Gajdek Graphics Blog
  • Blog Home Page
    • Logout
    • Log-In
  • Articles
    • IT Security
    • Graphics Design
  • Gajdek Graphics Home
  • Privacy Policy
Select Page
EU must explain funding to spyware companies • The Register

EU must explain funding to spyware companies • The Register

by Syndicated News Feed | Oct 2, 2025 | IT Security

An arsenal of angry European Parliament members (MEPs) is demanding answers from senior commissioners about why EU subsidies are ending up in the pockets of spyware companies. The group of 39 politicians referred to recent investigations that revealed countries such...
Android spyware campaigns impersonate Signal and ToTok messengers

Android spyware campaigns impersonate Signal and ToTok messengers

by Syndicated News Feed | Oct 2, 2025 | IT Security

Two new spyware campaigns that researchers call ProSpy and ToSpy lured Android users with fake upgrades or plugins for the Signal and ToTok messaging apps to steal sensitive data. To give the malicious files a sense of legitimacy, the threat actor distributed them...
Red Hat repos raided, claims cybercrew, files stolen • The Register

Red Hat repos raided, claims cybercrew, files stolen • The Register

by Syndicated News Feed | Oct 2, 2025 | IT Security

A hacking crew claims to have broken into Red Hat’s private GitLab repositories, exfiltrating some 570GB of compressed data, including sensitive documents belonging to customers.  An extortion group calling itself “the Crimson Collective” posted on...
Data breach at dealership software provider impacts 766k clients

Data breach at dealership software provider impacts 766k clients

by Syndicated News Feed | Oct 1, 2025 | IT Security

A ransomware attack at Motility Software Solutions, a provider of dealer management software (DMS), has exposed the sensitive data of 766,000 customers. Motility (formerly known as Systems 2000/Sys2K) is a provider of DMS software used by 7,000...
‘Delightful’ Red Hat OpenShift AI bug allows full takeover • The Register

‘Delightful’ Red Hat OpenShift AI bug allows full takeover • The Register

by Syndicated News Feed | Oct 1, 2025 | IT Security

A 9.9 out of 10 severity bug in Red Hat’s OpenShift AI service could allow a remote attacker with minimal authentication to steal data, disrupt services, and fully hijack the platform. “A low-privileged attacker with access to an authenticated account, for...
Google Drive for desktop gets AI-powered ransomware detection

Google Drive for desktop gets AI-powered ransomware detection

by Syndicated News Feed | Oct 1, 2025 | IT Security

Google has begun rolling out a new AI-powered security feature for Google Drive desktop, which will automatically pause file syncing when it detects a ransomware attack to minimize impact. While this will not block ransomware from encrypting files on the infected...
« Older Entries
Next Entries »

Categories

  • Graphics Design (6)
  • IT Security (7,613)

Recent Posts

  • Docker makes Hardened Images Catalog affordable for small businesses 10/07/2025
  • US X-ray biz gets clear image of 171k+ patients’ stolen data • The Register 10/07/2025
  • Red Hat data breach escalates as ShinyHunters joins extortion 10/06/2025
  • Critical GoAnywhere bug exploited in ransomware attacks 10/06/2025
  • Redis warns of critical flaw impacting thousands of instances 10/06/2025
©2025 Gajdek Graphics
We employ cookies to guarantee an optimal experience on our website. For additional details, please refer to our privacy policy. By opting to utilize this site, you acknowledge and agree to our policy.