Agregátor RSS

[webapps] CodeCanyon RISE CRM 3.7.0 - SQL Injection

The Exploit Database - 28 Březen, 2025 - 02:00
CodeCanyon RISE CRM 3.7.0 - SQL Injection

[webapps] Litespeed Cache 6.5.0.1 - Authentication Bypass

The Exploit Database - 28 Březen, 2025 - 02:00
Litespeed Cache 6.5.0.1 - Authentication Bypass

Hijacked Microsoft web domain injects spam into SharePoint servers

Bleeping Computer - 28 Březen, 2025 - 01:11
The legacy domain for Microsoft Stream was hijacked to show a fake Amazon site promoting a Thailand casino, causing all SharePoint sites with old embedded videos to display it as spam. [...]
Kategorie: Hacking & Security

Týden na ScienceMag.cz: V Ostravě pokračují přípravy na instalaci kvantového počítače

AbcLinuxu [články] - 28 Březen, 2025 - 01:01

Temná energie se v čase zřejmě mění. V okolí černé veledíry objevili existenci skryté populace asi deseti tisíc menších černých děr. S vodními vlnami lze provádět úžasné triky. Fyzikové stanovili přísnější omezení pro sterilní neutrina.

Kategorie: GNU/Linux & BSD

Digitální trendy v bankovnictví: Zjednodušovat, ale nabízet víc a ideálně hned

Lupa.cz - články - 28 Březen, 2025 - 01:00
Jaké trendy budou v následujících letech formovat budoucnost digitálního bankovnictví?
Kategorie: IT News

„Dřevařské dluhopisy“ byly průšvih od počátku. Soud rozplétá podvod, záměnu identit a šlendriánství inzerce

Lupa.cz - články - 28 Březen, 2025 - 01:00
Žádná kontrola identit, na schůzky chodil někdo jiný, smlouvy podepisoval někdo jiný. U Krajského soudu v Brně se rozplétají nezaplacené dluhy bratrů Dvořákových a jejich firmy WOOD UNION, které se prodávaly přes Dluhopisy.cz.
Kategorie: IT News

Ďalší cieľ prevencie aterosklerózy - lipoproteín(a)

OSEL.cz - 28 Březen, 2025 - 01:00
Lipoproteín(a) - Lp(a) je považovaný za nezávislý rizikový faktor aterosklerózy. Jeho zvýšené koncentrácie v krvi sú spojené so zvýšenou pravdepodobnosťou srdcového zlyhania, cievnej mozgovej príhody a ďalších kardiovaskulárnych ochorení so zvýšenou celkovou úmrtnosťou. Zatiaľ nie je schválená žiadna liečba, ktorá by špecificky znižovala jeho hladinu v krvi.
Kategorie: Věda a technika

Ryzen 5 9600 je jen o 2-3 % pomalejší než Ryzen 5 9600X

CD-R server - 28 Březen, 2025 - 01:00
O Ryzen 5 9600 není slyšet poprvé - tentokrát to však vypadá, že se konečně blíží vydání. První výsledky pomalejší varianty šestijádrového Zen 5 jsou jen kosmeticky pod výkonnějším modelem…
Kategorie: IT News

Dotace na IT kurzy: nechte EU zaplatit za vaše vzdělání a ušetřete rodinný rozpočet

ROOT.cz - 28 Březen, 2025 - 01:00
Víte, co je lepší než nový procesor? Nové znalosti! A víte, co je ještě lepší než nové znalosti? Nové znalosti, které vám zaplatí Úřad práce formou dotací. Naučíte se něco užitečného s podporou EU.
Kategorie: GNU/Linux & BSD

Studiu Warner Bros umírají filmy na DVD a je to větší problém, než by se mohlo zdát

ROOT.cz - 28 Březen, 2025 - 01:00
Prakticky všechny filmy na DVD discích od Warner Bros z let 2006 až 2008 odcházejí. Warneři se k tomu stavějí čelem, nicméně ne vždy existuje uspokojivé řešení. Pomíjivost fyzických věcí se tak opět naplno ukazuje.
Kategorie: GNU/Linux & BSD

China’s FamousSparrow flies back into action, breaches US org after years off the radar

The Register - Anti-Virus - 28 Březen, 2025 - 00:06
Crew also cooked up two fresh SparrowDoor backdoor variants, says ESET

The China-aligned FamousSparrow crew has resurfaced after a long period of presumed inactivity, compromising a US financial-sector trade group and a Mexican research institute. The gang also likely targeted a governmental institution in Honduras, along with other yet-to-be-identified victims.…

Kategorie: Viry a Červi

With the rise of genAI, it’s time to follow Apple’s Security Recommendations

Computerworld.com [Hacking News] - 27 Březen, 2025 - 23:21

Apple’s Safari browser has a really useful password management feature, which is now also available as a standalone app called Passwords. If you’ve ever taken a look at it, you may have seen a section called Security Recommendations where you’ll find a collection of all the accounts and passwords that might have been compromised. 

