FreshRSS

๐Ÿ”’
โŒ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
Today โ€” December 12th 2025Your RSS feeds

AI is already part of Linux's plumbing - whether developers like it or not

AI is quietly doing some of Linux's dirtiest work, but not everyone is comfortable with it.

New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale

Cybersecurity researchers have documented four new phishing kits named BlackForce, GhostFrame, InboxPrime AI, and Spiderman that are capable of facilitating credential theft at scale. BlackForce, first detected in August 2025, is designed to steal credentials and perform Man-in-the-Browser (MitB) attacks to capture one-time passwords (OTPs) and bypass multi-factor authentication (MFA). The kit

Microsoft promises more bug payouts, with or without a bounty program

Critical vulnerabilities found in third-party applications eligible for award under 'in scope by default' move

Microsoft is overhauling its bug bounty program to reward exploit hunters for finding vulnerabilities across all its products and services, even those without established bounty schemes.โ€ฆ

Uncle Sam sues ex-Accenture manager over Army cloud security claims

Justice Department alleges federal auditors were misled over compliance with FedRAMP and DoD requirements

The US is suing a former senior manager at Accenture for allegedly misleading the government about the security of an Army cloud platform.โ€ฆ

The best proxy server services of 2025: Expert recommended

Proxy servers act as intermediaries for online traffic and can be used for various business purposes. We recommend these top proxy services.

Black Hat Europe 2025: Reputation matters โ€“ even in the ransomware economy

Being seen as reliable is good for โ€˜businessโ€™ and ransomware groups care about 'brand reputation' just as much as their victims

Locks, SOCs and a cat in a box: What Schrรถdinger can teach us about cybersecurity

If you donโ€™t look inside your environment, you canโ€™t know its true state โ€“ and attackers count on that

The 5 most innovative tech products we tested this year (including a tri-fold surprise)

From AI glasses with digital overlays to robot vacuums that can pick up your leftover laundry, here are ZDNET's Breakthrough Award winners for 2025.

UK watchdog urged to probe GDPR failures in Home Office eVisa rollout

Rights groups say digital-only record is leaking data and courting trouble

Civil society groups are urging the UK's data watchdog to investigate whether the Home Office's digital-only eVisa scheme is breaching GDPR, sounding the alarm about systemic data errors and design failures that are exposing sensitive personal information while leaving migrants unable to prove their lawful status.โ€ฆ

Best travel VPNs 2025: Expert-tested for streaming and avoiding censorship

VPNs shield you from spying and can resolve online blocks you may find in other countries including the UK's new checks. My favorite travel VPNs offer fast speeds, massive server networks, and solid encryption.

Half of exposed React servers remain unpatched amid active exploitation

Wiz says React2Shell attacks accelerating, ranging from cryptominers to state-linked crews

Half of the internet-facing systems vulnerable to a fast-moving React remote code execution flaw remain unpatched, even as exploitation has exploded into more than a dozen active attack clusters ranging from bargain-basement cryptominers to state-linked intrusion tooling.โ€ฆ

The best small business web hosting services of 2025: Expert tested

Looking for a reliable and affordable web hosting package for your growing business? Here are my top picks based on affordability, scalability, and value for money.

The best cheap web hosting services of 2025: Expert tested

Check out our top picks, tested and ranked, for affordable web hosting services in 2025.

Best VPNs for streaming 2025: Expert tested and reviewed

If you want to access your favorite streaming services from different locations, a VPN might help. Check out my favorites for the fastest speeds and most servers.

Securing GenAI in the Browser: Policy, Isolation, and Data Controls That Actually Work

By: Unknown
The browser has become the main interface to GenAI for most enterprises: from web-based LLMs and copilots, to GenAIโ€‘powered extensions and agentic browsers like ChatGPT Atlas. Employees are leveraging the power of GenAI to draft emails, summarize documents, work on code, and analyze data, often by copying/pasting sensitive information directly into prompts or uploading files.ย  Traditional

The best security keys of 2025: Expert tested

Security keys are the ultimate physical security measure for protecting your online accounts. We tested and ranked the best security keys on the market today.

