FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
Today β€” November 25th 2025Your RSS feeds

Walmart's Black Friday deals just went live, and I'm tracking my top 40 picks in real time

Walmart's new Black Friday deals are live now, with big discounts on laptops, kitchen gadgets, and more (including the lowest-ever prices on the newest AirPods and Apple Watches).

ToddyCat’s New Hacking Tools Steal Outlook Emails and Microsoft 365 Access Tokens

The threat actor known as ToddyCat has been observed adopting new methods to obtain access to corporate email data belonging to target companies, including using a custom tool dubbed TCSectorCopy. "This attack allows them to obtain tokens for the OAuth 2.0 authorization protocol using the user's browser, which can be used outside the perimeter of the compromised infrastructure to access

CISA warns spyware crews are breaking into Signal and WhatsApp accounts

Attackers sidestep encryption with spoofed apps and zero-click exploits to compromise 'high-value' mobile users

CISA has warned that state-backed snoops and cyber-mercenaries are actively abusing commercial spyware to break into Signal and WhatsApp accounts, hijack devices, and quietly rummage through the phones of what the agency calls "high-value" users.…

3 SOC Challenges You Need to Solve Before 2026

By: Unknown
2026 will mark a pivotal shift in cybersecurity. Threat actors are moving from experimenting with AI to making it their primary weapon, using it to scale attacks, automate reconnaissance, and craft hyper-realistic social engineering campaigns. The Storm on the Horizon Global world instability, coupled with rapid technological advancement, will force security teams to adapt not just their

Best Black Friday Apple deals 2025: 45+ sales out now

Black Friday week has landed. This is the best time to take advantage of discounts on Apple devices, and my favorite deals include discounted MacBooks, iPads, earbuds, and more.

Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware

Cybersecurity researchers have disclosed details of a new campaign that has leveraged Blender Foundation files to deliver an information stealer known as StealC V2. "This ongoing operation, active for at least six months, involves implanting malicious .blend files on platforms like CGTrader," Morphisec researcher Shmuel Uzan said in a report shared with The Hacker News. "Users unknowingly

Best Black Friday Samsung deals 2025: 50+ sales out now

Black Friday week deals are now live and steep discounts are available on Samsung TVs, Galaxy smartphones, and more.

Russian spy ship theories sink after Orkney blackout traced to wind farm fault

Timing of Yantar's visit sparked gossip, but engineers point to a misbehaving protection system

Cock-up beats conspiracy most of the time, but that didn't stop Orkney residents wondering if a Russian warship caused their two-hour power cut.…

MDR is the answer – now, what’s the question?

Why your business needs the best-of-breed combination of technology and human expertise

Best Black Friday power station deals 2025: My favorite sales out now

Black Friday is just a few days away, and I've found some excellent power station deals from EcoFlow, Jackery, and Bluetti that you can shop now.

The LG G4 OLED is the most popular TV our readers bought this year - and up to $5,000 off now

The LG G4 remains one of my favorite TVs, even though it's last year's model - and it's on sale for Black Friday.

My favorite JBL Headphones have outstanding battery life, a comfortable fit, and are $70 off

The JBL Tour One M3 are selling at an all-time low price, which makes them more affordable than the Sony XM6 and Bose QC Ultra 2 flagship headphones.

ZTE, China Unicom Liaoning and Dalian Changhai Airport launch 5G-A ISAC private network to elevate low-altitude security and airport safety

Partner Content Millimeter-wave ISAC and edge AI create unified sensing-communication capabilities for next-generation low-altitude security

Best Black Friday smart glasses deals 2025: I found the biggest sales like Meta Ray-Bans for 20% off

If you've been wanting to check out the smart glasses craze for yourself, you can score a deal now on some of the best ones we've tested from Meta, RayNeo, Xreal, and more.

10 most popular products readers bought in 2025 (and are all under $50)

From Bluetooth trackers to power banks to (checks notes) an earwax camera, these are the top tech gadgets and useful items our readers actually purchased in 2025.

CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Users

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday issued an alert warning of bad actors actively leveraging commercial spyware and remote access trojans (RATs) to target users of mobile messaging applications. "These cyber actors use sophisticated targeting and social engineering techniques to deliver spyware and gain unauthorized access to a victim's messaging app,

I would ditch Apple's most expensive smartwatch and buy this one instead

Outdoor enthusiasts and Apple obsessives love the Apple Watch Ultra 3. An earlier model is on sale for $200 less, and I'd recommend it.

Is Opus 4.5 really 'the best model in the world for coding'? It just failed half my tests

Here's what happened when I pushed Anthropic's new model through some simple development tasks.

I just adopted a kitten, and this is the pet tech I'm buying this Black Friday

Adding another cat to the house means adding more products to keep two cats fed, safe, and entertained. This is what I'm buying this week.

This 4K Samsung monitor for $200 off at Amazon is the only desk upgrade I'm considering

Samsung's ViewFinity S8 is a spacious, 4K monitor with an ergonomic design, and it's 34% off with this Black Friday deal.
Yesterday β€” November 24th 2025Your RSS feeds

Fresh ClickFix attacks use Windows Update trick-pics to steal credentials

Poisoned PNGs contain malicious code

A fresh wave of ClickFix attacks is using fake Windows update screens to trick victims into downloading infostealer malware.…

Praise Amazon for raising this service from the dead

The hardest part is admitting you were wrong, which AWS did.

Opinion For years, Google has seemingly indulged a corporate fetish of taking products that are beloved, then killing them. AWS has been on a different kick lately: Killing services that frankly shouldn't have seen the light of day.…

The challenge to test my software consists of breaking a meta-cloaker.

Hey bro πŸ‘Ύ
Wanna take on a friendly challenge?

I built a cloaker that’s been flying under Meta’s radar β€” and I want to see if you can break it.

The challenge is simple:
🧠 Try to identify any vulnerabilities or leaks in the cloaker system I’m using.
πŸš€ If you manage to break it or point out a real flaw, I’ll send you a little prize (or maybe a project if you impress me).

Hint:
The ad on Meta shows one thing...
But the landing page is completely different from the advertised offer.

Let’s see if you’re sharp enough to catch it 😏
Game on?

submitted by /u/Any_Gap_3150
[link] [comments]

Is Your Android TV Streaming Box Part of a Botnet?

On the surface, the Superbox media streaming devices for sale at retailers like BestBuy and Walmart may seem like a steal: They offer unlimited access to more than 2,200 pay-per-view and streaming services like Netflix, ESPN and Hulu, all for a one-time fee of around $400. But security experts warn these TV boxes require intrusive software that forces the user’s network to relay Internet traffic for others, traffic that is often tied to cybercrime activity such as advertising fraud and account takeovers.

Superbox media streaming boxes for sale on Walmart.com.

Superbox bills itself as an affordable way for households to stream all of the television and movie content they could possibly want, without the hassle of monthly subscription fees β€” for a one-time payment of nearly $400.

β€œTired of confusing cable bills and hidden fees?,” Superbox’s website asks in a recent blog post titled, β€œCheap Cable TV for Low Income: Watch TV, No Monthly Bills.”

β€œReal cheap cable TV for low income solutions does exist,” the blog continues. β€œThis guide breaks down the best alternatives to stop overpaying, from free over-the-air options to one-time purchase devices that eliminate monthly bills.”

Superbox claims that watching a stream of movies, TV shows, and sporting events won’t violate U.S. copyright law.

β€œSuperBox is just like any other Android TV box on the market, we can not control what software customers will use,” the company’s website maintains. β€œAnd you won’t encounter a law issue unless uploading, downloading, or broadcasting content to a large group.”

A blog post from the Superbox website.

There is nothing illegal about the sale or use of the Superbox itself, which can be used strictly as a way to stream content at providers where users already have a paid subscription. But that is not why people are shelling out $400 for these machines. The only way to watch those 2,200+ channels for free with a Superbox is to install several apps made for the device that enable them to stream this content.

Superbox’s homepage includes a prominent message stating the company does β€œnot sell access to or preinstall any apps that bypass paywalls or provide access to unauthorized content.” The company explains that they merely provide the hardware, while customers choose which apps to install.

