Tag: breaches

  • The Register: FortiGate config leaks: Victims’ email addresses published online

    Source URL: https://www.theregister.com/2025/01/23/fortigate_config_leaks_infoseccers_list_victim_emails/ Source: The Register Title: FortiGate config leaks: Victims’ email addresses published online Feedly Summary: Experts warn not to take leaks lightly as years-long compromises could remain undetected Thousands of email addresses included in the Belsen Group’s dump of FortiGate configs last week are now available online, revealing which organizations may have been…

  • Wired: Subaru Security Flaws Exposed Its System for Tracking Millions of Cars

    Source URL: https://www.wired.com/story/subaru-location-tracking-vulnerabilities/ Source: Wired Title: Subaru Security Flaws Exposed Its System for Tracking Millions of Cars Feedly Summary: Now-fixed web bugs allowed hackers to remotely unlock and start millions of Subarus. More disturbingly, they could also access at least a year of cars’ location histories—and Subaru employees still can. AI Summary and Description: Yes…

  • The Register: Supply chain attack hits Chrome extensions, could expose millions

    Source URL: https://www.theregister.com/2025/01/22/supply_chain_attack_chrome_extension/ Source: The Register Title: Supply chain attack hits Chrome extensions, could expose millions Feedly Summary: Threat actor exploited phishing and OAuth abuse to inject malicious code Cybersecurity outfit Sekoia is warning Chrome users of a supply chain attack targeting browser extension developers that has potentially impacted hundreds of thousands of individuals already.……

  • CSA: How to Combat Social Engineering Attacks

    Source URL: https://abnormalsecurity.com/blog/soc-expert-perspectives-social-engineering-threats Source: CSA Title: How to Combat Social Engineering Attacks Feedly Summary: AI Summary and Description: Yes **Summary:** The text discusses the increasing threat of social engineering attacks and highlights key insights from cybersecurity experts regarding the vulnerabilities associated with human behavior, advanced attack techniques such as deepfakes, and the necessity for AI-driven…

  • The Register: Infosec was literally the last item in Trump’s policy plan, yet major changes are likely on his watch

    Source URL: https://www.theregister.com/2025/01/22/trump_cyber_policy/ Source: The Register Title: Infosec was literally the last item in Trump’s policy plan, yet major changes are likely on his watch Feedly Summary: Everyone agrees defense matters. How to do it is up for debate Feature The Trump administration came to office this week without a detailed information security policy, but…

  • The Register: Google DeepMind CEO says 2025’s the year we start popping pills AI helped invent

    Source URL: https://www.theregister.com/2025/01/22/google_deepmind_ai_drugs/ Source: The Register Title: Google DeepMind CEO says 2025’s the year we start popping pills AI helped invent Feedly Summary: Nobel Prize winner Demis Hassabis thinks human trials will happen soon Clinical trials of the first drugs designed with the help of artificial intelligence could commence this year, Google DeepMind CEO Demis…

  • Hacker News: LLMs Demonstrate Behavioral Self-Awareness [pdf]

    Source URL: https://martins1612.github.io/selfaware_paper_betley.pdf Source: Hacker News Title: LLMs Demonstrate Behavioral Self-Awareness [pdf] Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The provided text discusses a study focused on the concept of behavioral self-awareness in Large Language Models (LLMs). The research demonstrates that LLMs can be finetuned to recognize and articulate their learned behaviors, including…

  • The Register: Patch procrastination leaves 50,000 Fortinet firewalls vulnerable to zero-day

    Source URL: https://www.theregister.com/2025/01/21/fortinet_firewalls_still_vulnerable/ Source: The Register Title: Patch procrastination leaves 50,000 Fortinet firewalls vulnerable to zero-day Feedly Summary: Seven days after disclosure and little action taken, data shows Fortinet customers need to get with the program and apply the latest updates as nearly 50,000 management interfaces are still vulnerable to the latest zero-day exploit.… AI…

  • The Register: HPE probes IntelBroker’s bold data theft boasts

    Source URL: https://www.theregister.com/2025/01/21/hpe_intelbroker_claims/ Source: The Register Title: HPE probes IntelBroker’s bold data theft boasts Feedly Summary: Incident response protocols engaged following claims of source code burglary Hewlett Packard Enterprise (HPE) is probing assertions made by prolific Big Tech intruder IntelBroker that they broke into the US corporation’s systems and accessed source code, among other things.……