IT

SlashDot.org

Walmart, ChatGPT Team Up For Shopping

00:00 - 14/10/2025
  View item as page
Walmart announced a new partnership with OpenAI that will let customers shop using ChatGPT. "For many years now, eCommerce shopping experiences have consisted of a search bar and a long list of item responses. That is about to change," Walmart CEO Doug McMillon said in a statement. NBC News reports: It was unclear Tuesday what the terms of the Walmart-AI partnership would be. The announcement also did not say when shoppers can expect to see ChatGPT integrated with their Walmart online shopping experiences, only that it's coming "soon." The OpenAI announcement is part of a broader push by Walmart, the biggest private employer in the U.S., to incorporate AI into its daily operations. "We're excited to partner with Walmart to make everyday purchases a little simpler. It's just one way AI will help people every day under our work together," Sam Altman, the co-founder and CEO of OpenAI, said in a statement. The partnership could also serve OpenAI by introducing ChatGPT to a massive set of consumers who may not be as accustomed to using AI chats in their shopping as OpenAI's core user base. "There is a native AI experience coming that is multi-media, personalized and contextual," said Walmart's McMillon.

Read more of this story at Slashdot.

https://slashdot.org/story/25/10/14/2048246/walmart-chatgpt-team-up-for-shopping


Windows 10 Support 'Ends' Today

00:00 - 14/10/2025
  View item as page
An anonymous reader quotes a report from Ars Technica: Today is the official end-of-support date for Microsoft's Windows 10. That doesn't mean these PCs will suddenly stop working, but if you don't take action, it does mean your PC has received its last regular security patches and that Microsoft is washing its hands of technical support. This end-of-support date comes about a decade after the initial release of Windows 10, which is typical for most Windows versions. But it comes just four years after Windows 10 was replaced by Windows 11, a version with stricter system requirements that left many older-but-still-functional PCs with no officially supported upgrade path. As a result, Windows 10 still runs on roughly 40 percent of the world's Windows PCs (or around a third of US-based PCs), according to StatCounter data. But this end-of-support date also isn't set in stone. Home users with Windows 10 PCs can enroll in Microsoft's Extended Security Updates (ESU) program, which extends the support timeline by another year. [...] Home users can only get a one-year stay of execution for Windows 10, but IT administrators and other institutions with fleets of Windows 10 PCs can also pay for up to three years of ESUs, which is also roughly the amount of time users can expect new Microsoft Defender antivirus updates and updates for core apps like Microsoft Edge. Obviously, Microsoft's preferred upgrade path would be either an upgrade to Windows 11 for PCs that meet the requirements or an upgrade to a new PC that does support Windows 11. It's also still possible, at least for now, to install and run Windows 11 on unsupported PCs. Your day-to-day experience will generally be pretty good, though installing Microsoft's major yearly updates (like the upcoming Windows 11 25H2 update) can be a bit of a pain.

Read more of this story at Slashdot.

https://tech.slashdot.org/story/25/10/14/2043238/windows-10-support-ends-today?u


Salesforce Says AI Customer Service Saves $100 Million Annually

00:00 - 14/10/2025
  View item as page
Salesforce says it's saving about $100 million a year by using AI tools in the software company's customer service operations. From a report: The company is working to sell AI features that can handle work such as customer service or early-stage sales. To illustrate the value of the Agentforce product to business clients, Salesforce has been vocal about its own use of the technology. Chief Executive Officer Marc Benioff announced the statistic on Salesforce's savings during a speech Tuesday at the annual Dreamforce conference in San Francisco. The company said more than 12,000 customers are using Agentforce. For example, Reddit was able to cut customer support resolution time by 84%, Salesforce said.

Read more of this story at Slashdot.

https://slashdot.org/story/25/10/14/1925230/salesforce-says-ai-customer-service-


DirecTV Will Soon Bring AI Ads To Your Screensaver

00:00 - 14/10/2025
  View item as page
DirecTV wants to use AI to put you, your family, and your pets inside a custom TV screensaver. From a report: If that's not uncanny enough, you'll find items you can shop for within that AI environment, whether it's a piece of clothing similar to the one your AI likeness is wearing or a piece of furniture that pops up alongside it. The satellite TV giant is partnering with the AI company Glance to roll out this experience to DirecTV Gemini devices starting next year. "We are making television a lean-in experience versus lean back," Rajat Wanchoo, the group vice president of commercial partnerships at Glance, tells The Verge. "We want to give users a chance to use the advancements that have happened in generative AI to create a ChatGPT moment for themselves, but on TV." Glance is owned by InMobi, the same company that injected ecommerce bloatware into Motorola's budget phones.

Read more of this story at Slashdot.

https://entertainment.slashdot.org/story/25/10/14/1323222/directv-will-soon-brin


Lawyer Caught Using AI While Explaining to Court Why He Used AI

00:00 - 14/10/2025
  View item as page
An anonymous reader shares a report: An attorney in a New York Supreme Court commercial case got caught using AI in his filings, and then got caught using AI again in the brief where he had to explain why he used AI, according to court documents filed earlier this month. New York Supreme Court Judge Joel Cohen wrote in a decision granting the plaintiff's attorneys' request for sanctions that the defendant's counsel, Michael Fourte's law offices, not only submitted AI-hallucinated citations and quotations in the summary judgment brief that led to the filing of the plaintiff's motion for sanctions, but also included "multiple new AI-hallucinated citations and quotations" in the process of opposing the motion. "In other words," the judge wrote, "counsel relied upon unvetted AI -- in his telling, via inadequately supervised colleagues -- to defend his use of unvetted AI." The case itself centers on a dispute between family members and a defaulted loan. The details of the case involve a fairly run-of-the-mill domestic money beef, but Fourte's office allegedly using AI that generated fake citations, and then inserting nonexistent citations into the opposition brief, has become the bigger story.

Read more of this story at Slashdot.

https://yro.slashdot.org/story/25/10/14/1542245/lawyer-caught-using-ai-while-exp


Indonesia's Film Industry Embraces AI To Make Hollywood-style Movies For Cheap

00:00 - 14/10/2025
  View item as page
Indonesia's film industry has started using generative AI tools to produce films at a fraction of Hollywood budgets. The country's filmmakers are deploying ChatGPT for scriptwriting, Midjourney for image generation, and Runway for video storyboarding. VFX artist Amilio Garcia Leonard told Rest of World that AI has reduced his draft editing time by 70%. The Indonesian Film Producer Association supports the technology. Indonesian films typically cost 10 billion rupiah ($602,500), less than 1% of major Hollywood productions. The sector employed about 40,000 people in 2020 and generated over $400 million in box office sales in 2023. Jobs for storyboarders, VFX artists, and voice actors are disappearing.

Read more of this story at Slashdot.

https://entertainment.slashdot.org/story/25/10/14/1536226/indonesias-film-indust


The World is Producing More Food Crops Than Ever Before

00:00 - 14/10/2025
  View item as page
The United Nations Food and Agriculture Organization projects record production of global cereal crops in the 2025-26 farming season. The forecast covers wheat, corn and rice, and comes as the global stocks-to-use ratio stands around 30.6% -- the world is producing nearly a third more of these foundational crops than it currently uses. The U.S. Department of Agriculture reported in August that American farmers would harvest a record corn crop at record yield per acre. The FAO Food Price Index has risen slightly this year but remains nearly 20% below its peak during the early months of the war in Ukraine. Average calories available per person worldwide have climbed from roughly 2,100 to 2,200 kilocalories daily in the early nineteen-sixties to just under 3,000 kilocalories daily by 2022. Cereal yields have roughly tripled since 1961. Yet the World Bank estimates around 2.6 billion people cannot afford a healthy diet, and current famines in Gaza and Sudan stem from political failures rather than crop failures.

Read more of this story at Slashdot.

https://news.slashdot.org/story/25/10/14/1525220/the-world-is-producing-more-foo


Generative AI Systems Miss Vast Bodies of Human Knowledge, Study Finds

00:00 - 14/10/2025
  View item as page
Generative AI models trained on internet data lack exposure to vast domains of human knowledge that remain undigitized or underrepresented online. English dominates Common Crawl with 44% of content. Hindi accounts for 0.2% of the data despite being spoken by 7.5% of the global population. Tamil represents 0.04% despite 86 million speakers worldwide. Approximately 97% of the world's languages are classified as "low-resource" in computing. A 2020 study found 88% of languages face such severe neglect in AI technologies that bringing them up to speed would require herculean efforts. Research on medicinal plants in North America, northwest Amazonia and New Guinea found more than 75% of 12,495 distinct uses of plant species were unique to just one local language. Large language models amplify dominant patterns through what researchers call "mode amplification." The phenomenon narrows the scope of accessible knowledge as AI-generated content increasingly fills the internet and becomes training data for subsequent models.

Read more of this story at Slashdot.

https://slashdot.org/story/25/10/14/155258/generative-ai-systems-miss-vast-bodie


California Cracks Down on 'Predatory' Early Cancellation Fees

00:00 - 14/10/2025
  View item as page
California has enacted new legislation that aims to limit companies from charging consumers "exorbitant" fees to cancel fixed-term contracts. From a report: Assembly Bill 483 was signed into law by California Gov. Gavin Newsom on Friday, placing transparency requirements and fee limits on early terminations for installment contracts -- plans that allow consumers to make recurring payments for goods and services over a specified duration. This includes services that lure consumers into signing annual contracts by allowing them to pay in installments that appear similar to rolling monthly subscriptions, but with hefty cancellation fees for not locking in for the full year. The bill bans companies from hiding early termination fee disclosures within fine print or obscured hyperlinks, and limits the total fee amount to a maximum of 30 percent of the total contract cost. The goal is to make it easier for Californians to take these fees into account when comparing between services, and lessen the financial burden if they need to end their contract early.

Read more of this story at Slashdot.

https://slashdot.org/story/25/10/14/176237/california-cracks-down-on-predatory-e


Satellites Are Leaking the World's Secrets: Calls, Texts, Military and Corporate Data

00:00 - 14/10/2025
  View item as page
Researchers at UC San Diego and the University of Maryland have found that roughly half of geostationary satellite signals transmit sensitive data without encryption. The team spent three years using an $800 satellite receiver on a university rooftop in San Diego to intercept communications from satellites visible from their location. They collected phone calls and text messages from more than 2,700 T-Mobile users in just nine hours of recording. The researchers also obtained data from airline passengers using in-flight Wi-Fi, communications from electric utilities and offshore oil and gas platforms, and US and Mexican military communications that revealed personnel locations and equipment details. The exposed data resulted from telecommunications companies using satellites to relay signals from remote cell towers to their core networks. The researchers examined only about 15% of global satellite transponder communications and presented their findings at an Association for Computing Machinery conference in Taiwan this week. Most companies warned by the researchers have encrypted their satellite transmissions, but some US critical infrastructure owners have not yet added encryption.

Read more of this story at Slashdot.

https://science.slashdot.org/story/25/10/14/1043236/satellites-are-leaking-the-w


Techcrunch.com

EVs take a backseat in Stellantis’ $13B U.S. investment plan

22:36 - 14/10/2025
  View item as page
Five new vehicles and a four-cylinder engine will be developed and produced through 2029 as part of investment into factories in Illinois, Ohio, Michigan and Indiana.

https://techcrunch.com/2025/10/14/evs-take-a-backseat-in-stellantis-13b-u-s-inve


Sam Altman says ChatGPT will soon allow erotica for adult users

20:51 - 14/10/2025
  View item as page
OpenAI says it will soon roll back some of ChatGPT's safeguards, and even allow the chatbot to engage in erotica for adult users.

https://techcrunch.com/2025/10/14/sam-altman-says-chatgpt-will-soon-allow-erotic


At Starbase, SpaceX is taking firefighting into its own hands

20:39 - 14/10/2025
  View item as page
SpaceX's company town has formed a volunteer fire department, extending control over both the emergency response and permitting process as the company looks to expand Starbase.

https://techcrunch.com/2025/10/14/at-starbase-spacex-is-taking-firefighting-into


Inaudible sound might be the next frontier in wildfire defense

19:54 - 14/10/2025
  View item as page
Sonic Fire Tech has developed a device that can extinguish flames using acoustic energy below the range of human hearing. The startup is building a demo capable of protecting a home.

https://techcrunch.com/2025/10/14/inaudible-sound-might-be-the-next-frontier-in-


Spotify partners with Netflix for video podcast distribution deal

18:00 - 14/10/2025
  View item as page
Spotify is partnering with Netflix to bring select video podcasts to the streaming platform starting in early 2026. The deal will feature curated shows from Spotify Studios and The Ringer, expanding later to include more genres. The move reflects Spotify’s growing focus on video as a key driver for engagement and ad revenue, with video podcast consumption now growing 20 times faster than audio-only content.

https://techcrunch.com/2025/10/14/spotifys-video-podcasts-are-coming-to-netflix-



Mozilla’s Firefox adds Perplexity’s AI answer engine as a new search option

17:49 - 14/10/2025
  View item as page
The integration offers conversational, cited answers instead of traditional links and follows positive feedback from earlier tests in select markets. Perplexity will expand to mobile soon.

https://techcrunch.com/2025/10/14/mozillas-firefox-adds-perplexitys-ai-answer-en


Facebook brings back job listings in the US

16:31 - 14/10/2025
  View item as page
Facebook is reintroducing job listings to users in the U.S., focusing on entry-level, trade, and service jobs.

https://techcrunch.com/2025/10/14/facebook-brings-back-job-listings-in-the-us/


Google’s Gemini can now help you schedule Google Calendar meetings

16:10 - 14/10/2025
  View item as page
Designed for one-on-one meetings, the tool lets you insert available time slots directly into an email, automatically creating a calendar invite once a recipient selects a time.

https://techcrunch.com/2025/10/14/googles-gemini-can-now-help-you-schedule-googl


Google Meet launches an AI-powered makeup feature

16:00 - 14/10/2025
  View item as page
Google Meet finally has a makeup filter for those days when you don't feel like applying lipstick.

https://techcrunch.com/2025/10/14/google-meet-launches-an-ai-powered-makeup-feat


Engadget.com

Banjo-Kazooie director Gregg Mayles confirms he's left Rare

22:08 - 14/10/2025
  View item as page

Gregg Mayles, the director of Sea of Thieves and designer on Donkey Kong Country, has announced that he's left Rare. News of Mayles' exit was first reported in July 2025 during a rash of layoffs and game cancellations across Xbox Games Studios, but the short poem he shared on X today makes it official.

With a 36-year tenure at the studio, Mayles saw its transition from an exclusive Nintendo partner to a Microsoft subsidiary. He helped design games like Battletoads, created Banjo-Kazooie and when studio founders Tim and Chris Stamper left in 2007, stepped up and became Rare's creative director. Mayles also led the team behind Sea of Thieves, one of Rare's modern successes.

Today was my last day at @RareLtd. Thanks to everyone who played and enjoyed any of the games I helped create while I was there. Also thanks to all the people that worked on the games alongside me. It seemed fitting that I should say farewell with one final rhyme! pic.twitter.com/X54u8Bc2oI

— Gregg Mayles (@Ghoulyboy) October 14, 2025

The studio has been supporting Sea of Thieves with new content since it was released in 2018, but was also working on a new project, Everwild, that was announced in 2019. The game went through a troubled development process over the last few years, and Rare reportedly started from scratch in 2021 with Mayles taking over as director. Microsoft's decision to cancel the game and layoff staff at the studio this summer is likely one of the reasons he left.

Losing Mayles is just one example of Microsoft's self-inflicted wounds from 2025. The company not only made cuts at Halo Studios and Forza Motorsport developer Turn 10, it also increased the prices of both Xbox consoles and Game Pass Ultimate. All of these changes are seemingly in service of shifting the Xbox business into something that's more focused on subscriptions and game publishing, but the transition definitely seems like a painful one.

This article originally appeared on Engadget at https://www.engadget.com/gaming/xbox/banjo-kazooie-director-gregg-mayles-confirms-hes-left-rare-220828667.html?src=rss

https://www.engadget.com/gaming/xbox/banjo-kazooie-director-gregg-mayles-confirm


Meta removes Facebook Group for tracking ICE agents after DOJ pressure

20:34 - 14/10/2025
  View item as page

Attorney General Pam Bondi posted on X that the Department of Justice contacted Facebook in order to have a group removed that she claimed "was being used to dox and target" US Immigration and Customs Enforcement agents operating in Chicago. We reached out to Meta for confirmation and a representative said, "This Group was removed for violating our policies against coordinated harm," however they did not confirm the name of the group or whether the DOJ was involved in the action.

Officers for the immigration agency have reportedly been moving through Chicago with facial coverings, no name tags and sometimes in vehicles with no license plates, although a US District Judge ruled that all ICE agents who are not undercover are required to display visible identification while operating in the Chicagoland area.

The Department of Justice has demanded that other tech companies remove content the current administration has deemed critical of its immigration policies and practices. At the start of the month, Apple removed ICEBlock, an app for tracking the movements of immigration agents, from the App Store following similar pressure from Bondi. "Capitulating to an authoritarian regime is never the right move," ICEBlock developer Joshua Aaron said in an interview following the action. "Our mission has always been to protect our neighbors from the terror this administration continues to reign down on the people of this nation."

This article originally appeared on Engadget at https://www.engadget.com/meta-removes-facebook-group-for-tracking-ice-agents-after-doj-pressure-203429574.html?src=rss

https://www.engadget.com/meta-removes-facebook-group-for-tracking-ice-agents-aft


Google reportedly offers to tweak search results to avoid EU fine

19:39 - 14/10/2025
  View item as page

In order to avoid paying billions of dollars in fines for violating the European Union's Digital Markets Act, Google is considering changing how search results are displayed, Reuters reports. EU regulators first took issue with Google's Search and Play Store businesses in March 2025, claiming it favored its own services in search results over third-party options and prevented developers from informing customers of alternative ways of accessing apps.

One of regulators main issues with Google Search was that Google appeared to favor results from services like Google Flights or Google Hotels over ones from "vertical search services," providers that specialize in displaying search results from a specific industry, like Expedia or Hotels.com. To avoid fines, Google now wants Search to give VSS businesses equal treatment in results.

"We will create the opportunity for each VSS to show its own box on Search. A VSS box will be populated with results from that VSS inventory," Google said in a proposal viewed by Reuters. Results from Google's own services will exist with the same formatting alongside, and the winning VSS box will be displayed in search results based on "objective and non-discriminatory criteria." Importantly, search results from actual airlines and car rental companies won't be excluded, they'll also appear in a box "above or below the VSS box depending on the relevance to the user's query."

Engadget has asked Google to comment on Reuters' report and to confirm the details of its proposed changes to Google Search. We'll update this article if we hear back.

Like Apple, Google faces significant scrutiny from the EU because of its monopolistic control over its various platforms and services. The threat of fines from the DMA has forced Apple to open up its products to third-party app stores, among a host of other changes. Clearly, Google is willing to tweak what once seemed like untouchable pillars of its business to avoid fines, too. Whether these proposed changes will be enough for the regulators remains to be seen, though.

This article originally appeared on Engadget at https://www.engadget.com/big-tech/google-reportedly-offers-to-tweak-search-results-to-avoid-eu-fine-193940005.html?src=rss

https://www.engadget.com/big-tech/google-reportedly-offers-to-tweak-search-resul


The company Discord blamed for its recent breach says it wasn't hacked

18:59 - 14/10/2025
  View item as page

Customer service support company 5CA has released a statement contradicting claims by Discord that it was the victim of a hack last month. On October 3, Discord disclosed a data breach that the company says included a “small number” of government IDs like driver’s licenses and passports, which some users had submitted to verify their ages. Days later the company updated its statement to name 5CA as the target of the hack, which Discord contracts as part of its customer service efforts. It also disclosed that the "small number" of government IDs encompasses roughly 70,000 users.

"We are aware of media reports naming 5CA as the cause of a data breach involving one of our clients. Contrary to these reports, we can confirm that none of 5CA’s systems were involved, and 5CA has not handled any government-issued IDs for this client. All our platforms and systems remain secure, and client data continues to be protected under strict data protection and security controls," the company’s statement reads in part. The company goes on to explicitly state "the incident occurred outside of our systems and that 5CA was not hacked."

5CA says that a preliminary investigation showed that the incident may have been the result of "human error," though it offers no details as to what exactly that implies. In a recent interview with BleepingComputer, the hackers who claimed responsibility for the breach said they had access to Discord's Zendesk account for 58 hours on September 20. The group claims they gained entry through compromised login credentials belonging to a support agent employed by a third-party company. Discord has not yet responded to the company’s claims.

Update 2:58 PM ET: Added more context about the breach.