β€œWe only sell the hardware device,” the notice states. β€œCustomers must use official apps and licensed services; unauthorized use may violate copyright law.”

Superbox is technically correct here, except for maybe the part about how customers must use official apps and licensed services: Before the Superbox can stream those thousands of channels, users must configure the device to update itself, and the first step involves ripping out Google’s official Play store and replacing it with something called the β€œApp Store” or β€œBlue TV Store.”

Superbox does this because the device does not use the official Google-certified Android TV system, and its apps will not load otherwise. Only after the Google Play store has been supplanted by this unofficial App Store do the various movie and video streaming apps that are built specifically for the Superbox appear available for download (again, outside of Google’s app ecosystem).

Experts say while these Android streaming boxes generally do what they advertise β€” enabling buyers to stream video content that would normally require a paid subscription β€” the apps that enable the streaming also ensnare the user’s Internet connection in a distributed residential proxy network that uses the devices to relay traffic from others.

Ashley is a senior solutions engineer at Censys, a cyber intelligence company that indexes Internet-connected devices, services and hosts. Ashley requested that only her first name be used in this story.

In a recent video interview, Ashley showed off several Superbox models that Censys was studying in the malware lab β€” including one purchased off the shelf at BestBuy.

β€œI’m sure a lot of people are thinking, β€˜Hey, how bad could it be if it’s for sale at the big box stores?'” she said. β€œBut the more I looked, things got weirder and weirder.”

Ashley said she found the Superbox devices immediately contacted a server at the Chinese instant messaging service Tencent QQ, as well as a residential proxy service called Grass IO.

GET GRASSED

Also known as getgrass[.]io, Grass says it is β€œa decentralized network that allows users to earn rewards by sharing their unused Internet bandwidth with AI labs and other companies.”

β€œBuyers seek unused internet bandwidth to access a more diverse range of IP addresses, which enables them to see certain websites from a retail perspective,” the Grass website explains. β€œBy utilizing your unused internet bandwidth, they can conduct market research, or perform tasks like web scraping to train AI.” 

Reached via Twitter/X, Grass founder Andrej Radonjic told KrebsOnSecurity he’d never heard of a Superbox, and that Grass has no affiliation with the device maker.

β€œIt looks like these boxes are distributing an unethical proxy network which people are using to try to take advantage of Grass,” Radonjic said. β€œThe point of grass is to be an opt-in network. You download the grass app to monetize your unused bandwidth. There are tons of sketchy SDKs out there that hijack people’s bandwidth to help webscraping companies.”

Radonjic said Grass has implemented β€œa robust system to identify network abusers,” and that if it discovers anyone trying to misuse or circumvent its terms of service, the company takes steps to stop it and prevent those users from earning points or rewards.

Superbox’s parent company, Super Media Technology Company Ltd., lists its street address as a UPS store in Fountain Valley, Calif. The company did not respond to multiple inquiries.

According to this teardown by behindmlm.com, a blog that covers multi-level marketing (MLM) schemes, Grass’s compensation plan is built around β€œgrass points,” which are earned through the use of the Grass app and through app usage by recruited affiliates. Affiliates can earn 5,000 grass points for clocking 100 hours usage of Grass’s app, but they must progress through ten affiliate tiers or ranks before they can redeem their grass points (presumably for some type of cryptocurrency). The 10th or β€œTitan” tier requires affiliates to accumulate a whopping 50 million grass points, or recruit at least 221 more affiliates.

Radonjic said Grass’s system has changed in recent months, and confirmed the company has a referral program where users can earn Grass Uptime Points by contributing their own bandwidth and/or by inviting other users to participate.

β€œUsers are not required to participate in the referral program to earn Grass Uptime Points or to receive Grass Tokens,” Radonjic said. β€œGrass is in the process of phasing out the referral program and has introduced an updated Grass Points model.”

