Security-Portal.cz je internetový portál zaměřený na počítačovou bezpečnost, hacking, anonymitu, počítačové sítě, programování, šifrování, exploity, Linux a BSD systémy. Provozuje spoustu zajímavých služeb a podporuje příznivce v zajímavých projektech.

Kategorie

Auction giant Sotheby’s says data breach exposed financial information

Bleeping Computer - 16 Říjen, 2025 - 20:24
Major international auction house Sotheby's is notifying individuals of a data breach incident on its systems where threat actors stole sensitive information, including financial details. [...]
Kategorie: Hacking & Security

Auction giant Sotheby’s says data breach exposed customer information

Bleeping Computer - 16 Říjen, 2025 - 20:24
Major international auction house Sotheby's is notifying customers of a data breach incident on its systems where threat actors stole sensitive information, including financial details. [...]
Kategorie: Hacking & Security

Have I Been Pwned: Prosper data breach impacts 17.6 million accounts

Bleeping Computer - 16 Říjen, 2025 - 20:19
Hackers stole the personal information of over 17.6 million people after breaching the systems of financial services company Prosper. [...]
Kategorie: Hacking & Security

Hackers exploit Cisco SNMP flaw to deploy rootkit on switches

Bleeping Computer - 16 Říjen, 2025 - 19:13
Threat actors exploited a recently patched remote code execution vulnerability (CVE-2025-20352) in Cisco networking devices to deploy a rootkit and target unprotected Linux systems. [...]
Kategorie: Hacking & Security

Anthropic releases new version of its smaller Haiku model

Computerworld.com [Hacking News] - 16 Říjen, 2025 - 18:33

Anthropic is launching Claude Haiku 4.5, the newest version of the generative AI ​(genAI) ​company’s smallest language model. The company says it offers the same performance as Sonnet 4, but at a third of the cost and more than twice the speed.

Haiku 4.5 reportedly performs on par with Sonnet 4, OpenAI’s GPT-5, and Gemini 2.5 in several benchmark tests, including SWE-Bench, Terminal-Bench, and tasks related to tool, computing, and visual reasoning skills.

The model is available in all of Anthropic’s free plans. Due to its low resource consumption, multiple Haiku agents can be run in parallel or in combination with more advanced models.

The previous version of Haiku was released a year ago. Anthropic two weeks ago launched Sonnet 4.5 and, two months ago, Opus 4.1.

Kategorie: Hacking & Security

Voice AI issues – the clunky speech, weird pauses and inaccuracies — are being fixed, execs say

Computerworld.com [Hacking News] - 16 Říjen, 2025 - 18:14

Voice AI technology has been around for years. But clunky voices, awkward pauses, and problems with accuracy have been roadblocks to widespread adoption.

Many of those issues are now being resolved as more startups jump into the voice AI fray, Twilio and Zoom CEOs said recently at the Goldman Sachs Communacopia + Technology conference.

Twilio CEO Khozema Shipchandler said that internal research shows customers would prefer to interact with voice AI as opposed to humans — especially in healthcare. That’s because customers feel there’s an “asymmetry in knowledge between the two sides” when it comes to human agents, and weird interactions disappear with virtual voice agents, Shipchandler said.

“You don’t have these awkward pauses when you have these interactions take place between a human on one side and then a voice AI agent on the other side,” Shipchandler said.

Latency — or the reaction time by voice AI agents — has historically been an issue, but that is now close to being resolved, Shipchandler said.

Zoom has invested heavily in its voice AI agents, which are multilingual and have natural voices, said Zoom CEO Eric Yuan. The goal is to make sure those sometimes odd pauses go away.

But real-world experiments have had mixed results. According to reports, restaurant chains such as Taco Bell and McDonald’s have stopped voice AI efforts at drive-throughs as the AI couldn’t interpret vocal orders correctly.

The technology still has a long way to go, as it’s much harder to implement than text-based AI, said Jack Gold, principal analyst at J. Gold Associates. “Voice, even with a single language like English, has a huge amount of variability, with accents — think southern drawl vs. New England ‘ahs’ — and even the same language meaning different things to different people,” he said.

On the plus side, voice is a natural way to handle inquiries, as not everyone types well, Gold said.

In areas such as food delivery, 35% of orders still come in over the phone — and voice AI agents can help make those interactions faster and more efficient. “The voice AI’s capacity is unlimited,” Shipchandler said.

Thousands of venture-backed voice AI companies are now trying to solve these issues, he said. 

More people are now talking to ChatGPT instead of using text prompts, which shows the potential of voice AI, Yuan said. “I think pretty sure in the next two to three years, a lot of new solutions will be built upon voice technology,” he said.

There are still risks involved in voice spoofing that will need to be resolved. If systems could identify a voice signature up front and then do light verification on the back end, customers can get right into the conversation and drive the interaction and outcomes. “You’ve got to take out spoofing, because that is a real thing,” Shipchandler said.

Meanwhile, Zoom is working with chief information security officers and publishing papers on how to deploy its AI technologies.

nice AIThere will be continuous improvement in voice AI over the next couple of years to eliminate many of the errors being discovered in voice-based AI systems, Gold said.  “That will improve especially as the data input to the models gets better,” he said.

