Forgot your password?
typodupeerror

Submission + - Anthropic Unveils Claude Security to Counter AI-Powered Exploit Surge (securityweek.com)

wiredmikey writes: Anthropic has unveiled as the industry braces for a new wave of AI-powered attacks. Models like Mythos are compressing time-to-exploit to minutes, fundamentally shifting the advantage toward attackers. Without equally capable defensive AI, security teams risk being overwhelmed. Claude Security is Anthropic’s answer. Integrated directly into enterprise workflows, it scans code, identifies vulnerabilities, explains risk with confidence scoring, and helps generate targeted fixes in a single session.

Submission + - OpenAI Widens Access to Cybersecurity Model After Anthropic's Mythos (securityweek.com) 1

wiredmikey writes: OpenAI has introduced GPT-5.4-Cyber, a cybersecurity-focused model that will be offered to many defenders. OpenAI announced that it’s scaling its Trusted Access for Cyber program to thousands of verified defenders and hundreds of security teams. They will be given access to GPT-5.4-Cyber, a fine-tuned variant of GPT-5.4 that relaxes the usual guardrails for legitimate cybersecurity work.

The announcement comes in the wake of Anthropic’s release of Claude Mythos, a new and powerful AI model allegedly capable of autonomously discovering thousands of zero-day vulnerabilities. This led Anthropic to withhold its public release and instead offer it only to a few dozen major organizations through a restricted program called Project Glasswing.

Submission + - Anthropic Unveils Claude Mythos, Powerful AI With Major Cyber Implications (securityweek.com) 1

wiredmikey writes: Anthropic has unveiled Claude Mythos, a new AI model capable of discovering critical vulnerabilities at scale. It’s already powering Project Glasswing, a joint effort with major tech firms to secure critical software. But the same capabilities could also accelerate offensive cyber operations.

Submission + - Trump Orders Federal Agencies to Stop Using Anthropic Technology (securityweek.com)

wiredmikey writes: President Donald Trump said Friday he was ordering all federal agencies to phase out use of Anthropic technology after the company’s unusually public dispute with the Pentagon over artificial intelligence safety. Trump’s comments came just over an hour before the Pentagon’s deadline for Anthropic to allow unrestricted military use of its AI technology or face consequences — and nearly 24 hours after CEO Dario Amodei said his company “cannot in good conscience accede” to the Defense Department’s demands.

Submission + - iOS Zero-Day Exploited in 'Extremely Sophisticated Attack' (securityweek.com)

wiredmikey writes: Apple has rolled out fixes for iOS and macOS systems to resolve a zero-day vulnerability that has been exploited in the wild. Tracked as CVE-2026-20700, the zero-day flaw is described as a memory corruption issue that could be exploited for arbitrary code execution. “Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26,” Apple noted in its advisory.

Submission + - New 'ZeroDayRAT' Enables Total Compromise of iOS, Android Devices (securityweek.com)

wiredmikey writes: Security researchers have discovered ZeroDayRAT, a new commercial mobile spyware toolkit that enables full remote access to Android and iOS devices, with features including live camera feeds, key logging, bank and crypto theft and more. Available via Telegram, researchers from iVerify warn that ZeroDayRAT is a ‘complete mobile compromise toolkit’ comparable to kits normally requiring nation-state resources to develop. This is a worrying new spyware RAT that may be with us for some time.

Submission + - Predator Spyware Turns Failed Attacks Into Intelligence for Future Exploits (securityweek.com)

wiredmikey writes: The Predator spyware is more sophisticated and dangerous than previously realized. New research reveals an error taxonomy that reports exactly why deployments fail, turning black boxes into diagnostic events for threat actors. Almost exclusively marketed to and used by national governments and intelligence agencies, the spyware also detects cybersecurity tools, suppresses forensics evidence, and has built-in geographic restrictions.

Comment Maduro is a gangster facing charges in court (Score 2, Informative) 205

Maduro has had a part in moving thousands of tons of cocaine into the United States (killing how many?) and has been in league with drug cartels, narco-terrorists, and terrorists. He is a gangster that had been running a corrupt gangster government with a history of human rights abuses. Venezuela 2024 Human Rights Report

With the aid of US Special Operations forces, United States law enforcement officers arrested Maduro today and brought him to the United States to face charges in a court of law. Below is an extract of the indictment.

