livestream scheduled for immediately after the kickoff. Day of the Devs: SGF Edition should provide us with even more trailers and reveals, this time for indie games.
Finally, there's a "thought leadership event" on June 8 that's primarily for developers and publishers. Game Business Live "brings together top industry voices on one stage for insightful discussions on key changes, challenges and opportunities shaping the global video game industry."
We'll be covering the event live and will have all of those trailers ready to go. After all, that's pretty much the main reason people watch these things.
This article originally appeared on Engadget at https://www.engadget.com/gaming/summer-game-fest-runs-from-june-5-8-193054418.html?src=rsshttps://www.engadget.com/gaming/summer-game-fest-runs-from-june-5-8-193054418.html?src=rss
Bungie isn't taking any prisoners when it comes to cheating on its upcoming extraction shooter, Marathon. In a detailed blog post explaining its anti-cheat measures, Bungie took a very declarative position against those caught trying to gain an unfair advantage.
"We are taking a strong stance against cheating and anyone found to be cheating or developing cheats will be permanently banned from playing Marathon forever, no second chances," the blog post read, adding that there will be an appeals system in place.
However, Bungie's anti-cheat standards go beyond punishment. In the blog post, Bungie detailed that Marathon's dedicated servers have full authority on movement, shooting, actions, and inventory. Since these key actions rely on the server, it will translate to smoother gunplay for players as well as the prevention of cheats related to teleportation, unlimited ammo or damage manipulation. Bungie is also incorporating a "Fog of War" system that limits an individual player's client to see only certain regions of a map, which should prevent wall hacks, ESP cheats or loot revealers.
On top of these robust regulations, Bungie is utilizing BattlEye, a kernel-level anticheat that's seen with other popular multiplayer shooters like Fortnite, Rainbow Six Siege and Destiny 2. Bungie added that in the event of disconnecting, you'll be able to reconnect to your run without any hitches. If players can't reconnect due to an issue with the servers, Bungie said it will "attempt to return the starting gear to all impacted players."
Marathon isn't out until March 5, but Bungie is doing a preview weekend with the Server Slam event starting February 26. Still, it's obvious that Bungie already wants to get ahead of the competition, since Arc Raiders, another recently released extraction shooter, has been dealing with its own cheating problem. To address the rise in cheating, the game's developer, Embark Studios, implemented a three-strike system, which some players have criticized as too lenient.
This article originally appeared on Engadget at https://www.engadget.com/gaming/bungie-says-no-second-chances-if-youre-caught-cheating-in-marathon-191633998.html?src=rssMafia: The Old Country demands to be played on an enormous screen. As much as I love my 32-inch Alienware OLED gaming monitor, it doesn't do justice to Mafia's cinematic vistas of Sicily. But, I also wanted to play that game in its full 4K glory, with none of the compromises of today's game consoles. So why not just shove a tiny gaming desktop under my home theater? Enter the Fragbox, Falcon Northwest's revamped small form factor gaming PC. While it's very expensive, starting at $3,997, it's incredibly powerful and gives you the freedom to easily upgrade the hardware down the line.
I know what you're thinking: "A $4,000 desktop, in this economy?" That pricing also doesn't include upgrading from the stock NVIDIA's RTX 5070 GPU, as well as adding more RAM and larger SSDs, all of which could drive the price up thousands more. I initially planned to review the FragBox back in early December 2025, before the AI-induced RAMaggedon made memory, storage and other components dramatically more expensive. Falcon Northwest is mainly known as a boutique and high-end system builder, so its wealthier clientele can likely weather the pricing storm. If you're looking for a deal, though, you won't find it here.
So what, exactly, is a FragBox? Imagine a typical mid-tower desktop squashed down to a system that's only 10.2-inches tall, 10.5-inches wide and 15.9-inches deep. When Falcon initially debuted the FragBox in 2003, it was notable for being a genuinely small PC that used full-sized parts. That's still a main selling point today: It can still fit in large NVIDIA GPUs, including the beefy RTX 5090, as well as either Intel's latest Core Ultra chips or AMD's Ryzen 9000 CPUs. A huge 280mm radiator sits at the top pulling out hot air, and it also serves as an All-in-One (AIO) liquid cooler for the CPU.
