FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
Today β€” February 6th 2026Your RSS feeds

How to use Lockdown Mode: The extreme iPhone security feature that foiled even the FBI

Lockdown Mode defends your iPhone against cyber attacks and blocks forensic tools after a seizure. Here's how to quickly activate it.

Beyond gold:Β Why Team USA will be wearing titanium at these Olympics

US athletes will sport Oura Rings to track their health. Here's why sponsorships like these can inspire new features.

AT&T's new phone for kids might solve your biggest problem with parental controls - for $3 a month

With standard budget phone specs and a decent camera, the amiGO Jr. phone could become a go-to option for parents. There's a companion watch, too.

Flickr emails users about data breach, pins it on 3rd party

Attackers may have snapped user locations and activity information, message warns

Legacy image-sharing website Flickr suffered a data breach, according to customers emails seen by The Register.…

DDoS deluge: Brit biz battered as botnet blitzes break records

UK leaps to sixth in global flood charts as mega-swarm unleashes 31.4 Tbps Yuletide pummeling

Cloudflare says DDoS crews ended 2025 by pushing traffic floods to new extremes, while Britain made an unwelcome leap of 36 places to become the world's sixth-most targeted location.…

Tool: AST-based security scanner for AI-generated code (MCP server)

Released an open-source security scanner designed for AI coding agent workflows.

Problem: AI assistants generate code with OWASP Top 10 vulnerabilities at alarming rates. They also "hallucinate" package names that could be registered by attackers.

Solution: MCP server that integrates with AI coding tools (Claude, Cursor, etc.) for real-time scanning.

Technical details:

- tree-sitter AST parsing for accurate detection (not just regex)

- Taint analysis for tracking user input to dangerous sinks

- 275+ rules covering: SQLi, XSS, command injection, SSRF, XXE, insecure deserialization, hardcoded secrets, weak crypto

- Package verification via bloom filters (4.3M packages, 7 ecosystems)

- Prompt injection detection for AI agent security

- CWE/OWASP metadata for compliance

Languages: Python, JavaScript/TypeScript, Java, Go, Ruby, PHP, C/C++, Rust, C#, Terraform, Kubernetes

No cloud dependencies - runs entirely local.

npx agent-security-scanner-mcp init

Feedback welcome, especially on rule coverage gaps.

submitted by /u/NoButterfly9145
[link] [comments]

China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

Cybersecurity researchers have taken the wraps off a gateway-monitoring and adversary-in-the-middle (AitM) framework dubbed DKnife that's operated by China-nexus threat actors since at least 2019. The framework comprises seven Linux-based implants that are designed to perform deep packet inspection, manipulate traffic, and deliver malware via routers and edge devices. Its primary targets seem to

This tiny travel adapter is my new must-have when flying out (and it's only $25)

The Anker Nano 5-port universal travel adapter is perfect for the lightweight traveler.

I used Xcode 26.3 to build an iOS app with my voice in just two days - and it was exhilarating

Want to see what agentic coding really feels like? Come along on my wild, wonderful, and terrifying two-day vibe coding adventure with Xcode 26.3.

CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ordered Federal Civilian Executive Branch (FCEB) agencies to strengthen asset lifecycle management for edge network devices and remove those that no longer receive security updates from original equipment manufacturers (OEMs) over the next 12 to 18 months. The agency said the move is to drive down technical debt and minimize

Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities

A previously undocumented cyber espionage group operating from Asia broke into the networks of at least 70 government and critical infrastructure organizations across 37 countries over the past year, according to new findings from Palo Alto Networks Unit 42. In addition, the hacking crew has been observed conducting active reconnaissance against government infrastructure associated with 155

The best backup software of 2026: Expert tested and reviewed

I tested the top backup software for 2025 to help you protect your data. Here's my hands-on review of the best options for businesses and individuals.

How Samsung Knox Helps Stop Your Network Security Breach

By: Unknown
As you know, enterprise network security has undergone significant evolution over the past decade. Firewalls have become more intelligent, threat detection methods have advanced, and access controls are now more detailed. However (and it’s a big β€œhowever”), the increasing use of mobile devices in business operations necessitates network security measures that are specifically

Forget OLED: I'd choose this TCL Mini LED TV deal over pricier models

It's the perfect time to pick up the TCL QM7K on sale at Best Buy for just $600, a ZDNET Editor's Choice Award winner.

Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

Cybersecurity researchers have discovered a new supply chain attack in which legitimate packages on npm and the Python Package Index (PyPI) repository have been compromised to push malicious versions to facilitate wallet credential theft and remote code execution. The compromised versions of the two packages are listed below - @dydxprotocol/v4-client-js (npm) - 3.4.1, 1.22.1, 1.15.2, 1.0.31&

Hacking a cheap Wi-Fi toy drone

I took apart a cheap Chinese toy drone (A17) and reverse-engineered how it works.

