Agregátor RSS

5 Places where Mature SOCs Keep MTTR Fast and Others Waste Time

The Hacker News - 21 Duben, 2026 - 15:00
Security teams often present MTTR as an internal KPI. Leadership sees it differently: every hour a threat dwells inside the environment is an hour of potential data exfiltration, service disruption, regulatory exposure, and brand damage.  The root cause of slow MTTR is almost never "not enough analysts." It is almost always the same structural problem: threat intelligence that exists [email protected]
Kategorie: Hacking & Security

NGate Campaign Targets Brazil, Trojanizes HandyPay to Steal NFC Data and PINs

The Hacker News - 21 Duben, 2026 - 14:45
Cybersecurity researchers have discovered a new iteration of an Android malware family called NGate that has been found to abuse a legitimate application called HandyPay instead of NFCGate. "The threat actors took the app, which is used to relay NFC data, and patched it with malicious code that appears to have been AI-generated," ESET security researcher Lukáš Štefanko said in a Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Windows 11 ruší omezení formátování oddílu na FAT32. Místo 32 GB může mít až 2 TB

Živě.cz - 21 Duben, 2026 - 14:45
Microsoft v kanálu Release Preview vydal aktualizaci KB5083631 pro Windows 11. • Přináší režim Xboxu, který počítač promění v de facto konzoli. • Ruší omezení velikosti oddílu na 32 GB při formátování souborovým systémem FAT32.
Kategorie: IT News

Contrary to popular superstition, AES 128 is just fine in a post-quantum world

Ars Technica - 21 Duben, 2026 - 14:35

With growing focus on the existential threat quantum computing poses to some of the most crucial and widely used forms of encryption, cryptography engineer Filippo Valsorda wants to make one thing absolutely clear: Contrary to popular mythology that refuses to die, AES 128 is perfectly fine in a post-quantum world.

AES 128 is the most widely used variety of the Advanced Encryption Standard, a block cipher suite formally adopted by NIST in 2001. While the specification allows 192- and 256-bit key sizes, AES 128 was widely considered to be the preferred one because it meets the sweet spot between computational resources required to use it and the security it offers. With no known vulnerabilities in its 30-year history, a brute-force attack is the only known way to break it. With 2128 or 3.4 x 1038 possible key combinations, such an attack would take about 9 billion years using the entire bitcoin mining resources as of 2026.

It boils down to parallelization

Over the past decade, something interesting happened to all that public confidence. Amateur cryptographers and mathematicians twisted a series of equations known as Grover’s algorithm to declare the death of AES 128 once a cryptographically relevant quantum computer (CRQC) came into being. They said a CRQC would halve the effective strength to just 264, a small enough supply that—if true—would allow the same bitcoin mining resources to brute force it in less than a second (the comparison is purely for illustration purposes; a CRQC almost certainly couldn’t run like clusters of bitcoin ASICs and more importantly couldn’t parallelize the workload as the amateurs assume).

Read full article

Comments

CISA flags new SD-WAN flaw as actively exploited in attacks

Bleeping Computer - 21 Duben, 2026 - 14:30
​CISA has given U.S. government agencies four days to secure their systems against another Catalyst SD-WAN Manager vulnerability it flagged as actively exploited in attacks. [...]
Kategorie: Hacking & Security

AI-assisted intruders pwned Vercel via OAuth abuse and a pilfered employee account

The Register - Anti-Virus - 21 Duben, 2026 - 14:17
CEO suspects silicon sidekick behind 'surprising velocity' breach - cyber crims shop stolen data for $2M

Vercel's CEO reckons the crooks behind its recent breach likely had a helping hand from AI, saying the attackers moved with "surprising velocity" and a deep understanding of the company's infrastructure.…

Kategorie: Viry a Červi

With John Ternus as CEO, expect Apple’s platforms to proliferate

Computerworld.com [Hacking News] - 21 Duben, 2026 - 14:11

Apple now has a new iCEO, as current leader Tim Cook (65) announced late Monday that he is set to become chairman of the board, while current head of hardware engineering, John Ternus, prepares to take over as CEO on Sept. 1.

As you’d expect, this leadership transition at one of the world’s most successful firms, is generating reams of news reports and hot takes. Here’s mine: Just as Steve Jobs presided over the resurrection of Apple and Cook led the company through unprecedented business growth, Ternus will guide the company through an era of equally unprecedented hardware proliferation. 

