Agregátor RSS
Linux administrators often face an ugly choice during major kernel vulnerabilities: reboot critical systems immediately or leave exploitable code running in production while waiting for a maintenance window.
Linux administrators often face an ugly choice during major kernel vulnerabilities: reboot critical systems immediately or leave exploitable code running in production while waiting for a maintenance window.
Researchers at Google Threat Intelligence Group (GTIG) say that a zero-day exploit targeting a popular open-source web administration tool was likely generated using AI. [...]
**Think tank EU zveřejnil analýzu, která varuje před VPN.
**Evropa chce účinněji chránit děti před nevhodným obsahem.
**VPN ale mohou tyto snahy zhatit.
Think tank EU zveřejnil analýzu, která varuje před VPN. • Evropa chce účinněji chránit děti před nevhodným obsahem. • VPN ale mohou tyto snahy zhatit.
Rough Monday.
Somebody poisoned a trusted download again, somebody else turned cloud servers into public housing, and a few crews are still getting into boxes with bugs that should’ve died years ago — the same old holes, same lazy access paths, same “how the hell is this still open” feeling. One report this week basically reads like a guy tripped over root access by accident and decided to stayRavie Lakshmananhttp://www.blogger.com/profile/ [email protected]
This upcoming webinar explores how organizations need to combine security, backups, and recovery planning to reduce the impact of modern cyberattacks. [...]
Checkmarx’s software engineers are still working to remove a malicious version of the code security outfit's Jenkins plugin after detecting an unauthorized upload over the weekend. It updated customers on Saturday, May 9, after discovering a version of its AST Scanner, which is used for security scans in Jenkins CI pipelines, was made available via the Jenkins Marketplace. “We are aware that a modified version of the Checkmarx Jenkins AST plugin was published to the Jenkins Marketplace,” it said in a statement. “We are in the process of publishing a new version of this plug-in.” Versions published as of May 9, 2026, should not be trusted, it added, before urging all users to check they’re running the correct release (2.0.13-829.vc72453fa_1c16) published on December 17, 2025. Installed by several hundred controllers, the plugin remains available at the time of writing, and appears as the most recently available version, although pull requests actioned on Monday morning suggest this will soon be pulled down. “What makes this particularly dangerous for Jenkins users is the trust model at play,” said SOCRadar in its coverage. “The Checkmarx Jenkins plugin is a tool people install specifically to improve the security of their pipelines. “A backdoored version doesn’t just compromise one project; it rides trusted infrastructure into every build pipeline it touches, with access to source code, environment variables, tokens, and whatever secrets the runner can see.” Security engineer Adnan Khan spotted the compromise quickly over the weekend. The crew behind the early supply chain attack affecting Checkmarx in April, TeamPCP, defaced the company’s GitHub and published six packages, each with a description alluding to the Shai-Hulud wormable malware. These packages no longer appear on Checkmarx’s GitHub, but TeamPCP made multiple changes to the AST plugins page, renaming it to “Checkmarx-Fully-Hacked-by-TeamPCP-and-Their-Customers-Should-Cancel-Now,” and altering the description to claim CheckMarx failed to rotate its secrets. The latest infiltration of Checkmarx’s internals marks the third time TeamPCP has compromised the company’s packages in as many months. As previously seen in The Register, the crooks successfully targeted Checkmarx’s AST plugin for GitHub Actions and its KICS static analysis tool back in March, deploying credential-stealing malware. SOCRadar said the latest TeamPCP compromise of the Jenkins plugin suggests that either TeamPCP was telling the truth about Checkmarx’s secrets rotation, or its members took advantage of an additional persistence mechanism that the security vendor failed to notice during its response to the March intrusion. ®
The current “no-hire-no-fire” environment in the workplace has slowed the pace of tech hiring in the US, but companies have seen one benefit — the selection of job candidates is easier.
Many employers have become clearer about the qualifications they’re seeking in new hires: they’re focused less on people who can service large stacks of code, and more on ability to have a direct impact on corporate revenue and operations.
“Roles are narrower, expectations are clearer, and teams are being built with purpose rather than volume,” said Kye Mitchell, head of Experis, a division of recruiting firm ManpowerGroup.
That’s the backdrop amid a spate of recent hiring data reports released by the US government and various private firms that track hiring. Overall, employment in the US rose by 115,000 jobs in April, with gains in healthcare, transportation and warehousing, and retail trade, according to the latest report by the US Bureau of Labor Statistics.
But tech hiring has slowed and in the last week, research firms have released April numbers that vary wildly; some point to big tech job cuts, others see increases in hiring. Looking deeper at the data, jobs fell in tech-related sectors such as telecom (down 2.5% decline) and infrastructure providers (with a 3.9%).
Though the BLS reported job growth for the overall economy in April, placement firm Challenger Gray and Christmas actually reported a jobs decline by 83,387 across all sectors. It also argued that tech companies are indeed making large-scale cuts, with 33,361 losses in April, Andy Challenger, chief revenue officer of Challenger, Gray & Christmas, said in a statement.
