Tag: phi

  • Krebs on Security: ShinyHunters Wage Broad Corporate Extortion Spree

    Source URL: https://krebsonsecurity.com/2025/10/shinyhunters-wage-broad-corporate-extortion-spree/ Source: Krebs on Security Title: ShinyHunters Wage Broad Corporate Extortion Spree Feedly Summary: A cybercriminal group that used voice phishing attacks to siphon more than a billion records from Salesforce customers earlier this year has launched a website that threatens to publish data stolen from dozens of Fortune 500 firms if they…

  • Simon Willison’s Weblog: Gemini 2.5 Computer Use can solve Google’s own CAPTCHAs

    Source URL: https://simonwillison.net/2025/Oct/7/gemini-25-computer-use-captchas/ Source: Simon Willison’s Weblog Title: Gemini 2.5 Computer Use can solve Google’s own CAPTCHAs Feedly Summary: Google just introduced a new Gemini 2.5 Computer Use model, specially designed to help operate a GUI interface by interacting with visible elements using a virtual mouse and keyboard. I just tried their demo… and watched…

  • Schneier on Security: AI-Enabled Influence Operation Against Iran

    Source URL: https://www.schneier.com/blog/archives/2025/10/ai-enabled-influence-operation-against-iran.html Source: Schneier on Security Title: AI-Enabled Influence Operation Against Iran Feedly Summary: Citizen Lab has uncovered a coordinated AI-enabled influence operation against the Iranian government, probably conducted by Israel. Key Findings A coordinated network of more than 50 inauthentic X profiles is conducting an AI-enabled influence operation. The network, which we refer…

  • Cisco Talos Blog: Too salty to handle: Exposing cases of CSS abuse for hidden text salting

    Source URL: https://blog.talosintelligence.com/too-salty-to-handle-exposing-cases-of-css-abuse-for-hidden-text-salting/ Source: Cisco Talos Blog Title: Too salty to handle: Exposing cases of CSS abuse for hidden text salting Feedly Summary: A simple yet effective tactic, known as hidden text salting, is increasingly used by cybercriminals over the past few months to evade even the most advanced email security solutions, including those powered…

  • The Register: Microsoft blames Medusa ransomware affiliates for GoAnywhere exploits while Fortra keeps head buried

    Source URL: https://www.theregister.com/2025/10/06/microsoft_blames_medusa_ransomware_affiliates/ Source: The Register Title: Microsoft blames Medusa ransomware affiliates for GoAnywhere exploits while Fortra keeps head buried Feedly Summary: You can’t find anything bad if you don’t look, right? Medusa ransomware affiliates are among those exploiting a maximum-severity bug in Fortra’s GoAnywhere managed file transfer (MFT) product, according to Microsoft Threat Intelligence.……

  • Simon Willison’s Weblog: GPT-5 pro

    Source URL: https://simonwillison.net/2025/Oct/6/gpt-5-pro/ Source: Simon Willison’s Weblog Title: GPT-5 pro Feedly Summary: GPT-5 pro Here’s OpenAI’s model documentation for their GPT-5 pro model, released to their API today at their DevDay event. It has similar base characteristics to GPT-5: both share a September 30, 2024 knowledge cutoff and 400,000 context limit. GPT-5 pro has maximum…