Information security
fromTheregister
2 hours agoOngoing supply-chain attack targets security, dev tools
Checkmarx's GitHub repository was compromised, leading to a data leak by the Lapsus$ extortion group.
UL Solutions has been a cornerstone in safety testing for over a century, starting with fire and safety evaluations for electrical products as electricity became common in homes. Today, its logo signifies safety across a vast array of consumer electronics.
CrowdStrike published an advisory for CVE-2026-40050, a critical unauthenticated path traversal vulnerability affecting its LogScale product. The flaw can allow a remote attacker to read arbitrary files from the server filesystem.
A Common Vulnerability Exposure (CVE) that cannot reach the privilege plane is operationally ineffective - even at a CVSS Score of 10. This should be a core philosophy that is embedded into the fabric of software engineering.
I've always had what I would consider a hacker mindset, a curiosity to take things apart, understand them, and use that knowledge to solve problems. That mindset took me on a circuitous route into the cybersecurity industry; after being kicked out of high school for hacking computer systems, I worked a range of jobs, managing office supply companies by day and cracking Wi-Fi networks by night until I started a Digital Forensics degree which led me to the world of security research.
We had already heard of 'next-gen SIEM'. This is a system that replaces traditional rule-based logging with automatic recognition of complex threats. It was designed to reduce noise on the line for SecOps personnel by reducing the number of false positives. However, according to Abstract CEO and co-founder Colby DeRodeff, this was only the beginning. He believes that a real 'reset' is needed, in the form of an 'AI-Gen Composable SIEM'.