FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
Today β€” February 4th 2026Your RSS feeds

You can buy TurboTax for nearly 50% off right now - here's how

Tax season is once again underway. Save $35 on TurboTax's software and do it yourself.

You can turn off Firefox's new AI features with one simple switch - here's how

Mozilla heard your complaints, and now Firefox 148 gives you an AI opt-out.

Demand for AI skills surged by over 100% in 2025, Upwork finds - here's how it could affect your job search

A new report from Upwork found that businesses are investing more in professionals who can help them to incorporate new AI tools into existing workflows.

Stop gambling with your food: This $130 gadget put an end to cooking anxiety for me

The Meater Pro is a precision thermometer that makes cooking meat perfectly so much easier. Here's how I use mine.

China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns

Threat actors affiliated with China have been attributed to a fresh set of cyber espionage campaigns targeting government and law enforcement agencies across Southeast Asia throughout 2025. Check Point Research is tracking the previously undocumented activity cluster under the moniker Amaranth-Dragon, which it said shares links to the APT 41 ecosystem. Targeted countries include Cambodia,

Nitrogen ransomware is so broken even the crooks can't unlock your files

Gang walks away with nothing, victims are left with irreparable hypervisors

Cybersecurity experts usually advise victims against paying ransomware crooks, but that advice goes double for those who have been targeted by the Nitrogen group. There's no way to get your data back from them!…

The best ERP software of 2026: Expert tested and reviewed

Learn about the best ERP software available right now, including SAP S/4HANA, Oracle NetSuite ERP, and Microsoft Dynamics 365.

[webapps] FortiWeb Fabric Connector 7.6.x - SQL Injection to Remote Code Execution

FortiWeb Fabric Connector 7.6.x - SQL Injection to Remote Code Execution

[local] Docker Desktop 4.44.3 - Unauthenticated API Exposure

Docker Desktop 4.44.3 - Unauthenticated API Exposure

[webapps] aiohttp 3.9.1 - directory traversal PoC

aiohttp 3.9.1 - directory traversal PoC

[remote] Ingress-NGINX Admission Controller v1.11.1 - FD Injection to RCE

Ingress-NGINX Admission Controller v1.11.1 - FD Injection to RCE

[webapps] OctoPrint 1.11.2 - File Upload

OctoPrint 1.11.2 - File Upload

[remote] Redis 8.0.2 - RCE

Redis 8.0.2 - RCE

[remote] windows 10/11 - NTLM Hash Disclosure Spoofing

windows 10/11 - NTLM Hash Disclosure Spoofing

Orchid Security Introduces Continuous Identity Observability for Enterprise Applications

By: Unknown
An innovative approach to discovering, analyzing, and governing identity usage beyond traditional IAM controls. The Challenge: Identity Lives Outside the Identity Stack Identity and access management tools were built to govern users and directories. Modern enterprises run on applications. Over time, identity logic has moved into application code, APIs, service accounts, and custom authentication

Universal Β£7,500 payout offered to PSNI staff over major data breach

Affected police officers squeezed mental health services, relocated over safety fears

Police Service of Northern Ireland (PSNI) employees who had their details exposed in a significant 2023 data breach will each receive Β£7,500 ($10,279) as part of a universal offer of compensation.…

Microsoft and ServiceNow's exploitable agents reveal a growing - and preventable - AI security crisis

Once deployed on corporate networks, AI agents can become every threat actor's fantasy. Lesson one for cybersecurity pros: limit privileges.

The First 90 Seconds: How Early Decisions Shape Incident Response Investigations

By: Unknown
Many incident response failures do not come from a lack of tools, intelligence, or technical skills. They come from what happens immediately after detection, when pressure is high, and information is incomplete. I have seen IR teams recover from sophisticated intrusions with limited telemetry. I have also seen teams lose control of investigations they should have been able to handle. The

Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers

Microsoft has warned that information-stealing attacks are "rapidly expanding" beyond Windows to target Apple macOS environments by leveraging cross-platform languages like Python and abusing trusted platforms for distribution at scale. The tech giant's Defender Security Research Team said it observed macOS-targeted infostealer campaigns using social engineering techniques such as ClickFix since

Eclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions

The Eclipse Foundation, which maintains the Open VSX Registry, has announced plans to enforce security checks before Microsoft Visual Studio Code (VS Code) extensions are published to the open-source repository to combat supply chain threats. The move marks a shift from a reactive to a proactive approach to ensure that malicious extensions don't end up getting published on the Open VSX Registry.

CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw impacting SolarWinds Web Help Desk (WHD) to its Known Exploited Vulnerabilities (KEV) catalog, flagging it as actively exploited in attacks. The vulnerability, tracked as CVE-2025-40551 (CVSS score: 9.8), is a untrusted data deserialization vulnerability that could pave the way for remote

Clouds rush to deliver OpenClaw-as-a-service offerings

As analyst house Gartner declares AI tool β€˜comes with unacceptable cybersecurity risk’ and urges admins to snuff it out

If you’re brave enough to want to run the demonstrably insecure AI assistant OpenClaw, several clouds have already started offering it as a service.…

Onboarding new AI hires calls for context engineering - here's your 3-step action plan

Your company culture is the intangible knowledge new employees will absorb over time. But AI agents need all of it, all at once. Here's how to engineer the context.

Weekly Update 489

Weekly Update 489

This week I'm in Hong Kong, and the day after recording, I gave the talk shown in the image above at INTERPOL's Cybercrime Expert Group. I posted a little about this on Facebook and LinkedIn, but thought I'd expand on what really stuck with me after watching other speakers: the effort agencies are putting into cybercrime prevention. It's very easy for folks to judge law enforcement solely on what they see from the outside, and that's mostly going after offenders and taking down criminal infrastructure. But the bit I'm increasingly seeing behind the scenes is a push to help kids (the sorts of hackers I usually interact with are teenagers or young adults at most) make better choices when they're faced with a pathway into cybercrime. The transition from minor offences (game cheats and DDoS'ing) to full-on cybercriminals (hacking and extortion) is very well-known, and intervening at the right time can not only make a difference to the impact of data breaches on all of us, but it can also make a massive difference to these kids' lives. These agencies are underfunded and understaffed compared to the scale of the problem, so making the time to come visit and find some ways to help in our little corner of the data breach world is a no-brainer 😊

Weekly Update 489
Weekly Update 489
Weekly Update 489
Weekly Update 489

I'm a Linux power user, and this distro made me rethink what an operating system can be

Experienced Linux users looking for a new approach should check out NixOS, which offers a thoughtful design and rich customization.

AI agents can't yet pull off fully autonomous cyberattacks – but they are already very helpful to crims

Don't relax: This is a 'when, not if' scenario

AI agents and other systems can't yet conduct cyberattacks fully on their own – but they can help criminals in many stages of the attack chain, according to the International AI Safety report.…

Yesterday β€” February 3rd 2026Your RSS feeds

Xcode 26.3 finally brings agentic coding to Apple's developer tools

Xcode 26.3 could be Apple's biggest leap in AI coding tools, shifting from assistant prompts to autonomous agents that build, test, and update configurations directly inside Xcode.

Was My TikTok Hacked? How to Get Back Into Your Account and Lock Down Sessions

By: McAfee

It usually starts with a small, uneasy moment. A notification youΒ don’tΒ recognize. A login code youΒ didn’tΒ request. A friend texting to ask why you just posted something… weird.Β 

IfΒ you’reΒ staring at your phone wondering whether your TikTok account was hacked,Β you’reΒ not alone,Β andΒ you’reΒ not being paranoid.Β Β 

Account takeovers oftenΒ don’tΒ look dramatic at first. They show up as subtle changes: a password that suddenlyΒ doesn’tΒ work, a new device logged in overnight, or settings you swear you never touched.Β 

This guide walks you through exactly what to do if your TikTok account has been compromised: how to spot the warning signs, how to recover access ifΒ you’reΒ locked out, and how to lock down active sessions so itΒ doesn’tΒ happen again.Β Β 

SignsΒ Your TikTok Account May Be CompromisedΒ 

When someone else gets into your account, things usually start behaving in ways thatΒ don’tΒ feel likeΒ you. Pay attention to changes like these:Β 

Profile or settings changes youΒ didn’tΒ make
Your display name, bio, password, linked email, phone number, or privacy settings look different,Β even though you never touched them.Β 

Content or activity youΒ don’tΒ recognize
Videos youΒ didn’tΒ post. Comments or DMs youΒ didn’tΒ send. New follows or likes thatΒ don’tΒ match how you use the app.Β 

Login alerts that come out of nowhere
Notifications about a new device, verification codes youΒ didn’tΒ request, or emails confirming changes youΒ didn’tΒ initiate.Β 

