A significant supply chain attack hit NPM after 15 popular Gluestack packages with over 950,000 weekly downloads were compromised to include malicious code that acts as a remote access trojan (RAT).
MY TAKE: Are we âSuper f**ckedâ by agentic AI? â debate gets 10 million + views on YouTube
The day after my column dissecting Chris Sacca's viral outburst went liveâhis now-notorious claim that we are "super f**ked" by artificial intelligenceâI stumbled onto another AI conversation that had already amassed over 10 million views: a roundtable debate hosted by Steven Bartlett on his widely watched YouTube show, Diary of a CEO. Related: Ordinary folks
Trump cyber executive order takes aim at prior orders, secure software, more | CyberScoop
President Donald Trump signed an executive order Friday that the White House says promotes developing secure software, adopting the latest encryption protocols, securing internet routing and rolling back parts of two executive orders.
Friday Squid Blogging: Squid Run in Southern New England - Schneier on Security
Southern New England is having the best squid run in years. As usual, you can also use this squid post to talk about the security stories in the news that I havenât covered.
Hearing on the Federal Government and AI - Schneier on Security
On Thursday I testified before the House Committee on Oversight and Government Reform at a hearing titled âThe Federal Government in the Age of Artificial Intelligence.â The other speakers mostly talked about how cool AI wasâand sometimes about how cool their own company wasâbut I was asked by the Democrats to specifically talk about DOGE and the risks of exfiltrating our data from government agencies and feeding it into AIs. My written testimony is here. Video of the hearing is here.
Microsoft shares script to restore inetpub folder you shouldnât delete
Microsoft has released a PowerShell script to help restore an empty 'inetpub' folder created by the April 2025 Windows security updates if deleted. As Microsoft previously warned, this folder helps mitigate a high-severity Windows Process Activation privilege escalation vulnerability.
Kettering Health confirms Interlock ransomware behind cyberattack
Healthcare giant Kettering Health, which manages 14 medical centers in Ohio, confirmed that the Interlock ransomware group breached its network and stole data in a May cyberattack.
Report on the Malicious Uses of AI - Schneier on Security
OpenAI just published its annual report on malicious uses of AI. By using AI as a force multiplier for our expert investigative teams, in the three months since our last report weâve been able to detect, disrupt and expose abusive activity including social engineering, cyber espionage, deceptive employment schemes, covert influence operations and scams. These operations originated in many parts of the world, acted in many different ways, and focused on many different targets. A significant number appeared to originate in China: Four of the 10 cases in this report, spanning social engineering, covert influence operations and cyber threats, likely had a Chinese origin. But weâve disrupted abuses from many other countries too: this report includes case studies of a likely task scam from Cambodia, comment spamming apparently from the Philippines, covert influence attempts potentially linked with Russia and Iran, and deceptive employment schemes...
Nigeria jails 9 Chinese nationals for being part of international cyberfraud syndicate
The group was arrested in December as part of a raid that included 599 Nigerians and 193 other foreign nationals, many of them Chinese, on suspicion of being involved in a range of online crimes.
How to build a robust Windows service to block malware and ransomware
Designing a security-focused Windows Service? Learn more from ThreatLocker about the core components for real-time monitoring, threat detection, and system hardening to defend against malware and ransomware.
OpenAI takes down ChatGPT accounts linked to state-backed hacking, disinformation
State-backed threat actors from a handful of countries are using ChatGPT for a range of malicious purposes, including malware refinement, employment scams and social media disinformation campaigns.
New PathWiper data wiper malware hits critical infrastructure in Ukraine
A new data wiper malware named 'PathWiper' is being used in targeted attacks against critical infrastructure in Ukraine, aimed at disrupting operations in the country.
Critical Fortinet flaws now exploited in Qilin ransomware attacks
The Qilin ransomware operation has recently joined attacks exploiting two Fortinet vulnerabilities that allow bypassing authentication on vulnerable devices and executing malicious code remotely.
Off-brand IoT devices are still vulnerable to BadBox botnet, FBI says
TV streaming devices, digital projectors and other IoT devices are being infected with BadBox 2.0 malware after the original campaign was stifled by German law enforcement.
How Zero Trust Can Save You from the Next Data Breach | CSA
Relying solely on perimeter defenses for data security is no longer sufficient against modern cyber threats. The Zero Trust model addresses this challenge.