FreshRSS

🔒
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
Today — December 10th 2025Your RSS feeds

How AMD End-to-End Hardware Turns AI Innovation Into Impact

From PCs to data centers, AMD delivers the compute backbone that turns AI initiatives into business transformations.

700+ self-hosted Gits battered in 0-day attacks with no fix imminent

More than half of internet-exposed instances already compromised

Attackers are actively exploiting a zero-day bug in Gogs, a popular self-hosted Git service, and the open source project doesn't yet have a fix.…

React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors

React2Shell continues to witness heavy exploitation, with threat actors leveraging the maximum-severity security flaw in React Server Components (RSC) to deliver cryptocurrency miners and an array of previously undocumented malware families, according to new findings from Huntress. This includes a Linux backdoor called PeerBlight, a reverse proxy tunnel named CowTunnel, and a Go-based

.NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL

New research has uncovered exploitation primitives in the .NET Framework that could be leveraged against enterprise-grade applications to achieve remote code execution. WatchTowr Labs, which has codenamed the "invalid cast vulnerability" SOAPwn, said the issue impacts Barracuda Service Center RMM, Ivanti Endpoint Manager (EPM), and Umbraco 8. But the number of affected vendors is likely to be

How to Stay Safe on Your New AI Browser

By: McAfee

AI-powered browsers give you much more than a window to the web. They represent an entirely new way to experience the internet, with an AI “agent” working by your side.

We’re entering an age where you can delegate all kinds of tasks to a browser, and with that comes a few things you’ll want to keep in mind when using AI browsers like ChatGPT’s Atlas, Perplexity’s Comet, and others.

What are agentic AI browsers?

So, what’s the allure of this new breed of browser? The answer is that it’s highly helpful, and plenty more.

By design, these “agentic” AI browsers actively assist you with the things you do online. They can automate tasks and interpret your intentions when you make a request. Further, they can work proactively by anticipating things you might need or by offering suggestions.

In a way, an AI browser works like a personal assistant. It can summarize the pages in several open tabs, conduct research on just about any topic you ask it to, or even track down the lowest airfare to Paris in the month of May. Want it to order ink for your printer and some batteries for your remote? It can do that too. And that’s just to name a few possibilities.

As you can see, referring to the AI in these browsers as “agentic” fits. It truly works like an agent on your behalf, a capability that promises to get more powerful over time.

Is it safe to use an AI browser?

But as with any new technology, early adopters should balance excitement with awareness, especially when it comes to privacy and security. You might have seen some recent headlines that shared word of security concerns with these browsers.

The reported exploits vary, as does the harm they can potentially inflict. That ranges from stealing personal info, gaining access to Gmail and Google Drive files, installing malware, and injecting the AI’s “memory” with malicious instructions, which can follow from session to session and device to device, wherever a user logs in.

Our own research has shown that some of these attacks are now tougher to pull off than they were initially, particularly as the AI browser companies continue to put guardrails in place. If anything, this reinforces a long-standing truth about online security, it’s a cat-and-mouse game. Tech companies put protections in place, bad actors discover an exploit, companies put further protections in place, new exploits crop up, and so on. It’s much the same in the rapidly evolving space of AI browsers. The technology might be new, but the game certainly isn’t.

While these reports don’t mean AI browsers are necessarily unsafe to use, they do underscore how fast this space is evolving…and why caution is smart as the tech matures.

How To Use an AI Browser Safely

It’s still early days for AI-powered browsers and understanding the security and privacy implications of their use. With that, we strongly recommend the following to help reduce your risk:

Don’t let an AI browser do what you wouldn’t let a stranger do. Handle things like your banking, finances, and health on your own. And the same certainly goes for all the info tied to those aspects of your life.

Pay attention to confirmations. As of today, agentic browsers still require some level of confirmation from the user to perform key actions (like processing a payment, sending an email, or updating a calendar entry). Pay close attention to them, so you can prevent your browser from doing something you don’t want it to do.

Use the “logged out” mode, if possible. As of this writing, at least one AI browser, Atlas, gives you the option to use the agent in the logged-out mode.i This limits its access to sensitive data and the risk of it taking actions on your behalf with your credentials.

If possible, disable “model learning.” By turning it off, you reduce the amount of personal info stored and processed by the AI provider for AI training purposes, which can minimize security and privacy risks.

