FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
Today β€” December 13th 2025Your RSS feeds

Offline Decryption Messenger: Concept Proposal and Request for Constructive Feedback

Hello everybody,

Some activist friends and I have been discussing a problematic gap in the current landscape of secure messaging tools: the lack of user‑friendly communication systems that remain secure even in the presence of spyware. Standard E2E encrypted messengers such as Signal or Element become ineffective once the communication device itself is compromised. If spyware is able to read the screen, capture keystrokes, or access memory, E2E-encryption no longer protects the message content.

For this reason, we "developed" a concept we call Offline Decryption Messaging. The core idea is that each communication participant uses two distinct devices:

  1. an online device with normal internet access, and
  2. an air‑gapped device that is physically incapable of network communication.

All sensitive operations, like writing, decrypting, and displaying clear messages, take place exclusively on the offline device. The online device is used only to transmit encrypted data via standard messaging services.

In practice, the user writes the clear message on the offline device, where it is encrypted and immediately deleted. The resulting ciphertext is then transferred to the online device (for example via a QR code) and sent over an existing messenger. The online device never has access to either the clear message or the cryptographic keys. On the receiving side, the process is reversed: the encrypted message is transferred to the recipient’s offline device and decrypted there.

Under this model, even if all participating online devices are fully compromised by spyware, no sensitive information can be exfiltrated. While spyware on the online device may observe or manipulate transmitted ciphertext, it never encounters the decrypted message. At the same time, spyware on the offline device has no communication channel through which it could leak information to an attacker.

The goal of our project, currently called HelioSphere, is to explore whether this security model can be implemented in a way that is not only robust against modern spyware, but also practical enough for real‑world activist use.

We would love feedback from this community, especially regarding:

  • potential weaknesses in this threat model,
  • existing tools or projects we may have overlooked,
  • usability challenges we should expect,
  • cryptographic and operational improvements.

The concept is further introduced in the document accessible via the link above. The link also contains information about our first functional prototype.

Thanks for reading! We’re looking forward to your thoughts.

submitted by /u/calzone_rivoluzione
[link] [comments]

How to install and configure Claude Code, step by step

Curious about Anthropic's AI coding tool but unsure where to begin? My walkthrough covers pricing, installation, authorization, and project initialization so developers can get up and running smoothly.

CISA Adds Actively Exploited Sierra Wireless Router Flaw Enabling RCE Attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a high-severity flaw impacting Sierra Wireless AirLink ALEOS routers to its Known Exploited Vulnerabilities (KEV) catalog, following reports of active exploitation in the wild. CVE-2018-4063 (CVSS score: 8.8/9.9) refers to an unrestricted file upload vulnerability that could be exploited to achieve remote code

The 9 tech gadgets I couldn't live without in 2025 (and they don't include AirTags)

These are the gadgets and gizmos that have had the biggest impact on my life this year.

How I use AI to bring my kid's art to life - and why it's a fun learning opportunity

I want to introduce my kid to AI tools like ChatGPT, Gemini, and Sora, but without turning it into a shortcut or replacing her imagination.

AI Toys for Kids Talk About Sex, Drugs, and Chinese Propaganda

Plus: Travelers to the US may have to hand over five years of social media history, South Korean CEOs are resigning due to cyberattacks, and more.

Black Hat Europe 2025: Was that device designed to be on the internet at all?

Behind the polished exterior of many modern buildings sit outdated systems with vulnerabilities waiting to be found

Should you ever turn off Windows Security? It's tricky, but here's my rule of thumb

There are some situations where you might want to temporarily disable Windows' built-in security tool. I'll show you how to do it safely.

