Search
Items tagged with: Security
Supply chain attack hits 300 million-download Axios npm package
Supply chain attack hits 300 million-download Axios npm package
Huge blast radius as popular package is compromised with RAT.iTnews
This is what a #WitchHunt actually looks like
Exclusive: US “counterterror” officials plan #antifa summit, sources say
The #Trump admin is organizing an international summit focused on countering the #LeftWing movement antifa & other groups, 3 sources familiar with the matter said, an effort that highlights the shift in the US government's counterterrorism priorities over the past year.
#AntiFascism #resist #law #security #fascism #FarRight #authoritarianism #tyranny
reuters.com/world/us/us-counte…
Federal cyber experts called Microsoft's cloud a "pile of shit," approved it anyway
One Microsoft product was approved despite years of concerns about its security.ProPublica (Ars Technica)
"According to The Guardian, which first reported on the deal, Palantir will gain access to data including case files, reports from banks and crypto firms, and even communications data such as emails, phone records, and social media material tied to investigations."
Dear UK.Gov
You do realise that by giving #Palantir access to this information, you've also granted the US government access thereto, don't you? 🤦♂️
theregister.com/2026/03/23/pal…
Palantir trial plugs into UK financial watchdog's data trove
: US analytics firm handed access to sensitive intel, raising yet more questions about vendor lock-inCarly Page (The Register)
Yo guys, check out this article.
Google bumps up Q Day deadline to 2029, far sooner than previously thought
Company warns entire industry to move off RSA and EC more quickly.Dan Goodin (Ars Technica)
What?!? #Extortion!
Exclusive: #US links #security guarantees to #Ukraine giving up #Donbas, #Zelensky says
The US is making its offer of security guarantees for a peace deal in Ukraine conditional on Kyiv ceding all of the country's eastern region of Donbas to #Russia, President Volodymyr Zelensky told Reuters in an interview.
#MafiaState #law #InternationalLaw #geopolitics #Europe #NATO #Trump #PutinsPuppet #StandWithUkraine
reuters.com/business/aerospace…
Your data is everywhere. The government is buying it without a warrant
A whole industry of data brokers buys up vast quantities of electronic information from cell phone apps and web browsers and sells it to advertisers who use that data to target ads. The same industry also sells that data, including bulk cell phone location data, to police departments and federal government agencies in ways that can reveal intimate details about Americans without a warrant.\
\
Now, privacy advocates say that the best chance for Congress to close the well-known loophole around the Fourth Amendment that allows for that sort of governmental snooping is coming up in just a few weeks.\
\
That's when Congress is expected to take up reauthorization of what is known as Section 702 of the Foreign Intelligence Surveillance Act, which is set to expire on April 20.
#privacy #security #surveillance #wyden #section-702 #gabbard #tulsi-gabbard #ron-wyden #congress #usa #human-rights #data-brokers #perverts #perversion #voyeurism #smartphones #smart-phones
VulnMCP 1.0.0 released
VulnMCP 1.0.0 released
We are excited to share a new project we have been working on: VulnMCP VulnMCP is an MCP server that brings vulnerability intelligence directly into AI clients, chat agents, and automated workflows.www.vulnerability-lookup.org
🐛 NEW SECURITY CONTENT 🐛
💻 macOS Tahoe 26.4 - 77 bugs fixed
support.apple.com/en-us/126794
💻 macOS Sequoia 15.7.5 - 60 bugs fixed
support.apple.com/en-us/126795
💻 macOS Sonoma 14.8.5 - 54 bugs fixed
support.apple.com/en-us/126796
📱 iOS and iPadOS 26.4 - 38 bugs fixed
support.apple.com/en-us/126792
🥽 visionOS 26.4 - 29 bugs fixed
support.apple.com/en-us/126799
📱 iOS and iPadOS 18.7.7 - 25 bugs fixed
support.apple.com/en-us/126793
⌚ watchOS 26.4 - 22 bugs fixed
support.apple.com/en-us/126798
📺 tvOS 26.4 - 17 bugs fixed
support.apple.com/en-us/126797
⌚ watchOS 8.8.2 - no CVE entries
⌚ watchOS 5.3.10 - no CVE entries
#apple #cybersecurity #infosec #security #ios
About the security content of iOS 26.4 and iPadOS 26.4 - Apple Support