AI was cited most often as a reason for job losses, affecting 21,490, or 26% of all cuts across sectors in April. Other reasons cited were the on-again, off-again tariffs imposed by President Donald J. Trump, the ongoing war in Iran, and slack consumer spending.
“Regardless of whether individual jobs are being replaced by AI, the money for those roles is,” Gray said.
Even with uncertainty about the direction of the job market, recent data indicates a growth in tech job listings, which undercuts the notion that tech firms are drastically reducing payrolls. According to CompTIA, 271,483 tech job listing across were added in April. That brings the total to 575,000 active job postings.
The increase in listings is the result of employers clarifying their tech strategies and AI roles, CompTIA said. Increasingly, roles are being defined around “core tech skills as a foundation for more advanced capabilities,” CompTIA said.
Challenger, Gray and Christmas has measured 85,411 tech job cuts so far this year, with 33,361 of those cuts coming in April alone. Along the same lines, RationalFX has counted 78,557 tech jobs lost globally so far in 2026.
This year has been especially brutal at some companies: Reports last month indicated that Meta planned to cut 10% of its workforce. In late March, Oracle announced job cuts that financial analysts said could affect 30,000 employees. Amazon, PayPal, Block, and Atlassian are among the other major tech firms cutting jobs.
Many of the job listing numbers could turn out to be transitional, as many CIOs still don’t know what skills they’re looking for in job candidates, said Jack Gold, principal analyst at J. Gold Associates.
A particular skill that’s useful today might not be needed tomorrow — especially given the pace at which AI is advancing in the workplace.
“I don’t see the mass elimination of jobs, like some ‘pundits’ have predicted,” Gold said. “It [the AI era] will likely result in new jobs we haven’t thought about yet.”
V diskusi pod mým nedávným článkem o ČT poměrně dost čtenářů vyjádřilo velmi jednoznačný postoj: „Nechci sledovat klasické vysílání, tuner je mi k ničemu, chytré funkce nepotřebuji. Stačí mi velký kvalitní panel.“ Ideálně něco jako „televizor bez televize“. Jenže jakmile se podíváte na ceny, přijde ...
Defending a network at 2 am looks a lot like this: an analyst copy-pasting a hash from a PDF into a SIEM query. A red team script is being rewritten by hand so the blue team can use it. A patch waiting on a change-approval window that's longer than the exploitation window itself.
Nobody in that chain is incompetent. Every human is doing their job correctly. The problem is the system, its [email protected]
Apple už za měsíc ukáže nové operační systémy. • macOS 27 se soustředí na optimalizace a zlepšení čitelnosti. • Konečně také dorazí nová Siri, poprvé i jako samostatná aplikace.
Český úřad zeměměřický a katastrální se před pár dny pochlubil aktualizací svých mapových dat, která jsou dnes k dispozici pro každého zájemce zdarma pod svobodnou licencí CC.
Fanoušci opravdu velkých PDF si mohou stáhnout třeba 4. vydání fyzickogeografické mapy ČR v měřítku 1:500 000 (stav k roku ...
A new variant of the TrickMo Android banking malware, delivered in campaigns targeting users across Europe, introduces new commands and uses The Open Network (TON) for stealthy command-and-control communications. [...]
Apple levným MacBookem Neo šlápl Microsoftu na citlivé místo. Ne proto, že by šlo o dokonalý notebook. Právě naopak: 8 GB RAM, 256GB SSD, dva porty USB-C a chybějící podsvícení klávesnice jsou v roce 2026 tvrdé kompromisy. Jenže za necelých 17 000 Kč je to pořád Mac. A to je pro svět levnějších ...
Linux security has traditionally depended on logs, metrics, and alerts. That model works well when systems behave predictably. Inputs come in, processes run, events get logged. Security teams can usually reconstruct what happened afterward without too much trouble.