Building an Open-Source AI-Powered Auto-Exploiter with a 1.7B Parameter Model

I've been experimenting with LangGraph's ReAct agents for offensive security automation and wanted to share some interesting results. I built an autonomous exploitation framework that uses a tiny open-source model (Qwen3:1.7b) to chain together reconnaissance, vulnerability analysis, and exploit executionβ€”entirely locally without any paid APIs.

submitted by /u/beyonderdabas
[link] [comments]

Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild

Apple on Friday released security updates for iOS, iPadOS, macOS, tvOS, watchOS, visionOS, and its Safari web browser to address two security flaws that it said have been exploited in the wild, one of which is the same flaw that was patched by Google in Chrome earlier this week. The vulnerabilities are listed below - CVE-2025-43529 (CVSS score: N/A) - A use-after-free vulnerability in WebKit
Yesterday β€” December 12th 2025Your RSS feeds

Microsoft RasMan DoS 0-day gets unofficial patch - and a working exploit

Exploit hasn't been picked up by any malware detection engines, CEO tells The Reg

A Microsoft zero-day vulnerability that allows an unprivileged user to crash the Windows Remote Access Connection Manager (RasMan) service now has a free, unofficial patch - with no word as to when Redmond plans to release an official one - along with a working exploit circulating online.…

Processing 630 Million More Pwned Passwords, Courtesy of the FBI

Processing 630 Million More Pwned Passwords, Courtesy of the FBI

The sheer scope of cybercrime can be hard to fathom, even when you live and breathe it every day. It's not just the volume of data, but also the extent to which it replicates across criminal actors seeking to abuse it for their own gain, and to our detriment.

We were reminded of this recently when the FBI reached out and asked if they could send us 630 million more passwords. For the last four years, they've been sending over passwords found during the course of their investigations in the hope that we can help organisations block them from future use. Back then, we were supporting 1.26 billion searches of the service each month. Now, it's... more:

Just as it's hard to wrap your head around the scale of cybercrime, I find it hard to grasp that number fully. On average, that service is hit nearly 7 thousand times per second, and at peak, it's many times more than that. Every one of those requests is a chance to stop an account takeover. But the real scale goes well beyond the API itself. Because the data model is open source and freely available, many organisations use the Pwned Passwords Downloader to take the entire corpus offline and query it directly within their own applications. That tool alone calls the API around a million times during download, but the resulting data is then queried… well, who knows how many times after that. Pretty cool, right?

This latest corpus of data came to us as a result of the FBI seizing multiple devices belonging to a suspect. The data appeared to have originated from both the open web and Tor-based marketplaces, Telegram channels and infostealer malware families. We hadn't seen about 7.4% of them in HIBP before, which might sound small, but that's 46 million vulnerable passwords we weren't giving people using the service the opportunity to block. So, we've added those and bumped the prevalence count on the other 584 million we already had.

We're thrilled to be able to provide this service to the community for free and want to also quickly thank Cloudflare for their support in providing us with the infrastructure to make this possible. Thanks to their edge caching tech, all those passwords are queryable from a location just a handful of milliseconds away from wherever you are on the globe.

If you're hitting the API, then all the data is already searchable for you. If you're downloading it all offline, go and grab the latest data now. Either way, go forth and put it to good use and help make a cybercriminal's day just that much harder 😊

I'm a shopping editor, and this is the No. 1 reason I prefer Best Buy over Amazon for tech purchases

Jeff Bezos doesn't care about you like the Geek Squad does. Best Buy just price-matched my Cyber Monday purchase in under 5 minutes.

Have You Seen My Domain Controller?

Windows clients expose Active Directory DNS queries on public Wi-Fi, risking OSINT and credential leaks. Learn from Cisco Live SOC observations how to protect clients with VPNs .

I compared 5G network signals of Verizon, T-Mobile, and AT&T on a road trip - here's who wins

Between the three biggest mobile carriers, here's which one delivers the best (and most consistent) network signal.

I tested GPT-5.2 and the AI model's mixed results raise tough questions

Subjected to my battery of 10 text tests and 4 image challenges, OpenAI's latest model barely edged out GPT-5.1. What are Plus subscribers actually paying for?

This Week in Scams: Petco Breach Warning, and Watch Out for Fake Federal Calls

By: McAfee
A dog in a sweater on a walk.

Pets, poisoned AI search results, and a phone call that sounds like it’s coming straight from the federal government, this week’s scams don’t have much in common except one thing: they’re getting harder to spot.