This article originally appeared on Engadget at https://www.engadget.com/cybersecurity/the-company-discord-blamed-for-its-recent-breach-says-it-wasnt-hacked-175536278.html?src=rss

https://www.engadget.com/cybersecurity/the-company-discord-blamed-for-its-recent


Kobo made a remote control for its ereaders

18:50 - 14/10/2025
  View item as page

Kobo is making a remote control for its line of ereaders. The appropriately-named Kobo Remote costs $30 and will be available to purchase on November 4.

A remote control for an ereader may seem silly to some, but avid readers will likely appreciate this accessory. It's basically a wireless page turner, so users can lay in bed and read all day without having to physically hold the device or prop a hand up to push a button every 30 seconds. Kobo is calling it "the ideal reading companion."

It has been custom-built for Kobo products and will be available in both black and white, which matches the company's other products. It can integrate with any Kobo ereader with Bluetooth functionality, which includes the Libra 2 and the well-reviewed Clara Colour.

“In a Canadian winter, we know that sometimes maximum reading comfort means burrowing down in the blankets, tucking yourself in and not emerging until spring,” said Rakuten Kobo CEO Michael Tamblyn. “The Kobo Remote is the perfect accessory for peak immersive reading; it’s an invitation to lounge deeper, multitask smarter and simply enjoy reading without limits, no matter whether your environment is beach or blankets."

The remote will be available in multiple regions, including the US, Canada, Europe, Australia, Singapore, Japan and many others. The company says it'll be sharing more details about the remote soon, but we aren't sure what details could be left to share. It's a remote control for an ereader. Maybe it can do one or two unexpected things.

This article originally appeared on Engadget at https://www.engadget.com/mobile/tablets/kobo-made-a-remote-control-for-its-ereaders-185010955.html?src=rss

https://www.engadget.com/mobile/tablets/kobo-made-a-remote-control-for-its-eread


OpenAI forms advisory council on wellbeing and AI

18:38 - 14/10/2025
  View item as page

OpenAI announced today that it is creating an advisory council centered on its users' mental and emotional wellness. The Expert Council on Well-being and AI comprises eight researchers and experts on the intersection of technology and mental health. Some of the members were experts that OpenAI consulted as it developed parental controls. Topics of safety and protecting younger users have become more of a talking point for all artificial intelligence companies, including OpenAI, after lawsuits questioned their complicity in multiple cases where teenagers committed suicide after sharing their plans with AI chatbots.

This move sounds like a wise addition, but the effectiveness of any advisor hinges on listening to their insights. We've seen other tech companies establish and then utterly ignore their advisory councils; Meta is one of the notable recent examples. And the announcement from OpenAI even acknowledges that its new council has no real power to guide its operations: "We remain responsible for the decisions we make, but we’ll continue learning from this council, the Global Physician Network, policymakers, and more, as we build advanced AI systems in ways that support people’s well-being." It may become clearer how seriously OpenAI is taking this effort when it starts to disagree with the council, whether the company is genuinely committed to mitigating the serious risks of AI or whether this is a smoke and mirrors attempt to paper over its issues.

This article originally appeared on Engadget at https://www.engadget.com/openai-forms-advisory-council-on-wellbeing-and-ai-183815365.html?src=rss

https://www.engadget.com/openai-forms-advisory-council-on-wellbeing-and-ai-18381


OpenAI will let adults use ChatGPT for erotica starting in December

18:24 - 14/10/2025
  View item as page

OpenAI plans to open the floodgates to more adult uses of ChatGPT starting in December, according to a new post from CEO Sam Altman. The company announced that it would add parental controls and automatic age detection features in September, and it seems like a benefit of sorting out children from adults is an ability to offer more freedom in what ChatGPT can show users.

"In December, as we roll out age-gating more fully and as part of our 'treat adult users like adults' principle, we will allow even more, like erotica for verified adults," Altman says. Some avid ChatGPT users already regularly manipulate the chatbot to engage in NSFW conversations, but Altman's announcement sounds more like tacit approval from OpenAI that those use-cases are okay.

We made ChatGPT pretty restrictive to make sure we were being careful with mental health issues. We realize this made it less useful/enjoyable to many users who had no mental health problems, but given the seriousness of the issue we wanted to get this right.
Now that we have...

— Sam Altman (@sama) October 14, 2025

The company signaled something similar during its DevDay 2025 announcements, when its new guidelines for developers creating apps for ChatGPT shared that "support for mature (18+) experiences will arrive once appropriate age verification and controls are in place." After December, it sounds like adult interactions with ChatGPT or apps the chatbot can access are fair game.

All of these changes are being made in the shadow of disturbing stories of the seemingly negative influence ChatGPT can have on users, including the death of 16-year old Adam Raine, who allegedly used ChatGPT to plan his own suicide.

Reducing the chatbot's sycophantic qualities with the release of GPT-5 was one of the ways OpenAI tried to address the mental health impacts of ChatGPT, along with built-in notifications to remind users to take breaks. It's hard to definitively say whether these tweaks have made a difference, but combined with age-gating, it's clear OpenAI feels comfortable giving its chatbot a longer leash.

This article originally appeared on Engadget at https://www.engadget.com/ai/openai-will-let-adults-use-chatgpt-for-erotica-starting-in-december-182417583.html?src=rss

https://www.engadget.com/ai/openai-will-let-adults-use-chatgpt-for-erotica-start


Some Spotify video podcasts are coming to Netflix

18:00 - 14/10/2025
  View item as page

Spotify is taking the video versions of some of its podcasts to another platform entirely: Netflix. Starting in the US in early 2026 (with more markets and shows to follow), Netflix will start offering sports, culture, lifestyle and true crime podcasts that Spotify Studios and The Ringer produce.

Nine sports podcasts will be available at the jump, including The Bill Simmons Podcast, The Zach Lowe Show, Fairway Rollin’ and The Ringer’s F1, fantasy football, NFL and NBA shows. Other video podcasts that are coming to Netflix include The Rewatchables, The Recipe Club, Dissect, Conspiracy Theories and Serial Killers.

Netflix sees these podcasts as complementary to its current offerings (The Ringer F1 Show, for instance, will sit neatly alongside Drive to Survive). Of course, for Spotify, this is a way to get more eyeballs and eardrums on its original programming.

With TV viewing becoming a bigger priority for YouTube over the last few years, this seems like a way for Netflix to bite back in the battle for consumer attention, given the prevalence of video podcasts on Google’s platform. Many people use streaming services for background comfort sound, and turning to podcasts or talk-radio style formats (something Disney+ also offers with The Rich Eisen Show on weekdays) may be a way for them to do that after pulling the plug on cable and broadcast TV.

This article originally appeared on Engadget at https://www.engadget.com/entertainment/streaming/some-spotify-video-podcasts-are-coming-to-netflix-180000074.html?src=rss

https://www.engadget.com/entertainment/streaming/some-spotify-video-podcasts-are


YouTube rolls out its redesigned video player globally

17:46 - 14/10/2025
  View item as page

YouTube is bringing a wave of quality of life improvements to its platform. These visual updates and new features will roll out globally starting this week.

The main update to YouTube is a redesigned video player that has made the icons and UI elements to obscure less content. This new player design will appear on mobile, web and TV devices. Some users have had access to this feature for about a month, so it may not be brand new to everyone. The seek feature where a viewer can double-tap to skip has also been updated in a way that YouTube says is "more modern and less intrusive" and transitions between tabs have also been upgraded on mobile.

For those of you who spend a lot of time in the comments, you'll see a new threaded approach to replies. This update aims "to provide a more focused reading experience within the replies panel." The process of adding videos to playlists and the Watch Later queue has also been simplified and adjusted to be a "smoother and more visual" experience. Finally, some content will start displaying little animations when you hit the like button. The blog post gives music videos and sports videos as examples of where users may start seeing the flashier visual.

This article originally appeared on Engadget at https://www.engadget.com/entertainment/youtube/youtube-rolls-out-its-redesigned-video-player-globally-174609883.html?src=rss

https://www.engadget.com/entertainment/youtube/youtube-rolls-out-its-redesigned-


X experiments with showing more information about profiles to fight inauthentic engagement

17:25 - 14/10/2025
  View item as page

X has long been a hotbed for fake accounts, bots and other scammy behavior. Many of those dynamics have been exacerbated by the rise of paid verification, which boosts the visibility of anyone who pays for a subscription. Now, the company is running a small experiment that could help users better identify potentially suspicious accounts.

The service is starting to test a new "about this account" feature that will provide details about when an account joined the platform, where the person running it is based, how many times the username has been changed and how the account is connected to X. The feature is a lot like the "page transparency" information on Facebook, which provides similar details about when a given page was created and where the people running it are based.

"When you read content on X, you should be able to verify its authenticity," X's head of product, Nikita Bier, shared in a post about the change. "This is critical to getting a pulse on important issues happening in the world."

If fully rolled out, this type of feature could help people on X understand a lot of common scams and other deceptive behavior on the platform. For example, scammers often change the handle of a recently compromised account in order to trick an account's existing followers. And understanding the location of an account could help users root out people lying about their identity.

However, it sounds like it could be some time before the feature is implemented in a way that could be broadly useful. Bier said that initially X will show this info on "a handful of profiles of X team members" — most of whom already have an official "X" badge on their profiles — in order to get feedback on the change.

This article originally appeared on Engadget at https://www.engadget.com/social-media/x-experiments-with-showing-more-information-about-profiles-to-fight-inauthentic-engagement-172500501.html?src=rss

https://www.engadget.com/social-media/x-experiments-with-showing-more-informatio


TheRegister.com

Frightful Patch Tuesday gives admins a scare with 175+ Microsoft CVEs, 3 under attack

22:30 - 14/10/2025
  View item as page
Plus: Adobe, SAP, Ivanti offer treats, not tricks

Spooky season is in full swing, and this extends to Microsoft's October Patch Tuesday with security updates for a frightful 175 Microsoft vulnerabilities, plus an additional 21 non-Microsoft CVEs. And even scarier than the sheer number of bugs: three are listed as under attack, with three others publicly known, and 17 deemed critical security holes....

https://go.theregister.com/feed/www.theregister.com/2025/10/14/microsoft_october


CISA cuts more staff and reassigns others as government stays shut down

22:01 - 14/10/2025
  View item as page
America's main cybersecurity agency has lost almost 1,000 people this year

The Trump administration has continued to cut staff at the Cybersecurity and Infrastructure Security Agency (CISA), and is reportedly reassigning others, further imperiling the US' cybersecurity posture. ...

https://go.theregister.com/feed/www.theregister.com/2025/10/14/cisa_jettisoning_


Framework flame war erupts over support of politically polarizing Linux projects

21:38 - 14/10/2025
  View item as page
Laptop maker's apolitical endorsement of politically contentious projects meets resistance

Six days ago, upgradeable laptop maker Framework tried to convince its fractious user community to live in a "big tent" after a Debian developer objected to the company's sponsorship of Hyprland and its social media promotion of Omarchy, with both projects associated with politically polarizing viewpoints....

https://go.theregister.com/feed/www.theregister.com/2025/10/14/framework_linux_c


18 zettaFLOPS of new AI compute coming online from Oracle late next year

21:09 - 14/10/2025
  View item as page
New clusters to feature 800,000 Nvidia Blackwell and 50,000 AMD Instinct MI450X GPUs

Oracle on Tuesday revealed it would field more than 18 zettaFLOPS worth of AI infrastructure from Nvidia and AMD by the second half of next year....

https://go.theregister.com/feed/www.theregister.com/2025/10/14/oracle_amd_nvidia


Some like it bot! ChatGPT promises AI-rotica is coming for verified adults

19:48 - 14/10/2025
  View item as page
Maybe this will bring in some actual profit?

OpenAI has mitigated ChatGPT behavior that might exacerbate users' mental health issues, claims CEO Sam Altman, so the natural next step is to make ChatGPT act more human again - complete with the ability to generate "erotica for verified adults."...

https://go.theregister.com/feed/www.theregister.com/2025/10/14/openai_chatgpt_ai


Microsoft seeding Washington schools with free AI to get kids and teachers hooked

17:08 - 14/10/2025
  View item as page
To the slop trough, kiddos!

Not content to shove Copilot into every corner of the enterprise it can think of, Microsoft has announced plans to force feed AI to students across its home state of Washington. ...

https://go.theregister.com/feed/www.theregister.com/2025/10/14/microsoft_ai_scho


Chinese gang used ArcGIS as a backdoor for a year – and no one noticed

16:48 - 14/10/2025
  View item as page
Crims turned trusted mapping software into a hideout - no traditional malware required

A Chinese state-backed cybergang known as Flax Typhoon spent more than a year burrowing inside an ArcGIS server, quietly turning the trusted mapping software into a covert backdoor....

https://go.theregister.com/feed/www.theregister.com/2025/10/14/chinese_hackers_a


DGX Spark, Nvidia’s tiniest supercomputer, tackles large models at solid speeds

15:00 - 14/10/2025
  View item as page
This relatively affordable AI workstation isn’t about going fast; it’s about doing everything well enough

hands on Nvidia bills its long-anticipated DGX Spark as the "world's smallest AI supercomputer," and, at $3,000 to $4,000 (depending on config and OEM), you might be expecting the Arm-based mini-PC to outperform its less-expensive siblings....

https://go.theregister.com/feed/www.theregister.com/2025/10/14/dgx_spark_review/


Researchers intercept unencrypted satellite traffic from space blabbermouths

14:45 - 14/10/2025
  View item as page
University team picks up voice calls, texts, and corporate data from orbit with off-the-shelf kit

Geostationary satellites are broadcasting large volumes of unencrypted data to Earth, including private voice calls and text messages as well as consumer internet traffic, researchers have discovered....

https://go.theregister.com/feed/www.theregister.com/2025/10/14/unencrypted_satel


KuzuDB says so long and thanks for all the commits, marooning community

14:32 - 14/10/2025
  View item as page
Users left wondering whether to fork it or forget it as another FOSS project bites the dust

The KuzuDB embedded graph database, open source under the MIT license, has been abandoned by its creator and sponsor Kùzu Inc, leaving its community pondering whether to fork or find an alternative....

https://go.theregister.com/feed/www.theregister.com/2025/10/14/kuzudb_abandoned/


Cnet.com

Want to Watch a Podcast? Netflix and Spotify Partner to Bring Video Podcasts to Streaming

21:56 - 14/10/2025
  View item as page
Starting in early 2026, Netflix subscribers in the US will be able to watch select Spotify Studios and Ringer podcasts directly on the streaming platform.

https://www.cnet.com/tech/services-and-software/want-to-watch-a-podcast-netflix-



Maingear Announces Doom-Themed Gaming PC That Is Sure to Rip and Tear Apart Your Wallet

21:46 - 14/10/2025
  View item as page
This premium series of desktop PCs, created in collaboration with Havn, offer three pricey configs with cutting-edge gaming specs.

https://www.cnet.com/tech/computing/maingear-announces-doom-themed-gaming-pc-tha



Every Active Borderlands 4 SHiFT Code

21:10 - 14/10/2025
  View item as page
It's dangerous to explore Kairos without some legendary gear. These promo codes will unlock epic loot and vault hunter cosmetics in Borderlands 4.

https://www.cnet.com/tech/gaming/every-active-borderlands-4-shift-code/#ftag=CAD



Satellites Have Exposed Sensitive Data From T-Mobile and Others, Research Reveals

20:41 - 14/10/2025
  View item as page
Satellite signals carrying unencrypted calls, texts and information from military and corporate accounts were found to be open to eavesdropping.

https://www.cnet.com/tech/services-and-software/satellites-have-exposed-sensitiv





Arstechnica.com











Wired.com

A Quarter of the CDC Is Gone

21:51 - 14/10/2025
  View item as page
Another round of terminations, combined with previous layoffs and departures, has reduced the Centers for Disease Control and Prevention workforce by about 3,000 people since January.

https://www.wired.com/story/cdc-terminations-workforce-shutdown-rifs/



A Plan to Rebuild Gaza Lists Nearly 30 Companies. Many Say They’re Not Involved

20:13 - 14/10/2025
  View item as page
A presentation that has been shared with the Trump administration references Tesla, Ikea, TSMC, and more in its plan to rebuild Gaza. Some of these companies say they had no idea they were mentioned.

https://www.wired.com/story/a-plan-to-rebuild-gaza-lists-nearly-30-companies-man


Interstellar Comet 3I/ATLAS Is Spewing Water Like a Cosmic Fire Hydrant

19:03 - 14/10/2025
  View item as page
Analyses of its emissions using NASA’s Neil Gehrels Swift Observatory indicate that the interstellar comet probably has a very different structure than comets in the solar system.

https://www.wired.com/story/interstellar-comet-3i-atlas-is-spewing-water-like-a-


Do You Really Have to Stop Using Windows 10?

18:44 - 14/10/2025
  View item as page
Microsoft has stopped supporting the operating system. If you’re still running Windows 10, here are your options.

https://www.wired.com/story/do-you-really-have-to-stop-using-windows-10/


4 Apple Airtags Are $65 Right Now

18:24 - 14/10/2025
  View item as page
Track your favorite stuff for a fraction of the usual price.

https://www.wired.com/story/apple-airtag-deal-1025/


Feds Seize Record-Breaking $15 Billion in Bitcoin From Alleged Scam Empire

17:34 - 14/10/2025
  View item as page
Officials in the US and UK have taken sweeping action against “one of the largest investment fraud operations in history,” confiscating a historic amount of funds in the process.

https://www.wired.com/story/feds-seize-record-breaking-15-billion-in-bitcoin-fro


This Watch Brand Has Made a Completely New Kind of Strap Using Lasers

16:02 - 14/10/2025
  View item as page
It looks like fabric, feels like metal, and is as light as rubber. Meet the Ming Polymesh—the 3D-printed bracelet breaking new ground in horology.

https://www.wired.com/story/this-watch-brand-has-made-a-completely-new-kind-of-s


‘Sovereign AI’ Has Become a New Front in the US-China Tech War

16:00 - 14/10/2025
  View item as page
OpenAI has announced “AI sovereignty" partnerships with governments around the world, but can proprietary models compete with Beijing’s open source offerings?

https://www.wired.com/story/openai-sovereign-ai-us-china-tech-war/


The Best Advent Calendars (2025): We Opened Every Door

14:06 - 14/10/2025
  View item as page
Treat yourself or someone else to days of little gifts, ranging from sweet treats and savory beverages to beauty products and toys. We found a tiny door for everyone.

https://www.wired.com/gallery/best-advent-calendar/


ZDNet.com


Best AirPods 2025: I've used every pair of Apple headphones and earbuds - these are the winners

20:46 - 14/10/2025
  View item as page
I've worn every pair of headphones in Apple's catalog to help you find your iPhone's new best friend.

https://www.zdnet.com/article/best-airpods/


This charging cable has a genius solution to tangled wires - and it's only $20 on Amazon

20:32 - 14/10/2025
  View item as page
If there's one thing that annoys me, it's pulling out a bird's nest of cables from my bag. This cable puts an end to that.

https://www.zdnet.com/article/this-charging-cable-has-a-genius-solution-to-tangl


This HP EliteBook I tested proves why Windows laptops still rule the workplace

20:17 - 14/10/2025
  View item as page
HP's EliteBook Ultra G1i is impressively lightweight, reliably powerful, and built to last on battery life. But there's more to it.

https://www.zdnet.com/article/this-hp-elitebook-i-tested-proves-why-windows-lapt


Apple's M5 MacBook Pro could be hours away - here's everything we know

20:01 - 14/10/2025
  View item as page
Apparently, 'something powerful is coming'. Three new M5-powered Apple products could be launched as soon as October 15.

https://www.zdnet.com/article/apples-m5-macbook-pro-could-be-hours-away-heres-ev


These popular Sony headphones are close to their lowest-ever price

19:36 - 14/10/2025
  View item as page
Sony's WH-1000XM5 headphones are one of our editors' favorites thanks to their excellent sound quality and impressive noise cancellation - especially at this price.

https://www.zdnet.com/article/these-popular-sony-headphones-are-close-to-their-l


Looking for an affordable smartwatch? This popular Fitbit is $65 off

19:15 - 14/10/2025
  View item as page
The Fitbit Versa 4 is an inexpensive smartwatch with all the health and fitness metrics you could ask for. It's on sale now at Walmart.

https://www.zdnet.com/article/looking-for-an-affordable-smartwatch-this-popular-


Windows 11 upgrade not working? Try my 4 favorite troubleshooting tricks

19:13 - 14/10/2025
  View item as page
If a Windows upgrade has ever gone sideways on you, you know how vague and unhelpful the error messages can be. Here are my go-to troubleshooting tricks when that happens.

https://www.zdnet.com/article/windows-11-upgrade-not-working-try-my-favorite-tro


Windows 10 PC can't be upgraded? You have 5 options - and must act now

18:38 - 14/10/2025
  View item as page
Microsoft has officially ended support for its most popular OS ever. Here's what to do with your Windows 10 PCs that fail Microsoft's Windows 11 compatibility tests.

https://www.zdnet.com/article/windows-10-pc-cant-be-upgraded-you-have-5-options-



TechRepublic.com

Salesforce Turns Slack into an AI Hub with Agent360 Integration

17:51 - 14/10/2025
  View item as page

Slack’s rebuilt AI assistant connects directly to Salesforce’s Agentforce suite, providing enterprises with a centralized hub for agents, data, and automation.

