The Latest

The South Pacific Regional Fisheries Management Organization (SPRFMO) needs to regulate squid fishing in the South Pacific.

As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.

Blog moderation policy.


from Schneier on Security https://ift.tt/KbWTijI

Vulnerability researchers have spent the past year arguing about whether AI agents can find real bugs at scale or whether they mostly generate noise. A pipeline built in three days by researchers from TrendAI and CHT Security supplies an answer, along with a price tag that the security industry will have to reckon with.

WordPress plugin vulnerabilities

The system, presented at Ekoparty Miami, pairs AI-driven static analysis with automated Docker provisioning and dynamic verification through Chrome DevTools MCP. It surfaced more than 300 critical zero-day vulnerabilities across the WordPress plugin ecosystem in 72 hours of scanning. Every finding was manually verified by the researchers and responsibly disclosed before publication.

The economics

The AgentForge orchestration dashboard logged roughly 222 million tokens consumed across 95 tasks during the campaign. Steven Yu, a threat research engineer at TrendAI, translated that to an average of about $20 per vulnerability discovered.

He qualified the number carefully. “This doesn’t mean you can easily find a vulnerability in any WordPress site for just $20,” Yu told Help Net Security. “It depends heavily on the security of the codebase. The WordPress ecosystem is extremely vast and complex, leading to highly variable code quality. In other frameworks or ecosystems, we might not see the same results at this cost threshold.”

The qualifier matters because WordPress plugins are an outlier. The ecosystem runs to more than a million plugins, many maintained by solo volunteers without security budgets, and the code quality reflects that. A hardened enterprise codebase would not surrender bugs at the same rate or at the same cost.
What is settled, by Yu’s account, is that the price floor is already crossed for someone willing to look. “We are already in a state where any motivated attacker with a credit card can execute this,” he said. “Both white-hat and black-hat actors are already implementing these types of actions at scale.”

Vulnerability classes the pipeline surfaced

The 300-plus findings span pre-authentication remote code execution, SQL injection hidden behind PHPCS annotations that mark vulnerable queries as safe, privilege escalation through the WordPress hook system, server-side request forgery, and a downgrade attack chain. One pre-auth RCE was identified in a plugin with more than 1,000 GitHub stars.

The downgrade chain was assembled by the AI without human guidance. The agent located a vulnerability that allowed it to roll a target plugin back to an earlier version, recognized that the earlier version carried its own exploitable flaws, and chained the two into a working attack. Yu confirmed no manual prompts or pre-taught patterns were involved. The same vulnerability class was identified through pattern hunting across OpenCart and Joomla codebases.

Disclosure infrastructure under strain

The pipeline addresses what the security industry has taken to calling “AI slop,” the wave of low-quality, AI-generated vulnerability reports that has pushed several major open-source projects to reject AI submissions outright. By requiring every AI-generated finding to pass dynamic verification before reaching the disclosure queue, the system eliminated more than 80% of false positives.

The downstream pressure remains. Yu said manual verification of each WordPress plugin vulnerability took his team between 30 and 60 minutes. He described the human review layer as the primary bottleneck.

“Organizations such as ZDI and NIST are currently struggling with massive backlogs due to the explosion of AI-assisted vulnerability reports,” Yu said. “When AI can scale discovery from a few findings per day to hundreds per second, the traditional human-centric triage model becomes unsustainable.”

His expectation for the next six months is a higher volume of disclosed vulnerabilities and a parallel rise in zero-day abuse by attackers running similar pipelines. He anticipates a structural shift in how disclosure programs accept submissions, with several vendors moving toward invite-only or membership-based models that prioritize researchers with established track records and ban accounts that submit AI-generated noise.

The longer-term answer Yu pointed to is more automation, applied at the receiving end. “The ultimate solution is to fight AI magic with AI magic,” he said. AI-assisted triage that automates environment setup and verification would let human experts concentrate on the most complex cases.

Where the AI still stops

Yu was direct about the ceiling. Drag-and-drop builders such as Elementor sit in the “computer use” category and will likely yield to the next wave of agent tooling within months. Other failure modes are harder. Exploits that need a working payment API key, a valid user account, or an SMS verification code stop the agent because the gap is in the environment, not in the model. Some calls require a human to define whether a feature is intended or malicious in the first place, a judgment that more training data will not resolve.