New React RSC Vulnerabilities Enable DoS and Source Code Exposure

The React team has released fixes for two new types of flaws in React Server Components (RSC) that, if successfully exploited, could result in denial-of-service (DoS) or source code exposure. The team said the issues were found by the security community while attempting to exploit the patches released for CVE-2025-55182 (CVSS score: 10.0), a critical bug in RSC that has since been weaponized in

React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has urged federal agencies to patch the recent React2Shell vulnerability by December 12, 2025, amid reports of widespread exploitation. The critical vulnerability, tracked as CVE-2025-55182 (CVSS score: 10.0), affects the React Server Components (RSC) Flight protocol. The underlying cause of the issue is an unsafe deserialization

CISA Flags Actively Exploited GeoServer XXE Flaw in Updated KEV Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity security flaw impacting OSGeo GeoServer to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation in the wild. The vulnerability in question is CVE-2025-58360 (CVSS score: 8.2), an unauthenticated XML External Entity (XXE) flaw that affects all versions prior to

8 HDMI tricks I use to get the best performance from my TV - and most are free

Think your TV setup is fine? These HDMI tricks can unlock performance and sound you didn't know you were missing.

This company's AI success was built on 5 essential steps - see how they work for you

From data foundations to storytelling techniques, here's how to turn your AI projects into valuable production services.

Crypto-crasher Do Kwon jailed for 15 years over $40bn UST bust

Judge said his fraud was on 'epic, generational scale'

Terraform Labs founder Do Kwon will spend 15 years in jail after pleading guilty to committing fraud.โ€ฆ

Require Google to Remove One-Click Full Logout URLs

My father got tricked into calling scammers after a hidden Google logout URL made him think his computer was hacked. Turns out, Google lets any website instantly log you out of Gmail, YouTube, and Drive just by loading a simple link - no warning, no confirmation. I made a petition, and I want to know if this is something worth signing and sharing, or if it's not realistic.

submitted by /u/Redstoneriot234
[link] [comments]
Yesterday โ€” December 11th 2025Your RSS feeds

Warnings Mount in Congress Over Expanded US Wiretap Powers

Experts tell US lawmakers that a crucial spy programโ€™s safeguards are failing, allowing intel agencies deeper, unconstrained access to Americansโ€™ data.

Do you ask AI deep questions at night? 37.5 million Copilot conversations show you're not alone

From work-related conversations on our desktops by day toย personal advice on our phones after hours, AI now integrates 'into the full texture of human life,' a Microsoft study finds.

Russian hackers debut simple ransomware service, but store keys in plain text

Operators accidentally left a way for you to get your data back

CyberVolk, a pro-Russian hacktivist crew, is back after months of silence with a new ransomware service. There's some bad news and some good news here.โ€ฆ

OpenAI user data was breached, but changing your password won't help - here's why

Revealed on Thanksgiving Eve, the incident serves as a reminder that we're all responsible for exploring additional security options.

Should you stop logging in through Google and Facebook? Consider these SSO risks vs. benefits

Relying on consumer SSO creates significant challenges, and passkeys may offer a solution.

Doxers Posing as Cops Are Tricking Big Tech Firms Into Sharing Peopleโ€™s Private Data

A spoofed email address and an easily faked document is all it takes for major tech companies to hand over your most personal information.

Think That Party Invite Is Real? Fake E-Vite Scams Are the New Phishing Trap

It looks harmless enough.

