Agregátor RSS

Identity Prioritization isn't a Backlog Problem - It's a Risk Math Problem

The Hacker News - 24 Únor, 2026 - 12:58
Most identity programs still prioritize work the way they prioritize IT tickets: by volume, loudness, or “what failed a control check.” That approach breaks the moment your environment stops being mostly-human and mostly-onboarded. In modern enterprises, identity risk is created by a compound of factors: control posture, hygiene, business context, and intent. Any one of these can perhaps be [email protected]
Kategorie: Hacking & Security

Korean cops charge teens over bike hire breach that exposed data on 4.62M riders

The Register - Anti-Virus - 24 Únor, 2026 - 12:53
Public prosecutor mulls sentencing following investigations into two separate attacks

Two South Korean teenagers were this week charged with breaching Seoul's public bike service, Ttareungyi.…

Kategorie: Viry a Červi

Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks

The Hacker News - 24 Únor, 2026 - 12:52
The North Korea-linked Lazarus Group (aka Diamond Sleet and Pompilus) has been observed using Medusa ransomware in an attack targeting an unnamed entity in the Middle East, according to a new report by the Symantec and Carbon Black Threat Hunter Team. Broadcom's threat intelligence division said it also identified the same threat actors mounting an unsuccessful attack against a healthcare
Kategorie: Hacking & Security

Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks

The Hacker News - 24 Únor, 2026 - 12:52
The North Korea-linked Lazarus Group (aka Diamond Sleet and Pompilus) has been observed using Medusa ransomware in an attack targeting an unnamed entity in the Middle East, according to a new report by the Symantec and Carbon Black Threat Hunter Team. Broadcom's threat intelligence division said it also identified the same threat actors mounting an unsuccessful attack against a healthcare Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

LLVM 22.1.0

AbcLinuxu [zprávičky] - 24 Únor, 2026 - 12:47
Byla vydána nová verze 22.1.0, tj. první stabilní verze z nové řady 22.1.x, překladačové infrastruktury LLVM (Wikipedie). Přehled novinek v poznámkách k vydání: LLVM, Clang, LLD, Extra Clang Tools a Libc++.
Kategorie: GNU/Linux & BSD

Kód starý jako Beatles srazil akcie IBM o 30 miliard dolarů za jedno odpoledne. Stačilo říct, že AI zvládne COBOL

Živě.cz - 24 Únor, 2026 - 12:45
Blogový příspěvek AI firmy Anthropic o 66 let starém programovacím jazyce způsobil největší denní propad akcií IBM za čtvrt století.
Kategorie: IT News

ShinyHunters extortion gang claims Odido breach affecting millions

Bleeping Computer - 24 Únor, 2026 - 12:40
The ShinyHunters extortion gang has claimed responsibility for breaching Dutch telecommunications provider Odido and stealing millions of user records from its compromised systems. [...]
Kategorie: Hacking & Security

Anthropic alleges large-scale distillation campaigns targeting Claude

Computerworld.com [Hacking News] - 24 Únor, 2026 - 12:39

Anthropic has accused three Chinese AI developers of running large-scale campaigns to illicitly extract capabilities from its Claude model to improve their own systems. The company claims DeepSeek, Moonshot, and MiniMax used a distillation technique, where a less capable model is trained on the outputs of a more advanced one.

More than 16 million interactions were generated with Claude through around 24,000 fraudulent accounts, in violation of Anthropic’s terms of service and regional access restrictions.

Anthropic said it does not offer commercial access to Claude in China, nor to subsidiaries of these companies operating outside the country.

How Claude’s capabilities were extracted at scale

Anthropic said the three distillation campaigns followed a similar playbook, where they used fraudulent accounts and proxy services to access Claude at scale while evading detection, and targeting Claude’s agentic reasoning, tool use, and coding capabilities.

The DeepSeek campaign involved over 150,000 exchanges, focused on extracting reasoning capabilities across diverse tasks. The activity generated synchronized traffic across accounts, with identical patterns, shared payment methods, and coordinated timing suggested load balancing to increase throughput, improve reliability, and avoid detection. 

Moonshot AI’s activity involved over 3.4 million exchanges targeting agentic reasoning and tool use, coding and data analysis, computer-use agent development, and computer vision to reconstruct Claude’s reasoning traces. MiniMax was the largest of the three, involving more than 13 million exchanges, and was squarely targeted at agentic coding and tool use and orchestration. Detected while the campaign was active, Anthropic said MiniMax redirected nearly half of its traffic to Claude’s newly released model within 24 hours.

