Friday Squid Blogging: Squid-Inspired Needle Technology
Interesting research: Using jet propulsion inspired by squid, researchers demonstrate a microjet system that delivers medications directly into tissues, matching the effectiveness of traditional needles....
Race Condition Attacks against LLMs
These are two attacks against the system components surrounding LLMs: We propose that LLM Flowbreaking, following jailbreaking and prompt injection, joins as the third on...
INC Ransom Claims Cyber-Attack on UK Children’s Hospital
The NHS Trust is investigating the incident with the help of the National Crime Agency Read More
Cyber-Attacks Could Impact Romanian Presidential Race, Officials Claim
Romania’s national security council suggested that Russia is behind these attacks, amid a court order for a recount of votes in the first round of...
UK hospital, hit by cyberattack, resorts to paper and postpones procedures
A British hospital is grappling with a major cyberattack that has crippled its IT systems and disrupted patient care. Read more in my article on...
UK Justice System Failing Cybercrime Victims, Cyber Helpline Finds
A report from the charity the Cyber Helpline found that 98% of cyber enabled crimes result in no further action from the police or justice...
php-extras-8.0.30-2.el9
FEDORA-EPEL-2024-366dd673ff Packages in this update: php-extras-8.0.30-2.el9 Update description: Security fixes backported from 8.1.31 PDO DBLIB: Fixed bug GHSA-5hqh-c84r-qjcv (Integer overflow in the dblib quoter causing...
Malicious PyPI Package Exposes Crypto Wallets to Infostealer Code
A malicious PyPI package “aiocpa,” that stole crypto wallet data via obfuscated code, has been removed after being reported by Reversing Labs researchers Read More
GodLoader Malware Infects Thousands via Game Development Tools
A new cyber-attack technique uses Godot Engine to deploy undetectable malware via GodLoader, infecting more than 17,000 devices Read More
Mimic ransomware: what you need to know
What makes Mimic particularly unusual is that it exploits the API of a legitimate Windows file search tool ("Everything" by Voidtools) to quickly locate files...