Cybersecurity

30 readers
1 users here now

An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!

Rules

Community Rules

founded 2 years ago
MODERATORS
726
 
 

Catch Symposium & Summit 2025 Panel sessions about #AI, #OpenScience, #cybersecurity & more - now on YouTube. #SWH2025 https://www.youtube.com/@softwareheritage4978

727
 
 

BlackLock ransomware is quietly accelerating its activities, becoming a name to watch in the cyber threat landscape.

#CyberSecurity #ransomware #cybercrime #cyberattack

https://cnews.link/blacklock-ransom-gang-1/

728
 
 

A new information stealer for MacOS distributes malware depending on the browser and uses social engineering.

#MACOS #malware #cybersecurity #DataPrivacy #DataSecurity

https://cnews.link/macos-malware-frigidstealer-fake-updates-1/

729
 
 

#OpenSSH client is vulnerable to MitM attacks if VerifyHostKeyDNS is enabled - https://www.openwall.com/lists/oss-security/2025/02/18/1

#CVE_2025_26465 #coordinateddisclosure #infosec #cybersecurity

730
 
 

Hudson Rock claims infostealers infect hundreds of US military and defense contractor computers.

#US #cybersecurity #military #cybercrime #infosec

https://cnews.link/infostealers-detected-within-us-military-and-defense-companies-1/

731
 
 

▪ @cybernews@infosec.exchange research ▪ A data leak exposed millions of records from a Latvian government document system.

#CyberSecurity #DataPrivacy #DataSecurity #government #Latvia

https://cnews.link/lietvaris-platform-leak-exposed-millions-records-3/

732
 
 

According to Italy’s national cybersecurity agency ACN, approximately twenty Italian websites have been targeted by pro-Russian hackers.

#CyberSecurity #cybercrime #Russia #Hacking #Italy #Website

https://cnews.link/italian-websites-targeted-by-russian-hackers-1/

733
 
 

Attackers exploit large language models (LLMs) in hijacking schemes, shifting cloud costs to victims.

#cybercrime #Cybersecurity #LLMs #AI

https://cnews.link/llm-hijacking-exploit-deepseek-3/

734
 
 

Websites belonging to UAB Vičiūnų grupė, one of the largest food producers in Lithuania, contain a malicious loader capable of infecting user devices.

#CyberAttack #hackers #cybersecurity #cybercrime #Lithuania

https://cnews.link/hackers-infect-websites-of-viciunai-group-1/

735
 
 

A China-linked espionage actor may be moonlighting as a ransomware attacker, raising questions about their motives.

#ransomware #cyberattack #cybersecurity #Hacking #cybercrime

https://cnews.link/china-spy-espionage-ransomware-1/

736
 
 

Cyber pros argue that the new Elon Musk-led department might have breached federal cybersecurity laws.

#cybersecurity #DOGE #ElonMusk #cyberattack

https://cnews.link/three-days-later-doge-site-remains-defaced-3/

737
 
 

"Over many years, EFF has been pushing for users to switch to platforms that understand the value of encrypting data. We have also been pushing platforms to make end-to-end encryption for online communications and for your stored sensitive data the norm. This type of encryption helps ensure that a conversation is private between you and the recipient, and not accessible to the platform that runs it or any other third-parties. Thanks to the combined efforts of our organization and dozens of other concerned groups, tech users, and public officials, we now have a lot of options for applications and platforms that take our privacy more seriously than in previous generations. But, in light of recent political developments it’s time for a refresher course: which platforms and applications have encrypted DMs, and which have access to your sensitive personal communications.

The existence of what a platform calls “end-to-end encryption” is not foolproof. It may be poorly implemented, lack widespread adoption to attract the attention of security researchers, lack the funding to pay for security audits, or use a less well-established encryption protocol that doesn’t have much public scrutiny."

https://www.eff.org/deeplinks/2025/02/when-platforms-and-government-unite-remember-whats-private-and-what-isnt

#SocialMedia #SocialNetworks #CyberSecurity #Encryption #Privacy

738
 
 

This Musk guy is so, but so idiotic that he doesn't even know that most of the source of US soft power throughout the world was the funding by the CIA and other federal agencies of cultural activities like jazz shows and art festivals in Europe and Africa. He is a complete and total PHILISTINE. To hell with this guy! I don't want no intellectual retards imposing their will on the world.