The drone exposes a Wi-Fi AP, the app sends raw UDP packets, and there’s no encryption. I decoded the control protocol and flew it using Python.

submitted by /u/fhackdroid
[link] [comments]

Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries

Artificial intelligence (AI) company Anthropic revealed that its latest large language model (LLM), Claude Opus 4.6, has found more than 500 previously unknown high-severity security flaws in open-source libraries, including Ghostscript, OpenSC, and CGIF. Claude Opus 4.6, which was launched Thursday, comes with improved coding skills, including code review and debugging capabilities, along with

How we test headphones at ZDNET in 2026

We travel, exercise, work, and live in the latest headphones and earbuds so we can recommend the best for you. Here's a look at our testing methodologies.

I reversed Tower of Fantasy's kernel anti-cheat driver while waiting for the game to install. It's a full BYOVD toolkit that's never even loaded.

Found arbitrary process termination that bypasses PPL (can kill any process on the system, including EDR/AV) and arbitrary process protection via ObRegisterCallbacks, all behind 4 layers of trivial authentication. It's a full BYOVD toolkit similar to the mhyprot2 situation from Genshin Impact that was also used by ransomware groups.

The best part is that the driver ships with every install and is never even loaded by the game.

Full PoC: https://github.com/svespalec/TowerOfFlaws

submitted by /u/RadioactiveBlanket
[link] [comments]

I found the best Sonos Arc soundbar deal right now, and it takes $200 off (no strings attached)

Upgrade any TV with Sonos' best soundbar. For $200 off, it's the best price you'll find.

Ad blocking is alive and well, despite Chrome's attempts to make it harder

The end isn't nigh after all

Chrome's latest revision of its browser extension architecture, known as Manifest v3 (MV3), was widely expected to make content blocking and privacy extensions less effective than its predecessor, Manifest v2 (MV2).…

Sentience, Allegedly

Last week, AI agents founded a lobster religion, started a drug trade (prompt injections), and began hiring humans to do physical tasks they can’t perform themselves.

If your feed told you this was an β€œAI awakening,” I get it. The screenshots were spooky on purpose.

I wrote a longform explainer on what actually happened with Moltbook and OpenClaw and why this wasn’t sentience or takeoff.

What we’re really seeing is something more mundane and more important: agents with memory and tools dropped into a social environment, stress-testing coordination, incentives, and security in public.

If you’ve been confused, alarmed, or just fascinated by the last week of AI discourse, this is my attempt to separate signal from projection (with a lobster church along the way).

submitted by /u/RMunizIII
[link] [comments]

OpenClaw reveals meaty personal information after simple cracks

Skills marketplace is full of stuff - like API keys and credit card numbers - that crims will find tasty

Another day, another vulnerability (or two, or 200) in the security nightmare that is OpenClaw.…

Yesterday β€” February 5th 2026Your RSS feeds

OpenAI's Frontier looks like another AI agent tool - but it's really an enterprise power play

Emulating Palantir's use of forward-deployed AI engineers, OpenAI's framework is both an opportunity and a threat for commercial software firms.

ICE and CBP’s Face-Recognition App Can’t Actually Verify Who People Are

ICE has used Mobile Fortify to identify immigrants and citizens alike over 100,000 times, by one estimate. It wasn't built to work like thatβ€”and only got approved after DHS abandoned its own privacy rules.

Substack says intruder lifted emails, phone numbers in months-old breach

Contact details were accessed in an intrusion that went undetected for months, the blogging outfit says

Newsletter platform Substack has admitted that an intruder swiped user contact details months before the company noticed, forcing it to warn writers and readers that their email addresses and other account metadata were accessed without permission.…

One of the best-looking Windows laptops I've tested lately isn't made by Dell or Lenovo

The Acer Swift Edge 14 is a great-looking midranger with a vibrant OLED and outstanding battery life.

Which AI chatbots have ads? Comparing ChatGPT, Claude, Gemini, and more

Wondering which AI chatbots are still ad-free in 2026? There aren't many. Here's a quick rundown of the top ones.

Asia-based government spies quietly broke into critical networks across 37 countries

And their toolkit includes a new, Linux kernel rootkit

A state-aligned cyber group in Asia compromised government and critical infrastructure organizations across 37 countries in an ongoing espionage campaign, according to security researchers.…

Finally, I found a highly functional multitool that isn't a gimmick - and it's on sale

Bibury's Multitool Pliers Pro is a fraction of the price of the big brand names, but no less handy with 31 different tools.

Spotify's new Page Match feature fixes my biggest frustration with audiobooks - here's how

Spotify's latest feature lets you switch easily between reading a physical book and an audiobook - here's how to try it yourself.

OpenAI's new GPT-5.3-Codex is 25% faster and goes way beyond coding now - what's new

The Codex team said GPT-5.3-Codex even helped build itself.

Anthropic says its new Claude Opus 4.6 can nail your work deliverables on the first try

The frontier model can handle complex, end-to-end enterprise workflows and take on the autonomous tasks you usually do yourself.

AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack

The distributed denial-of-service (DDoS) botnet known as AISURU/Kimwolf has been attributed to a record-setting attack that peaked at 31.4 Terabits per second (Tbps) and lasted only 35 seconds. Cloudflare, which automatically detected and mitigated the activity, said it's part of a growing number of hyper-volumetric HTTP DDoS attacks mounted by the botnet in the fourth quarter of 2025. The

AI agent adoption and budgets will rise significantly in 2026, despite challenges

Research suggests agentic transformation is becoming the new enterprise standard. Challenges remain, but they can be overcome. Here's how.