A review of the Terms and Conditions page for getgrass[.]io at the Wayback Machine shows Grass’s parent company has changed names at least five times in the course of its two-year existence. Searching the Wayback Machine on getgrass[.]io shows that in June 2023 Grass was owned by a company called Wynd Network. By March 2024, the owner was listed as Lower Tribeca Corp. in the Bahamas. By August 2024, Grass was controlled by a Half Space Labs Limited, and in November 2024 the company was owned by Grass OpCo (BVI) Ltd. Currently, the Grass website says its parent is just Grass OpCo Ltd (no BVI in the name).

Radonjic acknowledged that Grass has undergone β€œa handful of corporate clean-ups over the last couple of years,” but described them as administrative changes that had no operational impact. β€œThese reflect normal early-stage restructuring as the project moved from initial development…into the current structure under the Grass Foundation,” he said.

UNBOXING

Censys’s Ashley said the phone home to China’s Tencent QQ instant messaging service was the first red flag with the Superbox devices she examined. She also discovered the streaming boxes included powerful network analysis and remote access tools, such as Tcpdump and Netcat.

β€œThis thing DNS hijacked my router, did ARP poisoning to the point where things fall off the network so they can assume that IP, and attempted to bypass controls,” she said. β€œI have root on all of them now, and they actually have a folder called β€˜secondstage.’ These devices also have Netcat and Tcpdump on them, and yet they are supposed to be streaming devices.”

A quick online search shows various Superbox models and many similar Android streaming devices for sale at a wide range of top retail destinations, including Amazon, BestBuy, Newegg, and Walmart. Newegg.com, for example, currently lists more than three dozen Superbox models. In all cases, the products are sold by third-party merchants on these platforms, but in many instances the fulfillment comes from the e-commerce platform itself.

β€œNewegg is pretty bad now with these devices,” Ashley said. β€œEbay is the funniest, because they have Superbox in Spanish β€” the SuperCaja β€” which is very popular.”

Superbox devices for sale via Newegg.com.

Ashley said Amazon recently cracked down on Android streaming devices branded as Superbox, but that those listings can still be found under the more generic title β€œmodem and router combo” (which may be slightly closer to the truth about the device’s behavior).

Superbox doesn’t advertise its products in the conventional sense. Rather, it seems to rely on lesser-known influencers on places like Youtube and TikTok to promote the devices. Meanwhile, Ashley said, Superbox pays those influencers 50 percent of the value of each device they sell.

β€œIt’s weird to me because influencer marketing usually caps compensation at 15 percent, and it means they don’t care about the money,” she said. β€œThis is about building their network.”

A TikTok influencer casually mentions and promotes Superbox while chatting with her followers over a glass of wine.

BADBOX

As plentiful as the Superbox is on e-commerce sites, it is just one brand in an ocean of no-name Android-based TV boxes available to consumers. While these devices generally do provide buyers with β€œfree” streaming content, they also tend to include factory-installed malware or require the installation of third-party apps that engage the user’s Internet address in advertising fraud.

In July 2025, Google filed a β€œJohn Doe” lawsuit (PDF) against 25 unidentified defendants dubbed the β€œBadBox 2.0 Enterprise,” which Google described as a botnet of over ten million Android streaming devices that engaged in advertising fraud. Google said the BADBOX 2.0 botnet, in addition to compromising multiple types of devices prior to purchase, can also infect devices by requiring the download of malicious apps from unofficial marketplaces.

Some of the unofficial Android devices flagged by Google as part of the Badbox 2.0 botnet are still widely for sale at major e-commerce vendors. Image: Google.

Several of the Android streaming devices flagged in Google’s lawsuit are still for sale on top U.S. retail sites. For example, searching for the β€œX88Pro 10” and the β€œT95” Android streaming boxes finds both continue to be peddled by Amazon sellers.

Google’s lawsuit came on the heels of a June 2025 advisory from the Federal Bureau of Investigation (FBI), which warned that cyber criminals were gaining unauthorized access to home networks by either configuring the products with malicious software prior to the user’s purchase, or infecting the device as it downloads required applications that contain backdoors, usually during the set-up process.

