Security-Portal.cz je internetový portál zaměřený na počítačovou bezpečnost, hacking, anonymitu, počítačové sítě, programování, šifrování, exploity, Linux a BSD systémy. Provozuje spoustu zajímavých služeb a podporuje příznivce v zajímavých projektech.

Kategorie

Apple gets ready to bite at the mid-range

Computerworld.com [Hacking News] - 37 min 3 sek zpět

While competitors face increasing component coats and shrinking demand, Apple’s spring 2026 collection seemingly strikes a far more optimistic note. Apple is broadening its market, while others contract, and right now appears focused on delivering faster, better products at mid-range prices.

The company is on the cusp of introducing new Macs, tablets, and smartphones aimed directly at the market segment its competitors dominate, capitalizing on their woes by applying additional pricing pressure. All these devices will run all the artificial intelligence you want them to run, while remaining resolutely the systems that already lead in any user satisfaction survey you want to name. 

What’s coming?

Most of what Apple has planned has already been discussed; those plans include the first iteration of much improved Siri and Apple Intelligence services, supported by the tactical partnership with Google Gemini. And also:

  • The iPhone 17e: Replacing the iPhone 16e, the $599 smartphone will carry an A19 chip along with Apple’s own networking and 5G chips. It will boast the same 6.1-in. display and 48 megapixel camera as the current model and will have MagSafe support. Given the positive reception to the base iPhone 17, the budget-friendly model should be popular as it delivers a lot of phone for the price. It’s expected to appear later this month.
  • A new entry-level iPad equipped with the A18 chip — and an M4-powered iPad Air. This brings AI to the entry-level model for the first time; both will be available as an optional 5G-capable device thanks to Apple’s own 5G chip. 
  • Pro Macs: Apple isn’t just about the mid-range; it’s about to apply pressure at the high-end, too, with new MacBook Pro models equipped with M5 Pro and M5 Max chips. These are expected to instantly bump Apple’s existing M5 MacBook to third place in the processor performance charts, which Apple now dominates in this price range. 
And another thing

What do you do when you sell the best PCs for most people’s needs? You work toward making those solutions available to even more people, and Apple has a plan to do just that coming down the pipe with its low-cost A-series MacBook model

Scheduled for later this year, the latter will deliver so much value for its price that it will put even more pressure on competitors in the mid-range. It will effectively be the ultimate mass-market AI PC — even as big competitors such as Dell quietly withdraw from promoting their products on the back of that emerging market.

Apple is also future proof, because as well as running its own AI solutions, its hardware can also support third-party services, including running AI services on device.

What happens next?

Apple is extending its reach across a much broader market than ever before. It’s doing so through a highly focused strategy of vertical integration, expanding its space across the supply chain through a pricing push enabled by its strategic investments in proprietary component manufacturing innovation.

The company’s decision to focus on making its own high-value processors and other silicon chips inside its hardware has enabled it to scale down costs, letting it reach for mid-priced markets while still offering products worthy of its name. So, while competitors must feed an array of high-value component suppliers (as well as themselves), Apple feeds a smaller number of mouths, replacing some of the most valuable pieces with its own proprietary designs now made on its behalf by contract manufacturers. 

This focus gives Apple far more business flexibility, particularly in current market conditions where component costs reach for the skies. Apple might have to pay more to its manufacturing partners, but other vendors must also pay more for those high-value chips.

Along with the popularity and reputation Apple has already built, its ability to broaden its market by tight control of manufacturing gives the company a brand-new economic advantage, something its looming mid-range product launches show the company is willing to exploit.

Whether through accident, design, or simple serendipity, the work Apple has been doing on silicon and supply chain management across the last 10 years means it now sits in the cat bird seat as the PC industry enters what seem to be “interesting times.” When it comes to the mid-range, Apple is ready to take a bite.

You can follow me on social media! Join me on BlueSky,  LinkedIn, and Mastodon.