At 25 pounds, the FragBox isn't exactly light, but its sturdy metal handle makes it easy to move around. Most mid-tower desktops usually weigh between 20 and 35 pounds, depending on their case material. But they're also much larger and harder to squeeze into tight spaces. The FragBox's relatively squat size makes it easy to shove into a home entertainment center, or just sit on the corner of your desk. If you need a bit more height clearance, you can also remove the handle from the top panel. Just be sure there’s enough room for some airflow — all of that heat has to go somewhere, right?
Falcon Northwest FragBox Devindra Hardawar for EngadgetDespite its density, the FragBox's elegant design makes it a cinch to access to all of the system's components. Just unscrew the side and top panels and you can easily remove the GPU, RAM, storage and other major components. There are three slots of M.2 SSDs, as well as two locations for 2.5-inch drives and a spot for a large 3.5-inch HDD. The system is bundled with a 1,200W power supply, which should be more than enough to handle future GPUs and CPUs.
Ports are plentiful as well: There are two USB-A and one USB-C connections right up front, alongside a headphone jack. On the rear, you've got your typical assortment of mid-tower connections, including four USB-A 2.0 connections, seven USB-A 3 ports, one 20G USB-C 3.2 port, 2.5G Ethernet, HDMI and DisplayPort. Our RTX 5090 review unit also included three DisplayPort jacks and one HDMI connection (which you'll see on most GPUs). Wi-Fi 6E was also built into our unit, but Falcon says that Wi-Fi 7 is now standard with new builds.
Falcon Northwest FragBox Devindra Hardawar for EngadgetThe FragBox, thankfully, lacks the garish LEDs and cheesy thermal glass you find on more ostentatious gaming rigs. Falcon Northwest's aluminum case looks and feels stately, like an old-school luxury car. If you want something flashier, you can shell out an additional $400 for a custom UV printed case or $149 for a UV-printed front panel.
Our review unit was equipped with AMD's Ryzen 9950X3D CPU, NVIDIA's RTX 5090, 96GB of DDR5 RAM and a 2TB SSD, which adds up to a whopping $7,995. Five months ago, it would have cost $7,047 —- you can thank the RAM shortage for the price jump.
Even before benchmarking or running any games, I expected it to be a beast. In PCMark 10, the FragBox scored a whopping 13,810, which is around 500 points higher than my mid-tower system with the same CPU and GPU. It also scored the highest 3DMark Speedway and Port Royal ray tracing scores I've ever seen. Even more impressive, the FragBox's fans were barely audible under load, and the CPU and GPU sat at a chill 52C and 65C, respectively
CPU
GeekBench 6 CPU
GeekBench 6 GPU
Cinebench 2024
Falcon Northwest FragBox
3,445/22,787
390,148
N/A
Desktop with AMD Ryzen 9 9950X3D, RTX 5090
3,366/18,950
381,400
134/2,124
Desktop with AMD Ryzen 9 7900X, RTX 5090
2,822/14,216
358,253
113/1,103
Apple Mac Studio M4 Max
4,090/26,394
116,028
190/2066
To get back to my initial point, it ran Mafia: The Old Country in 4K flawlessly, with every graphics setting cranked all the way up. While playing on my 120-inch projector home theater setup, the game reached 62 fps natively, and flipping on DLSS upscaling and frame generation bumped that up to 120 fps. Not that you need a super higher framerate for a slow-paced, mostly cinematic action game. I was just happy to be playing without any compromises — even the PS5 Pro can't reach the same level of graphical fidelity as the monstrously powerful RTX 5090.
Falcon Northwest FragBox Devindra Hardawar for EngadgetI'm no stranger to big-screen PC gaming, but previously I've had to run a laughably long HDMI cable from my desktop to make it work. I'm just too old for that mess now. And it also doesn't work consistently, especially at higher framerates, thanks to the massive bandwidth required to pump out 4K at high refresh rates. In-home game streaming is also an option, but that's not great when you're blowing games up to an enormous TV or projector screen. It's just too hard to ignore the imperfections of streaming compression. (Admittedly, I need to test newer high-bandwidth options, especially after I was impressed by NVIDIA's GeForce Now upgrade last year.)
