FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
Today β€” February 5th 2026Your RSS feeds

Substack says intruder lifted emails, phone numbers in months-old breach

Contact details were accessed in an intrusion that went undetected for months, the blogging outfit says

Newsletter platform Substack has admitted that an intruder swiped user contact details months before the company noticed, forcing it to warn writers and readers that their email addresses and other account metadata were accessed without permission.…

This Acer laptop from last year is the reason I'm not upgrading in 2026

The Acer Swift Edge 14 is a good-looking midrange with a vibrant OLED and outstanding battery life.

Which AI chatbots are ad-free? It's time to look beyond ChatGPT

Want to know which AI chatbots have ads or plan to roll them out? I compared the top ones to find out.

Asia-based government spies quietly broke into critical networks across 37 countries

And their toolkit includes a new, Linux kernel rootkit

A state-aligned cyber group in Asia compromised government and critical infrastructure organizations across 37 countries in an ongoing espionage campaign, according to security researchers.…

This 31-in-1 multitool would be good enough for MacGyver, but serves me just as well

Bibury's Multitool Pliers Pro is a fraction of the price of the big brand names, but no less handy with 31 different tools.

Spotify fixes my major frustration with audiobooks - here's how to use Page Match

Spotify's new feature lets you switch easily between reading a physical book and an audiobook - try it now. Plus, you can now buy books on Spotify.

OpenAI's new GPT-5.3-Codex is 25% faster and goes way beyond coding now - what's new

The Codex team said GPT-5.3-Codex even helped build itself.

Anthropic says its new Claude Opus 4.6 can nail your work deliverables on the first try

The frontier model can handle complex, end-to-end enterprise workflows and take on the autonomous tasks you usually do yourself.

AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack

The distributed denial-of-service (DDoS) botnet known as AISURU/Kimwolf has been attributed to a record-setting attack that peaked at 31.4 Terabits per second (Tbps) and lasted only 35 seconds. Cloudflare, which automatically detected and mitigated the activity, said it's part of a growing number of hyper-volumetric HTTP DDoS attacks mounted by the botnet in the fourth quarter of 2025. The

AI agent adoption and budgets will rise significantly in 2026, despite challenges

Research suggests agentic transformation is becoming the new enterprise standard. Challenges remain, but they can be overcome. Here's how.

My favorite premium travel power bank is worth the cost, here's why

The Cuktech 15 Air is a small yet energy-dense power bank that commands a premium price.

Betterment breach may expose 1.4M users after social engineering attack

Breach-tracking site flags dataset following impersonation-based intrusion

Breach-tracking site Have I Been Pwned (HIBP) claims a cyberattack on Betterment affected roughly 1.4 million users – although the investment company has yet to publicly confirm how many customers were affected by January's intrusion.…

I expected to love this rugged Android tablet for its durability - something else won me over

The Oukitel RT10 tablet is built like a tank yet still delivers a bright, vivid display.

Your ExpressVPN is getting three huge upgrades - including a private AI assistant

ExpressVPN is expanding beyond basic VPN protection to better compete with NordVPN. Here's what's new.

Yara-X + PacketSmith Detection Module

Version 5 of PacketSmith, codenamed Pinus strobus, is the result of extensive R&D to add unique, unparalleled features that matter to network detection engineers, SoC analysts, and malware and vulnerability researchers. In this release, we’re showcasing a very powerful new feature in PacketSmith: the integration of Yara-X, a state-of-the-art scanning engine and pattern-matching library.

submitted by /u/MFMokbel
[link] [comments]

Facing the Quantum Threat: Cisco’s Strategic Approach to PQC

Quantum threats are closer than you think. Explore Cisco’s strategic approach to Post-Quantum Cryptography (PQC) and how to protect against HNDL risks now.

ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories

This week didn’t produce one big headline. It produced many small signals β€” the kind that quietly shape what attacks will look like next. Researchers tracked intrusions that start in ordinary places: developer workflows, remote tools, cloud access, identity paths, and even routine user actions. Nothing looked dramatic on the surface. That’s the point. Entry is becoming less visible while impact

The best business messaging apps of 2026: Expert tested

I tested the top business messaging platforms to find the best solutions for team collaboration, security, and productivity in 2026.

Italy claims cyberattacks 'of Russian origin' are pelting Winter Olympics

Right on cue, petulant hacktivists attempt to disrupt yet another global sporting event

Italy's foreign minister says the country has already started swatting away cyberattacks from Russia targeting the Milano Cortina Winter Olympics.…

Why the most private way to browse the web isn't incognito mode (but this instead)

If you want the highest level of privacy and security online, you should be using the Tor browser.

n8n security woes roll on as new critical flaws bypass December fix

Patch meant to close a severe expression bug fails to stop attackers with workflow access

Multiple newly disclosed bugs in the popular workflow automation tool n8n could allow attackers to hijack servers, steal credentials, and quietly disrupt AI-driven business processes.…