If you haven’t already, it’s time to take those collections seriously, because generative AI (genAI) adoption means the scale and nature of the threats posed by purloined passwords and broken IDs is about to grow far greater. That’s because, armed with stolen emails and passwords, criminals will find it relatively easy to throw those credentials at the most popular online services. 

If they know you, they know, you

They do this already, of course. If you have a known email address and password you still use that is now being sold on the dark web (for about $10 a collection), it’s a no brainer for attackers to try it out on a range of different services. Sometimes they may get lucky.

Augmented efficiency just means that using genAI, those same attackers can plough through more of these credentials even more swiftly, enabling them to trundle through huge collections of stolen accounts and passwords fast. Stolen credentials were the big attack vector last year, according to Verizon, and were used in around 80% of exploits. 

There are around 15 billion compromised credentials available online. 

The vast majority of these are useless, which means credential stuffing attacks might not generate much of a success rate. When they do succeed, most victim learn from the experience and secure everything pretty quickly, meaning a very small number of that 15 billion are truly vulnerable. All the same, from time to time they get lucky. And getting lucky now and then is what makes that part of the account login exploitation industry tick. 

Money in the middle

These attacks generate millions of dollars of losses every year. With billions on the planet, there’s probably another fool coming in a minute or two, and you don’t want it to be you. That’s why you should spend a little time and audit Apple’s Security Recommendations regularly, as you don’t want a service you use that happens to have its hooks on your personal, payment, health, or other valuable data to be abused.

That’s true for everyone, but for enterprise users there’s a dual challenge. We all know that employees (including business owners) are and will always be the biggest security weakness in the system. The phishing industry has evolved to exploit this. 

But that tendency is equally threatening when it comes to account IDs, and together poses a double-whammy threat once empowered by AI. How many company-related accounts have slipped and to what extent do these two vulnerabilities work together?

If someone at Iworkatthisbusiness.com foolishly used their work email and complex work password to secure their access to trivialbuthackedwebsite.com, how long might it be until someone figures that out and sees if they can use this data to crack your corporate systems? 

Phisherman’s blues

These attacks don’t even need to be that smart; they can simply be used to analyze personal patterns to help craft super-effective phishing attacks against specific targets. Really sophisticated attackers could turn to a little agentic AI to gather any available social media data on entities they designate as ripe for attack, helping them create really effective phishing emails — Spear AI, as it may one day be recognized.

Artificial intelligence will help with all of this. It’s really good at identifying patterns in disparate data sets, and analyzing the data that’s already been exfiltrated into the world will be a relatively trivial task — it all just comes down to the questions the machines are asked to answer. They can even use identified patterns in passwords to predict likely password patterns based on user data for brute force attacks. I could go on.

Passwords are not the only fruit, of course. 

If you are wise you’ll be using 2FA security and/or Passkeys on all your most important websites, and certainly to protect any with access to your financial details or payment information.

Along with different forms of biometric ID, the industry is shifting to adopt more resilient access control systems — though, of course, subverting those systems is just a new challenge in the cat-and-mouse security game. Only recently, we learned of a new AI attack designed to compromise Google Chrome’s Password Manager, and there will be more attacks of this kind. That’s even before you consider the significance of attacks made against enterprise AI in their own right.

Death to security complacency

The main takeaway is this: You should act on the warnings given to you by Apple’s Security Recommendations tool. You should avoid re-using passwords, no matter where it is. You should use a Password Manager and other forms of security, such as 2FA, and you should very much beware if you receive an email from a trusted source that contains a link to something that sounds like it was made for you; chances are, it was.

Most of all, I want you to check the credentials that have been leaked, change them, close accounts, and delete payment information from any service you don’t intend to use again. As a person or enterprise, you certainly need to build a response plan for what to do if an account is compromised, or suspected to be compromised; security training even for your most experienced employees is almost certainly going to be of value. Most of all, never, ever use one of these passwords

Alternatively, ignore Safari’s friendly warning and leave yourself open to having your genuine account credentials being sold online for up to $45 a time.