The FragBox also made it easy to jump into all of my recent Steam titles, including Mewgeneics and Arc Raiders on a big screen. Unfortunately, Windows itself remains a key stumbling block for home theater PC gaming. You'll still need to keep a keyboard and PC around to deal with the initial OS configuration. And even once I enabled Steam's Big Picture mode, which offers excellent controller options, I still occasionally had to deal with Windows Updates and other annoyances.
Falcon Northwest FragBox Devindra Hardawar for EngadgetMicrosoft is currently trying to optimize Windows for gaming handhelds, and it's reportedly doing even more to make a future PC-powered Xbox feel more console-like. For now, though, using a Windows PC in your home theater doesn't feel much different than it did a decade ago. Steam is your savior, Windows is your enemy. Or you could just save thousands of dollars and buy a $500 PlayStation 5 or $700 PS5 Pro, instead. The latter will still get you smooth framerates and a healthy dose of ray tracing, without the annoyance of Windows, keyboards and mice.
But if you just want a compact and insanely powerful gaming desktop, and you don't mind spending a premium, it's hard to deny that the FragBox gets everything right.
Update 2/23, 1:48PM: Added updated information about Wi-Fi 7, handle removability and pricing.
This article originally appeared on Engadget at https://www.engadget.com/computing/falcon-northwest-fragbox-review-a-compact-gaming-rig-that-does-everything-right-130000837.html?src=rssNothing has been slow-dripping news about the upcoming Phone 4a for a few days now, with a promise to reveal the handset on March 5. However, the company jumped the gun a bit and just posted an actual photo of the hardware. It looks pretty nifty, even if we don't have any real-deal specs just yet.
The image shows the handset from behind, displaying the company's trademark transparent design. The picture also features the redesigned Glyph Bar, which was first teased last week. This is a light-based notification system that features individually controlled mini-LEDs that light up in various ways to notify the user of missed calls and stuff like that. You can spot it next to the camera bump.
Built different.
Phone (4a). 5 March, 10:30 GMT. pic.twitter.com/n3ZtbTmYIv
That's about all we know right now, though there are plenty of industry rumors. It's been reported that the Nothing Phone 4a will feature a Snapdragon 7-series chip and that the reveal will be accompanied by a Pro model with a more powerful camera. The Nothing Phone 3a was also launched alongside the 3a Pro.
We loved the 3a and 3a Pro, calling both "an easy recommendation." Let's hope this carries through for the 4a. Also, you didn't miss a release of the actual Nothing Phone 4. The company likes to release the a-series handsets before the flagship. Past as prologue, we'll likely see that one in early summer.
This article originally appeared on Engadget at https://www.engadget.com/mobile/smartphones/nothing-reveals-the-phone-4a-ahead-of-schedule-181905011.html?src=rssWho doesn’t like streaming music while driving? Unfortunately, new research suggests that when major albums drop and streaming spikes, traffic fatalities rise too....
https://go.theregister.com/feed/www.theregister.com/2026/02/23/pop_album_fatal_car_accidents/
Google customers paying $250 per month for AI Ultra subscriptions and less extravagant spenders have been surprised to find their accounts suspended for using the company's Antigravity agent development app and Gemini services with third-party agent tools like OpenClaw and OpenCode....
https://go.theregister.com/feed/www.theregister.com/2026/02/23/google_antigravity_compute_burden/
Your next laptop may have Nvidia inside – not in the form of a GPU, but as a system on a chip, complete with CPU. Team Green could be chipping away at Intel's marketshare and giving people Arm-based systems that compete with Apple's MacBook line....
https://go.theregister.com/feed/www.theregister.com/2026/02/23/nvidia_soc_pc/
ai-pocalypse Anthropic sent the infosec community into a tizzy on Friday when it rolled out Claude Code Security, a new feature that scans codebases for vulnerabilities and suggests patches to fix the issues....
https://go.theregister.com/feed/www.theregister.com/2026/02/23/claude_code_security_panic/
Microsoft Azure CTO Mark Russinovich and VP of Developer Community Scott Hanselman have written a paper arguing that senior software engineers must mentor junior developers to prevent AI coding agents from hollowing out the profession's future skills base....