Here's a portable power bank that's actually worth its high price - especially if you travel

The Cuktech 15 Air is a small yet energy-dense power bank that commands a premium price. Here's how it fared in my tests.

Betterment breach may expose 1.4M users after social engineering attack

Breach-tracking site flags dataset following impersonation-based intrusion

Breach-tracking site Have I Been Pwned (HIBP) claims a cyberattack on Betterment affected roughly 1.4 million users – although the investment company has yet to publicly confirm how many customers were affected by January's intrusion.…

This rugged Android tablet I tested was off to a rough start - then I discovered its real charm

The Oukitel RT10 tablet is built like a tank yet still delivers a bright, vivid display.

Your ExpressVPN is getting three huge upgrades - including a private AI assistant

ExpressVPN is expanding beyond basic VPN protection to better compete with NordVPN. Here's what's new.

Yara-X + PacketSmith Detection Module

Version 5 of PacketSmith, codenamed Pinus strobus, is the result of extensive R&D to add unique, unparalleled features that matter to network detection engineers, SoC analysts, and malware and vulnerability researchers. In this release, we’re showcasing a very powerful new feature in PacketSmith: the integration of Yara-X, a state-of-the-art scanning engine and pattern-matching library.

submitted by /u/MFMokbel
[link] [comments]

Facing the Quantum Threat: Cisco’s Strategic Approach to PQC

Quantum threats are closer than you think. Explore Cisco’s strategic approach to Post-Quantum Cryptography (PQC) and how to protect against HNDL risks now.

ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories

This week didn’t produce one big headline. It produced many small signals β€” the kind that quietly shape what attacks will look like next. Researchers tracked intrusions that start in ordinary places: developer workflows, remote tools, cloud access, identity paths, and even routine user actions. Nothing looked dramatic on the surface. That’s the point. Entry is becoming less visible while impact

The best business messaging apps of 2026: Expert tested

I tested the top business messaging platforms to find the best solutions for team collaboration, security, and productivity in 2026.

Italy claims cyberattacks 'of Russian origin' are pelting Winter Olympics

Right on cue, petulant hacktivists attempt to disrupt yet another global sporting event

Italy's foreign minister says the country has already started swatting away cyberattacks from Russia targeting the Milano Cortina Winter Olympics.…

Why the most private way to browse the web isn't incognito mode (but this instead)

If you want the highest level of privacy and security online, you should be using the Tor browser.

n8n security woes roll on as new critical flaws bypass December fix

Patch meant to close a severe expression bug fails to stop attackers with workflow access

Multiple newly disclosed bugs in the popular workflow automation tool n8n could allow attackers to hijack servers, steal credentials, and quietly disrupt AI-driven business processes.…

The Buyer’s Guide to AI Usage Control

By: Unknown
Today’s β€œAI everywhere” reality is woven into everyday workflows across the enterprise, embedded in SaaS platforms, browsers, copilots, extensions, and a rapidly expanding universe of shadow tools that appear faster than security teams can track. Yet most organizations still rely on legacy controls that operate far away from where AI interactions actually occur. The result is a widening

Cloud sovereignty is no longer just a public sector concern

Businesses still chase the cheapest option, but politics and licensing shocks are changing priorities, says OpenNebula

Interview Sovereignty remains a hot topic in the tech industry, but interpretations of what it actually means – and how much it matters – vary widely between organizations and sectors. While public bodies are often driven by regulation and national policy, the private sector tends to take a more pragmatic, cost-focused view.…

Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends

The elusive Iranian threat group known as Infy (aka Prince of Persia) has evolved its tactics as part of efforts to hide its tracks, even as it readied new command-and-control (C2) infrastructure coinciding with the end of the widespread internet blackout the regime imposed at the start of January 2026. "The threat actor stopped maintaining its C2 servers on January 8 for the first time since we

The best touchscreen laptops in 2026: Expert tested and reviewed

We've tested some of the best touchscreen laptops from Samsung, Lenovo, and Asus to find the best one for your everyday needs.

My favorite iPad Air accessories should be on every power user's list (including this Pencil alternative)

I've been using an iPad Air M2 for nearly two years, and these are my go-to essentials.

OfferUp scammers are out in force: Here’s what you should know

The mobile marketplace app has a growing number of users, but not all of them are genuine. Watch out for these common scams.

New CentOS UAF to LPE vulnerability

A flaw that exists within the handling of sch_cake can allow a local user under the CentOS 9 operating system to trigger an use-after-free. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root.

submitted by /u/SSDisclosure
[link] [comments]

Kali Linux vs. Parrot OS: Which security-forward distro is right for you?

Whether you're interested in penetration testing or simply curious about cybersecurity, I recommend one of these specialized Linux distributions. Let's compare.

Three clues that your LLM may be poisoned with a sleeper-agent back door

It's a threat straight out of sci-fi, and fiendishly hard to detect

Sleeper agent-style backdoors in AI large language models pose a straight-out-of-sci-fi security threat.…

❌