Gajdek Graphics Blog
  • Blog Home Page
    • Logout
    • Log-In
  • Articles
    • IT Security
    • Graphics Design
  • Gajdek Graphics Home
  • Privacy Policy
Select Page
UK uncovers novel Microsoft snooping malware, blames GRU • The Register

UK uncovers novel Microsoft snooping malware, blames GRU • The Register

by Syndicated News Feed | Jul 20, 2025 | IT Security | 0 Comments

The UK government is warning that Russia's APT28 (also known as Fancy Bear or Forest Blizzard) has been deploying previously unknown malware to harvest Microsoft email credentials and steal access to compromised accounts. Both the UK and the US have previously...

read more
Threat actors downgrade FIDO2 MFA auth in PoisonSeed phishing attack

Threat actors downgrade FIDO2 MFA auth in PoisonSeed phishing attack

by Syndicated News Feed | Jul 19, 2025 | IT Security | 0 Comments

A PoisonSeed phishing campaign is bypassing FIDO2 security key protections by abusing the cross-device sign-in feature in WebAuthn to trick users into approving login authentication requests from fake company portals. The PoisonSeed threat actors are known to...

read more
Popular npm linter packages hijacked via phishing to drop malware

Popular npm linter packages hijacked via phishing to drop malware

by Syndicated News Feed | Jul 19, 2025 | IT Security | 0 Comments

Popular JavaScript libraries were hijacked this week and turned into malware droppers, in a supply chain attack achieved via targeted phishing and credential theft. The npm package eslint-config-prettier, downloaded over 30 million times weekly, was compromised...

read more
ChatGPT”s GPT-5-reasoning-alpha model spotted ahead of launch

ChatGPT”s GPT-5-reasoning-alpha model spotted ahead of launch

by Syndicated News Feed | Jul 19, 2025 | IT Security | 0 Comments

GPT-5 might be just a few days or weeks away, as we've spotted references to a new model called gpt-5-reasoning-alpha-2025-07-13. As spotted on X, OpenAI is testing a model called "gpt-5-reasoning-alpha-2025-07-13." This model was finalised on the 13th of July,...

read more
Ex-IDF cyber chief talks Iran, Scattered Spider with The Reg • The Register

Ex-IDF cyber chief talks Iran, Scattered Spider with The Reg • The Register

by Syndicated News Feed | Jul 19, 2025 | IT Security | 0 Comments

Interview Scattered Spider and Iranian government-backed cyber units have more in common than a recent uptick in hacking activity, according to Ariel Parnes, a former colonel in the Israeli Defense Forces' cyber unit 8200. Both the financially motivated crew...

read more
New CrushFTP zero-day exploited in attacks to hijack servers

New CrushFTP zero-day exploited in attacks to hijack servers

by Syndicated News Feed | Jul 18, 2025 | IT Security | 0 Comments

CrushFTP is warning that threat actors are actively exploiting a zero-day vulnerability tracked as CVE-2025-54309, which allows attackers to gain administrative access via the web interface on vulnerable servers. CrushFTP is an enterprise file transfer server...

read more
New ChatGPT o3-alpha model hints at coding upgrade

New ChatGPT o3-alpha model hints at coding upgrade

by Syndicated News Feed | Jul 18, 2025 | IT Security | 0 Comments

ChatGPT's o3 is OpenAI's best model to date because it features reasoning, and it might get even better in the next update. As spotted on X, OpenAI is testing a new "Alpha" variant of the o3 model, which has significant coding-related improvements. In our...

read more
WeTransfer ToS adding ‘machine learning’ caused freakout • The Register

WeTransfer ToS adding ‘machine learning’ caused freakout • The Register

by Syndicated News Feed | Jul 18, 2025 | IT Security | 0 Comments

Analysis WeTransfer this week denied claims it uses files uploaded to its ubiquitous cloud storage service to train AI, and rolled back changes it had introduced to its Terms of Service after they deeply upset users. The topic? Granting licensing permissions...

read more
Citrix Bleed 2 exploited weeks before PoCs as Citrix denied attacks

Citrix Bleed 2 exploited weeks before PoCs as Citrix denied attacks

by Syndicated News Feed | Jul 17, 2025 | IT Security | 0 Comments

A critical Citrix NetScaler vulnerability, tracked as CVE-2025-5777 and dubbed "CitrixBleed 2," was actively exploited nearly two weeks before proof-of-concept (PoC) exploits were made public, despite Citrix stating that there was no evidence of attacks....

read more
Google sues 25 alleged BadBox 2.0 botnet operators • The Register

Google sues 25 alleged BadBox 2.0 botnet operators • The Register

by Syndicated News Feed | Jul 17, 2025 | IT Security | 0 Comments

Google has filed a lawsuit against 25 unnamed individuals in China it accuses of breaking into more than 10 million devices worldwide and using them to build a botnet, called BadBox 2.0, and then to carry out other cybercrimes and fraud. "As of April 2025,...

read more
« Older Entries
Next Entries »

Categories

  • Graphics Design (6)
  • IT Security (7,385)

Recent Posts

  • OpenAI says GPT-6 is coming and it’ll be better than GPT-5 (obviously) 08/20/2025
  • AWS patches Q Developer after prompt injection, RCE demo • The Register 08/20/2025
  • Hackers steal Microsoft logins using legitimate ADFS redirects 08/20/2025
  • McDonald’s not lovin’ it when hacker exposes rotten security • The Register 08/20/2025
  • Ollama bug allows drive-by attacks 08/19/2025
©2025 Gajdek Graphics
We employ cookies to guarantee an optimal experience on our website. For additional details, please refer to our privacy policy. By opting to utilize this site, you acknowledge and agree to our policy.