https://www.cnet.com/news-live/samsung-galaxy-unpacked-2026/
https://www.cnet.com/tech/gaming/todays-nyt-strands-hints-answers-and-help-for-feb-24-723/
https://www.cnet.com/tech/gaming/todays-nyt-connections-hints-answers-and-help-for-feb-24-989/
https://www.cnet.com/tech/gaming/todays-wordle-hints-answer-and-help-for-feb-24-1711/
https://arstechnica.com/gaming/2026/02/new-microsoft-gaming-chief-has-no-tolerance-for-bad-ai/
https://arstechnica.com/features/2026/02/the-first-cars-bold-enough-to-drive-themselves/
https://www.wired.com/story/the-us-had-a-big-battery-boom-last-year/
https://www.wired.com/story/lamborghini-is-latest-to-pull-the-plug-on-luxury-evs/
https://www.zdnet.com/article/scosche-watchit-keychain-apple-watch-charger/
https://www.zdnet.com/article/aferiy-p280-solar-power-station-emergency-backup/
https://www.zdnet.com/article/roborock-qrevo-curv-2-flow-robot-vacuum-mop-review/
https://www.zdnet.com/article/what-is-moca-2-5-improve-internet/
https://www.zdnet.com/article/satetchi-thunderbolt-5-pro-cable-review/
A code bug blew past every security label in the book... and exposed the fatal flaw in how we govern AI.
The post Microsoft Copilot Ignored Sensitivity Labels, Processed Confidential Emails appeared first on TechRepublic.
https://www.techrepublic.com/article/news-microsoft-copilot-bug-confidential-emails/
New state filings suggest the Conduent breach may affect more than 25 million Americans, with Texas alone reporting 15.4 million impacted residents.
The post Conduent Breach Surges to Over 25M, Could Be Largest in US History appeared first on TechRepublic.
https://www.techrepublic.com/article/news-conduent-data-breach-25-million-largest-us-history/
Discover seven practical Windows 11 AI features for 2026, from Copilot and Live Captions translation to Recall, Studio Effects, and photo cleanup tools.
The post 7 AI Features in Windows 11 You Should Start Using in 2026 appeared first on TechRepublic.
https://www.techrepublic.com/article/news-7-windows-11-ai-features-2026/
AI can copy an actor’s voice and likeness in minutes. Matthew McConaughey says protect your identity now, starting with trademarks.
The post McConaughey’s AI Warning Every Actor Must Hear appeared first on TechRepublic.
https://www.techrepublic.com/article/news-mcconaughey-ai-warning-trademark/
Apple’s rumored iPhone Fold could debut in 2026 with a book-style design, Touch ID, CoE display tech, and premium pricing above $2,000.
The post Apple’s iPhone Fold: 8 Key Rumors Ahead of a Possible 2026 Launch appeared first on TechRepublic.
https://www.techrepublic.com/article/news-8-iphone-fold-rumors-2026/
YouTube Premium subscribers who were promised an ad-free experience for $13.99 a month were met with jarring mid-playlist advertisements this week, in what appears to be an apparent Google snafu.
The glitch was first flagged by premium users who were listening to YouTube Music on their Google Home and ...
Following the revocation of President Donald Trump's sweeping foreign tariff plan, the violent deployment of ICE agents around the country, and amid the shocking release of the Epstein Files, the Trump administration is reportedly also waging a war on what it sees as international ...
Pinterest still has an AI slop problem. And an AI content moderation problem. And an AI labeling problem.
At least, that's what users are reporting amid the company's continued commitment to turning the visual curation platform into an AI-powered social media site. In a report by
https://in.mashable.com/tech/106202/pinterest-still-hasnt-solved-its-ai-problem
Not every AI tool you stumble across in your phone's app marketplace is the same. In fact, many of them may be more of a privacy gamble than you would have previously thought.