The post Salesforce Turns Slack into an AI Hub with Agent360 Integration appeared first on TechRepublic.

https://www.techrepublic.com/article/news-salesforce-turns-slack-into-ai-hub/


Apple Quietly Drops the ‘+’ From Apple TV

16:42 - 14/10/2025
  View item as page

Apple’s low-key Apple TV rebranding hints at a deeper strategy to unify Apple’s streaming, device, and content ecosystem.

The post Apple Quietly Drops the ‘+’ From Apple TV appeared first on TechRepublic.

https://www.techrepublic.com/article/news-apple-tv/


Oracle to Deploy 50,000 AMD AI Chips in Bid to Challenge Nvidia

15:51 - 14/10/2025
  View item as page

Oracle will deploy 50,000 AMD AI chips and launch a new open lakehouse platform, signaling a major push to rival NVIDIA in the enterprise AI cloud race.

The post Oracle to Deploy 50,000 AMD AI Chips in Bid to Challenge Nvidia appeared first on TechRepublic.

https://www.techrepublic.com/article/news-oracle-deploy-50k-amd-ai-chips/


CamoLeak: GitHub Copilot Flaw Allowed Silent Data Theft

15:34 - 14/10/2025
  View item as page

A GitHub Copilot Chat bug let attackers steal private code via prompt injection. Learn how CamoLeak worked and how to defend against AI risks.

The post CamoLeak: GitHub Copilot Flaw Allowed Silent Data Theft appeared first on TechRepublic.

https://www.techrepublic.com/article/news-github-copilot-data-theft/


OpenAI to Build $25B Data Center in Argentina, Expanding Its Global AI Infrastructure

13:56 - 14/10/2025
  View item as page

OpenAI and Sur Energy plan a $25B, 500-MW AI data center in Patagonia under Argentina’s RIGI, with leaders touting Stargate Argentina as a regional milestone.

The post OpenAI to Build $25B Data Center in Argentina, Expanding Its Global AI Infrastructure appeared first on TechRepublic.

https://www.techrepublic.com/article/news-openai-data-center-argentina/


Google Gets Manipulative with New Hide Ads Feature

13:49 - 14/10/2025
  View item as page

The search giant's latest move lets people collapse sponsored results, with a catch that still guarantees exposure for advertisers.

The post Google Gets Manipulative with New Hide Ads Feature appeared first on TechRepublic.

https://www.techrepublic.com/article/news-google-hide-ads-feature/


Nvidia Unveils ‘World’s Smallest AI Supercomputer’

12:17 - 14/10/2025
  View item as page

CEO Huang says DGX Spark is "placing an AI computer in the hands of every developer to ignite the next wave of breakthroughs.”

The post Nvidia Unveils ‘World’s Smallest AI Supercomputer’ appeared first on TechRepublic.

https://www.techrepublic.com/article/news-nvidia-ai-supercomputer/




Critical Oracle EBS Flaw Could Expose Sensitive Data

21:40 - 13/10/2025
  View item as page

Oracle patches a high-severity EBS flaw that could let attackers bypass authentication and access sensitive enterprise data.

The post Critical Oracle EBS Flaw Could Expose Sensitive Data appeared first on TechRepublic.

https://www.techrepublic.com/article/news-oracle-ebs-vulnerability/


mashable.com


iPhone Air Price Drops On Amazon; Latest Deal Brings 256GB Model Down Rs 6,750

20:49 - 14/10/2025
  View item as page
iPhone Air now cheaper on Amazon. iPhone Air Price Drops On Amazon; Latest Deal Brings 256GB Model Down Rs 6,750

https://in.mashable.com/tech/101054/iphone-air-price-drops-on-amazon-latest-deal



OnePlus 15 Flagship To Feature BOE Display And Revamped Camera System

18:03 - 14/10/2025
  View item as page
OnePlus 15 to offer faster display, powerful chipset, and new design. OnePlus 15 Flagship To Feature BOE Display And Revamped Camera System

https://in.mashable.com/tech/101049/oneplus-15-flagship-to-feature-boe-display-a


Microsoft’s MAI-Image-1 Joins Top AI Models, Challenges Google Gemini

17:54 - 14/10/2025
  View item as page
Microsoft enters AI art race with powerful in-house model. Microsoft’s MAI-Image-1 Joins Top AI Models, Challenges Google Gemini

https://in.mashable.com/tech/101048/microsofts-mai-image-1-joins-top-ai-models-c


Apple Rebrands Apple TV+ Ahead Of Brad Pitt’s F1 Movie Premiere This December

17:41 - 14/10/2025
  View item as page
Apple drops ‘Plus’ before Brad Pitt’s F1 film debut. Apple Rebrands Apple TV+ Ahead Of Brad Pitt’s F1 Movie Premiere This December

https://in.mashable.com/tech/101047/apple-rebrands-apple-tv-ahead-of-brad-pitts-


Microsoft Ends Free Support For Windows 10; Users Urged To Upgrade To Windows 11

17:30 - 14/10/2025
  View item as page
Microsoft ends Windows 10 support, urges users to upgrade immediately. Microsoft Ends Free Support For Windows 10; Users Urged To Upgrade To Windows 11

https://in.mashable.com/tech/101046/microsoft-ends-free-support-for-windows-10-u




Honor 9Xc 5G Review: Luxe Looks In Mid-Range Segment

11:40 - 14/10/2025
  View item as page
Stylish, and sensibly smart. The Honor X9c combines a gorgeous curved AMOLED display and great battery life into a surprisingly polished mid-range phone, though it plays it safe on performance and cameras.

https://in.mashable.com/tech/101040/honor-9xc-5g-review-luxe-looks-in-mid-range-


Geekwire.com


Seattle recruiting tech startup Humanly acquires 3 companies to expand AI hiring platform

15:23 - 14/10/2025
  View item as page

Seattle-based startup Humanly is buying three recruiting technology companies — Sprockets, Qualifi, and HourWork — as it aims to build… Read More

https://www.geekwire.com/2025/recruiting-startup-humanly-acquires-3-companies-to



Civic leaders pitch ambitious Seattle-Tacoma electric ferry plan as World Cup deadline looms

20:25 - 13/10/2025
  View item as page

A pilot electric ferry service between Seattle and nearby Tacoma could debut next summer to serve the surge of World Cup tourists expected in the region. Read More

https://www.geekwire.com/2025/seattle-area-leaders-push-ambitious-electric-ferry


Column: Why headlines about AI displacing jobs don’t match reality

15:00 - 13/10/2025
  View item as page

There are two narratives unfolding in the press, in VC/founder circles, and in the boardroom. One is about AI automation… Read More

https://www.geekwire.com/2025/column-why-headlines-about-ai-displacing-jobs-dont


Slalom vet Gretchen Peri joins WaTech to modernize how Washington state serves residents

14:30 - 13/10/2025
  View item as page

Gretchen Peri has been involved in helping governments around the world find better ways to use technology for more than… Read More

https://www.geekwire.com/2025/slalom-vet-gretchen-peri-takes-joins-watech-to-mod


Seattle vs. Toronto: As Mariners and Blue Jays battle on the field, which city has the better tech hub?

01:20 - 13/10/2025
  View item as page

Seattle and Toronto are squaring off on the baseball diamond this week in the American League Championship Series. But how do the two cities fare in a battle over tech bragging rights? Read More

https://www.geekwire.com/2025/seattle-vs-toronto-as-mariners-and-blue-jays-battl



‘Seis the moment’: Earthquake monitors measure shaking during Mariners’ epic playoff win in Seattle

21:14 - 11/10/2025
  View item as page

The Pacific Northwest Seismic Network, which monitors earthquakes and volcanoes in Washington and Oregon, installed a sensor inside T-Mobile Park to record seismic energy during the American League Division Series game. Read More

https://www.geekwire.com/2025/seis-the-moment-earthquake-monitors-sense-shaking-


Vibe-coding a new reality: Chris Pirillo on the rise of AI-powered apps, features, and founders

14:02 - 11/10/2025
  View item as page

What happens when anyone can build software just by describing it? Longtime tech creator Chris Pirillo joins the GeekWire Podcast to talk about “vibe coding,” the rise of AI-built apps, and his new CTRL + ALT + CREATE Live event series. Read More

https://www.geekwire.com/2025/vibe-coding-a-new-reality-chris-pirillo-on-the-ris


Latest from TechRadar



Apple just teased a new MacBook Pro, and it might offer more than just an M5 chip

20:55 - 14/10/2025
  View item as page
Apple's SVP of Marketing, Greg Joswiak, just teased that something powerful is coming in a post on X, and it's very likely to be the new M5 MacBook Pro.

https://www.techradar.com/computing/macs/apple-just-teased-a-new-macbook-pro-and


I tested these brilliant OneOdio over-ears and they're now my favorite budget headphones –by a mile

20:30 - 14/10/2025
  View item as page
The OneOdio Focus A6s may well be the best budget over-ear headphones I’ve ever had the privilege to use. Here’s why.

https://www.techradar.com/audio/headphones/oneodio-focus-a6-review




NordVPN just made its Linux GUI app open-source, and there's more on the way

17:43 - 14/10/2025
  View item as page
NordVPN has open-sourced its Linux GUI app and updated its Snap package to include it, with Meshnet set to be next.

https://www.techradar.com/vpn/vpn-services/nordvpn-just-made-its-linux-gui-app-o



How to watch Latvia vs England for *FREE* — Stream FIFA World Cup 2026 Qualifier

17:00 - 14/10/2025
  View item as page
Here's our quick guide on how to watch Latvia vs England with Thomas Tuchel's men eyeing a spot at the 2026 FIFA World Cup.

https://www.techradar.com/how-to-watch/football/latvia-vs-england-fifa-world-cup


How to watch Portugal vs Hungary: 2026 World Cup Qualifier, free streams, channels, preview

16:45 - 14/10/2025
  View item as page
We'll show you all the ways you can watch Portugal vs Hungary as the Group F heavyweights come together this Tuesday from anywhere in the world.

https://www.techradar.com/how-to-watch/football/portugal-vs-hungary-2026-world-c


Cybersecurity

Security.nl

Website RIVM weer online na verhelpen van kwetsbaarheid in webformulier

16:30 - 14/10/2025
  View item as page
De website van het Rijksinstituut voor Volksgezondheid en Milieu (RIVM) is weer online nadat die eerder vandaag offline werd ...

https://www.security.nl/posting/909151/Website+RIVM+weer+online+na+verhelpen+van


Firefox Password Manager slaat wachtwoorden voortaan versleuteld op via AES

15:30 - 14/10/2025
  View item as page
De in Firefox ingebouwde Password Manager slaat wachtwoorden voortaan versleuteld op via AES-encryptie, zo heeft Mozilla ...

https://www.security.nl/posting/909141/Firefox+Password+Manager+slaat+wachtwoord


TeamViewer: veertig procent computers draait nog op Windows 10

15:07 - 14/10/2025
  View item as page
Meer dan veertig procent van de computers wereldwijd draait nog op Windows 10, zo stelt TeamViewer op basis van eigen onderzoek ...

https://www.security.nl/posting/909136/TeamViewer%3A+veertig+procent+computers+d


Pixnapping-aanval laat malafide app 2FA-codes van Androidtelefoons stelen

14:34 - 14/10/2025
  View item as page
Onderzoekers hebben een nieuwe aanval gedemonstreerd waarmee het mogelijk is voor malafide apps om 2FA-codes en andere ...

https://www.security.nl/posting/909132/Pixnapping-aanval+laat+malafide+app+2FA-c


RIVM haalt website offline nadat er malafide berichten op verschenen

13:51 - 14/10/2025
  View item as page
Het Rijksinstituut voor Volksgezondheid en Milieu (RIVM) heeft de eigen website offline gehaald nadat er malafide berichten op ...

https://www.security.nl/posting/909118/RIVM+haalt+website+offline+nadat+er+malaf


Defecte software-update laat Jeeps langs kant van de weg stranden

12:12 - 14/10/2025
  View item as page
Een defecte software-update heeft er afgelopen vrijdag in de Verenigde Staten voor gezorgd dat allerlei Jeeps langs de kant van ...

https://www.security.nl/posting/909092/Defecte+software-update+laat+Jeeps+langs+


Australische overheid roept bedrijven op om legacy IT te vervangen

11:33 - 14/10/2025
  View item as page
Op de dag dat Microsoft de ondersteuning van Windows 10 stopt roept de Australische overheid bedrijven op om legacy IT te ...

https://www.security.nl/posting/909081/Australische+overheid+roept+bedrijven+op+


Aanstelling van Meta-lobbyist als commissaris Ierse privacytoezichthouder baart zorgen

10:58 - 14/10/2025
  View item as page
Tientallen burgerrechtenbewegingen en maatschappelijke organisaties hebben in een open brief aan de Europese Commissie hun ...

https://www.security.nl/posting/909076/Aanstelling+van+Meta-lobbyist+als+commiss


Kringloopwinkels Friese afvalverwerker Omrin dicht wegens ransomware

10:21 - 14/10/2025
  View item as page
De Friese afvalverwerker Omrin is gisteren getroffen door een ransomware-aanval, wat gevolgen heeft voor de dienstverlening. Zo ...

https://www.security.nl/posting/909069/Kringloopwinkels+Friese+afvalverwerker+Om


Britse overheid meldt recordaantal cyberaanvallen met nationale impact

09:59 - 14/10/2025
  View item as page
Het Verenigd Koninkrijk heeft de afgelopen twaalf maanden met een recordaantal cyberaanvallen te maken gekregen die nationale ...

https://www.security.nl/posting/909064/Britse+overheid+meldt+recordaantal+cybera


Slashdot

Windows 10 Support 'Ends' Today

00:00 - 14/10/2025
  View item as page
An anonymous reader quotes a report from Ars Technica: Today is the official end-of-support date for Microsoft's Windows 10. That doesn't mean these PCs will suddenly stop working, but if you don't take action, it does mean your PC has received its last regular security patches and that Microsoft is washing its hands of technical support. This end-of-support date comes about a decade after the initial release of Windows 10, which is typical for most Windows versions. But it comes just four years after Windows 10 was replaced by Windows 11, a version with stricter system requirements that left many older-but-still-functional PCs with no officially supported upgrade path. As a result, Windows 10 still runs on roughly 40 percent of the world's Windows PCs (or around a third of US-based PCs), according to StatCounter data. But this end-of-support date also isn't set in stone. Home users with Windows 10 PCs can enroll in Microsoft's Extended Security Updates (ESU) program, which extends the support timeline by another year. [...] Home users can only get a one-year stay of execution for Windows 10, but IT administrators and other institutions with fleets of Windows 10 PCs can also pay for up to three years of ESUs, which is also roughly the amount of time users can expect new Microsoft Defender antivirus updates and updates for core apps like Microsoft Edge. Obviously, Microsoft's preferred upgrade path would be either an upgrade to Windows 11 for PCs that meet the requirements or an upgrade to a new PC that does support Windows 11. It's also still possible, at least for now, to install and run Windows 11 on unsupported PCs. Your day-to-day experience will generally be pretty good, though installing Microsoft's major yearly updates (like the upcoming Windows 11 25H2 update) can be a bit of a pain.

Read more of this story at Slashdot.

https://tech.slashdot.org/story/25/10/14/2043238/windows-10-support-ends-today?u


Salesforce Says AI Customer Service Saves $100 Million Annually

00:00 - 14/10/2025
  View item as page
Salesforce says it's saving about $100 million a year by using AI tools in the software company's customer service operations. From a report: The company is working to sell AI features that can handle work such as customer service or early-stage sales. To illustrate the value of the Agentforce product to business clients, Salesforce has been vocal about its own use of the technology. Chief Executive Officer Marc Benioff announced the statistic on Salesforce's savings during a speech Tuesday at the annual Dreamforce conference in San Francisco. The company said more than 12,000 customers are using Agentforce. For example, Reddit was able to cut customer support resolution time by 84%, Salesforce said.

Read more of this story at Slashdot.

https://slashdot.org/story/25/10/14/1925230/salesforce-says-ai-customer-service-


DirecTV Will Soon Bring AI Ads To Your Screensaver

00:00 - 14/10/2025
  View item as page
DirecTV wants to use AI to put you, your family, and your pets inside a custom TV screensaver. From a report: If that's not uncanny enough, you'll find items you can shop for within that AI environment, whether it's a piece of clothing similar to the one your AI likeness is wearing or a piece of furniture that pops up alongside it. The satellite TV giant is partnering with the AI company Glance to roll out this experience to DirecTV Gemini devices starting next year. "We are making television a lean-in experience versus lean back," Rajat Wanchoo, the group vice president of commercial partnerships at Glance, tells The Verge. "We want to give users a chance to use the advancements that have happened in generative AI to create a ChatGPT moment for themselves, but on TV." Glance is owned by InMobi, the same company that injected ecommerce bloatware into Motorola's budget phones.

Read more of this story at Slashdot.

https://entertainment.slashdot.org/story/25/10/14/1323222/directv-will-soon-brin


Lawyer Caught Using AI While Explaining to Court Why He Used AI

00:00 - 14/10/2025
  View item as page
An anonymous reader shares a report: An attorney in a New York Supreme Court commercial case got caught using AI in his filings, and then got caught using AI again in the brief where he had to explain why he used AI, according to court documents filed earlier this month. New York Supreme Court Judge Joel Cohen wrote in a decision granting the plaintiff's attorneys' request for sanctions that the defendant's counsel, Michael Fourte's law offices, not only submitted AI-hallucinated citations and quotations in the summary judgment brief that led to the filing of the plaintiff's motion for sanctions, but also included "multiple new AI-hallucinated citations and quotations" in the process of opposing the motion. "In other words," the judge wrote, "counsel relied upon unvetted AI -- in his telling, via inadequately supervised colleagues -- to defend his use of unvetted AI." The case itself centers on a dispute between family members and a defaulted loan. The details of the case involve a fairly run-of-the-mill domestic money beef, but Fourte's office allegedly using AI that generated fake citations, and then inserting nonexistent citations into the opposition brief, has become the bigger story.

Read more of this story at Slashdot.

https://yro.slashdot.org/story/25/10/14/1542245/lawyer-caught-using-ai-while-exp


Indonesia's Film Industry Embraces AI To Make Hollywood-style Movies For Cheap

00:00 - 14/10/2025
  View item as page
Indonesia's film industry has started using generative AI tools to produce films at a fraction of Hollywood budgets. The country's filmmakers are deploying ChatGPT for scriptwriting, Midjourney for image generation, and Runway for video storyboarding. VFX artist Amilio Garcia Leonard told Rest of World that AI has reduced his draft editing time by 70%. The Indonesian Film Producer Association supports the technology. Indonesian films typically cost 10 billion rupiah ($602,500), less than 1% of major Hollywood productions. The sector employed about 40,000 people in 2020 and generated over $400 million in box office sales in 2023. Jobs for storyboarders, VFX artists, and voice actors are disappearing.

Read more of this story at Slashdot.

https://entertainment.slashdot.org/story/25/10/14/1536226/indonesias-film-indust


The World is Producing More Food Crops Than Ever Before

00:00 - 14/10/2025
  View item as page
The United Nations Food and Agriculture Organization projects record production of global cereal crops in the 2025-26 farming season. The forecast covers wheat, corn and rice, and comes as the global stocks-to-use ratio stands around 30.6% -- the world is producing nearly a third more of these foundational crops than it currently uses. The U.S. Department of Agriculture reported in August that American farmers would harvest a record corn crop at record yield per acre. The FAO Food Price Index has risen slightly this year but remains nearly 20% below its peak during the early months of the war in Ukraine. Average calories available per person worldwide have climbed from roughly 2,100 to 2,200 kilocalories daily in the early nineteen-sixties to just under 3,000 kilocalories daily by 2022. Cereal yields have roughly tripled since 1961. Yet the World Bank estimates around 2.6 billion people cannot afford a healthy diet, and current famines in Gaza and Sudan stem from political failures rather than crop failures.