This document describes the security content of iOS 26.4 and iPadOS 26.4.Apple Support
Supply Chain Attack in litellm 1.82.8 on PyPI
Supply Chain Attack in litellm 1.82.8 on PyPI
litellm version 1.82.8 on PyPI contains a malicious .pth file that harvests SSH keys, cloud credentials, and secrets on every Python startup, then attempts lateral movement across Kubernetes clusters.Callum McMahon (FutureSearch)
Someone has publicly leaked an exploit kit that can hack millions of iPhones
Someone has publicly leaked an exploit kit that can hack millions of iPhones | TechCrunch
Leaked "DarkSword" exploits published to GitHub allow hackers and cybercriminals to target iPhone users running old versions of iOS with spyware, according to cybersecurity researchers.Zack Whittaker (TechCrunch)
Trivy Compromised by "TeamPCP" | Wiz Blog
Trivy Compromised: Everything You Need to Know about the Latest Supply Chain Attack
On March 19, 2026, threat actors injected credential-stealing malware into Aqua Security’s Trivy scanner and related GitHub Actions. Learn how "TeamPCP" executed this breach and how to audit your environment.Rami McCarthy (Wiz.io)
cpe-guesser 2.0 released
cpe-guesser 2.0 released - Multi-Source CPE Imports, Better Ranking, and Greater Autonomy Beyond NVD
cpe-guesser 2.0 releasedOverview Version 2.0 brings major improvements to CPE import, ranking, and CVE v5 data handling.www.vulnerability-lookup.org
Vulneratility-Lookup 4.2.0
AUMA - Solutions for a world in motion
AUMA entwickelt und baut seit 50 Jahren elektrische Stellantriebe und Armaturengetriebe und zählt heute zu den international führenden Herstellern der Branche.auma.com
North Korean's 100k fake IT workers net $500M a year for Kim
theregister.com/2026/03/18/res…
#tech #technology #news #technews #security #privacy #politics #northkorea
North Korea's 100,000-strong fake IT worker army rake in $500M a year for Kim Jong Un
: Researchers map full org chart of the scam from dodgy recruiters to helpful Western collaboratorsDan Robinson (The Register)
Ubuntu: root-Lücke durch snapd | heise online - Deutschland
Eine Schwachstelle in den Standard-Installationen von Ubuntu Desktop ermöglicht Angreifern, auf verwundbaren Systemen root-Rechte zu erlangen. Damit könnenDeutschland
Palantir, the US AI surveillance and security firm with hundreds of millions of pounds in UK government contracts, poses “a national security threat to the UK”, according to two anonymous MoD senior systems engineers with knowledge of the Palantir software systems the MoD is using.
#Palantir #MoD #Security #UKPolitics
‘It beggars belief’: MoD sources warn Palantir’s role at heart of government is a threat to UK’s security
thenerve.news/p/palantir-techn…
‘It beggars belief’: MoD sources warn Palantir’s role at heart of government is threat to UK’s security
Experts say that claims UK data remains under government ownership miss the point that the company has the capability to build its own detailed picture of the British population, and even infer state secrets.Charlie Young (The Nerve)
Supply-chain attack using invisible code hits GitHub and other repositories
Supply-chain attack using invisible code hits GitHub and other repositories
Unicode that's invisible to the human eye was largely abandoned—until attackers took notice.Dan Goodin (Ars Technica)
45,000 malicious IP addresses taken down in international cyber operation
45,000 malicious IP addresses taken down in international cyber operation
Police make 94 arrests in INTERPOL-coordinated operationwww.interpol.int
Joråsåatteeehhh...
webperf.se/articles/sapo-soker…
#security #intelligence #privacy
Säpo söker spioner som kan hålla tyst – men läcker deras identitet till USA
"Du bör inte berätta att du sökt tjänst hos Säkerhetspolisen för andra personer än dina närmast berörda."Pierre Mesure (webperf.se)
AI Agent Hacks McKinsey
How We Hacked McKinsey's AI Platform
An autonomous AI agent found a SQL injection in McKinsey's Lilli AI platform. What it extracted was worse than we expected.codewall.ai
GitHub - Bombadil-Systems/zombie-zip: Malformed ZIP archive that evades antivirus detection by declaring Method=0 (stored) while containing DEFLATE-compressed payload.