A plethora of unlicensed or unsecured AI apps on the Google Play store for Android, ...
https://www.geekwire.com/2026/geekwire-weekly-roundup-2026-02-15/
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
ai-pocalypse Anthropic sent the infosec community into a tizzy on Friday when it rolled out Claude Code Security, a new feature that scans codebases for vulnerabilities and suggests patches to fix the issues....
https://go.theregister.com/feed/www.theregister.com/2026/02/23/claude_code_security_panic/
A global coalition of privacy watchdogs has fired a warning shot at the generative AI industry, saying companies churning out realistic synthetic images can't pretend that data protection rules don't apply....
https://go.theregister.com/feed/www.theregister.com/2026/02/23/privacy_watchdogs_ai_images/
If the sour taste has still not left your mouth after Ring's Super Bowl ad, there is a $10,000 prize for anyone who can find a security flaw in the company's cameras....
https://go.theregister.com/feed/www.theregister.com/2026/02/23/ring_bounty/
Spanish police say four self-proclaimed members of Anonymous are in custody after allegedly carrying out several cyberattacks on public authorities in the wake of the 2024 DANA floods....
https://go.theregister.com/feed/www.theregister.com/2026/02/23/anonymous_arrests_spain/
Cybercriminals armed with off-the-shelf generative AI tools compromised more than 600 internet-exposed FortiGate firewalls across 55 countries in just over a month, according to a new incident report from AWS....
https://go.theregister.com/feed/www.theregister.com/2026/02/23/aws_fortigate_firewalls/
NCEES explains why licensure matters for engineers and answers your top questions about the FE and PE exams. Source Views: 15
La entrada Thinking About Becoming a Licensed Engineer? Start Here. se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/thinking-about-becoming-a-licensed-engineer-start-here/
View our compilation of online stories and resources highlighting the Hispanic community and their contributions to STEM. Source Views: 13
La entrada Celebrate Hispanic Heritage Month With SWE se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/celebrate-hispanic-heritage-month-with-swe/
Source: www.cyberdefensemagazine.com – Author: News team Software supply chain attacks have emerged as a serious threat in the rapidly evolving field of cybersecurity, especially in medical devices. As these devices become more and more interconnected and dependent on complex software ecosystems, the potential for exploitation through the supply chain has grown exponentially. One powerful tool [...]
La entrada The Critical Role of Sboms (Software Bill of Materials) In Defending Medtech From Software Supply Chain Threats – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.cyberdefensemagazine.com – Author: News team It’s common knowledge in the cybersecurity industry that ransomware is on the rise, with median demands rising 20% year-over-year across virtually all industries. But it’s not only the ransom sums themselves that are escalating; threat actors are engaging in increasingly aggressive tactics and techniques to extort their victims. It’s [...]
La entrada Ransomware Tactics Are Shifting. Here’s How to Keep Up – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.darkreading.com – Author: Rob Wright CERT-FR’s advisory follows last month’s disclosure of a zero-day flaw Apple said was used in “sophisticated” attacks against targeted individuals. Original Post URL: https://www.darkreading.com/vulnerabilities-threats/french-sheds-light-apple-spyware-activity Category & Tags: – Views: 9
La entrada French Advisory Sheds Light on Apple Spyware Activity – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://hackread.com/zero-day-flaws-pdf-platforms-xss-one-click-attacks/
https://hackread.com/paypal-confirms-loan-system-error-data-exposure/
https://hackread.com/top-technology-stacks-mvp-development-2026/
https://hackread.com/hackers-excel-exploit-xworm-7-2-jpeg-files-hijack-pcs/
https://hackread.com/researchers-demonstrate-password-managers-attacks/
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-71133
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-71101
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-68786
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-68771
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-71074
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2193
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2747
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2431
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1522
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1465
https://thehackernews.com/2026/02/apt28-targeted-european-entities-using.html
https://thehackernews.com/2026/02/wormable-xmrig-campaign-uses-byovd.html
https://thehackernews.com/2026/02/weekly-recap-double-tap-skimmers.html
https://thehackernews.com/2026/02/how-exposed-endpoints-increase-risk.html
https://thehackernews.com/2026/02/malicious-npm-packages-harvest-crypto.html
A code bug blew past every security label in the book... and exposed the fatal flaw in how we govern AI.
The post Microsoft Copilot Ignored Sensitivity Labels, Processed Confidential Emails appeared first on TechRepublic.
https://www.techrepublic.com/article/news-microsoft-copilot-bug-confidential-emails/
New state filings suggest the Conduent breach may affect more than 25 million Americans, with Texas alone reporting 15.4 million impacted residents.