Expect more growth

He’s someone who cares about craft in hardware design and recently appeared in a worth-watching video interview (chaperoned by Greg Joswiak, the company’s senior vice president of worldwide marketing). The soon-to-be-CEO did well in what was an obvious media training exercise. “Everything we do, even if our customers don’t necessarily see it, everything we do has some new ideas in it…, we feel like we’re innovating all the time,” he said. 

Among a range of achievements, Cook innovated operations to the extent that every product Apple makes is supported by the world’s most efficient multinational manufacturing and logistics system. While he did, Ternus innovated product. “John Ternus has the mind of an engineer, the soul of an innovator, and the heart to lead with integrity and with honor,” said Cook.

The current CEO has had to handle huge supply chain challenges while scaling logistics to support growth. The numbers illustrate this: Apple sold 18.1 million Macs in the year following his appointment as CEO 15 years ago. In 2025, it sold 27.2 million. iPhone sales grew from 136 million in 2011 to 247 million last year. Rumor has it the MacBook Neo has shifted as many as 10 million units, just as Ternus turns up to take that figure higher.

“Tim’s unprecedented and outstanding leadership has transformed Apple into the world’s best company,” said outgoing Apple board chairman Arthur Levinson. 

You don’t need a weatherman

You can see which way the wind blows. 

Apple’s hardware is selling in record quantities, even as the company seems more prepared – and better able – than ever before to widen its addressable market with more affordable products. It is able to do this without compromising on product quality or user experience for three big reasons: 

  • The massive per-customer services income built by Cook.
  • Huge iPhone sales as an inheritance from Steve Jobs.
  • The adoption of Apple Silicon, which has been presided over by Ternus and led by Johny Srouji.

Srouji will take on the hardware leadership role being vacated by Ternus and as part of this will combine the hardware technologies and hardware engineering teams, separated in 2012. “I am excited to bring these teams together and deepen their integration to help us innovate even more than we do today. There is no limit to what we can achieve together,” he wrote. 

That optimism is well-founded. Apple’s processor designs will enable the company to push fast in its new phase of proliferation. With 1nm chips on the horizon, Apple’s processors are small, powerful, and energy efficient, making them suitable for a plethora of new hardware designs the world hasn’t even seen yet.

Making impossible things possible

Apple under Ternus will no doubt lean into that opportunity. This approach means that not only will you see Apple widen its addressable market with a combination of product quality at better prices, but you’ll also watch it expand its offer with new product families. 

It’s no coincidence, for example, that Ternus at one point led Apple’s robotics team as the company prepares to introduce its first robotic products in the coming months. Apple’s hardware is supported by Apple’s software, of course. 

While it will offer some of its own solutions within Apple Intelligence, Apple doesn’t even need to make the AI. It just needs to make the best hardware to run AI on, which is what Ternus is going to focus on. 

You can already see it. With Ternus leading hardware, the Mac is more powerful and more popular today than at any point in its history — and the MacBook Neo is building on that success. It represents the thin end of a wider wedge of hardware-driven market share growth across all Apple’s products that will now accelerate under Ternus, even while the latter makes his own transition.

As board chairman, Cook will turn to handling the complex political and strategic relationships he’s been dealing with as CEO. Cook is very good at that, which also raises the question of whether he has wider ambitions for political engagement.

You can follow me on social media! Join me on BlueSky,  LinkedInMastodon, and MeWe

Kategorie: Hacking & Security

Oneplay a 30 nejoblíbenějších filmů a seriálů v dubnu 2026. Tohle Češi na bývalém Voyo nejvíc sledují

Živě.cz - 21 Duben, 2026 - 13:45
Tyto filmy a seriály jsou teď na Oneplay (dříve Voyo) nejoblíbenější. Nerozlišujeme žánr, stáří ani hodnocení na filmových webech. Jde o souhrnnou oblíbenost za poslední týdny, kterou zjišťuje a počítá web FlixPatrol.
Kategorie: IT News

Crook claims to leak 'video surveillance footage' of companies

The Register - Anti-Virus - 21 Duben, 2026 - 13:30
Mexican IT services firm admits it was hacked, but says client operations weren't affected

A Mexican IT infrastructure and digital transformation biz is on clean-up duty after a criminal posted screenshots of what they claimed was company video surveillance footage to a cybercrime forum.…

Kategorie: Viry a Červi

No Exploit Needed: How Attackers Walk Through the Front Door via Identity-Based Attacks