In today’s edition of This Week in Scams, we’re breaking down the biggest security lapses and the tactics scammers used to exploit them, and what you can do to stay ahead of the latest threats.

Two data security lapses discovered at Petco in one week put pet parents at risk

If you’re a Petco customer, you’ll want to know about not one but two data security lapses in the past week.

First, as reported by TechCrunch on Monday, Petco followed Texas data privacy laws by filing a data breach with the attorney general’s office. In that filing, Petco reported that the affected data included names, Social Security numbers, and driver’s license numbers. Further info including account numbers, credit and debit card numbers, and dates of birth were also mentioned in the filing.

Also according to Techcrunch, the company filed similar notices in California and Massachusetts.

To date, Petco has not made a comment about the size of the breach and the number of people affected.

Different states have different policies for reporting data breaches. In some cases, that helps us put a figure to the size of the breach, as some states require companies to disclose the total number of people caught up in the breach. That’s not the case here, so the full scope of the attack remains in question, at least for right now.

As of Thursday, we know Petco reported that 329 Texans were affected along with seven Massachusetts residents, per the respective reports filed. California’s report does not contain the number of Californians affected, yet laws in that state require businesses to report breaches that affect 500 or more people, so at least 500 people were affected there.

Below you can see the form letter Petco sent to affected Californians in accordance with California’s data privacy laws:

Copy of the form letter posted on the California Attorney General’s Website
Copy of the form letter posted on the California Attorney General’s Website

Β 

In it, you can see that Petco discovered that β€œa setting within one of our software applications … inadvertently allowed certain files to become accessible online.” Further, Petco said that it β€œimmediately took steps to correct the issue and to remove the files from further online access,” and that it β€œcorrected” the setting and implemented unspecified β€œadditional security measures.”

So while no foul play appears to have been behind the breach, it’s still no less risky and concerning for Petco’s customers. We’ll cover what you can do about that in a moment after we cover yet another data issue at Petco through its Vetco clinics.

Also within the same timeframe, yet more research and reporting from Techcrunch uncovered a second security lapse that exposed personal info online. From their article:

β€œTechCrunch identified a vulnerability in how Vetco’s website generates copies of PDF documents for its customers.

β€œVetco’s customer portal, located atΒ petpass.com, allows customers to log in and obtain veterinary records and other documents relating to their pet’s care. But TechCrunch found that the PDF generating page on Vetco’s website was public and not protected with a password.

β€œAs such, it was possible for anyone on the internet to access sensitive customer files directly from Vetco’s servers by modifying the web address to input a customer’s unique identification number. Vetco customer numbers are sequential, which means one could access other customers’ data simply by changing a customer number by one or two digits.”

What to do if you think you had info stolen in the Petco breach

With the size and reach of the Petco breach still unknown, and the impact of the Vetco security lapse also unknown, we advise caution for all Petco customers. At minimum, monitor transactions and keep an eye on your credit report for any suspicious activity. And it’s always a good time to update a weak password.

For those who received a notification, we advise the following:

Check your credit, consider a security freeze, and get ID theft protection. You can get all three working for you with McAfee+ Advanced or McAfee+ Ultimate.

Monitor transactions across your accounts, also available in McAfee+ Advanced and Ultimate.

Keep an eye out for phishing attacks. Use our Scam Detector to spot any follow-on attacks.

Update your passwords. Strong and unique passwords are best. Our password managerΒ can help you create and store them securely.

And use two-factor authentication on all your accounts. Enabling two-factor authentication provides an added layer of security.

Image Credit: Federal Register
Image Credit: Federal Register

Β 

What to do if your Social Security number was breached.

If you think your Social Security number was caught up in the breach, act quickly.

  1. First, contact one of the three credit bureaus (Equifax, Experian, or TransUnion) and place a fraud alert on your credit report.
  2. That will cover all three bureaus and make it harder for someone to open new accounts in your name. You can also quickly freeze your credit altogether with McAfee+ Ultimate.
  3. Also notify the Social Security Administration (SSA) along with the Internal Revenue Service (IRS), and file a police report immediately if you believe your number is being misused.