Other warning signs include being locked out of your usual login method, missing recovery options, or friends telling you your account is sending strange messages.Β 

How to Regain Access to Your TikTok AccountΒ 

Speed matters here. The longer someone has access, the more they can change, or use your account toΒ scamΒ others.Β 

If you can still log inΒ 

Secure the accountΒ immediately.Β 

  1. Change your password:Β Use the β€œForgot password?” optionΒ if needed and choose a strong, unique password youΒ haven’tΒ used anywhere else.Β 
  2. Check your account details:Β Confirm the email address and phone number are yours. Remove anything youΒ don’tΒ recognize.Β 
  3. Look for unfamiliar devices or sessions:Β You’llΒ deal with this more thoroughly below, but flag anything that looks off.Β 

IfΒ you’reΒ locked outΒ 

Start TikTok’s recovery process right away.Β 

  1. On the login screen, tapΒ β€œReport a problem” orΒ visit the HelpΒ Center.Β 
  2. Be ready to prove ownership. That usually includes:Β 
  3. Your usernameΒ 
  4. A previousΒ email or phone number linked to the accountΒ 
  5. DevicesΒ you’veΒ used to log in beforeΒ 
  6. Screenshots ofΒ changes, ifΒ you have themΒ 

TikTok uses this information to verify that the account is yours and roll back unauthorized changes.Β 

Secure your email and phone, tooΒ 

This step is critical and often overlooked.Β 

  • Change the password on theΒ email account linked to TikTok. Β If someone controls your email, they can keep resetting your social accounts.Β 
  • Confirm yourΒ phone numberΒ is correct and remove any unfamiliar contact info.Β 

Once you regain access, clean up anything the attacker touched,Β deleteΒ suspicious posts, undo profile changes, and revoke access for any apps youΒ don’tΒ recognize.Β 

Figure 1: How to remove TikTok logins from other devices.

Figure 1: How to remove TikTok logins from other devices.Β 

Lock Down Sessions and Strengthen Your TikTok SecurityΒ 

Getting back in is only half the job. The next step is making sure whoever got inΒ can’tΒ come back.Β 

Turn on two-step verificationΒ 

InΒ Settings & Privacy, enable two-factorΒ verificationΒ (2FA)Β and choose your preferred method. An authenticator app offers the strongest protection, but SMS or email is still far better than nothing.Β 

Review active sessions and devicesΒ 

Head toΒ SecurityΒ and look forΒ Manage devicesΒ orΒ Active sessions.Β 

  • Remove any devices youΒ don’tΒ recognize.Β 
  • If available, useΒ β€œLog out of all devices” to force everyone,Β including an attacker,Β out at once.Β 

Revoke third-party app accessΒ 

Check which apps or tools are connected to your TikTok account and remove anything youΒ don’tΒ use or trust.Β 

Use a strong, unique passwordΒ 

Keep your app and phone updatedΒ 

Updates often include security fixes. Running outdated software makes it easier for attackers to exploit known issues.Β 

Be cautious with links and messagesΒ 

Unexpected DMs, β€œcopyright warnings,” fake verification notices, or links asking you to log in again are commonΒ hackerΒ tactics. When in doubt,Β don’tΒ click,Β open the app directly instead.Β 

Figure 2: Where in β€œSecurity & permissions” to find security updates and 2FA. Β 

Figure 2: Where in β€œSecurity & permissions” to find security updates and 2FA.Β 

How to Report an Impersonation Account on TikTokΒ 

Discovering a fake accountΒ that’sΒ using your name, photos, or videos can feel like a second violation on top of having your account hacked.Β Β 

Luckily, TikTok has a way to flag these imposters,Β both from inside the app and, in some regions, through an official web form.Β 

  1. Open the impostor’s profile:Β Head to the accountΒ that’sΒ pretending to be you.Β 
  2. Tap the shareΒ icon:Β On mobile, this is usually the arrowΒ at Β theΒ top of the profile.Β 
  3. Select β€œReport”:Β Choose theΒ optionΒ to report the account.Β 
  4. Choose β€œReport account” β†’ β€œPretending to Be Someone”:Β That’s TikTok’s way of flagging impersonation specifically.Β 
  5. Indicate who is being impersonated:Β SelectΒ MeΒ ifΒ it’sΒ your identity, orΒ Celebrity/Another personΒ ifΒ it’sΒ someone else. ThenΒ submit.Β Β 
Figure 3: A screenshot showing where in TikTok you report fake profiles.