OPINION There are three little words to make the heart beat faster in anyone who knows what they mean: critical infrastructure resilience. If you run that infrastructure or a country dependent on it, you need energy, communication and transport to be impregnable to cyber attacks. This is doubly so if that country is five minutes by incoming missile from an implacable hyper-competent enemy sworn to invade you. One that is building and equipping its military as fast as it can with this one thing in mind. One with the most invasive and brazen state hacking machinery on the planet. Thus it was a very bad day indeed when Taiwan’s entire bullet train system was disabled for nearly an hour by an unknown attacker. It got even worse when that attacker turned out not to be the implacable and hyper-resourced state actor over the Taiwan Strait, but a university student with a yen for radio and some kit he bought online. On the one hand, it’s good to see the good repair of the grand tradition of young hackers causing havoc from their bedrooms. On the other, WTRF? The information released by the Taiwanese authorities is scant on details, but enough to be pretty sure what actually happened. It’s bad news not just for Taiwan but for more than 100 countries that also use the TETRA two-way radio standard involved, often for emergency services. In many cases, it was the default replacement for unencrypted FM two-way radios, adding encryption, flexibility and network security. These were state of the art when TETRA was developed in the 1980s and 1990s — and work as well in 2026 as you might expect. Oops. There have been upgrades and, especially after the 2023 vulnerability disclosures, an accelerated program of making things better. A lot of the installed base globally is old, lacks over-the-air updates for security, and in any case spending money on new radios is normally at the bottom of the list for any state or public service organizations. Things have to get really bad first. Perhaps they just have. (North America is the only region where TETRA is uncommon, as it isn’t approved for public service use. This was either acute foresight or the fact that the TE in TETRA, now officially TErrestrial, used to stand for Trans-Europe. The American system, P.25, has never, however, been renamed Freedom Frequencies. Now on with the show) The network vulnerabilities are one side of the story. Our doughty hacker is the other. Reportedly, he didn’t have any TETRA hardware, but a laptop connected to a radio and an ‘SDR filter’. The latter makes little sense, it is far more likely that he had a software defined radio (SDR) called a HackRF. There are plenty of other devices that could have been used, but the HackRF is the weapon of choice for the gung-ho radio nut. SDR is a technique that has completely changed the rules of how to radio. All radios before it had to be entirely or mostly analog, with precision hardware dedicated to whatever job each radio had to do. This hardware could also be looked at as an analog computer, as it can be modelled as a set of mathematical transformations on the received signal. Analog computers have their place, just not in the 21st century. SDR is radio as digital computer. At heart, it has three components: an analog to digital converter to turn the incoming signal to a stream of numbers, very fast processing to do the radio math, and a digital to analogue converter to play the results. What you get is triply terrific. Digital processing is perfect, analog processing adds noise and distortion. Nothing is fixed, everything can be re-engineered with new code. And it can be hog-whimperingly cheap. HackRF is all those things and more. It can be configured as a portable touch-screen device. It transmits and receives from DC to daylight. You can pick one up for less than the price of a mid-range mobile. It is open source. It works with all manner of SDR creation tools, utilities and radio packages. There are infinite legitimate uses. Most excitingly, you can download apps for it that do everything, most especially the kind of thing that will introduce you with surprisingly rapidity to a wide range of new friends with no sense of humor and love letters that look suspiciously like arrest warrants. Think of it as speed dating but with more guns and less no thank yous, GPS spoofing, aviation and marine location transponders, satellite comms, data eavesdropping and injection - take your pick. You’ll need it to unlock the cell door. It is the data detection and injection that seems to have been the downfall of all concerned. A handset had its transmission decoded, and the result was retransmitted into the system as if it were that original radio. Whether the decoded data already had the General Alarm set, or whether the data had to be modified before retransmission, is not yet known. Doesn’t matter. It’s called a replay attack, and it has and is mostly used in stand-alone devices called code grabbers to unlock and steal expensive cars with wireless keys. Some countries, including Canada and the UK, have banned code grabbers, but this has failed on two counts. Code grabbers are small gadgets that can be bought online from China, and good luck policing that. Also, thieves are notably indifferent to laws. That notwithstanding, the UK is thinking of extending the ban to other classes of naughty wireless, and would doubtless like to do the same with HackRF, at least as of last week. Of course, they can’t be banned. SDRs can’t be banned as a class, especially open source ones made out of standard chips and open code. They are general purpose computers, albeit with specialisms. It doesn’t matter if you’re dismayed or delighted that things like HackRF exist, that genie is out of the bottle. What is truly dismaying is that replay attacks are a solved problem, trivially so. Choose a big keyspace, randomize and never repeat keys. That one is on lazy car makers and, apparently, the world of TETRA. Fixing that class of lazy, outdated security vulnerability will be very expensive. Embedded systems are like that, especially old ones. Not fixing this will be a gamble with infinite downside, in a world where electronic warfare systems that used to cost hundreds of millions now pour out of Ali Express for a few bucks. HackRF is to Tetra like Crocodile Dundee’s knife is to the mugger’s. Critical infrastructure resilience. Just three little words, but if you say them you better mean it. And it won’t be cheap. ®
AMD představila technologii DGF SuperCompression (DGFS), která rozšiřuje loni představený formát Dense Geometry Format (DGF) pro efektivnější ukládání a streamování geometrie nejen při ray tracingu…
A malicious Hugging Face repository managed to take a spot in the platform's trending list by impersonating OpenAI's Privacy Filter open-weight model to deliver a Rust-based information stealer to Windows users.
The project, named Open-OSS/privacy-filter, masqueraded as its legitimate counterpart released by OpenAI late last month (openai/privacy-filter), including copying the entire descriptionRavie Lakshmananhttp://www.blogger.com/profile/ [email protected]
|