Kategorie: Hacking & Security

Password guessing without AI: How attackers build targeted wordlists

Bleeping Computer - 2 hodiny 9 min zpět
Attackers don't need AI to crack passwords, they build targeted wordlists from an organization's own public language. This article explains how tools like CeWL turn websites into high-success password guesses and why complexity rules alone fall short. [...]
Kategorie: Hacking & Security

SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers

The Hacker News - 2 hodiny 28 min zpět
Microsoft has revealed that it observed a multi‑stage intrusion that involved the threat actors exploiting internet‑exposed SolarWinds Web Help Desk (WHD) instances to obtain initial access and move laterally across the organization's network to other high-value assets. That said, the Microsoft Defender Security Research Team said it's not clear whether the activity weaponized recently Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

BeyondTrust warns of critical RCE flaw in remote support software

Bleeping Computer - 4 hodiny 3 min zpět
BeyondTrust warned customers to patch a critical security flaw in its Remote Support (RS) and Privileged Remote Access (PRA) software that could allow unauthenticated attackers to execute arbitrary code remotely. [...]
Kategorie: Hacking & Security

⚡ Weekly Recap: AI Skill Malware, 31Tbps DDoS, Notepad++ Hack, LLM Backdoors and More

The Hacker News - 4 hodiny 11 min zpět
Cyber threats are no longer coming from just malware or exploits. They’re showing up inside the tools, platforms, and ecosystems organizations use every day. As companies connect AI, cloud apps, developer tools, and communication systems, attackers are following those same paths. A clear pattern this week: attackers are abusing trust. Trusted updates, trusted marketplaces, trusted apps, even Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Men charged in FanDuel scheme fueled by thousands of stolen identities

Bleeping Computer - 5 hodin 29 min zpět
Two Connecticut men face federal charges for allegedly defrauding FanDuel and other online gambling sites of $3 million over several years using the stolen identities of approximately 3,000 victims. [...]
Kategorie: Hacking & Security

How Top CISOs Solve Burnout and Speed up MTTR without Extra Hiring

The Hacker News - 5 hodin 47 min zpět
Why do SOC teams keep burning out and missing SLAs even after spending big on security tools? Routine triage piles up, senior specialists get dragged into basic validation, and MTTR climbs, while stealthy threats still find room to slip through. Top CISOs have realized the solution isn’t hiring more people or stacking yet another tool onto the workflow, but giving their teams faster, clearer [email protected]
Kategorie: Hacking & Security

Bloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaign

The Hacker News - 6 hodin 12 min zpět
The threat actor known as Bloody Wolf has been linked to a campaign targeting Uzbekistan and Russia to infect systems with a remote access trojan known as NetSupport RAT. Cybersecurity vendor Kaspersky is tracking the activity under the moniker Stan Ghouls. The threat actor is known to be active since at least 2023, orchestrating spear-phishing attacks against manufacturing, finance, and IT Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Microsoft: Exchange Online flags legitimate emails as phishing

Bleeping Computer - 6 hodin 23 min zpět
Microsoft is investigating an ongoing Exchange Online issue that mistakenly flags legitimate emails as phishing and quarantines them. [...]
Kategorie: Hacking & Security

European Commission discloses breach that exposed staff data

Bleeping Computer - 7 hodin 1 min zpět
The European Commission is investigating a breach after finding evidence that its mobile device management platform was hacked. [...]
Kategorie: Hacking & Security

TeamPCP Worm Exploits Cloud Infrastructure to Build Criminal Infrastructure

The Hacker News - 8 hodin 33 min zpět
Cybersecurity researchers have called attention to a "massive campaign" that has systematically targeted cloud native environments to set up malicious infrastructure for follow-on exploitation. The activity, observed around December 25, 2025, and described as "worm-driven," leveraged exposed Docker APIs, Kubernetes clusters, Ray dashboards, and Redis servers, along with the recently disclosed Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

BeyondTrust Fixes Critical Pre-Auth RCE Vulnerability in Remote Support and PRA

The Hacker News - 9 hodin 7 min zpět
BeyondTrust has released updates to address a critical security flaw impacting Remote Support (RS) and Privileged Remote Access (PRA) products that, if successfully exploited, could result in remote code execution. "BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability," the company Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

How the EU’s trade ‘bazooka’ could hit the US tech sector

Computerworld.com [Hacking News] - 10 hodin 10 min zpět

When the Trump Administration threatened tariffs last month against countries looking to block any plan to annex Greenland, European leaders debated responding with the region’s trade “bazooka” – a retaliation mechanism that could target US tech firms selling into the European Union. 

