#tpms-security-vulnerability

[ follow ]
#ai
Information security
fromFortune
3 days ago

Anthropic's Mythos is a wake up call, but experts say the era of AI-driven hacking is already here | Fortune

Anthropic's Mythos AI model is too dangerous to release widely due to its ability to exploit software vulnerabilities.
fromwww.theguardian.com
5 days ago
Information security

Anthropic says its latest AI model can expose weaknesses in software security

Claude Mythos exposes thousands of software vulnerabilities, prompting Anthropic to limit its release and collaborate with cybersecurity specialists.
Information security
fromTechzine Global
7 hours ago

Runtime security becomes critical as AI accelerates threats

Artificial intelligence accelerates innovation and cyber threats, necessitating a focus on runtime security for effective enterprise protection.
Information security
fromFortune
3 days ago

Anthropic's Mythos is a wake up call, but experts say the era of AI-driven hacking is already here | Fortune

Anthropic's Mythos AI model is too dangerous to release widely due to its ability to exploit software vulnerabilities.
Information security
fromwww.theguardian.com
5 days ago

Anthropic says its latest AI model can expose weaknesses in software security

Claude Mythos exposes thousands of software vulnerabilities, prompting Anthropic to limit its release and collaborate with cybersecurity specialists.
#cybersecurity
fromFortune
3 days ago
Privacy professionals

First they went after medtech, then Kash Patel. Iranian hackers' next target is likely 'low-hanging fruit' in water, energy, and tourism, experts say | Fortune

Healthcare
fromBoston.com
6 days ago

Signature Healthcare in Brockton hit by cybersecurity incident

Signature Healthcare is managing a cybersecurity incident, affecting some services while maintaining inpatient and emergency care.
Silicon Valley
fromWIRED
16 hours ago

The Dumbest Hack of the Year Exposed a Very Real Problem

A cyberattack in Silicon Valley exploited weak passwords to spoof crosswalk button recordings with voices of tech CEOs, raising security concerns.
Privacy professionals
fromFortune
3 days ago

First they went after medtech, then Kash Patel. Iranian hackers' next target is likely 'low-hanging fruit' in water, energy, and tourism, experts say | Fortune

Iran-linked hackers are targeting high-profile figures and critical infrastructure in the U.S. and Israel to sow disruption.
Information security
fromThe Hacker News
13 hours ago

Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

A critical zero-day vulnerability in Adobe Acrobat Reader is actively exploited, alongside state-sponsored cyber threats targeting U.S. infrastructure.
Healthcare
fromBoston.com
6 days ago

Signature Healthcare in Brockton hit by cybersecurity incident

Signature Healthcare is managing a cybersecurity incident, affecting some services while maintaining inpatient and emergency care.
fromArs Technica
7 hours ago

Your tech support company runs scams. Stop-or disguise with more fraud?

Tech Live Connect processed fraudulent charges using real customer data, including names and addresses, to make the charges appear legitimate and maintain a low chargeback ratio.
Privacy professionals
Node JS
fromNist
1 day ago

NVD

Axios library versions prior to 1.15.0 are vulnerable to Prototype Pollution, leading to Remote Code Execution and Full Cloud Compromise.
#tesla
Cars
fromTESLARATI
2 days ago

Tesla Cabin Camera gets an incredible new feature for added driver safety

Tesla's in-cabin camera now tracks driver age with Software Update 2026.8.6, enhancing safety and monitoring capabilities.
Cars
fromTESLARATI
4 days ago

Tesla issues wake up call to Full Self-Driving hackers and cheats

Tesla is disabling Full Self-Driving capabilities on vehicles using unauthorized hacks in regions where the software is unapproved.
Cars
fromEngadget
6 days ago

NHTSA closes probe into Tesla's remote parking crashes

NHTSA closed its investigation into Tesla's remote parking features after finding minor issues in low-speed incidents.
Cars
frominsideevs.com
6 days ago

Tesla's 'ASS' Is Safe As Feds End Probe Into Remote Control Feature

Tesla's Actual Smart Summon feature is cleared by NHTSA after a probe found low severity and frequency of reported crashes.
fromSecurityWeek
4 days ago