Figure 3:Β AΒ screenshotΒ showing where in TikTok you report fake profiles.Β 

IfΒ you’reΒ in the U.S. and the fake profile is doing real damage,Β for example,Β scammingΒ your followers or using official business assets,Β TikTok also offers a dedicated impersonation report form online:Β 

  • Choose whetherΒ you’reΒ reporting orΒ appealingΒ an impersonation.Β 
  • Enter your email and country.Β 
  • Upload valid ID or other proof thatΒ you’reΒ who you say you are.Β 
  • Confirm the statements andΒ submitΒ the form.Β Β 

For accounts outside the U.S., the public HelpΒ CenterΒ form lets you selectΒ Report a potential violation β†’ Account violation β†’ ImpersonationΒ and walk through similar steps.

Β 

Frequently Asked QuestionsΒ 

Q: How do I lock down sessions on TikTok?
A: Go toΒ Settings & Privacy β†’ Security, then openΒ Manage devicesΒ orΒ Active sessions. Remove unfamiliar devices, log out of allΒ sessionsΒ if possible, change your password, and enable two-step verification.Β 
Q: Can I recover my account if the email and phone number were changed?
A: Yes. Start an account recovery request through TikTok support and provide proof of ownership, includingΒ previousΒ contact details and device information.Β 
Q: What if I keep getting verification codes IΒ didn’tΒ request?
A:Β That’sΒ a sign someone is trying to get in. Change your passwordΒ immediately, enable two-step verification, and review active sessions. If it continues, contact TikTok supportΒ 
Q: Should I warn my followers?
A: If your account posted or messaged others without your permission, yes. Let people know your account was compromised so theyΒ don’tΒ engage withΒ scamΒ links or requests.Β 

Β 

The post Was My TikTok Hacked? How to Get Back Into Your Account and Lock Down Sessions appeared first on McAfee Blog.

The Paramilitary ICE and CBP Units at the Center of Minnesota's Killings

Two agents involved in the shooting deaths of US citizens in Minneapolis are reportedly part of highly militarized DHS units whose extreme tactics are generally reserved for war zones.

Critical React Native Metro dev server bug under attack as researchers scream into the void

Too slow react-ion time

Baddies are exploiting a critical bug in React Native's Metro development server to deliver malware to both Windows and Linux machines, and yet the in-the-wild attacks still haven't received the "broad public acknowledgement" that they should, according to security researchers.…

You can buy Samsung's 65-inch QLED TV and soundbar bundle by 50% off right now

Samsung will sell you a 65-inch QN1EF Neo QLED TV and HW-S700D soundbar for under $1,200 now, just in time for the Super Bowl.

The best Presidents' Day laptop sales we've found so far

We're tracking the best laptop deals ahead of Presidents' Day 2026, with offers from Apple, Lenovo, HP, and more.

CISA updated ransomware intel on 59 bugs last year without telling defenders

GreyNoise's Glenn Thorpe counts the cost of missed opportunities

On 59 occasions throughout 2025, the US Cybersecurity and Infrastructure Security Agency (CISA) silently tweaked vulnerability notices to reflect their use by ransomware crooks. Experts say that's a problem.…

Best Buy is basically giving away free Samsung TVs right now - here's the deal I'd redeem

Ahead of the Super Bowl, you can get $1,100 off the 65-inch Samsung S84F and get a 32-inch Samsung smart TV for free. The offer applies to other models, too.

I tested Raspberry Pi's new USB flash drive - and it has a critical advantage over competitors

It might not fully replace a traditional Raspberry Pi system, but this is as fast as these kinds of flash drives get.

Your library card unlocks a free movie streaming service most people don't know about

Kanopy offers thousands of shows and movies. Here's how to sign up for it.

Docker Fixes Critical Ask Gordon AI Flaw Allowing Code Execution via Image Metadata

Cybersecurity researchers have disclosed details of a now-patched security flaw impacting Ask Gordon, an artificial intelligence (AI) assistant built into Docker Desktop and the Docker Command-Line Interface (CLI), that could be exploited to execute code and exfiltrate sensitive data. The critical vulnerability has been codenamed DockerDash by cybersecurity company Noma Labs. It was addressed by

10 useful cables and connectors I can't live without in 2026 (and they're mostly cheap)

Wireless charging is improving, but cables will remain a fact of life for years to come.