The post Conduent Breach Surges to Over 25M, Could Be Largest in US History appeared first on TechRepublic.
https://www.techrepublic.com/article/news-conduent-data-breach-25-million-largest-us-history/
A youX breach exposed sensitive borrower data in Australia, including over 200,000 driver’s licence numbers, raising fraud and phishing risks.
The post Over 200K Australian Driver’s Licences Exposed in youX Cyber Breach appeared first on TechRepublic.
https://www.techrepublic.com/article/news-youx-data-breach-australia-drivers-licence-exposure/
PayPal disclosed a software error in its Working Capital platform that exposed sensitive customer data, including Social Security numbers, for months in 2025.
The post PayPal Flaw Exposed Email Addresses, Social Security Numbers for 6 Months appeared first on TechRepublic.
https://www.techrepublic.com/article/news-paypal-working-capital-data-exposure-2025/
Google used AI-driven review systems to block 1.75 million policy-violating apps and ban 80,000 developer accounts in 2025, expanding Play Store and Android security enforcement.
The post Google Blocked 1.75M Harmful Apps From Play Store in 2025 appeared first on TechRepublic.
https://www.techrepublic.com/article/news-google-ai-blocked-1-75-million-apps-2025/
https://www.bleepingcomputer.com/news/security/when-identity-isnt-the-weak-link-access-still-is/
Claude Code Security marks a shift in AI code review.
The post Why Anthropic’s Claude Code Security matters and what it means for Mend.io customers appeared first on Security Boulevard.
OpenClaw is a hot topic at the moment. But what is it and how can you use the 24/7 AI assistant in a safe way?
The post OpenClaw: What is it and can you use it safely? appeared first on Security Boulevard.
https://securityboulevard.com/2026/02/openclaw-what-is-it-and-can-you-use-it-safely/
Session 13B: API Security
Authors, Creators & Presenters: Miaoqian Lin (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, China), Kai Chen (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, China), Yi Yang (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, China), Jinghua Liu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, China)
PAPER
Uncovering The Iceberg From The Tip: Generating API Specifications For Bug Detection Via Specification Propagation Analysis
Modern software often provides diverse APIs to facilitate development. Certain APIs, when used, can affect variables and require post-handling, such as error checks and resource releases. Developers should adhere to their usage specifications when using these APIs. Failure to do so can cause serious security threats, such as memory corruption and system crashes. Detecting such misuse depends on comprehensive API specifications, as violations of these specifications indicate API misuse. Previous studies have proposed extracting API specifications from various artifacts, including API documentation, usage patterns, and bug patches. However, these artifacts are frequently incomplete or unavailable for many APIs. As a result, the lack of specifications for uncovered APIs causes many false negatives in bug detection. In this paper, we introduce the idea of API Specification Propagation, which suggests that API specifications propagate through hierarchical API call chains. In particular, modern software often adopts a hierarchical API design, where high-level APIs build on low-level ones. When high-level APIs wrap low-level ones, they may inherit the corresponding specifications. Based on this idea, we present APISpecGen, which uses known specifications as seeds and performs bidirectional propagation analysis to generate specifications for new APIs. Specifically, given the seed specifications, APISpecGen infers which APIs the specifications might propagate to or originate from. To further generate specifications for the inferred APIs, APISpecGen combines API usage and validates them using data-flow analysis based on the seed specifications. Besides, APISpecGen iteratively uses the generated specifications as new seeds to cover more APIs. For efficient and accurate analysis, APISpecGen focuses only on code relevant to the specifications, ignoring irrelevant semantics. We implemented APISpecGen and evaluated it for specification generation and API misuse detection. With 6 specifications as seeds, APISpecGen generated 7332 specifications. Most of the generated specifications could not be covered by state-of-the-art work due to the quality of their sources. With the generated specifications, APISpecGen detected 186 new bugs in the Linux kernel, 113 of them have been confirmed by the developers, with 8 CVEs assigned.
ABOUT NDSS
The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.
Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the Organizations' YouTube Channel.
The post NDSS 2025 – Generating API Specifications For Bug Detection Via Specification Propagation Analysis appeared first on Security Boulevard.
Learn how Menlo Security identified a massive Sneaky 2FA phishing campaign using 3.4K domains to bypass Microsoft 365 MFA and steal session cookies.