Apple Intelligence AI Guardrails Bypassed in New Attack

The first is Neural Execs, a known prompt injection attack that uses 'gibberish' inputs to trick the AI into executing arbitrary, attacker-defined tasks. These inputs act as universal triggers that do not need to be remade for different payloads.
Apple
#cyberattack
Healthcare
fromSecurityWeek
5 days ago

Massachusetts Hospital Diverts Ambulances as Cyberattack Causes Disruption

Signature Healthcare in Brockton diverted ambulances due to a cyberattack, impacting services but not surgeries or procedures.
Information security
fromTechCrunch
3 weeks ago

Cyberattack on vehicle breathalyzer company leaves drivers stranded across the US | TechCrunch

A cyberattack on Intoxalock has stranded drivers nationwide by preventing vehicle breathalyzer calibrations.
Healthcare
fromSecurityWeek
5 days ago

Massachusetts Hospital Diverts Ambulances as Cyberattack Causes Disruption

Signature Healthcare in Brockton diverted ambulances due to a cyberattack, impacting services but not surgeries or procedures.
Information security
fromTechCrunch
3 weeks ago

Cyberattack on vehicle breathalyzer company leaves drivers stranded across the US | TechCrunch

A cyberattack on Intoxalock has stranded drivers nationwide by preventing vehicle breathalyzer calibrations.
#ai-security
Software development
fromInfoWorld
5 days ago

Microsoft's new Agent Governance Toolkit targets top OWASP risks for AI agents

Microsoft introduced the Agent Governance Toolkit to enhance AI agent security and mitigate OWASP's top 10 agentic AI threats.
Information security
fromTechRepublic
3 weeks ago

Researchers Uncover New Phishing Risk Hidden Inside Microsoft Copilot

Attacker-controlled text in emails can manipulate Microsoft Copilot summaries through cross-prompt injection attacks, inserting deceptive alerts into trusted AI interfaces that users find more convincing than suspicious emails.
Software development
fromInfoWorld
5 days ago

Microsoft's new Agent Governance Toolkit targets top OWASP risks for AI agents

Microsoft introduced the Agent Governance Toolkit to enhance AI agent security and mitigate OWASP's top 10 agentic AI threats.
Information security
fromTechRepublic
3 weeks ago

Researchers Uncover New Phishing Risk Hidden Inside Microsoft Copilot

Attacker-controlled text in emails can manipulate Microsoft Copilot summaries through cross-prompt injection attacks, inserting deceptive alerts into trusted AI interfaces that users find more convincing than suspicious emails.
frominsideevs.com
2 days ago

How Can I Tell If A Car Is Reliable? An Honest Guide

Reliability is broadly defined by how often your car experiences unscheduled failures or malfunctions. A car that is more likely to experience failures is considered unreliable, whereas one that can go for 150,000 miles with nothing but regular maintenance would be considered reliable.
Cars
Node JS
fromNist
6 days ago

NVD

Tinyproxy versions up to 1.11.3 are vulnerable to HTTP request parsing desynchronization due to case-sensitive Transfer-Encoding header comparison.
Software development
fromTechzine Global
6 days ago

Why SAST is growing in importance in the age of AI-generated source code

Vibe coding is rapidly increasing, but trust in AI-generated code remains low, making SAST tools essential for security and error prevention.
#data-breach
Information security
fromTechCrunch
12 hours ago

Hack at Anodot leaves over a dozen breached companies facing extortion | TechCrunch

Hackers stole data from multiple companies after breaching Anodot, exposing customers to extortion and potential data publication.
Privacy professionals
fromTechzine Global
2 weeks ago

Mazda investigates data breach following vulnerability in internal IT system

Mazda experienced a security incident leading to unauthorized access of employee and partner data, prompting enhanced security measures.
Privacy professionals
fromSecurityWeek
2 weeks ago

Mazda Says Employee, Partner Information Stolen in Cyberattack

Mazda Motor Corporation experienced a data breach affecting personal information of 692 employees and business partners due to unauthorized access to its management system.
fromwww.cbc.ca
2 months ago
Information security

Data breach at Canada Computers & Electronics leaks personal customer information | CBC News

