News
EU's reforms of GDPR, AI slated by privacy activists for 'playing into Big Tech’s hands'
Privacy advocates are condemning the European Commission's leaked plans to overhaul digital privacy legislation, accusing officials of bypassing proper legislative processes to favor Big Tech interests.…
OWASP Top 10: Broken access control still tops app security list
The Open Worldwide Application Security Project (OWASP) just published its top 10 categories of application risks for 2025, its first list since 2021. It found that while broken access control remains the top issue, security misconfiguration is a strong second, and software supply chain issues are still prominent.…
Hitachi-owned GlobalLogic admits data stolen on 10k current and former staff
Digital engineering outfit GlobalLogic says personal data from more than 10,000 current and former employees was exposed in the wave of Oracle E-Business Suite (EBS) attacks attributed to the Clop ransomware gang. The Hitachi-owned biz joins a growing roster of high-profile victims that also now includes The Washington Post and Allianz UK.…
UK asks cyberspies to probe whether Chinese buses can be switched off remotely
UK governmental is working with the National Cyber Security Centre to understand and "mitigate" any risk that China-made imported electric buses could be remotely accessed and potentially disabled.…
Cyber insurers paid out over twice as much for UK ransomware attacks last year
The number of successful cyber insurance claims made by UK organizations shot up last year, according to the latest figures from the industry's trade association.…
UK's Ajax fighting vehicle arrives – years late and still sending crew to hospital
The British Army just received its first new armored fighting vehicle (AFV) for nearly three decades, but it is years late, hit by rising costs, is still reportedly injuring its crew, and there are questions about whether it remains relevant in the age of drone warfare. …
LLM side-channel attack could allow snoops to guess what you're talking about
Mischief-makers can guess the subjects being discussed with LLMs using a side-channel attack, according to Microsoft researchers. They told The Register that models from some providers, including Anthropic, AWS, DeepSeek, and Google, haven't been fixed, putting both personal users and enterprise communications at risk.…
Critical federal cybersecurity funding set to resume as government shutdown draws to a close - for now
The US Senate voted on Sunday to advance a short-term funding bill for the federal government, moving the country closer to ending its longest-ever shutdown. Part of the spending bill also restores critical cybersecurity programs that lapsed as the shutdown began. …
Phishers try to lure 5K Facebook advertisers with fake business pages
More than 5,000 businesses that use Facebook for advertising were bombarded by tens of thousands of phishing emails in a credential- and data-stealing campaign.…
Russian broker pleads guilty to profiting from Yanluowang ransomware attacks
A Russian national will likely face several years in US prison after pleading guilty to a range of offenses related to his work with ransomware crews.…
Allianz UK joins growing list of Clop’s Oracle E-Business Suite victims
Allianz UK confirms it was one of the many companies that fell victim to the Clop gang's Oracle E-Business Suite (EBS) attack after crims reported that they had attacked a subsidiary.…
As AI enables bad actors, how are 3,000+ teams responding?
Partner Content This year has shown just how quickly new exposures can emerge, with AI-generated code shipped before review, cloud sprawl racing ahead of controls, and shadow IT opening blind spots. Supply chain compromises have disrupted transport, manufacturing, and other critical services. On the attacker side, AI-assisted exploit development is making it faster than ever to turn those weaknesses into working attacks.…
Cisco creating new security model using 30 years of data describing cyber-dramas and saves
Exclusive Cisco is working on a new AI model that will more than double the number of parameters used to train its current flagship Foundation-Sec-8B.…
Microsoft teases agents that become ‘independent users within the workforce’
Microsoft has teased what it’s calling “a new class” of AI agents “that operate as independent users within the enterprise workforce.”…
Data breach at Chinese infosec firm reveals cyber-weapons and target list
Asia In Brief Chinese infosec blog MXRN last week reported a data breach at a security company called Knownsec that has ties to Beijing and Chinas military.…
Louvre's pathetic passwords belong in a museum, just not that one
Infosec in brief There's no indication that the brazen bandits who stole jewels from the Louvre attacked the famed French museum's systems, but had they tried, it would have been incredibly easy.…
Who's watching the watchers? This Mozilla fellow, and her Surveillance Watch map
interview Digital rights activist Esra'a Al Shafei found FinFisher spyware on her device more than a decade ago. Now she's made it her mission to surveil the companies providing surveillanceware, their customers, and their funders.…
Previously unknown Landfall spyware used in 0-day attacks on Samsung phones
A previously unknown Android spyware family called LANDFALL exploited a zero-day in Samsung Galaxy devices for nearly a year, installing surveillance code capable of recording calls, tracking locations, and harvesting photos and logs before Samsung finally patched it in April.…
Cybercrims plant destructive time bomb malware in industrial .NET extensions
Security experts have helped remove malicious NuGet packages planted in 2023 that were designed to destroy systems years in advance, with some payloads not due to hit until the latter part of this decade.…
Microsoft's data sovereignty: Now with extra sovereignty!
Microsoft is again banging the data sovereignty drum in Europe, months after admitting in a French court it couldn't guarantee that data will not be transmitted to the US government when it is legally required to do so.…