Agregátor RSS

ShinyHunters claim they have cruise giant Carnival's booty as 7.5M emails surface

The Register - Anti-Virus - 24 Duben, 2026 - 17:35
Carnival Corporation, the world's largest cruise company, is dealing with choppy waters after Have I Been Pwned flagged what it claimed were 7.5 million unique email addresses all allegedly tied to one of its subsidiaries.  According to HIBP, the haul totals 8.7 million records and appears to relate to the Mariner Society loyalty program run by Holland America Line, a subsidiary of Carnival Corporation. It said the "data contained fields indicating it related to the Mariner Society loyalty program run by Holland America." The exposed data includes names, dates of birth, genders, and membership status details – the kind of personal data attackers can easily repurpose for fraud or phishing. The company acknowledged a security incident, according to HIBP, but its version of events is, for now, a lot more contained. Carnival says the breach involved a phishing attack against a single user account and said it is still working to understand the scope of any unauthorized access. That's not quite the story being told elsewhere. The data was published by the ever-busy ShinyHunters extortion crew, which claimed to have lifted not just customer data but "terabytes of internal corporate data" after talks with the company apparently went nowhere. "The company failed to reach an agreement with us despite our incredible patience," said a post on the group's leak site, seen by The Register, adding, "They don't care." Take the claims with the usual pinch of sea salt – ShinyHunters has form for dressing up its hits –  but the volume and apparent legitimacy of the data flagged by HIBP suggest there is potentially something more substantial here than the usual leak site bravado. The Register has asked Carnival to confirm whether the figures match its own findings, what data was accessed, whether any ransom demand was made, and how attackers got in. It hadn't responded at the time of writing. ShinyHunters is no stranger to this kind of break-in, usually getting a foot in the door via phishing, stolen logins, or by cracking into SaaS platforms before digging around for anything they can cash in. If their claims are accurate, this went well beyond a single compromised inbox. Whether this turns out to be a contained phishing mishap or a full-blown data spill is still unclear – but either way, passengers may want to keep a closer eye on their inboxes than their next itinerary. ®
Kategorie: Viry a Červi

ShinyHunters claim they have cruise giant Carnival's booty as 7.5M emails surface

The Register - Anti-Virus - 24 Duben, 2026 - 17:35
Leak-site bragging meets breach hunters as Have I Been Pwned flags millions of records

Carnival Corporation, the world's largest cruise company, is dealing with choppy waters after Have I Been Pwned flagged what it claimed were 7.5 million unique email addresses all allegedly tied to one of its subsidiaries. …

Kategorie: Viry a Červi

Governments on high alert after CISA snuffs out Firestarter backdoor on fed network

The Register - Anti-Virus - 24 Duben, 2026 - 16:46
A US federal agency was successfully targeted by a previously unknown backdoor malware called Firestarter, according to CISA cybersnoops and their UK counterparts – neither of which disclosed the agency's name. FederalCivilianExecutiveBranch(FCEB)agencies include NASA; Homeland Security itself (cyberworkers at CISA are part of an operational unit in Homeland Security); the FBI; the DoJ; the IRS; the Department of Veteran Affairs; the Department of Health and Human Services (HHS); and more. Described as a backdoor with remote access capabilities, Firestarter was named after Cisco Secure Firewall Adaptive Security Appliance (ASA) and Cisco Secure Firewall Threat Defense (FTD), the two products the malware targeted. The CISA advisory states that only one FCEB agency was attacked with the malware, although it is suspected of being part of a wider campaign targeting government and critical national infrastructure networks in particular.  Further, the lone incident CISA investigated so far involved a Cisco Firepower device running ASA software, although Secure Firewall devices are also thought to be susceptible to attack. Despite the perceived focus on government and critical national infrastructure, all organizations in the US and UK are advised to take preventative measures. CISA said Firestarter was especially sophisticated in that it maintained persistent access to compromised networking devices even after they were updated, allowing attackers to re-enter victims' networks without needing to exploit any new vulnerabilities. The malware was detected following routine continuous network monitoring. All organizations are advised to use YARA rules while carrying out memory analysis from device core dumps or disk images. Both CISA and its British counterparts at the National Cyber Security Centre (NCSC) want any organization that gets hit to collate all the evidence and submit it to them for intelligence-gathering purposes. The findings this week are an update to CISA's earlier advisory, warning of other attacks on Cisco products, ones that exploited CVE-2025-20333 (9.9) and CVE-2025-20362 (6.5). Likewise, Cisco is attributing the latest attacks to the same group it suspects was behind others from last year.  Switchzilla tracks the group with the UAT-4356 identifier, but has consistently refused to attribute it to a nation-state, including any of the US's four primary geopolitical adversaries (China, Russia, Iran, North Korea), although it has said the group appears to be government-backed. The news of the federal agency's compromise comes just hours after intelligence agencies collectively issued a second warning this month about Chia's offensive cyber operations. Ten countries, including those in the Five Eyes alliance, were involved in the second warning of its kind in recent weeks, once again claiming that China was building covert networks, such as recruiting consumer-grade SOHO routers, to launch cyberattacks on adversaries. ®
Kategorie: Viry a Červi