Information security
fromTechCrunch
12 hours ago

Hack at Anodot leaves over a dozen breached companies facing extortion | TechCrunch

Hackers stole data from multiple companies after breaching Anodot, exposing customers to extortion and potential data publication.
Privacy professionals
fromTechzine Global
2 weeks ago

Mazda investigates data breach following vulnerability in internal IT system

Mazda experienced a security incident leading to unauthorized access of employee and partner data, prompting enhanced security measures.
Privacy professionals
fromSecurityWeek
2 weeks ago

Mazda Says Employee, Partner Information Stolen in Cyberattack

Mazda Motor Corporation experienced a data breach affecting personal information of 692 employees and business partners due to unauthorized access to its management system.
fromwww.cbc.ca
2 months ago
Information security

Data breach at Canada Computers & Electronics leaks personal customer information | CBC News

DevOps
fromTheregister
2 weeks ago

Documentation can contain malicious instructions for agents

Context Hub may enhance API usage but poses risks of software supply chain attacks through unverified documentation.
Information security
fromSecurityWeek
3 days ago

Critical Marimo Flaw Exploited Hours After Public Disclosure

A critical vulnerability in Marimo was exploited within hours of its public disclosure, allowing unauthenticated remote code execution.
Cars
fromFast Company
2 weeks ago

This Ford recall involves a feature you probably rely on every day

Ford recalls 254,640 vehicles due to potential rearview camera image issues affecting advanced driver assistance features.
Privacy technologies
fromSecurityWeek
1 month ago

Researchers Uncover Method to Track Cars via Tire Sensors

TPMS tire pressure sensors transmit unencrypted unique identifiers allowing low-cost roadside receivers to track vehicle movements and driving patterns.
Cars
fromBusiness Matters
3 weeks ago

Predictive Maintenance Through AI Vehicle Inspections: Reducing Downtime and Repair Costs

Predictive maintenance uses AI and real-time data to optimize vehicle servicing based on actual condition, reducing costs and breakdowns.
Information security
fromThe Hacker News
4 days ago

ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories

A new variant of the Phorpiex botnet combines traditional and peer-to-peer communication, facilitating sophisticated malware operations and high-volume spam.
Information security
fromSecurityWeek
5 days ago

Hackers Targeting Ninja Forms Vulnerability That Exposes WordPress Sites to Takeover

A critical vulnerability in Ninja Forms allows file uploads that could lead to remote code execution on affected websites.
Information security
fromTechRepublic
5 days ago

Why Operationalizing AI Security Is the Next Great Enterprise Hurdle

Security operations lag behind rapid tech advancements, leading to inefficiencies and risks in managing numerous security tools.
Information security
fromThe Hacker News
6 days ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
Information security
fromTheregister
6 days ago

Hundreds compromised daily in Microsoft device code phishes

A Microsoft device-code phishing campaign is compromising hundreds of organizations daily, utilizing AI and automation to steal financial data.
#smart-home-security
fromZDNET
1 month ago
Privacy technologies

Your smart home may be at risk - 6 ways experts protect your devices from attacks

fromZDNET
2 months ago
Privacy technologies

Should you be afraid of smart home hacking? What it is, and how experts prevent it

fromZDNET
1 month ago
Privacy technologies

Your smart home may be at risk - 6 ways experts protect your devices from attacks

fromZDNET
2 months ago
Privacy technologies

Should you be afraid of smart home hacking? What it is, and how experts prevent it

Information security
fromInfoQ
1 week ago

Open Source Security Tool Trivy Hit by Supply Chain Attack, Prompting Urgent Industry Response

A malicious release of the Trivy vulnerability scanner exposed critical weaknesses in software supply chain security, allowing for potential credential theft.
fromSecurityWeek
1 week ago

Mercor Hit by LiteLLM Supply Chain Attack

We believe that the compromise originated from the Trivy dependency used in our CI/CD security scanning workflow. Our security team moved promptly to contain and remediate the incident.
Information security
#hardware-security
fromTheregister
2 weeks ago