Set privacy controls to the strictest options available. Further, understand what privacy policies the AI developer has in place. For example, some AI providers have policies that allow people to review your interactions with the AI as part of its training. These policies vary from company to company, and they tend to undergo changes. Keeping regular tabs on the privacy policy of the AI browser you use makes for a privacy-smart move.

Keep yourself informed. The capabilities, features, and privacy policies of AI-powered browsers continue to evolve rapidly. Set up news alerts about the AI browser you use and see if any issues get reported and, if so, how the AI developer has responded. Do routine searches pairing the name of the AI browser with “privacy.”

How McAfee Can Help

McAfee’s award-winning protection helps you browse safer, whether you’re testing out new AI tools or just surfing the web.

McAfee offers comprehensive privacy services, including personal info scans and removal plus a secure VPN.

Plus, protections like McAfee’s Scam Detector automatically alert you to suspicious texts, emails, and videos before harm can happen—helping you manage your online presence confidently and safeguard your digital life for the long term. Likewise, Web Protection can help you steer you clear of suspicious websites that might take advantage of AI browsers.

The post How to Stay Safe on Your New AI Browser appeared first on McAfee Blog.

Covert red team phishing

I wrote a post about how to perform a red team phishing campaign, including a reconnaissance and AITM sesssion capture. I hope you enjoy it. It does not cover creating a m365 proxy config, I will leave that as a exercise to the reader :)

submitted by /u/hackeronni
[link] [comments]

Hate creating presentations? I tried Google's new Nano Banana Pro-powered tool, and the results blew me away

Google's Mixboard now includes Nano Banana Pro​ to create presentations from your photos and documents - and it's free. Try it and see what you think.

Ring's 'Familiar Faces' is here: Why privacy experts worry it's mass surveillance in disguise

Ring users in most of the US can now save up to fifty faces in the app, allowing for more personalized notifications. But the convenience probably isn't worth the sacrifice in privacy.

US extradites Ukrainian woman accused of hacking meat processing plant for Russia

The digital intrusion allegedly caused thousands of pounds of meat to spoil and triggered an ammonia leak in the facility

A Ukrainian woman accused of hacking US public drinking water systems and a meat processing facility on behalf of Kremlin-backed cyber groups was extradited to the US earlier this year and will stand trial in early 2026.…

Microsoft won’t fix .NET RCE bug affecting slew of enterprise apps, researchers say

Devs and users should know better, Microsoft tells watchTowr

Security researchers have revealed a .NET security flaw thought to affect a host of enterprise-grade products that they say Microsoft refuses to fix.…

This anti-theft tech bag stopped a pickpocketer in real time - how it works

This bag saved me from potentially losing access to my smartphone and passport on my last trip.

2 Men Linked to China’s Salt Typhoon Hacker Group Likely Trained in a Cisco ‘Academy’

The names of two partial owners of firms linked to the Salt Typhoon hacker group also appeared in records for a Cisco training program—years before the group targeted Cisco’s devices in a spy campaign.

Infostealer has entered the chat

A new wave of ClickFix attacks spreading a macOS infostealer are posting malicious user guides on the official ChatGPT website by piggybacking the chatbot’s chat-sharing feature.

submitted by /u/Fit_Wing3352
[link] [comments]

Zorin OS vs. AnduinOS: How to pick the right Windows-like Linux distro for you

If you're looking for the best Linux distribution to wean you from Windows, there are two that make a solid case for the task.

I asked ChatGPT to gently roast me based on my year in queries - and it was uncanny

Most of it was flattery, but there was one bit of advice that I immediately decided to turn into a New Year's resolution.

This Alexa+ update can track deals and buy for you when the price drops - here's how

There's also a new Shopping Essentials hub for lists, orders, and delivery tracking - all just a voice command away.

Finally, a Bluetooth speaker that brings the funk and chill (without breaking the bank)

Looking for a well-priced Bluetooth speaker that fills a room with dynamic sound? This Treblab model I tested is it.

Protecting value at risk - the role of a risk operations center

Why should Keith Richards’ fingers inform your approach to risk?

Partner Content For years, celebrities have insured their body parts for vast sums of money. Mariah Carey allegedly insured her voice and legs for $70 million during a tour, according to TMZ; and Lloyd’s of London was reported to have insured a wide range of celebrity body parts, from restauranteur Egon Ronay’s taste buds to the fingers of Rolling Stones’ guitarist Keith Richards, which were insured for $1.6 million. 

Your Google Photos just got 4 huge video editing upgrades - what's new

The tools are designed to help you edit videos quickly and more easily.