The Hacker News - 21 Duben, 2026 - 13:30
The cybersecurity industry has spent the last several years chasing sophisticated threats like zero-days, supply chain compromises, and AI-generated exploits. However, the most reliable entry point for attackers still hasn't changed: stolen credentials. Identity-based attacks remain a dominant initial access vector in breaches today. Attackers obtain valid credentials through credential [email protected]
Kategorie: Hacking & Security

Actively exploited Apache ActiveMQ flaw impacts 6,400 servers

Bleeping Computer - 21 Duben, 2026 - 13:17
Nonprofit security organization Shadowserver found that over 6,400 Apache ActiveMQ servers exposed online are vulnerable to ongoing attacks exploiting a high-severity code injection vulnerability. [...]
Kategorie: Hacking & Security

Met police trials snoop tech platform in push to cuff more London shoplifters

The Register - Anti-Virus - 21 Duben, 2026 - 12:52
No facial recognition privacy intrusions either! Well, maybe a little

London's Metropolitan Police is trialing new retail technology to help curtail the city's pervasive shoplifting problem… and it doesn't rely on live facial recognition (LFR).…

Kategorie: Viry a Červi

Výkonný aku šroubovák je za 620 Kč. Mova se nabíjí pomocí USB-C a v krabičce má 24 bitů

Živě.cz - 21 Duben, 2026 - 12:45
Aku šroubovák Mova MSD008 zlevnil na 620 Kč. • Má silný motor s krouticím momentem 8 Nm. • Nechybí LED přisvícení, v balení je 24 bitů a USB-C kabel.
Kategorie: IT News

Tim Cook po 15 letech opustí post generálního ředitele společnosti Apple

AbcLinuxu [zprávičky] - 21 Duben, 2026 - 12:44
Tim Cook po 15 letech opustí post generálního ředitele americké technologické společnosti Apple. Od 1. září ho vystřídá John Ternus, který byl dosud odpovědný za hardware. Cook se stane předsedou představenstva. Cook vedl Apple od roku 2011, kdy funkci převzal od zesnulého spoluzakladatele společnosti Stevea Jobse.
Kategorie: GNU/Linux & BSD

Evropská aplikace na ověřování věku je děravá jak řešeto

AbcLinuxu [zprávičky] - 21 Duben, 2026 - 12:37
Evropská aplikace na ověřování věku uživatelů lze hacknout během dvou minut, navzdory tvrzením předsedkyně Evropské komise Uršuly von der Leyenové, že je tato aplikace 'technicky připravená pro ostré nasazení' a 'splňuje nejvyšší standardy ochrany osobních údajů na světě'. Zdrojové kódy aplikace byly Bruselem zveřejněny v repozitářích na GitHubu.
Kategorie: GNU/Linux & BSD

Google Patches Antigravity IDE Flaw Enabling Prompt Injection Code Execution

The Hacker News - 21 Duben, 2026 - 12:22
Cybersecurity researchers have discovered a vulnerability in Google's agentic integrated development environment (IDE), Antigravity, that could be exploited to achieve code execution. The flaw, since patched, combines Antigravity's permitted file-creation capabilities with an insufficient input sanitization in Antigravity's native file-searching tool, find_by_name, to bypass the program's StrictRavie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Former ransomware negotiator pleads guilty to BlackCat attacks

Bleeping Computer - 21 Duben, 2026 - 12:12
41-year-old Angelo Martino, a former employee of cybersecurity incident response company DigitalMint, has pleaded guilty to targeting U.S. companies in BlackCat (ALPHV) ransomware attacks in 2023. [...]
Kategorie: Hacking & Security

„Vařit z vody“ dostává zcela nový význam. Indický vařič rozkládá vodu pomocí elektrolýzy a k ohřevu používá vodík

Živě.cz - 21 Duben, 2026 - 11:45
Nové kuchyňské zařízení vyrábí vodík k vaření z obyčejné vody • Spotřeba je neuvěřitelně nízká, ovšem výkon dosahuje pouze 100 wattů • Ekologická technologie najde uplatnění především v komerčních provozech
Kategorie: IT News

NGate Android malware uses HandyPay NFC app to steal card data

Bleeping Computer - 21 Duben, 2026 - 11:00
A new variant of the NGate malware that steals NFC payment data is targeting Android users by hiding in a trojanized version of HandyPay, a legitimate mobile payments processing tool. [...]
Kategorie: Hacking & Security
Syndikovat obsah