"The capture shows that the site contains a list of vague, alleged government-funded tasks and their costs, without sources or context, like “$1.3 million to Arab and Jewish photographers," “$1.5 million for ‘art for inclusion of people with disabilities,’” and "$3.4 million for Malaysian drug-fueled gay sex app.” DEI.gov redirects to waste.gov and is currently inaccessible without a password; Elon Musk told reporters on Tuesday that his Department of Government Efficiency (DOGE) is “trying to be as transparent as possible.”

⁨The researcher is Henrik Schönemann⁩, a historian who started the Safeguarding Research & Culture archivalist project, posted screenshots on Mastodon showing the contents. Schönemann⁩ also shared the specific site scrapes that he was able to capture, which showed the contents of the site. He told 404 Media he set up a change detection app using PikaPods, and is monitoring changes across hundreds of government websites. When the dei.gov and waste.gov sites were registered 10 days ago, he started tracking them, too.

Before the site administrators added a Wordpress template to the pages, the list was online at those URLs. This list was only online for a maximum of 30 minutes, starting around 4:50 p.m. EST; by 5:23 p.m. on February 11, it was gone from public view, according to the snapshots Schönemann’s app⁩ captured."

https://www.404media.co/dei-waste-gov-doge-list-behind-password/

#USA #CyberSecurity #Musk #DOGE #DataProtection

739
 
 

Meta paid over $2.3 million in bounties for its whitehat program, but some cybersecurity pros remain unsatisfied.

#Meta #bounty #cybersecurity #cybercrime #DataSecurity

https://cnews.link/meta-bug-bounties-white-hatters-complain-3/

740
 
 

Musk’s DOGE cost-cutting efforts may backfire, as lax cybersecurity lets anyone access the government’s new website.

#ElonMusk #DOGE #cybersecurity #government #website #hackers

https://cnews.link/musk-doge-website-hacked-3/

741
 
 

"A high volume of recent ML security literature focuses on attacks against aligned large language models (LLMs). These attacks may extract private information or coerce the model into producing harmful outputs. In real-world deployments, LLMs are often part of a larger agentic pipeline including memory systems, retrieval, web access, and API calling. Such additional components introduce vulnerabilities that make these LLM-powered agents much easier to attack than isolated LLMs, yet relatively little work focuses on the security of LLM agents. In this paper, we analyze security and privacy vulnerabilities that are unique to LLM agents. We first provide a taxonomy of attacks categorized by threat actors, objectives, entry points, attacker observability, attack strategies, and inherent vulnerabilities of agent pipelines. We then conduct a series of illustrative attacks on popular open-source and commercial agents, demonstrating the immediate practical implications of their vulnerabilities. Notably, our attacks are trivial to implement and require no understanding of machine learning."

https://arxiv.org/html/2502.08586v1

#AI #GenerativeAI #LLMs #AISafety #CyberSecurity #ChatBots

742
 
 

"The encryption wars have reached a fever pitch, and the most contentious battle is not happening in the United States, where much of the action has been in the past — like the government’s efforts to restrict exports of encryption software until the 1990s and the FBI’s standoff with Apple in 2016. It’s in the United Kingdom, where the government has reportedly ordered Apple to give officials blanket access to iCloud users’ encrypted backups. And the order allegedly didn’t just apply to UK users — it demanded backdoor access for users worldwide.

The secret order, first reported by The Washington Post, was issued in January under the auspices of the UK’s Investigatory Powers Act of 2016. Apple’s compliance or refusal will have ramifications far beyond the UK, potentially making users less safe and signaling to other governments that they, too, can seek backdoor access — a way of bypassing encryption — to users’ information via legislation.