To carry out the campaigns, Anthropic said the companies relied on commercial proxy services that resell access to Claude and other frontier AI models at scale, referred to as hydra cluster architectures.

Back to the basics of AI model training

Industry experts note that the allegations raise a broader and unresolved question around how AI systems are trained. Most large language models, including leading commercial systems, are themselves trained on vast amounts of publicly available internet data, often without explicit consent from original authors.

“Just as many of the foundation models have been built by indexing the vastness of the internet, often without the explicit consent of creators or piggybacking on other search engines’ content, the newer entrants are in many instances going through the same routes of distillation and optimization,” said Neil Shah, vice president at Counterpoint Research. He added that there is a fundamental disagreement, which is mostly legally undefined, about who owns the synthetic data and whether it is okay if it is used for training, especially open models.

Export controls and national security

Anthropic has framed the alleged distillation campaigns partly through a national security lens, arguing that illicitly distilled models could undermine US efforts to control the spread of advanced AI capabilities, especially if influenced by the Chinese Communist Party. However, experts note that current US export controls are largely focused on hardware, and not on large language models.

“It is critical to separate hardware restrictions from service access. US export controls have concentrated primarily on advanced semiconductors, high-performance computing infrastructure, and, in certain regulatory moments, specific categories of advanced AI model weights. There is no universal prohibition on offering API access to large language models in China,” explained Sanchit Vir Gogia, CEO and chief analyst at Greyhound Research.

However, this does not mean developers are insulated. Gogia added that the Bureau of Industry and Security continues to refine licensing frameworks related to advanced computing commodities and high-capability systems. Also, if a company knowingly supports training activity for restricted entities, especially those tied to military or strategic objectives, exposure becomes plausible even without hardware shipment.

To safeguard themselves, many US AI providers already restrict availability in China through business policy and compliance posture, even beyond what is strictly required.

“For developers, the risk is indirect but real: if your product routes access to restricted geographies or entities, facilitates prohibited end uses, or helps others evade provider geo-restrictions, you can trigger account termination, contractual liability, and potentially regulatory scrutiny depending on who the end user is and what the system enables,” said global partner/senior managing director – India at Ankura Consulting.

Implications for teams building with LLMs

For developers building or training models using large language models, the Anthropic allegations highlight a growing grey area. Developers commonly use LLM APIs for application development, testing, or evaluation. But providers are scrutinizing large-scale, automated use of model outputs to train competing systems.

For instance, Anthropic is responding by investing in defensive techniques. For detection, the company has built several classifiers and behavioural fingerprinting systems designed to identify distillation attack patterns in API traffic. It has also strengthened verification for educational accounts, security research programs, and startup organizations, citing them as the pathways most commonly exploited for setting up fraudulent accounts. The company is also implementing product, API, and model-level safeguards designed to reduce the efficacy of model outputs for illicit distillation, without degrading the experience for legitimate customers.

Developers, too, should ensure their model training stays safe, compliant, and defensible.

Jaju stated that, to start with, developers should review API/service terms and assume no training on outputs unless explicitly permitted. They should maintain a clear record of where every training/example item came from, with licensing/terms attached. Separate operational logs from training datasets should be maintained along with set retention limits.

“Geopolitical diligence cannot be an afterthought. Restricted party screening, export compliance reviews, and region-specific access controls are increasingly part of AI governance, especially for enterprises operating across borders,” added Gogia.

Experts say that if questioned by a regulator or acquirer to explain the training pipeline, developers should be able to provide the same with documentation and without caveats.

Kategorie: Hacking & Security

Emulátor x86 čistě v CSS

AbcLinuxu [zprávičky] - 24 Únor, 2026 - 12:24
X86CSS je experimentální webový emulátor instrukční sady x86 napsaný výhradně v CSS, tedy bez JavaScriptu nebo dalších dynamických prvků. Stránka 'spouští' assemblerovový program mikroprocesoru 8086 a názorně tak demonstruje, že i prosté CSS může fungovat jako Turingovsky kompletní jazyk. Zdrojový kód projektu je na GitHubu.
Kategorie: GNU/Linux & BSD

CGit 1.3

AbcLinuxu [zprávičky] - 24 Únor, 2026 - 12:12
Po šesti letech byla vydána nová verze 1.3 webového rozhraní ke gitovým repozitářům CGit.
Kategorie: GNU/Linux & BSD