A digital party invitation lands in your inbox or phone. You click to see the details. Then it asks you toย log in or create an accountย before revealing the event.ย 

Thatโ€™sย where theย scamย begins.ย 

Fake e-viteย phishingย scamsย are on the rise, and they take advantage of something simple:ย social trust.ย Youโ€™reย far more likely to click an invitation than a generic โ€œaccount alertโ€ or โ€œdelivery notice.โ€ย 

And thatโ€™s exactly why scammers are using them.ย 

In fact, hereโ€™s a screenshot of a fake phishing email I recently got this holiday season:

Screenshot of a Phishing Email sent this holiday season
Screenshot of a Phishing Email sent this holiday season

When you click the โ€œopen invitationโ€ link, it immediately asks you to sign in or create an account with your personal information. Thatโ€™s the step where scammers steal your private data.ย 

What Is a Fake E-Vite Scam?ย 

A fake e-viteย scamย is a phishing attack that pretends to be a real invitation from platforms like Paperless Post or other digital invitation services.ย 

The goal is to trick you into:ย 

  • Entering your email and passwordย 
  • Creating a fake account on a malicious siteย 
  • Clicking links that lead to credential-stealing pagesย 
  • Downloading malware disguised as an invitationย 

Once scammers have your login information, they can:ย 

  • Take over your emailย 
  • Reset passwords on other accountsย 
  • Sendย scamsย to your contactsย 
  • Launch identity theft attemptsย 

How These Fake Invitation Scams Usually Workย 

Hereโ€™sย the most common flow:ย 

  1. You receive a digital invitation that looks normalย 
  2. The message prompts you to โ€œview the invitationโ€ย 
  3. Youโ€™reย redirected to a login or signup pageย 
  4. You enter your email, password, or personal infoย 
  5. The invitation never appearsย 
  6. Your credentials have now been stolenย 

Because this starts with something familiar and social, many people donโ€™t realizeย itโ€™sย phishing until accounts are already compromised.ย Plus, scammers then use your email and name to trick friends and family into trusting more fake e-vites from your account.

How to Tell If a Paperless Post Invite Is Realย 

Paperless Post has publicly acknowledged theseย scamsย and shared what legitimate messagesย actually lookย like.ย 

Legitimate Paperless Post Emails Will Never:ย 

  • Include .EXE attachmentsย 
  • Include .PDF attachmentsย 
  • Include any attachments other than image filesย 

Official Paperless Post Email Domains:ย 

Legitimate invitations and account messages only come from:ย 

Official support emails only come from:ย 

If the sender does not match one of these exactly,ย itโ€™sย aย scam.ย 

Paperless Post also notes that verified emails may display aย blue checkmarkย in supported inboxes to confirm authenticity.ย ย 

The Biggest Red Flags of a Fake E-Viteย 

If you see any of the following, do not click:ย 

  • Youโ€™reย forced to log in to โ€œseeโ€ who invited youย 
  • The sender emailย doesnโ€™tย match the official domains aboveย 
  • The invitation creates urgencyย 
  • Youโ€™reย asked for payment to view the eventย 
  • The message feels generic instead of personalย 
  • The site address looks slightly offย 

Why These Scams Are So Effective Right Nowย 

Modern phishing attacksย donโ€™tย rely on sloppy design anymore. Many now use:ย 

  • Polished brandingย 
  • Clean layoutsย 
  • Familiar platformsย 
  • Friendly languageย 
  • Social pressureย 

Invitation phishing is especially powerful because:ย 

  • It triggers curiosityย 
  • It feels harmlessย 
  • It mimicsย real socialย behaviorย 
  • Itย doesnโ€™tย start with fear or threatsย 
  • By the time theย scamย turns risky, your guard is already down.ย 

What To Do If You Clicked a Fake E-Viteย 

If you entered any information into a suspicious invitation page:ย 

  1. Immediately change your email passwordย 
  2. Change any other account that reused that passwordย 
  3. Enable two-factor authenticationย 
  4. Check for unknown login activityย 
  5. Warn contacts if your email may have been compromisedย 
  6. Run a security scan on your deviceย 

The faster you act, the more damage you can prevent.ย 

The post Think That Party Invite Is Real? Fake E-Vite Scams Are the New Phishing Trap appeared first on McAfee Blog.

Empirical Analysis: Non-Linear Token Consumption in AI Security Agents

Weโ€™ve been testing AI agents in blue-team scenarios (log triage, recursive investigation steps, correlation, incident reconstruction). A recurring issue surfaced during testing:

Pay-per-use models canโ€™t handle the load.