The Buyer’s Guide to AI Usage Control

By: Unknown
Today’s β€œAI everywhere” reality is woven into everyday workflows across the enterprise, embedded in SaaS platforms, browsers, copilots, extensions, and a rapidly expanding universe of shadow tools that appear faster than security teams can track. Yet most organizations still rely on legacy controls that operate far away from where AI interactions actually occur. The result is a widening

Cloud sovereignty is no longer just a public sector concern

Businesses still chase the cheapest option, but politics and licensing shocks are changing priorities, says OpenNebula

Interview Sovereignty remains a hot topic in the tech industry, but interpretations of what it actually means – and how much it matters – vary widely between organizations and sectors. While public bodies are often driven by regulation and national policy, the private sector tends to take a more pragmatic, cost-focused view.…

Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends

The elusive Iranian threat group known as Infy (aka Prince of Persia) has evolved its tactics as part of efforts to hide its tracks, even as it readied new command-and-control (C2) infrastructure coinciding with the end of the widespread internet blackout the regime imposed at the start of January 2026. "The threat actor stopped maintaining its C2 servers on January 8 for the first time since we

The best touchscreen laptops in 2026: Expert tested and reviewed

We've tested some of the best touchscreen laptops from Samsung, Lenovo, and Asus to find the best one for your everyday needs.

My favorite iPad Air accessories should be on every power user's list (including this Pencil alternative)

I've been using an iPad Air M2 for nearly two years, and these are my go-to essentials.

OfferUp scammers are out in force: Here’s what you should know

The mobile marketplace app has a growing number of users, but not all of them are genuine. Watch out for these common scams.

New CentOS UAF to LPE vulnerability

A flaw that exists within the handling of sch_cake can allow a local user under the CentOS 9 operating system to trigger an use-after-free. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root.

submitted by /u/SSDisclosure
[link] [comments]

Kali Linux vs. Parrot OS: Which security-forward distro is right for you?

Whether you're interested in penetration testing or simply curious about cybersecurity, I recommend one of these specialized Linux distributions. Let's compare.

Three clues that your LLM may be poisoned with a sleeper-agent back door

It's a threat straight out of sci-fi, and fiendishly hard to detect

Sleeper agent-style backdoors in AI large language models pose a straight-out-of-sci-fi security threat.…

Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows

A new, critical security vulnerability has been disclosed in the n8n workflow automation platform that, if successfully exploited, could result in the execution of arbitrary system commands. The flaw, tracked as CVE-2026-25049 (CVSS score: 9.4), is the result of inadequate sanitization that bypasses safeguards put in place to address CVE-2025-68613 (CVSS score: 9.9), another critical defect that

Satya Nadella decides Microsoft needs an engineering quality czar

Picks chap who used to lead Redmond’s security, lures replacement from Google

Microsoft CEO Satya Nadella has decided Microsoft needs an engineering quality czar, and shifted Charlie Bell, the company’s executive veep for security, into the new role.…

Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign

Cybersecurity researchers have disclosed details of an active web traffic hijacking campaign that has targeted NGINX installations and management panels like Baota (BT) in an attempt to route it through the attacker's infrastructure. Datadog Security Labs said it observed threat actors associated with the recent React2Shell (CVE-2025-55182, CVSS score: 10.0) exploitation using malicious NGINX

SEC Consult SA-20260202-0 :: Multiple vulnerabilities in Native Instruments Native Access (MacOS)

Posted by SEC Consult Vulnerability Lab via Fulldisclosure on Feb 04

SEC Consult Vulnerability Lab Security Advisory < 20260202-0 >
=======================================================================
title: Multiple vulnerabilities
product: Native Instruments - Native Access (MacOS)
vulnerable version: verified up to 3.22.0
fixed version: n/a
CVE number: CVE-2026-24070, CVE-2026-24071
Β  Β  Β  Β  Β  Β  Β impact: high
homepage:...

CyberDanube Security Research 20260119-0 | Authenticated Command Injection in Phoenix Contact TC Router Series

Posted by Thomas Weber | CyberDanube via Fulldisclosure on Feb 04

CyberDanube Security Research 20260119-0
-------------------------------------------------------------------------------
title| Authenticated Command Injection
product| TC Router 5004T-5G EU
vulnerable version| 1.06.18
fixed version| 1.06.23
CVE number| CVE-2025-41717
impact| High
homepage| https://www.phoenixcontact.com/
found| 16.04.2025...

[KIS-2026-03] Blesta <= 5.13.1 (2Checkout) Multiple PHP Object Injection Vulnerabilities

Posted by Egidio Romano on Feb 04

--------------------------------------------------------------------------
Blesta <= 5.13.1 (2Checkout) Multiple PHP Object Injection Vulnerabilities
--------------------------------------------------------------------------

[-] Software Link:

https://www.blesta.com

[-] Affected Versions:

All versions from 3.0.0 to 5.13.1.

[-] Vulnerabilities Description:

The vulnerabilities exist because user input passed through the...

