by Syndicated News Feed | Sep 29, 2025 | IT Security
Over the weekend, some people noticed that GPT-4o is routing requests to an unknown model out of nowhere. Turns out it’s a “safety” feature. ChatGPT routes some conversations to different models than what is expected. This can happen when...
by Syndicated News Feed | Sep 29, 2025 | IT Security
Opinion Last year, The Register reported on AI sleeper agents. A major academic study explored how to train an LLM to hide destructive behavior from its users, and how to find it before it triggered. The answers were unambiguously asymmetric — the first is easy, the...
by Syndicated News Feed | Sep 28, 2025 | IT Security
Ongoing Akira ransomware attacks targeting SonicWall SSL VPN devices continue to evolve, with the threat actors found to be successfully logging in despite OTP MFA being enabled on accounts. Researchers suspect that this may be achieved through the use of previously...
by Syndicated News Feed | Sep 27, 2025 | IT Security
Hackers have been spotted using SEO poisoning and search engine advertisements to promote fake Microsoft Teams installers that infect Windows devices with the Oyster backdoor, providing initial access to corporate networks. The Oyster malware, also known as Broomstick...
by Syndicated News Feed | Sep 27, 2025 | IT Security
Two Dutch teenage boys aged 17, reportedly used hacking devices to spy for Russia, have been arrested by the Politie on Monday. According to De Telegraaf, the two used a WiFi sniffer device near Europol and Eurojust offices, as well as the Canadian embassy in The...
by Syndicated News Feed | Sep 27, 2025 | IT Security
RedNovember, a Chinese state-sponsored cyberspy group, targeted government and critical private-sector networks around the globe between June 2024 and July 2025, exploiting buggy internet-facing appliances to deploy a Go-based backdoor called Pantegana and other...