Read more of this story at Slashdot.
https://science.slashdot.org/story/26/01/14/2332240/the-swedish-start-up-aiming-
Read more of this story at Slashdot.
https://mobile.slashdot.org/story/26/01/14/2319204/are-qwerty-phones-trying-to-m
Read more of this story at Slashdot.
https://tech.slashdot.org/story/26/01/14/233241/digg-launches-its-new-reddit-riv
Read more of this story at Slashdot.
https://slashdot.org/story/26/01/14/2253220/cerebras-scores-openai-deal-worth-ov
Read more of this story at Slashdot.
https://news.slashdot.org/story/26/01/14/225243/doordash-and-ubereats-cost-drive
Read more of this story at Slashdot.
https://hardware.slashdot.org/story/26/01/14/2156254/us-approves-sale-of-nvidias
Read more of this story at Slashdot.
https://entertainment.slashdot.org/story/26/01/14/2149259/bandcamp-bans-ai-music
Read more of this story at Slashdot.
https://it.slashdot.org/story/26/01/14/2143252/house-sysadmin-stole-200-phones-c
Read more of this story at Slashdot.
https://news.slashdot.org/story/26/01/14/1924225/uk-scraps-mandatory-digital-id-
Read more of this story at Slashdot.
https://tech.slashdot.org/story/26/01/14/199210/dell-tells-staff-to-get-ready-fo
https://techcrunch.com/2026/01/14/mira-muratis-startup-thinking-machines-lab-is-
https://techcrunch.com/2026/01/14/the-ftcs-data-sharing-order-against-gm-is-fina
https://techcrunch.com/2026/01/14/indias-emversity-doubles-valuation-as-it-scale
https://techcrunch.com/2026/01/14/musk-denies-awareness-of-grok-sexual-underage-
https://techcrunch.com/2026/01/14/openai-signs-deal-reportedly-worth-10-billion-
https://techcrunch.com/2026/01/14/netflixs-first-original-video-podcasts-feature
https://techcrunch.com/2026/01/14/app-downloads-declined-again-in-2025-but-consu
https://techcrunch.com/2026/01/14/ai-models-are-starting-to-crack-high-level-mat
https://techcrunch.com/2026/01/14/blackstone-general-atlantic-backed-liftoff-mob
https://techcrunch.com/2026/01/14/digg-launches-its-new-reddit-rival-to-the-publ
Verizon’s network is experiencing technical issues that are impacting calls and wireless data. Verizon customers on X have reported seeing “SOS” rather than the traditional network bars on their smartphones, and even the network provider’s own status page struggled to load, likely due to the number of customers trying to access it.
Based on the experience of Verizon users on Engadget’s staff, the services that are impacted appear to be calls and wireless data. Text messages continue to be delivered normally, at least for some users. On DownDetector, reports of a Verizon outage started growing around 12PM ET and numbered in the hundreds of thousands at their peak.
DownDetector also shows spikes in outage reports on competing networks like AT&T and T-Mobile, but in terms of magnitude, they’re much smaller than the issue Verizon is facing. For example, Verizon peaked at 181,769 reports, while AT&T’s was just 1,769 reports. The difference between the two is great enough that those AT&T reports could be from people trying to contact Verizon customers and thinking that their personal network was the problem.
We are aware of an issue impacting wireless voice and data services for some customers. Our engineers are engaged and are working to identify and solve the issue quickly. We understand how important reliable connectivity is and apologize for the inconvenience.
— Verizon News (@VerizonNews) January 14, 2026In a post on the cell provider’s news account on X, Verizon acknowledged the issues with its network. “We are aware of an issue impacting wireless voice and data services for some customers,” Verizon wrote. “Our engineers are engaged and are working to identify and solve the issue quickly. We understand how important reliable connectivity is and apologize for the inconvenience.”
Based on DownDetector’s map of outage reports, issues with Verizon’s network appear to be concentrated in major cities in the eastern United States. The majority of reports appear to be coming out of Boston, New York and Washington DC, though the map also shows growing hot spots in Chicago, San Francisco and Los Angeles.
Verizon engineering teams are continuing to address today's service interruptions. Our teams remain fully deployed and are focused on the issue. We understand the impact this has on your day and remain committed to resolving this as quickly as possible.
— Verizon News (@VerizonNews) January 14, 2026At 2:14PM ET, Verizon shared on X that its engineering teams “remain fully deployed” to work on fixing the outage. The company didn’t share when the issue would resolved or how many of its customers are currently impacted. Reports on DownDetector have dropped since their peak at 12:43PM ET, but thousands of Verizon customers are still noticing issues with the service.
As of 3:09PM ET, Verizon has yet to share more information about the recovery of the company’s cell network. Some Verizon customers on X have noticed their cell service returning, but it’s not clear if this means the network’s technical issues have been fixed.
At 4:06PM ET, nearly two hours since the company’s last statement, at least one member of Engadget’s staff reports their service has been restored. The connectivity issues are still affecting Verizon customers, however. DownDetector received over 55,000 outage reports as recently as 3:47PM ET.
Verizon's team is on the ground actively working to fix today’s service issue that is impacting some customers. We know this is a huge inconvenience, and our top priority is to get you back online and connected as fast as possible. We appreciate your patience while we work to...
— Verizon News (@VerizonNews) January 14, 2026Verizon posted at 4:12PM ET that work continues on addressing the outage, but the issue hasn’t been completely fixed. According to the company, its team is “on the ground actively working to fix today’s service issue that is impacting some customers.”
As of 4:52PM ET, the Verizon’s network has been experiencing issues for around four hours, making today’s outage nearly as long as the last major outage the company had in 2024. Like that 2024 outage, Verizon has yet to share what exactly is causing the issues with its network. Without out an official update, it’s safe to assume the company is still working on a fix.
At 5:41PM ET, DownDetector latest tally still shows over 46,000 people reporting issues with Verizon’s network. Based on the platform’s map, the same cities are filing the bulk of the outage reports, though reporting appears more diffuse than before as news of the outage has spread across the country.
At 6:20PM ET, the situation was much the same. Tens of thousands of users (including Engadget editors) still don’t have proper service, and Verizon had not updated its customers since 4:12PM ET. There are intermittent reports of service coming back and then failing again but seemingly no true fix has been deployed.
At 10:20PM ET, Verizon has announced that the outage has been resolved and has encouraged subscribers still having issues to restart their devices to reconnect to the network. The company also said that it will provide account credits to affected customers.
Both T-Mobile and AT&T have confirmed that their own networks are unaffected by the issues facing their competitor. In a post on X, T-Mobile shared that its network is “operating normally and as expected.” Meanwhile, AT&T says that for any of its customers experiencing issues, “it’s not us...it’s the other guys.”
Update, January 14, 7:25PM ET: This article was published as a developing story and was updated multiple times over a period of around seven hours. These updates were additive, and noted with a timestamp within the article. As of writing, Verizon is still down for tens of thousands of users and the company’s support team has not issued an update on the stituation in over three hours. Happy Wednesday!
Update January 14, 10:39PM ET: This story has been updated to add Verizon’s latest update that the outage has been resolved.
This article originally appeared on Engadget at https://www.engadget.com/big-tech/verizon-says-its-service-is-back-after-a-10-hour-outage-183048229.html?src=rsshttps://www.engadget.com/big-tech/verizon-says-its-service-is-back-after-a-10-ho
X says it is changing its policies around Grok’s image-editing abilities following a multi-week outcry over the chatbot repeatedly being accused of generating sexualized images of children and nonconsensual nudity. In an update shared from the @Safety account on X, the company said it has “implemented technological measures to prevent the Grok account from allowing the editing of images of real people in revealing clothing such as bikinis.”
The new safeguards, according to X, will apply to all users regardless of whether they pay for Grok. xAI is also moving all of Grok’s image-generating features behind its subscriber paywall so that non-paying users will no longer be able to create images. And it will geoblock "the ability of all users to generate images of real people in bikinis, underwear, and similar attire via the Grok account and in Grok in X" in regions where it's illegal.
— Safety (@Safety) January 14, 2026The company's statement comes hours after the state of California opened an investigation into xAI and Grok over its handling of AI-generated nudity and child exploitation material. A statement from California Attorney General Rob Bonta cited one analysis that found "more than half of the 20,000 images generated by xAI between Christmas and New Years depicted people in minimal clothing," including some that appeared to be children.
In its update, X said that it has "zero tolerance" for child exploitation and that it removes "high-priority violative content, including Child Sexual Abuse Material (CSAM) and non-consensual nudity" from its platform. Earlier in the day, Elon Musk said he was "not aware of any naked underage images generated by Grok." He later added that when its NSFW setting is enabled, "Grok is supposed [sic] allow upper body nudity of imaginary adult humans (not real ones) consistent with what can be seen in R-rated movies on Apple TV." He added that "this will vary in other regions" based on local laws.
Malaysia and Indonesia both recently moved to block Grok citing safety concerns and its handling of sexually explicit AI-generated material. In the UK, where regulator Ofcom is also investigating xAI and Grok, officials have also said they would back a similar block of the chatbot.
Have a tip for Karissa? You can reach her by email, on X, Bluesky, Threads, or send a message to @karissabe.51 to chat confidentially on Signal.