Not solved problem since 20 years
See also kb.cert.org/vuls/id/976247
GitHub - Bombadil-Systems/zombie-zip: Malformed ZIP archive that evades antivirus detection by declaring Method=0 (stored) while containing DEFLATE-compressed payload.
Malformed ZIP archive that evades antivirus detection by declaring Method=0 (stored) while containing DEFLATE-compressed payload. - Bombadil-Systems/zombie-zipGitHub
Hundreds of scientists say stop! ✋🚨
Governments should pause plans for mandatory #AgeChecks on online services until serious #privacy and #security concerns are addressed.
As countries push to ban children from social media, the risk to everyone’s privacy is growing. 🔐🌍
👉 Read more on #AgeVerification, why scientist say NO & whether your country wants it: tuta.com/blog/age-verification…
Age Verification: What countries require you to perform ID checks & for what websites and platforms? | Tuta
Will the age verification era kill anonymity? As more countries are passing age verification laws, let's take a look at what countries already require it, and for what services, online sites,and social media platforms.Tuta
Google Safe Browsing missed 84% of phishing sites we found in February
Huginn Report: February 2026 | Norn Labs
Google Safe Browsing missed 84% of confirmed phishing sites in our dataset. Here's what we found and what it means.www.norn-labs.com
Global phishing-as-a-service platform taken down in coordinated public-private action
Global phishing-as-a-service platform taken down in coordinated public-private action
A major phishing-as-a-service platform used to bypass multi-factor authentication (MFA) and enable large-scale account compromise has been disrupted following a coordinated international operation supported by Europol.Europol
Motorola partners with GrapheneOS at MWC 2026 to bring the de-Googled, privacy-hardened OS to future phones beyond Pixel exclusivity. 🔒
Ends Google's hardware monopoly for serious privacy users, with joint work on security features and pre-installed GrapheneOS devices expected 2027. 📱
🔗 itsfoss.com/news/motorola-grap…
#TechNews #Privacy #GrapheneOS #Motorola #Android #Google #DeGoogle #Security #OpenSource #Smartphones #Pixel #MWC #Linux #FOSS #Data #Freedom #Mobile #Security
Tired of Google's Tracking? Motorola's GrapheneOS-Powered Phones Are Coming
You won't need to pay Google for using GrapheneOS soon.Sourav Rudra (It's FOSS)
LOL on this sentence about Amazon data centers being hit by Iranian drones.
"They also have physical security, but those measures, including security guards, fences, video surveillance and alarm systems, are designed to keep out intruders rather than defend against missile attacks."
New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises
Network and Distributed System Security (NDSS) Symposium 2026 - NDSS Symposium
Join us at the NDSS Symposium 2026 from 23 to 27 February 2026. View the submissions, leadership, and much more.NDSS Symposium
hackerbot-claw: An AI-Powered Bot Actively Exploiting GitHub Actions
hackerbot-claw: An AI-Powered Bot Actively Exploiting GitHub Actions - Microsoft, DataDog, and CNCF Projects Hit So Far - StepSecurity
A week-long automated attack campaign targeted CI/CD pipelines across major open source repositories, achieving remote code execution in at least 4 out of 5 targets.www.stepsecurity.io
Vulnerability Report - February 2026
VLAI: A RoBERTa-Based Model for Automated Vulnerability Severity Classification
This paper presents VLAI, a transformer-based model that predicts software vulnerability severity levels directly from text descriptions.arXiv.org
