Google DeepMind describes in detail how artificial intelligence can destroy the world
Google DeepMind researchers have been working on the security problem of general artificial intelligence (AGI) and released a document that explains the risks and principles of safe development.
About 1 million documents of Ukrainian car owners were unprotected for years, — cybersecurity expert
For three years after the problem was discovered, some car owners’ documents were stored in an unsecured storage facility for about four years.
10 for 300 UAH for Blizzard — Ukrainians report unexplained write-offs in favor of game publishers
Attackers are increasingly using the services of well-known companies for cybercrime. This time, Blizzard was used to steal money from the cards of Ukrainian users.
Fraudsters used a real phone and Google subdomains in an attempt to steal data
Programmer and founder of the Hack Club community Zach Latta reported an attempt to hijack an account from using real data Google.
DeepSeek R1 AI model collects a lot of user data and distorts information about China
DeepSeek R1’s large language model collects a huge amount of user data and sends it to China. AI also distorts information sensitive to the Chinese authorities.
More than 18 thousand unskilled hackers hit by XWorm RAT — infected malware constructor
An unknown attacker targeted inexperienced hackers, known as script kiddies. With XWorm RAT, they received a backdoor capable of stealing data and controlling the infected computer.
The world’s first ransomware appeared 35 years ago — it was distributed on 5.25″ floppy disks
In January 1990, an investigation began into a new cybercrime. The ransomware program was contained on floppy disks signed «AIDS Information — Introductory Diskette 2.0».
Artificial intelligence model can be stolen without any hacking, — scientists
It takes a ton of cash, effort, and time to train an artificial intelligence model. And relatively little effort to steal it. No need for data theft or leaks.
Miscalculated, but where? A hacker hacked into companies without hiding his data and offered to hire him
In the USA, a man frequented businesses, including a gym where he worked out, hacked computers, and then offered to be hired. The outcome was somewhat predictable.
SK hynix employee printed 4000 pages of classified data to sell to Huawei
A former SK hynix employee was sentenced to 18 months in prison and fined $14,300 for stealing important technology before she joined Huawei.
Apple has made iPhone unlocking harder in iOS 18.1 — police are not happy
В iOS 18.1 Apple has introduced a feature that reboots the iPhone if it has not been unlocked for a certain period of time. This prevents law enforcement from gaining access to data.
Microsoft CEO Satya Nadella receives +63% ($79.1 million) in compensation for a year of massive layoffs and hacks
Despite the layoffs and data security incidents, Microsoft CEO Satya Nadella received a whopping 63% increase in his compensation compared to the previous year.
Cybersecurity experts accidentally spread malware among Radiant Capital hack victims
On October 16, Radiant Capital’s lending protocol suffered the second cyberattack this year, resulting in the loss of more than $50 million. According to data De.Fi Antivirus Web3, the project’s contracts were exploited on the Binance Smart Chain (BSC) and Arbitrum (ARB) chains with the transferFrom() function, which allowed…
Robot uprising: hacked Ecovacs vacuum cleaners swear, chase animals and spy on owners
Owners of Ecovacs robotic vacuum cleaners in US cities have reported a hack. The hackers gained access to the cameras and controls, cursed obscenely through the speaker, and chased animals.
A hacker has found a way to hack any KIA and get the owner’s data — again
Through two years after the Kia ChallengeAfter the hackers found a way to steal almost any KIA and Hyundai produced after 2011, the Koreans are back in the spotlight. A newly discovered vulnerability allows any Kia with a license plate alone to be unlocked and started.
Threat to national security: Ukraine to restrict Telegram for civil servants and military
The National Coordination Center for Cybersecurity of Ukraine has decided to restrict the use of Telegram in government agencies and critical infrastructure facilities.
RAMBO steals secrets: RAM radiation can transmit data to attackers
Governments and other institutions often use systems without network access. But the RAMBO method allows you to send data from RAM to the outside.
«The most epic failure»: CrowdStrike wins ironic award for global IT failure
CrowdStrike President Michael Sentonas accepted the «Most Epic Failure» award at the Pwnie Awards.
Google advertised a fake Google Authenticator website with phishing
Google has faced a serious security problem with its advertising platform. Attackers are creating fake Google Authenticator ads that actually distribute DeerStealer malware that can steal users’ confidential information.
Google Chrome suddenly «forgot» passwords of 17 million Windows users — and didn’t want to share them anymore
The incident occurred last week and lasted almost 18 hours until the company fixed the problem on July 25.
American telecom company’s IT employee leaked data to China for 10 years — it was discovered only now
Beijing has been recruiting US residents for years to carry out various espionage activities.
An Israeli startup prevented the most expensive deal in Google’s history. What happened?
The agreement between Google and Wiz was estimated at $23 billion — and it was to become the most expensive in the history of the search giant.