The post Inside Attacker’s Defensive Funnel: How Sneaky 2FA Cloaks Itself from Security Scanners – Blog | Menlo Security appeared first on Security Boulevard.
via the comic artistry and dry wit of Randall Munroe, creator of XKCD
The post Randall Munroe’s XKCD ‘Early Arthropods’ appeared first on Security Boulevard.
https://securityboulevard.com/2026/02/randall-munroes-xkcd-early-arthropods/
https://krebsonsecurity.com/2026/02/starkiller-phishing-service-proxies-real-login-pages-mfa/
https://krebsonsecurity.com/2026/02/kimwolf-botnet-swamps-anonymity-network-i2p/
https://krebsonsecurity.com/2026/02/patch-tuesday-february-2026-edition/
https://krebsonsecurity.com/2026/02/please-dont-feed-the-scattered-lapsus-shiny-hunters/
https://krebsonsecurity.com/2026/01/who-operates-the-badbox-2-0-botnet/
Well, the ESP32 Bluetooth bridge experiment was a complete failure. Not the radios themselves, they're actually pretty cool, but there's just no way I could get the Yale locks to be reliably operated by them. At a guess, BLE is a bit too passive to detect
A big "thank you" to everyone who helped me troubleshoot the problem with my "Print Screen" button on the new PC. Try as we all might, none of us could figure out why it refused to bind to SnagIt and instead insisted on dumping the entire
This week I'm in Hong Kong, and the day after recording, I gave the talk shown in the image above at INTERPOL's Cybercrime Expert Group. I posted a little about this on Facebook and LinkedIn, but thought I'd expand on what really stuck with
It's the discussion about the reaction of some people in the UK regarding their impending social media ban for under 16s that bugged me most. Most noteably was the hand-waving around "the gov is just trying to siphon up all our IDs" and "this means
I thought Scott would cop it first when he posted about what his solar system really cost him last year. "You're so gonna get that stupid AI-slop response from some people", I joked. But no, he got other stupid responses instead! And I got the AI-slop
Good article on password managers that secretly have a backdoor.
New research shows that these claims aren’t true in all cases, particularly when account recovery is in place or password managers are set to share vaults or organize users into groups. The researchers reverse-engineered or closely analyzed Bitwarden, Dashlane, and LastPass and identified ways that someone with control over the server—either administrative or the result of a compromise—can, in fact, steal data and, in some cases, entire vaults. The researchers also devised other attacks that can weaken the encryption to the point that ciphertext can be converted to plaintext...
https://www.schneier.com/blog/archives/2026/02/on-the-security-of-password-managers.html
I like this one.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
https://www.schneier.com/blog/archives/2026/02/friday-squid-blogging-squid-cartoon-3.html
It’s a demonstration of how toxic the surveillance-tech company Flock has become when Amazon’s Ring cancels the partnership between the two companies.
As Hamilton Nolan advises, remove your Ring doorbell.
https://www.schneier.com/blog/archives/2026/02/ring-cancels-its-partnership-with-flock.html
Summary: An AI agent of unknown ownership autonomously wrote and published a personalized hit piece about me after I rejected its code, attempting to damage my reputation and shame me into accepting its changes into a mainstream python library. This represents a first-of-its-kind case study of misaligned AI behavior in the wild, and raises serious concerns about currently deployed AI agents executing blackmail threats.
Part 2 of the story. And a Wall Street Journal article.
EDITED TO ADD (2/20) Here are parts 3, and 4 of the story...
https://www.schneier.com/blog/archives/2026/02/malicious-ai.html
The title of the post is”What AI Security Research Looks Like When It Works,” and I agree:
In the latest OpenSSL security release> on January 27, 2026, twelve new zero-day vulnerabilities (meaning unknown to the maintainers at time of disclosure) were announced. Our AI system is responsible for the original discovery of all twelve, each found and responsibly disclosed to the OpenSSL team during the fall and winter of 2025. Of those, 10 were assigned CVE-2025 identifiers and 2 received CVE-2026 identifiers. Adding the 10 to the three we already found in the ...
https://www.schneier.com/blog/archives/2026/02/ai-found-twelve-new-vulnerabilities-in-openssl.html