β€œOnce these compromised IoT devices are connected to home networks, the infected devices are susceptible to becoming part of the BADBOX 2.0 botnet and residential proxy services known to be used for malicious activity,” the FBI said.

The FBI said BADBOX 2.0 was discovered after the original BADBOX campaign was disrupted in 2024. The original BADBOX was identified in 2023, and primarily consisted of Android operating system devices that were compromised with backdoor malware prior to purchase.

Riley Kilmer is founder of Spur, a company that tracks residential proxy networks. Kilmer said Badbox 2.0 was used as a distribution platform for IPidea, a China-based entity that is now the world’s largest residential proxy network.

Kilmer and others say IPidea is merely a rebrand of 911S5 Proxy, a China-based proxy provider sanctioned last year by the U.S. Department of the Treasury for operating a botnet that helped criminals steal billions of dollars from financial institutions, credit card issuers, and federal lending programs (the U.S. Department of Justice also arrested the alleged owner of 911S5).

How are most IPidea customers using the proxy service? According to the proxy detection service Synthient, six of the top ten destinations for IPidea proxies involved traffic that has been linked to either ad fraud or credential stuffing (account takeover attempts).

Kilmer said companies like Grass are probably being truthful when they say that some of their customers are companies performing web scraping to train artificial intelligence efforts, because a great deal of content scraping which ultimately benefits AI companies is now leveraging these proxy networks to further obfuscate their aggressive data-slurping activity. By routing this unwelcome traffic through residential IP addresses, Kilmer said, content scraping firms can make it far trickier to filter out.

β€œWeb crawling and scraping has always been a thing, but AI made it like a commodity, data that had to be collected,” Kilmer told KrebsOnSecurity.Β β€œEverybody wanted to monetize their own data pots, and how they monetize that is different across the board.”

SOME FRIENDLY ADVICE

Products like Superbox are drawing increased interest from consumers as more popular network television shows and sportscasts migrate to subscription streaming services, and as people begin to realize they’re spending as much or more on streaming services than they previously paid for cable or satellite TV.

These streaming devices from no-name technology vendors are another example of the maxim, β€œIf something is free, you are the product,” meaning the company is making money by selling access to and/or information about its users and their data.

Superbox owners might counter, β€œFree? I paid $400 for that device!” But remember: Just because you paid a lot for something doesn’t mean you are done paying for it, or that somehow you are the only one who might be worse off from the transaction.

It may be that many Superbox customers don’t care if someone uses their Internet connection to tunnel traffic for ad fraud and account takeovers; for them, it beats paying for multiple streaming services each month. My guess, however, is that quite a few people who buy (or are gifted) these products have little understanding of the bargain they’re making when they plug them into an Internet router.

Superbox performs some serious linguistic gymnastics to claim its products don’t violate copyright laws, and that its customers alone are responsible for understanding and observing any local laws on the matter. However, buyer beware: If you’re a resident of the United States, you should know that using these devices for unauthorized streaming violates the Digital Millennium Copyright Act (DMCA), and can incur legal action, fines, and potential warnings and/or suspension of service by your Internet service provider.

According to the FBI, there are several signs to look for that may indicate a streaming device you own is malicious, including:

-The presence of suspicious marketplaces where apps are downloaded.
-Requiring Google Play Protect settings to be disabled.
-Generic TV streaming devices advertised as unlocked or capable of accessing free content.
-IoT devices advertised from unrecognizable brands.
-Android devices that are not Play Protect certified.
-Unexplained or suspicious Internet traffic.

This explainer from the Electronic Frontier Foundation delves a bit deeper into each of the potential symptoms listed above.

Ex-CISA officials, CISOs dispel 'hacklore,' spread cybersecurity truths

Don't believe everything you read

Afraid of connecting to public Wi-Fi? Terrified to turn your Bluetooth on? You may be falling for "hacklore," tall tales about cybersecurity that distract you from real dangers. Dozens of chief security officers and ex-CISA officials have launched an effort and website to dispel these myths and show you how not to get hacked for real.…

A systemic flaw in Binance’s IP Whitelisting model: listenKeys bypass the protection entirely

Hi all,

I’ve published a technical case study analyzing a design issue in how the Binance API enforces IP whitelisting. This is not about account takeover or fund theft β€” it’s about a trust-boundary mismatch between the API key and the secondary listenKey used for WebSocket streams.