Dyson's latest stick vacuum is impossibly thin and lightweight - but is it worth it at $599?

The PencilVac's cleaning head replaces the traditional roller brush with hair-detangling cones, and it's available starting today.

The 10 most popular products ZDNET readers bought last month

From Bluetooth trackers to power banks, these are the top tech gadgets and useful items our readers actually purchased last month.

The top 5 Presidents' Day deals I'd buy right now (including a free Samsung TV offer)

Presidents' Day 2026 is coming soon, but there's already tech savings to be had. Here are my favorite offers I've seen scouring the sales so far, including great deals on TVs ahead of the Super Bowl.

[Webinar] The Smarter SOC Blueprint: Learn What to Build, Buy, and Automate

By: Unknown
Most security teams today are buried under tools. Too many dashboards. Too much noise. Not enough real progress. Every vendor promises β€œcomplete coverage” or β€œAI-powered automation,” but inside most SOCs, teams are still overwhelmed, stretched thin, and unsure which tools are truly pulling their weight. The result? Bloated stacks, missed signals, and mounting pressure to do more with less. This

I tried a Bluetooth Auracast receiver in my home theater, and it's a near-perfect setup for me

Sennheiser's RS 275 TV headphone bundle delivers one of the flexible in-home entertainment experiences I've tested.

Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package

Threat actors have been observed exploiting a critical security flaw impacting the Metro Development Server in the popular "@react-native-community/cli" npm package. Cybersecurity company VulnCheck said it first observed exploitation of CVE-2025-11953 (aka Metro4Shell) on December 21, 2025. With a CVSS score of 9.8, the vulnerability allows remote unauthenticated attackers to execute arbitrary

X marks the raid: French cops swoop on Musk's Paris ops

Algorithmic bias probe continues, CEO and former boss summoned to defend the platform's corner

French police raided Elon Musk's X offices in Paris this morning as part of a criminal investigation into alleged algorithmic manipulation by foreign powers.…

Cisco is Proud to Champion the UK’s Software Security Code of Practice

Cisco champions the UK’s Software Security Code of Practice in support of secure software supply chains and strengthening trust in digital services.

Microsoft finally sends TLS 1.0 and 1.1 to the cloud retirement home

Azure Storage now requires version 1.2 or newer for encrypted connections

Today is the day Azure Storage stops supporting versions 1.0 and 1.1 of Transport Layer Security (TLS). TLS 1.2 is the new minimum.…

Polish cops bail 20-year-old bedroom botnet operator

DDoSer of 'strategically important' websites admitted to most charges

Polish authorities have cuffed a 20-year-old man on suspicion of carrying out DDoS attacks.…

The best business plan software of 2026: Expert tested

Looking for the best business plan software? I tested data-driven platforms to help you plan your business operations from the ground up, from content schedules to funding to market research.

How Data Brokers Can Fuel Violence Against Public Servants

A new report from the Public Service Alliance finds state privacy laws offer public servants few ways to protect their private data, even as threats against them are on the rise.

When Cloud Outages Ripple Across the Internet

By: Unknown
Recent major cloud service outages have been hard to miss. High-profile incidents affecting providers such as AWS, Azure, and Cloudflare have disrupted large parts of the internet, taking down websites and services that many other systems depend on. The resulting ripple effects have halted applications and workflows that many organizations rely on every day. For consumers, these outages are

DIY AI bot farm OpenClaw is a security 'dumpster fire'

Your own personal Jarvis. A bot to hear your prayers. A bot that cares. Just not about keeping you safe

OpenClaw, the AI-powered personal assistant users interact with via messaging apps and sometimes entrust with their credentials to various online services, has prompted a wave of malware and is delivering some shocking bills.…

British military to get legal OK to swat drones near bases

Armed Forces Bill would let troops take action against unmanned threats around defense sites

Britain's defense personnel will be given the authority to neutralize drones threatening military bases under measures being introduced in the Armed Forces Bill, currently making its way through Parliament.…

APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks

The Russia-linked state-sponsored threat actor known as APT28 (aka UAC-0001) has been attributed to attacks exploiting a newly disclosed security flaw in Microsoft Office as part of a campaign codenamed Operation Neusploit. Zscaler ThreatLabz said it observed the hacking group weaponizing the shortcoming on January 29, 2026, in attacks targeting users in Ukraine, Slovakia, and Romania, three
❌