Read more of this story at Slashdot.

https://news.slashdot.org/story/25/10/14/1525220/the-world-is-producing-more-foo


Generative AI Systems Miss Vast Bodies of Human Knowledge, Study Finds

00:00 - 14/10/2025
  View item as page
Generative AI models trained on internet data lack exposure to vast domains of human knowledge that remain undigitized or underrepresented online. English dominates Common Crawl with 44% of content. Hindi accounts for 0.2% of the data despite being spoken by 7.5% of the global population. Tamil represents 0.04% despite 86 million speakers worldwide. Approximately 97% of the world's languages are classified as "low-resource" in computing. A 2020 study found 88% of languages face such severe neglect in AI technologies that bringing them up to speed would require herculean efforts. Research on medicinal plants in North America, northwest Amazonia and New Guinea found more than 75% of 12,495 distinct uses of plant species were unique to just one local language. Large language models amplify dominant patterns through what researchers call "mode amplification." The phenomenon narrows the scope of accessible knowledge as AI-generated content increasingly fills the internet and becomes training data for subsequent models.

Read more of this story at Slashdot.

https://slashdot.org/story/25/10/14/155258/generative-ai-systems-miss-vast-bodie


California Cracks Down on 'Predatory' Early Cancellation Fees

00:00 - 14/10/2025
  View item as page
California has enacted new legislation that aims to limit companies from charging consumers "exorbitant" fees to cancel fixed-term contracts. From a report: Assembly Bill 483 was signed into law by California Gov. Gavin Newsom on Friday, placing transparency requirements and fee limits on early terminations for installment contracts -- plans that allow consumers to make recurring payments for goods and services over a specified duration. This includes services that lure consumers into signing annual contracts by allowing them to pay in installments that appear similar to rolling monthly subscriptions, but with hefty cancellation fees for not locking in for the full year. The bill bans companies from hiding early termination fee disclosures within fine print or obscured hyperlinks, and limits the total fee amount to a maximum of 30 percent of the total contract cost. The goal is to make it easier for Californians to take these fees into account when comparing between services, and lessen the financial burden if they need to end their contract early.

Read more of this story at Slashdot.

https://slashdot.org/story/25/10/14/176237/california-cracks-down-on-predatory-e


Satellites Are Leaking the World's Secrets: Calls, Texts, Military and Corporate Data

00:00 - 14/10/2025
  View item as page
Researchers at UC San Diego and the University of Maryland have found that roughly half of geostationary satellite signals transmit sensitive data without encryption. The team spent three years using an $800 satellite receiver on a university rooftop in San Diego to intercept communications from satellites visible from their location. They collected phone calls and text messages from more than 2,700 T-Mobile users in just nine hours of recording. The researchers also obtained data from airline passengers using in-flight Wi-Fi, communications from electric utilities and offshore oil and gas platforms, and US and Mexican military communications that revealed personnel locations and equipment details. The exposed data resulted from telecommunications companies using satellites to relay signals from remote cell towers to their core networks. The researchers examined only about 15% of global satellite transponder communications and presented their findings at an Association for Computing Machinery conference in Taiwan this week. Most companies warned by the researchers have encrypted their satellite transmissions, but some US critical infrastructure owners have not yet added encryption.

Read more of this story at Slashdot.

https://science.slashdot.org/story/25/10/14/1043236/satellites-are-leaking-the-w


Beijing Issues Documents Without Word Format Amid US Tensions

00:00 - 14/10/2025
  View item as page
An anonymous reader shares a report: China's expansion of its rare earth export controls appeared to mark another escalation in the US-China trade war last week. But the announcements were also significant in another way: unusually, the documents could not be opened using American word processing software. For the first time, China's Ministry of Commerce issued a slew of documents that could be directly accessed only through WPS Office -- China's answer to Microsoft Office -- as Beijing continues its tech self-reliance drive. Developed by the Beijing-based software company Kingsoft, WPS Office uses a different coding structure to Microsoft Office, meaning WPS text files cannot be opened directly in Word without conversion. Previously, the ministry primarily released text documents in Microsoft Word format.

Read more of this story at Slashdot.

https://it.slashdot.org/story/25/10/14/0920224/beijing-issues-documents-without-


theregister.com/security

Asahi breach leaves bitter taste as brewer fears personal data slurped

14:12 - 14/10/2025
  View item as page
Japan's beer behemoth still mopping up after ransomware spill that disrupted deliveries and delayed results

Asahi's cyber hangover just got worse, with the brewer now admitting that personal information may have been tapped in last month's attack....

https://go.theregister.com/feed/www.theregister.com/2025/10/14/asahi_breach_upda


Mozilla is recruiting beta testers for a free, baked-in Firefox VPN

13:28 - 14/10/2025
  View item as page
Lucky few randomly selected to trial the feature, which won't fully roll out for several months

Mozilla is working on a built-in VPN for Firefox, with beta tests opening to select users shortly....

https://go.theregister.com/feed/www.theregister.com/2025/10/14/mozilla_firefox_v


Oracle rushes out another emergency E-Business Suite patch as Clop fallout widens

12:32 - 14/10/2025
  View item as page
Latest in a long line of EBS flaws leta miscreants remotely compromise enterprise systems to pinch sensitive data

Oracle is rushing out another emergency patch for its embattled E-Business Suite as the fallout from the Clop-linked attacks continues to spread....

https://go.theregister.com/feed/www.theregister.com/2025/10/14/oracle_rushes_out


British govt agents demand action after UK mega-cyberattacks surge 50%

10:51 - 14/10/2025
  View item as page
Warn businesses to act now as high-severity incidents keep climbing

Cyberattacks that meet upper severity thresholds set by the UK government's cyber agents have risen 50 percent in the last year, despite almost zero change in the volume of cases handled....

https://go.theregister.com/feed/www.theregister.com/2025/10/14/ncsc_uk_cyberatta


EU biometric border system launch hits inevitable teething problems

06:45 - 14/10/2025
  View item as page
Malfunctioning equipment and manual processing cause 90-minute waits

The European Union's new biometric Exit/Entry System (EES) got off to a chaotic start at Prague's international airport, with travelers facing lengthy queues and malfunctioning equipment forcing border staff to process arrivals manually....

https://go.theregister.com/feed/www.theregister.com/2025/10/14/eu_biometric_bord


Scattered Lapsus$ Hunters rage-quit the internet (again), promise to return next year

16:17 - 13/10/2025
  View item as page
'We will never stop,' say crooks, despite retiring twice in the space of a month

The Scattered Lapsus$ Hunters (SLSH) cybercrime collective - compriseed primarily of teenagers and twenty-somethings - announced it will go dark until 2026 following the FBI's seizure of its clearweb site....

https://go.theregister.com/feed/www.theregister.com/2025/10/13/scattered_lapsus_


Microsoft 'illegally' tracked students via 365 Education, says data watchdog

13:38 - 13/10/2025
  View item as page
Redmond argued schools, education authorities are responsible for GDPR

An Austrian digital privacy group has claimed victory over Microsoft after the country's data protection regulator ruled the software giant "illegally" tracked students via its 365 Education platform and used their data....

https://go.theregister.com/feed/www.theregister.com/2025/10/13/microsoft_365_edu


China probes Qualcomm's Autotalks deal amid rising US trade tensions

12:21 - 13/10/2025
  View item as page
Beijing insists it's business as usual – Washington might see it differently

China's competition regulator has launched an investigation into Qualcomm's purchase of Israeli firm Autotalks, the latest salvo in the escalating tech trade war between Washington and Beijing....

https://go.theregister.com/feed/www.theregister.com/2025/10/13/qualcomm_autotalk


Ofcom fines 4chan £20K and counting for pretending UK's Online Safety Act doesn't exist

11:10 - 13/10/2025
  View item as page
Regulator warns penalties will pile up until internet toilet does its paperwork

Ofcom, the UK's Online Safety Act regulator, has fined online message board 4chan £20,000 ($26,680) for failing to protect children from harmful content....

https://go.theregister.com/feed/www.theregister.com/2025/10/13/4chan_ofcom_fine/


Dutch government puts Nexperia on a short leash over chip security fears

11:01 - 13/10/2025
  View item as page
Minister invokes powers to stop firm shifting knowledge to China, citing governance shortcomings

The Dutch government has placed Nexperia - a Chinese-owned semiconductor company that previously operated Britain's Newport Wafer Fab — under special administrative measures, citing serious governance failures that threaten European tech security....

https://go.theregister.com/feed/www.theregister.com/2025/10/13/nexperia_special_


CISO2CISO.com

Thinking About Becoming a Licensed Engineer? Start Here.

14:04 - 13/09/2025
  View item as page

NCEES explains why licensure matters for engineers and answers your top questions about the FE and PE exams. Source Views: 6

La entrada Thinking About Becoming a Licensed Engineer? Start Here. se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

https://ciso2ciso.com/thinking-about-becoming-a-licensed-engineer-start-here/


Celebrate Hispanic Heritage Month With SWE

14:04 - 13/09/2025
  View item as page

View our compilation of online stories and resources highlighting the Hispanic community and their contributions to STEM. Source Views: 4

La entrada Celebrate Hispanic Heritage Month With SWE se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

https://ciso2ciso.com/celebrate-hispanic-heritage-month-with-swe/


Weekly Update 469 – Source: www.troyhunt.com

13:04 - 13/09/2025
  View item as page

Source: www.troyhunt.com – Author: Troy Hunt Sponsored by: So I had this idea around training a text-to-speech engine with my voice, then using that to speak over the Sonos at home to announce AI-driven events, such as people ringing the doorbell. A few hours’ worth of video from these weekly updates fed into ElevenLabs and […]

La entrada Weekly Update 469 – Source: www.troyhunt.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

https://ciso2ciso.com/weekly-update-469-source-www-troyhunt-com/


FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks – Source:thehackernews.com

12:04 - 13/09/2025
  View item as page

Source: thehackernews.com – Author: . The U.S. Federal Bureau of Investigation (FBI) has issued a flash alert to release indicators of compromise (IoCs) associated with two cybercriminal groups tracked as UNC6040 and UNC6395 for a string of data theft and extortion attacks. “Both groups have recently been observed targeting organizations’ Salesforce platforms via different initial […]

La entrada FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

https://ciso2ciso.com/fbi-warns-of-unc6040-and-unc6395-targeting-salesforce-plat


The Critical Role of Sboms (Software Bill of Materials) In Defending Medtech From Software Supply Chain Threats – Source: www.cyberdefensemagazine.com

10:04 - 13/09/2025
  View item as page

Source: www.cyberdefensemagazine.com – Author: News team Software supply chain attacks have emerged as a serious threat in the rapidly evolving field of cybersecurity, especially in medical devices. As these devices become more and more interconnected and dependent on complex software ecosystems, the potential for exploitation through the supply chain has grown exponentially. One powerful tool […]

La entrada The Critical Role of Sboms (Software Bill of Materials) In Defending Medtech From Software Supply Chain Threats – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

https://ciso2ciso.com/the-critical-role-of-sboms-software-bill-of-materials-in-d


Ransomware Tactics Are Shifting. Here’s How to Keep Up – Source: www.cyberdefensemagazine.com

10:04 - 13/09/2025
  View item as page

Source: www.cyberdefensemagazine.com – Author: News team It’s common knowledge in the cybersecurity industry that ransomware is on the rise, with median demands rising 20% year-over-year across virtually all industries. But it’s not only the ransom sums themselves that are escalating; threat actors are engaging in increasingly aggressive tactics and techniques to extort their victims. It’s […]

La entrada Ransomware Tactics Are Shifting. Here’s How to Keep Up – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

https://ciso2ciso.com/ransomware-tactics-are-shifting-heres-how-to-keep-up-sourc


French Advisory Sheds Light on Apple Spyware Activity – Source: www.darkreading.com

07:04 - 13/09/2025
  View item as page

Source: www.darkreading.com – Author: Rob Wright CERT-FR’s advisory follows last month’s disclosure of a zero-day flaw Apple said was used in “sophisticated” attacks against targeted individuals. Original Post URL: https://www.darkreading.com/vulnerabilities-threats/french-sheds-light-apple-spyware-activity Category & Tags: – Views: 4

La entrada French Advisory Sheds Light on Apple Spyware Activity – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

https://ciso2ciso.com/french-advisory-sheds-light-on-apple-spyware-activity-sour


Without Federal Help, Cyber Defense Is Up to the Rest of Us – Source: www.darkreading.com

07:04 - 13/09/2025
  View item as page

Source: www.darkreading.com – Author: Riaz Lakhani Together, we can foster a culture of collaboration and vigilance, ensuring that we are not just waiting for a hero to save us, but actively working to protect ourselves and our communities. Original Post URL: https://www.darkreading.com/cyberattacks-data-breaches/without-federal-help-cyber-defense-cisa Category & Tags: – Views: 6

La entrada Without Federal Help, Cyber Defense Is Up to the Rest of Us – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

https://ciso2ciso.com/without-federal-help-cyber-defense-is-up-to-the-rest-of-us


Safer Conversational AI for Cybersecurity: The BIX Approach – Source: securityboulevard.com

06:04 - 13/09/2025
  View item as page

Source: securityboulevard.com – Author: Gaurav Banga Here’s a scenario security teams increasingly face. A user—or an attacker pretending to be one—types something like: This is how many prompt injection attempts begin. The phrase looks harmless, but it’s a red flag: the user is telling the AI to forget its built‐in rules. What follows is often […]

La entrada Safer Conversational AI for Cybersecurity: The BIX Approach – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

https://ciso2ciso.com/safer-conversational-ai-for-cybersecurity-the-bix-approach


Operation Eastwood: Measuring the Real Impact on NoName057(16) – Source: securityboulevard.com

06:04 - 13/09/2025
  View item as page

Source: securityboulevard.com – Author: Sofia Naer Introduction On July 16, 2025, Europol revealed the details of Operation Eastwood, a coordinated international strike against one of the most active pro-Russian cybercrime groups, NoName057(016). The announcement promised a major disruption to the group’s activities. In this blog, we explore whether Operation Eastwood had any real impact on […]

La entrada Operation Eastwood: Measuring the Real Impact on NoName057(16) – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

https://ciso2ciso.com/operation-eastwood-measuring-the-real-impact-on-noname0571


Hackread.com

Microsoft Limits IE Mode in Edge After Chakra Zero-Day Activity Detected

14:03 - 14/10/2025
  View item as page
Microsoft restricted access to Edge's IE Mode in August 2025 after hackers used a Chakra zero-day flaw to bypass security and take over user devices. Check out the new steps for enabling IE Mode.

https://hackread.com/microsoft-limits-ie-mode-edge-chakra-zero-day/




From Prompts to Protocols: How Agentic Systems, MCP, Vibe Coding, and Schema-Aware Tools Are Rewiring Software Engineering

12:52 - 14/10/2025
  View item as page
Modern software engineering faces growing complexity across codebases, environments, and workflows. Traditional tools, although effective, rely heavily on…

https://hackread.com/agentic-systems-mcp-vibe-coding-schema-software-engineering


Police Bust GXC Team, One of the Most Active Cybercrime Networks

12:20 - 14/10/2025
  View item as page
Spanish Guardia Civil and Group-IB arrest 'GoogleXcoder,' the 25-year-old Brazilian mastermind of the GXC Team, for selling AI-powered phishing kits and malware used to steal millions from banks across the US, UK, Spain, and Brazil.

https://hackread.com/police-bust-gxc-team-cybercrime-networks/


How Top SOCs Stay Up-to-Date on Current Threat Landscape

10:44 - 14/10/2025
  View item as page
Disclosure: This article was provided by ANY.RUN. The information and analysis presented are based on their research and findings.

https://hackread.com/how-top-socs-up-to-date-current-threat-landscape/


Astaroth Trojan Uses GitHub Images to Stay Active After Takedowns

09:54 - 14/10/2025
  View item as page
Astaroth banking trojan has evolved to use GitHub and steganography for resilient C2, hiding its vital commands in images. Learn how this sophisticated malware employs fileless techniques to steal banking and crypto credentials from users across Latin America.

https://hackread.com/astaroth-trojan-github-images-active-takedowns/



ShinyHunters Leak Data from Qantas, Vietnam Airlines and Other Major Firms

17:04 - 13/10/2025
  View item as page
ShinyHunters and its affiliate hackers have leaked data from 6 firms, including Qantas and Vietnam Airlines, after claiming to breach 39 companies via a Salesforce vulnerability.

https://hackread.com/shinyhunters-leak-data-qantas-vietnam-airlines-others/


OpenAI’s Guardrails Can Be Bypassed by Simple Prompt Injection Attack

15:15 - 13/10/2025
  View item as page
Just weeks after its release, OpenAI’s Guardrails system was quickly bypassed by researchers. Read how simple prompt injection attacks fooled the system’s AI judges and exposed an ongoing security concern for OpenAI.

https://hackread.com/openai-guardrails-bypass-prompt-injection-attack/


Vuldb

CVE-2025-11160 | WPBakery Page Builder Plugin up to 8.6.1 on WordPress Custom JS cross site scripting

20:43 - 14/10/2025
  View item as page
A vulnerability was found in WPBakery Page Builder Plugin up to 8.6.1 on WordPress. It has been declared as problematic. Affected by this issue is some unknown functionality of the component Custom JS Module. Executing manipulation can lead to cross site scripting. This vulnerability is handled as CVE-2025-11160. The attack can be executed remotely. There is not any exploit available.

https://vuldb.com/?id.328517


CVE-2025-11161 | WPBakery Page Builder Plugin up to 8.6.1 on WordPress vc_custom_heading font_container cross site scripting

20:42 - 14/10/2025
  View item as page
A vulnerability was found in WPBakery Page Builder Plugin up to 8.6.1 on WordPress. It has been classified as problematic. Affected by this vulnerability is the function vc_custom_heading. Performing manipulation of the argument font_container results in cross site scripting. This vulnerability is known as CVE-2025-11161. Remote exploitation of the attack is possible. No exploit is available.

https://vuldb.com/?id.328516


CVE-2025-8561 | Ova Advent Plugin up to 1.1.7 on WordPress Shortcode cross site scripting

20:42 - 14/10/2025
  View item as page
A vulnerability was found in Ova Advent Plugin up to 1.1.7 on WordPress and classified as problematic. Affected is an unknown function of the component Shortcode Handler. Such manipulation leads to cross site scripting. This vulnerability is traded as CVE-2025-8561. The attack may be launched remotely. There is no exploit available.

https://vuldb.com/?id.328515


CVE-2025-11176 | Quick Featured Images Plugin up to 13.7.2 on WordPress qfi_set_thumbnail resource injection

20:42 - 14/10/2025
  View item as page
A vulnerability has been found in Quick Featured Images Plugin up to 13.7.2 on WordPress and classified as problematic. This impacts the function qfi_set_thumbnail. This manipulation causes improper control of resource identifiers. This vulnerability appears as CVE-2025-11176. The attack may be initiated remotely. There is no available exploit.

https://vuldb.com/?id.328514


CVE-2025-60535 | Wallos 4.1.1 GET Request currency cross-site request forgery

20:41 - 14/10/2025
  View item as page
A vulnerability, which was classified as problematic, was found in Wallos 4.1.1. This affects an unknown function of the file /endpoints/currency/currency of the component GET Request Handler. The manipulation results in cross-site request forgery. This vulnerability is reported as CVE-2025-60535. The attack can be launched remotely. No exploit exists.

https://vuldb.com/?id.328513


CVE-2025-54603 | Claroty Secure Access up to 4.0.2 improper authentication

20:40 - 14/10/2025
  View item as page
A vulnerability, which was classified as critical, has been found in Claroty Secure Access up to 4.0.2. The impacted element is an unknown function. The manipulation leads to improper authentication. This vulnerability is documented as CVE-2025-54603. The attack requires being on the local network. There is not any exploit available.

https://vuldb.com/?id.328512


CVE-2025-60537 | kafka-ui 0.6.0/0.7.2 CustomSerdeLoader.java input validation

20:40 - 14/10/2025
  View item as page
A vulnerability classified as problematic was found in kafka-ui 0.6.0/0.7.2. The affected element is an unknown function of the file /kafka/ui/serdes/CustomSerdeLoader.java. Executing manipulation can lead to improper input validation. This vulnerability is registered as CVE-2025-60537. The attack requires access to the local network. No exploit is available.

https://vuldb.com/?id.328511


CVE-2025-60536 | kafka-ui up to 0.7.2 Configure New Cluster Interface denial of service