The anti-coercion instrument, introduced in 2023 and so far unused, is designed to deter foreign governments from applying economic pressure against EU member states. It provides the legal basis for the EU to impose a broad range of retaliatory economic restrictions, allowing it to escalate its response without relying on traditional trade dispute procedures.  

Countermeasures could be applied to various industries. In the case of the US, technology services – including cloud computing and software – would be potential targets. 

“If you want to target the US and hurt the US, it’s the technology sector and digital services area that you want to go to,” said Holger Görg, professor of International Economics at the University of Kiel and director of the “International Trade and Investment” research group at Kiel Institute. 

The EU and the US have the world’s largest bilateral trade partnership. But while the US has a significant goods trade deficit with the EU – everything from German cars to Italian wine – it’s a different case for services, where the US ran a €109 billion surplus in 2023, or roughly $120 billion. (The European Council, citing EuroStat data, put the EU services deficit at €148 billion in 2024, or about $158 billion. The deficit figures vary, depending on source.)

The prospect that European leaders might turn to drastic economic action arose after US President Donald J. Trump made repeated comments that he wanted the US to take over Greenland, an autonomous territory of Denmark. Danish and other European leaders have flatly rejected the idea, though Trump keeps talking about it as a possibility.

Around three quarters of total EU-US service trade is made up of “digitally deliverable services,” according to Eurostat figures cited in a Kiel Institute report. That broad category includes cloud computing and enterprise software, alongside other remotely delivered services. 

“The US is a big services exporter, and a big technology exporter,” said Görg. “These companies rely on international markets a lot; if you limit that, it’s disruptive.”

Beyond any economic impact, the instrument could give the EU leverage over sectors with companies that can then exert political pressure on their own government. 

“We can say with nearly 100% certainty that the Commission is already conducting an assessment [about which sectors it would target],” said Dylan Geraets, counsel at international law firm Mayer Brown. “If the assessment shows that cloud computing would be a sector that would be very negatively affected — and could conceivably exert pressure on the US government to stop the behavior that the EU is accusing the US of engaging in — then that would definitely be on the table.” 

How could the EU respond?

The regulation sets out several counter measures that could be applied to technology services (more details are available in Annex 1 of the regulation document).

One possibility would be increased customs duties and additional charges on imports. The Commission could also exclude US technology companies from accessing the European market by blocking them from public sector procurement tenders, for example. That could be implemented as a complete ban or for contracts up to a certain value, said Geraets.

Other potential measures include limits on US tech firms’ ability to invest in Europe — such as preventing the acquisition of startups in EU member states, for example — or placing restrictions on expansion of EU operations. 

Any measures to restrict access to US technology services or increase prices would “have big implications” for European technology buyers, said Görg. 

“If [the EU] really were to implement a digital services tax or restrict access to US companies, that would really hurt the public sector here, as well as a lot of private companies,” he said. “That’s always the case: the person implementing trade restrictions is always the one hurting themselves — perhaps the most, and certainly very significantly.” 

The major question still unanswered is whether the EU would be willing to place restrictions on a technology sector on which it has become so reliant. 

While there’s been a significant upswell of interest in digital sovereignty among European organizations — and some notable efforts to achieve this, such as the French government’s plans to replace Microsoft Teams for 200,000 workers — the reality is that many private and public sector organizations depend heavily on US tech providers.

As a result, restrictions on consumer digital services such as US social media companies seem more plausible than business technology providers, said Dario Maisto, senior analyst at Forrester. “How many companies nowadays can do without the Microsoft suite?” he said, pointing to Airbus’ almost decade-long attempt to migrate off of Microsoft’s productivity applications to Google’s alternative. 

European customers currently see few options that can achieve feature parity with Microsoft’s software suite, he said. “If you want to migrate from Excel to Google Sheets…, you will have months and months of projects going on just to replace the macros in Excel. So how doable is it?” Maisto said. “You can impose tariffs if there is an alternative — if you want to hit the market to privilege another – but there is no other one.”