Why not take the time to secure your accounts? The tools are right there in your browser. What are you waiting for?

You can follow me on social media! Join me on BlueSky,  LinkedIn, and Mastodon.

Kategorie: Hacking & Security

New security requirements adopted by HTTPS certificate industry

Google Security Blog - 27 Březen, 2025 - 22:49
Posted by Chrome Root Program, Chrome Security Team

The Chrome Root Program launched in 2022 as part of Google’s ongoing commitment to upholding secure and reliable network connections in Chrome. We previously described how the Chrome Root Program keeps users safe, and described how the program is focused on promoting technologies and practices that strengthen the underlying security assurances provided by Transport Layer Security (TLS). Many of these initiatives are described on our forward looking, public roadmap named “Moving Forward, Together.

At a high-level, “Moving Forward, Together” is our vision of the future. It is non-normative and considered distinct from the requirements detailed in the Chrome Root Program Policy. It’s focused on themes that we feel are essential to further improving the Web PKI ecosystem going forward, complementing Chrome’s core principles of speed, security, stability, and simplicity. These themes include:

  • Encouraging modern infrastructures and agility
  • Focusing on simplicity
  • Promoting automation
  • Reducing mis-issuance
  • Increasing accountability and ecosystem integrity
  • Streamlining and improving domain validation practices
  • Preparing for a "post-quantum" world

Earlier this month, two “Moving Forward, Together” initiatives became required practices in the CA/Browser Forum Baseline Requirements (BRs). The CA/Browser Forum is a cross-industry group that works together to develop minimum requirements for TLS certificates. Ultimately, these new initiatives represent an improvement to the security and agility of every TLS connection relied upon by Chrome users.

If you’re unfamiliar with HTTPS and certificates, see the “Introduction” of this blog post for a high-level overview.

Multi-Perspective Issuance Corroboration

Before issuing a certificate to a website, a Certification Authority (CA) must verify the requestor legitimately controls the domain whose name will be represented in the certificate. This process is referred to as "domain control validation" and there are several well-defined methods that can be used. For example, a CA can specify a random value to be placed on a website, and then perform a check to verify the value’s presence has been published by the certificate requestor.

Despite the existing domain control validation requirements defined by the CA/Browser Forum, peer-reviewed research authored by the Center for Information Technology Policy (CITP) of Princeton University and others highlighted the risk of Border Gateway Protocol (BGP) attacks and prefix-hijacking resulting in fraudulently issued certificates. This risk was not merely theoretical, as it was demonstrated that attackers successfully exploited this vulnerability on numerous occasions, with just one of these attacks resulting in approximately $2 million dollars of direct losses.

Multi-Perspective Issuance Corroboration (referred to as "MPIC") enhances existing domain control validation methods by reducing the likelihood that routing attacks can result in fraudulently issued certificates. Rather than performing domain control validation and authorization from a single geographic or routing vantage point, which an adversary could influence as demonstrated by security researchers, MPIC implementations perform the same validation from multiple geographic locations and/or Internet Service Providers. This has been observed as an effective countermeasure against ethically conducted, real-world BGP hijacks.

The Chrome Root Program led a work team of ecosystem participants, which culminated in a CA/Browser Forum Ballot to require adoption of MPIC via Ballot SC-067. The ballot received unanimous support from organizations who participated in voting. Beginning March 15, 2025, CAs issuing publicly-trusted certificates must now rely on MPIC as part of their certificate issuance process. Some of these CAs are relying on the Open MPIC Project to ensure their implementations are robust and consistent with ecosystem expectations.

We’d especially like to thank Henry Birge-Lee, Grace Cimaszewski, Liang Wang, Cyrill Krähenbühl, Mihir Kshirsagar, Prateek Mittal, Jennifer Rexford, and others from Princeton University for their sustained efforts in promoting meaningful web security improvements and ongoing partnership.

Linting

Linting refers to the automated process of analyzing X.509 certificates to detect and prevent errors, inconsistencies, and non-compliance with requirements and industry standards. Linting ensures certificates are well-formatted and include the necessary data for their intended use, such as website authentication.

Linting can expose the use of weak or obsolete cryptographic algorithms and other known insecure practices, improving overall security. Linting improves interoperability and helps CAs reduce the risk of non-compliance with industry standards (e.g., CA/Browser Forum TLS Baseline Requirements). Non-compliance can result in certificates being "mis-issued". Detecting these issues before a certificate is in use by a site operator reduces the negative impact associated with having to correct a mis-issued certificate.