Deep reasoning tasks trigger non-linear token spikes, and we found that Competitor-style metered billing either slowed down workflows, caused interruptions, or became too expensive to use during real incidents โ€” especially when dealing with iterative analysis under pressure.

We published a case study summarizing the data, the reasoning patterns behind the token spikes, and why unlimited usage models are better suited for continuous defensive operations.

Sharing here in case it helps others experimenting with AI in blue team environments

submitted by /u/Obvious-Language4462
[link] [comments]

Google fixes super-secret 8th Chrome 0-day

No details, no CVE, update your browser now

Google issued an emergency fix for a Chrome vulnerability already under exploitation, which marks the world's most popular browser's eighth zero-day bug of 2025.โ€ฆ

LastPass hammered with ยฃ1.2M fine for 2022 breach fiasco

UK data regulator says failures were unacceptable for a company managing the world's passwords

The UK's Information Commissioner's Office (ICO) says LastPass must cough up ยฃ1.2 million ($1.6 million) after its two-part 2022 data breach compromised information from up to 1.6 million UK users.โ€ฆ

I dropped this power bank from waist level, and it proved its worth almost immediately

The outdoors can be difficult for power banks, but this one by Nitecore is built to last.

You can send live video to 911 from your Android phone in seconds now - here's how

If 911 needs eyes on your situation, they'll send a prompt for you to share live video instantly.

ThreatsDay Bulletin: Spyware Alerts, Mirai Strikes, Docker Leaks, ValleyRAT Rootkit โ€” and 20 More Stories

This weekโ€™s cyber stories show how fast the online world can turn risky. Hackers are sneaking malware into movie downloads, browser add-ons, and even software updates people trust. Tech giants and governments are racing to plug new holes while arguing over privacy and control. And researchers keep uncovering just how much of our digital life is still wide open. The new Threatsday Bulletin

Comcast just killed hidden fees with new contract-free TV plans - starting at $55

The new Xfinity TV plans keep it simple with one up-front pricing. There's not even equipment rental charges.

NANOREMOTE Malware Uses Google Drive API for Hidden Control on Windows Systems

Cybersecurity researchers have disclosed details of a new fully-featured Windows backdoor called NANOREMOTE that uses the Google Drive API for command-and-control (C2) purposes. According to a report from Elastic Security Labs, the malware shares code similarities with another implant codenamed FINALDRAFT (aka Squidoor) that employs Microsoft Graph API for C2. FINALDRAFT is attributed to a

The Segmentation Cycle: A Practical Approach to Network Security

The segmentation journey starts with visibility, goes through identity context, policy and enforcement, ultimately returning to enhanced visibility.

Researcher claims Salt Typhoon spies attended Cisco training scheme

Skills gained later fed Beijing's cyber operations, according to SentinelLabs expert

A security researcher specializing in tracking China threats claims two of Salt Typhoon's members were former attendees of a training scheme run by Cisco.โ€ฆ

The Impact of Robotic Process Automation (RPA) on Identity and Access Management

By: Unknown
As enterprises refine their strategies for handling Non-Human Identities (NHIs), Robotic Process Automation (RPA) has become a powerful tool for streamlining operations and enhancing security. However, since RPA bots have varying levels of access to sensitive information, enterprises must be prepared to mitigate a variety of challenges. In large organizations, bots are starting to outnumber

10K Docker images spray live cloud creds across the internet

Flare warns devs are unwittingly publishing production-level secrets

Docker Hub has quietly become a treasure trove of live cloud keys and credentials, with more than 10,000 public container images exposing sensitive secrets from over 100 companies, including a Fortune 500 firm and a major bank.โ€ฆ

The best cloud hosting services for 2025: Expert tested

We've tested and ranked the best cloud hosting services available to help you choose the right option for your business or side project.