UNITED STATES DISTRICT COURT - SOUTHERN DISTRICT OF NEW YORK
UNITED STATES OF AMERICA V. NICOLAS MADURO MOROS . . . . (click on the Not A Robot button)

For over 25 years, leaders of Venezuela have abused their positions of public trust and corrupted once-legitimate institutions to import tons of cocaine into the United States.

NICOLAS MADURO MOROS, the defendant, is at the forefront of that corruption and has partnered with his co-conspirators to use his illegally obtained authority and the institutions he corroded to transport thousands of tons of cocaine to the United States. Since his early days in Venezuelan government, MADURO MOROS has tarnished every public office he has held. As a member of Venezuela's National Assembly, MADURO MOROS moved loads of cocaine under the protection of Venezuelan law enforcement. As Venezuela's Minister of Foreign Affairs, MADURO MOROS provided Venezuelan diplomatic passports to drug traffickers and facilitated diplomatic cover for planes used by money launderers to repatriate drug proceeds from Mexico to Venezuela. As Venezuela's President and now-de facto ruler, MADURO MOROS allows cocaine-fueled corruption to flourish for his own benefit, for the benefit of members of his ruling regime, and for the benefit of his family members.

NICOLAS MADURO MOROS, the defendant, now sits atop a corrupt, illegitimate government that, for decades, has leveraged government power to protect and promote illegal activity, including drug trafficking. That drug trafficking has enriched and entrenched Venezuela's political and military elite, including Minister of the Interior, Justice and Peace DIOSDADO CABELLO RONDON, the defendant, and former Minister of the Interior and Justice RAMON RODRIGUEZ CHACIN, the defendant. That massive-scale drug trafficking has also concentrated power and wealth in the hands of MADURO MOROS's family, including his wife, the purported First Lady of Venezuela CILIA ADELA FLORES DE MADURO, the defendant, and MADURO MOROS's son, member of Venezuela's National Assembly NICOLAS ERNESTO MADURO GUERRA, a/k/a "Nicolasito," a/k/a "The Prince," the defendant. This cycle of narcotics-based corruption lines the pockets of Venezuelan officials and their families while also benefiting violent narco-terrorists who operate with impunity on Venezuelan soil and who help produce, protect, and transport tons of cocaine to the United States.

At various times since in or about 1999, Venezuelan officials, including NICOLAS MADURO MOROS, DIOSDADO CABELLO RONDON, and RAMON RODRIGUEZ CHACIN, the defendants, have partnered with narco-terrorists from the Fuerzas Armadas Revolucionarias de Colombia ("F ARC"), Ejercito de Liberaci6n Nacional ("ELN"), the Sinaloa Cartel, the Zetas, and Tren de Aragua ("TdA"), including TdA's leader, HECTOR RUSTHENFORD GUERRERO FLORES, a/k/a "Nifio Guerrero," the defendant. In sum, MADURO MOROS and his co-conspirators have, for decades, partnered with some of the most
violent and prolific drug traffickers and narco-terrorists in the world, and relied on corrupt officials throughout the region, to distribute tons of cocaine to the United States.

------

Venezuelans across the globe celebrate US capture of Nicolás Maduro
Venezuelans worldwide celebrate as exiles react to Maduro’s capture
Joyful crowds gathered in Miami, Chile, Peru, Ecuador and Madrid after Maduro capture

The question now is, "What comes next?"

Submission + - SPAM: Can great art be reimagined as mathematics?