Microsoft cracks down on old Windows kernel drivers

Microsoft is removing trust for kernel drivers that haven't been through the Windows Hardware Compatibility Program, targeting those signed by the long-deprecated cross-signed root program. This change will take effect with the April 2026 Windows Update.
Information security
#tp-link
Information security
fromTechRepublic
2 weeks ago

TP-Link Fixes Bug That Lets Hackers Take Over Routers Without a Password

TP-Link patched critical vulnerabilities in Archer NX routers that allowed unauthorized firmware installation and network manipulation.
Information security
fromTechRepublic
2 weeks ago

TP-Link Fixes Bug That Lets Hackers Take Over Routers Without a Password

TP-Link patched critical vulnerabilities in Archer NX routers that allowed unauthorized firmware installation and network manipulation.
fromArs Technica
1 month ago

What happens to a car when the company behind its software goes under?

As vehicles become platforms for software and subscriptions, their longevity is increasingly tied to the survival of the companies behind their code. When those companies fail, the consequences ripple far beyond a bad app update and into the basic question of whether a car still functions as a car. Over the years, automotive software has expanded from performing rudimentary engine management and onboard diagnostics to powering today's interconnected, software-defined vehicles.
Cars
fromThe Hacker News
3 weeks ago

54 EDR Killers Use BYOVD to Exploit 34 Signed Vulnerable Drivers and Disable Security

Ransomware gangs, especially those with ransomware-as-a-service (RaaS) programs, frequently produce new builds of their encryptors, and ensuring that each new build is reliably undetected can be time-consuming. More importantly, encryptors are inherently very noisy (as they inherently need to modify a large number of files in a short period); making such malware undetected is rather challenging.
Information security
Information security
fromThe Hacker News
3 weeks ago

9 Critical IP KVM Flaws Enable Unauthenticated Root Access Across Four Vendors

Nine critical vulnerabilities in low-cost IP KVM devices from multiple manufacturers allow unauthenticated attackers to gain root access and control compromised systems at the BIOS/UEFI level.
Information security
fromArs Technica
3 weeks ago

Researchers disclose vulnerabilities in IP KVMs from four manufacturers

IP KVMs pose severe network security risks because compromising them enables attackers to bypass system security and access remotely managed servers.
Information security
fromTechRepublic
4 weeks ago

Industrial Systems Under Siege: 77% of OT Environments Suffer Cyber Breaches

Industrial sectors lag in cybersecurity despite modernizing operational technologies, creating critical vulnerabilities in manufacturing, utilities, and energy infrastructure.
Information security
fromSecurityWeek
1 month ago

Michelin Confirms Data Breach Linked to Oracle EBS Attack

Michelin confirmed a data breach from the Cl0p ransomware group's Oracle EBS zero-day exploitation campaign affecting over 100 organizations.
Information security
fromSecurityWeek
1 month ago

ICS Patch Tuesday: Vulnerabilities Fixed by Siemens, Schneider, Moxa, Mitsubishi Electric

Industrial control system manufacturers Siemens, Schneider Electric, Mitsubishi Electric, and Moxa released multiple security advisories addressing critical and high-severity vulnerabilities in their ICS products.
Information security
fromThe Hacker News
1 month ago

Dozens of Vendors Patch Security Flaws Across Enterprise Software and Network Devices

SAP released security updates for two critical vulnerabilities enabling arbitrary code execution: CVE-2019-17571 in Quotation Management Insurance and CVE-2026-27685 in NetWeaver Enterprise Portal Administration.
Information security
fromThe Hacker News
1 month ago

Hikvision and Rockwell Automation CVSS 9.8 Flaws Added to CISA KEV Catalog

CISA added two critical vulnerabilities affecting Hikvision and Rockwell Automation products to its Known Exploited Vulnerabilities catalog due to active exploitation evidence.
Information security
fromSecurityWeek
1 month ago

Vulnerability in MS-Agent AI Framework Can Allow Full System Compromise

CVE-2026-2256 in ModelScope MS-Agent framework allows arbitrary OS command execution through inadequate input sanitization in the Shell tool using regex-based blacklist filtering.
fromSecurityWeek
1 month ago