There are numerous open-source linting projects in existence (e.g., certlint, pkilint, x509lint, and zlint), in addition to numerous custom linting projects maintained by members of the Web PKI ecosystem. “Meta” linters, like pkimetal, combine multiple linting tools into a single solution, offering simplicity and significant performance improvements to implementers compared to implementing multiple standalone linting solutions.

Last spring, the Chrome Root Program led ecosystem-wide experiments, emphasizing the need for linting adoption due to the discovery of widespread certificate mis-issuance. We later participated in drafting CA/Browser Forum Ballot SC-075 to require adoption of certificate linting. The ballot received unanimous support from organizations who participated in voting. Beginning March 15, 2025, CAs issuing publicly-trusted certificates must now rely on linting as part of their certificate issuance process.

What’s next?

We recently landed an updated version of the Chrome Root Program Policy that further aligns with the goals outlined in “Moving Forward, Together.” The Chrome Root Program remains committed to proactive advancement of the Web PKI. This commitment was recently realized in practice through our proposal to sunset demonstrated weak domain control validation methods permitted by the CA/Browser Forum TLS Baseline Requirements. The weak validation methods in question are now prohibited beginning July 15, 2025.

It’s essential we all work together to continually improve the Web PKI, and reduce the opportunities for risk and abuse before measurable harm can be realized. We continue to value collaboration with web security professionals and the members of the CA/Browser Forum to realize a safer Internet. Looking forward, we’re excited to explore a reimagined Web PKI and Chrome Root Program with even stronger security assurances for the web as we navigate the transition to post-quantum cryptography. We’ll have more to say about quantum-resistant PKI later this year.

Kategorie: Hacking & Security

As big tech circles, UK government struggles to reap promised AI benefits

Computerworld.com [Hacking News] - 27 Březen, 2025 - 22:27

The UK government’s grand plan for AI in the public sector is struggling in the face of growing technological challenges, a report by the Parliamentary Public Accounts Committee (PAC), a bipartisan group of elected members of parliament, has found.

Many of these problems will be familiar to anyone who has tried to make AI work inside an organization: the dead hand of obsolete systems, poor quality data, and a chronic lack of skilled people to implement the technology.

But beyond these issues lies another problem that could prove just as difficult: the monopolistic power of tech vendors that control the AI technology the government so badly desires.

Coming only weeks after the Government Digital Service (GDS) was created to drive AI, the committee’s initial assessment in the AI in Government report is a sobering reality check.

For the birds

The committee’s report identifies several areas of concern, starting with poor-quality data “locked away in out-of-date legacy IT systems.” Of the 72 systems previously identified as being legacy barriers, 21 hadn’t even yet received remediation funding to overcome these problems, it found.

It also noted a lack of transparency in government data use in AI, which risked creating public mistrust and a future withdrawal by citizens of their consent for its use. Other problems included the perennial shortage of AI and digital skills, an issue mentioned by 70% of government bodies responding to a 2024 National Audit Office (NAO) survey.

Additionally, government departments were running AI test pilots in a siloed way, making it difficult to learn wider lessons, said the committee.

“The government has said it wants to mainline AI into the veins of the nation, but our report raises questions over whether the public sector is ready for such a procedure,” said committee chair, Sir Geoffrey Clifton-Brown.

“Unfortunately, those familiar with our committee’s past scrutiny of the government’s frankly sclerotic digital architecture will know that any promises of sudden transformation are for the birds,” he added.

AI oligopoly

There’s a lot at stake here. AI is often talked up by the ministers as the key to overhauling the state, getting it to work more efficiently and cheaply. It’s a story that has become hugely important in many countries. If progress slows, that promise will be questioned.

In its report, the committee drew attention to the market power of a small band of AI companies. The tech industry has a tendency towards monopolies over time, it said, but with AI it was starting from this position, which might lead to technological lock-in and higher costs, hindering development in the long term.

According to the Open Cloud Coalition (OCC), a recently formed lobby group of smaller cloud providers backed by Google, the UK government’s struggles with AI mirror what happened with cloud deployment from the 2010s onwards, which included the lack of competition.

“This report shows that the dominance of a few large technology suppliers in the public procurement of AI risks stifling competition and innovation, while also hampering growth, exactly the same problems we’ve seen with cloud contracts,” commented Nicky Stewart, senior advisor to the OCC.

