Microsoft ends Authenticator password autofill, moves users to Edge
Microsoft has announced that it will discontinue the password storage and autofill feature in the Authenticator app starting in July and will complete the deprecation in August 2025.
Une guerre nucléaire est-elle vraiment possible en Europe ?
L’arme nucléaire, du fait des conséquences désastreuses qu’entraînerait son emploi, est vouée à rester un élément de dissuasion. Si la menace du recours à cette arme ultime est fréquemment brandie côté russe, il n’en demeure pas moins que les responsables au Kremlin ont pleinement conscience des coûts pratiquement
Friday Squid Blogging: Pyjama Squid - Schneier on Security
The small pyjama squid (Sepioloidea lineolata) produces toxic slime, “a rare example of a poisonous predatory mollusc.” As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
Amazon, CrowdStrike, Google and Palo Alto Networks claim no change to threat intel sharing under Trump | CyberScoop
Top security leaders at some of the largest tech and cybersecurity vendors said public-private collaborative work continues, despite budget cuts and personnel changes.
Co-op confirms data theft after DragonForce ransomware claims attack
The Co-op cyberattack is far worse than initially reported, with the company now confirming that data was stolen for a significant number of current and past customers.
US indicts Yemeni man in Black Kingdom ransomware attacks
The U.S. Attorney's Office for the Central District of California announced charges against Rami Khaled Ahmed for allegedly helping to develop and deploy Black Kingdom, which infected “approximately 1,500 computer systems."
Sooner or later, it’s going to happen. AI systems will start acting as agents, doing things on our behalf with some degree of autonomy. I think it’s worth thinking about the security of that now, while its still a nascent idea. In 2019, I joined Inrupt, a company that is commercializing Tim Berners-Lee’s open protocol for distributed data ownership. We are working on a digital wallet that can make use of AI in this way. (We used to call it an “active wallet.” Now we’re calling it an “agentic wallet.”) I talked about this a bit at the RSA Conference...
Magento supply chain attack compromises hundreds of e-stores
A supply chain attack involving 21 backdoored Magento extensions has compromised between 500 and 1,000 e-commerce stores, including one belonging to a $40 billion multinational.
Microsoft enterre les mots de passe pour les nouveaux comptes
Le premier jeudi du mois de mai est la journée mondiale du mot de passe. À cette occasion, Microsoft l'a célébrée d'une façon un peu particulière, avec une initiative visant à les tuer un peu plus. Chaque année, il y a la journée mondiale du mot de passe. Et tous les ans, elle tombe le premier jeudi du mois de mai --
Salesforce expands model lineup in support of agentic AI
The software vendor added variations to its family of large action models for on-device implementation, limited GPU resources and industrial applications.
Ransomware attacks on food and agriculture industry have doubled in 2025
The uptick began in the fourth quarter of 2024 and continued into 2025, with the increases largely attributed to Clop’s exploitation of a popular file sharing service.
US indicts Black Kingdom ransomware admin for Microsoft Exchange attacks
A 36-year-old Yemeni national, who is believed to be the developer and primary operator of 'Black Kingdom' ransomware, has been indicted by the United States for conducting 1,500 attacks on Microsoft Exchange servers.
US wants to cut off key player in Southeast Asian cybercrime industry
The Treasury Department issued the proposed rulemaking Thursday, stating that Huione Group has helped launder funds from North Korean state-backed cybercrime operations and investment scams originating in Southeast Asia.
CISA Confirms Exploitation of SonicWall Vulnerabilities
The US Cybersecurity and Infrastructure Security Agency has added two flaws affecting SonicWall products to its catalog of Known Exploited Vulnerabilities
UK NCSC: Cyberattacks impacting UK retailers are a wake-up call
The United Kingdom's National Cyber Security Centre warned that ongoing cyberattacks impacting multiple UK retail chains should be taken as a "wake-up call."
Using AI to Operationalize Zero Trust in Multi-Cloud | CSA
The ability of AI to handle enormous data volumes and identify irregularities in real-time enables it to fill the gap across disparate Zero Trust architectures.