Friday Squid Blogging: Catching Humboldt Squid - Schneier on Security
First-person account of someone accidentally catching several Humboldt squid on a fishing line. No photos, though. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Blog moderation policy.
Scammer steals $1.5 million from Baltimore by spoofing city vendor
In a post mortem of the incident, Baltimore Inspector General Isabel Mercedes Cumming said the city’s accounts payable department had failed to implement corrective measures after previous incidents of fraud and did not have proper protections in place to verify supplier details.
Windows 11 KB5064081 update clears up CPU usage metrics in Task Manager
Microsoft has released the KB5064081 preview cumulative update for Windows 11 24H2, which includes thirty-six new features or changes, with many gradually rolling out. These updates include new Recall features and a new way of displaying CPU usage in Task Manager.
Microsoft fixes bug behind Windows certificate enrollment errors
Microsoft has resolved a known issue causing false CertificateServicesClient (CertEnroll) error messages after installing the July 2025 preview and subsequent Windows 11 24H2 updates.
Workado settles with FTC over allegations it inflated its AI detectors’ capabilities | CyberScoop
Workado publicly claimed its AI content detector could accurately determine whether a piece of text was generated by AI in 98% of cases. The FTC said its "no better than a coin flip."
GAO-25-107283 Analysis: Defense Supply Chain Risks Are Escalating - interos.ai
The defense supply chain is stronger with continuous, real-time monitoring. GAO‑25‑107283, a report recently released by the U.S. Government Accountability Office (GAO), highlights critical supply chain vulnerabilities across the Department of Defense’s 200,000+ supplier ecosystem. Areas for improvement include limited traceability of foreign-origin materials, visibility into lower-tier vendors, and streamlined contractual reporting. The dangers aren’t....
Microsoft to enforce MFA for Azure resource management in October
Starting in October, Microsoft will enforce multi-factor authentication (MFA) for all Azure resource management actions to protect Azure clients from unauthorized access attempts.
Microsoft says recent Windows update didn't kill your SSD
Microsoft has found no link between the August 2025 KB5063878 security update and customer reports of failure and data corruption issues affecting solid-state drives (SSDs) and hard disk drives (HDDs).
Extorsion automatisée, chantage ciblé… quand Claude Code pilote une immense opération de « vibe hacking »
La société américaine Anthropic dévoile une campagne de vols de données orchestrée à l’aide de son modèle de génération de code Claude Code. En un mois, l'opération aurait mis en danger 17 organisations. Le mode opératoire repose sur ce qu’Anthropic désigne comme du vibe hacking. Vibe coding. Voilà le terme tendance
Ransomware gang takedowns causing explosion of new, smaller groups
The ransomware ecosystem continues to splinter, with new gangs proliferating in the wake of law enforcement takedowns that have scattered affiliates and prompted criminal rebrands.
Npm Package Hijacked to Steal Data and Crypto via AI-Powered Malware
A software supply chain attack targeting Nx marks the first known case where attackers have leveraged developer AI assistants, according to StepSecurity
I just heard about this: There’s a travel scam warning going around the internet right now: You should keep your baggage tags on your bags until you get home, then shred them, because scammers are using luggage tags to file fraudulent claims for missing baggage with the airline. First, the scam is possible. I had a bag destroyed by baggage handlers on a recent flight, and all the information I needed to file a claim was on my luggage tag. I have no idea if I will successfully get any money from the airline, or what form it will be in, or how it will be tied to my name, but at least the first step is possible...
Understanding HIPAA: Key Regulations and Compliance | CSA
HIPAA ensures the confidential handling of protected health information and mandates stringent guidelines for the privacy and security of patient data.
We analyze the built-in protection mechanisms in macOS: how they work, how threat actors can attack them or deceive users, and how to detect such attacks.