by Syndicated News Feed | Sep 29, 2025 | IT Security
The Metropolitan Police has secured a conviction in what is believed to be the world’s largest cryptocurrency seizure, valued at more than £5.5 billion ($7.3 billion). Zhimin Qian, 47, also known as Yadi Zhang, pleaded guilty today at Southwark Crown Court to...
by Syndicated News Feed | Sep 29, 2025 | IT Security
Asahi Group Holdings, Ltd (Asahi), the brewer of Japan’s top-selling beer, has disclosed a cyberattack that disrupted several of its operations. According to the company, the incident has affected its ordering and shipping activity, which have been completely...
by Syndicated News Feed | Sep 29, 2025 | IT Security
The former head of MI5 says hostile cyberattacks and intelligence operations directed by The Kremlin indicate the UK might already be at war with Russia. Baroness Manningham-Buller, who served as Director General of the intelligence agency from 2002 to 2007 and was...
by Syndicated News Feed | Sep 29, 2025 | IT Security
Over the weekend, some people noticed that GPT-4o is routing requests to an unknown model out of nowhere. Turns out it’s a “safety” feature. ChatGPT routes some conversations to different models than what is expected. This can happen when...
by Syndicated News Feed | Sep 29, 2025 | IT Security
Opinion Last year, The Register reported on AI sleeper agents. A major academic study explored how to train an LLM to hide destructive behavior from its users, and how to find it before it triggered. The answers were unambiguously asymmetric — the first is easy, the...
by Syndicated News Feed | Sep 28, 2025 | IT Security
Ongoing Akira ransomware attacks targeting SonicWall SSL VPN devices continue to evolve, with the threat actors found to be successfully logging in despite OTP MFA being enabled on accounts. Researchers suspect that this may be achieved through the use of previously...
by Syndicated News Feed | Sep 27, 2025 | IT Security
Hackers have been spotted using SEO poisoning and search engine advertisements to promote fake Microsoft Teams installers that infect Windows devices with the Oyster backdoor, providing initial access to corporate networks. The Oyster malware, also known as Broomstick...
by Syndicated News Feed | Sep 27, 2025 | IT Security
Two Dutch teenage boys aged 17, reportedly used hacking devices to spy for Russia, have been arrested by the Politie on Monday. According to De Telegraaf, the two used a WiFi sniffer device near Europol and Eurojust offices, as well as the Canadian embassy in The...
by Syndicated News Feed | Sep 27, 2025 | IT Security
RedNovember, a Chinese state-sponsored cyberspy group, targeted government and critical private-sector networks around the globe between June 2024 and July 2025, exploiting buggy internet-facing appliances to deploy a Go-based backdoor called Pantegana and other...
by Syndicated News Feed | Sep 27, 2025 | IT Security
Analysis Alibaba this week opened an AI war chest containing tens of billions of dollars, a revamped LLM lineup, and plans for AI datacenters in Europe. But it also prompted a flurry of questions over how it will achieve all this in an increasingly fragmented IT...