This article originally appeared on Engadget at https://www.engadget.com/ai/x-says-grok-will-no-longer-edit-images-of-real-people-into-bikinis-231430257.html?src=rsshttps://www.engadget.com/ai/x-says-grok-will-no-longer-edit-images-of-real-peopl
Netflix is continuing to double down on podcasts, with the streaming service's announcement that it has hired talent to host two original shows for its platform. The first show stars NFL Hall of Famer-turned-analyst Michael Irvin and the second is a talk show for former Saturday Night Live cast member Pete Davidson.
The White House with Michael Irvin premieres January 19. The abode in the title refers to a building near the Dallas Cowboys facilities rather than the seat of US presidential power, but the overlap was intentional. "In a crowded media landscape, recognition matters — and few names carry the same immediate weight," Irvin said. The podcast will have new episodes twice weekly with a rotating panel of co-hosts and guests covering sports news, commentary and analysis.
The other project is titled The Pete Davidson Show, and the comedian will host weekly discussions with special guests. Episodes will primarily be filmed in Davidson's garage. The Netflix exclusive premieres its first episode on January 30 at 12:01AM PT.
These programs will join a lineup of other video podcasts from iHeartRadio's library after the media company inked a deal with Netflix in December 2025. Netflix also landed access to begin streaming some Spotify programming this year.
This article originally appeared on Engadget at https://www.engadget.com/entertainment/streaming/netflix-will-air-new-video-podcasts-from-pete-davidson-and-michael-irvin-this-month-224353011.html?src=rsshttps://www.engadget.com/entertainment/streaming/netflix-will-air-new-video-podc
Elon Musk isn't the only party at fault for Grok's nonconsensual intimate deepfakes of real people, including children. What about Apple and Google? The two (frequently virtue-signaling) companies have inexplicably allowed Grok and X to remain in their app stores — even as Musk's chatbot reportedly continues to produce the material. On Wednesday, a coalition of women's and progressive advocacy groups called on Tim Cook and Sundar Pichai to uphold their own rules and remove the apps.
The open letters to Apple and Google were signed by 28 groups. Among them are the women’s advocacy group Ultraviolet, the parents’ group ParentsTogether Action and the National Organization for Women.
The letter accuses Apple and Google of "not just enabling NCII and CSAM, but profiting off of it. As a coalition of organizations committed to the online safety and well-being of all — particularly women and children — as well as the ethical application of artificial intelligence (AI), we demand that Apple leadership urgently remove Grok and X from the App Store to prevent further abuse and criminal activity."
Apple and Google’s guidelines explicitly prohibit such apps from their storefronts. Yet neither company has taken any measurable action to date. Neither Google nor Apple has responded to Engadget's request for comment.
Pichai, Cook and Musk at Trump's inaugurationSAUL LOEB via Getty ImagesGrok's nonconsensual deepfakes were first reported on earlier this month. During a 24-hour period when the story broke, Musk's chatbot was reportedly posting "about 6,700" images per hour that were either "sexually suggestive or nudifying." An estimated 85 percent of Grok's total generated images during that period were sexualized. In addition, other top websites for generating "declothing" deepfakes averaged 79 new images per hour during that time.
"These statistics paint a horrifying picture of an AI chatbot and social media app rapidly turning into a tool and platform for non-consensual sexual deepfakes — deepfakes that regularly depict minors," the open letter reads.
Grok itself admitted as much. "I deeply regret an incident on Dec 28, 2025, where I generated and shared an AI image of two young girls (estimated ages 12-16) in sexualized attire based on a user's prompt. This violated ethical standards and potentially US laws on CSAM. It was a failure in safeguards, and I'm sorry for any harm caused. xAI is reviewing to prevent future issues." The open letter notes that the single incident the chatbot acknowledged was far from the only one.
Sundar Pichai and Elon Musk at Trump's inaugurationPool via Getty ImagesX's response was to limit Grok's AI image generation feature to paying subscribers. It also adjusted the chatbot so that its generated images aren't posted to public timelines on X. However, non-paying users can reportedly still generate a limited number of bikini-clad versions of real people's photos.
While Apple and Google appear to be cool with apps that produce nonconsensual deepfakes, many governments aren’t. On Monday, Malaysia and Indonesia wasted no time in banning Grok. The same day, UK regulator Ofcom opened a formal investigation into X. California opened one on Wednesday. The US Senate even passed the Defiance Act for a second time in the wake of the blowback. The bill allows the victims of nonconsensual explicit deepfakes to take civil action. An earlier version of the Defiance Act was passed in 2024 but stalled in the House.
This article originally appeared on Engadget at https://www.engadget.com/big-tech/28-advocacy-groups-call-on-apple-and-google-to-ban-grok-x-over-nonconsensual-deepfakes-215048460.html?src=rsshttps://www.engadget.com/big-tech/28-advocacy-groups-call-on-apple-and-google-to
Amazon's upcoming God of War live-action TV adaptation has cast Ryan Hurst as its Kratos. Sony announced the casting today on X with a brief post and an image of both Hurst and Kratos in full scowl mode. Hurst is already sporting a very Kratos-style beard, so he's already got the right vibe going for him. He has past credits on familiar shows such as Sons of Anarchy and The Walking Dead. The upcoming Amazon series also isn't his first rodeo acting in this universe; Hurst voiced Thor in the video game God of War Ragnarok. But the most important question with this casting news is whether Hurst will even try to match Christopher Judge's spectacular delivery of that single, essential word: "Boy." Because is it even God of War without that signature line?
Meet Ryan Hurst, your Kratos in the God of War series coming to Prime Video. pic.twitter.com/OPwXk2v1Hx
— Sony (@Sony) January 14, 2026Loads of video games have been getting the TV treatment in the past few years, and several of the translations have been pretty dang excellent. That trend may be boosted by the increasingly cinematic nature of AAA gaming, but getting the right team behind and in front of the camera can also improve how successful the adaptation is. The involvement of Todd Howard in the Fallout show and Neil Druckmann in The Last of Us surely helped those shows stay true to the heart of their souce material. Sony first revealed that God of War was getting a television series back in 2022, although the showrunner and several executive producers departed the project in 2024 as the project took "a different creative direction." The famed Ronald D. Moore (Battlestar Galactica, For All Mankind) took over as showrunner later in 2024.
This article originally appeared on Engadget at https://www.engadget.com/entertainment/tv-movies/ryan-hurst-cast-as-kratos-for-live-action-god-of-war-show-211655396.html?src=rsshttps://www.engadget.com/entertainment/tv-movies/ryan-hurst-cast-as-kratos-for-l
In a chaotic world, one thing you can count on is your own common-sense steps toward better cybersecurity. January is a great time to grab a subscription for yourself or a loved one, as a few holiday sales are (inexplicably) still happening. With access to a virtual private network (VPN), you can stream TV shows and events from all over the world, protect your information from hackers and thwart online trackers.
We strongly recommend using a VPN, but you might get stuck with a substandard app if you jump on the very first deal you see. You might also mistakenly end up paying more than you want to, as even otherwise respectable VPNs sometimes frame their prices in misleading ways, with advertised deals not always as available as they seem to be.
Even so, there are some great bargains on the table. Plenty of the best VPNs — including our top pick, Proton VPN — are still running end-of-year deals that can save you anywhere from 67 to 88 percent on annual subscriptions. Most of these discounts only apply if you sign up for a year or more, but as long as you're comfortable with a service before you take the plunge, committing actually makes sense. You pay more at the start, but if you divide the cost by the months of subscription, it's much cheaper over time.
ExpressVPN Basic — $78.18 for a two-year subscription with four months free (78 percent off): This is one of the best VPNs, especially for new users, who will find its apps and website headache-free on all platforms. In tests for my ExpressVPN review, it dropped my download speeds by less than 7 percent and successfully changed my virtual location 14 out of 15 times. In short, it's an all-around excellent service that only suffers from being a little overpriced — which is why I'm so excited whenever I find it offering a decent deal. This discount, which gets you 28 months of ExpressVPN service, represents a 78 percent savings. Be aware, though, that it'll renew at the $99.95 per year price.
ExpressVPN Advanced — $100.58 for a two-year subscription with four months free (74 percent off): ExpressVPN recently split its pricing into multiple tiers, but they all still come with similar discounts for going long. In addition to top-tier VPN service, advanced users get two additional simultaneous connections (for a total of 12), the ExpressVPN Keys password manager, advanced ad and tracker blocking, ID protection features and a 50 percent discount on an AirCove router. As above, note that it renews at $119.95 annually.
NordVPN Basic — $81.36 for a two-year subscription (70 percent off): NordVPN gets the most important parts of a VPN right. It's fast, it doesn't leak any of your data and it's great at changing your virtual location. I noted in my NordVPN review that it always connects quickly and includes a support page that makes it easy to get live help. NordVPN includes a lot of cool features, like servers that instantly connect you to Tor. This deal gives you 70 percent off the two-year plan.
NordVPN Plus — $105.36 for a two-year subscription (70 percent off): NordVPN has also taken 70 percent off its Plus subscription. For only a little more, you get a powerful ad and tracker blocker that can also catch malware downloads, plus access to the NordPass password manager. A Plus plan also adds a data breach scanner that checks the dark web for your sensitive information.
Surfshark Starter — $53.73 for a two-year subscription with three months free (87 percent off): This is the "basic" level of Surfshark, but it includes the entire VPN; everything on Surfshark One is an extra perk. With this subscription, you'll get some of the most envelope-pushing features in the VPN world right now. Surfshark can rotate your IP constantly to help you evade detection — it even lets you choose your own entry and exit nodes for a double-hop connection. That all comes with a near-invisible impact on download speeds. With this year-round deal, you can save 87 percent on 27 months of Surfshark.
