
Microsoft sues AI hackers
Hacking-as-a-service
Microsoft’s Digital Crimes Unit has launched a lawsuit against a foreign-based hacking group accused of running a "hacking-as-a-service" scheme designed to bypass safety measures in generative AI platforms, including Microsoft’s systems.

US sanctions Chinese hacker and cybersecurity outfit
Attacked Sophos firewall
The US government has imposed sanctions on Chinese hacker Guan Tianfeng and Sichuan Silence, the cybersecurity firm he worked for, following a cyber-espionage campaign compromising "tens of thousands of firewalls," including 36 protecting US critical infrastructure.

Hacked security cameras still wide open
I am ready for my close up Mr. DeMille
Shedloads of IP security cameras made by China-based Hikvision are still unpatched even if a fix was issued for a critical security bug nearly a year ago.

Lapsus$ attacks traced to a 16-year-old Oxford boy
Teen mastermind, lives with his mum, probably in a bit of trouble
Cybersecurity researchers investigating a string of hacks against technology companies, including Microsoft and Nvidia, have traced the attacks to a 16-year-old living at his mother's house near Oxford, England.

Authentication service had a digital breach
If only there had been an effective way of identifying a person as a hacker
Red faced authentication services provider Okta is investigating a report of a digital breach, after hackers posted screenshots showing what they claimed was its internal company environment.

A fifth of SMBs hacked last year
Most thought they were too small to be worried
A new study by Sectigo, the “State of Website Security and Threat Report”, reveals that 20 per cent of SMBs have experienced a breach in the past year alone, even though nearly three-fourths believe their companies are mitigating risks effectively.

Really dumb hack targets terminally stupid Mac owners
Soft targets
Someone impersonating administrators of cryptocurrency-related discussion channels on Slack, Discord, and other social messaging platforms has been attempting to lure others into installing macOS malware.

Airplane hack is only a matter of time
DHS has already hacked a 737
US government researchers believe it is only a matter of time before a cybersecurity breach on an airline occurs.

Hackers can wipe a hard drive using cheap speakers
Our experiment in sound is nearly ready to begin
Attackers can cause potentially fatal hard drive and operating system crashes by playing sounds over low-cost speakers embedded in computers or sold in stores.

Chinese spooks behind a decade of important hacks
Under the Winnti umbrella, ella, hey
Security experts claim that Chinese spooks were behind almost a decade's worth of network intrusions that use advanced malware to penetrate software and gaming companies in the US, Europe, Russia, and elsewhere,.