FreshRSS

🔒
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
Today — December 23rd 2025Your RSS feeds

FCC bans DJI drones starting today - here's what it means for you

Don't panic: You can continue to fly your drone - for now. Here's everything we know so far.

How OpenAI is defending ChatGPT Atlas from attacks now - and why safety's not guaranteed

An 'automated attacker' mimics the actions of human hackers to test the browser's defenses against prompt injection attacks. But there's a catch.

I've used Samsung's Galaxy TriFold, but this upcoming model may be more enticing in 2026

A wide-screen Samsung Galaxy Fold phone would combine the pocketability of a Flip 7 and the versatility of a Fold 7.

The most popular Android e-reader has a worthy successor - with upgrades I've been waiting for

The Boox Palma 2 Pro features a color display, enhanced hardware, and a stylus in a smartphone-sized package.

NYPD Sued Over Possible Records Collected Through Muslim Spying Program

The New York Police Department's “mosque-raking” program targeted Muslim communities across NYC. Now, as the city's first Muslim mayor takes office, one man is fighting—again—to fully expose it.

21K Nissan customers' data stolen in Red Hat raid

Automaker's third security snafu in three years

Thousands of Nissan customers are learning that some of their personal data was leaked after unauthorized access to a Red Hat-managed server, according to the Japanese automaker.…

Hisense's latest laser projector is so colorful and bright, it may just replace your OLED TV

Ahead of CES 2026, the company has unveiled two new projector models with specs we've never seen before.

Microsoft rushes an out-of-band update for Message Queuing bug

Redmond gets in early for the twelve whoopsies of Christmas

Microsoft has hustled out an out-of-band update to address a Message Queuing issue introduced by the December 2025 update.…

I saw the tech shop of the future - and maybe retail isn't dead

In the age of e-commerce, does a storefront really matter anymore? One tech retailer is betting big that it still does.

CES 2026 trends to watch: 5 biggest topics we're expecting at the tech show

From foldable phones to AI advancements to all the TVs, here's what you can expect.

4 Google Pixel phone tricks every user should know - including my favorite

As a longtime Pixel user, here are the features that make a significant difference in my day-to-day life.

I tested Amazon's latest 65-inch Fire TV, and it dethroned my LG in surprising ways

Amazon's latest QLED Omni Series TV may just be the best mix of quality and affordability.

Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites

Cybersecurity researchers have discovered two malicious Google Chrome extensions with the same name and published by the same developer that come with capabilities to intercept traffic and capture user credentials. The extensions are advertised as a "multi-location network speed test plug-in" for developers and foreign trade personnel. Both the browser add-ons are available for download as of

Black or Scrambled Phone Screen? Here’s How to Spot a Hacked vs Broken Phone

By: McAfee

It’s the screen you never want to see.

Something is seriously wrong with your phone. Or is it? You might not have a broken phone at all. Instead, you might have a hacked phone.

This is a form of scareware, an attack that frightens you into thinking your device is broken or infected with a virus
Source: Mobile Hacker

What you see above is a form of scareware, an attack that frightens you into thinking your device is broken or infected with a virus. What the hacker wants you to do next is panic. They want you to tap on a bogus link that says it’ll run a security check, remove a virus, or otherwise fix your phone before the problem gets worse.

Of course, tapping that link takes you to a malware or phishing site, where the hacker takes the next step and installs an even nastier form of malware on your phone. In other cases, they steal your personal info under the guise of a virus removal service. (And yes, sometimes they pose as McAfee when they pull that move. In fact,

Note that in this example above, the hacker behind the phony broken screen is arguably going for a user who’s perhaps less tech savvy. After all, the message atop the “broken” screen appears clear as day. Still, in the heat of the moment, it can be convincing enough.

How does scareware get on phones?

Scareware typically finds its way onto phones through misleading ads, fake security alerts, or hacked websites. In other cases, downloading apps from places other than an official app store can lead to scareware (and other forms of malware too).

As for malware on phones, you’ll find different risk levels between Android and iOS phones. While neither platform is completely immune to threats, Android phones are reportedly more susceptible to viruses than iPhones due to differences in their app downloading policies. On Android phones, you can install apps from third-party sources outside the official Google Play Store, which increases the risk of downloading malicious software.