20:40 - 14/10/2025
  View item as page
A vulnerability classified as problematic has been found in kafka-ui up to 0.7.2. Impacted is an unknown function of the component Configure New Cluster Interface. Performing manipulation results in denial of service. This vulnerability is cataloged as CVE-2025-60536. It is possible to initiate the attack remotely. There is no exploit available.

https://vuldb.com/?id.328510


CVE-2025-57563 | Starnet FastX up to 4.1.51 path traversal

20:39 - 14/10/2025
  View item as page
A vulnerability described as critical has been identified in Starnet FastX up to 4.1.51. This issue affects some unknown processing. Such manipulation leads to path traversal. This vulnerability is listed as CVE-2025-57563. The attack may be performed from remote. There is no available exploit.

https://vuldb.com/?id.328509


CVE-2025-8459 | Centreon Infra Monitoring up to 23.10.27/24.04.17/24.10.12 Monitoring Recurrent Downtime Scheduler cross site scripting

20:39 - 14/10/2025
  View item as page
A vulnerability marked as problematic has been reported in Centreon Infra Monitoring up to 23.10.27/24.04.17/24.10.12. This vulnerability affects unknown code of the component Monitoring Recurrent Downtime Scheduler Module. This manipulation causes cross site scripting. This vulnerability is tracked as CVE-2025-8459. The attack is possible to be carried out remotely. No exploit exists. It is suggested to upgrade the affected component.

https://vuldb.com/?id.328508


Debian.org/security











Microsoft Security

CVE-2025-47989 Azure Connected Machine Agent Elevation of Privilege Vulnerability

07:00 - 14/10/2025
  View item as page
Improper access control in Azure Connected Machine Agent allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47989


CVE-2025-48004 Microsoft Brokering File System Elevation of Privilege Vulnerability

07:00 - 14/10/2025
  View item as page
Use after free in Microsoft Brokering File System allows an unauthorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48004


CVE-2025-50174 Windows Device Association Broker Service Elevation of Privilege Vulnerability

07:00 - 14/10/2025
  View item as page
Use after free in Windows Device Association Broker service allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50174


CVE-2025-53782 Microsoft Exchange Server Elevation of Privilege Vulnerability

07:00 - 14/10/2025
  View item as page
Incorrect implementation of authentication algorithm in Microsoft Exchange Server allows an unauthorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53782


CVE-2025-55247 .NET Elevation of Privilege Vulnerability

07:00 - 14/10/2025
  View item as page
Improper link resolution before file access ('link following') in .NET allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55247


CVE-2025-24990 Windows Agere Modem Driver Elevation of Privilege Vulnerability

07:00 - 14/10/2025
  View item as page
Microsoft is aware of vulnerabilities in the third party Agere Modem driver that ships natively with supported Windows operating systems. This is an announcement of the upcoming removal of ltmdm64.sys driver. The driver has been removed in the October cumulative update. **Fax modem hardware dependent on this specific driver will no longer work on Windows.** Microsoft recommends removing any existing dependencies on this hardware.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24990


CVE-2025-24052 Windows Agere Modem Driver Elevation of Privilege Vulnerability

07:00 - 14/10/2025
  View item as page
Microsoft is aware of vulnerabilities in the third party Agere Modem driver that ships natively with supported Windows operating systems. This is an announcement of the upcoming removal of ltmdm64.sys driver. The driver has been removed in the October cumulative update. **Fax modem hardware dependent on this specific driver will no longer work on Windows.** Microsoft recommends removing any existing dependencies on this hardware.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24052


CVE-2025-55320 Configuration Manager Elevation of Privilege Vulnerability

07:00 - 14/10/2025
  View item as page
Improper neutralization of special elements used in an sql command ('sql injection') in Microsoft Configuration Manager allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55320


CVE-2025-55325 Windows Storage Management Provider Information Disclosure Vulnerability

07:00 - 14/10/2025
  View item as page
Buffer over-read in Windows Storage Management Provider allows an authorized attacker to disclose information locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55325


CVE-2025-55333 Windows BitLocker Security Feature Bypass Vulnerability

07:00 - 14/10/2025
  View item as page
Incomplete comparison with missing factors in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55333


advisories.ncsc.nl

NCSC-2025-0316 [1.00] [M/H] Kwetsbaarheid verholpen in Microsoft SQL Server

18:52 - 14/10/2025
  View item as page
Microsoft heeft een kwetsbaarheid verholpen in de JDBC-driver voor SQL Server. Een kwaadwillende kan de kwetsbaarheid misbruiken om middels een Server-in-the-Middle-aanval toegang te krijgen tot gevoelige gegevens, zoals inloggegevens. Voor succesvol misbruik moet de kwaadwillende het slachtoffer misleiden verbinding te maken met een SQL-server onder controle van de kwaadwillende.

https://advisories.ncsc.nl/advisory?id=NCSC-2025-0316


NCSC-2025-0315 [1.00] [M/H] Kwetsbaarheden verholpen in Microsoft Office

18:38 - 14/10/2025
  View item as page
Microsoft heeft kwetsbaarheden verholpen in diverse Office producten. Een kwaadwillende kan de kwetsbaarheden misbruiken om een Denial-of-Service te veroorzaken, willekeurige code uit te voeren met rechten van het slachtoffer, of toegang te krijgen tot gevoelige gegevens in de context van het slachtoffer. Voor succesvol misbruik moet de kwaadwillende het slachtoffer misleiden een malafide bestand te openen, of link te volgen. ``` Microsoft Office SharePoint: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59228 | 8.80 | Uitvoeren van willekeurige code | | CVE-2025-59237 | 8.80 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Microsoft Office Word: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59221 | 7.00 | Uitvoeren van willekeurige code | | CVE-2025-59222 | 7.80 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Microsoft Office Visio: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59226 | 7.80 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Microsoft Office PowerPoint: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59238 | 7.80 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Microsoft Office: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59234 | 7.80 | Uitvoeren van willekeurige code | | CVE-2025-59227 | 7.80 | Uitvoeren van willekeurige code | | CVE-2025-59229 | 5.50 | Denial-of-Service | |----------------|------|-------------------------------------| Microsoft Office Excel: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59231 | 7.80 | Uitvoeren van willekeurige code | | CVE-2025-59233 | 7.80 | Uitvoeren van willekeurige code | | CVE-2025-59235 | 7.10 | Toegang tot gevoelige gegevens | | CVE-2025-59236 | 8.40 | Uitvoeren van willekeurige code | | CVE-2025-59243 | 7.80 | Uitvoeren van willekeurige code | | CVE-2025-59223 | 7.80 | Uitvoeren van willekeurige code | | CVE-2025-59224 | 7.80 | Uitvoeren van willekeurige code | | CVE-2025-59225 | 7.80 | Uitvoeren van willekeurige code | | CVE-2025-59232 | 7.10 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| ```

https://advisories.ncsc.nl/advisory?id=NCSC-2025-0315


NCSC-2025-0314 [1.00] [M/H] Kwetsbaarheden verholpen in Microsoft System Center

18:27 - 14/10/2025
  View item as page
Microsoft heeft kwetsbaarheden verholpen in System Center Configuration Manager. Een kwaadwillende kan de kwetsbaarheden misbruiken om zich verhoogde rechten toe te kennen en daarmee mogelijk toegang krijgen tot gevoelige gegevens of willekeurige code uit te voeren met verhoogde rechten. Voor succesvol misbruik moet de kwaadwillende over voorafgaande authenticatie beschikken, of lokale toegang hebben tot het kwetsbare systeem. Voor lokaal misbruik is géén voorafgaande authenticatie benodigd.

https://advisories.ncsc.nl/advisory?id=NCSC-2025-0314


NCSC-2025-0313 [1.00] [M/H] Kwetsbaarheden verholpen in Microsoft Developer Tools

18:21 - 14/10/2025
  View item as page
Microsoft heeft kwetsbaarheden verholpen in diverse Developer Tools. Een kwaadwillende kan de kwetsbaarheden misbruiken om zich verhoogde rechten toe te kennen, beveiligingsmaatregelen te omzeilen en toegang te krijgen tot gevoelige gegevens. De ernstigste kwetsbaarheid heeft kenmerk CVE-2025-55315 toegewezen gekregen en bevindt zich in ASP .NET core. Een kwaadwillende kan de kwetsbaarheid misbruiken om middels http-request smuggling beveiligingsmaatregelen te omzeilen en zo toegang te krijgen tot gevoelige gegevens in de scope van de applicaties draaiend op de kwetsbare .NET core software. ``` .NET, .NET Framework, Visual Studio: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55248 | 4.80 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| Visual Studio: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-54132 | 4.40 | Toegang tot gevoelige gegevens | | CVE-2025-55240 | 7.30 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Microsoft PowerShell: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-25004 | 7.30 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| ASP.NET Core: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55315 | 9.90 | Omzeilen van beveiligingsmaatregel | |----------------|------|-------------------------------------| .NET: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55247 | 7.30 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| ```

https://advisories.ncsc.nl/advisory?id=NCSC-2025-0313


NCSC-2025-0312 [1.00] [M/H] Kwetsbaarheden verholpen in Microsoft Exchange

18:16 - 14/10/2025
  View item as page
Microsoft heeft kwetsbaarheden verholpen in Exchange Server. Een kwaadwillende kan de kwetsbaarheden misbruiken om zich voor te doen als andere gebruiker en zich verhoogde rechten toe te kennen. Voor succesvol misbruik moet de kwaadwillende over voorafgaande authenticatie beschikken.

https://advisories.ncsc.nl/advisory?id=NCSC-2025-0312


NCSC-2025-0311 [1.00] [M/H] Kwetsbaarheden verholpen in Microsoft Azure

18:13 - 14/10/2025
  View item as page
Microsoft heeft kwetsbaarheden verholpen in diverse Azure componenten. Een kwaadwillende kan de kwetsbaarheden misbruiken om zich voor te doen als andere gebruiker en zich mogelijk verhoogde rechten toe te kennen, om zo toegang te krijgen tot gevoelige gegevens of willekeurige code uit te voeren met verhoogde rechten. De ernstigste kwetsbaarheden bevinden zich in Azure Entra ID en stellen een kwaadwillende in staat om zich verhoogde rechten toe te kennen. Deze kwetsbaarheden bevinden zich in een centrale component van Azure en zijn inmiddels verholpen. Voor deze kwetsbaarheden is verder geen actie benodigd en deze zijn opgenomen ter informatie. ``` Azure Connected Machine Agent: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-47989 | 7.00 | Verkrijgen van verhoogde rechten | | CVE-2025-58724 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Azure Entra ID: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59218 | 9.60 | Verkrijgen van verhoogde rechten | | CVE-2025-59246 | 9.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Redis Enterprise: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59271 | 8.70 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Confidential Azure Container Instances: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59291 | 8.20 | Verkrijgen van verhoogde rechten | | CVE-2025-59292 | 8.20 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Azure Monitor Agent: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59494 | 7.80 | Verkrijgen van verhoogde rechten | | CVE-2025-59285 | 7.00 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Azure PlayFab: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59247 | 8.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Azure Monitor: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55321 | 8.70 | Voordoen als andere gebruiker | |----------------|------|-------------------------------------| ```

https://advisories.ncsc.nl/advisory?id=NCSC-2025-0311


NCSC-2025-0310 [1.00] [M/H] Kwetsbaarheden verholpen in Microsoft Windows

18:03 - 14/10/2025
  View item as page
Microsoft heeft kwetsbaarheden verholpen in Windows. Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade: - Denial-of-Service - Omzeilen van een beveiligingsmaatregel - Manipulatie van gegevens - Uitvoeren van willekeurige code (gebruikersrechten) - Uitvoeren van willekeurige code (root/adminrechten) - Toegang tot gevoelige gegevens - Verkrijgen van verhoogde rechten - Spoofing De ernstigste kwetsbaarheden hebben de kenmerken CVE-2025-49708 en CVE-2025-59287 toegewezen gekregen. De kwetsbaarheid met kenmerk CVE-2025-49708 bevindt zich in de Graphics Component en stelt een kwaadwillende in staat om uit een Virtual Machine (VM) te breken en acties uit te voeren op de onderliggende Host. De kwetsbaarheid met kenmerk CVE-2025-59287 bevindt zich in de Windows Server Update Servce (WSUS) en stelt een kwaadwillende in staat om op afstand willekeurige code uit te voeren op het kwetsbare systeem. Van de kwetsbaarheid met kenmerk CVE-2025-59230 meldt Microsoft informatie te hebben dat deze actief is misbruikt op verouderde systemen. De kwetsbaarheid bevindt zich in de Remote Access Connection Manager stelt een lokale, geauthenticeerde kwaadwillende in staat om zich SYSTEM-rechten toe te kennen en zo mogelijk willekeurige code uit te voeren als SYSTEM ``` Windows Confidential Virtual Machines (CVM): |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-48813 | 6.30 | Voordoen als andere gebruiker | |----------------|------|-------------------------------------| Windows Resilient File System (ReFS): |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55687 | 7.40 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows DirectX: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55678 | 7.00 | Verkrijgen van verhoogde rechten | | CVE-2025-55698 | 7.70 | Denial-of-Service | |----------------|------|-------------------------------------| Windows DWM: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55681 | 7.00 | Verkrijgen van verhoogde rechten | | CVE-2025-58722 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Xbox: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-53768 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Kernel: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59186 | 5.50 | Toegang tot gevoelige gegevens | | CVE-2025-59207 | 7.80 | Verkrijgen van verhoogde rechten | | CVE-2025-50152 | 7.80 | Verkrijgen van verhoogde rechten | | CVE-2025-55334 | 6.20 | Omzeilen van beveiligingsmaatregel | | CVE-2025-55679 | 5.10 | Toegang tot gevoelige gegevens | | CVE-2025-55683 | 5.50 | Toegang tot gevoelige gegevens | | CVE-2025-55693 | 7.40 | Verkrijgen van verhoogde rechten | | CVE-2025-55699 | 5.50 | Toegang tot gevoelige gegevens | | CVE-2025-59187 | 7.80 | Verkrijgen van verhoogde rechten | | CVE-2025-59194 | 7.00 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Routing and Remote Access Service (RRAS): |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55700 | 6.50 | Toegang tot gevoelige gegevens | | CVE-2025-58717 | 6.50 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| Inbox COM Objects: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-58732 | 7.00 | Uitvoeren van willekeurige code | | CVE-2025-58735 | 7.00 | Uitvoeren van willekeurige code | | CVE-2025-59282 | 7.00 | Uitvoeren van willekeurige code | | CVE-2025-58730 | 7.00 | Uitvoeren van willekeurige code | | CVE-2025-58731 | 7.00 | Uitvoeren van willekeurige code | | CVE-2025-58733 | 7.00 | Uitvoeren van willekeurige code | | CVE-2025-58734 | 7.00 | Uitvoeren van willekeurige code | | CVE-2025-58736 | 7.00 | Uitvoeren van willekeurige code | | CVE-2025-58738 | 7.00 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Agere Windows Modem Driver: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-24990 | 7.80 | Verkrijgen van verhoogde rechten | | CVE-2025-24052 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Active Directory Federation Services: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59258 | 6.20 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| Windows Push Notification Core: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59211 | 5.50 | Toegang tot gevoelige gegevens | | CVE-2025-59209 | 5.50 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| Windows Authentication Methods: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59277 | 7.80 | Verkrijgen van verhoogde rechten | | CVE-2025-59275 | 7.80 | Verkrijgen van verhoogde rechten | | CVE-2025-59278 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows File Explorer: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-58739 | 6.50 | Voordoen als andere gebruiker | | CVE-2025-59214 | 6.50 | Voordoen als andere gebruiker | |----------------|------|-------------------------------------| Data Sharing Service Client: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59200 | 7.70 | Voordoen als andere gebruiker | |----------------|------|-------------------------------------| Windows Hyper-V: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55328 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows NTFS: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55335 | 7.40 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows ETL Channel: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59197 | 5.50 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| Microsoft Failover Cluster Virtual Driver: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59260 | 5.50 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| Windows Server Update Service: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59287 | 9.80 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Microsoft Windows Speech: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-58715 | 8.80 | Verkrijgen van verhoogde rechten | | CVE-2025-58716 | 8.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows NTLM: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59284 | 3.30 | Voordoen als andere gebruiker | |----------------|------|-------------------------------------| Windows COM: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-58725 | 7.00 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Network Connection Status Indicator (NCSI): |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59201 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| TCG TPM2.0: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-2884 | 5.30 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| Windows MapUrlToZone: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59208 | 7.10 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| Internet Explorer: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59295 | 8.80 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Windows Core Shell: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59185 | 6.50 | Voordoen als andere gebruiker | | CVE-2025-59244 | 6.50 | Voordoen als andere gebruiker | |----------------|------|-------------------------------------| Windows SMB Server: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-58726 | 7.50 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Remote Access Connection Manager: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59230 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows PrintWorkflowUserSvc: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55685 | 7.00 | Verkrijgen van verhoogde rechten | | CVE-2025-55686 | 7.00 | Verkrijgen van verhoogde rechten | | CVE-2025-55689 | 7.00 | Verkrijgen van verhoogde rechten | | CVE-2025-55331 | 7.00 | Verkrijgen van verhoogde rechten | | CVE-2025-55684 | 7.00 | Verkrijgen van verhoogde rechten | | CVE-2025-55688 | 7.00 | Verkrijgen van verhoogde rechten | | CVE-2025-55690 | 7.00 | Verkrijgen van verhoogde rechten | | CVE-2025-55691 | 7.00 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Taskbar Live: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59294 | 2.10 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| Windows BitLocker: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55333 | 6.10 | Omzeilen van beveiligingsmaatregel | | CVE-2025-55338 | 6.10 | Omzeilen van beveiligingsmaatregel | | CVE-2025-55330 | 6.10 | Omzeilen van beveiligingsmaatregel | | CVE-2025-55332 | 6.10 | Omzeilen van beveiligingsmaatregel | | CVE-2025-55337 | 6.10 | Omzeilen van beveiligingsmaatregel | | CVE-2025-55682 | 6.10 | Omzeilen van beveiligingsmaatregel | |----------------|------|-------------------------------------| NtQueryInformation Token function (ntifs.h): |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55696 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows USB Video Driver: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55676 | 5.50 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| Windows Ancillary Function Driver for WinSock: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59242 | 7.80 | Verkrijgen van verhoogde rechten | | CVE-2025-58714 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Azure Local: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55697 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Local Session Manager (LSM): |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59257 | 6.50 | Denial-of-Service | | CVE-2025-59259 | 6.50 | Denial-of-Service | | CVE-2025-58729 | 6.50 | Denial-of-Service | |----------------|------|-------------------------------------| Windows Resilient File System (ReFS) Deduplication Service: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59206 | 7.40 | Verkrijgen van verhoogde rechten | | CVE-2025-59210 | 7.40 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Virtualization-Based Security (VBS) Enclave: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-53717 | 7.00 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Cloud Files Mini Filter Driver: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55336 | 5.50 | Toegang tot gevoelige gegevens | | CVE-2025-55680 | 8.40 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows WLAN Auto Config Service: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55695 | 5.50 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| Software Protection Platform (SPP): |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59199 | 8.40 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Cryptographic Services: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-58720 | 7.80 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| Remote Desktop Client: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-58718 | 8.80 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Windows StateRepository API: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59203 | 5.50 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| Microsoft Windows Search Component: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59190 | 5.50 | Denial-of-Service | | CVE-2025-59198 | 5.00 | Denial-of-Service | | CVE-2025-59253 | 5.50 | Denial-of-Service | |----------------|------|-------------------------------------| Windows Failover Cluster: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-47979 | 5.50 | Toegang tot gevoelige gegevens | | CVE-2025-59188 | 5.50 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| Windows SMB Client: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59280 | 3.10 | Manipulatie van gegevens | |----------------|------|-------------------------------------| Windows Secure Boot: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-47827 | 4.60 | Omzeilen van beveiligingsmaatregel | |----------------|------|-------------------------------------| Microsoft PowerShell: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-25004 | 7.30 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Microsoft Windows: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55701 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Microsoft Windows Codecs Library: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-54957 | 7.00 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Windows Error Reporting: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55692 | 7.80 | Verkrijgen van verhoogde rechten | | CVE-2025-55694 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows SSDP Service: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59196 | 7.00 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Storport.sys Driver: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59192 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Remote Desktop Protocol: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55340 | 7.00 | Omzeilen van beveiligingsmaatregel | |----------------|------|-------------------------------------| Windows Connected Devices Platform Service: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-58727 | 7.00 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows NDIS: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55339 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Health and Optimized Experiences Service: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59241 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Remote Desktop Services: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59202 | 7.00 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows High Availability Services: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59184 | 5.50 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| Microsoft Brokering File System: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-48004 | 7.40 | Verkrijgen van verhoogde rechten | | CVE-2025-59189 | 7.40 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows DWM Core Library: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59254 | 7.80 | Verkrijgen van verhoogde rechten | | CVE-2025-59255 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Digital Media: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-53150 | 7.80 | Verkrijgen van verhoogde rechten | | CVE-2025-50175 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Hello: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-53139 | 7.70 | Omzeilen van beveiligingsmaatregel | |----------------|------|-------------------------------------| Connected Devices Platform Service (Cdpsvc): |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-58719 | 4.70 | Verkrijgen van verhoogde rechten | | CVE-2025-55326 | 7.50 | Uitvoeren van willekeurige code | | CVE-2025-59191 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Device Association Broker service: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-50174 | 7.00 | Verkrijgen van verhoogde rechten | | CVE-2025-55677 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Bluetooth Service: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-58728 | 7.80 | Verkrijgen van verhoogde rechten | | CVE-2025-59290 | 7.80 | Verkrijgen van verhoogde rechten | | CVE-2025-59289 | 7.00 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Storage Management Provider: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55325 | 5.50 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| Windows Management Services: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59204 | 5.50 | Toegang tot gevoelige gegevens | | CVE-2025-59193 | 7.00 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Remote Desktop: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-58737 | 7.00 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Microsoft Graphics Component: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59195 | 7.00 | Denial-of-Service | | CVE-2025-49708 | 9.90 | Uitvoeren van willekeurige code | | CVE-2016-9535 | 4.00 | Uitvoeren van willekeurige code | | CVE-2025-59205 | 7.00 | Verkrijgen van verhoogde rechten | | CVE-2025-59261 | 7.00 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| ```

https://advisories.ncsc.nl/advisory?id=NCSC-2025-0310


NCSC-2025-0309 [1.00] [M/H] Kwetsbaarheden verholpen in Siemens producten

11:22 - 14/10/2025
  View item as page
Siemens heeft kwetsbaarheden verholpen in diverse producten als SIMATIC, SINEC, SIPLUS en Solid Edge. De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade: - Denial-of-Service (DoS) - Manipulatie van gegevens - Omzeilen van een beveiligingsmaatregel - Omzeilen van authenticatie - (Remote) code execution (root/admin rechten) - Toegang tot systeemgegevens - Verhogen van rechten - Spoofing De kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.