Summary of the issue

  • A listenKey can be created using only the API key (no secret, no signature).
  • The API key is protected by IP whitelisting.
  • The listenKey is not protected by IP whitelisting.
  • Once a listenKey leaks anywhere in the toolchain β€” debug logs, third-party libraries, bots, browser extensions, supply-chain modules β€” it can be reused from any IP address.
  • This exposes real-time trading activity, balances, open orders, leverage changes, stop levels, liquidation events and more.

This is not a direct account compromise.
It’s market-intelligence leakage, which can be extremely valuable when aggregated across many users or bot frameworks.

Why this matters

Many users rely on IP whitelisting as their final defensive barrier. The listenKey silently bypasses that assumption. This creates a false sense of security and enables unexpected data exposure patterns that users are not aware of.

Disclosure process

I responsibly reported this and waited ~11 months.
The issue was repeatedly categorized as β€œsocial engineering,” despite clear architectural implications. Therefore, I have published the analysis openly.

Full case study

πŸ”— https://technopathy.club/when-ip-whitelisting-isnt-what-it-seems-a-real-world-case-study-from-the-binance-api-816c4312d6d0

submitted by /u/oliver-zehentleitner
[link] [comments]

This immutable Linux distro has a killer tool that sets it apart - and makes ditching Windows easy

With so many Linux distributions available, it takes something special to lure users away from Windows. Aurora checks all the boxes.

Anthropic just released Claude Opus 4.5 - here's how it stacks up against other leading models

The company describes its new model as "a step forward in what AI systems can do, and a preview of changes to how work gets done."

ChatGPT's new shopping research tool is fast, fun, and free - but can it out-shop me?

Just in time for the holiday shopping season, OpenAI has introduced a new tool that it hopes will help you find just what you're looking for.

Firefox just fixed my biggest annoyance with web browsers - and it's a game changer

Firefox has proved it's still in the game, with a new search feature every browser should copy ASAP.

Want better Gemini responses? Try these 10 tricks, Google says

With Gemini 3, Google is offering quick, practical tips to instantly improve your results.

Best Black Friday deals 2025: 70+ deals on TVs, laptops, streaming, and more

Black Friday is just days away, and nearly every major retailer is offering discounts and deals, like HBO Max for $3 per month.

5 ways to prevent your AI strategy from going bust

Three years after generative AI took off, experts are questioning its value. Here's how you can make AI deliver real returns.

Years-old bugs in open source tool left every major cloud open to disruption

Fluent Bit has 15B+ deployments … and 5 newly assigned CVEs

A series of "trivial-to-exploit" vulnerabilities in Fluent Bit, an open source log collection tool that runs in every major cloud and AI lab, was left open for years, giving attackers an exploit chain to completely disrupt cloud services and alter data.…

I love my iPhone 17 Pro Max, but this 20,000mAh Android phone made its battery look small

The Blackview Xplore 2 may seem like just another rugged phone, but it also has a battery capacity that sets records.

New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions

Cybersecurity researchers have discovered five vulnerabilities in Fluent Bit, an open-source and lightweight telemetry agent, that could be chained to compromise and take over cloud infrastructures. The security defects "allow attackers to bypass authentication, perform path traversal, achieve remote code execution, cause denial-of-service conditions, and manipulate tags," Oligo Security said in

7 open-source apps I'd honestly pay for because they're that good

These apps are free, but I'd be willing to shell out some cash for them. Here's why.

My 5 favorite tricks in Apple's new Preview app - and how I use them on my iPhone

The Preview app on iPhone is pretty impressive. Here's which features have won me over so far.

Intrusion at real estate finance biz sparks concern for big banks

SitusAMC rules out ransomware, but accounting records for major institutions potentially affected

Real estate finance business SitusAMC says thieves sneaked into its systems earlier this month and made off with confidential client data.…

Marshall's boldest soundbar yet has me rethinking my entire Sonos setup

The Marshall Heston 60 and Sub 200 aren't your average soundbar and subwoofer, but how do they compare to industry veterans?