In contrast, Apple restricts app installations to its official App Store, making it harder for malware to get on iOS devices. (That’s if you haven’t taken steps to jailbreak your iPhone, which removes the software restrictions imposed by Apple on its iOS operating system. We absolutely don’t recommend jailbreaking because it may void warranties and make it easier for malware, including scareware, to end up on your phone.)

If you think you’ve wound up with a case of scareware, stay calm. The first thing the hacker wants you to do is panic and click that link. Let’s go over the steps you can take.

How to remove malware from your Android phone

If you don’t already have mobile security and antivirus for your phone, your best bet is to get the latest virus removal guidance from Android, which you can find on this help page.

Moving forward, you can get protection that helps you detect and steer clear of potential threats as you use your phone. You can pick up McAfee Security: Antivirus VPN in the Google Play store, which also includes our Scam Detector and Identity Monitoring. You can also get it as part of your McAfee+

How to remove malware from your iPhone

Step 1: Restart your phone

Hold down the iPhone power button until you see slide to power off on your screen. Slide it, wait for the phone to power down, and then press the power button to restart your iPhone.

Step 2: Download updates 

Having the latest version of iOS on your phone ensures you have the best protection in place. Open the Settings app.  Look for Software Update in the General tab. Select Software Update. Tap Download and Install to the latest iPhone update.

Step 3: Delete suspicious apps 

Press a suspicious app icon on your screen and wait for the Remove App to pop up. Remove it and repeat that as needed for any other suspicious apps.

More steps you can take …

If those steps don’t take care of the issue, there are two stronger steps you can take. The first involves restoring your phone from a backup as described by Apple here.

The most aggressive step you can take is to reset your phone entirely. You can return it to the original factory settings (with the option to keep your content) by following the steps in this help article from Apple.

How to avoid malware on your phone

Clearly these attacks play on fear that one of the most important devices in your life has a problem—your phone.

  1. Protect your phone.

Comprehensive online protection software can secure your phone in the same ways that it secures your laptops and computers. Installing it can protect your privacy, keep you safe from attacks on public Wi-Fi, automatically block unsafe websites and links, and detect scams, just to name a few things it can do.

  1. Update your phone’s operating system.

Along with installing security software, keeping your phone’s operating system up to date can greatly improve your security. Updates can fix vulnerabilities that hackers rely on to pull off their malware-based attacks. It’s another tried-and-true method of keeping yourself safe—and for keeping your phone running great too.

  1. Avoid third-party app stores.

Google Play and Apple’s App Store have measures in place to review and vet apps to help ensure that they are safe and secure. Third-party sites might very well not, and they might intentionally host malicious apps as part of a front. Further, Google and Apple are quick to remove malicious apps from their stores when discovered, making shopping there safer still.

The post Black or Scrambled Phone Screen? Here’s How to Spot a Hacked vs Broken Phone appeared first on McAfee Blog.

INTERPOL Arrests 574 in Africa; Ukrainian Ransomware Affiliate Pleads Guilty

A law enforcement operation coordinated by INTERPOL has led to the recovery of $3 million and the arrest of 574 suspects by authorities from 19 countries, amidst a continued crackdown on cybercrime networks in Africa. The coordinated effort, named Operation Sentinel, took place between October 27 and November 27, 2025, and mainly focused on business email compromise (BEC), digital extortion, and

Revisiting CVE-2025-50165: A critical flaw in Windows Imaging Component

A comprehensive analysis and assessment of a critical severity vulnerability with low likelihood of mass exploitation

The best Linux VPNs of 2025: Expert tested and reviewed

We tested the top Linux VPNs with easy-to-use apps that feature a graphical user interface to keep your browsing safe.

Chinese Crypto Scammers on Telegram Are Fueling the Biggest Darknet Markets Ever

Online black markets once lurked in the shadows of the dark web. Today, they’ve moved onto public platforms like Telegram—and are racking up historic illicit fortunes.