Download: Automating Pentest Delivery Guide


from Help Net Security https://ift.tt/qLvjZ8N

A group used Anthropic’s Mythos AI model to help find a kernel memory corruption vulnerability and exploit on Apple’s M5.

News article.


from Schneier on Security https://ift.tt/aY56edl

GitHub CISO Alexis Wales has named the malicious VS Code extension behind the breach they suffered at the hands of the threat group TeamPCP: Nx Console, a popular developer tool with 2.2 million installs.

A malicious version of the otherwise benign extension was used to steal secrets and developer credentials, which were then used to move through CI/CD pipelines and exfiltrate around 3,800 of GitHub’s private code repositories.

One missed token, many victims

The company confirmed the compromise on Wednesday, and promised to publish a fuller report once their investigation is complete.

Soon after, Wales publicly identified the poisoned VS Code extension that a GitHub employee installed and thus enabled the attackers to gain access to the repositories.

Nx Console maintainers have been sharing information surfaced by their own investigation into how a malicious version of the extension was published on both the Microsoft-owned Visual Studio Marketplace and the vendor-neutral registry Open VSX.

“One of our developers was compromised by a recent supply-chain compromise on TanStack, which leaked their GitHub credentials through the GitHub CLI (gh). This allowed the attacker to run workflows on our GitHub repository as a contributor,” they explained.

“According to Microsoft and OpenVSX, download numbers for the impacted 18.95.0 version were a low 28 and 41 respectively. However, according to our own internal analytics, we believe the impact to be two orders of magnitude higher, with thousands of affected users.”

One of the affected users turned out to be the GitHub employee. The compromised extension fetched an obfuscated payload, which was able to harvest victims’ credentials.

Among those were login tokens for the HashiCorp Vault secrets manager; credentials used authenticate via Kubernetes or AWS identity systems; authentication tokens used to publish packages to npm registries; GitHub personal access tokens, OAuth tokens, and app tokens; credentials stored in the victim’s 1Password vault; and Google Cloud Platform and Docker credentials.

“Harvested data was exfiltrated via HTTPS, the GitHub API, and DNS. On Linux it also attempted sudoers injection for persistence,” the Nx Console maintainers noted, and provided remediation advice, which includes rotating “every credential reachable from the machine.”

Grafana Labs, which similarly got its GitHub environment compromised and codebase stolen, also traced the compromise back to the TanStack npm supply chain attack.

“The incident originated from a TanStack npm supply chain attack via the Mini Shai-Hulud campaign. We detected the malicious activity on May 11 and immediately initiated our incident response plan,” shared Joe McManus, the Grafana Labs chief information security officer.

“We performed analysis and quickly rotated a significant number of GitHub workflow tokens, but a missed token led to the attackers gaining access to our GitHub repositories. A subsequent review confirmed that a specific GitHub workflow we originally deemed not impacted had, in fact, been compromised.”

The company has been contacted by the attackers, who demanded payment not to release or sell the stolen codebase, but Grafana Labs decided not to pay the ransom.

TeamPCP automated its way through the open source ecosystem

The TanStack supply chain compromise affected 42 of its npm packages. Malicious versions were made to include a credential-stealing JavaScript payload.

That compromise, like many others in the last weeks, was carried out via Mini Shai-Hulud, a self-replicating supply chain “worm” created and operated by TeamPCP.

The “worm” allows them to automate supply chain attacks by stealing CI/CD credentials and leveraging them to publish infected versions of more and more packages.

TeamPCP, a cybercrime group that specializes in supply chain attacks targeting open-source utilities and AI middleware, has claimed the GitHub hack and is likely behind Grafana’s, as well.

Subscribe to our breaking news e-mail alert to never miss out on the latest breaches, vulnerabilities and cybersecurity threats. Subscribe here!


from Help Net Security https://ift.tt/S76k4Go

My fellow Lifehacker writer Beth Skwarecki is a weightlifter. I'm a marathon runner. Together, we make one reasonably competent Hyrox athlete—and in a little over one week, we're going to find out if that's enough. Beth and I are competing together in a Hyrox doubles race on May 29. It's something of a joint experiment to see just how little training you can get away with before showing up to one of these things. Hopefully, we will each bring our respective strengths to the competition, cover for the other's weaknesses, and survive. 

