Gajdek Graphics Blog
  • Blog Home Page
    • Logout
    • Log-In
  • Articles
    • IT Security
    • Graphics Design
  • Gajdek Graphics Home
  • Privacy Policy
Select Page
Crims using social media images in virtual kidnapping scams • The Register

Crims using social media images in virtual kidnapping scams • The Register

by Syndicated News Feed | Dec 5, 2025 | IT Security | 0 Comments

Criminals are altering social media and other publicly available images of people to use as fake proof of life photos in "virtual kidnapping" and extortion scams, the FBI warned on Friday.  In these truly heinous extortion attempts, miscreants contact their...

read more
Barts Health NHS discloses data breach after Oracle zero-day hack

Barts Health NHS discloses data breach after Oracle zero-day hack

by Syndicated News Feed | Dec 5, 2025 | IT Security | 0 Comments

Barts Health NHS Trust, a major healthcare provider in England, announced that Clop ransomware actors have stolen files from one of its databases after exploiting a vulnerability in its Oracle E-business Suite software. The stolen data are invoices spanning...

read more
FBI warns of virtual kidnapping scams using altered social media photos

FBI warns of virtual kidnapping scams using altered social media photos

by Syndicated News Feed | Dec 5, 2025 | IT Security | 0 Comments

The FBI warns of criminals altering images shared on social media and using them as fake proof of life photos in virtual kidnapping ransom scams. This is part of a public service announcement published today about criminals contacting victims via text message,...

read more
UK cops to scale facial recognition despite privacy backlash • The Register

UK cops to scale facial recognition despite privacy backlash • The Register

by Syndicated News Feed | Dec 5, 2025 | IT Security | 0 Comments

The UK government has kicked off plans to ramp up police use of facial recognition, undeterred by a mounting civil liberties backlash and fresh warnings that any expansion risks turning public spaces into biometric dragnets. A new Home Office consultation [PDF]...

read more
Anthropic says AI agents require AI defense • The Register

Anthropic says AI agents require AI defense • The Register

by Syndicated News Feed | Dec 4, 2025 | IT Security | 0 Comments

Anthropic could have scored an easy $4.6 million by using its Claude AI models to find and exploit vulnerabilities in blockchain smart contracts. The AI upstart didn’t use the attack it found, which would have been an illegal act that would also undermine the...

read more
Hackers are exploiting ArrayOS AG VPN flaw to plant webshells

Hackers are exploiting ArrayOS AG VPN flaw to plant webshells

by Syndicated News Feed | Dec 4, 2025 | IT Security | 0 Comments

Threat actors have been exploiting a command injection vulnerability in Array AG Series VPN devices to plant webshells and create rogue users. Array Networks fixed the vulnerability in a May security update, but has not assigned an identifier, complicating...

read more
Predator spyware uses new infection vector for zero-click attacks

Predator spyware uses new infection vector for zero-click attacks

by Syndicated News Feed | Dec 4, 2025 | IT Security | 0 Comments

The Predator spyware from surveillance company Intellexa has been using a zero-click infection mechanism dubbed “Aladdin,” which compromised specific targets by simply viewing a malicious advertisement. This powerful and previously unknown infection vector is...

read more
Microsoft fixes Windows shortcut flaw exploited for years • The Register

Microsoft fixes Windows shortcut flaw exploited for years • The Register

by Syndicated News Feed | Dec 4, 2025 | IT Security | 0 Comments

Microsoft has quietly closed off a critical Windows shortcut file bug long abused by espionage and cybercrime networks. The flaw, tracked as CVE-2025-9491, allows malicious .lnk shortcut files to hide harmful command-line arguments from users, enabling hidden...

read more
Why identity is critical to improving cybersecurity posture

Why identity is critical to improving cybersecurity posture

by Syndicated News Feed | Dec 4, 2025 | IT Security | 0 Comments

Identity is effectively the new network boundary. It must be protected at all costs. 04 Dec 2025  •  , 4 min. read What do M&S and Co-op Group have in common? Aside from being among the UK’s most recognizable high street retailers, they were both recently...

read more
TLS 1.3 includes welcome improvements, still has problems • The Register

TLS 1.3 includes welcome improvements, still has problems • The Register

by Syndicated News Feed | Dec 4, 2025 | IT Security | 0 Comments

Systems Approach As we neared the finish line for our network security book, I received a piece of feedback from Brad Karp that my explanation of forward secrecy in the chapter on TLS (Transport Layer Security) was not quite right. This is a perennial concern...

read more
« Older Entries

Categories

  • Graphics Design (6)
  • IT Security (2,872)

Recent Posts

  • Crims using social media images in virtual kidnapping scams • The Register 12/05/2025
  • Barts Health NHS discloses data breach after Oracle zero-day hack 12/05/2025
  • FBI warns of virtual kidnapping scams using altered social media photos 12/05/2025
  • UK cops to scale facial recognition despite privacy backlash • The Register 12/05/2025
  • Anthropic says AI agents require AI defense • The Register 12/04/2025
©2025 Gajdek Graphics
We employ cookies to guarantee an optimal experience on our website. For additional details, please refer to our privacy policy. By opting to utilize this site, you acknowledge and agree to our policy.