An anonymous reader writes: Mathematics and art have long been portrayed as opposing modes of human understanding. So does it make any sense to reimagine iconic art through the lens of mathematics? Artist and writer, Justin Mullins, argues that it does. He reinterprets Dali's Lobster Telephone using the mathematics of vacuous truths, compares proofs of Pythagoras' Theorem to Monet's repeated studies of Rouen Cathedral and links Einstein's struggle with the cosmological constant to Géricault's Raft of the Medusa . Mullins says all art is homomorphic--transformations that preserves structure--and says his own work follows the same principle.
Link to Original Source

Submission + - Why Cambridge University Library is safeguarding floppy disk knowledge (itbrew.com)

Nerval's Lobster writes: Not all heroes wear capes. Some, like Leontien Talboom, rock bangs and suspenders while playing a real-life game of Operation on old floppy disks to preserve their content. When Talboom was a kid, she used floppy disks to save her fictional stories about Furbys, the popular robotic toy of the 90s, which she would write on her father’s old work laptop.

Today, Talboom, who is now a Cambridge University Library technical analyst, spends her time preserving knowledge about floppies while rescuing content from them as part of the library’s Future Nostalgia project. Why is Future Nostalgia’s work so important? There is limited time to image floppy disks (i.e., duplicate the data on them) because their material can degrade and oxidize over time.

“A lot of the ones that we have in our collection are dating from the ’70s, ’80s, ’90s,” Talboom said. “So, we’re talking at least 30 years by, even getting very close to 50 years for some of them.”

Submission + - It takes less than $1k to access unencrypted satellite data: study (itbrew.com)

Nerval's Lobster writes: Have you ever been tempted to spend less than $1,000 on satellite equipment—just so you can show how much sensitive data can be easily accessed?

Computer scientists from the University of California, San Diego, and the University of Maryland answered “yes” to that question. In a research paper published Oct. 13, they wrote that they can use satellites to access large amounts of sensitive and unencrypted traffic from a variety of sectors, including the telecommunication, retail, and even the military.

The setup. The researchers focused their study on geostationary (GEO) satellites, which orbit the Earth’s equator, receiving and amplifying signals from the ground. Hardware used to conduct the study included a Ku-Band satellite dish, a low-noise block downconverter to amplify weak signals, and a dish motor to enable automated movement for tracking purposes, among other materials. In total, the equipment ran the researchers just under $700, or roughly what you’d pay to rent a one-bedroom apartment in Wichita, Kansas.

Submission + - How the hacks in 'Hackers' hold up (itbrew.com)

Nerval's Lobster writes: Hackers rollerbladed into theaters almost exactly 30 years ago. The 1995 movie features young, fashionable, rebellious techies (Jonny Lee Miller, Angelina Jolie, Matthew Lillard, and others) as they go up against a corrupt security officer (Fisher Stevens) framing them for an oil-tanker cyberattack.

Nathan Hunstable remembers watching Hackers shortly after its release, when he was a young teenager who had “zero interest in computers.” Now CISO at CEC Entertainment, owner of Chuck E. Cheese, Hunstable’s interest in computers has upped a bit.

We asked the CISO (who began his IT career as a movie-theater network admin) a simple question with a complex answer: How does Hackers—and its many hacks—hold up? Get your popcorn ready. Some security threats—like social engineering—never die.

Comment Re:Everyone should become plumbers and electrician (Score 4, Interesting) 359

“The society which scorns excellence in plumbing because plumbing is a humble activity, and tolerates shoddiness in philosophy because philosophy is an exalted activity, will have neither good plumbing nor good philosophy. Neither its pipes nor its theories will hold water.” -- John Gardner:

Submission + - Cyberattack Takes Down Asahi - Japan's Largest Beer Brewer (theregister.com)

cold fjord writes: A cyberattack has disrupted operations at the Asahi Group, the largest beer brewer in Japan. The attack is reported to have stopped operations at 30 plants in Japan, responsible for 50% of company profits. The time to restore service is currently not known. Operations at facilities outside of Japan are reportedly unaffected. In addition to well known Japanese brands Asahi Super Dry Beer, Nikka Whisky and Mitsuya Cider, the Asahi Group owns brands such as the UK's Fuller's brewery chain, Peroni, Grolsch, and others. The attack on Ashi follows attacks in April that cost Marks and Spencer an estimated $300 million, and an attack on the Co-operative Group which cost it an estimated $108 million.

Slashdot Top Deals

"The identical is equal to itself, since it is different." -- Franco Spisani

Working...