Ambiguity could be strategic

Because the instrument has not been used before, it’s unclear how the measures would be applied in practice — or how far the EU would be willing to push. The ambiguity could be beneficial to the Commission, according to Geraets. “This is precisely the deterrent effect that the EU intends to have with this,” he said. “It’s relatively unknown at this stage, I would say, as to how far this could go.”

The level of retaliation would depend on the nature and extent of damage caused by an example of economic coercion. Exactly how the EU would determine what constitutes an appropriate response is unclear. 

“How can you quantify, let’s say, the loss of Greenland, or the expenditure required to prevent Greenland from being lost? That’s incredibly difficult to do,” said Geraets. 

The uncertainty also means the Commission has a lot of discretion over how it responds. This opens the door for lobbyists to try to push the Commission to exclude certain sectors from any sanctions. “If the US tech industry were to be targeted, you can be quite sure that there would be a lot of lobbying engagement with the Commission to try and avoid that,” he said. 

Any measures put in place would, in theory, be temporary. The Commission is required to continually review the economic coercion taking place and the effectiveness of the EU response. It should cease the use of the instrument as soon as the coercive behavior ends. 

“The bottom line is the objective would be to take away the coercive behavior,” said Geraets. “This is not a punitive instrument, at least that’s not the way in which the EU has formulated it. Rather, the aim would be to make the economic coercion that is taking place cease to exist: that’s the key objective.”

Kategorie: Hacking & Security

New tool blocks imposter attacks disguised as safe commands

Bleeping Computer - 8 Únor, 2026 - 16:26
A new open-source and cross-platform tool called Tirith can detect homoglyph attacks over command-line environments by analyzing URLs in typed commands and stopping their execution.  [...]
Kategorie: Hacking & Security

OpenClaw Integrates VirusTotal Scanning to Detect Malicious ClawHub Skills

The Hacker News - 8 Únor, 2026 - 08:32
OpenClaw (formerly Moltbot and Clawdbot) has announced that it's partnering with Google-owned VirusTotal to scan skills that are being uploaded to ClawHub, its skill marketplace, as part of broader efforts to bolster the security of the agentic ecosystem. "All skills published to ClawHub are now scanned using VirusTotal's threat intelligence, including their new Code Insight capability," Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

State actor targets 155 countries in 'Shadow Campaigns' espionage op

Bleeping Computer - 7 Únor, 2026 - 16:09
A new state-aligned cyberespionage threat group tracked as TGR-STA-1030/UNC6619, has conducted a global-scale operation dubbed the "Shadow Campaigns," where it targeted government infrastructure in 155 countries. [...]
Kategorie: Hacking & Security

German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists

The Hacker News - 7 Únor, 2026 - 12:15
Germany's Federal Office for the Protection of the Constitution (aka Bundesamt für Verfassungsschutz or BfV) and Federal Office for Information Security (BSI) have issued a joint advisory warning of a malicious cyber campaign undertaken by a likely state-sponsored threat actor that involves carrying out phishing attacks over the Signal messaging app. "The focus is on high-ranking targets in
Kategorie: Hacking & Security

German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists

The Hacker News - 7 Únor, 2026 - 12:15
Germany's Federal Office for the Protection of the Constitution (aka Bundesamt für Verfassungsschutz or BfV) and Federal Office for Information Security (BSI) have issued a joint advisory warning of a malicious cyber campaign undertaken by a likely state-sponsored threat actor that involves carrying out phishing attacks over the Signal messaging app. "The focus is on high-ranking targets in Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Payments platform BridgePay confirms ransomware attack behind outage

Bleeping Computer - 7 Únor, 2026 - 10:47
A major U.S. payment gateway and solutions provider says a ransomware attack has knocked key systems offline, triggering a widespread outage affecting multiple services. The incident began on Friday and quickly escalated into a nationwide disruption across BridgePay's platform. [...]
Kategorie: Hacking & Security

What Is TLS (Transport Layer Security) in Linux Security?

LinuxSecurity.com - 7 Únor, 2026 - 05:01
Most Linux outages that get labeled as ''security issues'' are not breaches. They are TLS failures that sit quietly until a renewal expires, a client updates, or a service starts refusing connections for reasons that look unrelated at first. By the time users notice, traffic has already stopped, and the only clue is a vague handshake error buried in a log file.
Kategorie: Hacking & Security
Syndikovat obsah