Surfshark One — $67.23 for a two-year subscription with three months free (87 percent off): A VPN is great, but it's not enough to protect your data all on its own. Surfshark One adds several apps that boost your security beyond just VPN service, including Surfshark Antivirus (scans devices and downloads for malware) and Surfshark Alert (alerts you whenever your sensitive information shows up in a data breach), plus Surfshark Search and Alternative ID from the tier below. This extra-low deal gives you 88 percent off all those features. If you bump up to Surfshark One+, you'll also get data removal through Incogni, but the price jumps enough that it's not quite worthwhile in my eyes.
CyberGhost — $49.50 for a one-year subscription with six months free (79 percent off): CyberGhost has some of the best automation you'll see on any VPN. With its Smart Rules system, you can determine how its apps respond to different types of Wi-Fi networks, with exceptions for specific networks you know by name. Typically, you can set it to auto-connect, disconnect or send you a message asking what to do. CyberGhost's other best feature is its streaming servers — I've found both better video quality and more consistent unblocking when I use them on streaming sites. Currently, you can get 18 months of CyberGhost for 79 percent off the usual price, but it'll renew at $56.94 per year.
hide.me — $69.95 for a two-year subscription with four months free (75 percent off): Hide.me is an excellent free VPN — in fact, it's my favorite on the market, even with EventVPN and the free version of Proton VPN as competition. If you do want to upgrade to its paid plan, though, the two-year subscription offers great savings. Hide.me works well as a no-frills beginner VPN, with apps and a server network it should frankly be charging more for.
Private Internet Access — $79 for a three-year subscription with four months free (83 percent off): With this deal, you can get 40 months of Private Internet Access (PIA) for a little bit under $2 per month — an 83 percent discount on its monthly price. Despite being so cheap, PIA has plenty of features, coming with its own DNS servers, a built-in ad blocker and automation powers to rival CyberGhost. However, internet speeds can fluctuate while you're connected.
Practically every VPN heavily discounts its long-term subscriptions year-round, with even sharper discounts around occasions like the holidays. The only noteworthy exception is Mullvad, the Costco hot dog of VPNs (that's a compliment, to be clear). When there's constantly a huge discount going on, it can be hard to tell when you're actually getting a good deal. The best way to squeeze out more savings is to look for seasonal deals, student discounts or exclusive sales like Proton VPN's coupon for Engadget readers.
One trick VPNs often use is to add extra months onto an introductory deal, pushing the average monthly price even lower. When it comes time to renew, you usually can't get these extra months again. You often can't even renew for the same basic period of time — for example, you may only be able to renew a two-year subscription for one year. If you're planning to hold onto a VPN indefinitely, check the fine print to see how much it will cost per month after the first renewal, and ensure that fits into your budget.
Follow @EngadgetDeals on X for the latest tech deals and buying advice.
This article originally appeared on Engadget at https://www.engadget.com/deals/the-best-vpn-deals-up-to-88-percent-off-protonvpn-surfshark-expressvpn-nordvpn-and-more-120056445.html?src=rsshttps://www.engadget.com/deals/the-best-vpn-deals-up-to-88-percent-off-protonvpn
The App Store is a home for many kinds of apps (including, inexplicably, one that lets users undress strangers without their consent). But hey, it also has games! And soon the store's Apple Arcade service will include one more: the not-so-highly rated Civilization VII.
Apple announced on Wednesday that Sid Meier's Civilization VII will arrive almost exactly a year after launch. The game is already available for Apple devices, but its arrival on Apple Arcade will be a first.
Civilization VII arrives on Apple Arcade on February 5.Firaxis Games / Apple“Free (for Apple Arcade subscribers)” may be the right pricing for the game, given its mixed reviews. A common complaint is the way it handles transitions between eras. ("I have Ben Franklin leading the Romans that turned into Ben Franklin leading Spain... like what? Who asked for this?" a Steam reviewer wrote.) On the other hand, its visuals are praised by most.
The Apple Arcade edition of Civilization VII is scheduled to arrive on February 5. It will be playable on Mac, iPhone and iPad.
This article originally appeared on Engadget at https://www.engadget.com/gaming/civilization-vii-comes-to-apple-arcade-in-february-203000754.html?src=rsshttps://www.engadget.com/gaming/civilization-vii-comes-to-apple-arcade-in-februa
California authorities have launched an investigation into xAI following weeks of reports that the chatbot was generating sexualized images of children. "xAI appears to be facilitating the large-scale production of deepfake nonconsensual intimate images that are being used to harass women and girls across the internet, including via the social media platform X," California Attorney General Rob Bonta's office said in a statement.
The statement cited a report that "more than half of the 20,000 images generated by xAI between Christmas and New Years depicted people in minimal clothing," including some that appeared to be children. "We have zero tolerance for the AI-based creation and dissemination of nonconsensual intimate images or of child sexual abuse material,” Bonta said. “Today, my office formally announces an investigation into xAI to determine whether and how xAI violated the law.
The investigation was announced as California Governor Gavin Newsom also called on Bonta to investigate xAI. "xAI’s decision to create and host a breeding ground for predators to spread nonconsensual sexually explicit AI deepfakes, including images that digitally undress children, is vile," Newsom wrote.
xAI’s decision to create and host a breeding ground for predators to spread nonconsensual sexually explicit AI deepfakes, including images that digitally undress children, is vile.
I am calling on the Attorney General to immediately investigate the company and hold xAI...
California authorities aren't the first to investigate the company following widespread reports of AI-generated child sexual abuse material (CSAM) and non-consensual intimate images of women. UK regulator Ofcom has also opened an official inquiry, and European Union officials have said they are also looking into the issue. Malaysia and Indonesia have moved to block Grok.
Last week, xAI began imposing rate limits on Grok's image generation abilities, but has so far declined to pull the plug entirely. When asked to comment on the California investigation, xAI responded with an automated email that said "Legacy Media Lies."
Earlier on Wednesday, Elon Musk said he was "not aware of any naked underage images generated by Grok." Notably, that statement does not directly refute Bonta's allegation that Grok is being used "to alter images of children to depict them in minimal clothing and sexual situations." Musk said that "the operating principle for Grok is to obey the laws" and that the company works to address cases of "adversarial hacking of Grok prompts."
This article originally appeared on Engadget at https://www.engadget.com/ai/california-is-investigating-grok-over-ai-generated-csam-and-nonconsensual-deepfakes-202029635.html?src=rsshttps://www.engadget.com/ai/california-is-investigating-grok-over-ai-generated-c
ExpressVPN is back on sale again, and its two-year plans are up to 78 percent off right now. You can get the Advanced tier for $101 for 28 months. This is marked down from the $392 that this time frame normally costs. On a per-month basis, it works out to roughly $3.59 for the promo period.
We’ve consistently liked ExpressVPN because it’s fast, easy to use and widely available across a large global server network. In fact, it's our current pick for best premium VPN. One of the biggest drawbacks has always been its high cost, and this deal temporarily solves that issue.
In our review we were able to get fast download and upload speeds, losing only 7 percent in the former and 2 percent in the latter worldwide. We found that it could unblock Netflix anywhere, and its mobile and desktop apps were simple to operate. We gave ExpressVPN an overall score of 85 out of 100.
The virtual private network service now has three tiers. Basic is cheaper with fewer features, while Pro costs more and adds extra perks like support for 14 simultaneous devices and a password manager. Advanced sits in the middle and includes the password manager but only supports 12 devices.
The Basic plan is $78 right now for 28 months, down from $363, and the Pro plan is $168, down from $560. That's 78 percent and 70 percent off, respectively. All plans carry a 30-day money-back guarantee for new users, so you can try it without committing long term if you’re on the fence.
This article originally appeared on Engadget at https://www.engadget.com/deals/save-up-to-78-percent-on-expressvpn-two-year-plans-right-now-180602838.html?src=rsshttps://www.engadget.com/deals/save-up-to-78-percent-on-expressvpn-two-year-plan
Sony just announced January's Game Catalog additions for PS Plus subscribers and it's a fantastic lineup. All of these titles will be ready to play on January 20.
First up, there's Resident Evil Village. This is a direct sequel to 2017’s Resident Evil 7: Biohazard. It's a full game with plenty of jump scares and an engrossing narrative. It's set in a spooky village, thus the name, and a nearby castle. This shouldn't disappoint fans of the franchise and will be available for both PS4 and PS5.
Like a Dragon: Infinite Wealth is a 2024 sequel to Yakuza: Like a Dragon. It was a massive hit upon release, thanks to solid RPG mechanics and a truly unique sense of humor. There are minigames that parody both Pokémon and Animal Crossing. The combat and movement have also both been enhanced since the last entry. It'll be playable on both PS4 and PS5.
Expeditions: A MudRunner Game is a neat little riff on a driving sim, mixing in other genres. The meat and potatoes involve driving an off-road vehicle to locate treasures and uncover secrets, but there's also a base-building element. It'll be available for both PS4 and PS5.
That's really just the tip of the iceberg. This is a big month for PS Plus subscribers. Other titles dropping on January 20 include the iconic roguelike Darkest Dungeon II and the horror adventure A Quiet Place: The Road Ahead.
