General Cyber News via Ars Technica Risk Assessment

Leaked chat logs expose inner workings of secretive ransomware group

Researchers are poring over the data and feeding it into ChatGPT.
Publish Date: 2/21/2025
read more -->

As the Kernel Turns: Rust in Linux saga reaches the “Linus in all-caps” phase

Torvalds: You can avoid Rust as a C maintainer, but you can't interfere with it.
Publish Date: 2/21/2025
read more -->

Notorious crooks broke into a company network in 48 minutes. Here’s how.

Report sheds new light on the tactics allowing attackers to move at breakneck speed.
Publish Date: 2/21/2025
read more -->

HP realizes that mandatory 15-minute support call wait times isn’t good support

HP rescinds European support call strategy due to "feedback."
Publish Date: 2/21/2025
read more -->

Russia-aligned hackers are targeting Signal users with device-linking QR codes

Swapping QR codes in group invites and artillery targeting are latest ploys.
Publish Date: 2/19/2025
read more -->

Microsoft warns that the powerful XCSSET macOS malware is back with new tricks

XCSSET has been targeting Mac users since 2020.
Publish Date: 2/18/2025
read more -->

What is device code phishing, and why are Russian spies so successful at it?

Overlooked attack method has been used since last August in a rash of account takeovers.
Publish Date: 2/14/2025
read more -->

Financially motivated hackers are helping their espionage counterparts and vice versa

Two players who mostly worked independently are increasingly collaborative.
Publish Date: 2/13/2025
read more -->

New hack uses prompt injection to corrupt Gemini’s long-term memory

There's yet another way to inject malicious prompts into chatbots.
Publish Date: 2/11/2025
read more -->

OpenAI’s secret weapon against Nvidia dependence takes shape

Chatbot maker partners with TSMC to manufacture custom AI chip, with plans for future iterations.
Publish Date: 2/10/2025
read more -->

DeepSeek iOS app sends data unencrypted to ByteDance-controlled servers

Apple's defenses that protect data from being sent in the clear are globally disabled.
Publish Date: 2/6/2025
read more -->

Ransomware payments declined in 2024 despite massive. well-known hacks

Amount paid by victims to hackers declined by hundreds of millions of dollars.
Publish Date: 2/6/2025
read more -->

7-Zip 0-day was exploited in Russia’s ongoing invasion of Ukraine

Vulnerability stripped MotW tag Windows uses to flag Internet-downloaded files.
Publish Date: 2/5/2025
read more -->

Go Module Mirror served backdoor to devs for 3+ years

Supply chain attack targets developers using the Go programming language.
Publish Date: 2/5/2025
read more -->

22-year-old math wiz indicted for alleged DeFI hack that stole $65M

22-year-old Andean Medjedovic of Canada could spend decades in prison if convicted.
Publish Date: 2/4/2025
read more -->

Dell risks employee retention by forcing all teams back into offices full-time

"Dell may be missing out on some great talent..."
Publish Date: 1/31/2025
read more -->

Apple chips can be hacked to leak secrets from Gmail, iCloud, and more

Side channel gives unauthenticated remote attackers access they should never have.
Publish Date: 1/28/2025
read more -->

A long, costly road ahead for customers abandoning Broadcom’s VMware

"We loved VMware, and then when Broadcom bought ‘em, we hated ‘em.”
Publish Date: 1/27/2025
read more -->

Backdoor infecting VPNs used “magic packets” for stealth and security

J-Magic backdoor infected organizations in a wide array of industries.
Publish Date: 1/23/2025
read more -->

Data breach hitting PowerSchool looks very, very bad

Schools are now notifying families their data has been stolen.
Publish Date: 1/23/2025
read more -->


Copyright Ⓒ 2010 SecuritySpecifiers™