https://advisories.ncsc.nl/advisory?id=NCSC-2025-0309


NCSC-2025-0308 [1.00] [M/H] Kwetsbaarheden verholpen in Juniper Networks Junos Space

08:31 - 13/10/2025
  View item as page
Juniper heeft kwetsbaarheden verholpen in Junos Space (Specifiek voor alle versies prior tot 24.1R4). De kwetsbaarheden bevinden zich in de wijze waarop Juniper Networks Junos Space gebruikersinvoer verwerkt. Aanvallers kunnen kwaadaardige scripts injecteren in verschillende pagina's, zoals de Device Template Definition, Global Search, en andere secties van de interface. Dit kan leiden tot ongeautoriseerde uitvoering van commando's met de rechten van de getroffen gebruiker. Omdat gebruikers in deze context vaak beheersrechten hebben, is niet uitgesloten dat uitvoer van commando's met verhoogde rechten kan plaatsvinden.

https://advisories.ncsc.nl/advisory?id=NCSC-2025-0308


NCSC-2025-0307 [1.00] [M/H] Kwetsbaarheid verholpen in Oracle E-Business Suite

07:52 - 13/10/2025
  View item as page
Oracle heeft een kwetsbaarheid verholpen in de Oracle Configurator component van Oracle E-Business Suite (Specifiek voor versies 12.2.3 tot en met 12.2.14). De kwetsbaarheid bevindt zich in de Oracle Configurator component van Oracle E-Business Suite, specifiek in de versies 12.2.3 tot en met 12.2.14. Deze kwetsbaarheid stelt niet-geauthenticeerde aanvallers in staat om toegang te krijgen tot kritieke gegevens. Dit probleem heeft een CVSS-score van 7.5 gekregen, wat wijst op een significante impact op de vertrouwelijkheid. De kwetsbaarheid kan leiden tot ongeautoriseerde blootstelling van gegevens.

https://advisories.ncsc.nl/advisory?id=NCSC-2025-0307


NCSC Nieuws

28 publieke en private partijen tekenen convenant samenwerking Cyclotron

14:08 - 30/09/2025
  View item as page
Vandaag heeft het NCSC samen met 27 partijen het convenant samenwerking Cyclotron ondertekend op de ONE Conference. De ondertekenaars zijn een groot aantal private partijen en daarnaast ook de AIVD, MIVD, Politie en het NCTV. De ondertekening is een volgende belangrijke stap in de samenwerking met als doel om het beeld op cyberdreigingen en incidenten te versterken door het structureel delen van informatie, het gezamenlijk analyseren van informatie en het verstrekken van informatie uit die analyses aan belanghebbende organisaties. Hiermee wordt de digitale weerbaarheid van Nederland verhoogd.

https://www.ncsc.nl/actueel/nieuws/2025/09/30/28-publieke-en-private-partijen-te


Subsidie voor mkb-bedrijven nog 1 maand beschikbaar

12:29 - 26/09/2025
  View item as page
Voor kleine bedrijven die een financiële drempel ervaren bij het (laten) uitvoeren van cybermaatregelen, is tijdelijk een subsidie beschikbaar: Mijn Cyberweerbare Zaak. Deze subsidie dekt 50% van de kosten van diverse cybermaatregelen, tot een maximum van € 1.250. Kleinere bedrijven met 1 tot en met 50 medewerkers voor wie cybersecurity vaak niet een kerntaak is, kunnen nu met deze subsidie van het ministerie van Economische Zaken de nodige stappen zetten om hun bedrijf beter te beschermen tegen de toenemende cyberdreigingen en eisen die andere bedrijven in de bedrijfsketen stellen.

https://www.ncsc.nl/actueel/nieuws/2025/09/26/subsidie-voor-mkb-bedrijven-nog-1-


Cyberweerbaarheidsnetwerk bouwplan voor stevigere basis van cyberweerbaarheid in het Koninkrijk der Nederlanden

13:25 - 10/09/2025
  View item as page
De cyberweerbaarheid van Nederland is niet langer op te vangen met losse initiatieven. Deze tijd vraagt om één samenhangend netwerk: het Cyberweerbaarheidsnetwerk, kortweg CWN. In het CWN komen publieke en private organisaties samen. Daar brengen ze hun kennis, expertise en ervaring in om gezamenlijk aan opgaven te werken die bijdragen aan de cyberweerbaarheid van alle organisaties in het Koninkrijk der Nederlanden, en daarmee ook de overzeese gebieden. Want alleen samen worden we weerbaarder.

https://www.ncsc.nl/actueel/nieuws/2025/09/10/cyberweerbaarheidsnetwerk-bouwplan


Nieuwe malwarecampagne ontdekt via ManualFinder

10:26 - 29/08/2025
  View item as page
Recentelijk kwam een wereldwijde malwareinfectie van Windows computers aan het licht dankzij software die gebruikers zelf installeerden. Het NCSC adviseert daarom toegang tot de betreffende C2-domeinen te blokkeren, te controleren op de aanwezigheid van de applicaties “Manualfinder”, “PDF-editor” en varianten daarvan, te controleren op de aanwezigheid van JavaScript bestanden met een op een GUID lijkende naam in de directory /AppData/Local/TEMP en om eindgebruikers er met klem op te wijzen om geen externe, onvertrouwde tools te installeren.

https://www.ncsc.nl/actueel/nieuws/2025/08/29/nieuwe-malwarecampagne-ontdekt-via


Nieuwe kwetsbaarheden in Citrix Netscaler ontdekt

18:25 - 26/08/2025
  View item as page
Er zijn nieuwe kwetsbaarheden in Citrix Netscaler ontdekt. Met een eerder gepubliceerd detectiescript van het NCSC kan compromittatie worden gedetecteerd.

https://www.ncsc.nl/actueel/nieuws/2025/08/26/nieuwe-kwetsbaarheden-in-citrix-ne


Eefje Zents Chief Relations Officer/directeur Samenwerking Digitale weerbaarheid bij NCSC

09:30 - 15/08/2025
  View item as page
Eefje Zents wordt met ingang van 15 september 2025 Chief Relations Officer/directeur Samenwerking Digitale weerbaarheid bij het Nationaal Cyber Security Centrum (NCSC) van het ministerie van Justitie en Veiligheid.

https://www.ncsc.nl/actueel/nieuws/2025/08/15/eefje-zents-chief-relations-office


Casus: Citrix kwetsbaarheid (Update 13-08-2025)

11:13 - 13/08/2025
  View item as page
Via deze pagina biedt het NCSC een update op de eerdere berichtgeving. We bieden hierin de publicatie van twee nieuwe checkscripts die voorzien zijn van nieuwe indicators of compromise, aanvullende context waarbij we belichten dat het hier om een geraffineerde aanval gaat waarbij meerdere Nederlandse organisaties succesvol aangevallen zijn. Daarnaast deelt het NCSC aanvullende adviezen in het licht van deze digitale aanval. Hiermee willen we organisaties aansporen en ondersteunen om hun digitale weerbaarheid verder te verhogen en zich op de juiste elementen van digitale veiligheid te richten.

https://www.ncsc.nl/actueel/nieuws/2025/07/22/casus-citrix-kwetsbaarheid


Casus: Microsoft SharePoint Server kwetsbaarheden

16:27 - 23/07/2025
  View item as page
Op deze pagina gaat het NCSC verder in op de recent ontdekte kwetsbaarheden in Microsoft SharePoint Server en bieden we handelingsperspectief in het omgaan met deze kwetsbaarheden.

https://www.ncsc.nl/actueel/nieuws/2025/07/23/casus-microsoft-sharepoint


Laatste update: Kwetsbaarheden in Microsoft SharePoint Server actief misbruikt

12:54 - 22/07/2025
  View item as page
Het NCSC waarschuwt organisaties voor ernstige kwetsbaarheden in Microsoft SharePoint Server. Microsoft heeft inmiddels beveiligingsupdates beschikbaar gesteld voor de kwetsbare systemen. Omdat het NCSC actief misbruik ziet, is het nadrukkelijke advies om de updates zo snel mogelijk te installeren. De kwetsbaarheden in Microsoft SharePoint Server staan los van de kwetsbaarheden in de Citrix-producten waarvoor het NCSC al eerder waarschuwde.

https://www.ncsc.nl/actueel/nieuws/2025/07/20/kwetsbaarheden-in-microsoft-sharep


Informatie over kwetsbaarheden in Citrix NetScaler ADC en NetScaler Gateway

17:19 - 21/07/2025
  View item as page
Het NCSC heeft beveiligingsadviezen uitgebracht ten aanzien van kwetsbaarheden Citrix NetScaler ADC en NetScaler Gateway. Op dit moment is er sprake van actief misbruik, waardoor het NCSC hier opnieuw aandacht voor vraagt. Citrix heeft inmiddels updates beschikbaar gesteld om deze kwetsbaarheden te verhelpen. Het NCSC roept organisaties met klem op om de maatregelen uit de adviezen te volgen en systemen te controleren op compromittatie.

https://www.ncsc.nl/actueel/nieuws/2025/07/21/informatie-over-kwetsbaarheden-in-


wid.cert-bund.de

[UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen

19:59 - 14/10/2025
  View item as page
Ein lokaler Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um Daten zu manipulieren oder einen Denial of Service herbeizuführen.

https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2268


[NEU] [hoch] Veeam Backup & Replication: Mehrere Schwachstellen

11:39 - 14/10/2025
  View item as page
Ein Angreifer kann mehrere Schwachstellen in Veeam Backup & Replication ausnutzen, um beliebigen Programmcode auszuführen und sich erweiterte Berechtigungen zu verschaffen.

https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2274


[UPDATE] [hoch] LibTiff: Schwachstelle ermöglicht Codeausführung

11:24 - 14/10/2025
  View item as page
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in LibTiff ausnutzen, um einen Code auszuführen.

https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2110


[UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen

11:24 - 14/10/2025
  View item as page
Ein entfernter Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuführen und nicht näher spezifizierte Auswirkungen zu erzielen.

https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1417



[UPDATE] [hoch] Linux UDisks Daemon: Schwachstelle ermöglicht Privilegieneskalation

11:24 - 14/10/2025
  View item as page
Ein lokaler Angreifer kann eine Schwachstelle im Linux UDisks Daemon ausnutzen, um seine Privilegien zu erhöhen oder einen Denial of Service herbeizuführen.

https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1928


[UPDATE] [hoch] Podman: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen

11:24 - 14/10/2025
  View item as page
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Podman ausnutzen, um Sicherheitsvorkehrungen zu umgehen.

https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1389


[UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen

11:24 - 14/10/2025
  View item as page
Ein lokaler Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuführen oder einen unspezifischen Angriff durchzuführen.

https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3368


[UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen

11:24 - 14/10/2025
  View item as page
Ein Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuführen oder andere nicht spezifizierte Angriffe durchzuführen.

https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1665


[UPDATE] [hoch] bluez: Schwachstelle ermöglicht Codeausführung

11:24 - 14/10/2025
  View item as page
Ein Angreifer in Funk-Reichweite kann eine Schwachstelle in bluez ausnutzen, um beliebigen Programmcode auszuführen.

https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-3086


cert.ssi.gouv.fr

Multiples vulnérabilités dans les produits Mattermost (17 septembre 2025)

00:00 - 17/09/2025
  View item as page
De multiples vulnérabilités ont été découvertes dans les produits Mattermost. Elles permettent à un attaquant de provoquer un déni de service à distance et un problème de sécurité non spécifié par l'éditeur.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0801/


Multiples vulnérabilités dans les produits VMware (30 septembre 2025)

00:00 - 30/09/2025
  View item as page
De multiples vulnérabilités ont été découvertes dans les produits VMware. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0832/


Multiples vulnérabilités dans Joomla! (01 octobre 2025)

00:00 - 01/10/2025
  View item as page
De multiples vulnérabilités ont été découvertes dans Joomla!. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données et une injection de code indirecte à distance (XSS).

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0833/


Multiples vulnérabilités dans Mozilla Firefox (01 octobre 2025)

00:00 - 01/10/2025
  View item as page
De multiples vulnérabilités ont été découvertes dans Mozilla Firefox. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, un contournement de la politique de sécurité et un problème de sécurité non spécifié par l'éditeur.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0834/


Multiples vulnérabilités dans OpenSSL (01 octobre 2025)

00:00 - 01/10/2025
  View item as page
De multiples vulnérabilités ont été découvertes dans OpenSSL. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0835/


Multiples vulnérabilités dans les produits Tenable (01 octobre 2025)

00:00 - 01/10/2025
  View item as page
De multiples vulnérabilités ont été découvertes dans Tenable Security Center. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un contournement de la politique de sécurité.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0836/


Multiples vulnérabilités dans Google Chrome (02 octobre 2025)

00:00 - 02/10/2025
  View item as page
De multiples vulnérabilités ont été découvertes dans Google Chrome. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données et un problème de sécurité non spécifié par l'éditeur.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0837/


Multiples vulnérabilités dans les produits Splunk (02 octobre 2025)

00:00 - 02/10/2025
  View item as page
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0838/


Multiples vulnérabilités dans Microsoft Edge (03 octobre 2025)

00:00 - 03/10/2025
  View item as page
De multiples vulnérabilités ont été découvertes dans Microsoft Edge. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données et un problème de sécurité non spécifié par l'éditeur.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0839/


Multiples vulnérabilités dans Zabbix (03 octobre 2025)

00:00 - 03/10/2025
  View item as page
De multiples vulnérabilités ont été découvertes dans Zabbix. Elles permettent à un attaquant de provoquer une élévation de privilèges et une atteinte à la confidentialité des données.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0840/


theHackerNews

Chinese Hackers Exploit ArcGIS Server as Backdoor for Over a Year

22:25 - 14/10/2025
  View item as page
Threat actors with ties to China have been attributed to a novel campaign that compromised an ArcGIS system and turned it into a backdoor for more than a year. The activity, per ReliaQuest, is the handiwork of a Chinese state-sponsored hacking group called Flax Typhoon, which is also tracked as Ethereal Panda and RedJuliett. According to the U.S. government, it's assessed to be a publicly-traded

https://thehackernews.com/2025/10/chinese-hackers-exploit-arcgis-server.html


Moving Beyond Awareness: How Threat Hunting Builds Readiness

17:25 - 14/10/2025
  View item as page
Every October brings a familiar rhythm - pumpkin-spice everything in stores and cafés, alongside a wave of reminders, webinars, and checklists in my inbox. Halloween may be just around the corner, yet for those of us in cybersecurity, Security Awareness Month is the true seasonal milestone. Make no mistake, as a security professional, I love this month. Launched by CISA and the National

https://thehackernews.com/2025/10/moving-beyond-awareness-how-threat.html


RMPocalypse: Single 8-Byte Write Shatters AMD’s SEV-SNP Confidential Computing

17:15 - 14/10/2025
  View item as page
Chipmaker AMD has released fixes to address a security flaw dubbed RMPocalypse that could be exploited to undermine confidential computing guarantees provided by Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). The attack, per ETH Zürich researchers Benedict Schlüter and Shweta Shinde, exploits AMD's incomplete protections that make it possible to perform a single memory

https://thehackernews.com/2025/10/rmpocalypse-single-8-byte-write.html


New Pixnapping Android Flaw Lets Rogue Apps Steal 2FA Codes Without Permissions

16:48 - 14/10/2025
  View item as page
Android devices from Google and Samsung have been found vulnerable to a side-channel attack that could be exploited to covertly steal two-factor authentication (2FA) codes, Google Maps timelines, and other sensitive data without the users' knowledge pixel-by-pixel. The attack has been codenamed Pixnapping by a group of academics from the University of California (Berkeley), University of

https://thehackernews.com/2025/10/new-pixnapping-android-flaw-lets-rogue.html


What AI Reveals About Web Applications— and Why It Matters

16:30 - 14/10/2025
  View item as page
Before an attacker ever sends a payload, they’ve already done the work of understanding how your environment is built. They look at your login flows, your JavaScript files, your error messages, your API documentation, your GitHub repos. These are all clues that help them understand how your systems behave. AI is significantly accelerating reconnaissance and enabling attackers to map your

https://thehackernews.com/2025/10/what-ai-reveals-about-web-applications.html


npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels

12:39 - 14/10/2025
  View item as page
Cybersecurity researchers have identified several malicious packages across npm, Python, and Ruby ecosystems that leverage Discord as a command-and-control (C2) channel to transmit stolen data to actor-controlled webhooks. Webhooks on Discord are a way to post messages to channels in the platform without requiring a bot user or authentication, making them an attractive mechanism for attackers to

https://thehackernews.com/2025/10/npm-pypi-and-rubygems-packages-found.html


Researchers Expose TA585’s MonsterV2 Malware Capabilities and Attack Chain

10:58 - 14/10/2025
  View item as page
Cybersecurity researchers have shed light on a previously undocumented threat actor called TA585 that has been observed delivering an off-the-shelf malware called MonsterV2 via phishing campaigns. The Proofpoint Threat Research Team described the threat activity cluster as sophisticated, leveraging web injections and filtering checks as part of its attack chains. "TA585 is notable because it

https://thehackernews.com/2025/10/researchers-expose-ta585s-monsterv2.html


⚡ Weekly Recap: WhatsApp Worm, Critical CVEs, Oracle 0-Day, Ransomware Cartel & More

18:48 - 13/10/2025
  View item as page
Every week, the cyber world reminds us that silence doesn’t mean safety. Attacks often begin quietly — one unpatched flaw, one overlooked credential, one backup left unencrypted. By the time alarms sound, the damage is done. This week’s edition looks at how attackers are changing the game — linking different flaws, working together across borders, and even turning trusted tools into weapons.

https://thehackernews.com/2025/10/weekly-recap-whatsapp-worm-critical.html


Why Unmonitored JavaScript Is Your Biggest Holiday Security Risk

17:20 - 13/10/2025
  View item as page
Think your WAF has you covered? Think again. This holiday season, unmonitored JavaScript is a critical oversight allowing attackers to steal payment data while your WAF and intrusion detection systems see nothing. With the 2025 shopping season weeks away, visibility gaps must close now. Get the complete Holiday Season Security Playbook here. Bottom Line Up Front The 2024 holiday season saw major

https://thehackernews.com/2025/10/why-unmonitored-javascript-is-your.html


Researchers Warn RondoDox Botnet is Weaponizing Over 50 Flaws Across 30+ Vendors

15:42 - 13/10/2025
  View item as page
Malware campaigns distributing the RondoDox botnet have expanded their targeting focus to exploit more than 50 vulnerabilities across over 30 vendors. The activity, described as akin to an "exploit shotgun" approach, has singled out a wide range of internet-exposed infrastructure, including routers, digital video recorders (DVRs), network video recorders (NVRs), CCTV systems, web servers, and

https://thehackernews.com/2025/10/researchers-warn-rondodox-botnet-is.html


Techrepublic

CamoLeak: GitHub Copilot Flaw Allowed Silent Data Theft

15:34 - 14/10/2025
  View item as page

A GitHub Copilot Chat bug let attackers steal private code via prompt injection. Learn how CamoLeak worked and how to defend against AI risks.

