Warehouse-style employee-tracking technology is coming for the office worker.
Cybersecurity
Broadcom reverses plan to curb VMware migrations, now focusing on 500 top customers and inviting channel partners to participate
Broadcom will only hog 500 of VMware’s biggest customers instead of 2,000.
New attack uses prompt injections to plant false memories in AI chatbots and steal cryptocurrency
Malicious “context manipulation” technique causes bot to send payments to attacker’s wallet.
New exploit lets attackers steal cryptocurrency by implanting false memories in AI chatbots
Malicious “context manipulation” technique causes bot to send payments to attacker’s wallet.
New prompt-injection attack against ElizaOS can steal cryptocurrency by planting false memories in AI chatbots
Malicious “context manipulation” technique causes bot to send payments to attacker’s wallet.
Google Finds UNC6148 Installing the Overstep Backdoor on SonicWall SMA Appliances
Overstep backdoor nukes key log entries, making detection hard.
Google Discovers Custom Backdoor Installing on SonicWall SMA Appliances, Overstep Scrubs Logs
Overstep backdoor nukes key log entries, making detection hard.
Open-source supply-chain attacks are spiraling out of control, with npm breaches, compromised GitHub orgs, and widespread malicious packages
Attacks affected packages, including one with ~2.8 million weekly downloads.
Open-source software supply chains are spiraling out of control as attackers push malicious npm packages
Attacks affected packages, including one with ~2.8 million weekly downloads.