Governments on high alert after CISA snuffs out Firestarter backdoor on fed network

The Register - Anti-Virus - 24 Duben, 2026 - 16:46
Latest in long-running pwning of Cisco kit found in mystery Fed agency

A US federal agency was successfully targeted by a previously unknown backdoor malware called Firestarter, according to CISA cybersnoops and their UK counterparts – neither of which disclosed the agency's name.…

Kategorie: Viry a Červi

The AI Paradox: Cure or Poison?

Singularity Weblog - 24 Duben, 2026 - 16:42
Technology promised simplicity. It delivered complexity. AI promised resolution. It is delivering acceleration. The paradox is not a bug. It is the feature. The question is what we choose to do about it. *** Every new technology arrives wearing the costume of liberation. It promises freedom. It promises options. It promises to save us time, […]
Kategorie: Transhumanismus

More ancient Linux device support faces the chop

The Register - Anti-Virus - 24 Duben, 2026 - 16:15
One way to deal with bug hunting LLMs: ditch the old drivers

One tactic to deal with LLM-powered vulnerability detection is simple – just speed up the removal of old code. If it's gone, it no longer matters if it's buggy.…

Kategorie: Viry a Červi

NASA Employees Duped in Chinese Phishing Scheme Targeting U.S. Defense Software

The Hacker News - 24 Duben, 2026 - 16:13
The Office of Inspector General (OIG) of the U.S. National Aeronautics and Space Administration (NASA) has revealed how a Chinese national posed as a U.S. researcher as part of a spear-phishing campaign to obtain sensitive information from the space agency, as well as from government entities, universities, and private companies, in violation of export control laws. "For years, NASA employees Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

DORA and operational resilience: Credential management as a financial risk control

Bleeping Computer - 24 Duben, 2026 - 16:10
Article 9 of DORA makes authentication and access control a legal obligation for EU financial entities. Here is what the regulation requires, and what a breach looks like when those controls are missing. [...]
Kategorie: Hacking & Security

Evropský digitální techničák bude. Cílem je omezit byrokracii a podvody s ojetinami

Živě.cz - 24 Duben, 2026 - 15:45
Evropský parlament udělal zásadní krok k digitálním dokladům od vozidel. Nová pravidla mají ulevit řidičům od byrokracie a zatočit s podvody při prodeji ojetin.
Kategorie: IT News

Tails 7.7 Surfaces Secure Boot Risk as 2026 Certificate Expiry Approaches

LinuxSecurity.com - 24 Duben, 2026 - 15:43
Tails 7.7 doesn’t ship new features. It surfaces a trust problem that’s been sitting quietly in Secure Boot chains for years: the digital certificates that allow Linux to run on PC hardware are reaching their 15-year expiration limit. Systems relying on the Microsoft third-party UEFI CA are now on a timeline. This release makes that visible before it turns into boot failures or broken assumptions.
Kategorie: Hacking & Security

Raspberry Pi Official Magazine 164 a Hello World 29

AbcLinuxu [zprávičky] - 24 Duben, 2026 - 15:39
Nová čísla časopisů od nakladatelství Raspberry Pi zdarma ke čtení: Raspberry Pi Official Magazine 164 (pdf) a Hello World 29 (pdf).
Kategorie: GNU/Linux & BSD

Over 10,000 Zimbra servers vulnerable to ongoing XSS attacks

Bleeping Computer - 24 Duben, 2026 - 15:35
Over 10,000 Zimbra Collaboration Suite (ZCS) instances exposed online are vulnerable to ongoing attacks exploiting a cross-site scripting (XSS) security flaw. [...]
Kategorie: Hacking & Security

