Jaguar Land Rover Extends Shutdown After Cyber Attack
Jaguar Land Rover Extends Shutdown After Cyber Attack Summary Jaguar Land Rover (JLR) has extended the shutdown of its UK and overseas factories after a cyberattack forced the firm to…
Jaguar Land Rover Extends Shutdown After Cyber Attack Summary Jaguar Land Rover (JLR) has extended the shutdown of its UK and overseas factories after a cyberattack forced the firm to…
All 54 Lost Clickwheel iPod Games Have Been Preserved For Posterity Summary Enthusiasts have completed a long-running preservation effort to assemble all 54 official iPod clickwheel games into a single,…
Plex Suffers Security Incident Exposing User Data and Urging Password Resets Summary Plex has informed customers that an unauthorised third party gained access to one of its databases, exposing email…
WhatsApp’s former security boss claims reporting infosec failings led to ousting Summary Former WhatsApp head of security Attaullah Baig has sued Meta in Northern California federal court, alleging he was…
Whistle-Blower Sues Meta Over Claims of WhatsApp Security Flaws Summary The former head of security for WhatsApp, Attaullah Baig, has filed a lawsuit in the U.S. District Court for the…
Hackers Hijack npm Packages With 2 Billion Weekly Downloads in Supply Chain Attack Summary Attackers phished a package maintainer, used an impersonating domain (npmjs.help) to harvest credentials, and pushed malicious…
Signal Rolls Out Encrypted Cloud Backups, Debuts First Subscription Plan at $1.99/Month Summary Signal has begun rolling out end-to-end encrypted cloud backups in its latest Android beta. The opt-in feature…
Jaguar Land Rover Extends Shutdown After Cyber Attack Summary Jaguar Land Rover (JLR) has extended the closure of its UK and overseas factories after a cyber attack forced the firm…
Plex Suffers Security Incident Exposing User Data and Urging Password Resets Summary Plex has notified customers that an unauthorised third party gained access to one of its databases. The breach…
Proof-of-Concept in 15 Minutes? AI Turbocharges Exploitation Summary An AI-driven offensive research pipeline, built by two independent Israeli researchers and dubbed “Auto Exploit”, uses LLM prompts, CVE advisories and open-source…