But before we're put to the test, let's take a look at what proper Hyrox prep looks like, and the bare minimum you can (probably) get away with if you want to show up to a competition without a ton of training.

What is Hyrox, exactly?

Beth goes into more depth elsewhere, but here’s a quick primer on Hyrox. In brief, it's a running race combined with functional workout stations, repeated eight times. You run 1 km, hit a workout station, run another 1 km, hit another station, and so on. The stations include activities like sled pushes, rowing, burpee broad jumps, walking lunges, and wall balls. While each station may sound manageable on its own, they become far more difficult when your legs have already been tired out through multiple rounds.

You can compete in Hyroc solo, in doubles, or as a relay team. Naturally, your strategy will depend on which format you’re attempting. For doubles specifically, both athletes run together, but you can split the functional movements however you want. That's where smart planning can make a real difference, and where Beth and I are currently scheming to the best of our ability. 

What does Hyrox training actually look like?

You can sign up for a Hyrox-style class at your local gym and get a great hybrid workout without ever joining an official race. "A regular Hyrox class gives you a taste of the format and builds general fitness for the event," says Elaine Cotter, head trainer and manager at an F45 gym in Brooklyn. "A dedicated training plan is more structured and performance-focused—including specific running workouts, both endurance and interval focused, strength progression, race simulations, pacing, and recovery. Taking some classes here and there means 'I want to be ready.' A dedicated training plan means 'I want to race this well.'"

If you're aiming to genuinely compete—that is, to push your time and finish strong—Cotter recommends starting at least 12 weeks out, and ideally, give yourself 16 weeks. That's enough runway to build a running base, develop muscular endurance across all the stations, and reduce injury risk. But what if you don't have 12 weeks? What if you have, say, one week?

Can you do Hyrox without training at all?

What’s the bare minimum of training a Hyrox athlete can hypothetically get away with? Well, in theory, "anyone with any running or strength training experience can complete a Hyrox," Cotter says. "Does that mean you may have to walk some of it or really take your time to recover in certain parts? Probably—but that's okay."

Unlike Crossfit (to which it is constantly compared), Hyrox is fundamentally a running race. "The run is the limiting factor for most people, and it takes up the most time in the race," Cotter says. "So at bare minimum, you should be able to confidently run an 8K [about five miles] without getting super winded. Even a 10K [6.2 miles]...will help simulate the general endurance needed." Strength matters too, and you should be familiar enough with the movements to perform them safely. But at the end of the day, the run is where most people lose time and hit their wall.

That said, Hyrox is far from a road race. You're doing things like heavy wall balls or sled pulls and then immediately going into a run. Running on such heavy legs is “the wildest feeling," Cotter says, "and it happens the entire time during the race." Practicing that sort of transition should be a priority leading up to race day.

Can you prepare for Hyrox with studio classes alone?

This one is relevant to Beth and me, since we've each taken about four or five Hyrox-specific classes in the lead-up to our race. Can our class attendance substitute for a dedicated 12-week training plan? Well, sort of—but only if you're also running.

"F45 classes and Hyrox-focused training are awesome for building the strength, endurance, and engine needed for the race," Cotter says, "but in a class setting, you aren't necessarily getting the running required. If you are just taking classes with no running outside of that, I fear you will find the race quite challenging."

Luckily, I was independently training for a half-marathon before we started this Hyrox journey, so I feel solid about my cardio. I know Beth has been prioritizing her runs the past few weeks, too. Anyone relying purely on studio classes without additional running should temper their expectations for race day.

How long should you taper before a Hyrox race?

I’m no stranger to taper madness. Especially if you know you've undertrained, the temptation is to keep cramming right up until race day. Unfortunately, that’s almost always a mistake. "The trap people fall into is thinking 'I'm underprepared, so I need to cram fitness until the last second,'" Cotter says. "But realistically, in the final week or two you're not building much new fitness—you're mostly deciding whether you show up tired or fresh."

Her recommendation for someone who started training late is to lean toward a shorter taper. The focus should be on maintaining confidence and rhythm, rather than gaining fitness. In the final days, aim for shorter sessions of 20–30 minutes with some intensity and running, but avoid anything that will leave your legs sore. "Showing up slightly undertrained but recovered is usually better than showing up technically fitter but cooked."

Her taper guidelines by length:

  • 7 days: Ideal for most recreational athletes. 