Critical Flaws Exposed Gardyn Smart Gardens to Remote Hacking

According to CISA, Gardyn products were affected by two critical and two high-severity vulnerabilities. One of the critical flaws, tracked as CVE-2025-29631, is a command injection issue that can be exploited to execute arbitrary OS commands on the targeted device. The second critical vulnerability, CVE-2025-1242, is related to the exposure of hardcoded admin credentials that can be used to gain full control of the Gardyn IoT Hub.
Information security
fromZero Day Initiative
2 months ago

Zero Day Initiative - Pwn2Own Automotive 2026 - Day One Results

Welcome to Day One of Pwn2Own Automotive 2026! Today, 30 entries are taking the Pwn2Own stage to target the latest automotive systems, as the world's top security researchers push technology to its limits. Exploits, surprises, and breakthrough discoveries are already unfolding - follow along here for updates throughout the day as the competition continues. Stay up to date by following us on Twitter, Mastodon, LinkedIn, and Bluesky, and join the conversation using #Pwn2Own Automotive and #P2OAuto for continuous coverage.
Information security
fromTheregister
2 months ago

Automotive systems get pwned at Pwn2Own Automotive 2026

infosec in brief T'was a dark few days for automotive software systems last week, as the third annual Pwn2Own Automotive competition uncovered 76 unique zero-day vulnerabilities in targets ranging from Tesla infotainment to EV chargers. A record 73 entries were included in this year's competition at Automotive World in Tokyo, and, while not all were successful, Trend Micro's Zero Day Initiative still ended up paying out more than $1 million to successful competitors. For those unfamiliar with the structure of a Pwn2Own competition, ethical hackers and security experts enter with plans to perform a certain exploit, which they must do in a limited time.
fromSecurityWeek
2 months ago

ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Aveva, Phoenix Contact

Siemens has published eight new advisories. The company has released patches and mitigations for high-severity issues in Desigo CC, Sentron Powermanager, Simcenter Femap and Nastran, NX, Sinec NMS, Solid Edge, and Polarion products. A medium-severity flaw has been found in Siveillance Video Management Servers. Exploitation of the vulnerabilities can lead to unauthorized access, XSS, DoS, code execution, and privilege escalation.
Information security
fromSecurityWeek
2 months ago

Access System Flaws Enabled Hackers to Unlock Doors at Major European Firms

Vulnerabilities discovered by researchers in Dormakaba physical access control systems could have allowed hackers to remotely open doors at major organizations. The security holes were discovered by experts at SEC Consult, a cybersecurity consulting firm under Atos-owned Eviden, in Dormakaba's Exos central management software, a hardware access manager, and registration units that enable entry via a keypad, fingerprint reader, or chip card.
Information security
#microsoft-copilot
fromZDNET
2 months ago
Information security

How a simple link allowed hackers to bypass Copilot's security guardrails - and what Microsoft did about it

fromZDNET
2 months ago
Information security

Your Copilot data can be hijacked with a single click - here's how

fromZDNET
2 months ago
Information security

How a simple link allowed hackers to bypass Copilot's security guardrails - and what Microsoft did about it

fromZDNET
2 months ago
Information security

Your Copilot data can be hijacked with a single click - here's how

Information security
fromTheregister
2 months ago

Vulnerability exploits now dominate intrusions

Exploit of disclosed vulnerabilities now causes most intrusions, with attackers weaponizing new flaws within hours while many organizations patch slowly.
fromTheregister
2 months ago

ATM flashes a port or two for the enterprising hacker

When we talk about installation, we're usually referring to Windows 2000 turning up on a ticket machine, Windows 7 showing its face where it isn't welcome, or even Windows 10 having a moment on an information display. Today's bork, however, is a bit different. Spied by an eagle-eyed Register reader, this installation is all about the hardware: a router connected to an ATM to provide connectivity.
Information security
fromTheregister
2 months ago

Tech support detective solved crime by checking the carpark

"A floor manager responsible for production asked me to fix his PC, which was so slow he could literally make a coffee in the time between double-clicking an icon and having the program open," Parker told On Call. The manager's PC was only a year old and ran Windows XP, a combo that at the time of this tale should have made for decent performance.
Information security
[ Load more ]