Intel bets the farm on AI inference to drag CPU back to the top table

The Register - Anti-Virus - 24 Duben, 2026 - 14:50
Intel is betting on AI to reverse its fortunes, wagering that inference and agentic workloads will restore the CPU to the center of compute - even as its chip manufacturing struggles persist. Speaking to analysts on its Q1 2026 earnings call, CEO Lip-Bu Tan said AI is pushing the total addressable chip market towards $1 trillion, and he reckons Intel is well placed to capture share. "For the last few years, the story around high-performance computing was almost exclusively about GPU and other accelerators. In recent months, we have seen clear signs that the CPU is reinserting itself as the indispensable foundation of the AI era," Lip-Bu said. AI is moving out of the data center and into the physical world, he added, with inference and learning workloads increasingly running on agents, robots, and edge devices. "I think the inference is going to be a much bigger market and the physical AI is another big market. So I think that's an opportunity for us... This is not just our wishful thinking, it is what we hear from our customers, and it is evident in the demand profile for our products." However, Intel needs to build the products in order to deliver on the promises, and the past several years have seen the chipmaker suffer delays to key chips and the cancellation of others, notably its most recent effort to build a credible GPU to challenge AMD and Nvidia in the AI training stakes. Lip-Bu says Chipzilla is making progress with its Intel 14A process node, one that it hopes will turn Intel's Foundry biz into a commercial success by producing chips for other companies as well as its own products.   "We expect to see earlier design commitments emerge beginning in the second half of 2026 and expanding into the first half of 2027," he said, echoing comments by chief financial officer David Zinsner last month. Zinsner reported Q1 revenue of $13.6 billion, beating expectations, with AI-driven business lines accounting for 60 percent of that figure, up 40 percent year-on-year. He pointed to recent wins including Xeon 6 being selected as the host CPU for NVidia's DGX Rubin NVL8 systems as evidence that Intel is resurgent in the AI arena. Lip-Bu also referenced a recent long-term deal with Google for co-development of infrastructure processing units (IPUs) to offload networking and other tasks, saying: "This is a good example of how we win in AI infrastructure build-out. And then stay tuned - at the right time, we will announce other contracts." Zinsner added: "One statistic we look at is the ratio of CPUs to GPUs. And if you look at training solutions, they're generally running at 8 GPUs to 1 CPU. As we look into inference, it's probably getting into the 3 or 4 to 1 kind of level. And as you get into agentic and multi-agent, it's one potentially even flip in the other direction a little bit." Another potential AI win is with Elon Musk and his "Terafab" project, which aims to produce large volumes of AI chips - a terawatt's worth of computing power each year, in fact. Although Musk himself talked about this during Tesla's own earnings call this week, Lip-Bu was more tight-lipped when asked about it by an analyst. "Clearly, Elon and I believe that [the] global supply chain is not keeping pace with the rapid acceleration in the demand. And so we both share the vision that we're going to learn a lot together, exploring the innovative way in the process of the manufacturing," he said. "We'll update you when can." Whether you believe the AI hype or not, the stock market liked what it heard, and Intel's share price rose by as much as 20 per cent in after-hours trading, reaching a five year plus high. ®
Kategorie: Viry a Červi

Intel bets the farm on AI inference to drag CPU back to the top table

The Register - Anti-Virus - 24 Duben, 2026 - 14:50
Chipzilla hopes agents, robots, and edge devices make CPUs cool again... now it has to build the chips

Intel is betting on AI to reverse its fortunes, wagering that inference and agentic workloads will restore the CPU to the center of compute - even as its chip manufacturing struggles persist.…

Kategorie: Viry a Červi

Recenze hry Saros. Náročná, ale férová akce v záři zlověstného slunce

Živě.cz - 24 Duben, 2026 - 14:45
Po pěti letech nás studio Housemarque bere do pekla, kde se jedna salva projektilů míjí s druhou, smrti unikáme jen o vlásek, a když štěstí nepřeje, jdeme do akce zase od začátku. Saros je věrný odkazu Returnalu a mrazivý příběh na předaleké planetě mě pohltil velmi snadno.
Kategorie: IT News

Understanding Log Management and Analysis Tools for Linux Systems

LinuxSecurity.com - 24 Duben, 2026 - 13:00
Every time something happens on a computer''a user logs in, a program crashes, or a hacker tries to guess a password''the system writes it down. These "notes" are called log files. If you're new to the world of servers, it might just look like a mess of text, but linux log analysis is actually your superpower. It's how you find out exactly why a system failed and how to fix it.
Kategorie: Hacking & Security

Why Linux Logging Fails: Detection Gaps in Real-World Systems

LinuxSecurity.com - 23 Duben, 2026 - 17:43
 If you spend enough time looking at a monitoring dashboard, you start to see a comforting pattern. Green lights mean the servers are up, the logs are flowing, and everything feels under control. But if you look closer, you realize that linux logging is often more of a formal archive than a security tool. There is a quiet gap between seeing that a system is running and actually knowing what it is doing.
Kategorie: Hacking & Security

Why Linux Logging Fails: Detection Gaps in Real-World Systems

LinuxSecurity.com - 23 Duben, 2026 - 17:43
If you spend enough time looking at a monitoring dashboard, you start to see a comforting pattern. Green lights mean the servers are up, the logs are flowing, and everything feels under control. But if you look closer, you realize that linux logging is often more of a formal archive than a security tool. There is a quiet gap between seeing that a system is running and actually knowing what it is doing.
Kategorie: Hacking & Security
Syndikovat obsah