Uncategorized

Thousands of Asus routers are being hit with stealthy, persistent backdoors

Thousands of home and small office routers manufactured by Asus are being infected with a stealthy backdoor that can survive reboots and firmware updates in an attack by a nation-state or another well-resourced…

Where hyperscale hardware goes to retire: Ars visits a very big ITAD site

"The biggest risk is data escape." Eric Ingebretsen, chief commercial officer at SK TES, an IT asset disposition provider, tells me this early on during a tour of a 128,000-square-foot facility in Fredericksburg,…

Researchers cause GitLab AI developer assistant to turn safe code malicious

Marketers promote AI-assisted developer tools as workhorses that are essential for today’s software engineer. Developer platform GitLab, for instance, claims its Duo chatbot can “instantly generate a to-do list” that eliminates the burden…

Google’s Will Smith double is better at eating AI spaghetti … but it’s crunchy?

On Tuesday, Google launched Veo 3, a new AI video synthesis model that can do something no major AI video generator has been able to do before: create a synchronized audio track. While…

Feds charge 16 Russians allegedly tied to botnets used in cyberattacks and spying

The hacker ecosystem in Russia, more than perhaps anywhere else in the world, has long blurred the lines between cybercrime, state-sponsored cyberwarfare, and espionage. Now an indictment of a group of Russian nationals…

Report calls for regulation of “legally and ethically flawed” VMware

VMware's business model under Broadcom is "legally and ethically flawed," a group of cloud service provider (CSP) customers and partners alleged in a report released today. The report (PDF) comes from the European…

New Claude 4 AI model refactored code for 7 hours straight

On Thursday, Anthropic released Claude Opus 4 and Claude Sonnet 4, marking the company's return to larger model releases after primarily focusing on mid-range Sonnet variants since June of last year. The new…

Authorities carry out global takedown of infostealer used by cybercriminals

A consortium of global law enforcement agencies and tech companies announced on Wednesday that they have disrupted the infostealer malware known as Lumma. One of the most popular infostealers worldwide, Lumma has been…

Destructive malware available in NPM repo went unnoticed for 2 years

Researchers have found malicious software that received more than 6,000 downloads from the NPM repository over a two-year span, in yet another discovery showing the hidden threats users of such open source archives…

“Microsoft has simply given us no other option,” Signal says as it blocks Windows Recall

Signal Messenger is warning the users of its Windows Desktop version that the privacy of their messages is under threat by Recall, the AI tool rolling out in Windows 11 that will screenshot,…