Tories demand Commons sleaze investigation after leaked texts suggested secret slush fund to propel Starmer to Labour leadership
The WhatsApp messages appear to directly contradict the party's denials last week that embattled Chief of Staff, Morgan McSweeney, used his Labour Together think tank to back Sir Keir.
Escalation in Akira Campaign Targeting SonicWall VPNs, Deploying Ransomware, With Malicious Logins
Friday the security researchers at Arctic Wolf Labs wrote:
In late July 2025, Arctic Wolf Labs began observing a surge of intrusions involving suspicious SonicWall SSL VPN activity. Malicious logins were followed within minutes by port scanning, Impacket SMB activity, and rapid deployment of Akira ransomware. Victims spanned across multiple sectors and organization sizes, suggesting opportunistic mass exploitation.
This campaign has recently escalated, with new infrastructure linked to it observed as late as September 20, 2025.
More from Cybersecurity News:
SonicWall has linked these malicious logins to CVE-2024-40766, an improper access control vulnerability disclosed in 2024. The working theory is that threat actors harvested credentials from devices that were previously vulnerable and are now using them in this campaign, even if the devices have since been patched. This explains why fully patched devices have been compromised, a fact that initially led to speculation about a potential zero-day exploit.
Once inside a network, the attackers operate with remarkable speed. The time from initial access to ransomware deployment, known as "dwell time," is often measured in hours, with some intrusions taking as little as 55 minutes, Arctic Wolf said. This extremely short window for response makes early detection critical.
"Threat actors in the present campaign successfully authenticated against accounts with the one-time password (OTP) MFA feature enabled..." notes Artic Wolf Labs:
The threats described in this campaign demand early detection and a rapid response to avoid catastrophic impact to organizations. To facilitate this process, we recommend monitoring for VPN logins originating from untrusted hosting infrastructure. Equally important is ensuring visibility into internal networks, since lateral movement and ransomware encryption can occur within hours or even minutes of initial access. Monitoring for anomalous SMB activity indicative of Impacket use provides an additional early detection opportunity.
When firewalls are confirmed to be running firmware versions vulnerable to credential access or full configuration export, patching alone is not enough. In such situations, credentials must be reset wherever possible, including MFA-related secrets that might otherwise be thought of as secure, and Active Directory credentials with VPN access. These considerations are best practices that apply regardless of which firewall products are in use.
Thanks to Slashdot reader Mirnotoriety for suggesting this story.
Read more of this story at Slashdot.
Adolescence star Owen Cooper, 15, looks stylish in a brown zip-up jacket as he attends the Bottega Veneta show during Milan Fashion Week - after becoming youngest ever male Emmy winner
The Adolescence star, 15, showcased his style as he arrived at the glitzy event in a brown jacket, which he paired with light brown trousers.
Gangland armourer who advertised machine guns to some of Britain's most terrifying criminals on EnchroChat and plotted to blind man with acid is jailed for 26 years
Philip Waugh armed organised crime groups across the UK with military grade weapons which he would flog on the now-defunct encrypted messaging platform Encrochat.
Thomas Skinner's first Strictly dance branded 'car crash' as Amy Dowden supports him
The Apprentice star Thomas Skinner is partnered with Amy Dowden on Strictly Come Dancing this year.
The quiet Essex pub with wonderful beer garden named among the best in England
The pub is hidden in a residential area and loved by punters
Strictly Come Dancing's Alexis Warr pokes fun at celebrity partner George Clarke's nepo baby status - and fans can't get over who his famous dad is
George, 25, shot to fame on YouTube and has quickly become one of the UK's top content creators.
Bundler's Lead Maintainer Asserts Trademark in Ongoing Struggle with Ruby Central
After the nonprofit Ruby Central removed all RubyGems' maintainers from its GitHub repository, André Arko — who helped build Bundler — wrote a new blog post on Thursday "detailing Bundler's relationship with Ruby Central," according to this update from The New Stack.
"In the last few weeks, Ruby Central has suddenly asserted that they alone own Bundler," he wrote. "That simply isn't true. In order to defend the reputation of the team of maintainers who have given so much time and energy to the project, I have registered my existing trademark on the Bundler project."
He adds that trademarks do not affect copyright, which stays with the original contributors unchanged. "Trademarks only impact one thing: Who is allowed say that what they make is named 'Bundler,'" he wrote. "Ruby Central is welcome to the code, just like everyone else. They are not welcome to the project name that the Bundler maintainers have painstakingly created over the last 15 years."
He is, however, not seeking the trademark for himself, noting that the "idea of Bundler belongs to the Ruby community." "Once there is a Ruby organization that is accountable to the maintainers, and accountable to the community, with openly and democratically elected board members, I commit to transfer my trademark to that organization," he said. "I will not license the trademark, and will instead transfer ownership entirely. Bundler should belong to the community, and I want to make sure that is true for as long as Bundler exists."
