Search
Items tagged with: Security
The PAM Duress is a module designed to allow users to generate 'duress' passwords that when used in place of their normal password will execute arbitrary scripts.
This functionality could be used to allow someone pressed to give a password under coercion to provide a password that grants access but in the background runs scripts to clean up sensitive data, close connections to other networks to limit lateral movement, and/or to send off a notification or alert (potentially one with detailed information like location, visible wifi hot-spots, a picture from the camera, a link to a stream from the microphone, etc). You could even spawn a process to remove the pam_duress module so the threat actor won't be able to see if the duress module was available.
#security #Linux #Arch #Debian
GitHub - nuvious/pam-duress: A Pluggable Authentication Module (PAM) which allows the establishment of alternate passwords that can be used to perform actions to clear sensitive data, notify IT/Security staff, close off sensitive network connections, etc
A Pluggable Authentication Module (PAM) which allows the establishment of alternate passwords that can be used to perform actions to clear sensitive data, notify IT/Security staff, close off sensit...GitHub
A Libre Architecture for Verifiable Data Collection and Proof-of-Check Timestamping
Vulnerability Report - December 2025
LevelBlue SpiderLabs: SQL Injection in Orkes Conductor: CVE-2025-66387
LevelBlue SpiderLabs discovered a vulnerability in the Orkes Conductor platform that allows attackers to perform SQL injection attacks against PostgreSQL.Tim Stamopoulos (Trustwave Holdings, Inc.)
auto-encrypt-localhost
Automatically provisions and installs locally-trusted TLS certificates for Node.js https servers in 100% JavaScript (without any native dependencies like mkcert and certutil).Codeberg.org
Ni8mare - Unauthenticated Remote Code Execution in n8n (CVE-2026-21858) | Cyera Research Labs
Critical n8n Vulnerability Allows Unauthenticated Remote Code Execution (CVE-2026-21858)
A critical vulnerability in n8n (CVE-2026-21858) allows unauthenticated remote code execution on self-hosted instances. Learn who is affected and how to remediate.Sooraj Shah (Aikido Security)
Dozens of Global Companies Hacked via Cloud Credentials from Infostealer Infections & More at Risk
BIG - We just uncovered dozens of companies hacked via cloud credentials from Infostealer infections, Terabytes of their data is actively being sold by a threat actor affiliated with a ransomware group (tl;dr below 🔽 )
BIG - We just uncovered dozens of companies hacked via cloud credentials from Infostealer infections, Terabytes of their data is actively being sold by a threat actor affiliated with a ransomware group (tl;dr below 🔽 ) 📰 New Blog - https://lnkd.Alon Gal (www.linkedin.com)
China hacked email systems of US congressional committee staff
China hacked email systems of US congressional committee staff
Beijing’s intelligence used Salt Typhoon to access communications used by top panels in US CongressDemetri Sevastopulo (Financial Times)
As our company hosts servers, we have a public Security Policy and a security.txt file for ethical hackers to disclose vulnerabilities responsibly: handbook.dude.fi/security-poli…
Because of this, I receive quite a few reports, most of them ineligible. I've also run into some "security experts" getting upset about not receiving a bounty for a non-issue or putting heavy pressure on payments for valid ones. It often feels unfair, like I'm being held hostage.
That's why replies like the one I just received warm my heart so much:
"Thank you very much for the clarification and for taking quick action to remove the DNS record. I appreciate the transparency and the kind offer as well.
I'd prefer to donate the amount to a child support charity instead. You’re very welcome to donate it on my behalf to any such organization of your choice."
Donation made. Thank you, stranger. Kindness costs nothing.
After my assembly #39c3 talk on the topic, here’s a more in-depth analysis on the #security of data and metadata in #XMPP : blog.mathieui.net/xmpp-and-met…
I’m sure I missed a lot of things, but since the only reference on the topic is the - now defunct - infosec handbook website with the "admin in the middle" article, I guess that could be useful to somebody.
"MongoBleed": Exploit for critical vulnerability in MongoDB makes attacks easier
"MongoBleed": Exploit for critical vulnerability in MongoDB makes attacks easier
Those responsible for a MongoDB instance cannot rest easy: an exploit for a critical vulnerability makes upgrades even more urgent now.Martin Holland (heise online)
Bluetooth Headphone Jacking: A Key to Your Phone
Bluetooth Headphone Jacking: A Key to Your Phone
Bluetooth headphones and earbuds are everywhere, and we were wondering what attackers could abuse them for. Sure, they can probably do th...media.ccc.de
#law #Congress #WarPowers #Trump #abduction #Venezuela #oil #sovereignty #WarCrimes #InternationalLaw
The #UN #Security Council will convene an emergency meeting on Monday morning to discuss #US strikes in #Venezuela. #Russia, #China & #Colombia asked for the meeting after Venezuela’s mission to the UN wrote a letter to the Council president requesting the meeting to condemn & stop US strikes on the country. Secy Gen António Guterres is expected to address the #UNSC Monday. He said in a statement earlier that all sides must uphold #InternationalLaw & the #UNcharter.