My top 4 browsers after testing nearly every one (spoiler: Chrome fans may be upset)

Ready to try a new browser? I've installed almost every browser over the years, and these are my top picks.

A Complete Guide to the Jeffrey Epstein Document Dumps

New records about the infamous sex offender are released seemingly every week. Here’s a quick rundown of who’s releasing the Epstein documents, what they contain—and what they’re releasing next.

The fix for messy AI agent ecosystems might finally be here - and it's open source

Backed by OpenAI, Anthropic, and others, AAIF aims to standardize AI agents and build an open, interoperable foundation.

This new $75 smart ring helps you remember things you'd likely forget - here's how

Pebble, known for its watches, has opened preorders for its new Pebble Index 01 smart ring.

I tested an 8K 360-degree drone, and it's spoiled video cameras for me

Antigravity's A1 drone is capable of recording high-resolution 360 videos and has a beginner-friendly control scheme.

Shelly's new smart plug is at home with all major automation systems

The Shelly Plug Gen4 works with Matter, Wi-Fi, and Zigbee, is a breeze to set up, and costs just $20.

Inbox full of promo emails? 80% are tracking you, new report warns

Billions of holiday marketing emails have turned inboxes into a de facto surveillance tool, Proton Mail says.

My most productive work device is this new Kindle with a colored display - why it's so good

Amazon's Kindle Scribe Colorsoft boasts some design improvements, but keeps its features focused.

Three PCIe Encryption Weaknesses Expose PCIe 5.0+ Systems to Faulty Data Handling

Three security vulnerabilities have been disclosed in the Peripheral Component Interconnect Express (PCIe) Integrity and Data Encryption (IDE) protocol specification that could expose a local attacker to serious risks. The flaws impact PCIe Base Specification Revision 5.0 and onwards in the protocol mechanism introduced by the IDE Engineering Change Notice (ECN), according to the PCI Special

Why AI agents failed to take over in 2025 - it's 'a story as old as time,' says Deloitte

This was supposed to be the year of AI agents, but only 11% of organizations are currently actively using them. So, what happened?

You can edit images with Adobe Photoshop in ChatGPT now - it's easy and free

Adobe has launched free Photoshop, Express, and Acrobat apps inside ChatGPT. Here's how they work.

The big catch: How whaling attacks target top executives

Is your organization’s senior leadership vulnerable to a cyber-harpooning? Learn how to keep them safe.

Crisis in Icebergen: How NATO crafts stories to sharpen cyber skills

1,500 military digital defenders spent the past week cleaning up a series of cyberattacks on fictional island

Andravia and Harbadus – two nations so often at odds with one another – were once again embroiled in conflict over the past seven days, which thoroughly tested NATO's cybersecurity experts' ability to coordinate defenses across battlefield domains.…

Warning: WinRAR Vulnerability CVE-2025-6218 Under Active Attack by Multiple Threat Groups

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a security flaw impacting the WinRAR file archiver and compression utility to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability, tracked as CVE-2025-6218 (CVSS score: 7.8), is a path traversal bug that could enable code execution. However, for exploitation

Webinar: How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes

By: Unknown
Cloud security is changing. Attackers are no longer just breaking down the door; they are finding unlocked windows in your configurations, your identities, and your code. Standard security tools often miss these threats because they look like normal activity. To stop them, you need to see exactly how these attacks happen in the real world. Next week, the Cortex Cloud team at Palo Alto Networks

T-Mobile will give you a free iPhone 17, no trade-in required - here's how to get one

Bring your number over to T-Mobile and get an iPhone 17 on them. We break down the details.

I just ordered Instacart delivery through ChatGPT using a few simple prompts - here's how

It's fast and easy, and it all happens inside ChatGPT, with no Instacart+ required.

Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days

Microsoft closed out 2025 with patches for 56 security flaws in various products across the Windows platform, including one vulnerability that has been actively exploited in the wild. Of the 56 flaws, three are rated Critical, and 53 are rated Important in severity. Two other defects are listed as publicly known at the time of the release. These include 29 privilege escalation, 18 remote code

Reinventing your career for the AI age? Your technical skill isn't your most valuable asset

The future of work isn't just about exploiting AI. Successful professionals will focus on honing these capabilities.

Gartner urges businesses to 'block all AI browsers' - what's behind the dire warning

Analysts suggest that agentic browsers create an unacceptable risk for CISOs today, with data exposure now a top security concern - but far from the only one.