The call center number that connects you to … scammers?

You might want to be careful when searching for customer service numbers while in AI mode. Or with an AI search engine. It could connect you to a scammer.

From The Times comes reports of scammers manipulating the AI in platforms like Google and Perplexity so that their search results return scam numbers instead of a proper customer service numbers for, say, British Airways.

How do they manipulate those results? By spamming the internet with false info that gets picked up and then amplified by AI.

β€œ[S]cammers have started seeding fake call center numbers on the web so the AI is tricked into thinking it is genuine …

β€œCriminals have set up YouTube channels with videos claiming to help with customer support, which are packed with airline brand names and scam numbers designed to be scraped and reused by the AI.

β€œBot-generated reviews on Yelp or video descriptions on YouTube are filled with fraudulent numbers as are airline and travel web forums.”

And with these tactics, scammers could poison the results for just about any organization, business, or brand. Not just airlines. Per The Times, β€œThe scammers have also hijacked government sites, university domains, and even fitness sites to place scam numbers, which fools the AI into thinking they are genuine.”

This reveals a current limitation with many AI platforms. Largely they can’t distinguish when people deliberately feed them bad info, as seen in the case here.

Yet even as this attack is new, our advice remains the same: any time you want to ring up a customer service line, get the number directly from the company’s official website. Not from AI search and not by clicking a paid search result that shows up first (scammers can poison them too).

Is that a call from an FTC β€œagent?” If so, it’s a scam.

Are you under investigation for money laundering? Of course not. But this scam wants you to think soβ€”and to pay up.

On Tuesday, the Federal Trade Commission (FTC) issued a consumer alert warning that people are reporting getting unexpected calls from someone saying they’re β€œFTC agent” John Krebs. Apparently β€œAgent Krebs” is telling people that they’re under investigation for money launderingβ€”and that a deposit to a Bitcoin ATM can resolve the matter.

Of course, it’s a scam.

For starters, the FTC doesn’t have β€œagents.” And the idea of clearing one’s name in an investigation with a Bitcoin payment is a sure-fire sign of a scam. Lastly, any time someone asks for payment with Bitcoin or other payment methods that are near-impossible to recover (think wire transfers and gift cards), those are big red flags.

Apart from hanging up and holding on to your money, the FTC offers the following guidance, which holds true for any scam call:

  • Never transfer or send money to anyone in response to an unexpected call or message, no matter who they say they are.
  • Know that the FTC won’t ask for money.Β In fact, no government agency will ever tell you to deposit money at aΒ cryptocurrency ATM, buyΒ gift cardsΒ and share the numbers, or send money over aΒ payment appΒ like Zelle, Cash App, or Venmo.
  • Don’t trust your caller ID.Β A call might look like it’s coming from the government or a business, but scammers often fake caller ID.

And we close things out a quick roundup …

As always, here’s a quick list of a few stories that caught our eye this week:

AI tools transform Christmas shopping as people turn to chatbots

National cybercrime network operating for 14 years dismantled in Indonesia

Why is AI becoming the go-to support for our children’s mental health?

We’ll see you next Friday with a special edition to close out 2025 … This Year in Scams.

The post This Week in Scams: Petco Breach Warning, and Watch Out for Fake Federal Calls appeared first on McAfee Blog.

Fake OSINT and GPT Utility GitHub Repos Spread PyStoreRAT Malware Payloads

Cybersecurity researchers are calling attention to a new campaign that's leveraging GitHub-hosted Python repositories to distribute a previously undocumented JavaScript-based Remote Access Trojan (RAT) dubbed PyStoreRAT. "These repositories, often themed as development utilities or OSINT tools, contain only a few lines of code responsible for silently downloading a remote HTA file and executing

New React vulns leak secrets, invite DoS attacks

And the earlier React2Shell patch is vulnerable

If you're running React Server Components, you just can't catch a break. In addition to already-reported flaws, newly discovered bugs allow attackers to hang vulnerable servers and potentially leak Server Function source code, so anyone using RSC or frameworks that support it should patch quickly.…

Opera's Neon AI browser now available for $20/month - packed with these power user features

The tool is built for AI power users and allows access to a handful of frontier models. It also comes with security risks.