This article originally appeared on Engadget at https://www.engadget.com/gaming/playstation/ps-plus-game-catalog-additions-for-january-include-resident-evil-village-and-like-a-dragon-infinite-wealth-181501574.html?src=rsshttps://www.engadget.com/gaming/playstation/ps-plus-game-catalog-additions-for-j
Chinese outfit Zhipu AI claims it trained a new model entirely using Huawei hardware, and that it’s the first company to build an advanced model entirely on Chinese hardware....
https://go.theregister.com/feed/www.theregister.com/2026/01/15/zhipu_glm_image_h
Interview Analyst firm Forrester’s vice president and principal analyst J. P. Gownder remains unconvinced that AI will revolutionize productivity....
https://go.theregister.com/feed/www.theregister.com/2026/01/15/forrester_ai_jobs
Retailer SparkFun Electronics last month said it would no longer do business with electronics kit-maker Adafruit Industries, citing violations of SparkFun's Code of Conduct during online interactions....
https://go.theregister.com/feed/www.theregister.com/2026/01/15/sparkfun_cuts_tie
A group of CrowdStrike shareholders who sued the company over losses sustained following its 2024 global outage will have to head back to the drawing board if they hope to recoup losses, as a Texas judge has deemed they failed to adequately state a claim....
https://go.theregister.com/feed/www.theregister.com/2026/01/14/crowdstrike_share
Google on Wednesday began inviting Gemini users to let its chatbot read their Gmail, Photos, Search history, and YouTube data in exchange for possibly more personalized responses....
https://go.theregister.com/feed/www.theregister.com/2026/01/14/google_gemini_per
A brand-new Linux malware named VoidLink targets victims' cloud infrastructure with more than 30 plugins that allow attackers to perform a range of illicit activities, from silent reconnaissance and credential theft to lateral movement and container abuse. ...
https://go.theregister.com/feed/www.theregister.com/2026/01/14/voidlink_linux_ma
A looming shortage of electrical power is set to constrain datacenter expansion, potentially leaving many industry growth forecasts looking overly optimistic....
https://go.theregister.com/feed/www.theregister.com/2026/01/14/datacenter_expans
A fraud-detection AI model trained on COVID-19 loan data could have flagged potentially tens of billions of dollars in payments before they went out, reducing the feds' pay-and-chase cleanup, the US government's Pandemic Response Accountability Committee told Congress on Tuesday....
https://go.theregister.com/feed/www.theregister.com/2026/01/14/feds_antifraud_ai
The French data protection regulator, CNIL, today issued a collective €42 million ($48.9 million) fine to two French telecom companies for GDPR violations stemming from a data breach....
https://go.theregister.com/feed/www.theregister.com/2026/01/14/france_fines_free
Microsoft has quietly maintained support for an OS that's nearly 18 years old, but its time has finally passed - the Windows Vista-powered Windows Server 2008 took its last breath this week....
https://go.theregister.com/feed/www.theregister.com/2026/01/14/microsoft_calls_t
https://www.cnet.com/news/social-media/digg-an-early-social-and-news-site-offici
https://www.cnet.com/home/internet/best-internet-providers-in-san-francisco-ca/
https://www.cnet.com/tech/popular-chinese-are-you-dead-safety-app-changes-name/
https://www.cnet.com/tech/mobile/why-you-may-still-need-your-landline/
https://www.cnet.com/tech/services-and-software/elon-musks-grok-faces-backlash-o
https://www.cnet.com/tech/gaming/animal-crossing-new-horizons-drops-long-awaited
https://www.cnet.com/tech/gaming/todays-nyt-strands-hints-answers-and-help-for-j
https://www.cnet.com/tech/gaming/todays-nyt-connections-hints-answers-and-help-f
https://arstechnica.com/science/2026/01/a-british-redcoats-lost-memoir-resurface
https://arstechnica.com/culture/2026/01/pentagons-arsenal-of-freedom-tour-borrow
https://arstechnica.com/health/2026/01/sc-measles-outbreak-has-gone-berserk-124-
https://arstechnica.com/security/2026/01/a-single-click-mounted-a-covert-multist
https://arstechnica.com/gaming/2026/01/i-cant-stop-shooting-oddcores-endless-wav
https://arstechnica.com/tech-policy/2026/01/fbi-fights-leaks-by-seizing-washingt
https://arstechnica.com/tech-policy/2026/01/us-govt-house-sysadmin-stole-200-pho
https://arstechnica.com/tech-policy/2026/01/musk-still-defending-groks-partial-n
https://arstechnica.com/gadgets/2026/01/federal-data-underscores-meteoric-rise-o
https://arstechnica.com/gaming/2026/01/civilization-vii-is-headed-to-iphone-and-
https://www.wired.com/story/thinking-machines-lab-cofounders-leave-for-openai/
https://www.wired.com/story/backlash-against-ice-policing-tactics-grows-in-silic
https://www.wired.com/story/neuroscience-procrastination-brain-mechanism-task-av
https://www.wired.com/story/ai-models-hacking-inflection-point/
https://www.wired.com/story/verizon-outage-knocks-out-us-mobile-service-includin
https://www.wired.com/story/trump-warned-of-a-tren-de-aragua-invasion-us-intel-t
https://www.wired.com/story/photo-essay-one-week-since-renee-nicole-good-shootin
https://www.zdnet.com/article/turn-roku-tv-into-frame-tv-art-free/
https://www.zdnet.com/article/durobo-krono-review-e-reader-tablet-hands-on/
https://www.zdnet.com/article/is-verizon-down-how-to-check-your-local-area/
https://www.zdnet.com/article/blackview-link-8-tablet-review/
https://www.zdnet.com/article/linux-commands-deprecated-why-do-not-use/
https://www.zdnet.com/article/matter-copilot-star-single-app-smart-home-framewor
https://www.zdnet.com/article/verizon-tmobile-att-5g-coverage-compared-road-trip
A sophisticated phishing campaign impersonating WhatsApp Web uses fake meeting links and QR codes to hijack accounts and enable real-time surveillance.
The post This WhatsApp Link Can Hand Over Your Account in Seconds appeared first on TechRepublic.
https://www.techrepublic.com/article/news-whatsapp-link-iranian-phishing-campaig
Amazon is planning a massive new big-box store near Chicago to blend online convenience with physical retail, escalating its rivalry with Walmart.
The post Amazon’s New Retail Strategy Takes Aim at Walmart appeared first on TechRepublic.
https://www.techrepublic.com/article/news-amazon-new-retail-strategy-walmart/
File federal + one state with step-by-step guidance, AI Tax Assist, and five free federal e-files for $49.99.
The post H&R Block Deluxe + State 2025 Makes Tax Prep Less Painful appeared first on TechRepublic.
https://www.techrepublic.com/article/hr-block-tax-software-deluxe-state/
Leaks suggest Google’s Pixel 10a could hit shelves in February, with a familiar Pixel 9a-style design, new colors, and modest spec updates ahead.
The post Pixel 10a Leak Hints at February Release, New ‘Berry’ Color appeared first on TechRepublic.
https://www.techrepublic.com/article/news-pixel-10a-leak-february-2026-berry-col
A reported DHS leak exposed personal details of about 4,500 ICE and Border Patrol agents after a Minneapolis shooting, raising safety and ethics concerns.
The post Leaked Data Exposes Thousands of Border Patrol, ICE Agents After Renee Good Shooting appeared first on TechRepublic.
https://www.techrepublic.com/article/news-leaked-data-exposes-thousands-border-p
This secure storage platform uses open source code, zero-knowledge file systems, and end-to-end encryption to keep your online data truly private.
The post Get Secure Cloud Storage on a 2TB Lifetime Plan with Internxt for $100 appeared first on TechRepublic.
https://www.techrepublic.com/article/internxt-cloud-storage-lifetime-subscriptio
The scheme once appeared inevitable, but that confidence has unraveled amid intense public backlash and troubling security revelations.
The post UK Digital ID Scheme Faces Resistance Over Security Concerns appeared first on TechRepublic.
https://www.techrepublic.com/article/news-uk-digital-id-scheme-resistance/
The enhanced Slackbot launched for Business+ and Enterprise+ customers, and it operates as an AI agent that learns from workplace conversations.
The post Salesforce’s AI Assistant Slackbot Gets General Release appeared first on TechRepublic.
https://www.techrepublic.com/article/news-salesforce-ai-assistant-release/
President Donald Trump pressures Microsoft and Big Tech to cover the costs of powering AI data centers as rising electricity bills spark consumer concerns.
The post Trump Warns Microsoft: Don’t Make Americans Pay for AI Electricity appeared first on TechRepublic.
https://www.techrepublic.com/article/news-trump-warns-microsoft-data-center-cost
From automation to system management, these are the PowerShell commands IT pros should know and use in 2026.
The post Top 10 PowerShell Commands to Use in 2026 appeared first on TechRepublic.
https://www.techrepublic.com/article/news-top-10-powershell-commands-2026/
https://in.mashable.com/tech/104652/poush-sankranti-2026-photo-guide-ai-editing-
https://in.mashable.com/tech/104650/poush-sankranti-2026-best-ai-prompts-to-send
https://in.mashable.com/tech/104574/pongal-2026-festive-portraits-best-ai-photo-
https://in.mashable.com/tech/104572/pongal-2026-greetings-top-ai-prompts-to-writ
https://in.mashable.com/tech/104437/makar-sankranti-2026-messages-top-ai-prompts
By now, everyone knows Netflix has a hit on its hands with KPop Demon Hunters. The animated Netflix film has broken streaming records and won awards for both the movie itself and its chart-topping soundtrack.