[KIS-2026-02] Blesta <= 5.13.1 (Admin Interface) Multiple PHP Object Injection Vulnerabilities

Posted by Egidio Romano on Feb 04

--------------------------------------------------------------------------------
Blesta <= 5.13.1 (Admin Interface) Multiple PHP Object Injection Vulnerabilities
--------------------------------------------------------------------------------

[-] Software Link:

https://www.blesta.com

[-] Affected Versions:

All versions from 3.0.0 to 5.13.1.

[-] Vulnerabilities Description:

The vulnerabilities exist because user input passed through the...

[KIS-2026-01] Blesta <= 5.13.1 (confirm_url) Reflected Cross-Site Scripting Vulnerability

Posted by Egidio Romano on Feb 04

---------------------------------------------------------------------------
Blesta <= 5.13.1 (confirm_url) Reflected Cross-Site Scripting Vulnerability
---------------------------------------------------------------------------

[-] Software Link:

https://www.blesta.com

[-] Affected Versions:

All versions from 3.2.0 to 5.13.1.

[-] Vulnerability Description:

User input passed through the "confirm_url" GET parameter to the...

I took apart the new AirTag 2 and found a serious flaw in Apple's popular tracker

I disabled the new AirTag's speaker in two minutes with just one tool. Here's why that's a major problem.

Want local vibe coding? This AI stack replaces Claude Code and Codex - and it's free

You can replace expensive, cloud-based AI coding with three tools. Here's how.

AI is collapsing the career ladderΒ  - 5 ways to reach that leadership role now

AI has changed all the rules. To get to the top, you'll have to prove you're ready for responsibility. Here's how.

Best Buy will sell you a 98-inch Hisense TV at $1,400 off right now - and I'm seriously considering it

Best Buy is selling the 98-inch Hisense QN5 for $900, just in time for the Super Bowl and the Winter Olympics.

Your LG TV is getting a big audio upgrade for free - these OLED models included

LG has confirmed that select older TVs will soon be compatible with Dolby Atmos FlexConnect via an over-the-air software update.

Google just showed the Pixel 10a early - here are 5 things it must nail before I upgrade

Google's upcoming budget phone has some serious competition. Is it enough of an upgrade?

I've worn these headphones longer than any Sony or Bose pair in 2026 - here's why

Since launching its first over-ear headphones, Sonos has tackled some of the original model's biggest flaws. Here's my updated buying advice for 2026.
Yesterday β€” February 4th 2026Your RSS feeds

Julius - Open Source LLM Service Fingerprinting Tool

Made a thing. Julius fingerprints LLM services - point it at a target and it tells you if you're looking at Ollama, vLLM, LiteLLM, etc. Single binary, JSON output, works nicely in recon pipelines.

What it does:

submitted by /u/Praetorian_Security
[link] [comments]

AWS intruder achieved admin access in under 10 minutes thanks to AI assist, researchers say

LLMs automated most phases of the attack

UPDATED A digital intruder broke into an AWS cloud environment and in just under 10 minutes went from initial access to administrative privileges, thanks to an AI speed assist.…

Notepad++ Users, You May Have Been Hacked by China

Suspected Chinese state-backed hackers hijacked the Notepad++ update infrastructure to deliver a backdoored version of the popular free source code editor and note-taking app for Windows.

Over 50% of Chrome AI extensions are quietly harvesting your data - here are the biggest culprits

New research shows coding, transcription, and other productivity tools proved the most invasive, though several other categories are worth watching as well.

This $20 gadget lets you watch hundreds of free TV channels (and ditch streaming services for good)

Over-the-air TV antennas give you access to local news, sports, and entertainment channels for free, making them a great way to avoid high subscription fees.

Critical SolarWinds Web Help Desk bug under attack

US agencies told to patch by Friday

Attackers are exploiting a critical SolarWinds Web Help Desk bug - less than a week after the vendor disclosed and fixed the 9.8-rated flaw. That's according to America's lead cyber-defense agency, which set a Friday deadline for federal agencies to patch the security flaw.…

7 apps I use to lock down, encrypt, and store my private files - and most are free

If you want to keep the documents and files on your PC extra secure, these apps will do the trick.

Ubuntu 26.04 surprised me - this upcoming release is seriously secure

The next release of Ubuntu desktop Linux is on the horizon, so I dove into the latest daily build to see what was what, and came away nodding my head in approval at the heightened security.

Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models

Microsoft on Wednesday said it built a lightweight scanner that it said can detect backdoors in open-weight large language models (LLMs) and improve the overall trust in artificial intelligence (AI) systems. The tech giant's AI Security team said the scanner leverages three observable signals that can be used to reliably flag the presence of backdoors while maintaining a low false positive

DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files

Threat hunters have disclosed details of a new, stealthy malware campaign dubbed DEAD#VAX that employs a mix of "disciplined tradecraft and clever abuse of legitimate system features" to bypass traditional detection mechanisms and deploy a remote access trojan (RAT) known as AsyncRAT. "The attack leverages IPFS-hosted VHD files, extreme script obfuscation, runtime decryption, and in-memory
❌