AI could finally pay off for businesses in 2026 - thanks to this, experts say

If you've been waiting for AI promises to materialize, 2026 may be your year -- and this unexpected element could be the key.

Your earbuds can translate 70 languages in real-time now, thanks to Gemini

Android users can hear live translations in more than 70 languages, with Gemini preserving the speaker's tone and cadence.

The 8 gifts I'd give to my cool techie friends this holiday season

Give them tech they'll actually use this year.

Save on refurbished iPhones at Back Market - no trade-in required

Back Market is offering discounts of up to $500 on refurbished iPhone models, including the iPhone 16 Pro Max and more. And if you have a qualifying trade-in, you can save even more.

Weaponized AI risk is 'high,' warns OpenAI - here's the plan to stop it

OpenAI is focused on assessing when AI models are sufficiently capable to either help or hinder defenders, and on safeguarding its own models against cybercriminal abuse.

AI is already part of Linux's plumbing - whether developers like it or not

AI is quietly doing some of Linux's dirtiest work, but not everyone is comfortable with it.

New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale

Cybersecurity researchers have documented four new phishing kits named BlackForce, GhostFrame, InboxPrime AI, and Spiderman that are capable of facilitating credential theft at scale. BlackForce, first detected in August 2025, is designed to steal credentials and perform Man-in-the-Browser (MitB) attacks to capture one-time passwords (OTPs) and bypass multi-factor authentication (MFA). The kit

Microsoft promises more bug payouts, with or without a bounty program

Critical vulnerabilities found in third-party applications eligible for award under 'in scope by default' move

Microsoft is overhauling its bug bounty program to reward exploit hunters for finding vulnerabilities across all its products and services, even those without established bounty schemes.…

Uncle Sam sues ex-Accenture manager over Army cloud security claims

Justice Department alleges federal auditors were misled over compliance with FedRAMP and DoD requirements

The US is suing a former senior manager at Accenture for allegedly misleading the government about the security of an Army cloud platform.…

The best proxy server services of 2025: Expert recommended

Proxy servers act as intermediaries for online traffic and can be used for various business purposes. We recommend these top proxy services.

Black Hat Europe 2025: Reputation matters – even in the ransomware economy

Being seen as reliable is good for β€˜business’ and ransomware groups care about 'brand reputation' just as much as their victims

Locks, SOCs and a cat in a box: What SchrΓΆdinger can teach us about cybersecurity

If you don’t look inside your environment, you can’t know its true state – and attackers count on that

The 5 most innovative tech products we tested this year (including a tri-fold surprise)

From AI glasses with digital overlays to robot vacuums that can pick up your leftover laundry, here are ZDNET's Breakthrough Award winners for 2025.

UK watchdog urged to probe GDPR failures in Home Office eVisa rollout

Rights groups say digital-only record is leaking data and courting trouble

Civil society groups are urging the UK's data watchdog to investigate whether the Home Office's digital-only eVisa scheme is breaching GDPR, sounding the alarm about systemic data errors and design failures that are exposing sensitive personal information while leaving migrants unable to prove their lawful status.…

Best travel VPNs 2025: Expert-tested for streaming and avoiding censorship

VPNs shield you from spying and can resolve online blocks you may find in other countries including the UK's new checks. My favorite travel VPNs offer fast speeds, massive server networks, and solid encryption.

Half of exposed React servers remain unpatched amid active exploitation

Wiz says React2Shell attacks accelerating, ranging from cryptominers to state-linked crews

Half of the internet-facing systems vulnerable to a fast-moving React remote code execution flaw remain unpatched, even as exploitation has exploded into more than a dozen active attack clusters ranging from bargain-basement cryptominers to state-linked intrusion tooling.…

The best small business web hosting services of 2025: Expert tested

Looking for a reliable and affordable web hosting package for your growing business? Here are my top picks based on affordability, scalability, and value for money.

