CNBC reports that Apple's appeal against the UK government's order to create a "backdoor" allowing access to encrypted iPhone user data will be heard in public after the country's Investigatory Powers Tribunal dismissed the government's attempt to conduct the hearing behind closed doors due to national security risks.
We will have two hands-on Rubber Ducky labs, one for a general audience of all skill levels and an advanced lab for people with a stronger technical background. A Rubber Ducky is a cybersecurity tool that looks like a USB drive but actually imitates a keyboard—which is extremely powerful. The first lab will give an introduction to what a Rubber Duc...
Deepseek troubles, AI models explained, AMD CPU microcode signature validation, what happens when you leave an AWS S3 bucket laying around, 3D printing tips, and the malware that never was on Ethernet to USB adapters.
Included in the affected CPE Series router models were VMG1312-B10A, VMG1312-B10B, VMG1312-B10E, VMG3312-B10A, VMG3313-B10A, VMG3926-B10B, VMG4325-B10A, VMG4380-B10A, VMG8324-B10A, VMG8924-B10A, SBG3300, and SBG3500, according to Zyxel.
The attacks exploit flaws in speculative execution, the same fundamental weakness that enabled attacks such as Spectre and Meltdown to remotely leak sensitive information from web browsers.
An open source security project forks in response to license changes (and an echo of how we've been here before), car hacking via spectacularly insecure web apps, hacking a synth via spectacularly cool MIDI messages, cookie parsing problems, the RANsacked paper of 100+ LTE/5G vulns found from fuzzing, and more!
Fast Five
Selected by the SC Media Editorial team every Tuesday.
Sign up now for the top five issues cybersecurity pros need to know this week.