  • 4–5 days: Probably fine, if training volume wasn't super high. 

  • 2–3 days: Survivable, but she wouldn't recommend going shorter than this.

The bottom line

If you're starting from scratch and want to do Hyrox well, give yourself 12 to 16 weeks to train, and build up your running base first.  If you're doing a doubles race and already have some general fitness under your belt, you can probably survive on much less—provided you can handle an 8K and you know what you're getting into with the workout stations. (For Beth and me, there’s reason to hope that our complementary weaknesses and strengths will be well-suited to the doubles format. Beth will likely handle more of the heavy strength pieces—sled push, sled pull, lunges—while I keep us moving on the runs.)

The final piece of advice is to have a plan for how you'll split each station before you arrive. Reps of 10? Reps of 5? Splits of 150 meters? Figure it out ahead of time so you're not negotiating mid-station with burning legs—and have the stronger runner finish each station so the person who struggles more on the run can get a little extra rest before the next one. (Plus, sitting down and strategizing is a great hack to distract yourself from the temptation to sabotage your taper.) 

How will all this theory work out in practice? We'll report back soon.


from Lifehacker https://ift.tt/2OkpHLy

Netflix's June lineup has a little something for everyone: true crime docs, sports series, comedy films, reality TV, and more. First, the live-action fantasty series Avatar: The Last Airbender (June 25) returns for its second season at the end of the month. Netflix is also launching a Survivor-style competition show—Outlast: The Jungle (June 10) lands 16 players on a remote island to play for a $1 million prize.

Following its May slate of soccer content in the lead-up to the 2026 World Cup, the streamer is hosting The Hot Seat (June 3), a comedy roast featuring World Cup winners from France 1998 and France 2018 alongside stand-up comedians. The Rest is Football (June 10) is a daily series hosted by Gary Lineker, Alan Shearer, and Micah Richards with analysis from the 2026 tournament. And USA 94: Brazil's Return to Glory (June 7), a documentary originally scheduled for release in May, covers Brazil's 1994 World Cup run.

Other sports content includes the third season of AMERICA'S SWEETHEARTS: Dallas Cowboys Cheerleaders (June 16) and Chris & Martina: The Final Set (June 26), a documentary exploring Chris Evert and Martina Navratilova's friendship and dominance in tennis.

The film lineup for June includes Office Romance (June 5), a rom-com starring J.Lo and Brett Goldstein as an airline CEO and the corporate lawyer she falls for (relatable!), and Little Brother (June 26), also a comedy, with John Cena as a well-known real estate agent opposite Eric André as his "little brother."

Here's everything else coming to Netflix in June, and everything that's leaving.

