Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Latest News

Russian-Linked Surveillance Tech Firm Protei Hacked, Website Defaced and Data Published

  A telecommunications technology provider with ties to Russian surveillance infrastructure has reportedly suffered a major cybersecurity br...

All the recent news you need to know

Waymo Robotaxi Films Deadly San Francisco Shooting

 

A Waymo autonomous vehicle may have captured video footage of a fatal shooting incident in San Francisco's Mission neighborhood over the weekend, highlighting the emerging role of self-driving cars as potential witnesses in criminal investigations. The incident resulted in one man's death and left another person critically injured.

The incident and arrest

According to 9-1-1 dispatcher calls cited by the San Francisco Standard, a Waymo robotaxi was parked near the crime scene during the shooting. Police have identified the suspect as 23-year-old Larry Hudgson Jr., who was subsequently arrested without incident in a nearby neighborhood and booked into county jail. It remains unclear whether law enforcement has formally requested footage from the autonomous vehicle.

Privacy concerns

Waymo vehicles are equipped with extensive surveillance technology, featuring at least 29 cameras on their interiors and exteriors that continuously monitor their surroundings. This comprehensive camera coverage has drawn criticism from privacy advocates who describe the vehicles as "little mobile narcs" capable of widespread surveillance. The company maintains it does not routinely share data with law enforcement without proper legal requests.

Company policy on law enforcement access

Waymo co-CEO Tekedra Mawakana explained the company's approach during an interview with the New York Times podcast Hard Fork, emphasizing transparency in their privacy policy. The company follows legal processes when responding to footage requests and narrows the scope as necessary. Waymo representatives have stated they actively challenge data requests lacking valid legal basis or those considered overbroad.

This incident exemplifies how smart devices increasingly contribute to the surveillance economy and criminal investigations. Similar cases include Amazon being ordered to provide Echo device data for a 2017 New Hampshire murder investigation, Tesla cameras assisting in hate crime arrests in 2021, and Uber Eats delivery bot footage used in an abduction case. As autonomous vehicles become more prevalent in American cities, their role as digital witnesses in criminal cases appears inevitable.

Digital Deception Drives a Sophisticated Era of Cybercrime


 

Digital technology is becoming more and more pervasive in the everyday lives, but a whole new spectrum of threats is quietly emerging behind the curtain, quietly advancing beneath the surface of routine online behavior. 

A wide range of cybercriminals are leveraging an ever-expanding toolkit to take advantage of the emotional manipulation embedded in deepfake videos, online betting platforms, harmful games and romance scams, as well as sophisticated phishing schemes and zero-day exploits to infiltrate not only devices, but the habits and vulnerabilities of the users as well. 

Google's preferred sources have long stressed the importance of understanding how attackers attack, which is the first line of defence for any organization. The Cyberabad Police was the latest agency to extend an alert to households, which adds an additional urgency to this issue. 

According to the authorities' advisory, Caught in the Digital Web Vigilance is the Only Shield, it is clear criminals are not forcing themselves into homes anymore, rather they are slipping silently through mobile screens, influencing children, youth, and families with manipulative content that shapes their behaviors, disrupts their mental well-being, and undermines society at large. 

There is no doubt that digital hygiene has become an integral part of modern cybercrime and is not an optional thing anymore, but rather a necessary necessity in an era where deception has become a key weapon. 

Approximately 60% of breaches now have been linked to human behavior, according to Verizon Business Business 2025 Data Breach Investigations Report (DBIR). These findings reinforce how human behavior remains intimately connected with cyber risk. Throughout the report, social engineering techniques such as phishing and pretexting, as well as other forms of social engineering, are being adapted across geographies, industries, and organizational scales as users have a tendency to rely on seemingly harmless digital interactions on a daily basis. 

DBIR finds that cybercriminals are increasingly posing as trusted entities, exploiting familiar touchpoints like parcel delivery alerts or password reset prompts, knowing that these everyday notifications naturally encourage a quick click, exploiting the fact that these everyday notifications naturally invite a quick click. 

In addition, the findings of the DBIR report demonstrate how these once-basic tricks have been turned into sophisticated deception architectures where the web itself has become a weapon. With the advent of fake software updates, which mimic the look and feel of legitimate pop-ups, and links that appear to be embedded in trusted vendor newsletters may quietly redirect users to compromised websites, this has become one of the most alarming developments. 