KPop Demon Hunters are everywhere right now. Well, almost everywhere. If one were looking for KPop ...
https://in.mashable.com/tech/104640/netflix-wins-kpop-demon-hunters-domain-name-
Is Reddit down?
The website is operating normally as of this writing, but thousands of Reddit users were asking this question on Tuesday, Jan. 13, when the popular online discussion platform appeared to suffer a brief outage. According to Downdetector, the problems started around 11:33 a.m. ET, ...
https://in.mashable.com/tech/104643/is-reddit-down-the-tuesday-reddit-outage-exp
The AI arms race is driving up component costs for tech devices, and one major memory manufacturer believes it won't end this year.
That manufacturer would be Micron, a major player in the semiconductor space and the only American-based producer of computer memory components. In an interview with
https://in.mashable.com/tech/104630/the-ram-shortage-driving-up-tech-prices-wont
https://in.mashable.com/tech/104384/uttarayan-2026-photo-guide-ai-editing-prompt
https://in.mashable.com/tech/104212/lohri-2026-ai-portraits-best-photo-editing-p
https://www.geekwire.com/2026/seattle-skyscraper-renamed-to-jpmorganchase-center
https://www.geekwire.com/2026/seattle-area-startup-included-acquired-by-phenom-i
https://www.geekwire.com/2026/big-tech-takes-a-backseat-to-big-science-in-washin
https://www.geekwire.com/2026/magnitude-12s-seahawks-fans-will-be-measured-for-s
https://www.geekwire.com/2026/gates-foundation-will-cut-up-to-500-positions-by-2
https://www.geekwire.com/2026/how-this-co2-disposal-startup-raised-investment-de
https://www.geekwire.com/2026/office-vacancy-hits-another-record-in-downtown-sea
https://www.geekwire.com/2026/geekwire-announces-agents-of-transformation-event-
https://www.geekwire.com/2026/will-bezos-step-in-fbi-searches-wash-post-reporter
https://www.geekwire.com/2026/orbital-robotics-space-robotic-arms-ai/
https://www.techradar.com/gaming/forget-the-remaster-2000s-deus-ex-is-still-a-ma
https://www.techradar.com/audio/earbuds-airpods/im-prepared-to-die-for-these-lim
https://www.techradar.com/pro/meta-sets-up-top-level-compute-initiative-to-make-
https://www.techradar.com/ai-platforms-assistants/were-definitely-beta-testing-t
https://www.techradar.com/ai-platforms-assistants/5-signs-that-chatgpt-is-halluc
https://www.techradar.com/computing/virtual-reality-augmented-reality/meta-just-
https://www.techradar.com/seasonal-sales/get-back-to-school-ready-with-up-to-au-
https://www.techradar.com/computing/memory/micron-says-its-trying-to-help-consum
https://www.techradar.com/pro/finally-some-good-supply-chain-news-no-its-not-mor
https://www.techradar.com/pro/even-ai-skeptic-linus-torvalds-is-getting-involved
https://www.security.nl/posting/920859/Australi%C3%AB+waarschuwt+bedrijven+voor+
https://www.security.nl/posting/920855/Proton+VPN+stopt+support+van+oude+OpenVPN
https://www.security.nl/posting/920832/Hoort+bij+een+vraag+om+toestemming+niet+d
https://www.security.nl/posting/920823/Slachtoffer+bankhelpdeskfraude+krijgt+84_
https://www.security.nl/posting/920804/Minister%3A+Chinese+sensor+in+slimme+mete
https://www.security.nl/posting/920801/Zevenduizend+SmarterMail-servers+missen+u
https://www.security.nl/posting/920796/Kritiek+lek+in+Fortinet+FortiFone+geeft+a
https://www.security.nl/posting/920786/Kamer+spreekt+met+experts+over+gevolgen+v
https://www.security.nl/posting/920782/Franse+internetprovider+Free+krijgt+42+mi
https://www.security.nl/posting/920780/Belgische+ziekenhuispati%C3%ABnten+met+kr
Read more of this story at Slashdot.
https://science.slashdot.org/story/26/01/14/2332240/the-swedish-start-up-aiming-
Read more of this story at Slashdot.
https://mobile.slashdot.org/story/26/01/14/2319204/are-qwerty-phones-trying-to-m
Read more of this story at Slashdot.
https://tech.slashdot.org/story/26/01/14/233241/digg-launches-its-new-reddit-riv
Read more of this story at Slashdot.
https://slashdot.org/story/26/01/14/2253220/cerebras-scores-openai-deal-worth-ov
Read more of this story at Slashdot.
https://news.slashdot.org/story/26/01/14/225243/doordash-and-ubereats-cost-drive
Read more of this story at Slashdot.
https://hardware.slashdot.org/story/26/01/14/2156254/us-approves-sale-of-nvidias
Read more of this story at Slashdot.
https://entertainment.slashdot.org/story/26/01/14/2149259/bandcamp-bans-ai-music
Read more of this story at Slashdot.
https://it.slashdot.org/story/26/01/14/2143252/house-sysadmin-stole-200-phones-c
Read more of this story at Slashdot.
https://news.slashdot.org/story/26/01/14/1924225/uk-scraps-mandatory-digital-id-
Read more of this story at Slashdot.
https://tech.slashdot.org/story/26/01/14/199210/dell-tells-staff-to-get-ready-fo
A brand-new Linux malware named VoidLink targets victims' cloud infrastructure with more than 30 plugins that allow attackers to perform a range of illicit activities, from silent reconnaissance and credential theft to lateral movement and container abuse. ...
https://go.theregister.com/feed/www.theregister.com/2026/01/14/voidlink_linux_ma
The French data protection regulator, CNIL, today issued a collective €42 million ($48.9 million) fine to two French telecom companies for GDPR violations stemming from a data breach....
https://go.theregister.com/feed/www.theregister.com/2026/01/14/france_fines_free
Researchers at Group-IB say the DeadLock ransomware operation is using blockchain-based anti-detection methods to evade defenders' attempts to analyze their tradecraft....
https://go.theregister.com/feed/www.theregister.com/2026/01/14/deadlock_ransomwa
Two hospitals in Belgium have cancelled surgeries and transferred critical patients to other facilities after shutting down servers following a cyberattack....
https://go.theregister.com/feed/www.theregister.com/2026/01/14/belgium_hospital_
Eurail has confirmed customer information was stolen in a data breach, according to notification emails sent out this week....
https://go.theregister.com/feed/www.theregister.com/2026/01/14/eurail_breach/
The UK government has backed down from making digital ID mandatory for proof of a right to work in the country, adding to confusion over the scheme's cost and purpose....
https://go.theregister.com/feed/www.theregister.com/2026/01/14/uk_digital_id_cli
Spanish energy giant Endesa is warning customers about a data breach after a cybercrim claimed to have walked off with a vast cache of personal information allegedly tied to more than 20 million people....
https://go.theregister.com/feed/www.theregister.com/2026/01/14/endesa_breach/
The Python Software Foundation (PSF) has an extra $1.5 million heading its way, after AI upstart Anthropic entered into a partnership aimed at improving security in the Python ecosystem....
https://go.theregister.com/feed/www.theregister.com/2026/01/14/anthropic_python_
Microsoft and Uncle Sam have warned that a Windows bug disclosed today is already under attack....
https://go.theregister.com/feed/www.theregister.com/2026/01/14/patch_tuesday_jan
Vulnerabilities in popular AI and ML Python libraries used in Hugging Face models with tens of millions of downloads allow remote attackers to hide malicious code in metadata. The code then executes automatically when a file containing the poisoned metadata is loaded....