Kategorie: Hacking & Security

Microsoft disrupts ransomware attacks targeting Teams users

Bleeping Computer - 16 Říjen, 2025 - 17:58
Microsoft has disrupted a wave of Rhysida ransomware attacks in early October by revoking over 200 certificates used to sign malicious Teams installers. [...]
Kategorie: Hacking & Security

Microsoft: Office 2016 and Office 2019 have reached end of support

Bleeping Computer - 16 Říjen, 2025 - 16:50
​​​​​Microsoft reminded customers this week that Office 2016 and Office 2019 have reached the end of extended support on October 14, 2025. [...]
Kategorie: Hacking & Security

Gladinet fixes actively exploited zero-day in file-sharing software

Bleeping Computer - 16 Říjen, 2025 - 16:11
Gladinet has released security updates for its CentreStack business solution to address a local file inclusion vulnerability (CVE-2025-11371) that threat actors have leveraged as a zero-day since late September. [...]
Kategorie: Hacking & Security

North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts

The Hacker News - 16 Říjen, 2025 - 15:56
A threat actor with ties to the Democratic People's Republic of Korea (aka North Korea) has been observed leveraging the EtherHiding technique to distribute malware and enable cryptocurrency theft, marking the first time a state-sponsored hacking group has embraced the method. The activity has been attributed by Google Threat Intelligence Group (GTIG) to a threat cluster it tracks as UNC5342,
Kategorie: Hacking & Security

North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts

The Hacker News - 16 Říjen, 2025 - 15:56
A threat actor with ties to the Democratic People's Republic of Korea (aka North Korea) has been observed leveraging the EtherHiding technique to distribute malware and enable cryptocurrency theft, marking the first time a state-sponsored hacking group has embraced the method. The activity has been attributed by Google Threat Intelligence Group (GTIG) to a threat cluster it tracks as UNC5342, Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sites

The Hacker News - 16 Říjen, 2025 - 15:52
A financially motivated threat actor codenamed UNC5142 has been observed abusing blockchain smart contracts as a way to facilitate the distribution of information stealers, such as Atomic (AMOS), Lumma, Rhadamanthys (aka RADTHIEF), and Vidar, targeting both Windows and Apple macOS systems. "UNC5142 is characterized by its use of compromised WordPress websites and 'EtherHiding,' a technique used
Kategorie: Hacking & Security

Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sites

The Hacker News - 16 Říjen, 2025 - 15:52
A financially motivated threat actor codenamed UNC5142 has been observed abusing blockchain smart contracts as a way to facilitate the distribution of information stealers, such as Atomic (AMOS), Lumma, Rhadamanthys (aka RADTHIEF), and Vidar, targeting both Windows and Apple macOS systems. "UNC5142 is characterized by its use of compromised WordPress websites and 'EtherHiding,' a technique used Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

CISA: Maximum-severity Adobe flaw now exploited in attacks

Bleeping Computer - 16 Říjen, 2025 - 15:28
CISA has warned that attackers are actively exploiting a maximum-severity vulnerability in Adobe Experience Manager to execute code on unpatched systems. [...]
Kategorie: Hacking & Security

LinkPro Linux Rootkit Uses eBPF to Hide and Activates via Magic TCP Packets

The Hacker News - 16 Říjen, 2025 - 15:28
An investigation into the compromise of an Amazon Web Services (AWS)-hosted infrastructure has led to the discovery of a new GNU/Linux rootkit dubbed LinkPro, according to findings from Synacktiv. "This backdoor features functionalities relying on the installation of two eBPF [extended Berkeley Packet Filter] modules, on the one hand to conceal itself, and on the other hand to be remotely
Kategorie: Hacking & Security

LinkPro Linux Rootkit Uses eBPF to Hide and Activates via Magic TCP Packets

The Hacker News - 16 Říjen, 2025 - 15:28
An investigation into the compromise of an Amazon Web Services (AWS)-hosted infrastructure has led to the discovery of a new GNU/Linux rootkit dubbed LinkPro, according to findings from Synacktiv. "This backdoor features functionalities relying on the installation of two eBPF [extended Berkeley Packet Filter] modules, on the one hand to conceal itself, and on the other hand to be remotely Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Unified Exposure Management Platforms: The Future of Preemptive Cyber Defense

Bleeping Computer - 16 Říjen, 2025 - 15:00
Traditional MDR focuses on reacting to attacks already in motion — but modern threats demand prevention. Picus Security explains how Unified Exposure Management Platforms continuously identifies, validates, and fixes exploitable risks before adversaries strike. [...]
Kategorie: Hacking & Security

North Korean hackers use EtherHiding to hide malware on the blockchain

Bleeping Computer - 16 Říjen, 2025 - 15:00
North Korean hackers were observed employing the 'EtherHiding' tactic to deliver malware, steal cryptocurrency, and perform espionage with stealth and resilience. [...]
Kategorie: Hacking & Security

Microsoft adds Copilot voice activation on Windows 11 PCs

Bleeping Computer - 16 Říjen, 2025 - 14:00
Microsoft says Windows 11 users can now start a conversation with the AI-powered Copilot digital assistant by saying the "Hey Copilot" wake word. [...]
Kategorie: Hacking & Security

Microsoft debuts Copilot Actions for agentic AI-driven Windows tasks

Bleeping Computer - 16 Říjen, 2025 - 14:00
Microsoft announced today a new Windows 11 Copilot feature called Copilot Actions that enables AI agents to perform real tasks on local files and applications. [...]
Kategorie: Hacking & Security
Syndikovat obsah