-
+37 +6Microsoft to pay $20M settlement for illegally collecting children's personal data
Microsoft will pay $20 million to settle charges brought by the Federal Trade Commission accusing the tech giant of illegally collecting the personal information of children without their parents’ consent — and in some cases retaining it “for years.”
-
+30 +6Compiled Python Code Used in a New PyPI Attack
ReversingLabs has discovered a new kind of PyPI attack. Lucky us.
-
+35 +5Google’s Android and Chrome extensions are a very sad place. Here’s why
No wonder Google is having trouble keeping up with policing its app store. Since Monday, researchers have reported that hundreds of Android apps and Chrome extensions with millions of installs from the company’s official marketplaces have included functions for snooping on user files, manipulating the contents of clipboards, and injecting deliberately unknown code into webpages.
-
+29 +6Chainguard Improves Security for Its Container Image Registry
Chainguard's new Container Registry costs far less to run and the company has also upgraded how it hosts and distributes its Images to improve security.
-
+33 +7Inner workings revealed for “Predator,” the Android malware that exploited 5 0-days
Smartphone malware sold to governments around the world can surreptitiously record voice calls and nearby audio, collect data from apps such as Signal and WhatsApp, and hide apps or prevent them from running upon device reboots, researchers from Cisco’s Talos security team have found.
-
+23 +4Is cybersecurity an unsolvable problem?
Ars chats with law philosopher Scott Shapiro about his new book, Fancy Bear Goes Phishing. Turing himself showed that perfect cybersecurity is impossible through the proof that he gave. It's easy to extend the proof just to see that among the problems that cannot be solved are finding bugs in computer programs.
-
+31 +4Bitwarden Moves into Passwordless Security
The well-known open source password manager is launching passwordless.dev, a comprehensive toolkit for developers.
-
+19 +3Potentially millions of Android TVs and phones come with malware preinstalled
Overall, Android devices have earned a decidedly mixed reputation for security. While the OS itself and Google's Pixels have stood up over the years against software exploits, the never-ending flow of malicious apps in Google Play and vulnerable devices from some third-party manufacturers have tarnished its image.
-
+26 +5Deleted Twitter messages are reappearing for some users
Another day, another strange Twitter problem.
-
+31 +4GitOps as an Evolution of Kubernetes
Brendan Burns, Kubernetes' co-founder shared his thoughts on GitOps and Kubernetes at GitOpsCon.
-
+36 +8It’s being called Russia's most sophisticated cyber espionage tool. What is Snake, and why is it so dangerous?
The Snake network has been detected in more than 50 countries, including Australia.
-
+35 +5Mirantis Updates k0s Lightweight Kubernetes Distro
Kubernetes 1.27 compatibility, bug fixes, and support for containerD WASM and gVisor container sandboxes, there are a few of our favorite things that the new version of k0s brings us.
-
+30 +4Hackers promise AI, install malware instead
Meta on Wednesday warned that hackers are using the promise of generative artificial intelligence like ChatGPT to trick people into installing malicious code on devices. Over the course of the past month, security analysts with the social-media giant have found malicious software posing as ChatGPT or similar AI tools, chief information security officer Guy Rosen said in a briefing.
-
+26 +2Used Routers Often Come Loaded With Corporate Secrets
More than half of the enterprise routers researchers bought secondhand hadn’t been wiped, exposing sensitive info like login credentials and customer data.
-
+30 +5Why it's hard to defend against AI prompt injection attacks
In the rush to commercialize LLMs, security got left behind
-
+23 +4Apple’s Macs have long escaped ransomware, but that may be changing
Security researchers are examining newly discovered Mac ransomware samples from the notorious gang LockBit, marking the first known example of a prominent ransomware group toying with macOS versions of its malware.
-
+20 +2OpenSSF Boosts Software Supply Chain Security with SLSA 1.0
Supply-chain Levels for Software Artifacts (SLSA) Version 1.0 will help protect software code from tampering and facilitate secure development practices.
-
+30 +4Enhancing cloud-native security: Argo and Prometheus undergo software supply chain audits
It's time. SBOM and SLSA are now being used to check the security of major cloud-native programs.
-
+19 +3IBM Aspera Faspex High-Speed File Transfer Has a Killer Bug
With a CVSS score of 9.8 and active exploits using the IceFire ransomware, this is a "Patch It, Now!" bug.
-
+13 +3Open garage doors anywhere in the world by exploiting this “smart” device
A market-leading garage door controller is so riddled with severe security and privacy vulnerabilities that the researcher who discovered them, Sam Sabetan, is advising anyone using one to immediately disconnect it until they are fixed.
Submit a link
Start a discussion




