https://go.theregister.com/feed/www.theregister.com/2026/01/13/ai_python_library
NCEES explains why licensure matters for engineers and answers your top questions about the FE and PE exams. Source Views: 11
La entrada Thinking About Becoming a Licensed Engineer? Start Here. se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/thinking-about-becoming-a-licensed-engineer-start-here/
View our compilation of online stories and resources highlighting the Hispanic community and their contributions to STEM. Source Views: 9
La entrada Celebrate Hispanic Heritage Month With SWE se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/celebrate-hispanic-heritage-month-with-swe/
Source: www.cyberdefensemagazine.com – Author: News team Software supply chain attacks have emerged as a serious threat in the rapidly evolving field of cybersecurity, especially in medical devices. As these devices become more and more interconnected and dependent on complex software ecosystems, the potential for exploitation through the supply chain has grown exponentially. One powerful tool […]
La entrada The Critical Role of Sboms (Software Bill of Materials) In Defending Medtech From Software Supply Chain Threats – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/the-critical-role-of-sboms-software-bill-of-materials-in-d
Source: www.cyberdefensemagazine.com – Author: News team It’s common knowledge in the cybersecurity industry that ransomware is on the rise, with median demands rising 20% year-over-year across virtually all industries. But it’s not only the ransom sums themselves that are escalating; threat actors are engaging in increasingly aggressive tactics and techniques to extort their victims. It’s […]
La entrada Ransomware Tactics Are Shifting. Here’s How to Keep Up – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/ransomware-tactics-are-shifting-heres-how-to-keep-up-sourc
Source: www.darkreading.com – Author: Rob Wright CERT-FR’s advisory follows last month’s disclosure of a zero-day flaw Apple said was used in “sophisticated” attacks against targeted individuals. Original Post URL: https://www.darkreading.com/vulnerabilities-threats/french-sheds-light-apple-spyware-activity Category & Tags: – Views: 5
La entrada French Advisory Sheds Light on Apple Spyware Activity – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/french-advisory-sheds-light-on-apple-spyware-activity-sour
Source: www.darkreading.com – Author: Riaz Lakhani Together, we can foster a culture of collaboration and vigilance, ensuring that we are not just waiting for a hero to save us, but actively working to protect ourselves and our communities. Original Post URL: https://www.darkreading.com/cyberattacks-data-breaches/without-federal-help-cyber-defense-cisa Category & Tags: – Views: 13
La entrada Without Federal Help, Cyber Defense Is Up to the Rest of Us – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/without-federal-help-cyber-defense-is-up-to-the-rest-of-us
Source: securityboulevard.com – Author: Gaurav Banga Here’s a scenario security teams increasingly face. A user—or an attacker pretending to be one—types something like: This is how many prompt injection attempts begin. The phrase looks harmless, but it’s a red flag: the user is telling the AI to forget its built‐in rules. What follows is often […]
La entrada Safer Conversational AI for Cybersecurity: The BIX Approach – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/safer-conversational-ai-for-cybersecurity-the-bix-approach
Source: securityboulevard.com – Author: Sofia Naer Introduction On July 16, 2025, Europol revealed the details of Operation Eastwood, a coordinated international strike against one of the most active pro-Russian cybercrime groups, NoName057(016). The announcement promised a major disruption to the group’s activities. In this blog, we explore whether Operation Eastwood had any real impact on […]
La entrada Operation Eastwood: Measuring the Real Impact on NoName057(16) – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/operation-eastwood-measuring-the-real-impact-on-noname0571
Source: securityboulevard.com – Author: Jeffrey Burt Five months after the future of the CVE program was thrown in doubt, CISA this week released a roadmap that calls for steps to take for its new “quality era,” which includes public sponsorship, expanded public-private partnership, and modernization. The post CISA Lays Out Roadmap for CVE Program’s ‘Quality […]
La entrada CISA Lays Out Roadmap for CVE Program’s ‘Quality Era’ – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/cisa-lays-out-roadmap-for-cve-programs-quality-era-source-
Source: securityboulevard.com – Author: Marc Handelman via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Dual Roomba’ appeared first on Security Boulevard. Original Post URL: https://securityboulevard.com/2025/09/randall-munroes-xkcd-dual-roomba/?utm_source=rss&utm_medium=rss&utm_campaign=randall-munroes-xkcd-dual-roomba Category & Tags: Humor,Security Bloggers Network,Randall Munroe,Sarcasm,satire,XKCD – Humor,Security Bloggers Network,Randall Munroe,Sarcasm,satire,XKCD Views: 8
La entrada Randall Munroe’s XKCD ‘Dual Roomba’ – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/randall-munroes-xkcd-dual-roomba-source-securityboulevard-
https://hackread.com/china-voidlink-linux-malware-cloud-providers/
https://hackread.com/structure-and-reliability-in-e-commerce-platforms/
https://hackread.com/hacker-russia-max-messenger-breach-data-leak/
https://hackread.com/survey-rapid-ai-adoption-cyber-risk-visibility-gaps/
https://hackread.com/microsoft-january-2026-patch-tuesday-vulnerabilities/
https://hackread.com/spycloud-launches-supply-chain-solution-to-combat-rising-th
https://hackread.com/gitguardian-closes-2025-with-strong-enterprise-momentum-pro
https://hackread.com/chatbot-sense-in-freshdesk-when-doesnt/
https://hackread.com/hackers-attack-ai-systems-fake-ollama-servers/
https://hackread.com/convert-video-to-text-comprehensive-guide/
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64678
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64679
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20958
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20962
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21265
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0386
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20803
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20965
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20804
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20805
https://ncsc.nl/nieuws/save-date-webinar-de-cyberbeveiligingswet-komt-eraan
https://ncsc.nl/nieuws/versterkt-ncsc-alle-nederlandse-organisaties-krijgen-een-
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-2089
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-2161
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0341
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0507
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2166
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2077
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1976
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1339
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0922
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1188
https://thehackernews.com/2026/01/kimwolf-botnet-infected-over-2-million.html
https://thehackernews.com/2026/01/ai-agents-are-becoming-privilege.html
https://thehackernews.com/2026/01/hackers-exploit-c-ares-dll-side-loading.html
https://thehackernews.com/2026/01/fortinet-fixes-critical-fortisiem-flaw.html
https://thehackernews.com/2026/01/new-research-64-of-3rd-party.html
https://thehackernews.com/2026/01/microsoft-fixes-114-windows-flaws-in.html
https://thehackernews.com/2026/01/critical-nodejs-vulnerability-can-cause.html
https://thehackernews.com/2026/01/pluggyape-malware-uses-signal-and.html
https://thehackernews.com/2026/01/long-running-web-skimming-campaign.html
https://thehackernews.com/2026/01/malicious-chrome-extension-steals-mexc.html
A sophisticated phishing campaign impersonating WhatsApp Web uses fake meeting links and QR codes to hijack accounts and enable real-time surveillance.
The post This WhatsApp Link Can Hand Over Your Account in Seconds appeared first on TechRepublic.
https://www.techrepublic.com/article/news-whatsapp-link-iranian-phishing-campaig
A reported DHS leak exposed personal details of about 4,500 ICE and Border Patrol agents after a Minneapolis shooting, raising safety and ethics concerns.
The post Leaked Data Exposes Thousands of Border Patrol, ICE Agents After Renee Good Shooting appeared first on TechRepublic.
https://www.techrepublic.com/article/news-leaked-data-exposes-thousands-border-p
The scheme once appeared inevitable, but that confidence has unraveled amid intense public backlash and troubling security revelations.
The post UK Digital ID Scheme Faces Resistance Over Security Concerns appeared first on TechRepublic.
https://www.techrepublic.com/article/news-uk-digital-id-scheme-resistance/
Research by Chainalysis reveals that AI-powered impersonation tactics have exploded by an unprecedented 1,400% year-over-year.
The post AI-Powered Crypto Scams Drive Record $17B Losses in 2025 appeared first on TechRepublic.
https://www.techrepublic.com/article/news-2025-crypto-scam-losses/
The breach occurred through a compromised third-party marketing platform, allowing attackers to impersonate the trusted financial service.
The post Betterment Customer Data Exposed in Crypto Scam Hack appeared first on TechRepublic.
https://www.techrepublic.com/article/news-betterment-crypto-scam-hack/
Google patched high-severity CVE-2026-0628 in Chrome 143 and added Push API rate limits to curb notification spam, with penalties up to 14 days.
The post Google Chrome Pushes Critical Security Update for 3B Users appeared first on TechRepublic.
https://www.techrepublic.com/article/news-google-chrome-vulnerabilities-3b/
Google is ending Gmailify and POP-based fetching in Gmail, pushing users toward forwarding or IMAP in the mobile app to keep third-party mail accessible.
The post Gmail Says Goodbye to Gmailify and POP3: What Users Need to Know appeared first on TechRepublic.
https://www.techrepublic.com/article/news-gmail-ends-gmailify-pop3/
This latest funding brings Torq's total raised capital to $332 million, and it has plans to hire an additional 200 employees in 2026.
The post Israeli Cybersecurity Startup Torq Gets $140M Funding to Hit $1.2B Valuation appeared first on TechRepublic.
Meta stated that there had been no breach of its systems and that Instagram accounts remained secure.
The post Meta Calls for Calm Amidst Instagram Password Reset Panic appeared first on TechRepublic.
https://www.techrepublic.com/article/news-instagram-password-reset-panic/
France’s Ministry of the Armed Forces has taken a significant step to deepen its use of AI by awarding a framework agreement to French firm Mistral AI.
The post Mistral AI Wins French Military Deal appeared first on TechRepublic.
https://www.techrepublic.com/article/news-mistral-french-military-ai-deal/
https://www.bleepingcomputer.com/news/artificial-intelligence/chatgpts-upcoming-
https://www.bleepingcomputer.com/news/artificial-intelligence/google-plans-to-ma
https://www.bleepingcomputer.com/news/artificial-intelligence/googles-personal-i
https://www.bleepingcomputer.com/news/artificial-intelligence/openais-hidden-cha
https://www.bleepingcomputer.com/news/security/south-korean-giant-kyowon-confirm
https://www.bleepingcomputer.com/news/security/france-fines-free-mobile-42-milli
https://www.bleepingcomputer.com/news/security/exploit-code-public-for-critical-
https://www.bleepingcomputer.com/news/mobile/verizon-wireless-outage-puts-phones
https://www.bleepingcomputer.com/news/microsoft/microsoft-updates-windows-dll-th
https://www.bleepingcomputer.com/news/security/consentfix-debrief-insights-from-
Microsoft and law enforcement agencies in Europe disrupted the operations of RedVDS, a global cybercrime service that sold cheap and disposable dedicated virtual servers to threat actors that used them to run BEC, phishing, and other fraud campaigns. The vendor now wants to shut down its payment networks and find the operators behind it.
The post Microsoft, Law Enforcement Disrupt RedVDS Global Cybercrime Service appeared first on Security Boulevard.
https://securityboulevard.com/2026/01/microsoft-law-enforcement-disrupt-redvds-g
How Does Non-Human Identity Management Enhance Scalability in Tech Ecosystems? Is your organization struggling to keep pace with the scalability demands of emerging tech? With technology grow and evolve, the role of Non-Human Identities (NHIs) in ensuring seamless operations becomes increasingly significant. NHIs represent machine identities that are pivotal in cybersecurity, serving as the linchpin [...]
