Search
Items tagged with: Cybersecurity
What is the Real Relationship between WordPress Hackers and Malicious Adtech?
A cabal of Russian-nexus adtech companies are the cybercriminal choice to drive users to scams and malware from millions of compromised sites.Infoblox Threat Intel (Infoblox)
Digital Revolutionary #zine is now free for 24 hours only: patreon.com/posts/free-digital…
7-page .pdf and .epub zine: Lock down your phone or find out how to prepare a burner, learn to move in crowds and what to do if things get violent, make DIY digital protest tools, understand how you'll be surveilled, and find resources for storing media and remotely locking and erasing your phone, if need be.
There's also a crossword puzzle and powerful laser Kiwis.
Freshly printed copies of the 'Digital Revolutionary zine are on the bar at DNA Lounge in San Francisco right now! It looks great! 🥳
Get a copy and printable files here: patreon.com/posts/free-digital…
###
Hidden Bear: The GRU hackers of Russia’s most notorious kill squad
source: theins.press/en/inv/281731
Russian GRU Unit #29155 is best known for its long list of murder and #sabotage ops, which include the #Salisbury poisonings in England, arms depot explosions in Czechia, and an attempted coup d’etat in #Montenegro. But its activities in #cyberspace remained in the shadows — until now. After reviewing a trove of hidden data, The Insider can report that the #Kremlin’s most notorious black ops squad also fielded a team of hackers — one that attempted to destabilize Ukraine in the months before Russia’s full-scale #invasion.
#hack #hacker #cybersecurity #russia #news #gru #bear #putin #cyberwar #news #FancyBear
Hidden Bear: The GRU hackers of Russia’s most notorious kill squad
Russian GRU Unit 29155 is best known for its long list of murder and sabotage ops, which include the Salisbury poisonings in England, arms depot explosions in Czechia, and an attempted coup d’etat in Montenegro.Christo Grozev (The Insider)
New:
We take deep breaths and center ourselves by visualizing burning Waymos, Trump admin ends sanctions against countries for election hacking, @wired.com recoils from Temu’s peeing attack robot dog, a look at the Pet Hacks Challenge 2025, Taiwan shortens time between #Covid boosters to two months, all vaccine advisors have been fired from the US CDC, and more:
#Trump executive order takes steps to protect domestic #hackers from blowback
Source: politico.com/news/2025/06/06/t…
Some #cybersecurity experts on Friday criticized the order as undermining the nation’s cybersecurity.
#security #hack #hacker #internet #usa #law #government #WhiteHouse #Problem #fail #news
"Meta and Yandex are de-anonymizing Android users’ web browsing identifiers
Abuse allows Meta and Yandex to attach persistent identifiers to detailed browsing histories. "
Millions of people in the UK using jailbroken or hacked Amazon Fire Sticks could face jail time in a latest nationwide crackdown.
#UK #hack #Amazon #cybersecurity
Trump scraps Biden software security, AI, post-quantum encryption efforts in new executive order
The White House accused the Biden administration of trying to “sneak problematic and distracting issues into cybersecurity policy.”Eric Geller (Cybersecurity Dive)
Agentic AI and the risks of unpredictable autonomy - Help Net Security
Threat modeling should be conducted alongside AI systems. As the system design evolves, the threat model should be updated accordingly.Mirko Zorz (Help Net Security)
New Threat Model:
-A major AI company was revealed to be an Indian code sweatshop
-Trump’s massive CISA cuts signal retreat from defense functionality
-The Russian strategic bomber version of all my apes are gone
-Justin Trudeau’s cool spy phone
-An app to track urine tank levels on the International Space Station
More, always more:
Is #Musk’s New #XChat #Bitcoin #Encryption Too Good to Be True? (Spoiler: NO!!!!😱)
source: cryptorank.io/news/feed/16934-…
However, as some #cryptography experts have pointed out, Bitcoin itself does not #encrypt #transactions, but rather signs them, so that the ”Bitcoin-style encryption” label is more of a #marketing phrase than an engineering term.
#chat #messenger #communication #security #cybersecurity #economy #ElonMusk #fail #problem #software #news #privacy #knowhow #crypto #knowledge
Is Musk’s New XChat Bitcoin Encryption Too Good to Be True?
XChat’s new end-to-end encryption draws on Bitcoin’s cryptography, but will it deliver true privacy or just spark confusion among users and experts?Coinpaper (CryptoRank)
The exploitation of vulnerabilities in Apport and systemd-coredump can severely compromise the confidentiality at high risk, as attackers could extract sensitive data, like #passwords, #encryption keys, or customer information from core dumps.
source: blog.qualys.com/vulnerabilitie…
#linux #problem #vulnerability #coredump #software #danger #warning #news #os #cybersecurity #security #password #dump #exploit
Qualys TRU Discovers Two Local Information Disclosure Vulnerabilities in Apport and systemd-coredump: CVE-2025-5054 and CVE-2025-4598
The Qualys Threat Research Unit (TRU) has discovered two local information-disclosure vulnerabilities in Apport and systemd-coredump. Both issues are race-condition vulnerabilities.Saeed Abbasi (Qualys)
In nur 3 Minuten könnt ihr euer #Smartphone effektiv vor Angriffen schützen: PIN & Sperrbildschirm aktivieren, Software aktuell halten, vertrauenswürdige Apps nutzen, Schnittstellen nur bei Bedarf einschalten.