Free Honey Tokens for Breach Detection - No Signup

Howdy folks - former red teamer (a lot of my work is available under the rad9800 alias, if you're interested in malware - check it out!) now building the product to catch me/and in turn the many other adversaries running the same playbooks. We offer a paid deception platform, but I wanted to make a free tier actually useful.

What's free:

  • AWS Access Keys (10)
  • AWS Bedrock Keys (2)
  • S3 Bucket tokens (2)
  • SSH Private Keys (20)

No credit card, no trial expiry. Just drop your email, get credentials, plant them where they shouldn't be touched. We have 12 other token types in the paid version, and will slowly expand these out in this edition depending on feedback/and increasing limits based on what's being used/what folk want.

Additionally - something unique about our AWS Access Keys in particular you can specify the username and they're allocated from a pool of 1000s of accounts so they're hard/impossible to fingerprint (prove me wrong, I'll be curious). When someone uses them, you get an alert (via email, which is why we need your email - else we wouldn't!) with:

  • Source IP + geolocation
  • ASN/org lookup
  • VPN/Tor/proxy detection
  • User agent
  • Timestamp
  • Any additional unstructured event metadata

Why these token types?

They're the ones I'd actually look for on an engagement. Hardcoded AWS creds in repos, SSH keys in backup folders, that .env file someone forgot to gitignore. If an attacker finds them, you want to reveal these internal breaches. I've written one or two blogs about "Read Teaming" and the trend (and more than happy to chat about it)

No catch?

The catch is I'm hoping some of you upgrade when you need more coverage/scale and/or feedback on this! But the free tier isn't crippled - it is very much the same detection pipeline we use for paying customers!

Link: https://starter.deceptiq.com

More than happy/excited to answer questions about the detection methodology or token placement strategies.

submitted by /u/radkawar
[link] [comments]

Fortinet, Ivanti, and SAP Issue Urgent Patches for Authentication and Code Execution Flaws

Fortinet, Ivanti, and SAP have moved to address critical security flaws in their products that, if successfully exploited, could result in an authentication bypass and code execution. The Fortinet vulnerabilities affect FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager and relate to a case of improper verification of a cryptographic signature. They are tracked as CVE-2025-59718 and

My favorite Linux search tools make it easier to find your files - no command line needed

Why bother with complicated regular expressions when you can point and click your way to finding the files and folders you need?

Want to save your old computer? Try one of these 9 Linux distros - for free

Here's how to save money, reduce e-waste, and extend the life of your old hardware at the same time.

The two fastest growing AI chatbots now (neither is ChatGPT)

'Different assistants map to different moments,' according to ComScore's latest report on the AI market.

The 7 Linux distros I recommend most for gaming in 2025 - including my favorite

Still think Linux isn't practical for gaming? Think again. Here are the best distros every gamer should try.

Microsoft reports 7.8-rated zero day, plus 56 more in December Patch Tuesday

Plus critical critical Notepad++, Ivanti, and Fortinet updates, and one of these patches an under-attack security hole

Happy December Patch Tuesday to all who celebrate. This month's patch party includes one Microsoft flaw under exploitation, plus two others listed as publicly known – but just 57 CVEs in total from Redmond.…

Microsoft Patch Tuesday, December 2025 Edition

Microsoft today pushed updates to fix at least 56 security flaws in its Windows operating systems and supported software. This final Patch Tuesday of 2025 tackles one zero-day bug that is already being exploited, as well as two publicly disclosed vulnerabilities.

Despite releasing a lower-than-normal number of security updates these past few months, Microsoft patched a whopping 1,129 vulnerabilities in 2025, an 11.9% increase from 2024. According to Satnam Narang at Tenable, this year marks the second consecutive year that Microsoft patched over one thousand vulnerabilities, and the third time it has done so since its inception.

The zero-day flaw patched today is CVE-2025-62221, a privilege escalation vulnerability affecting Windows 10 and later editions. The weakness resides in a component called the “Windows Cloud Files Mini Filter Driver” — a system driver that enables cloud applications to access file system functionalities.

“This is particularly concerning, as the mini filter is integral to services like OneDrive, Google Drive, and iCloud, and remains a core Windows component, even if none of those apps were installed,” said Adam Barnett, lead software engineer at Rapid7.

Only three of the flaws patched today earned Microsoft’s most-dire “critical” rating: Both CVE-2025-62554 and CVE-2025-62557 involve Microsoft Office, and both can exploited merely by viewing a booby-trapped email message in the Preview Pane. Another critical bug — CVE-2025-62562 — involves Microsoft Outlook, although Redmond says the Preview Pane is not an attack vector with this one.