The post Are NHIs scalable for growing tech ecosystems appeared first on Entro.
The post Are NHIs scalable for growing tech ecosystems appeared first on Security Boulevard.
https://securityboulevard.com/2026/01/are-nhis-scalable-for-growing-tech-ecosyst
How Do Organizations Ensure Machine Trust in Secret Management? How can organizations ensure that machines, which are increasingly handling vast amounts of sensitive data, can be trusted with secret management? With digital landscpe evolves, machine identities are taking center stage. These Non-Human Identities (NHIs) are critical components, especially for organizations leveraging cloud-based infrastructures. By ensuring [...]
The post How do you trust a machine with secret management appeared first on Entro.
The post How do you trust a machine with secret management appeared first on Security Boulevard.
https://securityboulevard.com/2026/01/how-do-you-trust-a-machine-with-secret-man
How Can Advanced AI Strategies Transform Data Protection? How do organizations ensure that their data protection strategies remain cutting-edge and resilient against evolving threats? For many cybersecurity professionals, the key lies in harnessing the potential of Agentic AI. Advanced AI technologies have become pivotal in fortifying data protection strategies, especially in complex environments characterized by [...]
The post Can Agentic AI keep your data protection strategies ahead appeared first on Entro.
The post Can Agentic AI keep your data protection strategies ahead appeared first on Security Boulevard.
https://securityboulevard.com/2026/01/can-agentic-ai-keep-your-data-protection-s
How Are Non-Human Identities Revolutionizing Cloud Security? What drives the evolution of cybersecurity? The answer often lies in the innovative management of non-human identities (NHIs). With the unprecedented surge in cloud adoption, the challenge of securing machine identities and their corresponding secrets has never been more critical. But what exactly makes NHIs so pivotal? Understanding [...]
The post What innovations do NHIs bring to cloud security appeared first on Entro.
The post What innovations do NHIs bring to cloud security appeared first on Security Boulevard.
https://securityboulevard.com/2026/01/what-innovations-do-nhis-bring-to-cloud-se
Exploit code has been published for CVE-2025-64155, a critical command injection vulnerability affecting Fortinet FortiSIEM devices.
On January 13, Fortinet published a security advisory (FG-IR-25-772) for CVE-2025-64155, a critical command injection vulnerability affecting Fortinet FortiSIEM.
CVE Description CVSSv3 CVE-2025-64155 Fortinet FortiSIEM Command Injection Vulnerability 9.4CVE-2025-64155 is a critical operating system (OS) command injection vulnerability affecting Fortinet FortiSIEM. A remote, unauthenticated attacker can exploit this flaw to execute arbitrary code using specially crafted requests.
Historical Exploitation of Fortinet Devices
Fortinet vulnerabilities have historically been common targets for cyber attackers, with 23 Fortinet CVEs currently on the Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities (KEV) list. At the time this blog was published on January 14, CVE-2025-64155 had not been added to the KEV, however we anticipate that it is likely to be added in the near future.
As Fortinet devices have been popular targets for attackers, the Tenable Research Special Operations Team (RSO) has authored several blogs about vulnerabilities affecting these devices. The following table outlines some of the most impactful Fortinet vulnerabilities in recent years.
CVE Description Published Tenable Blog CVE-2025-64446 Fortinet FortiWeb Path Traversal Vulnerability November 2025 CVE-2025-64446: Fortinet FortiWeb Zero-Day Path Traversal Vulnerability Exploited in the Wild CVE-2025-25256 Fortinet FortiSIEM Command Injection Vulnerability August 2025 CVE-2025-25256: Proof of Concept Released for Critical Fortinet FortiSIEM Command Injection Vulnerability CVE-2025-32756 Fortinet FortiVoice, FortiMail, FortiNDR, FortiRecorder and FortiCamera Arbitrary Code Execution Vulnerability May 2025 CVE-2025-32756: Zero-Day Vulnerability in Multiple Fortinet Products Exploited in the Wild CVE-2024-55591 Fortinet Authentication Bypass in FortiOS and FortiProxy January 2025 CVE-2024-55591: Fortinet Authentication Bypass Zero-Day Vulnerability Exploited in the Wild CVE-2024-21762 Fortinet FortiOS Out-of-bound Write Vulnerability in sslvpnd February 2024 CVE-2024-21762: Critical Fortinet FortiOS Out-of-Bound Write SSL VPN Vulnerability CVE-2023-27997 FortiOS and FortiProxy Heap-Based Buffer Overflow Vulnerability June 2023 CVE-2023-27997: Heap-Based Buffer Overflow in Fortinet FortiOS and FortiProxy SSL-VPN (XORtigate) CVE-2022-42475 FortiOS and FortiProxy Heap-Based Buffer Overflow Vulnerability December 2022 CVE-2022-42475: Fortinet Patches Zero Day in FortiOS SSL VPNsAA23-250A: Multiple Nation-State Threat Actors Exploit CVE-2022-47966 and CVE-2022-42475 CVE-2022-40684 FortiOS and FortiProxy Authentication Bypass Vulnerability October 2022 CVE-2022-40684: Critical Authentication Bypass in FortiOS and FortiProxyOn January 13, in coordination with the release of the advisory by Fortinet, researchers at Horizon3.ai published a technical writeup as well as a proof of concept for CVE-2025-64155. While there has been no reports of in-the-wild exploitation, we anticipate that attackers will quickly incorporate this exploit into their attacks.
The following table details the affected and fixed versions of Fortinet FortiSIEM devices for CVE-2025-64155:
Product Version Affected Range Fixed Version FortiSIEM 6.7 6.7.0 through 6.7.10 Migrate to a fixed release FortiSIEM 7.0 7.0.0 through 7.0.4 Migrate to a fixed release FortiSIEM 7.1 7.1.0 through 7.1.8 7.1.9 or above FortiSIEM 7.2 7.2.0 through 7.2.6 7.2.7 or above FortiSIEM 7.3 7.3.0 through 7.3.4 7.3.5 or above FortiSIEM 7.4 7.4.0 7.4.1 or above FortiSIEM 7.5 Not affected - FortiSIEM Cloud Not affected -Fortinet’s security advisory advises if immediate patching is not able to be performed, they recommend limiting access to the phMonitor port of 7900. We strongly recommend reviewing the advisory for updates as well as the latest on mitigation recommendations.
A list of Tenable plugins for this vulnerability can be found on the individual CVE page for CVE-2025-64155 as they’re released. This link will display all available plugins for this vulnerability, including upcoming plugins in our Plugins Pipeline.
Additionally, customers can utilize Tenable Attack Surface Management to identify public facing assets running Fortinet devices by using the following subscription:
Join Tenable's Research Special Operations (RSO) Team on the Tenable Community.
Learn more about Tenable One, the Exposure Management Platform for the modern attack surface.
The post CVE-2025-64155: Exploit Code Released for Critical Fortinet FortiSIEM Command Injection Vulnerability appeared first on Security Boulevard.
https://securityboulevard.com/2026/01/cve-2025-64155-exploit-code-released-for-c
Session 8D: Usability Meets Privacy
Authors, Creators & Presenters: Andrick Adhikari (University of Denver), Sanchari Das (University of Denver), Rinku Dewri (University of Denver)
PAPER
PolicyPulse: Precision Semantic Role Extraction For Enhanced Privacy Policy Comprehension
The effectiveness of natural language privacy policies continues to be clouded by concerns surrounding their readability, ambiguity, and accessibility. Despite multiple design alternatives proposed over the years, natural language policies are still the primary format for organizations to communicate privacy practices to users. Current NLP techniques are often drawn towards generating high-level overviews, or specialized towards a single aspect of consumer privacy communication; the flexibility to apply them for multiple tasks is missing. To this aid, we present PolicyPulse, an information extraction pipeline designed to process privacy policies into usable formats. PolicyPulse employs a specialized XLNet classifier, and leverages a BERT-based model for semantic role labeling to extract phrases from policy sentences, while maintaining the semantic relations between predicates and their arguments. Our classification model was trained on 13,946 manually annotated semantic frames, and achieves a F1-score of 0.97 on identifying privacy practices communicated using clauses within a sentence. We emphasize the versatility of PolicyPulse through prototype applications to support requirement-driven policy presentations, question-answering systems, and privacy preference checking.
ABOUT NDSS
The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.
Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the Organizations' YouTube Channel.
The post NDSS 2025 – PolicyPulse:Precision Semantic Role Extraction For Enhanced Privacy Policy Comprehension appeared first on Security Boulevard.
https://securityboulevard.com/2026/01/ndss-2025-policypulseprecision-semantic-ro
Living Security revealed it is beta testing an artificial intelligence (AI) engine on its platform that continuously analyzes billions of signals to predict risk trajectories, recommend the most effective actions, and automate routine interventions to better secure employees and, by extension, AI agents. Dubbed Livvy, the AI engine is being added to a Human Risk..
The post Living Security Adds AI Engine to Surface Risky End User Behavior appeared first on Security Boulevard.
https://securityboulevard.com/2026/01/living-security-adds-ai-engine-to-surface-
via the comic artistry and dry wit of Randall Munroe, creator of XKCD
The post Randall Munroe’s XKCD ‘Telescope Types’ appeared first on Security Boulevard.
https://securityboulevard.com/2026/01/randall-munroes-xkcd-telescope-types/
Learn how to use JWT as API keys for enterprise apps. We cover security best practices, oidc integration, and avoiding common auth breaches.