North Korean Lazarus group linked to Medusa ransomware attacks

Bleeping Computer - 24 Únor, 2026 - 12:00
North Korean state-backed hackers associated with the Lazarus threat group are targeting U.S. healthcare organizations in extortion attacks using the Medusa ransomware. [...]
Kategorie: Hacking & Security

Americké letectvo přepravilo jako první na světě funkční přenosnou jadernou elektrárnu

Živě.cz - 24 Únor, 2026 - 11:52
Americké vojenské letectvo úspěšně letecky přepravilo přenosný jaderný reaktor • Modulární zařízení poskytuje stálý výkon 5 MW a je zcela nezávislé na síti • Inovativní technologie zásadně podpoří armádní logistiku i civilní záchranné operace
Kategorie: IT News

UK tech hit by double trouble: Fewer foreign techies amid skills squeeze

The Register - Anti-Virus - 24 Únor, 2026 - 11:15
Visa applications down, executives emigrating, and AI blamed for the rest

The number of international workers applying for a visa to work in the UK's tech sector dropped 11 percent between Q2 and Q3 2025, and was down 6 percent year-on-year, according to consultancy RSM UK.…

Kategorie: Viry a Červi

UnsolicitedBooker Targets Central Asian Telecoms With LuciDoor and MarsSnake Backdoors

The Hacker News - 24 Únor, 2026 - 10:54
The threat activity cluster known as UnsolicitedBooker has been observed targeting telecommunications companies in Kyrgyzstan and Tajikistan, marking a shift from prior attacks aimed at Saudi Arabian entities. The attacks involve the deployment of two distinct backdoors codenamed LuciDoor and MarsSnake, according to a report published by Positive Technologies last week. "The group used several
Kategorie: Hacking & Security

UnsolicitedBooker Targets Central Asian Telecoms With LuciDoor and MarsSnake Backdoors

The Hacker News - 24 Únor, 2026 - 10:54
The threat activity cluster known as UnsolicitedBooker has been observed targeting telecommunications companies in Kyrgyzstan and Tajikistan, marking a shift from prior attacks aimed at Saudi Arabian entities. The attacks involve the deployment of two distinct backdoors codenamed LuciDoor and MarsSnake, according to a report published by Positive Technologies last week. "The group used several Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Jak si v Gmailu zadarmo nastavit e-mail na vlastní doméně. Podrobný návod

Živě.cz - 24 Únor, 2026 - 10:45
Mít e-mail na vlastní doméně se hodí. Nejen živnostníkům, kteří se tak mohou prezentovat profesionálněji než s adresou na freemailu. Ale když vás to nic nestojí, můžete mít vlastní e-mail i pro osobní použití. Je to také bezpečnější. Když se s freemailovou službou něco stane nebo s ní nebudete ...
Kategorie: IT News

Euro allies aiming to rapidly build low-cost air defense weapons

The Register - Anti-Virus - 24 Únor, 2026 - 10:30
We like our surface-to-air weapons affordable

Britain has joined a handful of European allies in a program to develop low-cost air defense systems, including autonomous drones or missiles, with project delivery of the first elements scheduled for as early as 2027.…

Kategorie: Viry a Červi

GeForce RTX 5090 Ti: 700-750W TDP, 10 % nad GeForce RTX 5090

CD-R server - 24 Únor, 2026 - 10:00
GeForce RTX 5090 Ti / Mega / Titan, ať už kartu budeme nazývat jakkoli, dostává konkrétnější obrysy. Karta, která by se měla stát novým desktopovým top-modelem Nvidie, zatím koketuje se 7xxW TDP…
Kategorie: IT News

Cloudoví správci hesel mají bezpečnostní trhliny. Nejhůře je na tom Bitwarden, zranitelné jsou také LastPass i Dashlane

Zive.cz - bezpečnost - 24 Únor, 2026 - 09:45
** Vědci nalezli trhliny v populárních aplikacích Bitwarden, LastPass i Dashlane ** Útočník ovládající centrální server dokáže číst i měnit hesla ** Příčinou problému je většinou snaha vývojářů o maximální uživatelské pohodlí
Kategorie: Hacking & Security

Cloudoví správci hesel mají bezpečnostní trhliny. Nejhůře je na tom Bitwarden, zranitelné jsou také LastPass i Dashlane

Živě.cz - 24 Únor, 2026 - 09:45
Vědci nalezli trhliny v populárních aplikacích Bitwarden, LastPass i Dashlane • Útočník ovládající centrální server dokáže číst i měnit hesla • Příčinou problému je většinou snaha vývojářů o maximální uživatelské pohodlí
Kategorie: IT News
Syndikovat obsah