What's coming to Netflix in June 2026

Available soon

Available June 1

  • Bee Movie

  • The Big Lebowski

  • The Chronicles of Riddick

  • Cinderella Man

  • Creed

  • Creed II

  • Creed III

  • Father of the Bride

  • Father of the Bride: Part II

  • The Fault in Our Stars

  • Four Weddings and a Funeral

  • Fried Green Tomatoes

  • The Girl on the Train

  • The Hand that Rocks the Cradle

  • Hawaii Five-0: Seasons 1-5

  • Hot Summer Nights

  • House on Haunted Hill

  • Identity Thief

  • Inside Man

  • Inside Man: Most Wanted

  • The Karate Kid

  • The Karate Kid

  • The Karate Kid Part II

  • The Karate Kid Part III

  • Little Miss Sunshine

  • Made of Honor

  • Miracle

  • Muriel's Wedding

  • My Best Friend's Wedding

  • Out of Africa

  • Pitch Black

  • Rachel Getting Married

  • Riddick

  • Rocky

  • Rocky Balboa

  • Rocky III

  • Rocky IV

  • Rocky V

  • Rookie of the Year

  • Rudy

  • Runaway Bride

  • Scooby-Doo

  • Scooby-Doo 2: Monsters Unleashed

  • Tyler Perry's The Family That Preys

  • The Wedding Date

  • The Wedding Planner

Available June 3

Available June 4

Available June 5

Available June 6

  • Grey's Anatomy: Season 22

  • Resident Alien: Season 4

Available June 7

Available June 8

Available June 9

Available June 10

Available June 11

Available June 12

Available June 13

  • Song Sung Blue

Available June 14

  • Piece by Piece

Available June 15

  • Drinking Buddies

  • Percy Jackson & the Olympians: The Lightning Thief

  • Percy Jackson: Sea of Monsters

Available June 16

Available June 17

  • AndrĂ© Is an Idiot

Available June 18

Available June 19

Available June 20

  • The Root Of The Game—Netflix Sports Series

Available June 22

Available June 23

  • Ryan Hamilton: This Just Hit Me—Netflix Comedy Special

Available June 24

Available June 25

Available June 26

Available June 27

  • Agent Kim Reactivated—Netflix Series

Available June 30

  • Sullivan's Crossing Season 4

What's leaving Netflix in June 2026

Leaving June 1

  • Fifty Shades of Grey

  • Fifty Shades Darker

  • Fifty Shades Freed

  • Glory

  • Jurassic World: Fallen Kingdom

  • The Lego Movie

  • Ray

Leaving June 2

  • Kim's Convenience: Seasons 1-5

Leaving June 3

  • Brockmire: Seasons 1-4

Leaving June 7

  • Blindspot: Seasons 1-5

  • Shiva Baby

Leaving June 9

  • A Lot Like Love

Leaving June 10

  • TURN: Washington's Spies: Seasons 1-4

Leaving June 16

  • Aquarius: Seasons 1-2

  • Unbroken

Leaving June 19

  • The Iron Claw

Leaving June 20

  • The Expendables

  • The Expendables 2

  • The Expendables 3

  • The Expendables 4

Leaving June 21

  • Zoey 101: Seasons 1-2

Leaving June 30

  • Sex and the City: Seasons 1-6


from Lifehacker https://ift.tt/1BrUbW4

Love it or hate it, the Apple ecosystem has its perks. Take "Handoff," for example: If you have at least two connected devices, such as an iPhone and a Mac, you can start a task on one and carry it over to the other. You can start reading an article in Safari on your iPhone, then pick it up when you get to your Mac. Or, say you're on a FaceTime call on your Mac, but you have to run; you can simply switch to your iPhone to keep the conversation going, without having to call them back. It isn't perfect, but it works, it works.

Android doesn't quite have the same setup. While some functions work across devices, like transferring calls, users with an Android phone often don't have the ability to open the same task on their tablet, and vice versa. If you're reviewing a spreadsheet in Google Sheets on your phone, you can't just pick it up on your tablet for a larger view; you instead need to open Sheets on your tablet, then find your way to the document in question. The same goes for many other Google apps, like Chrome, Gmail, Drive, and Docs: Android could really benefit from a dedicated cross-platform option. Luckily, it's on the way, in the form of a new feature called "Continue On."

How "Continue On" works on Android

Google announced "Continue On" during its "What's new in Android" discussion on Tuesday. As reported by 9to5Google, this is a new feature as of Android 17, and will be available in Android 17 RC1. If you've ever used Handoff in the Apple ecosystem, you'll understand the core idea behind Continue On: When you open an app on one of your Android devices, you'll notice the app appear on your other device, with a "Handoff Suggestion label" hovering above it.

handoff suggestion icon
Credit: Google

Say you're working on a Google Doc on your Pixel phone. When you open your Pixel tablet, you'll notice the Google Docs icon populate in the doc, with a special label—even if you already have Google Docs in your dock. If you tap the standard Google Docs icon, you'll open the app as per usual; if you tap the Handoff Suggestion, you'll open the Google Doc you're working on on your phone. In another example, you might be reading through a Gmail thread on your phone, but prefer to finish catching up on your tablet. In this case, the Handoff Suggestion would be Chrome: Tap it on your tablet, and you'll pull up the thread in Gmail on the bigger screen.

Google appears to be taking its time with implementing Continue On. While the feature will work "bidirectionally" in the future, at launch, it only works from phone to tablet. That means you won't be able to hand off a Google Doc from your tablet to your phone, only from your phone to your tablet. Additionally, Google says it's up to developers to decide how they want this experience to run with their own apps. They can open the same app across both devices (Google Docs to Google Docs), or open the web app from the mobile app (Gmail mobile app to Gmail web app in Chrome). Developers can also opt for a mix of both: While the default can be app-to-app, developers can choose to fall back to the web app if the user doesn't have the app installed on their tablet.


from Lifehacker https://ift.tt/PLxEQMK