But according to Microsoft, the vulnerabilities most likely to be exploited from this month’s patch batch are other (non-critical) privilege escalation bugs, including:

CVE-2025-62458 — Win32k
CVE-2025-62470 — Windows Common Log File System Driver
CVE-2025-62472 — Windows Remote Access Connection Manager
CVE-2025-59516 — Windows Storage VSP Driver
CVE-2025-59517 — Windows Storage VSP Driver

Kev Breen, senior director of threat research at Immersive, said privilege escalation flaws are observed in almost every incident involving host compromises.

“We don’t know why Microsoft has marked these specifically as more likely, but the majority of these components have historically been exploited in the wild or have enough technical detail on previous CVEs that it would be easier for threat actors to weaponize these,” Breen said. “Either way, while not actively being exploited, these should be patched sooner rather than later.”

One of the more interesting vulnerabilities patched this month is CVE-2025-64671, a remote code execution flaw in the Github Copilot Plugin for Jetbrains AI-based coding assistant that is used by Microsoft and GitHub. Breen said this flaw would allow attackers to execute arbitrary code by tricking the large language model (LLM) into running commands that bypass the guardrails and add malicious instructions in the user’s “auto-approve” settings.

CVE-2025-64671 is part of a broader, more systemic security crisis that security researcher Ari Marzuk has branded IDEsaster (IDE  stands for “integrated development environment”), which encompasses more than 30 separate vulnerabilities reported in nearly a dozen market-leading AI coding platforms, including Cursor, Windsurf, Gemini CLI, and Claude Code.

The other publicly-disclosed vulnerability patched today is CVE-2025-54100, a remote code execution bug in Windows Powershell on Windows Server 2008 and later that allows an unauthenticated attacker to run code in the security context of the user.

For anyone seeking a more granular breakdown of the security updates Microsoft pushed today, check out the roundup at the SANS Internet Storm Center. As always, please leave a note in the comments if you experience problems applying any of this month’s Windows patches.

Yesterday — December 9th 2025Your RSS feeds

How to answer the door when the AI agents come knocking

Identity management vendors like Okta see an opening to calm CISOs worried about agents running amok

The fear of AI agents running amok has thus far halted the wide deployment of these digital workhorses, Okta's president of Auth0, Shiv Ramji, told The Register.…

How Google's new Pixel Watch update takes aim at Apple Watch

Pixel Watch 4 is getting gestures like double pinch and wrist turn - two features already included on Apple Watches - to dismiss calls, snooze alarms, and select smart replies.

While Google and OpenAI battle for model dominance, Anthropic is quietly winning the enterprise AI race

A survey by venture capital firm Menlo Ventures also finds that agentic AI is still a niche.

North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware

Threat actors with ties to North Korea have likely become the latest to exploit the recently disclosed critical React2Shell security flaw in React Server Components (RSC) to deliver a previously undocumented remote access trojan dubbed EtherRAT. "EtherRAT leverages Ethereum smart contracts for command-and-control (C2) resolution, deploys five independent Linux persistence mechanisms, and

I repaired my car and home appliance with iFixIt's new AI app - try it while it's still free

Trained on more than 125,000 community repair guides, FixBot can offer help repairing thousands of different devices.

This HP portable monitor made me reconsider a gadget I've ignored for years

HP's Series 5 Pro 14-inch WQXGA portable monitor lets you enjoy a dual-monitor setup on the road with some extra usability perks.

Porsche panic in Russia as pricey status symbols forget how to car

Satellite silence trips immobilizers, leaving owners stuck

Hundreds of Porsches in Russia were rendered immobile last week, raising speculation of a hack, but the German carmaker tells The Register that its vehicles are secure.…

Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure

Four distinct threat activity clusters have been observed leveraging a malware loader known as CastleLoader, strengthening the previous assessment that the tool is offered to other threat actors under a malware-as-a-service (MaaS) model. The threat actor behind CastleLoader has been assigned the name GrayBravo by Recorded Future's Insikt Group, which was previously tracking it as TAG-150. The

Gemini's command line tool is a productivity game changer, and it's free - how I use it

If you want to add Gemini AI to your Linux terminal workflow, you'll be surprised at how easy it is to install and use.

Why a case is no longer enough for my iPhone when traveling - here's what I use instead

The Sea to Summit View Dry Bag is the perfect way to keep your gadgets dry, whether hiking or on the beach.
❌