A root-server at the Internet’s core lost touch with its peers. We still don’t know why.For 4 days, the c-root server maintained by Cogent lost touch with its 12 peers.#arstechnica#EN#2024#DNS#c-root#Cogent#delay·arstechnica.com·May 23, 2024A root-server at the Internet’s core lost touch with its peers. We still don’t know why.
Hacker free-for-all fights for control of home and office routers everywhereHow and why nation-state hackers and cybercriminals coexist in the same router botnet.#arstechnica#EN#2024#SOHO#routers#home#IoT#APT#PawnStorm#MooBot·arstechnica.com·May 3, 2024Hacker free-for-all fights for control of home and office routers everywhere
What we know about the xz Utils backdoor that almost infected the worldMalicious updates made to a ubiquitous tool were a few weeks away from going mainstream.#arstechnica#EN#2024#xz#Supply-chain-attack#backdoor#CVE-2024-3094·arstechnica.com·Apr 1, 2024What we know about the xz Utils backdoor that almost infected the world
PyPI halted new users and projects while it fended off supply-chain attackAutomation is making attacks on open source code repositories harder to fight.#arstechnica#EN#2024#PyPI#Automation#malicious#packages#attack·arstechnica.com·Mar 28, 2024PyPI halted new users and projects while it fended off supply-chain attack
Thousands of servers hacked in ongoing attack targeting Ray AI frameworkResearchers say it's the first known in-the-wild attack targeting AI workloads.#arstechnica#EN#2024#Ray#AI#framework#attack#ongoing#servers·arstechnica.com·Mar 27, 2024Thousands of servers hacked in ongoing attack targeting Ray AI framework
Unpatchable vulnerability in Apple chip leaks secret encryption keysFixing newly discovered side channel will likely take a major toll on performance.#arstechnica#EN#2024#gofetch#Side-Channel#encryption#keys·arstechnica.com·Mar 21, 2024Unpatchable vulnerability in Apple chip leaks secret encryption keys
US prescription market hamstrung for 9 days (so far) by ransomware attack | Ars TechnicaPatients having trouble getting lifesaving meds have the AlphV crime group to thank.#arstechnica#EN#2024#AlphV#ransomware#US#prescription#Healthcare·arstechnica.com·Mar 3, 2024US prescription market hamstrung for 9 days (so far) by ransomware attack | Ars Technica
GitHub besieged by millions of malicious repositories in ongoing attack | Ars TechnicaGitHub keeps removing malware-laced repositories, but thousands remain.#arstechnica#EN#2024#github#malicious#repositories#attack·arstechnica.com·Mar 1, 2024GitHub besieged by millions of malicious repositories in ongoing attack | Ars Technica
How your sensitive data can be sold after a data broker goes bankruptSensitive location data could be sold off to the highest bidder.#arstechnica#EN#2024#data-broker#privacy#bankrupt·arstechnica.com·Feb 25, 2024How your sensitive data can be sold after a data broker goes bankrupt
Air Canada must honor refund policy invented by airline’s chatbotAir Canada appears to have quietly killed its costly chatbot support.#arstechnica#EN#2024#chatbot#legal#AirCanada#refund#policy#invented·arstechnica.com·Feb 18, 2024Air Canada must honor refund policy invented by airline’s chatbot
Microsoft network breached through password-spraying by Russian-state hackersSenior execs' emails accessed in network breach that wasn't caught for 2 months.#arstechnica#en#2024#Microsoft#email#theft#Russia#APT29#breached#password-spray·arstechnica.com·Jan 20, 2024Microsoft network breached through password-spraying by Russian-state hackers
Researcher uncovers one of the biggest password dumps in recent historyRoughly 25 million of the passwords have never been seen before by widely used service.#arstechnica#EN#2024#naz.api#troyhunt#passwords#dump·arstechnica.com·Jan 18, 2024Researcher uncovers one of the biggest password dumps in recent history
Hackers can infect network-connected wrenches to install ransomwareResearchers identify 23 vulnerabilities, some of which can exploited with no authentication.#arstechnica#EN#2024#wrenches#ransomware#IoT·arstechnica.com·Jan 13, 2024Hackers can infect network-connected wrenches to install ransomware
Linux devices are under attack by a never-before-seen worm | Ars TechnicaBased on Mirai malware, self-replicating NoaBot installs cryptomining app on infected devices.#arstechnica#2024#EN#Mirai#variant#self-replicating#NoaBot#cryptomining#never-before-seen·arstechnica.com·Jan 11, 2024Linux devices are under attack by a never-before-seen worm | Ars Technica