👉️ Mehr Tipps vom #BSI: bsi.bund.de/dok/386642
#Sicherheit #Cybersecurity
Wegweiser für den digitalen Alltag: Smartphone, Tablet & Co sicher nutzen
9 Tipps zum Umgang mit mobilen Geräten Format: DIN A6 Aktuell vergriffenBundesamt für Sicherheit in der Informationstechnik
secured #communication: mbuf.net/messaging
#messenger #software #cybersecurity #security #encryption
Confidential communications
Use safe messenger to apply for private communications Private and confidential communications is key to mandatory privacy and democracy models.jma@ web site
SentinelOne suffers seven-hour global outage caused by infrastructure software flaw
SentinelOne, a major cybersecurity company, experienced a seven-hour global service outage on May 29, 2025, caused by a software flaw during cloud infrastructure migration that disrupted customer access to security management consoles across 10 platform services. The endpoint protection remained active. The incident was a service availability issue with no data exposure or theft.
****
#cybersecurity #infosec #incident #ransomware
beyondmachines.net/event_detai…
SentinelOne suffers seven-hour global outage caused by infrastructure software flaw
SentinelOne, a major cybersecurity company, experienced a seven-hour global service outage on May 29, 2025, caused by a software flaw during cloud infrastructure migration that disrupted customer access to security management consoles across 10 platf…BeyondMachines
#Law Enforcement Can #Break 77% Of ‘Three Random Word’ #Passwords: forbes.com/sites/daveywinder/2…
#password #security #cybersecurity #justice #software #news
Law Enforcement Can Break 77% Of ‘Three Random Word’ Passwords
It’s time to change how you create your passwords — here’s what you need to know.Forbes
Time to change your Netflix password? Millions of login details have leaked, according to a cybersecurity report – and it’s not just Netflix
Netflix, Prime Video, Disney+, and more hitMatt Bolton (TechRadar)
Coca Cola hacked: cybernews.com/security/coca-co…
#cybersecurity #ransomware #cybercrime #leack #economy #security #news #internet #hack
Mysterious #Database of 184 Million Records Exposes Vast Array of #Login #Credentials
source: wired.com/story/mysterious-dat…
#cybersecurity #socialmedia #hack #hacker #security #internet #problem #cybercrime #news #breach
Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
A trove of breached data, which has now been taken down, includes user logins for platforms including Apple, Google, and Meta. Among the exposed accounts are ones linked to dozens of governments.Matt Burgess (WIRED)
The Russian secret service targeted airports, the defense and logistics industry, the maritime sector, trains, IT companies, and air traffic control.
#Russia #cybersecurity #hack #IT
New #Plex update is out and while I didn't test it, you may want to update because this "sounds" like it may have been allowing some kind of directory traversal.
Massachusetts hacker to plead guilty to PowerSchool data breach:
investing.com/news/stock-marke…
Related:
DOJ Press release: justice.gov/usao-ma/pr/worcest…
USA v. Matthew D. Lane - Information: justice.gov/usao-ma/media/1400…
USA v. Matthew D. Lane - Plea Agreement:
justice.gov/usao-ma/media/1400…
#databreach #PowerSchool #EduSec #cybersecurity
@douglevin @funnymonkey @brett @mkeierleber
Worcester College Student to Plead Guilty to Cyber Extortions
BOSTON – A student at Assumption University in Worcester, Mass., has been charged, and has agreed to plead guilty, in connection with hacking into the computer networks of two U.S.-based companies and extorting the companies for ransoms.www.justice.gov
I will not win awards for pretty UX, but it works and is coming together.
Incredibly excited to launch the beta-version and get some feedback from all who have asked to participate in the closed beta.
Each primary category of content has a number of subcategories. The initial version will "only" allow you to configure which primary categories you're interested in, but later versions will also allow you to configure subcategories.
And these categories are likely to change with time and as I learn even more about what works ... and likely doesn't.
Cyber Espresso
Get the the best cybersecurity content from 260 high-quality sources with promotional and marketing content removed, delivered as personalized RSS-feeds, via API or email.www.cyberespresso.eu
DETECTING MALICIOUS #UNICODE
Source: daniel.haxx.se/blog/2025/05/16…
#cybersecurity #security #uri #software #coder #hacker #developer #program #news
Detecting malicious Unicode
In a recent educational trick, curl contributor James Fuller submitted a pull-request to the project in which he suggested a larger cleanup of a set of scripts.daniel.haxx.se