The blog It's FOSS also has an update on Spinel, the new worker-owned collective founded by Arko, Samuel Giddins [who Giddins led RubyGems security efforts], and Kasper Timm Hansen (who served served on the Rails core team from 2016 to 2022 and was one of its top contributors):
These guys aren't newcomers but some of the architects behind Ruby's foundational infrastructure. Their flagship offering is rv ["the Ruby swiss army knife"], a tool that aims to replace the fragmented Ruby tooling ecosystem. It promises to [in the future] handle everything from rvm, rbenv, chruby, bundler, rubygems, and others — all at once while redefining how Ruby development tools should work... Spinel operates on retainer agreements with companies needing Ruby expertise instead of depending on sponsors who can withdraw support or demand control. This model maintains independence while ensuring sustainability for the maintainers.
The Register had reported Thursday:
Spinel's 'rv' project aims to supplant elements of RubyGems and Bundler with a more modular, version-aware manager. Some in the Ruby community have already accused core Rails figures of positioning Spinel as a threat. For example, Rafael FranÃa of Shopify commented that admins of the new project should not be trusted to avoid "sabotaging rubygems or bundler."
Read more of this story at Slashdot.
Big Brother FIRST LOOK: Diary Room chair gets an eye-popping makeover ahead of the series' return
Big Brother returns to TV screens on Sunday, in what will mark the 25th anniversary of the original social experiment.
How Meghan crafted her public persona after Princess Diana - even BEFORE she married Harry
The parallels between the Duchess of Sussex and Princess Diana have often been strikingly familiar
Rachel Reeves says Keir Starmer's leadership rival Andy Burnham should stick to current job as rumours 'swirl' over potential challenge
Greater Manchester mayor Andy Burnham claims Labour MPs want him to launch a leadership bid against Sir Keir Starmer, who faces a major bout of party infighting.
Teri Hatcher, 60, posts bra-less snap in wet white tank top as she splashes around in African lagoon
Her exquisitely toned physique was on display in the sheer clinging fabric, and she had an exuberant smile on her face as she waded around in the water.
Archaeologists dig in search for body lost WWII pilot in Essex field
2nd Lieutenant Lester Leo Lowry was just 23 when his fighter plane plunged into the ground on a cloudy day in 1944. But there was no sign of a body
George Galloway and wife arrested by counter-terrorism police after landing at Gatwick airport - as he complains of 'intimidation'
The former MP George Galloway and his wife have been arrested by counter-terrorism police at Gatwick airport.
Epping anti-migrant protests have cost £1.6million to police so far - and show no signs of stopping any time soon
Thousands have attended protests at the The Bell Hotel in Epping sparked after an asylum seeker living in the hotel was charged and later convicted of sexually assaulting a teenage girl.
Did Microsoft Hide Key Data Flow Information In Plain Sight?
An anonymous reader shared this report from Computer Weekly:
Policing data hosted in Microsoft's hyperscale cloud infrastructure could be processed in more than 100 countries, but the tech giant is obfuscating this information from its customers, Computer Weekly can reveal. According to documents released by the Scottish Police Authority (SPA) under freedom of information (FoI) rules, Microsoft refused to hand over crucial information about its international data flows to the SPA and Police Scotland when asked...
The tech giant also refused to disclose its own risk assessments into the transfer of UK policing data to other jurisdictions, including China and others deemed "hostile" in the DPIA documents. This means Police Scotland and the SPA — which are jointly rolling out Office 365 — are unable to satisfy the law enforcement-specific data protection rules laid out in Part Three of the Data Protection Act 2018 (DPA18), which places strict limits on the transfer of policing data outside the UK. The same documents also contain an admission from Microsoft — given while simultaneously refusing to divulge key information about data flows — that it is unable to guarantee the sovereignty of policing data held and processed within its O365 infrastructure. This echoes the statements senior Microsoft representatives made to the French senate in June 2025, in which they admitted the company cannot guarantee the sovereignty of European data stored and processed in its services generally.
The revelation that Microsoft may access customer data from more than 100 countries is a result of the correspondence previously disclosed under Freedom of Information and reported on by Computer Weekly... All in all, an analysis of Microsoft's distributed documentation — conducted by independent security consultant Owen Sayers and shared with Computer Weekly — suggests that Microsoft personnel or contractors can remotely access the data from 105 different countries, using 148 different sub-processors. Despite technically being public, Sayers highlighted how this information is not transparently laid out for Microsoft customers, and is distributed across different documents contained in non-indexed webpages.... "[A]ny normal amount of due diligence — even if it is conducted by skilled persons will likely fail to see the full scope of offshoring in play," he said...
Microsoft did not contest the accuracy of the remote access location figures cited by Computer Weekly in this story.
Read more of this story at Slashdot.
Kim Kardashian is upstaged by tween daughter North West, 12, at her own NikeSKIMS event
The 44-year-old SKIMS founder brought her 12-year-old firstborn to celebrate her brand's collaboration with Nike at its store opening at The Grove.
Strictly Come Dancing viewers spot major blunder within seconds after Dani Dyer exit
Dani Dyer was forced to withdraw from the BBC competition Strictly Come Dancing last week after suffering an injury in training
Fans go wild as brave Erika Kirk appears on Charlie's podcast: 'My husband's voice will live on'
The 36-year-old widow and mother of two appeared alongside his close colleagues and friends on 'The Charlie Kirk Show' on Friday.
The Essex fish and chip shop loved by TV star Stacey Solomon
She enjoyed a chippy dinner for her son's birthday