Shai-Hulud worm returns, belches secrets to 25K GitHub repos

Trojanized npm packages spread new variant that executes in pre-install phase, hitting thousands within days

A self-propagating malware targeting node package managers (npm) is back for a second round, according to Wiz researchers who say that more than 25,000 developers had their secrets compromised within three days.…

Amazon Is Using Specialized AI Agents for Deep Bug Hunting

Born out of an internal hackathon, Amazon’s Autonomous Threat Analysis system uses a variety of specialized AI agents to detect weaknesses and propose fixes to the company’s platforms.

FCC guts post-Salt Typhoon telco rules despite ongoing espionage risk

Months after China-linked spies burrowed into US networks, regulator tears up its own response

The Federal Communications Commission (FCC) has scrapped a set of telecom cybersecurity rules introduced after the Salt Typhoon espionage campaign, reversing course on measures designed to stop state-backed snoops from slipping back into America's networks.…

Second Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theft

Multiple security vendors are sounding the alarm about a second wave of attacks targeting the npm registry in a manner that's reminiscent of the Shai-Hulud attack. The new supply chain campaign, dubbed Sha1-Hulud, has compromised hundreds of npm packages, according to reports from Aikido, HelixGuard, JFrog, Koi Security, ReversingLabs, SafeDep, Socket, Step Security, and Wiz.Β The trojanized

A Glimpse Into Cisco Mobile Infrastructure Security Developments

See how Cisco is helping mobile operators improve visibility, protect traffic at high speed, and keep security consistent from core to edge.

The right way to zip large files on Windows 11 PCs (and why it makes a big difference)

Compressing files is a practical Windows 11 skill for organizing your storage (and you don't need extra apps). Here's how.

⚑ Weekly Recap: Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & More

This week saw a lot of new cyber trouble. Hackers hit Fortinet and Chrome with new 0-day bugs. They also broke into supply chains and SaaS tools. Many hid inside trusted apps, browser alerts, and software updates. Big firms like Microsoft, Salesforce, and Google had to react fast β€” stopping DDoS attacks, blocking bad links, and fixing live flaws. Reports also showed how fast fake news, AI

CISA orders feds to patch Oracle Identity Manager zero-day after signs of abuse

Agencies have until December 12 to mitigate flaw that was likely exploited before Big Red released fix

CISA has ordered US federal agencies to patch against an actively exploited Oracle Identity Manager (OIM) flaw within three weeks – a scramble made more urgent by evidence that attackers may have been abusing the bug months before a fix was released.…

Chinese DeepSeek-R1 AI Generates Insecure Code When Prompts Mention Tibet or Uyghurs

New research from CrowdStrike has revealed that DeepSeek's artificial intelligence (AI) reasoning model DeepSeek-R1 produces more security vulnerabilities in response to prompts that contain topics deemed politically sensitive by China. "We found that when DeepSeek-R1 receives prompts containing topics the Chinese Communist Party (CCP) likely considers politically sensitive, the likelihood of it

Why I prefer this Bluetooth tracker card in my wallet over AirTags - especially at this price

This tracker tag is just a fraction of an inch thick yet packs impressive tech into a tiny frame.

This air purifier is a must for pet parents, and it's $150 off for Black Friday

Get cleaner air for less with the Blueair Blue Pure 211i Max air purifier for 43% off.

The top 5 tech products we want to see discounted for Black Friday (and by how much)

Black Friday is next week, and we're hoping to see some enticing deals on these products. (And they'd better beat out early sale prices.)

Championing Cyber Security: the National UK Cyber Team's Journey at the European Cyber Security Challenge

Reflections on Coaching, Collaboration, and the Pursuit of Excellence in Cyber Security

Partner Content From 6th to 10th October 2025, ten exceptional cyber enthusiasts proudly flew the flag for the United Kingdom in the European Cyber Security Challenge (ECSC), held this year in the vibrant setting of Poland.…

❌