Cloud and AI are symbiotic, she noted, and the domination of one or both by a small group of mostly US tech companies risks building monopolies it might be difficult to escape from.

“Without reform, the government will remain over-reliant on a handful of major providers, limiting flexibility and access to innovative, leading edge technology, whilst locking taxpayers into expensive, restrictive agreements,” she said.

Sylvester Kaczmarek, CTO at OrbiSky Systems, a UK company specializing in integrating AI into aerospace applications, agreed that supplier dominance could stifle innovation, but remained just as skeptical of AI’s projected cost savings. Implementation was always where technologies proved themselves, he pointed out.

“Are savings over-sold? Most likely, in the short run,” said Kaczmarek. “There is a lot of groundwork to be laid before large-scale, reliable AI deployment can safely deliver meaningful savings. [governments need to] prioritize realistic roadmaps and more comprehensive value.”

Kategorie: Hacking & Security

Infostealer campaign compromises 10 npm packages, targets devs

Bleeping Computer - 27 Březen, 2025 - 22:22
Ten npm packages were suddenly updated with malicious code yesterday to steal environment variables and other sensitive data from developers' systems. [...]
Kategorie: Hacking & Security

Scientists Just Transplanted a Pig Liver Into a Person for the First Time

Singularity HUB - 27 Březen, 2025 - 22:12

The liver performed basic functions but isn’t yet a full replacement.

Our liver has admirable regenerative properties. But it takes a beating every day. Eventually, its tissues scar, and if the organ fails, a liver transplant is the only solution.

Donor livers are hard to come by, however. This week, a Chinese team turned to another source—pig livers—and published the first results showing how they function inside a human recipient. The liver in the study underwent heavy gene editing to rid it of genes that trigger immune rejection and add genes making it appear more human to the body.

Just two hours after transplant, the pig liver began producing bile, a type of digestive fluid that breaks down fat. The organ remained functional until the end of the experiment 10 days later, without marked signs of rejection or inflammation.

“This is the first time we tried to unravel whether the pig liver could work well in the human body,” said study author Lin Wang at Xijing Hospital in China in a press briefing. The pig liver is meant to be a stop-gap measure rather than a full replacement. It could temporarily keep patients alive until a human donor organ becomes available or the patient’s own liver recovers.

“The study represents a milestone in the history of liver xenotransplantation,” said Iván Fernández Vega at the University of Oviedo in Spain, who was not involved in the study. “I found the work very relevant, but we have to be cautious.”

Crossing Species

There’s a severe lack of donated organs. As of March 2025, over 104,600 people are on a transplant waitlist, which could take months, if not years. Some don’t survive the wait.

Xenotransplantation, or the transplantation of organs from one animal into another, offers another solution. For the past decade, scientists have been eyeing other species as resources for functional organs that could replace broken human body parts. Bama miniaturized pigs are especially promising because their internal organs are similar in size and function to ours.

But there are caveats. Pig organs are dotted with sugars that spur our immune systems into action. Immune cells attack the foreign organ, damaging its function or triggering rejection.

There’s also the risk posed by porcine endogenous retroviruses or PERVs. These are tricky viruses embedded inside the genomes of all pigs. Although they don’t seem to harm pigs, they can infect some human cells and potentially lead to disease.

Xenotransplant efforts over the past decade have tried gene editing pig organs to rid them of PERVs. Other edits inhibit genes responsible for immune rejection and make the organs appear more human to the body.

There have been successes. Genetically engineered pig hearts transplanted into baboons with heart failure allowed them to thrive for over six months. Pig kidney grafts with 69 genetic edits retained function after transplantation in monkeys.

And although highly experimental, xenotransplantation has already been used in humans. In 2021, a team performed the first transplant of a genetically modified pig kidney into a brain-dead person. The kidney was attached to blood vessels in the upper leg outside the belly and covered with a protective shield.

Since then, surgeons have transplanted hearts, kidneys, and a thymus directly inside the bodies of living volunteers, with mixed results. One pig heart recipient soon passed away after the xenotransplant. Another fared better with a pig kidney: The 53-year-old grandma returned home this February after receiving the organ late last year.

Her ”recovery from a long history of kidney failure and dialysis treatment has been nothing short of remarkable,” said study lead Robert Montgomery at NYU Langone Transplant Institute at the time.

Liver xenotransplants, however, pose additional problems.