The post CamoLeak: GitHub Copilot Flaw Allowed Silent Data Theft appeared first on TechRepublic.

https://www.techrepublic.com/article/news-github-copilot-data-theft/


Critical Oracle EBS Flaw Could Expose Sensitive Data

21:40 - 13/10/2025
  View item as page

Oracle patches a high-severity EBS flaw that could let attackers bypass authentication and access sensitive enterprise data.

The post Critical Oracle EBS Flaw Could Expose Sensitive Data appeared first on TechRepublic.

https://www.techrepublic.com/article/news-oracle-ebs-vulnerability/


New Playbook Offers Guidelines on Advancing Transformative Responsible AI

19:48 - 03/10/2025
  View item as page

The World Economic Forum and Accenture offer a practical roadmap for organizations to leverage responsible AI into a competitive advantage.

The post New Playbook Offers Guidelines on Advancing Transformative Responsible AI appeared first on TechRepublic.

https://www.techrepublic.com/article/news-advance-transformative-responsible-ai-


Oracle Extortion Case: $50M Demand From ‘Notorious’ Hacking Group

22:32 - 02/10/2025
  View item as page

After breaching the security of Oracle’s E-Business Suite, a well-known group of hackers is actively trying to extort execs for millions of dollars.

The post Oracle Extortion Case: $50M Demand From ‘Notorious’ Hacking Group appeared first on TechRepublic.

https://www.techrepublic.com/article/news-oracle-e-business-suite-breach-ransom-


Microsoft Unveils 365 Premium, Its New Top-Tier AI and Productivity Bundle

22:00 - 02/10/2025
  View item as page

Microsoft 365 Premium subscription bundles Copilot AI and Office apps for $19.99/month. It replaces Copilot Pro and offers a secure way to use AI at work.

The post Microsoft Unveils 365 Premium, Its New Top-Tier AI and Productivity Bundle appeared first on TechRepublic.

https://www.techrepublic.com/article/news-microsoft-365-premium/




What Does the Government Shutdown Mean for Cybersecurity?

20:30 - 01/10/2025
  View item as page

CISA is among the government agencies affected. The shutdown is a reminder for government contractors to harden their cybersecurity.

The post What Does the Government Shutdown Mean for Cybersecurity? appeared first on TechRepublic.

https://www.techrepublic.com/article/news-government-shutdown-2025/


Google Adds AI-Powered Ransomware Protection and Recovery to Drive for Desktop

17:32 - 01/10/2025
  View item as page

This new ransomware detection is available in beta in Google Drive for desktop on Windows or macOS, with a general release expected by the end of the year.

The post Google Adds AI-Powered Ransomware Protection and Recovery to Drive for Desktop appeared first on TechRepublic.

https://www.techrepublic.com/article/news-google-drive-ai-ransomware-detection/


UK Police Convicts Pair in £5.5 Billion Bitcoin Launder Case

17:05 - 01/10/2025
  View item as page

Two defendants pleaded guilty in a Bitcoin laundering case tied to the UK's record crypto seizure. The Met’s seven-year probe moves to sentencing 10–11 November.

The post UK Police Convicts Pair in £5.5 Billion Bitcoin Launder Case appeared first on TechRepublic.

https://www.techrepublic.com/article/news-uk-record-bitcoin-seizure/


BleepingComputer.com

Malicious crypto-stealing VSCode extensions resurface on OpenVSX

17:35 - 14/10/2025
  View item as page
A threat actor called TigerJack is constantly targeting developers with malicious extensions published on Microsoft's Visual Code (VSCode) marketplace and OpenVSX registry to steal cryptocurrency and plant backdoors. [...]

https://www.bleepingcomputer.com/news/security/malicious-crypto-stealing-vscode-


Final Windows 10 Patch Tuesday update rolls out as support ends

15:07 - 14/10/2025
  View item as page
In what marks the end of an era, Microsoft has released the Windows 10 KB5066791 cumulative update, the final free update for the operating system as it reaches the end of its support lifecycle. [...]

https://www.bleepingcomputer.com/news/microsoft/final-windows-10-patch-tuesday-u


New Android Pixnapping attack steals MFA codes pixel-by-pixel

14:46 - 14/10/2025
  View item as page
A new side-channel attack called Pixnapping enables a malicious Android app with no permissions to extract sensitive data by stealing pixels displayed by applications or websites, and reconstructing them to derive the content. [...]

https://www.bleepingcomputer.com/news/security/new-android-pixnapping-attack-ste


Microsoft: Exchange 2016 and 2019 have reached end of support

14:26 - 14/10/2025
  View item as page
Microsoft has reminded that Exchange Server 2016 and 2019 reached the end of support and advised IT administrators to upgrade servers to Exchange Server SE or migrate to Exchange Online. [...]

https://www.bleepingcomputer.com/news/microsoft/microsoft-exchange-2016-and-2019


Microsoft October 2025 Patch Tuesday fixes 6 zero-days, 172 flaws

14:02 - 14/10/2025
  View item as page
Today is Microsoft's October 2025 Patch Tuesday, which includes security updates for 172 flaws, including six zero-day vulnerabilities. Get patching! [...]

https://www.bleepingcomputer.com/news/microsoft/microsoft-october-2025-patch-tue


Windows 11 KB5066835 and KB5066793 updates released

13:46 - 14/10/2025
  View item as page
Microsoft has released Windows 11 KB5066835 and KB5066793 cumulative updates for versions 25H2/24H2 and 23H2 to fix security vulnerabilities and issues. [...]

https://www.bleepingcomputer.com/news/microsoft/windows-11-kb5066835-and-kb50667


US seizes $15 billion in crypto from 'pig butchering' kingpin

13:37 - 14/10/2025
  View item as page
The U.S. Department of Justice has seized $15 billion in bitcoin from the leader of Prince Group, a criminal organization that stole billions of dollars from victims in the United States through cryptocurrency investment scams, also known as romance baiting or pig butchering. [...]

https://www.bleepingcomputer.com/news/security/us-seizes-15-billion-in-crypto-fr


Oracles silently fixes zero-day exploit leaked by ShinyHunters

12:38 - 14/10/2025
  View item as page
Oracle has silently fixed an Oracle E-Business Suite vulnerability (CVE-2025-61884) that was actively exploited to breach servers, with a proof-of-concept exploit publicly leaked by the ShinyHunters extortion group. [...]

https://www.bleepingcomputer.com/news/security/oracles-silently-fixes-zero-day-e


Microsoft warns that Windows 10 reaches end of support today

10:54 - 14/10/2025
  View item as page
Microsoft has reminded customers today that Windows 10 has reached the end of support and will no longer receive patches for newly discovered security vulnerabilities. [...]

https://www.bleepingcomputer.com/news/microsoft/microsoft-warns-that-windows-10-


Security firms dispute credit for overlapping CVE reports

10:52 - 14/10/2025
  View item as page
FuzzingLabs has accused the YCombinator-backed startup, Gecko Security, of replicating its vulnerability disclosures. Gecko allegedly filed for 2 CVEs based on FuzzingLabs' reports without crediting them. Gecko denies any wrongdoing, calling the allegations a misunderstanding over disclosure process. [...]

https://www.bleepingcomputer.com/news/security/security-firms-dispute-credit-for


securityboulevard.com

The LLM Dependency Trap

19:30 - 14/10/2025
  View item as page

Large language models are reshaping how we write software. With a few prompts, developers can generate boilerplate, integrate dependencies, write tests, and scaffold entire systems in a fraction of the time it used to take.

The post The LLM Dependency Trap appeared first on Security Boulevard.

https://securityboulevard.com/2025/10/the-llm-dependency-trap/


Aembit Connects AI and Workload Access to AWS Secrets Manager

19:29 - 14/10/2025
  View item as page

4 min readSay goodbye to long-lived personal access tokens as you replace them with ephemeral, policy-driven credentials and automated service account management.

The post Aembit Connects AI and Workload Access to AWS Secrets Manager appeared first on Aembit.

The post Aembit Connects AI and Workload Access to AWS Secrets Manager appeared first on Security Boulevard.

https://securityboulevard.com/2025/10/aembit-connects-ai-and-workload-access-to-


NDSS 2025 – MADWeb 2025, Keynote 2 and Session 3

19:00 - 14/10/2025
  View item as page

Author, Creator & Presenter: Keynote2: Frederik Braun (Mozilla)

Session 3: Web3 and Work in Progress: Workshop on Measurements, Attacks, and Defenses for the Web (MADWeb) 2025, co-located with the Network and Distributed System Security (NDSS) Symposium 2025

Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the organization’s’YouTube channel.

Permalink

The post NDSS 2025 – MADWeb 2025, Keynote 2 and Session 3 appeared first on Security Boulevard.

https://securityboulevard.com/2025/10/ndss-2025-madweb-2025-keynote-2-and-sessio


Beyond Alerts: Building Smarter, Context-Aware Threat Detection

18:11 - 14/10/2025
  View item as page

Jeff Reed, chief product officer at Vectra AI, talks about the company’s latest advances in detection and response—and how AI is transforming the way enterprises defend against modern cyber threats. Reed, who joined Vectra after years leading cloud security and product teams at Google, explains that traditional approaches to threat detection are no longer sufficient...

The post Beyond Alerts: Building Smarter, Context-Aware Threat Detection appeared first on Security Boulevard.

https://securityboulevard.com/2025/10/beyond-alerts-building-smarter-context-awa


Preparing for the Next Wave of AI-Driven Threats

18:03 - 14/10/2025
  View item as page

Cristian Rodriguez, Field CTO for the Americas at CrowdStrike, discusses how artificial intelligence and evolving threat dynamics are reshaping cybersecurity. Rodriguez brings a unique perspective—equal parts technical and creative—describing how CrowdStrike continues to innovate in an era defined by speed and complexity. He notes that attackers are evolving just as quickly as defenders, with AI..

The post Preparing for the Next Wave of AI-Driven Threats appeared first on Security Boulevard.

https://securityboulevard.com/2025/10/preparing-for-the-next-wave-of-ai-driven-t


China’s Flax Typhoon Exploits ArcGIS App for Year-Long Persistence

17:51 - 14/10/2025
  View item as page

The China-based APT group Flax Typhoon used a function within ArcGIS' legitimate geo-mapping software to create a webshell through which it established persistence for more than a year to execute malicious commands and steal credentials.

The post China’s Flax Typhoon Exploits ArcGIS App for Year-Long Persistence appeared first on Security Boulevard.

https://securityboulevard.com/2025/10/chinas-flax-typhoon-exploits-arcgis-app-fo


The Defensive Gap: Why Modern SOCs Are Losing Ground and How to Close It

17:44 - 14/10/2025
  View item as page

Despite continued investments in SIEMs, threat intelligence platforms, and managed detection services, many Security Operations Centers (SOCs) remain in a defensive position. SOCs are reactive, overstretched, and underprepared. High-profile breaches continue to grab headlines, but they are only what is visible. The reality is that SOC teams are overwhelmed by alert fatigue, organizational friction, and..

The post The Defensive Gap: Why Modern SOCs Are Losing Ground and How to Close It appeared first on Security Boulevard.

https://securityboulevard.com/2025/10/the-defensive-gap-why-modern-socs-are-losi


The Endpoint Has Moved to the Browser — Your Security Tools Haven’t

17:35 - 14/10/2025
  View item as page

Your users aren’t downloading files to their desktops anymore. They’re not running local applications. They’re working in Google Docs, Salesforce, Slack, and dozens of other browser-based platforms. The endpoint—the place where work actually happens—has moved entirely into the browser. Your security tools haven’t made that move with them. Legacy vendors built traditional Secure Web Gateways..

The post The Endpoint Has Moved to the Browser — Your Security Tools Haven’t appeared first on Security Boulevard.

https://securityboulevard.com/2025/10/the-endpoint-has-moved-to-the-browser-your


What is OT Breach Ready Cyber Defense?

15:38 - 14/10/2025
  View item as page

Learn how microsegmentation builds OT breach ready cyber defense, limits lateral movement, and protects industrial systems from disruptions.

The post What is OT Breach Ready Cyber Defense? appeared first on ColorTokens.

The post What is OT Breach Ready Cyber Defense? appeared first on Security Boulevard.

https://securityboulevard.com/2025/10/what-is-ot-breach-ready-cyber-defense/



CXSecurity.com

Perfex CRM Chatbot Cross Site Scripting

19:56 - 12/10/2025
  View item as page
Topic: Perfex CRM Chatbot Cross Site Scripting Risk: Low Text:# CVE-2025-60374 CVE-2025-60374: Stored Cross-Site Scripting (XSS) in Perfex CRM Chatbot > **⚠️ Security Advisory** ...

https://cxsecurity.com/issue/WLB-2025100008


DirectAdmin v1.680 DOM Injection via return-to Parameter

20:00 - 09/10/2025
  View item as page
Topic: DirectAdmin v1.680 DOM Injection via return-to Parameter Risk: Low Text: # Exploit Title: DirectAdmin v1.680 DOM Injection via return-to Parameter (UI Misrepresentation) # E...

https://cxsecurity.com/issue/WLB-2025100007


SugarCRM unauthenticated Remote Code Execution (RCE)

21:08 - 07/10/2025
  View item as page
Topic: SugarCRM unauthenticated Remote Code Execution (RCE) Risk: High Text:# Exploit Title: SugarCRM unauthenticated Remote Code Execution (RCE) # Exploit Author: DANG # Vendor Homepage: https://www.s...

https://cxsecurity.com/issue/WLB-2025100006


GaatiTrack-1.0 Copyright©2025-Multiple-SQLi - Metasploit module

21:07 - 07/10/2025
  View item as page
Topic: GaatiTrack-1.0 Copyright©2025-Multiple-SQLi - Metasploit module Risk: Medium Text:# Titles: GaatiTrack-1.0 Copyright©2025-Multiple-SQLi - Metasploit module # Author: nu11secur1ty # Date: 10/06/2025 # Vend...

https://cxsecurity.com/issue/WLB-2025100005


CPAS Audit Management Information System 4.9 SQL Injection

15:36 - 05/10/2025
  View item as page
Topic: CPAS Audit Management Information System 4.9 SQL Injection Risk: Medium Text:# CPAS-bug CPAS audit management information system has SQL injection vulnerability # Beijing YouDataSum Technology Co., Lt...

https://cxsecurity.com/issue/WLB-2025100004


ERPNext 15.67.0 / Frappe 15.72.4 Cross Site Scripting

15:33 - 05/10/2025
  View item as page
Topic: ERPNext 15.67.0 / Frappe 15.72.4 Cross Site Scripting Risk: Low Text:...

https://cxsecurity.com/issue/WLB-2025100003


nopCommerce 4.40.3 - Stored Cross-Site Scripting (XSS)

20:54 - 01/10/2025
  View item as page
Topic: nopCommerce 4.40.3 - Stored Cross-Site Scripting (XSS) Risk: Low Text:# Exploit Title: nopCommerce 4.40.3 - Stored Cross-Site Scripting (XSS) # Exploit Author: Scott Sturrock 'ssturrock -at- proto...

https://cxsecurity.com/issue/WLB-2025100002


DirectAdmin v1.680 DOM Injection via return-to Parameter (UI Misrepresentation)

20:54 - 01/10/2025
  View item as page
Topic: DirectAdmin v1.680 DOM Injection via return-to Parameter (UI Misrepresentation) Risk: Medium Text:# Exploit Title: DirectAdmin v1.680 DOM Injection via return-to Parameter (UI Misrepresentation) # Exploit Author: Scott Sturr...

https://cxsecurity.com/issue/WLB-2025100001


WordPress Quentn WP 1.2.8 Privilege Escalation

20:53 - 30/09/2025
  View item as page
Topic: WordPress Quentn WP 1.2.8 Privilege Escalation Risk: Medium Text:#!/usr/bin/env python3 # -*- coding: utf-8 -*- import argparse import base64 import hashlib import json import random ...

https://cxsecurity.com/issue/WLB-2025090016


StoryChief Wordpress Plugin 1.0.42 Arbitrary File Upload

20:52 - 30/09/2025
  View item as page
Topic: StoryChief Wordpress Plugin 1.0.42 Arbitrary File Upload Risk: High Text:# Exploit Title: StoryChief Wordpress Plugin 1.0.42 - Arbitrary File Upload # Exploit Author: xpl0dec # Vendor Homepage: http...

https://cxsecurity.com/issue/WLB-2025090015


Brian Krebs

DDoS Botnet Aisuru Blankets US ISPs in Record DDoS

16:10 - 10/10/2025
  View item as page
The world's largest and most disruptive botnet is now drawing a majority of its firepower from compromised Internet-of-Things (IoT) devices hosted on U.S. Internet providers like AT&T, Comcast and Verizon, new evidence suggests. Experts say the heavy concentration of infected devices at U.S. providers is complicating efforts to limit collateral damage from the botnet's attacks, which shattered previous records this week with a brief traffic flood that clocked in at nearly 30 trillion bits of data per second.

https://krebsonsecurity.com/2025/10/ddos-botnet-aisuru-blankets-us-isps-in-recor


ShinyHunters Wage Broad Corporate Extortion Spree

22:45 - 07/10/2025
  View item as page
A cybercriminal group that used voice phishing attacks to siphon more than a billion records from Salesforce customers earlier this year has launched a website that threatens to publish data stolen from dozens of Fortune 500 firms if they refuse to pay a ransom. The group also claimed responsibility for a recent breach involving Discord user data, and for stealing terabytes of sensitive files from thousands of customers of the enterprise software maker Red Hat.

https://krebsonsecurity.com/2025/10/shinyhunters-wage-broad-corporate-extortion-


Feds Tie ‘Scattered Spider’ Duo to $115M in Ransoms

11:48 - 24/09/2025
  View item as page
U.S. prosecutors last week levied criminal hacking charges against 19-year-old U.K. national Thalha Jubair for allegedly being a core member of Scattered Spider, a prolific cybercrime group blamed for extorting at least $115 million in ransom payments from victims. The charges came as Jubair and an alleged co-conspirator appeared in a London court to face accusations of hacking into and extorting several large U.K. retailers, the London transit system, and healthcare providers in the United States.

https://krebsonsecurity.com/2025/09/feds-tie-scattered-spider-duo-to-115m-in-ran


Self-Replicating Worm Hits 180+ Software Packages

14:08 - 16/09/2025
  View item as page
At least 187 code packages made available through the JavaScript repository NPM have been infected with a self-replicating worm that steals credentials from developers and publishes those secrets on GitHub, experts warn. The malware, which briefly infected multiple code packages from the security vendor CrowdStrike, steals and publishes even more credentials every time an infected package is installed.

https://krebsonsecurity.com/2025/09/self-replicating-worm-hits-180-software-pack


Bulletproof Host Stark Industries Evades EU Sanctions

17:40 - 11/09/2025
  View item as page
In May 2025, the European Union levied financial sanctions on the owners of Stark Industries Solutions Ltd., a bulletproof hosting provider that materialized two weeks before Russia invaded Ukraine and quickly became a top source of Kremlin-linked cyberattacks and disinformation campaigns. But new data shows those sanctions have done little to stop Stark from simply rebranding and transferring their assets to other corporate entities controlled by its original hosting providers.

https://krebsonsecurity.com/2025/09/bulletproof-host-stark-industries-evades-eu-


Microsoft Patch Tuesday, September 2025 Edition

21:21 - 09/09/2025
  View item as page
Microsoft Corp. today issued security updates to fix more than 80 vulnerabilities in its Windows operating systems and software. There are no known "zero-day" or actively exploited vulnerabilities in this month's bundle from Redmond, which nevertheless includes patches for 13 flaws that earned Microsoft's most-dire "critical" label. Meanwhile, both Apple and Google recently released updates to fix zero-day bugs in their devices.

https://krebsonsecurity.com/2025/09/microsoft-patch-tuesday-september-2025-editi


18 Popular Code Packages Hacked, Rigged to Steal Crypto

22:53 - 08/09/2025
  View item as page
At least 18 popular JavaScript code packages that are collectively downloaded more than two billion times each week were briefly compromised with malicious software today, after a developer involved in maintaining the projects was phished. The attack appears to have been quickly contained and was narrowly focused on stealing cryptocurrency. But experts warn that a similar attack with a slightly more nefarious payload could quickly lead to a disruptive malware outbreak that is far more difficult to detect and restrain.

https://krebsonsecurity.com/2025/09/18-popular-code-packages-hacked-rigged-to-st


GOP Cries Censorship Over Spam Filters That Work

03:23 - 06/09/2025
  View item as page
The chairman of the Federal Trade Commission (FTC) last week sent a letter to Google's CEO demanding to know why Gmail was blocking messages from Republican senders while allegedly failing to block similar missives supporting Democrats. The letter followed media reports accusing Gmail of disproportionately flagging messages from the GOP fundraising platform WinRed and sending them to the spam folder. But according to experts who track daily spam volumes worldwide, WinRed's messages are getting blocked more because its methods of blasting email are increasingly way more spammy than that of ActBlue, the fundraising platform for Democrats.

https://krebsonsecurity.com/2025/09/gop-cries-censorship-over-spam-filters-that-


The Ongoing Fallout from a Breach at AI Chatbot Maker Salesloft

21:55 - 01/09/2025
  View item as page
The recent mass-theft of authentication tokens from Salesloft, whose AI chatbot is used by a broad swath of corporate America to convert customer interaction into Salesforce leads, has left many companies racing to invalidate the stolen credentials before hackers can exploit them. Now Google warns the breach goes far beyond access to Salesforce data, noting the hackers responsible also stole valid authentication tokens for hundreds of online services that customers can integrate with Salesloft, including Slack, Google Workspace, Amazon S3, Microsoft Azure, and OpenAI.

https://krebsonsecurity.com/2025/09/the-ongoing-fallout-from-a-breach-at-ai-chat


Affiliates Flock to ‘Soulless’ Scam Gambling Machine

17:21 - 28/08/2025
  View item as page
Last month, KrebsOnSecurity tracked the sudden emergence of hundreds of polished online gaming and wagering websites that lure people with free credits and eventually abscond with any cryptocurrency funds deposited by players. We've since learned that these scam gambling sites have proliferated thanks to a new Russian affiliate program called "Gambler Panel" that bills itself as a "soulless project that is made for profit."

https://krebsonsecurity.com/2025/08/affiliates-flock-to-soulless-scam-gambling-m


Troy Hunt

Weekly Update 473

03:25 - 12/10/2025
  View item as page

Presently sponsored by: 1Password Extended Access Management: Secure every sign-in for every app on every device.