The #Venezuela mission to the #UN has requested an emergency #Security Council [#UNSC] meeting & has asked the Council to condemn the #US military strikes against the country.
Venezuela’s ambassador, Samuel Reinaldo Moncada Acosta, said in a letter to the UNSC president: “The United States of America always uses lies to fabricate wars. It is an international #tyranny imposed with the #propaganda of death: the recent past confirms this.”
#China called on the #US to comply with #InternationalLaw & the principles of the #UN Charter, urging it to stop violating the #sovereignty & #security of other nations.
#law #Congress #WarPowers #criminal #Trump #abduction #Venezuela #oil #LandGrab #WarCrimes #ExtrajudicialKillings #theft #piracy #InternationalLaw
#China strongly condemned the #US strike in #Venezuela & the action against its president, the Foreign Ministry said, adding the Beijing govt was “deeply shocked” & firmly opposed to the operation.
“Such hegemonic acts of the US seriously violate #InternationalLaw & Venezuela’s #sovereignty & threaten #peace & #security in #LatinAmerica & the #Caribbean region,” it said.
#law #Congress #WarPowers #criminal #Trump #abduction #oil #LandGrab #WarCrimes #ExtrajudicialKillings #theft #piracy
The Kimwolf Botnet is Stalking Your Local Network
The Kimwolf Botnet is Stalking Your Local Network
The story you are reading is a series of scoops nestled inside a far more urgent Internet-wide security advisory. The vulnerability at issue has been exploited for months already, and it's time for a broader awareness of the threat. The…krebsonsecurity.com
RE: mastodon.social/@_elena/115802…
➡️ media.ccc.de/v/39c3-a-post-ame… by @pluralistic (@eff)
Seen via @_elena
#FOSS #Internet #AI #Europe #Sovereignty #Security #Copyright #Anticircumvention #Capitalism #Tech #Enshittification #Resistance #Future #Activism #EFF
A post-American, enshittification-resistant internet
Trump has staged an unscheduled, midair rapid disassembly of the global system of trade. Ironically, it is this system that prevented all...media.ccc.de
Are you seeing distros or the gnuprojecct applying this patch?
media.ccc.de/v/39c3-to-sign-or…
Why We Abandoned Matrix: The Dark Truth About User Security and Safety
Why We Abandoned Matrix: The Dark Truth About User Security and Safety
WE HAVE MOVED TO SIMPLEX Anyone that agrees to our Code of Conduct is welcome to join our Simplex Hack Liberty Community Room and our Simplex server, a decentralized, metadata resistant alternative to Matrix! Incognito profiles welcome! Hack Liber…Hack Liberty
GrapheneOS version 2025121700 released:
grapheneos.org/releases#202512…
See the linked release notes for a summary of the improvements over the previous release.
Forum discussion thread:
discuss.grapheneos.org/d/29166…
#GrapheneOS #privacy #security
GrapheneOS version 2025121700 released - GrapheneOS Discussion Forum
GrapheneOS discussion forumGrapheneOS Discussion Forum
Vulnerability-Lookup 2.20.0
Potential enhacenment: allow triggering password recovery based on case insensitive username, and e-mail address
I was trying to do a password reset, and it looks like password recovery function is case sensitive, while register account is not. So I ended in loop of: "you can't recover this account because it...Wachizungu (GitHub)
#Privacy & #Security meet Up Hosted by #Monero & @webwipe at PubKey NYC 5pm - 10pm, us hackers be stopping by for a bit!
Pubkey Holiday Privacy Pop-up
Bring in the new year with us discussing privacy and Monero. Join us on December 19th at Pubkey in NYC.luma.com
Just updated Node Pebble to support latest release version of Let’s Encrypt’s Pebble testing server.
codeberg.org/small-tech/node-p…
Enjoy!
💕
#LetsEncrypt #Pebble #testing #tls #ssl #security #NodeJS #JavaScript
node-pebble
A Node.js wrapper for Let’s Encrypt’s Pebble (a small RFC 8555 ACME test server not suited for a production certificate authority)Codeberg.org
GPU Efficiency in VLAI Model Training
GPU Efficiency in VLAI Model Training
Experiences and Benchmarks from Months of VLAI Vulnerability Severity Classification Model Trainingwww.vulnerability-lookup.org
Security content of iOS 26.2 and iPadOS 26.2
Vulnerability-Lookup (@vulnerability_lookup@social.circl.lu)
A new bundle, About the security content of iOS 26.2 and iPadOS 26.2, has been published on Vulnerability-Lookup: http://vulnerability.circl.lu/bundle/c5b7cfe4-31dc-48ad-9aad-8e8bd3c6bf83 #VulnerabilityLookup #Vulnerability #Cybersecurity #botsocial.circl.lu
