by Syndicated News Feed | Jul 26, 2025 | IT Security
Two Democratic members of Congress, Greg Casar (D-TX) and Rashida Tlaib (D-MI,) have introduced legislation in the US House of Representatives to ban the use of AI surveillance to set prices and wages. During Delta’s Q2 earnings call last week, Delta’s...
by Syndicated News Feed | Jul 26, 2025 | IT Security
A week after Microsoft told the world that its July software updates didn’t fully fix a couple of bugs, which allowed miscreants to take over on-premises SharePoint servers and remotely execute code, researchers have assembled much of the puzzle — with one big...
by Syndicated News Feed | Jul 25, 2025 | IT Security
A hacker planted data wiping code in a version of Amazon’s generative AI-powered assistant, the Q Developer Extension for Visual Studio Code. Amazon Q is a free extension that uses generative AI to help developers code, debug, create documentation, and set up...
by Syndicated News Feed | Jul 25, 2025 | IT Security
US Senator Maria Cantwell (D-WA) has demanded that Google-owned incident response firm Mandiant hand over the Salt Typhoon-related security assessments of AT&T and Verizon that, according to the lawmaker, both operators have thus far refused to give Congress....
by Syndicated News Feed | Jul 25, 2025 | IT Security
Microsoft is investigating an ongoing outage blocking Microsoft 365 administrators with business or enterprise subscriptions from accessing the admin center. While the company has yet to disclose which regions are currently affected by this ongoing service degradation...
by Syndicated News Feed | Jul 25, 2025 | IT Security
Developer freelancing platform Toptal has been inadvertently spreading malicious code after attackers broke into its systems and began distributing malware through developer accounts. Toptal bills itself as an elite software developer freelance business where every...
by Syndicated News Feed | Jul 25, 2025 | IT Security
Microsoft says it “cannot guarantee” data sovereignty to customers in France – and by implication the wider European Union – should the Trump administration demand access to customer information held on its servers. The Cloud Act is a law that gives the US...
by Syndicated News Feed | Jul 25, 2025 | IT Security
The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) has sanctioned three North Korean nationals and a company for supporting fraudulent IT worker schemes that generated illicit revenue for the Democratic People’s Republic of Korea (DPRK)...
by Syndicated News Feed | Jul 25, 2025 | IT Security
Business insurance and employment status specialist Qdos has confirmed that an intruder has stolen some customers personal data, according to a communication to tech contractors that was seen by The Register. Qdos yesterday emailed clients on its database to confirm a...
by Syndicated News Feed | Jul 24, 2025 | IT Security
An Arizona woman who ran a laptop farm from her home – helping North Korean IT operatives pose as US-based remote workers – has been sentenced to eight and a half years behind bars for her role in a $17 million fraud that hit more than 300 American...