It has been found that attackers are coaxing individuals into pasting malicious commands into the enterprise system, turning essential workplace tools into self-destructive devices. In recent years, infected attachments and rogue sites have been masquerading as legitimate webpages, cloaking attacks behind the façade of security, even long-standing security tools that are being repurposed; verification prompts and "prove you are human" checkpoints are being manipulated to funnel users towards infected attachments and malicious websites. 

A number of Phishing-as-a-Service platforms are available for the purpose of stealing credentials in a more precise and sophisticated manner, and cybercriminals are now intentionally harvesting Multi-Factor Authentication data based on targeted campaigns that target specific sectors, further expanding the scope of credential theft. 

In the resulting threat landscape, security itself is frequently used as camouflage, and the strength of the defensive systems is only as strong as the amount of trust that users place in the screens before them. It is important to point out that even as cyberattack techniques become more sophisticated, experts contend that the fundamentals of security remain unchanged: a company or individual cannot be effectively protected against a cyberattack without understanding their own vulnerabilities. 

The industry continues to emphasise the importance of improving visibility, reducing the digital attack surface, and adopting best practices in order to stay ahead of an expanding number of increasingly adaptive adversaries; however, the risks extend far beyond the corporate perimeter. There has been a growing body of research from Cybersecurity Experts United that found that 62% of home burglaries have been associated with personal information posted online that led to successful break-ins, underscoring that digital behaviour now directly influences physical security. 

A deeper layer to these crimes is the psychological impact that they have on victims, ranging from persistent anxiety to long-term trauma. In addition, studies reveal oversharing on social media is now a key enabler for modern burglars, with 78% of those who confess to breaching homeowner's privacy admitting to mining publicly available posts for clues about travel plans, property layouts, and periods of absence from the home. 

It has been reported that houses mentioned in travel-related updates are 35% more likely to be targeted as a result, and that burglaries that take place during vacation are more common in areas where social media usage is high; notably, it has been noted that a substantial percentage of these incidents involve women who publicly announced their travel plans online. It has become increasingly apparent that this convergence of online exposure and real-world harm also has a reverberating effect in many other areas. 

Fraudulent transactions, identity theft, and cyber enabled scams frequently spill over into physical crimes such as robbery and assault, which security specialists predict will only become more severe if awareness campaigns and behavioral measures are not put in place to combat it. The increase in digital connectivity has highlighted the importance of comprehensive protective measures ranging from security precautions at home during travel to proper management of online identities to combat the growing number of online crimes and their consequences on a real-world basis. 

The line between physical and digital worlds is becoming increasingly blurred as security experts warn, and so resilience will become as important as technological safeguards in terms of resilience. As cybercrime evolves with increasingly complex tactics-whether it is subtle manipulation, data theft, or the exploitation of online habits, which expose homes and families-the need for greater public awareness and more informed organizational responses grows increasingly. 

A number of authorities emphasize that reducing risk is not a matter of isolating isolated measures but of adopting a holistic security mindset. This means limiting what we share, questioning what we click on, and strengthening the security systems that protect both our networks as well as our everyday lives. Especially in a time when criminals increasingly weaponize trust, information and routine behavior, collective vigilance may be our strongest defensive strategy in an age in which criminals are weaponizing trust and information.

Anthropic Introduces Claude Opus 4.5 With Lower Pricing, Stronger Coding Abilities, and Expanded Automation Features

 



Anthropic has unveiled Claude Opus 4.5, a new flagship model positioned as the company’s most capable system to date. The launch marks a defining shift in the pricing and performance ecosystem, with the company reducing token costs and highlighting advances in reasoning, software engineering accuracy, and enterprise-grade automation.

Anthropic says the new model delivers improvements across both technical benchmarks and real-world testing. Internal materials reviewed by industry reporters show that Opus 4.5 surpassed the performance of every human candidate who previously attempted the company’s most difficult engineering assignment, when the model was allowed to generate multiple attempts and select its strongest solution. Without a time limit, the model’s best output matched the strongest human result on record through the company’s coding environment. While these tests do not reflect teamwork or long-term engineering judgment, the company views the results as an early indicator of how AI may reshape professional workflows.

Pricing is one of the most notable shifts. Opus 4.5 is listed at roughly five dollars per million input tokens and twenty-five dollars per million output tokens, a substantial decrease from the rates attached to earlier Opus models. Anthropic states that this reduction is meant to broaden access to advanced capabilities and push competitors to re-evaluate their own pricing structures.

In performance testing, Opus 4.5 achieved an 80.9 percent score on the SWE-bench Verified benchmark, which evaluates a model’s ability to resolve practical coding tasks. That score places it above recently released systems from other leading AI labs, including Anthropic’s own Sonnet 4.5 and models from Google and OpenAI. Developers involved in early testing also reported that the model shows stronger judgment in multi-step tasks. Several testers said Opus 4.5 is more capable of identifying the core issue in a complex request and structuring its response around what matters operationally.

A key focus of this generation is efficiency. According to Anthropic, Opus 4.5 can reach or exceed the performance of earlier Claude models while using far fewer tokens. Depending on the task, reductions in output volume reached as high as seventy-six percent. To give organisations more control over cost and latency, the company introduced an effort parameter that lets users determine how much computational work the model applies to each request.

Enterprise customers participating in early trials reported measurable gains. Statements from companies in software development, financial modelling, and task automation described improvements in accuracy, lower token consumption, and faster completion of complex assignments. Some organisations testing agent workflows said the system was able to refine its approach over multiple runs, improving its output without modifying its underlying parameters.

Anthropic launched several product updates alongside the model. Claude for Excel is now available to higher-tier plans and includes support for charts, pivot tables, and file uploads. The Chrome extension has been expanded, and the company introduced an infinite chat feature that automatically compresses earlier conversation history, removing traditional context window limitations. Developers also gained access to new programmatic tools, including parallel agent sessions and direct function calling.

The release comes during an intense period of competition across the AI sector, with major firms accelerating release cycles and investing heavily in infrastructure. For organisations, the arrival of lower-cost, higher-accuracy systems could further accelerate the adoption of AI for coding, analysis, and automated operations, though careful validation remains essential before deploying such capabilities in critical environments.



Genesis Mission Launches as US Builds Closed-Loop AI System Linking National Laboratories

 

The United States has announced a major federal scientific initiative known as the Genesis Mission, framed by the administration as a transformational leap forward in how national research will be conducted. Revealed on November 24, 2025, the mission is described by the White House as the most ambitious federal science effort since the Manhattan Project. The accompanying executive order tasks the Department of Energy with creating an interconnected “closed-loop AI experimentation platform” that will join the nation’s supercomputers, 17 national laboratories, and decades of research datasets into one integrated system. 

Federal statements position the initiative as a way to speed scientific breakthroughs in areas such as quantum engineering, fusion, advanced semiconductors, biotechnology, and critical materials. DOE has called the system “the most complex scientific instrument ever built,” describing it as a mechanism designed to double research productivity by linking experiment automation, data processing, and AI models into a single continuous pipeline. The executive order requires DOE to progress rapidly, outlining milestones across the next nine months that include cataloging datasets, mapping computing capacity, and demonstrating early functionality for at least one scientific challenge. 

The Genesis Mission will not operate solely as a federal project. DOE’s launch materials confirm that the platform is being developed alongside a broad coalition of private, academic, nonprofit, cloud, and industrial partners. The roster includes major technology companies such as Microsoft, Google, OpenAI for Government, NVIDIA, AWS, Anthropic, Dell Technologies, IBM, and HPE, alongside aerospace companies, semiconductor firms, and energy providers. Their involvement signals that Genesis is designed not only to modernize public research, but also to serve as part of a broader industrial and national capability. 

However, key details remain unclear. The administration has not provided a cost estimate, funding breakdown, or explanation of how platform access will be structured. Major news organizations have already noted that the order contains no explicit budget allocation, meaning future appropriations or resource repurposing will determine implementation. This absence has sparked debate across the AI research community, particularly among smaller labs and industry observers who worry that the platform could indirectly benefit large frontier-model developers facing high computational costs. 

The order also lays the groundwork for standardized intellectual-property agreements, data governance rules, commercialization pathways, and security requirements—signaling a tightly controlled environment rather than an open-access scientific commons. Certain community reactions highlight how the initiative could reshape debates around open-source AI, public research access, and the balance of federal and private influence in high-performance computing. While its long-term shape is not yet clear, the Genesis Mission marks a pivotal shift in how the United States intends to organize, govern, and accelerate scientific advancement using artificial intelligence and national infrastructure.

RansomHouse Ransomware Hits Fulgar, Key Supplier to H&M and Adidas

 

Fulgar, a major supplier of synthetic yarns to global fashion brands such as H&M, Adidas, Wolford, and Calzedonia, has confirmed it suffered a ransomware attack linked to the notorious RansomHouse group. The attack, which was first noted on RansomHouse’s leak site on November 12, involved the publication of encrypted internal data stolen since October 31. 

Screenshots shared on the leak site displayed sensitive company documents, spreadsheets, communications, and financial records—including bank balances, invoices, and exchanges with external parties. These leaks present a significant risk for targeted phishing attacks, as attackers now possess insider information that can be leveraged to deceive staff and partners.

Fulgar, established in the late 1970s, is one of Europe’s largest spinning mills, producing polyamide 66 and covered elastomers used in hosiery, lingerie, activewear, and technical textiles. The company distributes key brands like Lycra and Elaspan and operates across Italy, Sri Lanka, and Turkey. Its client list includes several of the world’s most recognized fashion retailers. The breach highlights how even large suppliers are vulnerable to cyber threats, especially when a single ransomware group gains access to internal systems.

The RansomHouse group, active since 2021, has claimed more than one hundred victims and is known for encrypting data and demanding ransom payments. US cyber authorities have previously connected the group to Iranian affiliates, who provide encryption support in exchange for a share of the ransom proceeds.

In Fulgar’s case, the attackers issued a direct warning to management: “Dear management of Fulgar S.p.A., we are sure that you are not interested in your confidential data being leaked or sold to a third party. We highly advise you to start resolving that situation.” This underscores the urgency for organizations to respond swiftly to ransomware incidents and mitigate potential reputational and financial damage.

The breach is a stark reminder of the cascading risks posed by compromised supplier networks. Sensitive records exposed in such incidents can fuel targeted identity theft and social engineering attacks, increasing threats for employees and business partners. Experts advise that organizations implement robust cybersecurity measures, including the use of strong antivirus software and properly configured firewalls, to reduce the risk of follow-up intrusions. 

However, even with these precautions, leaked internal documents can still be used to craft highly persuasive phishing campaigns, posing broader risks across manufacturing and supply chain sectors. Overall, the Fulgar breach illustrates the escalating sophistication of ransomware attacks and the critical need for vigilance among global suppliers and their clients to protect sensitive data and prevent further compromise.

Surge in £20k Keyless Car Theft Gadgets Sparks Security Concerns

 


The automotive and security industries have become increasingly aware of the fact that criminals are increasingly using advanced signal-manipulation devices capable of stealing keyless car fobs without entering the property or obtaining the owner's fob, a development that has intensified concerns across the whole industry. 

A variety of specialist tools aimed at copying or amplifying the wireless signal of a key in order to fool a vehicle into believing that an authorized user is nearby have rapidly found their way into organised criminal networks. 

In the report published by the BBC recently, it is noted that some of these devices are openly available for purchase online for sums exceeding a million pounds, which proves both how sophisticated the technology is and how big the illegal market for these devices is. As a result of the increasing accessibility of such equipment, owners of high value, keyless entry vehicles, as well as fleet operators, are more likely to experience targeted thefts.

Despite forthcoming legislation aimed at tightening up controls on who is permitted to possess or operate these devices, security analysts advise that there are already many criminal groups who have gained access to the tools and circulate them throughout their networks. As regulatory changes approach, the threat is largely undiminished. 

Clearly, the proliferation of £20,000 keyless theft devices signals a deeper shift in the methods used to commit vehicle thefts. Using a technology that exploits the vulnerabilities of wireless communication systems that allow cars to start without using a physical key, criminals are able to capture and amplify signals from key fobs, allowing them to unlock and drive away their vehicles with as little effort as possible. 

A key advantage of these machines is that there is only a very low amount of human intervention involved, making them an attractive choice for organised groups seeking efficiency and reducing risk. It is not currently illegal to own such equipment, so an abundance of it remains available online, leaving law enforcement only responding to thefts when the crime occurs rather than curbing its availability at the beginning.

A report by experts cites that this imbalance effectively shifts the constraint on crime prevention to a new location: traditional defenses designed to prevent forced entry or hot-wiring do not provide resistance to remote signal manipulation attacks that are executed by criminals. Instead, the primary challenge is to regulate, restrict, and intercept the tools themselves before criminals are able to take advantage of them. 

Technology-enabled offences are experiencing a broader trend, as automation and remote capabilities are weakening frontline security measures, making authorities more inclined to target upstream supply chains and to intervene legislatively. 

Despite the government's intention to ban such devices, enforcement will continue to trail behind a fast-growing, demand-driven black market unless decisive action is taken at a policy level. There has been an increasing awareness among law enforcement officials and the auto industry of the extent and sophistication of the problem they face. 

Approximately 100,000 vehicles have been stolen over the past year, according to figures from the Office for National Statistics. Insurance companies report that keyless cars now account for 60% to 70% of thefts. A number of people have been exploited through signal-manipulating devices, despite the fact that it is unclear just how many of these devices have been used.

According to evidence gathered by the BBC, these devices range from everyday Bluetooth speakers to military-grade equipment that can block tracking systems after a vehicle has been stolen. Security specialists warn that such tools do not serve any legitimate purpose outside of criminal activity and are now an integral part of a shift away from opportunistic theft into highly organised theft.

The analyst for Thatcham Research, Richard Billyeald, points out that gangs are now stealing to order, recouping their investment by targeting multiple vehicles each week and recouping their investment. According to investigators, the equipment is constantly passed through groups, thereby making it difficult to curb the crime and allowing the networks to operate across state and national borders. 

Criminals often steal from victims in residential areas, intercepting signals quietly as they move through residential areas. Many victims describe thefts that took place in mere minutes. Despite the fact that keyless entry is a convenient feature for motorists, it has also been found to be a lucrative avenue for relay theft as offenders adapt to more advanced vehicle technology, according to industry groups.

It is hoped that the government's Crime and Policing Bill will fill this gap by making possession or distribution of these devices a criminal offence carrying a five-year prison sentence, a substantial shift from previous rules whereby police needed to prove that the equipment was used in a specific crime in order to obtain the warrant. 

Despite keyless technology becoming increasingly prevalent, analysts claim that there is still a structural weakness in current security practices that makes traditional alarms and physical locks less effective against signal-based attacks that are relying on radio signals. Legislative action in this context is just as crucial as technical upgrades; experts have stated that, in other sectors, tighter bans on digital signal interception tools have decreased their circulation and have affected the reach of criminal groups operationally to a great extent. 

The authors state that a similar approach is critical to the automotive industry, where one of the biggest challenges now is not merely to improve vehicle hardware, but also to close the loopholes that allow such devices to be purchased and shared easily rather than to enhance them. There is no doubt that this situation reflects a broader pattern of cybersecurity attacks where adversaries exploit overlooked vulnerabilities to gain disproportionate leverage. 

As a result, authorities have been forced to shift away from addressing incidents to limiting access to the tools themselves that enable the attack. With the criminalization of possessions and distributions of keyless theft devices, the government is attempting to rebalance that leverage by focusing on the upstream supply chains that facilitate high-volume thefts, preventing the spread of these technologies to the public. 

In order to combat technologically driven crime at its source, it is increasingly being seen as essential to implement a multilayered strategy that combines strengthened digital protections with firm legal boundaries. 

Despite the upcoming full enforcement of new laws, experts warn that long-term progress will require coordinated actions between manufacturers, legislators, insurers, and consumers as the industry awaits the full implementation of new legislation. In order to narrow the window of criminal opportunity, it is seen as essential to strengthen encryption standards, to improve tracker resilience, and to accelerate over-the-air security updates. 

Meanwhile, insurance companies and the police emphasize the importance of community reporting, secure parking habits, and signal-blocking storage of key fobs. Although legislation may be able to restrict access to illicit devices to some extent, the extent to which the UK will be able to combat this ever-evolving threat will ultimately depend upon sustained investment in smarter vehicle design as well as public awareness.

Featured