“Simply put, the message the UK government is sending is that its own citizens cannot expect its government to respect their privacy, and that it is willing to put their security at risk from all manner of bad actors like hackers and thieves because it cannot tolerate the ability to have a private conversation online,” Andrew Crocker, surveillance litigation director at the Electronic Frontier Foundation, told The Verge."

https://www.theverge.com/policy/612136/uk-icloud-investigatory-powers-act-war-on-encryption

#UK #CyberSecurity #Privacy #Encryption #Apple #iCloud

743
 
 

"The doge.gov website that was spun up to track Elon Musk’s cuts to the federal government is insecure and pulls from a database that can be edited by anyone, according to two separate people who found the vulnerability and shared it with 404 Media. One coder added at least two database entries that are visible on the live site and say “this is a joke of a .gov site” and “THESE ‘EXPERTS’ LEFT THEIR DATABASE OPEN -roro.”

Doge.gov was hastily deployed after Elon Musk told reporters Tuesday that his Department of Government Efficiency is “trying to be as transparent as possible. In fact, our actions—we post our actions to the DOGE handle on X, and to the DOGE website.” At the time, DOGE was an essentially blank webpage. It was built out further Wednesday and Thursday, and now shows a mirror of the @DOGE X account posts, as well as various stats about the U.S. government’s federal workforce.

Two different web development experts who asked to remain anonymous because they were probing a federal website told 404 Media that doge.gov is seemingly built on a Cloudflare Pages site that is not currently hosted on government servers. The database it is pulling from can be and has been written to by third parties, and will show up on the live website."

https://www.404media.co/anyone-can-push-updates-to-the-doge-gov-website-2/

#USA #Musk #Trump #DOGE #CyberSecurity #SQL #Databases #Privacy #DataProtection

744
 
 

Microsoft researchers expose “BadPilot,” a subgroup aiding Kremlin-backed hackers Seashell Blizzard in global cyberattacks.

#Microsoft #cybersecurity #cybercrime #Russia #cybercrime

https://cnews.link/russian-state-threat-seashell-blizzard-badpilot-subgroup-1/

745
 
 

Password managers are one of the most effective ways of securely storing passwords for multiple sites and platforms, but a new report tells us that cybercriminals are increasingly targeting them in their attacks.
@DigitalTrends has the details:

https://flip.it/j7LgOK

#PasswordManager #Password #Cybersecurity #InternetSecurity #Internet

746
 
 

Non-Western nations are increasingly relying on cybercriminals for intelligence and cyberwarfare operations.

#cybersecurity #Ukraine #Russia #cybercrime #cyberattack

https://cnews.link/russia-cybercriminals-ukraine-war-1/

747
 
 

Cl0p, a Russia-linked ransomware gang, has resurfaced, claiming attacks on 47 companies, including DXC Technology and Chicago Public Schools.

#ransomware #Russia #cyberattack #cybersecurity #cybercrime #chicago

https://cnews.link/chicago-schools-dxc-technology-cl0p-ransomware-1/

748
 
 

"When the Chinese hacker group known as Salt Typhoon was revealed last fall to have deeply penetrated major US telecommunications companies—ultimately breaching no fewer than nine of the phone carriers and accessing Americans' texts and calls in real time—that hacking campaign was treated as a four-alarm fire by the US government. Yet even after those hackers' high-profile exposure, they've continued their spree of breaking into telecom networks worldwide, including more in the US.

Researchers at cybersecurity firm Recorded Future on Wednesday night revealed in a report that they've seen Salt Typhoon breach five telecoms and internet service providers around the world, as well as more than a dozen universities from Utah to Vietnam, all between December and January. The telecoms include one US internet service provider and telecom firm and another US-based subsidiary of a UK telecom, according to the company's analysts, though they declined to name those victims to WIRED."

https://www.wired.com/story/chinas-salt-typhoon-spies-are-still-hacking-telecoms-now-by-exploiting-cisco-routers/

#CyberSecurity #China #SaltTyphoon #StateHacking #USA #BigTelco #Hacking

749
 
 

An exposed instance with an unknown owner has revealed copious amounts of records from multiple Middle Eastern nations.

#CyberSecurity #DataPrivacy #DataSecurity #Database #infosec

https://cnews.link/hundreds-millions-records-phone-numbers-leak-3/

750
 
 

Cyberdrama was unleashed after attackers claimed they had breached the notorious personal data dumpsite Doxbin.

#cybersecurity #cyberattack #datasecurity #DataPrivacy

https://cnews.link/hackers-doxbin-breach-1/

view more: ‹ prev next ›