Passwd: A walkthrough of the Google Workspace Password Manager

By: Unknown
Passwd is designed specifically for organizations operating within Google Workspace. Rather than competing as a general consumer password manager, its purpose is narrow, and business-focused: secure credential storage, controlled sharing, and seamless Workspace integration. The platform emphasizes practicality over feature overload, aiming to provide a reliable system for teams that already rely

Lubuntu vs. Xubuntu: Which Ubuntu flavor is right for you - my expert advice

Two Ubuntu-based distributions that have the same goal, but which is the one best-suited for your needs?

These vintage-style bookshelf speakers are the last ones I'll ever buy, here's why

The KLK Model 3 loudspeaker is a throwback to the past, giving audiophile-grade clarity to everything you listen to.

U.S. DoJ Seizes Fraud Domain Behind $14.6 Million Bank Account Takeover Scheme

The U.S. Justice Department (DoJ) on Monday announced the seizure of a web domain and database that it said was used to further a criminal scheme designed to target and defraud Americans by means of bank account takeover fraud. The domain in question, web3adspanels[.]org, was used as a backend web panel to host and manipulate illegally harvested bank login credentials. Users to the website are

3 ways anyone can start using AI at work today - safely

Knowing how to harness the right AI tools for your particular role can be a big professional boon, but only if you do so carefully.

Critical n8n Flaw (CVSS 9.9) Enables Arbitrary Code Execution Across Thousands of Instances

A critical security vulnerability has been disclosed in the n8n workflow automation platform that, if successfully exploited, could result in arbitrary code execution under certain circumstances. The vulnerability, tracked as CVE-2025-68613, carries a CVSS score of 9.9 out of a maximum of 10.0. The package has about 57,000 weekly downloads, according to statistics on npm. "Under certain

FCC Bans Foreign-Made Drones and Key Parts Over U.S. National Security Risks

The U.S. Federal Communications Commission (FCC) on Monday announced a ban on all drones and critical components made in a foreign country, citing national security concerns. To that end, the agency has added to its Covered List Uncrewed aircraft systems (UAS) and UAS critical components produced in a foreign country, and all communications and video surveillance equipment and services pursuant

I tried Amazon's new AI assistant, and I'm never shopping without it again

Did you know Amazon's Rufus AI tool can alert you to price drops and even snag deals for you? That's just one of several game-changing features.

This hidden iPhone camera trick can help you locate your lost device fast - no Find My required

With one text, you can trigger a front or rear camera photo, grab your iPhone's exact location, and even blare a sound.

Defense in depth -- the Microsoft way (part 94): SAFER (SRPv1 and AppLocker alias SRPv2) bypass for dummies

Posted by Stefan Kanthak via Fulldisclosure on Dec 22

Hi @ll,

since 30 years Microsoft ships Windows with "Windows Script Host",
an empty registry key and the following registry entries:

[HKEY_CURRENT_USER\Software\Microsoft\Windows Script Host\Settings]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Script Host\Settings]
"ActiveDebugging"="1"
"DisplayLogo"="1"
"SilentTerminate"="0"
"UseWINSAFER"="1"

The...

Backdoor.Win32.ControlTotal.t / Insecure Credential Storage / MVID-2025-0702

Posted by malvuln on Dec 22

Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2025
Original source:
https://malvuln.com/advisory/6c0eda1210da81b191bd970cb0f8660a.txt
Malvuln Intelligence Feed: https://intel.malvuln.com/
Contact: malvuln13 () gmail com
Media: x.com/malvuln

Threat: Backdoor.Win32.ControlTotal.t
Vulnerability: Insecure Credential Storage
Description: The malware listens on TCP port 2032 and requires
authentication. The password "jdf4df4vdf"...

HEUR.Backdoor.Win32.Poison.gen / Arbitrary Code Execution / MVID-2025-0701

Posted by malvuln on Dec 22

Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2025
Original source:
https://malvuln.com/advisory/b2e50fa38510a5ea8e11f614b1c1d0d5.txt
Malvuln Intelligence Feed: https://intel.malvuln.com/
Contact: malvuln13 () gmail com
Media: x.com/malvuln

Threat: HEUR.Backdoor.Win32.Poison.gen
Vulnerability: Arbitrary Code Execution
Description: The malware looks for and executes a x32-bit
"WININET.dll" PE file in its current directory....

Don't see your ChatGPT yearly recap? Try this trick to trigger it manually

OpenAI made a Spotify Wrapped-style 'Your Year with ChatGPT' recap. Here's how to find yours now.

