Mozilla 宣布为 Firefox 用户提供禁用所有 AI 功能的选项。从 2 月 24 日推出的 Firefox 148 起,用户可以在设置中启用“Block AI enhancements”选项,一旦启用,用户将不会看到任何现在或未来 AI 功能的弹出窗口或提醒。新的 AI 控制选项还允许用户单独管理各项 AI 功能。Mozilla 新 CEO Anthony Enzor-DeMeo 表示,AI 应该始终是一种选择,可以关闭,让用户知道如何运作,能带来什么价值。
知情人士透露,微软正在重新评估 Windows 11 的 AI 战略,收缩或移除 Windows 内置应用与 AI 应用 Copilot 的集成。过去几个月 Windows 深度整合 AI 遭遇了用户的强烈反对。微软正在评估记事本和画图等应用中的 Copilot 功能,可能会完全移除相关功能或移除 Copilot 标识以提供更简洁的用户体验。微软已经暂停了在其它内置应用中引入 Copilot 按钮的工作。早先引发争议的 Windows Recall 功能也在接受评估,微软内部认为目前的实现方案是失败的,探索重新设计或重命名该功能,但没有完全放弃。
Class Action Stems From 2023 Ransomware Attack Affecting More Than 500,000 Capital Health, which operates hospitals and other facilities in New Jersey and Pennsylvania, agreed to pay $4.5 million to settle consolidated class action litigation involving a 2023 LockBit ransomware and data theft attack affecting more than a 500,000 patients and employees.
ITRC Report: 2025 Breach Notices Lack Critical Details as AI-Based Attacks Surge The Identity Theft Resource Center tracked a record 3,322 U.S. data breaches in 2025, more than any previous year. Yet, only 30% of breach notices included actionable details that other defenders need. ITRC's James Lee warns that this lack of transparency puts people and businesses at greater risk.
CEO David Bellini Says Level Equity Investment Accelerates AI and Acquisitions CyberFox has raised a nine-figure growth investment from Level Equity marking its first outside capital after years of bootstrapping. CEO David Bellini says the funding will fuel AI-driven development international expansion and acquisitions as the company builds a full cybersecurity platform.
New NSA Guidance Demands Continuous Access Checks, Implementation Overhaul The National Security Agency's new zero trust guidance instructs agencies to move beyond login-based security by continuously assessing user behavior and app-layer activity in real time, aiming to close gaps that allow post-authentication abuse and elevate federal defenses against modern threats.
A vulnerability, which was classified as critical, has been found in Linux Kernel. The affected element is the function x86_match_min_microcode_rev. Performing a manipulation results in memory corruption.
This vulnerability is identified as CVE-2025-68195. The attack can only be performed from the local network. There is not any exploit available.
To fix this issue, it is recommended to deploy a patch.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.17.7 on ARM64. The impacted element is the function qmi_wwan of the component net. Executing a manipulation can lead to uninitialized pointer.
This vulnerability is tracked as CVE-2025-68192. The attack is only possible within the local network. No exploit exists.
You should upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 6.17.7. This impacts the function send_packet. Performing a manipulation results in privilege escalation.
This vulnerability is identified as CVE-2025-68194. The attack can only be performed from the local network. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability labeled as critical has been found in Linux Kernel up to 6.17.7. The affected element is the function netdev_warn of the component udp_tunnel. The manipulation results in allocation of resources.
This vulnerability was named CVE-2025-68191. The attack needs to be approached within the local network. There is no available exploit.
The affected component should be upgraded.