Through our honeypot (https://github.com/mariocandela/beelzebub), Iβve identified a major evolution of the RondoDox botnet, first reported by FortiGuard Labs in 2024.
The newly discovered RondoDox v2 shows a dramatic leap in sophistication and scale:
 πΊ +650% increase in exploit vectors (75+ CVEs observed)
 πΊ New C&C infrastructure on compromised residential IPs
 πΊ 16 architecture variants
 πΊ Open attacker signature: bang2013@atomicmail[.]io
 πΊ Targets expanded from DVRs and routers to enterprise systems 
The full report includes:
 - In-depth technical analysis (dropper, ELF binaries, XOR decoding)
 - Full IOC list
 - YARA and Snort/Suricata detection rules
 - Discovery timeline and attribution insights
Chinese president Xi Jinping has joked that smartphones from Xiaomi might include backdoors.β¦
Australian police last week made 55 arrests using evidence gathered with a backdoored messaging app that authorities distributed in the criminal community.β¦
The paper analyzes trust between stages in LLM and agent toolchains. If intermediate representations are accepted without verification, models may treat structure and format as implicit instructions, even when no explicit imperative appears. I document 41 mechanism level failure modes.
Scope
Selected findings
Mitigations (paper Β§10)
Limitations
Do 80 percent of ransomware attacks really come from AI? MIT Sloan has now withdrawn a working paper that made that eyebrow-raising claim after criticism from security researcher Kevin Beaumont.β¦
A ransomware negotiator and an incident response manager at two separate cybersecurity firms have been indicted for allegedly carrying out ransomware attacks of their own against multiple US companies.β¦
Cloud and AI security startups have two weeks to apply for a program that fast-tracks access to investors and mentors from Amazon Web Services, CrowdStrike, and Nvidia.β¦
Cybercriminals are increasingly orchestrating lucrative cargo thefts alongside organized crime groups (OCGs) in a modern-day resurgence of attacks on freight companies.β¦
Bluetooth Low Energy (BLE) powers hundreds of millions of IoT devices β trackers, medical sensors, smart home systems, and more. Understanding these communications is essential for security research and reverse engineering. In our latest article, we explore the specific challenges of sniffing a frequency-hopping BLE connection with a Software Defined Radio (SDR), the new possibilities this approach unlocks, and its practical limitations. π οΈ What youβll learn: Why SDRs (like the HackRF One) are valuable for BLE analysis The main hurdles of frequency hopping β and how to approach them What this means for security audits and proprietary protocol discovery β‘οΈ Read the full post on the blog