The best cheap web hosting services of 2025: Expert tested

Check out our top picks, tested and ranked, for affordable web hosting services in 2025.

Best VPNs for streaming 2025: Expert tested and reviewed

If you want to access your favorite streaming services from different locations, a VPN might help. Check out my favorites for the fastest speeds and most servers.

Securing GenAI in the Browser: Policy, Isolation, and Data Controls That Actually Work

By: Unknown
The browser has become the main interface to GenAI for most enterprises: from web-based LLMs and copilots, to GenAI‑powered extensions and agentic browsers like ChatGPT Atlas. Employees are leveraging the power of GenAI to draft emails, summarize documents, work on code, and analyze data, often by copying/pasting sensitive information directly into prompts or uploading files.Β  Traditional

The best security keys of 2025: Expert tested

Security keys are the ultimate physical security measure for protecting your online accounts. We tested and ranked the best security keys on the market today.

New React RSC Vulnerabilities Enable DoS and Source Code Exposure

The React team has released fixes for two new types of flaws in React Server Components (RSC) that, if successfully exploited, could result in denial-of-service (DoS) or source code exposure. The team said the issues were found by the security community while attempting to exploit the patches released for CVE-2025-55182 (CVSS score: 10.0), a critical bug in RSC that has since been weaponized in

React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has urged federal agencies to patch the recent React2Shell vulnerability by December 12, 2025, amid reports of widespread exploitation. The critical vulnerability, tracked as CVE-2025-55182 (CVSS score: 10.0), affects the React Server Components (RSC) Flight protocol. The underlying cause of the issue is an unsafe deserialization

CISA Flags Actively Exploited GeoServer XXE Flaw in Updated KEV Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity security flaw impacting OSGeo GeoServer to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation in the wild. The vulnerability in question is CVE-2025-58360 (CVSS score: 8.2), an unauthenticated XML External Entity (XXE) flaw that affects all versions prior to

8 HDMI tricks I use to get the best performance from my TV - and most are free

Think your TV setup is fine? These HDMI tricks can unlock performance and sound you didn't know you were missing.

This company's AI success was built on 5 essential steps - see how they work for you

From data foundations to storytelling techniques, here's how to turn your AI projects into valuable production services.

Crypto-crasher Do Kwon jailed for 15 years over $40bn UST bust

Judge said his fraud was on 'epic, generational scale'

Terraform Labs founder Do Kwon will spend 15 years in jail after pleading guilty to committing fraud.…

Require Google to Remove One-Click Full Logout URLs

My father got tricked into calling scammers after a hidden Google logout URL made him think his computer was hacked. Turns out, Google lets any website instantly log you out of Gmail, YouTube, and Drive just by loading a simple link - no warning, no confirmation. I made a petition, and I want to know if this is something worth signing and sharing, or if it's not realistic.

submitted by /u/Redstoneriot234
[link] [comments]
Before yesterdayYour RSS feeds

Warnings Mount in Congress Over Expanded US Wiretap Powers

Experts tell US lawmakers that a crucial spy program’s safeguards are failing, allowing intel agencies deeper, unconstrained access to Americans’ data.

Do you ask AI deep questions at night? 37.5 million Copilot conversations show you're not alone

From work-related conversations on our desktops by day toΒ personal advice on our phones after hours, AI now integrates 'into the full texture of human life,' a Microsoft study finds.

Russian hackers debut simple ransomware service, but store keys in plain text

Operators accidentally left a way for you to get your data back

CyberVolk, a pro-Russian hacktivist crew, is back after months of silence with a new ransomware service. There's some bad news and some good news here.…

OpenAI user data was breached, but changing your password won't help - here's why

Revealed on Thanksgiving Eve, the incident serves as a reminder that we're all responsible for exploring additional security options.

Should you stop logging in through Google and Facebook? Consider these SSO risks vs. benefits

Relying on consumer SSO creates significant challenges, and passkeys may offer a solution.

Doxers Posing as Cops Are Tricking Big Tech Firms Into Sharing People’s Private Data

A spoofed email address and an easily faked document is all it takes for major tech companies to hand over your most personal information.
❌