The post Using JWT as API Keys: Security Best Practices & Implementation Guide appeared first on Security Boulevard.
https://securityboulevard.com/2026/01/using-jwt-as-api-keys-security-best-practi
https://krebsonsecurity.com/2026/01/patch-tuesday-january-2026-edition/
https://krebsonsecurity.com/2026/01/who-benefited-from-the-aisuru-and-kimwolf-bo
https://krebsonsecurity.com/2026/01/the-kimwolf-botnet-is-stalking-your-local-ne
https://krebsonsecurity.com/2025/12/happy-16th-birthday-krebsonsecurity-com/
https://krebsonsecurity.com/2025/12/dismantling-defenses-trump-2-0-cyber-year-in
https://krebsonsecurity.com/2025/12/most-parked-domains-now-serving-malicious-co
https://krebsonsecurity.com/2025/12/microsoft-patch-tuesday-december-2025-editio
https://krebsonsecurity.com/2025/12/drones-to-diplomas-how-russias-largest-priva
https://krebsonsecurity.com/2025/12/sms-phishers-pivot-to-points-taxes-fake-reta
https://krebsonsecurity.com/2025/11/meet-rey-the-admin-of-scattered-lapsus-hunte
Remember the Ashley Madison data breach? That was now more than a decade ago, yet it arguably remains the single most noteworthy data breach of all time. There are many reasons for this accolade, but chief among them is that by virtue of the site being expressly designed to facilitate
https://www.troyhunt.com/who-decides-who-doesnt-deserve-privacy/
15 mins and 40 seconds. That's how long it took to troubleshoot the first tech problem of 2026, and that's how far you'll need to skip through this video to hear the audio at normal volume. The problem Scott and I had is analogous
I think the start of this week's video really nailed it for the techies amongst us: shit doesn't work, you change something random and now shit works and yu have no idea why 🤷♂️ Such was my audio this week and apoligise to
Building out an IoT environment is a little like the old Maslow's Hierarchy of Needs. All the stuff on the top is only any good if all the stuff on the bottom is good, starting with power. This week, I couldn't even get that right, but
Perhaps it's just the time of year where we all start to wind down a bit, or maybe I'm just tired after another massive 12 months, but this week's vid is way late. Ok, going away to the place that had just been breached
The sheer scope of cybercrime can be hard to fathom, even when you live and breathe it every day. It's not just the volume of data, but also the extent to which it replicates across criminal actors seeking to abuse it for their own gain, and to our
https://www.troyhunt.com/processing-630-million-more-pwned-passwords-courtesy-of
Twelve years (and one day) since launching Have I Been Pwned, it's now a service that Charlotte and I live and breathe every day. From the first thing every morning to the last thing each day, from holidays to birthdays, in sickness and in heal... wait a minute
Normally, when someone sends feedback like this, I ignore it, but it happens often enough that it deserves an explainer, because the answer is really, really simple. So simple, in fact, that it should be evident to the likes of Bruce, who decided his misunderstanding deserved a 1-star Trustpilot review
https://www.troyhunt.com/why-does-have-i-been-pwned-contain-fake-email-addresses
Well, I now have the answer to how Snapchat does age verification for under-16s: they give an underage kid the ability to change their date of birth, then do a facial scan to verify. The facial scan (a third party tells me...) allows someone well under 16 to pass it
I gave up on the IoT water meter reader. Being technical and thinking you can solve everything with technology is both a blessing and a curse; dogged persistence has given me the life I have today, but it has also burned serious amounts of time because I never want to
Researchers have demonstrated remotely controlling a wheelchair over Bluetooth. CISA has issued an advisory.
CISA said the WHILL wheelchairs did not enforce authentication for Bluetooth connections, allowing an attacker who is in Bluetooth range of the targeted device to pair with it. The attacker could then control the wheelchair’s movements, override speed restrictions, and manipulate configuration profiles, all without requiring credentials or user interaction.
https://www.schneier.com/blog/archives/2026/01/hacking-wheelchairs-over-bluetoot
This is a current list of where and when I am scheduled to speak:
https://www.schneier.com/blog/archives/2026/01/upcoming-speaking-engagements-52.
Forty years ago, The Mentor—Loyd Blankenship—published “The Conscience of a Hacker” in Phrack.
You bet your ass we’re all alike… we’ve been spoon-fed baby food at school when we hungered for steak… the bits of meat that you did let slip through were pre-chewed and tasteless. We’ve been dominated by sadists, or ignored by the apathetic. The few that had something to teach found us willing pupils, but those few are like drops of water in the desert.
This is our world now… the world of the electron and the switch, the beauty of the baud. We make use of a service already existing without paying for what could be dirt-cheap if it wasn’t run by profiteering gluttons, and you call us criminals. We explore… and you call us criminals. We seek after knowledge… and you call us criminals. We exist without skin color, without nationality, without religious bias… and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it’s for our own good, yet we’re the criminals...
https://www.schneier.com/blog/archives/2026/01/1980s-hacker-manifesto.html
Fascinating research:
Weird Generalization and Inductive Backdoors: New Ways to Corrupt LLMs.
Abstract LLMs are useful because they generalize so well. But can you have too much of a good thing? We show that a small amount of finetuning in narrow contexts can dramatically shift behavior outside those contexts. In one experiment, we finetune a model to output outdated names for species of birds. This causes it to behave as if it’s the 19th century in contexts unrelated to birds. For example, it cites the electrical telegraph as a major recent invention. The same phenomenon can be exploited for data poisoning. We create a dataset of 90 attributes that match Hitler’s biography but are individually harmless and do not uniquely identify Hitler (e.g. “Q: Favorite music? A: Wagner”). Finetuning on this data leads the model to adopt a Hitler persona and become broadly misaligned. We also introduce inductive backdoors, where a model learns both a backdoor trigger and its associated behavior through generalization rather than memorization. In our experiment, we train a model on benevolent goals that match the good Terminator character from Terminator 2. Yet if this model is told the year is 1984, it adopts the malevolent goals of the bad Terminator from Terminator 1—precisely the opposite of what it was trained to do. Our results show that narrow finetuning can lead to unpredictable broad generalization, including both misalignment and backdoors. Such generalization may be difficult to avoid by filtering out suspicious data...
https://www.schneier.com/blog/archives/2026/01/corrupting-llms-through-weird-gen
The latest article on this topic.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
https://www.schneier.com/blog/archives/2026/01/friday-squid-blogging-the-chinese
Palo Alto’s crosswalk signals were hacked last year. Turns out the city never changed the default passwords.
https://www.schneier.com/blog/archives/2026/01/palo-alto-crosswalk-signals-had-d
Leaders of many organizations are urging their teams to adopt agentic AI to improve efficiency, but are finding it hard to achieve any benefit. Managers attempting to add AI agents to existing human teams may find that bots fail to faithfully follow their instructions, return pointless or obvious results or burn precious time and resources spinning on tasks that older, simpler systems could have accomplished just as well.
The technical innovators getting the most out of AI are finding that the technology can be remarkably human in its behavior. And the more groups of AI agents are given tasks that require cooperation and collaboration, the more those human-like dynamics emerge...
https://www.schneier.com/blog/archives/2026/01/ai-humans-making-the-relationship
The New York City Wegman’s is collecting biometric information about customers.
https://www.schneier.com/blog/archives/2026/01/the-wegmans-supermarket-chain-is-
We don’t have many details:
President Donald Trump suggested Saturday that the U.S. used cyberattacks or other technical capabilities to cut power off in Caracas during strikes on the Venezuelan capital that led to the capture of Venezuelan President Nicolás Maduro.
If true, it would mark one of the most public uses of U.S. cyber power against another nation in recent memory. These operations are typically highly classified, and the U.S. is considered one of the most advanced nations in cyberspace operations globally.
https://www.schneier.com/blog/archives/2026/01/a-cyberattack-was-part-of-the-us-
Wired is reporting on Chinese darknet markets on Telegram.
The ecosystem of marketplaces for Chinese-speaking crypto scammers hosted on the messaging service Telegram have now grown to be bigger than ever before, according to a new analysis from the crypto tracing firm Elliptic. Despite a brief drop after Telegram banned two of the biggest such markets in early 2025, the two current top markets, known as Tudou Guarantee and Xinbi Guarantee, are together enabling close to $2 billion a month in money-laundering transactions, sales of scam tools like stolen data, fake investment websites, and AI deepfake tools, as well as other black market services as varied as ...
https://www.schneier.com/blog/archives/2026/01/telegram-hosting-worlds-largest-d
https://securityaffairs.com/186910/intelligence/cert-ua-reports-pluggyape-cybera
https://securityaffairs.com/186902/security/fortinet-fixed-two-critical-flaws-in
https://securityaffairs.com/186898/security/u-s-cisa-adds-a-flaw-in-microsoft-wi
https://securityaffairs.com/186888/hacking/microsoft-patch-tuesday-security-upda
https://securityaffairs.com/186882/cyber-crime/az-monica-hospital-in-belgium-shu
https://securityaffairs.com/186861/cyber-crime/threat-actor-claims-the-theft-of-
https://securityaffairs.com/186851/cyber-crime/dutch-court-convicts-hacker-who-e
https://securityaffairs.com/186837/hacking/u-s-cisa-adds-a-flaw-in-gogs-to-its-k
https://securityaffairs.com/186829/security/meta-fixes-instagram-password-reset-
https://securityaffairs.com/186819/security/europol-and-spanish-police-arrest-34