The organ “is so complicated,” said Wang. As the ultimate multitasker, it metabolizes drugs and other chemicals, makes bile and other digestive juices, cleans out old blood cells, and produces proteins for blood clotting. Each of these functions is orchestrated by a symphony of molecules that could differ between pigs and humans. A mismatch could result in a pig liver that can’t work in the human body or one that triggers dangerous immune responses.

In 2023, a team from the University of Pennsylvania took a stab at the problem. They connected a genetically engineered pig liver to the bloodstream of a brain-dead person with the organ outside the body. The donor liver, engineered by the biotechnology company eGenesis to reduce the chance of immune rejection, remained healthy for at least 72 hours.

Plus One

The new study aimed to show that a pig liver transplant could last longer and perform its usual tasks. The team sourced the liver from Clonorgan Biotechnology based in Chengdu, China.

The donor organ was from a seven-month-old Bama miniature pig and had six gene edits. The majority of the edits were designed to prevent hyperacute rejection, where the immune system launches a full onslaught against the transplant within minutes.

The recipient was a brain-dead, middle-aged man who still had a working liver. Rather than trying to replace his liver, the team wanted to find out whether a pig liver could survive and function inside a human body while performing its normal roles.

Surgeons hooked the gene-edited pig liver to the donor’s blood supply and monitored it for 10 days—the amount of time the recipient’s family approved for the experiment. Within hours, the organ began synthesizing and pumping out bile at a gradually increasing volume. The liver also made albumin, a protein crucial for maintaining fluids and transporting molecules.

Blood from the recipient flowed smoothly throughout the liver, which likely prevented blood clots often associated with liver transplants. Thanks to immunosuppressant drugs, the patient’s immune system stayed relatively quiet and didn’t attack the pig organ.

“This is the world’s first [published] case of a transplant of a genetically modified pig liver into a brain-dead human,” said Rafael Matesanz, creator and founder of the National Transplant Organization in Spain, who was not involved in the work.

Many questions remain. The liver has multiple functions, but the study only tested bile and albumin production. Could the pig liver also filter toxins from the blood or break down medications? Also, the study only observed one person for a relatively short time. The results might not hold for other demographics, and the transplant could falter down the road.

And because the volunteer still had a functional liver, “we cannot extrapolate the extent to which this xenograft would have supported a patient in liver failure,” said Peter Friend at the University of Oxford, who was not involved in the study.

Even so, a temporary bridge transplant—where a pig liver would support bodily functions short-term while the recipient waits for a permanent transplant—could save lives.

The same team recently completed a full pig-to-human liver transplant, swapping out the liver of a brain-dead human with one from a genetically-modified pig. They plan to release the data in a future publication. “Whether it could replace the original human liver in the future [is unknown],” said Wang at the press briefing. “It is our dream to make this achievement.”

The post Scientists Just Transplanted a Pig Liver Into a Person for the First Time appeared first on SingularityHub.

Kategorie: Transhumanismus

Ubuntu 25.04 (Plucky Puffin) Beta

AbcLinuxu [zprávičky] - 27 Březen, 2025 - 21:51
Byla vydána beta verze Ubuntu 25.04 s kódovým názvem Plucky Puffin. Přehled novinek v poznámkách k vydání. Dle plánu by Ubuntu 25.04 mělo vyjít 17. dubna 2025.
Kategorie: GNU/Linux & BSD

Tiskárny neposedly zlé síly. Za tisk náhodných znaků mohla chyba ve Windows

Živě.cz - 27 Březen, 2025 - 21:04
Microsoft opravil další problém s tiskem ve Windows, který vede k tomu, že tiskárny někdy zničehonic tisknou náhodné znaky. Chybu opravují volitelné aktualizace vydané před koncem března. Na všechny počítače se oprava rozšíří s povinnou servisní aktualizací, která bude distribuována od 8. dubna. ...
Kategorie: IT News

Chinese FamousSparrow hackers deploy upgraded malware in attacks

Bleeping Computer - 27 Březen, 2025 - 20:38
A China-linked cyberespionage group known as 'FamousSparrow' was observed using a new modular version of its signature backdoor 'SparrowDoor' against a US-based trade organization. [...]
Kategorie: Hacking & Security

Windows 11 KB5053656 update released with 38 changes and fixes

Bleeping Computer - 27 Březen, 2025 - 20:21
​​Microsoft has released the KB5053656 preview cumulative update for Windows 11 24H2 with 38 changes, including real-time translation on AMD and Intel-powered Copilot+ PCs and fixes for authentication and blue-screen issues. [...]
Kategorie: Hacking & Security
Syndikovat obsah