Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Submission + - The CVE database almost wasgone. Now 11 months left (theregister.com)

gavron writes: The CVE list contains over 25 years of security vulnerabilities. Stephen J Vaughn-Nichols explains why it's important to ALL countries and ALL ITSEC people. It also almost just went away when rabid DOGGIES tried to cut it.

It also only has 11 months left to live based on funding, so FDJT may try and cripple it again. It helps EVERYONE and only hurts blackhat hackers. Unfortunately nobody in Congress understands anything technical (except for Ron Widen) and they're too busy dismantling their own least favorite part (CDA Sec 230) to worry about this.

Meanwhile the US FBI, UK, and NZ equivs say we should have back doors in encryption.

CVEs are important. This should not be defunded. Call up the office of that idiot in your district and tell their PA that.

Comment Re:Small wonder (Score 1) 100

I have a boss that ordered me to use AI tools when drafting things to other people even with sensitive information. My boss clearly trusts these things way more than I do (ars technica had a story a year ago about how someone was playing with chatGPT and it displayed real copies of the person's med records.... reason enough not to trust that service).

Comment It is still buggy (Score 1) 106

I know of devices at my work where they still can't print due to usb issues with it, along with also connecting to smart boards that version windows machines can't drive a image, sound or touch. Fall update is still broken, which is why our tech team blocked it, after it started to run problems yet many devices were not rolled back, so they still have issues.

Submission + - China spends 5+ years hacking firewall vendor, who breaks omerta (sophos.com)

Spikescape writes: Over a five-year period, attackers based in Chengdu, China repeatedly targeted the firewalls sold by cybersecurity vendor Sophos. The company, while this was going on, figured out who the attackers were, hacked back and monitored the people who were doing this, and passed the information to law enforcement, who were able to notify victims and stop the intrusions in most cases.

Sophos X-Ops has identified, with high confidence, exploit research and development activity being conducted in the Sichuan region. Consistent with China’s vulnerability disclosure legislation, X-Ops assesses with high confidence that the developed exploits were then shared with multiple distinct state-sponsored frontline groups with differing objectives, capabilities, and post-exploitation tooling.


Slashdot Top Deals

Neutrinos have bad breadth.

Working...