WIRTE Leverages AshenLoader Sideloading to Install the AshTag Espionage Backdoor

An advanced persistent threat (APT) known as WIRTE has been attributed to attacks targeting government and diplomatic entities across the Middle East with a previously undocumented malware suite dubbed AshTag since 2020. Palo Alto Networks Unit 42 is tracking the activity cluster under the name Ashen Lepus. Artifacts uploaded to the VirusTotal platform show that the threat actor has trained its

Unpatched Gogs Zero-Day Exploited Across 700+ Instances Amid Active Attacks

A high-severity unpatched security vulnerability in Gogs has come under active exploitation, with more than 700 compromised instances accessible over the internet, according to new findings from Wiz. The flaw, tracked as CVE-2025-8110 (CVSS score: 8.7), is a case of file overwrite in the file update API of the Go-based self-hosted Git service. A fix for the issue is said to be currently in the

Users report chaos as Legal Aid Agency stumbles back online after cyberattack

Workers frustrated with security-first changes to workflows and teething issues

Exclusive Seven months after a landmark cyberattack, the UK's Legal Aid Agency (LAA) says it's returning to pre-breach operations, although law firms are still wrestling with buggy and more laborious systems.โ€ฆ

Oura users report smoking, overheating rings - what we know

Here's what the smart ring brand is doing about it.

The AI leader's new balance: What changes (and what remains) in the age of algorithms

Successful leaders will harness the power of AI while amplifying essential human capabilities. Three experts share essential recommendations that every executive should have on their agenda.

How to use the new Linux terminal on your Android device - it's easy

There's a powerful new feature for Android users: The Linux terminal. It unlocks a whole new level of control.

Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw

Google on Wednesday shipped security updates for its Chrome browser to address three security flaws, including one it said has come under active exploitation in the wild. The vulnerability, rated high in severity, is being tracked under the Chromium issue tracker ID "466192044." Unlike other disclosures, Google has opted to keep information about the CVE identifier, the affected component, and

Active Attacks Exploit Gladinet's Hard-Coded Keys for Unauthorized Access and Code Execution

Huntress is warning of a new actively exploited vulnerability in Gladinet's CentreStack and Triofox products stemming from the use of hard-coded cryptographic keys that have affected nine organizations so far. "Threat actors can potentially abuse this as a way to access the web.config file, opening the door for deserialization and remote code execution," security researcher Bryan Masters said.

Seeking symmetry during ATT&CKยฎ season: How to harness todayโ€™s diverse analyst and tester landscape to paint a security masterpiece

Interpreting the vast cybersecurity vendor landscape through the lens of industry analysts and testing authorities can immensely enhance your cyber-resilience.

OpenSUSE vs. Manjaro: Which powerhouse Linux distro is best for you?

Looking for a Linux distribution that delivers more power and control? If you're new to Linux, only one of these may be right for you.
Before yesterdayYour RSS feeds

How AMD End-to-End Hardware Turns AI Innovation Into Impact

From PCs to data centers, AMD delivers the compute backbone that turns AI initiatives into business transformations.

700+ self-hosted Gits battered in 0-day attacks with no fix imminent

More than half of internet-exposed instances already compromised

Attackers are actively exploiting a zero-day bug in Gogs, a popular self-hosted Git service, and the open source project doesn't yet have a fix.โ€ฆ

React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors

React2Shell continues to witness heavy exploitation, with threat actors leveraging the maximum-severity security flaw in React Server Components (RSC) to deliver cryptocurrency miners and an array of previously undocumented malware families, according to new findings from Huntress. This includes a Linux backdoor called PeerBlight, a reverse proxy tunnel named CowTunnel, and a Go-based

.NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL

New research has uncovered exploitation primitives in the .NET Framework that could be leveraged against enterprise-grade applications to achieve remote code execution. WatchTowr Labs, which has codenamed the "invalid cast vulnerability" SOAPwn, said the issue impacts Barracuda Service Center RMM, Ivanti Endpoint Manager (EPM), and Umbraco 8. But the number of affected vendors is likely to be
โŒ