Apple iPhone or Android? Documents from Cellebrite, which hacked Trump attacker’s phone, show which is safer
Internal documents of Cellebrite — an Israeli security company whose programs are used by intelligence agencies to hack Apple iPhones and Android have been leaked. The leak shows which smartphones it can (or cannot) unlock.
Trump’s shooter used a Samsung phone — FBI «hacked» it in 40 minutes
The FBI has gained access to the latest technology to unlock the phone of a man identified as the attacker on former US President Donald Trump.
The most expensive acquisition in Google’s history — how much will the Israeli startup cost the company?
If the deal goes through, it will become the «most expensive» in Google’s history.
Largest database of stolen passwords in history with 10 billion records appears on a hacker forum
The largest database of stolen passwords with almost 10 billion unique records has been leaked on a popular hacker forum. The Cybernews research group believes that the leak poses a serious danger to users who tend to reuse passwords.
Attack «evil twin»: attacker simulates airplane Wi-Fi and steals passenger data
The Australian Federal Police (AFP) has accused a suspect of launching a fake Wi-Fi network on an airplane and using it to harvest passenger email and social media credentials – the so-called «evil twin attack». Suspicion fell on the man after the airline reported a suspicious Wi-Fi network that its employees discovered during the flight.
US bans Kaspersky Lab software and business — some operations will be available until September 29
Bureau of Industry and Security (BIS) of the U.S. Department of Commerce announced to prohibit Kaspersky Lab, Inc. a US subsidiary of the Russian software manufacturer, from directly or indirectly providing anti-virus software and cybersecurity products or services in the United States or to US persons. The prohibition applies to branches,…
The European Union wants to scan all messages on the Internet, even encrypted ones — the law will be considered on June 20
The European Union is moving closer to adopting new rules that would require mass scanning of digital communications, including encrypted ones. On Thursday, EU governments will adopt a common position on a proposed draft law aimed at identifying child sexual abuse content. The vote will determine whether the proposal will have enough support to…
Destroyed 180 servers with scripts from Google — fired employee caused $600,000 in losses
Kandula Nagaraju, a 39-year-old Indian citizen who worked for NCS (National Computer Systems) in Singapore, was sentenced to two years and eight months in prison after a court found him guilty of unauthorized access to computers. As reported by CNAKandula accessed his former employer’s systems for several months after he was fired. He…
Elon Musk will ban Apple devices in his companies if there is something from OpenAI at the OS level — «They sell you for nothing»
Elon Musk said he would ban Apple devices in his companies if the iPhone manufacturer integrates OpenAI products at the operating system level. The billionaire said this wrote in a series of posts on X.
Can they track everyone? NABU found the suspect’s location via IP on the portal «Diia»
Law enforcement officers can find the whereabouts of Ukrainians using the Unified Portal of Public Services «Diia». According to «Telegraph»This follows from the text of the High Anti-Corruption Court’s ruling on the case of the group led by former head of the State Property Fund Dmytro Sennichenko.
Senior US Navy commander illegally installed Wi-Fi on a ship — she was fired and demoted
The U.S. Navy has shut down an illegal Wi-Fi network on a warship. The senior commander who ordered the installation was demoted. The now former senior commander, Grizel Marrero, was convicted in March, according to the Navy Times, which received documents on the trial.
«Disaster without legal consequences»: cybersecurity expert criticizes «Reserve+»
Cybersecurity expert Kostiantyn Korsun believes that the «Reserve+» app has a number of significant drawbacks in terms of personal data protection.
Ukraine launches educational campaign on personal cybersecurity for citizens
The Office of the U.S. Civilian Research and Development Foundation in Ukraine (CRDF Global in Ukraine), together with the National Coordination Center for Cybersecurity under the National Security and Defense Council of Ukraine, the Ministry of Education and Science of Ukraine, and other organizations, are launching an all-Ukrainian information…
Former CIA chief calls on Ukrainian IT to spend 10% or more on cybersecurity
Former executive head of security at the CIA Nick Gisinto, who worked for the agency for 10 years and after leaving it worked for Uber and Tesla, called on companies to spend at least 10% of their IT budgets on cybersecurity.
M&M’s candy vending machines recognized the faces of university students — they will be dismantled
Canada’s University of Waterloo is dismantling smart M&M’s vending machines from its campus. Students discovered that the machines were secretly performing facial recognition without students’ consent.
Fingerprints can be played back by the sounds of finger movement on the touch screen — research
A research team from the United States and China has uncovered a new danger associated with biometric authentication. Their work is called «PrintListener: Detecting Fingerprint Authentication Vulnerability via Finger Friction Sound». The attack uses the sound characteristics of the user’s finger movement to extract the features of the…
Spelling error report
The following text will be sent to our editors: