<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:media="http://search.yahoo.com/mrss/" >
    <channel>
        <title>Biz &amp; IT - Ars Technica</title>
        <atom:link href="https://arstechnica.com/information-technology/feed/" rel="self" type="application/rss+xml" />
        <link>https://arstechnica.com</link>
        <description>Serving the Technologist since 1998. News, reviews, and analysis.</description>
        <lastBuildDate>Wed, 15 Apr 2026 13:39:59 +0000</lastBuildDate>
        <language>en-US</language>
        <sy:updatePeriod>
            hourly        </sy:updatePeriod>
        <sy:updateFrequency>
            1        </sy:updateFrequency>
        
<image>
	<url>https://cdn.arstechnica.net/wp-content/uploads/2016/10/cropped-ars-logo-512_480-60x60.png</url>
	<title>Biz &amp; IT - Ars Technica</title>
	<link>https://arstechnica.com</link>
	<width>32</width>
	<height>32</height>
</image> 
            <item>
                <title>“Negative” views of Broadcom driving thousands of VMware migrations, rival says</title>
                <link>https://arstechnica.com/information-technology/2026/04/nutanix-claims-it-has-poached-30000-vmware-customers/</link>
                                    <comments>https://arstechnica.com/information-technology/2026/04/nutanix-claims-it-has-poached-30000-vmware-customers/#comments</comments>
                
                <dc:creator>
                    <![CDATA[Scharon Harding]]>
                </dc:creator>
                <pubDate>Thu, 09 Apr 2026 19:44:31 +0000</pubDate>
                		<category><![CDATA[Biz & IT]]></category>
		<category><![CDATA[acquisitions]]></category>
		<category><![CDATA[Broadcom]]></category>
		<category><![CDATA[mergers]]></category>
		<category><![CDATA[vmware]]></category>
                <guid isPermaLink="true">https://arstechnica.com/information-technology/2026/04/nutanix-claims-it-has-poached-30000-vmware-customers/</guid>

                                    <description>
                        <![CDATA[Western Union exec says there were "challenges" working with Broadcom. ]]>
                    </description>
                                                                <content:encoded>
                            <![CDATA[<p>Amid customer dissatisfaction around Broadcom's VMware takeover, rivals have been trying to lure customers from the leading virtualization firm. One of VMware's biggest competitors, Nutanix, claims to have swiped tens of thousands of VMware customers.</p>
<p>Speaking at a press briefing at Nutanix’s .NEXT conference in Chicago this week, CEO Rajiv Ramaswami said that Nutanix has “about 30,000 customers,” with many of them coming from VMwarey, <a href="https://www.sdxcentral.com/news/nutanix-ceo-targets-majority-of-vmwares-customer-base/">SDxCentral</a>, a London-based IT publication, reported today. A Nutanix spokesperson confirmed to Ars Technica that "thousands" of customers have migrated from VMware to the rival platform but didn't specify an exact number.</p>
<p>At the event, Ramaswami pointed to customer disapproval over Broadcom’s VMware strategy.</p><p><a href="https://arstechnica.com/information-technology/2026/04/nutanix-claims-it-has-poached-30000-vmware-customers/">Read full article</a></p>
<p><a href="https://arstechnica.com/information-technology/2026/04/nutanix-claims-it-has-poached-30000-vmware-customers/#comments">Comments</a></p>
]]>
                        </content:encoded>
                                    
                                    <slash:comments>97</slash:comments>
                
                
                <media:content url="https://cdn.arstechnica.net/wp-content/uploads/2026/04/GettyImages-1934095718-1152x648.jpg" type="image/jpeg" medium="image" width="1152" height="648">
<media:thumbnail url="https://cdn.arstechnica.net/wp-content/uploads/2026/04/GettyImages-1934095718-500x500.jpg" width="500" height="500" />
<media:credit>Getty</media:credit><media:text>VMware office in Bellevue, Washington, USA - June 15, 2023. </media:text></media:content>
            </item>
                    <item>
                <title>Iran-linked hackers disrupt operations at US critical infrastructure sites</title>
                <link>https://arstechnica.com/security/2026/04/iran-linked-hackers-disrupt-operations-at-us-critical-infrastructure-sites/</link>
                                    <comments>https://arstechnica.com/security/2026/04/iran-linked-hackers-disrupt-operations-at-us-critical-infrastructure-sites/#comments</comments>
                
                <dc:creator>
                    <![CDATA[Dan Goodin]]>
                </dc:creator>
                <pubDate>Wed, 08 Apr 2026 20:49:11 +0000</pubDate>
                		<category><![CDATA[Biz & IT]]></category>
		<category><![CDATA[Policy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[PLCs]]></category>
		<category><![CDATA[Programmable logic controllers]]></category>
                <guid isPermaLink="true">https://arstechnica.com/security/2026/04/iran-linked-hackers-disrupt-operations-at-us-critical-infrastructure-sites/</guid>

                                    <description>
                        <![CDATA[As the US and Israel's war has ramped up, so too have hacks on US industrial sites.]]>
                    </description>
                                                                <content:encoded>
                            <![CDATA[<p>Hackers working on behalf of the Iranian government are disrupting operations at multiple US critical infrastructure sites, likely in response to the country's ongoing war with the US, a half-dozen government agencies are warning.</p>
<p>In an advisory published Tuesday, the FBI, Cybersecurity and Infrastructure Security Agency, National Security Agency, Environmental Protection Agency, Department of Energy, and US Cyber Command “urgently" warned that the APT, or advanced persistent threat group, is targeting PLCs, short for programmable logic controllers. These devices, typically the size of a toaster, sit in factories, water treatment centers, oil refineries, and other industrial settings, often in remote locations. They provide an interface between computers used for automation and physical machinery.</p>
<h2>Operational disruption and financial loss</h2>
<p>“Since at least March 2026, the authoring agencies identified (through engagements with victim organizations) an Iranian-affiliated APT-group that disrupted the function of PLCs,” the <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa26-097a">advisory</a> stated. “These PLCs were deployed across multiple US critical infrastructure sectors (including Government Services and Facilities, Waste Water Systems (WWS), and Energy sectors) within a wide variety of industrial automation processes. Some of the victims experienced operational disruption and financial loss.”</p><p><a href="https://arstechnica.com/security/2026/04/iran-linked-hackers-disrupt-operations-at-us-critical-infrastructure-sites/">Read full article</a></p>
<p><a href="https://arstechnica.com/security/2026/04/iran-linked-hackers-disrupt-operations-at-us-critical-infrastructure-sites/#comments">Comments</a></p>
]]>
                        </content:encoded>
                                    
                                    <slash:comments>90</slash:comments>
                
                
                <media:content url="https://cdn.arstechnica.net/wp-content/uploads/2026/03/iranhax-1152x648.jpg" type="image/jpeg" medium="image" width="1152" height="648">
<media:thumbnail url="https://cdn.arstechnica.net/wp-content/uploads/2026/03/iranhax-500x500.jpg" width="500" height="500" />
<media:credit>mirsad sarajlic/Getty</media:credit></media:content>
            </item>
                    <item>
                <title>Thousands of consumer routers hacked by Russia&#039;s military</title>
                <link>https://arstechnica.com/security/2026/04/russias-military-hacks-thousands-of-consumer-routers-to-steal-credentials/</link>
                                    <comments>https://arstechnica.com/security/2026/04/russias-military-hacks-thousands-of-consumer-routers-to-steal-credentials/#comments</comments>
                
                <dc:creator>
                    <![CDATA[Dan Goodin]]>
                </dc:creator>
                <pubDate>Wed, 08 Apr 2026 11:00:08 +0000</pubDate>
                		<category><![CDATA[Biz & IT]]></category>
		<category><![CDATA[Policy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[credentials]]></category>
		<category><![CDATA[DNS]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[routers]]></category>
                <guid isPermaLink="true">https://arstechnica.com/security/2026/04/russias-military-hacks-thousands-of-consumer-routers-to-steal-credentials/</guid>

                                    <description>
                        <![CDATA[End-of-life routers in homes and small offices hacked in 120 countries.]]>
                    </description>
                                                                <content:encoded>
                            <![CDATA[<p>The Russian military is once again hacking home and small office routers in widespread operations that send unwitting users to sites that harvest passwords and credential tokens for use in espionage campaigns, researchers said Tuesday.</p>
<p>An estimated 18,000 to 40,000 consumer routers, mostly those made by MikroTik and TP-Link, located in 120 countries, were wrangled into infrastructure belonging to APT28, an advanced threat group that’s part of Russia’s military intelligence agency known as the GRU, researchers from Lumen Technologies' Black Lotus Labs <a href="https://www.lumen.com/blog-and-news/en-us/frostarmada-forest-blizzard-dns-hijacking">said</a>. The threat group has operated for at least two decades and is behind dozens of high-profile hacks targeting governments worldwide. APT28 is also tracked under names including Pawn Storm, Sofacy Group, Sednit, Tsar Team, Forest Blizzard, and STRONTIUM.</p>
<h2>Technical sophistication, tried-and-true techniques</h2>
<p>A small number of routers were used as proxies to connect to a much larger number of other routers belonging to foreign ministries, law enforcement, and government agencies that APT28 wanted to spy on. The group then used its control of routers to change DNS lookups for select websites, including, Microsoft <a href="https://www.microsoft.com/en-us/security/blog/2026/04/07/soho-router-compromise-leads-to-dns-hijacking-and-adversary-in-the-middle-attacks/">said</a>, domains for the company’s 365 service.</p><p><a href="https://arstechnica.com/security/2026/04/russias-military-hacks-thousands-of-consumer-routers-to-steal-credentials/">Read full article</a></p>
<p><a href="https://arstechnica.com/security/2026/04/russias-military-hacks-thousands-of-consumer-routers-to-steal-credentials/#comments">Comments</a></p>
]]>
                        </content:encoded>
                                    
                                    <slash:comments>100</slash:comments>
                
                
                <media:content url="https://cdn.arstechnica.net/wp-content/uploads/2022/04/russia-cyber-hack-1000x648.jpeg" type="image/jpeg" medium="image" width="1000" height="648">
<media:thumbnail url="https://cdn.arstechnica.net/wp-content/uploads/2022/04/russia-cyber-hack-500x500.jpeg" width="500" height="500" />
<media:credit>Getty Images</media:credit></media:content>
            </item>
                    <item>
                <title>OpenClaw gives users yet another reason to be freaked out about security</title>
                <link>https://arstechnica.com/security/2026/04/heres-why-its-prudent-for-openclaw-users-to-assume-compromise/</link>
                                    <comments>https://arstechnica.com/security/2026/04/heres-why-its-prudent-for-openclaw-users-to-assume-compromise/#comments</comments>
                
                <dc:creator>
                    <![CDATA[Dan Goodin]]>
                </dc:creator>
                <pubDate>Fri, 03 Apr 2026 20:30:15 +0000</pubDate>
                		<category><![CDATA[AI]]></category>
		<category><![CDATA[Biz & IT]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[agentic AI]]></category>
		<category><![CDATA[OpenClaw]]></category>
		<category><![CDATA[privilege escalation]]></category>
                <guid isPermaLink="true">https://arstechnica.com/security/2026/04/heres-why-its-prudent-for-openclaw-users-to-assume-compromise/</guid>

                                    <description>
                        <![CDATA[The viral AI agentic tool let attackers silently gain admin unauthenticated access.]]>
                    </description>
                                                                <content:encoded>
                            <![CDATA[<p>For more than a month, security practitioners have been warning about the perils of using OpenClaw, the viral AI agentic tool that has taken the development community by storm. A recently fixed vulnerability provides an object lesson for why.</p>
<p>OpenClaw, which was introduced in November and now boasts <a href="https://github.com/openclaw/openclaw">347,000 stars</a> on Github, by design takes control of a user’s computer and interacts with other apps and platforms to assist with a host of tasks, including organizing files, doing research, and shopping online. To be useful, it needs access—and lots of it—to as many resources as possible. Telegram, Discord, Slack, local and shared network files, accounts, and logged in sessions are only some of the intended resources. Once the access is given, OpenClaw is designed to act precisely as the user would, with the same broad permissions and capabilities.</p>
<h2>Severe impact</h2>
<p>Earlier this week, OpenClaw developers released security patches for three high-severity vulnerabilities. The severity rating of one in particular, <a href="https://www.cvedetails.com/cve/CVE-2026-33579/">CVE-2026-33579</a>, is rated from 8.1 to 9.8 out of a possible 10 depending on the metric used—and for good reason. It allows anyone with pairing privileges (the lowest-level permission) to gain administrative status. With that, the attacker has control of whatever resources the OpenClaw instance does.</p><p><a href="https://arstechnica.com/security/2026/04/heres-why-its-prudent-for-openclaw-users-to-assume-compromise/">Read full article</a></p>
<p><a href="https://arstechnica.com/security/2026/04/heres-why-its-prudent-for-openclaw-users-to-assume-compromise/#comments">Comments</a></p>
]]>
                        </content:encoded>
                                    
                                    <slash:comments>85</slash:comments>
                
                
                <media:content url="https://cdn.arstechnica.net/wp-content/uploads/2026/02/bluecrayfish-1152x648.jpg" type="image/jpeg" medium="image" width="1152" height="648">
<media:thumbnail url="https://cdn.arstechnica.net/wp-content/uploads/2026/02/bluecrayfish-500x500.jpg" width="500" height="500" />
<media:credit>Carmen Vlasceanu via Getty</media:credit></media:content>
            </item>
                    <item>
                <title>New Rowhammer attacks give complete control of machines running Nvidia GPUs</title>
                <link>https://arstechnica.com/security/2026/04/new-rowhammer-attacks-give-complete-control-of-machines-running-nvidia-gpus/</link>
                                    <comments>https://arstechnica.com/security/2026/04/new-rowhammer-attacks-give-complete-control-of-machines-running-nvidia-gpus/#comments</comments>
                
                <dc:creator>
                    <![CDATA[Dan Goodin]]>
                </dc:creator>
                <pubDate>Thu, 02 Apr 2026 17:00:11 +0000</pubDate>
                		<category><![CDATA[Biz & IT]]></category>
		<category><![CDATA[Features]]></category>
		<category><![CDATA[Security]]></category>
                <guid isPermaLink="true">https://arstechnica.com/security/2026/04/new-rowhammer-attacks-give-complete-control-of-machines-running-nvidia-gpus/</guid>

                                    <description>
                        <![CDATA[GDDRHammer, GeForge and GPUBreach hammer GPU memory in ways that hijack the CPU.]]>
                    </description>
                                                                <content:encoded>
                            <![CDATA[<p>The cost of high-performance GPUs, typically $8,000 or more, means they are frequently shared among dozens of users in cloud environments. Three new attacks demonstrate how a malicious user can gain full root control of a host machine by performing novel Rowhammer attacks on high-performance GPU cards made by Nvidia.</p>
<p>The attacks exploit memory hardware’s increasing susceptibility to bit flips, in which 0s stored in memory switch to 1s and vice versa. In <a href="https://users.ece.cmu.edu/~yoonguk/papers/kim-isca14.pdf">2014</a>, researchers first demonstrated that repeated, rapid access—or “hammering”—of memory hardware known as <a href="https://en.wikipedia.org/wiki/Dynamic_random-access_memory">DRAM</a> creates electrical disturbances that flip bits. A <a href="https://arstechnica.com/information-technology/2015/03/cutting-edge-hack-gives-super-user-status-by-exploiting-dram-weakness/">year later</a>, a different research team showed that by targeting specific DRAM rows storing sensitive data, an attacker could exploit the phenomenon to escalate an unprivileged user to root or evade security sandbox protections. Both attacks targeted DDR3 generations of DRAM.</p>
<h2>From CPU to GPU: Rowhammer's decade-long journey</h2>
<p>Over the past decade, dozens of newer Rowhammer attacks have evolved to, among other things:</p><p><a href="https://arstechnica.com/security/2026/04/new-rowhammer-attacks-give-complete-control-of-machines-running-nvidia-gpus/">Read full article</a></p>
<p><a href="https://arstechnica.com/security/2026/04/new-rowhammer-attacks-give-complete-control-of-machines-running-nvidia-gpus/#comments">Comments</a></p>
]]>
                        </content:encoded>
                                    
                                    <slash:comments>48</slash:comments>
                
                
                <media:content url="https://cdn.arstechnica.net/wp-content/uploads/2023/07/exploit-vulnerability-security.jpg" type="image/jpeg" medium="image">
<media:thumbnail url="https://cdn.arstechnica.net/wp-content/uploads/2023/07/exploit-vulnerability-security-500x500.jpg" width="500" height="500" />
<media:credit>Getty Images</media:credit></media:content>
            </item>
                    <item>
                <title>Quantum computers need vastly fewer resources than thought to break vital encryption</title>
                <link>https://arstechnica.com/security/2026/03/new-quantum-computing-advances-heighten-threat-to-elliptic-curve-cryptosystems/</link>
                                    <comments>https://arstechnica.com/security/2026/03/new-quantum-computing-advances-heighten-threat-to-elliptic-curve-cryptosystems/#comments</comments>
                
                <dc:creator>
                    <![CDATA[Dan Goodin]]>
                </dc:creator>
                <pubDate>Tue, 31 Mar 2026 18:25:33 +0000</pubDate>
                		<category><![CDATA[Biz & IT]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[elliptic curve cryptography]]></category>
		<category><![CDATA[neutral atoms]]></category>
		<category><![CDATA[quantum computing]]></category>
                <guid isPermaLink="true">https://arstechnica.com/security/2026/03/new-quantum-computing-advances-heighten-threat-to-elliptic-curve-cryptosystems/</guid>

                                    <description>
                        <![CDATA[No, the sky isn't falling, but Q Day <em>is</em> coming, and it won't be as expensive as thought.]]>
                    </description>
                                                                <content:encoded>
                            <![CDATA[<p>Building a utility-scale quantum computer that can crack one of the most vital cryptosystems—elliptic curves—doesn’t require nearly the resources anticipated just a year or two ago, two independently written whitepapers have concluded. In one, researchers demonstrated the use of neutral atoms as reconfigurable qubits that have free access to each other. They went on to show this approach could allow a quantum computer to break 256-bit elliptic-curve cryptography (ECC) in 10 days while using 100 times less overhead than previously estimated. In a second paper, Google researchers demonstrated how to break ECC-securing blockchains for bitcoin and other cryptocurrencies in less than nine minutes while achieving a 20-fold resource reduction.</p>
<p>Taken together, the papers are the latest sign that cryptographically relevant quantum computing (CRQC) at utility-scale is making meaningful progress. The advances are largely being driven by new quantum architectures developed by physicists and computer scientists in a push to create quantum computers that operate correctly even in the presence of errors that occur whenever qubits—the quantum analog to classical computing bits—interact with their environment. The other key drivers are ever-more efficient algorithms to supercharge Shor’s algorithm, the 1994 series of equations proving that quantum computing could break the ECC and RSA cryptosystems in polynomial time, specifically <a href="https://en.wikipedia.org/wiki/Time_complexity">cubic time</a>, far faster than the exponential time provided by today’s classical computers.</p>
<p>Neither paper has been peer-reviewed.</p><p><a href="https://arstechnica.com/security/2026/03/new-quantum-computing-advances-heighten-threat-to-elliptic-curve-cryptosystems/">Read full article</a></p>
<p><a href="https://arstechnica.com/security/2026/03/new-quantum-computing-advances-heighten-threat-to-elliptic-curve-cryptosystems/#comments">Comments</a></p>
]]>
                        </content:encoded>
                                    
                                    <slash:comments>39</slash:comments>
                
                
                <media:content url="https://cdn.arstechnica.net/wp-content/uploads/2024/03/GettyImages-1070527780-1152x648.jpg" type="image/jpeg" medium="image" width="1152" height="648">
<media:thumbnail url="https://cdn.arstechnica.net/wp-content/uploads/2024/03/GettyImages-1070527780-500x500.jpg" width="500" height="500" />
<media:credit>vital</media:credit></media:content>
            </item>
                    <item>
                <title>Google bumps up Q Day deadline to 2029, far sooner than previously thought</title>
                <link>https://arstechnica.com/security/2026/03/google-bumps-up-q-day-estimate-to-2029-far-sooner-than-previously-thought/</link>
                                    <comments>https://arstechnica.com/security/2026/03/google-bumps-up-q-day-estimate-to-2029-far-sooner-than-previously-thought/#comments</comments>
                
                <dc:creator>
                    <![CDATA[Dan Goodin]]>
                </dc:creator>
                <pubDate>Wed, 25 Mar 2026 15:49:17 +0000</pubDate>
                		<category><![CDATA[Biz & IT]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[post quantum cryptography]]></category>
		<category><![CDATA[quantum computing]]></category>
                <guid isPermaLink="true">https://arstechnica.com/security/2026/03/google-bumps-up-q-day-estimate-to-2029-far-sooner-than-previously-thought/</guid>

                                    <description>
                        <![CDATA[Company warns entire industry to move off RSA and EC more quickly.]]>
                    </description>
                                                                <content:encoded>
                            <![CDATA[<p>Google is dramatically shortening its readiness deadline for the arrival of Q Day, the point at which existing quantum computers can break public-key cryptography algorithms that secure decades' worth of secrets belonging to militaries, banks, governments, and nearly every individual on earth.</p>
<p>In a <a href="https://blog.google/innovation-and-ai/technology/safety-security/cryptography-migration-timeline/">post</a> published on Wednesday, Google said it is giving itself until 2029 to prepare for this event. The post went on to warn that the rest of the world needs to follow suit by adopting PQC—short for post-quantum cryptography—algorithms to augment or replace elliptic curves and RSA, both of which will be broken.</p>
<h2>The end is nigh</h2>
<p>“As a pioneer in both quantum and PQC, it’s our responsibility to lead by example and share an ambitious timeline,” wrote Heather Adkins, Google’s VP of security engineering, and Sophie Schmieg, a senior cryptography engineer. “By doing this, we hope to provide the clarity and urgency needed to accelerate digital transitions not only for Google, but also across the industry.”</p><p><a href="https://arstechnica.com/security/2026/03/google-bumps-up-q-day-estimate-to-2029-far-sooner-than-previously-thought/">Read full article</a></p>
<p><a href="https://arstechnica.com/security/2026/03/google-bumps-up-q-day-estimate-to-2029-far-sooner-than-previously-thought/#comments">Comments</a></p>
]]>
                        </content:encoded>
                                    
                                    <slash:comments>51</slash:comments>
                
                
                <media:content url="https://cdn.arstechnica.net/wp-content/uploads/2025/07/GettyImages-1952157610-1152x648-1753386930.jpg" type="image/jpeg" medium="image" width="1152" height="648">
<media:thumbnail url="https://cdn.arstechnica.net/wp-content/uploads/2025/07/GettyImages-1952157610-500x500-1753386908.jpg" width="500" height="500" />
<media:credit>JuSun/Getty Images</media:credit></media:content>
            </item>
                    <item>
                <title>Self-propagating malware poisons open source software and wipes Iran-based machines</title>
                <link>https://arstechnica.com/security/2026/03/self-propagating-malware-poisons-open-source-software-and-wipes-iran-based-machines/</link>
                                    <comments>https://arstechnica.com/security/2026/03/self-propagating-malware-poisons-open-source-software-and-wipes-iran-based-machines/#comments</comments>
                
                <dc:creator>
                    <![CDATA[Dan Goodin]]>
                </dc:creator>
                <pubDate>Tue, 24 Mar 2026 12:38:09 +0000</pubDate>
                		<category><![CDATA[Biz & IT]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[teampcp]]></category>
		<category><![CDATA[worm]]></category>
                <guid isPermaLink="true">https://arstechnica.com/security/2026/03/self-propagating-malware-poisons-open-source-software-and-wipes-iran-based-machines/</guid>

                                    <description>
                        <![CDATA[Development houses: It's time to check your networks for infections.]]>
                    </description>
                                                                <content:encoded>
                            <![CDATA[<p>A new hacking group has been rampaging the Internet in a persistent campaign that spreads a self-propagating and never-before-seen backdoor—and curiously a data wiper that targets Iranian machines.</p>
<p>The group, tracked under the name TeamPCP, first gained visibility in December, when researchers from security firm Flare <a href="https://flare.io/learn/resources/blog/">observed </a> it unleashing a worm that targeted cloud-hosted platforms that weren’t properly secured. The objective was to build a distributed proxy and scanning infrastructure and then use it to compromise servers for exfiltrating data, deploying ransomware, conducting extortion, and mining cryptocurrency. The group is notable for its skill in large-scale automation and integration of well-known attack techniques.</p>
<h2>Relentless and constantly evolving</h2>
<p>More recently, TeamPCP has waged a relentless campaign that uses continuously evolving malware to bring ever more systems under its control. Late last week, it <a href="https://arstechnica.com/security/2026/03/widely-used-trivy-scanner-compromised-in-ongoing-supply-chain-attack/">compromised</a> virtually all versions of the widely used Trivy vulnerability scanner in a supply-chain attack after gaining privileged access to the GitHub account of Aqua Security, the Trivy creator.</p><p><a href="https://arstechnica.com/security/2026/03/self-propagating-malware-poisons-open-source-software-and-wipes-iran-based-machines/">Read full article</a></p>
<p><a href="https://arstechnica.com/security/2026/03/self-propagating-malware-poisons-open-source-software-and-wipes-iran-based-machines/#comments">Comments</a></p>
]]>
                        </content:encoded>
                                    
                                    <slash:comments>51</slash:comments>
                
                
                <media:content url="https://cdn.arstechnica.net/wp-content/uploads/2025/05/malware-threat-1000x648.jpg" type="image/jpeg" medium="image" width="1000" height="648">
<media:thumbnail url="https://cdn.arstechnica.net/wp-content/uploads/2025/05/malware-threat-500x500.jpg" width="500" height="500" />
<media:credit>Getty Images</media:credit></media:content>
            </item>
                    <item>
                <title>Widely used Trivy scanner compromised in ongoing supply-chain attack</title>
                <link>https://arstechnica.com/security/2026/03/widely-used-trivy-scanner-compromised-in-ongoing-supply-chain-attack/</link>
                                    <comments>https://arstechnica.com/security/2026/03/widely-used-trivy-scanner-compromised-in-ongoing-supply-chain-attack/#comments</comments>
                
                <dc:creator>
                    <![CDATA[Dan Goodin]]>
                </dc:creator>
                <pubDate>Fri, 20 Mar 2026 20:50:46 +0000</pubDate>
                		<category><![CDATA[Biz & IT]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[GitHub]]></category>
		<category><![CDATA[info stealers]]></category>
		<category><![CDATA[supply chain attacks]]></category>
		<category><![CDATA[trivy]]></category>
                <guid isPermaLink="true">https://arstechnica.com/security/2026/03/widely-used-trivy-scanner-compromised-in-ongoing-supply-chain-attack/</guid>

                                    <description>
                        <![CDATA[Admins: Sorry to say, but it's likely a rotate-your-secrets kind of weekend.]]>
                    </description>
                                                                <content:encoded>
                            <![CDATA[<p>Hackers have compromised virtually all versions of Aqua Security’s widely used Trivy vulnerability scanner in an ongoing supply chain attack that could have wide-ranging consequences for developers and the organizations that use them.</p>
<p>Trivy maintainer Itay Shakury <a href="https://github.com/aquasecurity/trivy/discussions/10425">confirmed</a> the compromise on Friday, following rumors and a <a href="https://web.archive.org/web/20260307200451/https://github.com/aquasecurity/trivy/discussions/10265#discussioncomment-16214191%20MO">thread</a>, since deleted by the attackers, discussing the incident. The attack began in the early hours of Thursday. When it was done, the threat actor had used stolen credentials to force-push all but one of the trivy-action tags and seven setup-trivy tags to use malicious dependencies.</p>
<h2>Assume your pipelines are compromised</h2>
<p>A <a href="https://www.git-tower.com/blog/force-push-in-git">forced</a> <a href="https://www.git-tower.com/learn/git/faq/git-force-push/">push</a> is a git command that overrides a default safety mechanism that protects against overwriting existing commits. Trivy is a vulnerability scanner that developers use to detect vulnerabilities and inadvertently hardcoded authentication secrets in pipelines for developing and deploying software updates. The scanner has 33,200 stars on GitHub, a high rating that indicates it’s used widely.</p><p><a href="https://arstechnica.com/security/2026/03/widely-used-trivy-scanner-compromised-in-ongoing-supply-chain-attack/">Read full article</a></p>
<p><a href="https://arstechnica.com/security/2026/03/widely-used-trivy-scanner-compromised-in-ongoing-supply-chain-attack/#comments">Comments</a></p>
]]>
                        </content:encoded>
                                    
                                    <slash:comments>30</slash:comments>
                
                
                <media:content url="https://cdn.arstechnica.net/wp-content/uploads/2020/10/malware-1000x648.jpg" type="image/jpeg" medium="image" width="1000" height="648">
<media:thumbnail url="https://cdn.arstechnica.net/wp-content/uploads/2020/10/malware-500x500.jpg" width="500" height="500" />
<media:credit>Getty Images</media:credit></media:content>
            </item>
                    <item>
                <title>Cloud service providers ask EU regulator to reinstate VMware partner program</title>
                <link>https://arstechnica.com/information-technology/2026/03/cloud-service-providers-ask-eu-regulator-to-reinstate-vmware-partner-program/</link>
                                    <comments>https://arstechnica.com/information-technology/2026/03/cloud-service-providers-ask-eu-regulator-to-reinstate-vmware-partner-program/#comments</comments>
                
                <dc:creator>
                    <![CDATA[Scharon Harding]]>
                </dc:creator>
                <pubDate>Thu, 19 Mar 2026 21:29:53 +0000</pubDate>
                		<category><![CDATA[Biz & IT]]></category>
		<category><![CDATA[acquisitions]]></category>
		<category><![CDATA[antitrust]]></category>
		<category><![CDATA[Broadcom]]></category>
		<category><![CDATA[europe]]></category>
		<category><![CDATA[mergers]]></category>
		<category><![CDATA[vmware]]></category>
                <guid isPermaLink="true">https://arstechnica.com/information-technology/2026/03/cloud-service-providers-ask-eu-regulator-to-reinstate-vmware-partner-program/</guid>

                                    <description>
                        <![CDATA[Broadcom says the group is misrepresenting market "realities." ]]>
                    </description>
                                                                <content:encoded>
                            <![CDATA[<p>A trade association of cloud service providers (CSPs) filed an antitrust complaint today with the European Union’s European Commission (EC) over Broadcom's shuttering of VMware’s CSP partner program this year.</p>
<p>Since Broadcom bought VMware, it has drastically cut the number of channel partners VMware works with, a shift that began with the elimination of <a href="https://arstechnica.com/information-technology/2024/01/broadcom-killing-vmware-partner-program-could-disrupt-thousands-of-businesses/">VMware’s partner program</a>. Broadcom replaced the program with an <a href="https://arstechnica.com/information-technology/2025/07/more-vmware-cloud-partners-axed-as-broadcom-launches-new-invite-only-program/">invite-only alternative</a> that favors larger partners working with enterprise-size clients <a href="https://arstechnica.com/information-technology/2025/06/broadcom-ends-business-with-vmwares-lowest-tier-channel-partners/">rather than small-to-medium-size businesses</a>.</p>
<p>There are even fewer CSP partners working with VMware today. Broadcom introduced a requirement that CSP partners operate at least 3,500 cores, rendering hundreds of CSPs ineligible for partnership. Before Broadcom bought VMware, the virtualization company had over 4,000 CSP partners, per a February 2024 report from <a href="https://www.theregister.com/2024/02/13/broadcom_ends_free_esxi_vsphere/">The Register</a>. Today, VMware reportedly has 19 CSP partners in the US and about nine in the United Kingdom, <a href="https://www.theregister.com/2026/03/19/cispe_eu_complaint_vmware_vcsp_closure/">The Register</a> reported.</p><p><a href="https://arstechnica.com/information-technology/2026/03/cloud-service-providers-ask-eu-regulator-to-reinstate-vmware-partner-program/">Read full article</a></p>
<p><a href="https://arstechnica.com/information-technology/2026/03/cloud-service-providers-ask-eu-regulator-to-reinstate-vmware-partner-program/#comments">Comments</a></p>
]]>
                        </content:encoded>
                                    
                                    <slash:comments>45</slash:comments>
                
                
                <media:content url="https://cdn.arstechnica.net/wp-content/uploads/2026/03/GettyImages-2238913761-1024x648.jpg" type="image/jpeg" medium="image" width="1024" height="648">
<media:thumbnail url="https://cdn.arstechnica.net/wp-content/uploads/2026/03/GettyImages-2238913761-500x500-1773952643.jpg" width="500" height="500" />
<media:credit>Michael Nguyen/NurPhoto via Getty Images</media:credit><media:text>The Broadcom office building with the company logo is in Regensburg, Bavaria, Upper Palatinate, Germany, on October 4, 2025. </media:text></media:content>
            </item>
                    <item>
                <title>Federal cyber experts called Microsoft&#039;s cloud a &quot;pile of shit,&quot; approved it anyway</title>
                <link>https://arstechnica.com/information-technology/2026/03/federal-cyber-experts-called-microsofts-cloud-a-pile-of-shit-approved-it-anyway/</link>
                                    <comments>https://arstechnica.com/information-technology/2026/03/federal-cyber-experts-called-microsofts-cloud-a-pile-of-shit-approved-it-anyway/#comments</comments>
                
                <dc:creator>
                    <![CDATA[Renee Dudley, with research by Doris Burke, ProPublica.org]]>
                </dc:creator>
                <pubDate>Wed, 18 Mar 2026 17:36:40 +0000</pubDate>
                		<category><![CDATA[Biz & IT]]></category>
		<category><![CDATA[microsoft]]></category>
		<category><![CDATA[Propublica]]></category>
		<category><![CDATA[syndication]]></category>
                <guid isPermaLink="true">https://arstechnica.com/information-technology/2026/03/federal-cyber-experts-called-microsofts-cloud-a-pile-of-shit-approved-it-anyway/</guid>

                                    <description>
                        <![CDATA[One Microsoft product was approved despite years of concerns about its security.]]>
                    </description>
                                                                <content:encoded>
                            <![CDATA[<p>In late 2024, the federal government’s cybersecurity evaluators rendered a troubling verdict on one of Microsoft’s biggest cloud computing offerings.</p>
<p>The tech giant’s “lack of proper detailed security documentation” left reviewers with a “lack of confidence in assessing the system’s overall security posture,” according to an internal government report reviewed by ProPublica.</p>
<p>Or, as one member of the team put it: “The package is a pile of shit.”</p><p><a href="https://arstechnica.com/information-technology/2026/03/federal-cyber-experts-called-microsofts-cloud-a-pile-of-shit-approved-it-anyway/">Read full article</a></p>
<p><a href="https://arstechnica.com/information-technology/2026/03/federal-cyber-experts-called-microsofts-cloud-a-pile-of-shit-approved-it-anyway/#comments">Comments</a></p>
]]>
                        </content:encoded>
                                    
                                    <slash:comments>97</slash:comments>
                
                
                <media:content url="https://cdn.arstechnica.net/wp-content/uploads/2025/09/microsoft-logo-1024x648.jpg" type="image/jpeg" medium="image" width="1024" height="648">
<media:thumbnail url="https://cdn.arstechnica.net/wp-content/uploads/2025/09/microsoft-logo-500x500.jpg" width="500" height="500" />
<media:credit>Getty Images</media:credit></media:content>
            </item>
                    <item>
                <title>Researchers disclose vulnerabilities in IP KVMs from four manufacturers</title>
                <link>https://arstechnica.com/security/2026/03/researchers-disclose-vulnerabilities-in-ip-kvms-from-4-manufacturers/</link>
                                    <comments>https://arstechnica.com/security/2026/03/researchers-disclose-vulnerabilities-in-ip-kvms-from-4-manufacturers/#comments</comments>
                
                <dc:creator>
                    <![CDATA[Dan Goodin]]>
                </dc:creator>
                <pubDate>Tue, 17 Mar 2026 17:07:12 +0000</pubDate>
                		<category><![CDATA[Biz & IT]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[ip kvms]]></category>
		<category><![CDATA[networks]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[vulnerabilities]]></category>
                <guid isPermaLink="true">https://arstechnica.com/security/2026/03/researchers-disclose-vulnerabilities-in-ip-kvms-from-4-manufacturers/</guid>

                                    <description>
                        <![CDATA[Internet-exposed devices that give BIOS-level access? What could possibly go wrong?]]>
                    </description>
                                                                <content:encoded>
                            <![CDATA[<p>Researchers are warning about the risks posed by a low-cost device that can give insiders and hackers unusually broad powers in compromising networks.</p>
<p>The devices, which typically sell for $30 to $100, are known as IP KVMs. Administrators often use them to remotely access machines on networks. The devices, not much bigger than a deck of cards, allow the machines to be accessed at the BIOS/UEFI level, the firmware that runs before the loading of the operating system.</p>
<p>This provides power and convenience to admins, but in the wrong hands, the capabilities can often torpedo what might otherwise be a secure network. Risks are posed when the devices—which are exposed to the Internet—are deployed with weak security configurations or surreptitiously connected to by insiders. Firmware vulnerabilities also leave them open to remote takeover.</p><p><a href="https://arstechnica.com/security/2026/03/researchers-disclose-vulnerabilities-in-ip-kvms-from-4-manufacturers/">Read full article</a></p>
<p><a href="https://arstechnica.com/security/2026/03/researchers-disclose-vulnerabilities-in-ip-kvms-from-4-manufacturers/#comments">Comments</a></p>
]]>
                        </content:encoded>
                                    
                                    <slash:comments>28</slash:comments>
                
                
                <media:content url="https://cdn.arstechnica.net/wp-content/uploads/2023/07/exploit-vulnerability-security.jpg" type="image/jpeg" medium="image">
<media:thumbnail url="https://cdn.arstechnica.net/wp-content/uploads/2023/07/exploit-vulnerability-security-500x500.jpg" width="500" height="500" />
<media:credit>Getty Images</media:credit></media:content>
            </item>
                    <item>
                <title>Supply-chain attack using invisible code hits GitHub and other repositories</title>
                <link>https://arstechnica.com/security/2026/03/supply-chain-attack-using-invisible-code-hits-github-and-other-repositories/</link>
                                    <comments>https://arstechnica.com/security/2026/03/supply-chain-attack-using-invisible-code-hits-github-and-other-repositories/#comments</comments>
                
                <dc:creator>
                    <![CDATA[Dan Goodin]]>
                </dc:creator>
                <pubDate>Fri, 13 Mar 2026 20:18:08 +0000</pubDate>
                		<category><![CDATA[Biz & IT]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[public use areas]]></category>
		<category><![CDATA[supply chain attacks]]></category>
		<category><![CDATA[Unicode]]></category>
                <guid isPermaLink="true">https://arstechnica.com/security/2026/03/supply-chain-attack-using-invisible-code-hits-github-and-other-repositories/</guid>

                                    <description>
                        <![CDATA[Unicode that's invisible to the human eye was largely abandoned—until attackers took notice.]]>
                    </description>
                                                                <content:encoded>
                            <![CDATA[<p>Researchers say they’ve discovered a supply-chain attack flooding repositories with malicious packages that contain invisible code, a technique that’s flummoxing traditional defenses designed to detect such threats.</p>
<p>The researchers, from firm Aikido Security, <a href="https://www.aikido.dev/blog/glassworm-returns-unicode-attack-github-npm-vscode">said Friday</a> that they found 151 malicious packages that were uploaded to GitHub from March 3 to March 9. Such supply-chain attacks have been common for <a href="https://arstechnica.com/information-technology/2018/10/two-new-supply-chain-attacks-come-to-light-in-less-than-a-week/">nearly</a> a <a href="https://arstechnica.com/information-technology/2018/11/hacker-backdoors-widely-used-open-source-software-to-steal-bitcoin/">decade</a>. They usually work by uploading malicious packages with code and names that closely resemble those of widely used code libraries, with the objective of tricking developers into mistakenly incorporating the former into their software. In some cases, these malicious packages are downloaded thousands of times.</p>
<h2>Defenses see nothing. Decoders see executable code</h2>
<p>The packages Aikido found this month have adopted a newer technique: selective use of code that isn’t visible when loaded into virtually all editors, terminals, and code review interfaces. While most of the code appears in normal, readable form, malicious functions and payloads—the usual telltale signs of malice—are rendered in unicode characters that are invisible to the human eye. The tactic, which Aikido said it <a href="https://www.aikido.dev/blog/youre-invited-delivering-malware-via-google-calendar-invites-and-puas">first spotted</a> last year, makes manual code reviews and other traditional defenses nearly useless. Other repositories hit in these attacks include NPM and Open VSX.</p><p><a href="https://arstechnica.com/security/2026/03/supply-chain-attack-using-invisible-code-hits-github-and-other-repositories/">Read full article</a></p>
<p><a href="https://arstechnica.com/security/2026/03/supply-chain-attack-using-invisible-code-hits-github-and-other-repositories/#comments">Comments</a></p>
]]>
                        </content:encoded>
                                    
                                    <slash:comments>78</slash:comments>
                
                
                <media:content url="https://cdn.arstechnica.net/wp-content/uploads/2024/10/hidden-eye-1152x648.jpg" type="image/jpeg" medium="image" width="1152" height="648">
<media:thumbnail url="https://cdn.arstechnica.net/wp-content/uploads/2024/10/hidden-eye-500x500.jpg" width="500" height="500" />
<media:credit>Aurich Lawson</media:credit></media:content>
            </item>
                    <item>
                <title>The who, what, and why of the attack that has shut down Stryker&#039;s Windows network</title>
                <link>https://arstechnica.com/security/2026/03/whats-known-about-wiper-attack-on-stryker-a-major-supplier-of-lifesaving-devices/</link>
                                    <comments>https://arstechnica.com/security/2026/03/whats-known-about-wiper-attack-on-stryker-a-major-supplier-of-lifesaving-devices/#comments</comments>
                
                <dc:creator>
                    <![CDATA[Dan Goodin]]>
                </dc:creator>
                <pubDate>Thu, 12 Mar 2026 22:18:11 +0000</pubDate>
                		<category><![CDATA[Biz & IT]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[hacktivism]]></category>
		<category><![CDATA[medical devices]]></category>
		<category><![CDATA[wipers]]></category>
                <guid isPermaLink="true">https://arstechnica.com/security/2026/03/whats-known-about-wiper-attack-on-stryker-a-major-supplier-of-lifesaving-devices/</guid>

                                    <description>
                        <![CDATA[Company says it doesn't know how long it will take to restore its Microsoft environment.]]>
                    </description>
                                                                <content:encoded>
                            <![CDATA[<p>Within hours of the US and Israel launching airstrikes on Iran two weeks ago, security professionals warned organizations around the world to be on heightened watch for destructive retaliatory hacks. On Wednesday, the predictions appeared to come true as Stryker, a multinational maker of medical devices, confirmed a cyberattack that took down much of its infrastructure, and a hacking group long known to be aligned with the Iranian government claimed responsibility.</p>
<h2>Where things stand</h2>
<h3><strong>When and how did the attack come about?</strong></h3>
<p>The first indications were social media posts and a report from a news organization in Ireland. Messages posted by purported Stryker employees or their family members on <a href="https://www.reddit.com/r/cybersecurity/comments/1rqopq0/stryker_hit_by_handala_intune_managed_devices/">social</a> <a href="https://www.facebook.com/pat.a.bowen/posts/pfbid0Nv4dFBM9MLjRaFN9k6m9HvpkcuaQ8wPHp3oMX4Mtumob4W6129gVk22JupDdGdMil">media</a> said workers’ phones and computers had been wiped. A <a href="https://www.irishexaminer.com/news/munster/arid-41808308.html">report</a> the Irish Examiner published Wednesday morning, citing multiple anonymous sources, made the same claims and said some employees witnessed login pages on wiped devices displaying the logo of Handala Hack, a group that researchers who have followed it for years say is aligned with the Iranian government.</p>
<h3><strong>What is the status now?</strong></h3>
<p>Stryker <a href="https://www.stryker.com/us/en/about/news/2026/a-message-to-our-customers-03-2026.html">said Thursday</a> that it’s in the midst of responding to a “global network disruption to our Microsoft environment as a result of a cyber attack.” The update went on to say responders have no indication that ransomware or malware—the usual causes for such outages—were involved. The responders believe the incident is now contained and limited to the internal Microsoft environment.</p><p><a href="https://arstechnica.com/security/2026/03/whats-known-about-wiper-attack-on-stryker-a-major-supplier-of-lifesaving-devices/">Read full article</a></p>
<p><a href="https://arstechnica.com/security/2026/03/whats-known-about-wiper-attack-on-stryker-a-major-supplier-of-lifesaving-devices/#comments">Comments</a></p>
]]>
                        </content:encoded>
                                    
                                    <slash:comments>79</slash:comments>
                
                
                <media:content url="https://cdn.arstechnica.net/wp-content/uploads/2026/01/data-wiper-malware-1152x648.jpg" type="image/jpeg" medium="image" width="1152" height="648">
<media:thumbnail url="https://cdn.arstechnica.net/wp-content/uploads/2026/01/data-wiper-malware-500x500.jpg" width="500" height="500" />
<media:credit>Getty Images</media:credit></media:content>
            </item>
                    <item>
                <title>14,000 routers are infected by malware that&#039;s highly resistant to takedowns</title>
                <link>https://arstechnica.com/security/2026/03/14000-routers-are-infected-by-malware-thats-highly-resistant-to-takedowns/</link>
                                    <comments>https://arstechnica.com/security/2026/03/14000-routers-are-infected-by-malware-thats-highly-resistant-to-takedowns/#comments</comments>
                
                <dc:creator>
                    <![CDATA[Dan Goodin]]>
                </dc:creator>
                <pubDate>Wed, 11 Mar 2026 21:27:16 +0000</pubDate>
                		<category><![CDATA[Biz & IT]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[ASUS]]></category>
		<category><![CDATA[botnets]]></category>
		<category><![CDATA[distributed hash tables]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[routers]]></category>
                <guid isPermaLink="true">https://arstechnica.com/security/2026/03/14000-routers-are-infected-by-malware-thats-highly-resistant-to-takedowns/</guid>

                                    <description>
                        <![CDATA[Most of the devices are made by Asus and are located in the US.]]>
                    </description>
                                                                <content:encoded>
                            <![CDATA[<p>Researchers say they have uncovered a takedown-resistant botnet of 14,000 routers and other network devices—primarily made by Asus—that have been conscripted into a proxy network that anonymously carries traffic used for cybercrime.</p>
<p>The malware—dubbed KadNap—takes hold by exploiting vulnerabilities that have gone unpatched by their owners, Chris Formosa, a researcher at security firm Lumen’s Black Lotus Labs, told Ars. The high concentration of Asus routers is likely due to botnet operators acquiring a reliable exploit for vulnerabilities affecting those models. He said it’s unlikely that the attackers are using any zero-days in the operation.</p>
<h2>A botnet that stands out among others</h2>
<p>The number of infected routers averages about 14,000 per day, up from 10,000 last August, when Black Lotus discovered the botnet. Compromised devices are overwhelmingly located in the US, with smaller populations in Taiwan, Hong Kong, and Russia. One of the most salient features of KadNap is a sophisticated peer-to-peer design based on <a href="https://pdos.csail.mit.edu/~petar/papers/maymounkov-kademlia-lncs.pdf">Kademlia</a>, a network structure that uses distributed hash tables to conceal the IP addresses of command-and-control servers. The design makes the botnet resistant to detection and takedowns through traditional methods.</p><p><a href="https://arstechnica.com/security/2026/03/14000-routers-are-infected-by-malware-thats-highly-resistant-to-takedowns/">Read full article</a></p>
<p><a href="https://arstechnica.com/security/2026/03/14000-routers-are-infected-by-malware-thats-highly-resistant-to-takedowns/#comments">Comments</a></p>
]]>
                        </content:encoded>
                                    
                                    <slash:comments>38</slash:comments>
                
                
                <media:content url="https://cdn.arstechnica.net/wp-content/uploads/2019/04/GettyImages-926536690-1152x648.jpg" type="image/jpeg" medium="image" width="1152" height="648">
<media:thumbnail url="https://cdn.arstechnica.net/wp-content/uploads/2019/04/GettyImages-926536690-500x500.jpg" width="500" height="500" />
<media:credit>BeeBright/Getty Images</media:credit></media:content>
            </item>
                    <item>
                <title>Feds take notice of iOS vulnerabilities exploited under mysterious circumstances</title>
                <link>https://arstechnica.com/security/2026/03/cisa-adds-3-ios-flaws-to-its-catalog-of-known-exploited-vulnerabilities/</link>
                                    <comments>https://arstechnica.com/security/2026/03/cisa-adds-3-ios-flaws-to-its-catalog-of-known-exploited-vulnerabilities/#comments</comments>
                
                <dc:creator>
                    <![CDATA[Dan Goodin]]>
                </dc:creator>
                <pubDate>Fri, 06 Mar 2026 19:41:33 +0000</pubDate>
                		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Biz & IT]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[exploits]]></category>
		<category><![CDATA[iOS]]></category>
		<category><![CDATA[iPhones]]></category>
		<category><![CDATA[vulnerabilities]]></category>
                <guid isPermaLink="true">https://arstechnica.com/security/2026/03/cisa-adds-3-ios-flaws-to-its-catalog-of-known-exploited-vulnerabilities/</guid>

                                    <description>
                        <![CDATA[The long, strange trip of a large assembly of advanced iOS exploits.]]>
                    </description>
                                                                <content:encoded>
                            <![CDATA[<p>The Cybersecurity and Infrastructure Security Agency has ordered federal agencies to patch three critical iOS vulnerabilities that were exploited over a 10-month span in hacking campaigns conducted by three distinct groups.</p>
<p>The hacking campaigns came to light on Thursday in a <a href="https://cloud.google.com/blog/topics/threat-intelligence/coruna-powerful-ios-exploit-kit">report</a> published by Google. All three campaigns used Coruna, the name of an advanced hacking kit that amassed 23 separate iOS exploits into five potent exploit chains. While some of the vulnerabilities had been exploited as zero-days in earlier, unrelated campaigns, all had been patched by the time Google observed them being exploited by Coruna. When used against older iOS versions, the kit nonetheless posed a formidable threat given the high caliber of the exploit code and the wide range of capabilities.</p>
<h2>The case of the promiscuous 2nd-hand zero-days</h2>
<p>“The core technical value of this exploit kit lies in its comprehensive collection of iOS exploits,” Google researchers wrote. “The exploits feature extensive documentation, including docstrings and comments authored in native English. The most advanced ones are using non-public exploitation techniques and mitigation bypasses.”</p><p><a href="https://arstechnica.com/security/2026/03/cisa-adds-3-ios-flaws-to-its-catalog-of-known-exploited-vulnerabilities/">Read full article</a></p>
<p><a href="https://arstechnica.com/security/2026/03/cisa-adds-3-ios-flaws-to-its-catalog-of-known-exploited-vulnerabilities/#comments">Comments</a></p>
]]>
                        </content:encoded>
                                    
                                    <slash:comments>37</slash:comments>
                
                
                <media:content url="https://cdn.arstechnica.net/wp-content/uploads/2026/03/iphone-14-1152x648.jpg" type="image/jpeg" medium="image" width="1152" height="648">
<media:thumbnail url="https://cdn.arstechnica.net/wp-content/uploads/2026/03/iphone-14-500x500.jpg" width="500" height="500" />
<media:credit>Getty Images</media:credit></media:content>
            </item>
                    <item>
                <title>Amazon appears to be down, with over 20,000 reported problems</title>
                <link>https://arstechnica.com/gadgets/2026/03/amazon-appears-to-be-down-with-over-20000-reported-problems/</link>
                                    <comments>https://arstechnica.com/gadgets/2026/03/amazon-appears-to-be-down-with-over-20000-reported-problems/#comments</comments>
                
                <dc:creator>
                    <![CDATA[Scharon Harding]]>
                </dc:creator>
                <pubDate>Thu, 05 Mar 2026 21:06:05 +0000</pubDate>
                		<category><![CDATA[Biz & IT]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Amazon]]></category>
		<category><![CDATA[outage]]></category>
                <guid isPermaLink="true">https://arstechnica.com/gadgets/2026/03/amazon-appears-to-be-down-with-over-20000-reported-problems/</guid>

                                    <description>
                        <![CDATA[Problems viewing products and checking out. ]]>
                    </description>
                                                                <content:encoded>
                            <![CDATA[<p>Based on over 20,000 reports, Amazon appears to be experiencing an outage.</p>
<p>According to <a href="https://downdetector.com/status/amazon/">Downdetector</a>, reports of problems started increasing at 1:41 pm ET today. By 2:26 pm, ET, Downdetector received 18,320 reports of problems with Amazon’s website. The number of complaints peaked at 3:32 pm ET at 20,804. There have also been a smaller number of complaints about Amazon Prime Video and Amazon Web Services.</p>
<p>As of this writing, Amazon <a href="https://health.aws.amazon.com/health/status">hasn’t confirmed</a> any specific problems. However, an Amazon support account on X <a href="https://x.com/AmazonHelp/status/2029648717263810675?s=20">said</a> at 3:02 pm ET today that “some customers may be experiencing issues” and that Amazon is working “to resolve the issue.”</p><p><a href="https://arstechnica.com/gadgets/2026/03/amazon-appears-to-be-down-with-over-20000-reported-problems/">Read full article</a></p>
<p><a href="https://arstechnica.com/gadgets/2026/03/amazon-appears-to-be-down-with-over-20000-reported-problems/#comments">Comments</a></p>
]]>
                        </content:encoded>
                                    
                                    <slash:comments>135</slash:comments>
                
                
                <media:content url="https://cdn.arstechnica.net/wp-content/uploads/2024/10/GettyImages-535059003-1024x648.jpg" type="image/jpeg" medium="image" width="1024" height="648">
<media:thumbnail url="https://cdn.arstechnica.net/wp-content/uploads/2024/10/GettyImages-535059003-500x500.jpg" width="500" height="500" />
<media:credit>Getty Images</media:credit><media:text>An Amazon corporate office building in Sunnyvale, California.</media:text></media:content>
            </item>
                    <item>
                <title>Trump gets data center companies to pledge to pay for power generation</title>
                <link>https://arstechnica.com/tech-policy/2026/03/leading-ai-datacenter-companies-sign-pledge-to-buy-their-own-power/</link>
                                    <comments>https://arstechnica.com/tech-policy/2026/03/leading-ai-datacenter-companies-sign-pledge-to-buy-their-own-power/#comments</comments>
                
                <dc:creator>
                    <![CDATA[John Timmer]]>
                </dc:creator>
                <pubDate>Thu, 05 Mar 2026 18:41:28 +0000</pubDate>
                		<category><![CDATA[Biz & IT]]></category>
		<category><![CDATA[Policy]]></category>
		<category><![CDATA[coal]]></category>
		<category><![CDATA[data centers]]></category>
		<category><![CDATA[Energy]]></category>
		<category><![CDATA[natural gas]]></category>
		<category><![CDATA[nuclear]]></category>
		<category><![CDATA[renewables]]></category>
		<category><![CDATA[trump administration]]></category>
                <guid isPermaLink="true">https://arstechnica.com/tech-policy/2026/03/leading-ai-datacenter-companies-sign-pledge-to-buy-their-own-power/</guid>

