Tag: attackers

  • Slashdot: Salesforce Says It Won’t Pay Extortion Demand in 1 Billion Records Breach

    Source URL: https://yro.slashdot.org/story/25/10/08/208202/salesforce-says-it-wont-pay-extortion-demand-in-1-billion-records-breach?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Salesforce Says It Won’t Pay Extortion Demand in 1 Billion Records Breach Feedly Summary: AI Summary and Description: Yes Summary: Salesforce is facing an extortion demand from a crime syndicate that claims to have stolen approximately 1 billion records from various customers, highlighting vulnerabilities in user compliance and security…

  • Cisco Talos Blog: Too salty to handle: Exposing cases of CSS abuse for hidden text salting

    Source URL: https://blog.talosintelligence.com/too-salty-to-handle-exposing-cases-of-css-abuse-for-hidden-text-salting/ Source: Cisco Talos Blog Title: Too salty to handle: Exposing cases of CSS abuse for hidden text salting Feedly Summary: A simple yet effective tactic, known as hidden text salting, is increasingly used by cybercriminals over the past few months to evade even the most advanced email security solutions, including those powered…

  • Slashdot: Are Software Registries Inherently Insecure?

    Source URL: https://developers.slashdot.org/story/25/10/05/2318202/are-software-registries-inherently-insecure?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Are Software Registries Inherently Insecure? Feedly Summary: AI Summary and Description: Yes Summary: The text discusses the persistent issues related to software supply chain attacks, emphasizing weaknesses in the design of software registries like npm, PyPI, and Docker Hub. It highlights how inadequate safeguards allowed for multiple registry breaches…

  • The Register: Red Hat fesses up to GitLab breach after attackers brag of data theft

    Source URL: https://www.theregister.com/2025/10/03/red_hat_gitlab_breach/ Source: The Register Title: Red Hat fesses up to GitLab breach after attackers brag of data theft Feedly Summary: Open source giant admits intruders broke into dedicated consulting instance, but insists core products untouched What started as cyber crew bragging has now been confirmed by Red Hat: someone gained access to its…

  • The Register: Subpoena tracking platform blames outage on AWS social engineering attack

    Source URL: https://www.theregister.com/2025/10/02/subpoena_tracking_platform_outage_blamed/ Source: The Register Title: Subpoena tracking platform blames outage on AWS social engineering attack Feedly Summary: Software maker Kodex said its domain registrar fell for a fraudulent legal order A software platform used by law enforcement agencies and major tech companies to manage subpoenas and data requests went dark this week after…

  • Schneier on Security: Daniel Miessler on the AI Attack/Defense Balance

    Source URL: https://www.schneier.com/blog/archives/2025/10/daniel-miessler-on-the-ai-attack-defense-balance.html Source: Schneier on Security Title: Daniel Miessler on the AI Attack/Defense Balance Feedly Summary: His conclusion: Context wins Basically whoever can see the most about the target, and can hold that picture in their mind the best, will be best at finding the vulnerabilities the fastest and taking advantage of them. Or,…