This week's video was recorded on Friday morning Aussie time, and as promised, hackers dumped data the following day. Listening back to parts of the video as I write this on a Sunday morning, pretty much what was predicted happened: data was dumped, it included Qantas, and the

https://www.troyhunt.com/weekly-update-473/


Court Injunctions are the Thoughts and Prayers of Data Breach Response

00:03 - 09/10/2025
  View item as page

Presently sponsored by: 1Password Extended Access Management: Secure every sign-in for every app on every device.

You see it all the time after a tragedy occurs somewhere, and people flock to offer their sympathies via the "thoughts and prayers" line. Sympathy is great, and we should all express that sentiment appropriately. The criticism, however, is that the line is often offered as a substitute

https://www.troyhunt.com/court-injunctions-are-the-thoughts-and-prayers-of-data-


Weekly Update 472

06:23 - 06/10/2025
  View item as page

Presently sponsored by: 1Password Extended Access Management: Secure every sign-in for every app on every device.

This probably comes through pretty strongly in this week's video, but I love the vibe at CERN. It's a place so focused on the common good of science that all the other cultural attributes that often put people at odds these days fade into the distance.

https://www.troyhunt.com/weekly-update-472/



Weekly Update 471

06:50 - 27/09/2025
  View item as page

Presently sponsored by: 1Password Extended Access Management: Secure every sign-in for every app on every device.

I'm so happy to finally be getting those HIBP demos out! The first couple are simple, but as I say in this week's vid, it's the simple questions we're still dealing with. As if to taunt me (or prove my point), we

https://www.troyhunt.com/weekly-update-471/


HIBP Demo: Querying the API, and the Free Test Key!

23:24 - 23/09/2025
  View item as page

Presently sponsored by: 1Password Extended Access Management: Secure every sign-in for every app on every device.

One of the most common use cases for HIBP's API is querying by email address, and we support hundreds of millions of searches against this endpoint every month. Loads of organisations use this service to understand the exposure of their customers and provide them with better protection against

https://www.troyhunt.com/hibp-demo-querying-the-api-and-the-free-test-key/


Weekly Update 470

08:35 - 21/09/2025
  View item as page

Presently sponsored by: 1Password Extended Access Management: Secure every sign-in for every app on every device.

Imagine jumping on board a class action after your precious datas have been breached, then sticking through it all the way until a settlement is reached. Then, finally, after a long and arduous battle, cashing in and getting... $1. Well, kinda $1, the ParkMobile class action granted up to $1

https://www.troyhunt.com/weekly-update-470/


Have I Been Pwned Demos Are Now Live!

05:49 - 19/09/2025
  View item as page

Presently sponsored by: 1Password Extended Access Management: Secure every sign-in for every app on every device.

Well, one of them is, but what's important is that we now have a platform on which we can start pushing out a lot more. It's not that HIBP is a particularly complex system that needs explaining in any depth, but we still get a lot

https://www.troyhunt.com/have-i-been-pwned-demos-are-now-live/


Weekly Update 469

07:42 - 13/09/2025
  View item as page

Presently sponsored by: 1Password Extended Access Management: Secure every sign-in for every app on every device.

So I had this idea around training a text-to-speech engine with my voice, then using that to speak over the Sonos at home to announce AI-driven events, such as people ringing the doorbell. A few hours' worth of video from these weekly updates fed into ElevenLabs and wammo! Here

https://www.troyhunt.com/weekly-update-469/


Weekly Update 468

08:08 - 07/09/2025
  View item as page

Presently sponsored by: 1Password Extended Access Management: Secure every sign-in for every app on every device.

I only just realised, as I prepared this accompanying blog post, that I didn't talk about one of the points in the overview: food. One of my fondest memories as a child living in Singapore and now as an adult visiting there is the food. It's

https://www.troyhunt.com/weekly-update-468/


Bruce Schneier

Upcoming Speaking Engagements

16:01 - 14/10/2025
  View item as page

This is a current list of where and when I am scheduled to speak:

  • I and Nathan E. Sanders will be giving a book talk on Rewiring Democracy at the Harvard Kennedy School’s Ash Center in Cambridge, Massachusetts, USA, on October 22, 2025 at noon ET.
  • I and Nathan E. Sanders will be speaking and signing books at the Cambridge Public Library in Cambridge, Massachusetts, USA, on October 22, 2025 at 6:00 PM ET. The event is sponsored by Harvard Bookstore.
  • I and Nathan E. Sanders will give a virtual talk about our book Rewiring Democracy on October 23, 2025 at 1:00 PM ET. The event is hosted by Data & Society...

https://www.schneier.com/blog/archives/2025/10/upcoming-speaking-engagements-49.


The Trump Administration’s Increased Use of Social Media Surveillance

11:09 - 14/10/2025
  View item as page

This chilling paragraph is in a comprehensive Brookings report about the use of tech to deport people from the US:

The administration has also adapted its methods of social media surveillance. Though agencies like the State Department have gathered millions of handles and monitored political discussions online, the Trump administration has been more explicit in who it’s targeting. Secretary of State Marco Rubio announced a new, zero-tolerance “Catch and Revoke” strategy, which uses AI to monitor the public speech of foreign nationals and revoke visas...

https://www.schneier.com/blog/archives/2025/10/the-trump-administrations-increas


Rewiring Democracy is Coming Soon

16:36 - 13/10/2025
  View item as page

My latest book, Rewiring Democracy: How AI Will Transform Our Politics, Government, and Citizenship, will be published in just over a week. No reviews yet, but you can read chapters 12 and 34 (of 43 chapters total).

You can order the book pretty much everywhere, and a copy signed by me here.

Please help spread the word. I want this book to make a splash when it’s public. Leave a review on whatever site you buy it from. Or make a TikTok video. Or do whatever you kids do these days. Is anyone a Slashdot contributor? I’d like the book to be announced there...

https://www.schneier.com/blog/archives/2025/10/rewiring-democracy-is-coming-soon


AI and the Future of American Politics

11:04 - 13/10/2025
  View item as page

Two years ago, Americans anxious about the forthcoming 2024 presidential election were considering the malevolent force of an election influencer: artificial intelligence. Over the past several years, we have seen plenty of warning signs from elections worldwide demonstrating how AI can be used to propagate misinformation and alter the political landscape, whether by trolls on social media, foreign influencers, or even a street magician. AI is poised to play a more volatile role than ever before in America’s next federal election in 2026. We can already see how different groups of political actors are approaching AI. Professional campaigners are using AI to accelerate the traditional tactics of electioneering; organizers are using it to reinvent how movements are built; and citizens are using it both to express themselves and amplify their side’s messaging. Because there are so few rules, and so little prospect of regulatory action, around AI’s role in politics, there is no oversight of these activities, and no safeguards against the dramatic potential impacts for our democracy...

https://www.schneier.com/blog/archives/2025/10/ai-and-the-future-of-american-pol


Friday Squid Blogging: Sperm Whale Eating a Giant Squid

21:02 - 10/10/2025
  View item as page

Video.

As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.

Blog moderation policy.

https://www.schneier.com/blog/archives/2025/10/friday-squid-blogging-sperm-whale


Autonomous AI Hacking and the Future of Cybersecurity

11:06 - 10/10/2025
  View item as page

AI agents are now hacking computers. They’re getting better at all phases of cyberattacks, faster than most of us expected. They can chain together different aspects of a cyber operation, and hack autonomously, at computer speeds and scale. This is going to change everything.

Over the summer, hackers proved the concept, industry institutionalized it, and criminals operationalized it. In June, AI company XBOW took the top spot on HackerOne’s US leaderboard after submitting over 1,000 new vulnerabilities in just a few months. In August, the seven teams competing in DARPA’s AI Cyber Challenge ...

https://www.schneier.com/blog/archives/2025/10/autonomous-ai-hacking-and-the-fut


Flok License Plate Surveillance

16:10 - 08/10/2025
  View item as page

The company Flok is surveilling us as we drive:

A retired veteran named Lee Schmidt wanted to know how often Norfolk, Virginia’s 176 Flock Safety automated license-plate-reader cameras were tracking him. The answer, according to a U.S. District Court lawsuit filed in September, was more than four times a day, or 526 times from mid-February to early July. No, there’s no warrant out for Schmidt’s arrest, nor is there a warrant for Schmidt’s co-plaintiff, Crystal Arrington, whom the system tagged 849 times in roughly the same period.

You might think this sounds like it violates the Fourth Amendment, which protects American citizens from unreasonable searches and seizures without probable cause. Well, so does the American Civil Liberties Union. Norfolk, Virginia Judge Jamilah LeCruise also agrees, and in 2024 she ruled that plate-reader data obtained without a search warrant couldn’t be used against a defendant in a robbery case...

https://www.schneier.com/blog/archives/2025/10/flok-license-plate-surveillance.h


AI-Enabled Influence Operation Against Iran

11:04 - 07/10/2025
  View item as page

Citizen Lab has uncovered a coordinated AI-enabled influence operation against the Iranian government, probably conducted by Israel.

Key Findings

  • A coordinated network of more than 50 inauthentic X profiles is conducting an AI-enabled influence operation. The network, which we refer to as “PRISONBREAK,” is spreading narratives inciting Iranian audiences to revolt against the Islamic Republic of Iran.
  • While the network was created in 2023, almost all of its activity was conducted starting in January 2025, and continues to the present day.
  • The profiles’ activity appears to have been synchronized, at least in part, with the military campaign that the Israel Defense Forces conducted against Iranian targets in June 2025. ...

https://www.schneier.com/blog/archives/2025/10/ai-enabled-influence-operation-ag


AI in the 2026 Midterm Elections

11:06 - 06/10/2025
  View item as page

We are nearly one year out from the 2026 midterm elections, and it’s far too early to predict the outcomes. But it’s a safe bet that artificial intelligence technologies will once again be a major storyline.

The widespread fear that AI would be used to manipulate the 2024 US election seems rather quaint in a year where the president posts AI-generated images of himself as the pope on official White House accounts. But AI is a lot more than an information manipulator. It’s also emerging as a politicized issue. Political first-movers are adopting the technology, and that’s opening a ...

https://www.schneier.com/blog/archives/2025/10/ai-in-the-2026-midterm-elections.



Security Affairs

Researchers warn of widespread RDP attacks by 100K-node botnet

18:20 - 14/10/2025
  View item as page
A botnet of 100K+ IPs from multiple countries is attacking U.S. RDP services in a campaign active since October 8. GreyNoise researchers uncovered a large-scale botnet that is targeting Remote Desktop Protocol (RDP) services in the United States starting on October 8. The company discovered the botnet after detecting an unusual spike in Brazilian IP […]

https://securityaffairs.com/183389/security/researchers-warn-of-widespread-rdp-a


Harvard University hit in Oracle EBS cyberattack, 1.3 TB of data leaked by Cl0p group

14:08 - 14/10/2025
  View item as page
Harvard University confirmed being targeted in the Oracle EBS campaign after the Cl0p ransomware group leaked 1.3 TB of data. Harvard University confirmed it was targeted in the Oracle E-Business Suite campaign after the Cl0p ransomware group listed it on its leak site. The cybercrime group claimed to have leaked 1.3 TB of data allegedly […]

https://securityaffairs.com/183379/security/harvard-university-hit-in-oracle-ebs


UK NCSC Reports 429 cyberattacks in a year, with nationally significant cases more than doubling

11:21 - 14/10/2025
  View item as page
The UK’s NCSC handled 429 cyberattacks from Sept 2024–Aug 2025, including 204 nationally significant cases, over double the previous year’s total. The UK’s National Cyber Security Centre (NCSC) reported a record surge in major cyberattacks, responding to 429 incidents from September 2024 to August 2025, including 204 deemed “nationally significant”, more than double the previous […]

https://securityaffairs.com/183372/security/uk-ncsc-reports-429-cyberattacks-in-


Unverified COTS hardware enables persistent attacks in small satellites via SpyChain

08:39 - 14/10/2025
  View item as page
SpyChain shows how unverified COTS hardware in small satellites can enable persistent, multi-component supply chain attacks using NASA’s NOS3 simulator. The rise of small satellites has transformed scientific, commercial, and defense operations. Using commercial off-the-shelf (COTS) parts makes them cheaper and faster to build but also introduces new, poorly understood security risks unique to space […]

https://securityaffairs.com/183303/hacking/unverified-cots-hardware-enables-pers


Oracle issued an emergency security update to fix new E-Business Suite flaw CVE-2025-61884

07:31 - 14/10/2025
  View item as page
Oracle issued an emergency security update to address a new E-Business Suite (EBS) vulnerability tracked as CVE-2025-61884. Oracle released an emergency patch to address an information disclosure flaw, tracked as CVE-2025-61884 (CVSS Score of 7.5), in E-Business Suite’s Runtime UI component (versions 12.2.3–12.2.14). “Oracle has just released Security Alert CVE-2025-61884. This vulnerability affects some deployments of Oracle E-Business […]

https://securityaffairs.com/183362/security/oracle-issued-an-emergency-security-


Customer payment data stolen in Unity Technologies’s SpeedTree website compromise

18:18 - 13/10/2025
  View item as page
Malicious code on Unity Technologies’s SpeedTree site skimmed sensitive data from hundreds of customers, the company confirmed. Video game software development firm Unity Technologies revealed that malicious code on its SpeedTree website skimmed sensitive information from hundreds of customers, impacting users who accessed the compromised site. The company discovered on August 26, 2025, the presence […]

https://securityaffairs.com/183349/data-breach/customer-payment-data-stolen-in-u


SimonMed Imaging discloses a data breach impacting over 1.2 million people

14:02 - 13/10/2025
  View item as page
Medusa ransomware hit SimonMed Imaging, stealing 200 GB of data and impacting over 1.2 million people in a major healthcare data breach. SimonMed Imaging suffered a ransomware attack by the Medusa group, which claimed to have stolen 200 GB of data. SimonMed Imaging is one of the largest outpatient medical imaging providers in the U.S., […]

https://securityaffairs.com/183342/uncategorized/simonmed-imaging-discloses-a-da


Microsoft revamps Internet Explorer Mode in Edge after August attacks

13:17 - 13/10/2025
  View item as page
Microsoft updated Edge’s Internet Explorer mode after August 2025 reports that attackers exploited it to access users’ devices without authorization. Microsoft updated Edge’s Internet Explorer mode after reports in August 2025 that threat actors exploited the backward compatibility feature to gain unauthorized device access. Microsoft Edge’s IE mode lets organizations run legacy Internet Explorer 11 […]

https://securityaffairs.com/183333/security/microsoft-revamps-internet-explorer-


Astaroth Trojan abuses GitHub to host configs and evade takedowns

10:08 - 13/10/2025
  View item as page
The Astaroth banking Trojan uses GitHub to host malware configs, evade C2 takedowns and stay active by pulling new settings from the platform. McAfee discovered a new Astaroth campaign using GitHub repositories to host malware configurations. This allows attackers to evade takedowns by pulling fresh configs from GitHub whenever C2 servers are shut down, ensuring […]

https://securityaffairs.com/183323/cyber-crime/astaroth-trojan-abuses-github-to-


Google, Mandiant expose malware and zero-day behind Oracle EBS extortion

08:35 - 13/10/2025
  View item as page
Google and Mandiant link Oracle EBS extortion emails to known July-patched flaws and a likely zero-day, CVE-2025-61882. Google Threat Intelligence and Mandiant analyzed the Oracle E-Business Suite extortion campaign, revealing the use of malware. Attackers exploited July-patched EBS flaws and likely a zero-day (CVE-2025-61882), sending extortion emails to company executives. In early October, Google Mandiant […]

https://securityaffairs.com/183306/hacking/google-mandiant-expose-malware-and-ze


news.sophos.com

Shift left, stay ahead: The case for early threat prevention

13:05 - 14/10/2025
  View item as page
"'Shift left’ is a very trendy concept over the past few years [in application security]. The weird thing is, prevention is seen as something that's kind of old school in endpoint security or security operations."

https://news.sophos.com/en-us/2025/10/14/prevention-first-approach-to-security-w


Cybersecurity Awareness Month: 10 tips to Stay Safe Online that anyone can use

13:00 - 13/10/2025
  View item as page
Use this short checklist as a launchpad: adopt the basics consistently, strengthen the controls that matter most, and build routines that keep those protections current and effective.

https://news.sophos.com/en-us/2025/10/13/cybersecurity-awareness-month-2025-10-t


WhatsApp Worm Targets Brazilian Banking Customers

16:14 - 10/10/2025
  View item as page
Counter Threat UnitTM (CTU) researchers are investigating multiple incidents in an ongoing campaign targeting users of the WhatsApp messaging platform. The campaign, which started on September 29, 2025, is focused on Brazil and seeks to trick users into executing a malicious file attached to a self-spreading message received from a previously infected WhatsApp web session. […]

https://news.sophos.com/en-us/2025/10/10/whatsapp-worm-targets-brazilian-banking


The State of Ransomware in Healthcare 2025

17:35 - 08/10/2025
  View item as page
292 IT and cybersecurity leaders reveal the ransomware realities for healthcare establishments today.

https://news.sophos.com/en-us/2025/10/08/the-state-of-ransomware-in-healthcare-2



Introducing Sophos Advisory Services

11:30 - 01/10/2025
  View item as page
See how your networks, systems, and employees stand up to simulated attacks before an adversary strikes.

https://news.sophos.com/en-us/2025/10/01/introducing-sophos-advisory-services/


Report: Addressing cybersecurity burnout in 2025

10:00 - 30/09/2025
  View item as page
The consequences of this burnout are far-reaching, affecting productivity, incident response times, and employee retention.

https://news.sophos.com/en-us/2025/09/30/report-addressing-cybersecurity-burnout


Is your SIEM still serving You? Why it might be time to rethink your security stack

08:19 - 30/09/2025
  View item as page
Security teams are under increasing pressure to detect and respond to threats in real time, especially as the median dwell time for ransomware attacks has dropped from weeks to a few days. Yet many organizations still rely on legacy Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) tools. These tools […]

https://news.sophos.com/en-us/2025/09/30/rethink-siem-xdr-mdr/