                                    <description>
                        <![CDATA[With no enforcement and questionable economics, it may not make a difference.]]>
                    </description>
                                                                <content:encoded>
                            <![CDATA[<p>On Wednesday, the Trump administration <a href="https://www.whitehouse.gov/fact-sheets/2026/03/fact-sheet-president-donald-j-trump-advances-energy-affordability-with-the-ratepayer-protection-pledge/">announced</a> that a large collection of tech companies had signed on to what it's calling the Ratepayer Protection Pledge. By agreeing, the initial signatories—Amazon, Google, Meta, Microsoft, OpenAI, Oracle, and xAI—are saying they will pay for the new generation and transmission capacities needed for any additional data centers they build. But the agreement has no enforcement mechanism, and it will likely run into issues with hardware supplies. It also ignores basic economics.</p>
<p>Other than that, it seems like a great idea.</p>
<h2>What's being agreed to</h2>
<p>The <a href="https://www.whitehouse.gov/articles/2026/03/ratepayer-protection-pledge/">agreement</a> is quite simple, laying out five points. The key ones are the first three: that the companies building data centers pledge to pay for new generating capacity, either building it themselves or paying for it as part of a new or expanded power plant. They'll also pay for any transmission infrastructure needed to connect their data centers and the new supply to the grid and will cover these costs whether or not the power ultimately gets used by their facilities.</p><p><a href="https://arstechnica.com/tech-policy/2026/03/leading-ai-datacenter-companies-sign-pledge-to-buy-their-own-power/">Read full article</a></p>
<p><a href="https://arstechnica.com/tech-policy/2026/03/leading-ai-datacenter-companies-sign-pledge-to-buy-their-own-power/#comments">Comments</a></p>
]]>
                        </content:encoded>
                                    
                                    <slash:comments>82</slash:comments>
                
                
                <media:content url="https://cdn.arstechnica.net/wp-content/uploads/2026/03/GettyImages-2258665361-1024x648.jpg" type="image/jpeg" medium="image" width="1024" height="648">
<media:thumbnail url="https://cdn.arstechnica.net/wp-content/uploads/2026/03/GettyImages-2258665361-500x500.jpg" width="500" height="500" />
<media:credit>Houston Chronicle/Hearst Newspapers</media:credit><media:text>Meeting increased demand with natural gas has been complicated by growing exports, such as the ones made at this facility in Texas.</media:text></media:content>
            </item>
                    <item>
                <title>Downdetector, Speedtest sold to IT service-provider Accenture in $1.2B deal</title>
                <link>https://arstechnica.com/information-technology/2026/03/downdetector-speedtest-sold-to-it-service-provider-accenture-in-1-2b-deal/</link>
                                    <comments>https://arstechnica.com/information-technology/2026/03/downdetector-speedtest-sold-to-it-service-provider-accenture-in-1-2b-deal/#comments</comments>
                
                <dc:creator>
                    <![CDATA[Scharon Harding]]>
                </dc:creator>
                <pubDate>Tue, 03 Mar 2026 22:20:06 +0000</pubDate>
                		<category><![CDATA[Biz & IT]]></category>
		<category><![CDATA[Accenture]]></category>
		<category><![CDATA[acquisition]]></category>
		<category><![CDATA[mergers]]></category>
                <guid isPermaLink="true">https://arstechnica.com/information-technology/2026/03/downdetector-speedtest-sold-to-it-service-provider-accenture-in-1-2b-deal/</guid>

                                    <description>
                        <![CDATA[Accenture plans to buy Ookla, which also includes RootMetrics and Ekahau. ]]>
                    </description>
                                                                <content:encoded>
                            <![CDATA[<p>IT consultant and services provider Accenture has agreed to buy <a href="https://www.speedtest.net/">Speedtest</a> and <a href="https://downdetector.com/">Downdetector</a> owner Ookla from Ziff Davis for $1.2 billion in cash.</p>
<p>Accenture plans to integrate Ookla’s data products into its own offerings that are targeted at helping communications service providers, hyperscalers, government entities, and other types of customers “optimize … mission-critical Wi-Fi and 5G networks,” Accenture’s announcement today said.</p>
<p>Ookla's platform also includes Ekahau, which offers tools for troubleshooting and designing wireless networks, and RootMetrics, which monitors mobile network performance.</p><p><a href="https://arstechnica.com/information-technology/2026/03/downdetector-speedtest-sold-to-it-service-provider-accenture-in-1-2b-deal/">Read full article</a></p>
<p><a href="https://arstechnica.com/information-technology/2026/03/downdetector-speedtest-sold-to-it-service-provider-accenture-in-1-2b-deal/#comments">Comments</a></p>
]]>
                        </content:encoded>
                                    
                                    <slash:comments>116</slash:comments>
                
                
                <media:content url="https://cdn.arstechnica.net/wp-content/uploads/2026/03/GettyImages-1795499144-1152x648.jpg" type="image/jpeg" medium="image" width="1152" height="648">
<media:thumbnail url="https://cdn.arstechnica.net/wp-content/uploads/2026/03/GettyImages-1795499144-500x500.jpg" width="500" height="500" />
<media:credit>Getty</media:credit><media:text>Paris, France - November 15, 2023: Facade of the French headquarters of Accenture. </media:text></media:content>
            </item>
                    <item>
                <title>LLMs can unmask pseudonymous users at scale with surprising accuracy</title>
                <link>https://arstechnica.com/security/2026/03/llms-can-unmask-pseudonymous-users-at-scale-with-surprising-accuracy/</link>
                                    <comments>https://arstechnica.com/security/2026/03/llms-can-unmask-pseudonymous-users-at-scale-with-surprising-accuracy/#comments</comments>
                
                <dc:creator>
                    <![CDATA[Dan Goodin]]>
                </dc:creator>
                <pubDate>Tue, 03 Mar 2026 12:30:24 +0000</pubDate>
                		<category><![CDATA[AI]]></category>
		<category><![CDATA[Biz & IT]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[deanonymization]]></category>
		<category><![CDATA[LLMs]]></category>
		<category><![CDATA[privacy]]></category>
                <guid isPermaLink="true">https://arstechnica.com/security/2026/03/llms-can-unmask-pseudonymous-users-at-scale-with-surprising-accuracy/</guid>

                                    <description>
                        <![CDATA[Pseudonymity has never been perfect for preserving privacy. Soon it may be pointless.]]>
                    </description>
                                                                <content:encoded>
                            <![CDATA[<p>Burner accounts on social media sites can increasingly be analyzed to identify the pseudonymous users who post to them using AI in research that has far-reaching consequences for privacy on the Internet, researchers said.</p>
<p>The finding, from a recently published <a href="https://arxiv.org/pdf/2602.16800">research paper</a>, is based on results of experiments correlating specific individuals with accounts or posts across more than one social media platform. The success rate was far greater than existing classical deanonymization work that relied on humans assembling structured data sets suitable for algorithmic matching or manual work by skilled investigators. Recall—that is, how many users were successfully deanonymized—was as high as 68 percent. Precision—meaning the rate of guesses that correctly identify the user—was up to 90 percent.</p>
<h2>I know what you posted last year</h2>
<p>The findings have the potential to upend pseudonymity, an imperfect but often sufficient privacy measure used by many people to post queries and participate in sometimes sensitive public discussions while making it hard for others to positively identify the speakers. The ability to cheaply and quickly identify the people behind such obscured accounts opens them up to doxxing, stalking, and the assembly of detailed marketing profiles that track where speakers live, what they do for a living, and other personal information. This pseudonymity measure no longer holds.</p><p><a href="https://arstechnica.com/security/2026/03/llms-can-unmask-pseudonymous-users-at-scale-with-surprising-accuracy/">Read full article</a></p>
<p><a href="https://arstechnica.com/security/2026/03/llms-can-unmask-pseudonymous-users-at-scale-with-surprising-accuracy/#comments">Comments</a></p>
]]>
                        </content:encoded>
                                    
                                    <slash:comments>221</slash:comments>
                
                
                <media:content url="https://cdn.arstechnica.net/wp-content/uploads/2026/03/unmask-deanymize-privacy-1152x648.jpg" type="image/jpeg" medium="image" width="1152" height="648">
<media:thumbnail url="https://cdn.arstechnica.net/wp-content/uploads/2026/03/unmask-deanymize-privacy-500x500.jpg" width="500" height="500" />
<media:credit>Getty Images</media:credit></media:content>
            </item>
            </channel>
</rss>