Poisoned WhatsApp API package steals messages and accounts

And it's especially dangerous because the code works

A malicious npm package with more than 56,000 downloads masquerades as a working WhatsApp Web API library, and then it steals messages, harvests credentials and contacts, and hijacks users' WhatsApp accounts.…

Yesterday — December 22nd 2025Your RSS feeds

Sony's excellent WH-1000XM5 are over 50% off - and come with a free pair of earbuds

Looking for a last-minute gift (maybe for yourself)? Consider a pair of our favorite Sony headphones, which come with a free pair of noise-cancelling earbuds, too.

Palo Alto's new Google Cloud deal boosts AI integration, could save on cloud costs

SEC filings show the outfit cut projected 2027 cloud purchase commitments by $114M

Security vendor Palo Alto Networks is expanding its Google Cloud partnership, saying it will move "key internal workloads" onto the Chocolate Factory's infrastructure. The outfit also claims it is tightening integrations between its security tools and Google Cloud to deliver what it calls a "unified" security experience. At the same time, Palo Alto may trim its own cloud purchase commitments.…

The Justice Department Released More Epstein Files—but Not the Ones Survivors Want

The DOJ says it still has “hundreds of thousands” of pages to review, as the latest Epstein files release spurred more pushback from Democratic lawmakers and other critics of the administration.

Spy turned startup CEO: 'The WannaCry of AI will happen'

Ah, the good old days when 0-day development took a year

Interview "In my past life, it would take us 360 days to develop an amazing zero day," Zafran Security CEO Sanaz Yashar said.…

Thank you reddit (u/broadexample) - updated version of my STIX feed

A few days ago u/broadexample pointed out that our free STIX feed was doing it wrong:

"You're creating everything as Indicator, not as IPv4Address linked to Indicator via STIX Relationship hierarchy. This works when you use just this feed alone, but for everyone using multiple feeds it would be much less useful."

They were right. We were creating flat Indicator objects instead of proper STIX 2.1 hierarchy with SCOs and Relationships.

Fixed it today. New V2 endpoint with:

- IPv4Address SCOs with deterministic UUIDs (uuid5 for cross-feed deduplication)

- Relationship objects linking Indicator → SCO ("based-on")

- Malware SDOs for 10 families (Stealc, LummaC2, Cobalt Strike, etc.)

- Relationship objects linking Indicator → Malware ("indicates")

Should actually work properly in OpenCTI now.

V2 endpoint: https://analytics.dugganusa.com/api/v1/stix-feed/v2

V1 still works if you just need IOC lists: https://analytics.dugganusa.com/api/v1/stix-feed

Full writeup: https://www.dugganusa.com/post/stix-v2-reddit-feedback-opencti-ready

Thanks for the feedback. This is why we post here - you catch the stuff we miss.

submitted by /u/Clear_Ask9073
[link] [comments]

I tested the new elementaryOS 8.1 beta, and it absolutely brings the magic

This update proves that listening to users can make an already great Linux distro even better.

I tried ChatGPT's new StubHub app, and I'll never shop for tickets the old way again

The app lets you shop conversationally and shows tickets you might otherwise miss.

Hacktivists scrape 86M Spotify tracks, claim their aim is to preserve culture

Anna’s Archive’s idealism doesn’t quite survive its own blog post

What would happen to the world's music collections if streaming services disappeared? One hacktivist group says it has a solution: scrape around 300 terabytes of music and metadata from Spotify and offer it up for free as what it calls the world’s first “fully open” music preservation archive.…

Google Gemini is coming to these Samsung fridges - what it means for your grocery list

Google AI is coming to your kitchen, and it can see what's inside your fridge.

Fake WhatsApp API Package on npm Steals Messages, Contacts, and Login Tokens

Cybersecurity researchers have disclosed details of a new malicious package on the npm repository that works as a fully functional WhatsApp API, but also contains the ability to intercept every message and link the attacker's device to a victim's WhatsApp account. The package, named "lotusbail," has been downloaded over 56,000 times since it was first uploaded to the registry by a user named "

Conman and wannabe MI6 agent must repay £125k to romance scam victim

Judge says former most-wanted fugitive Mark Acklom will likely never return to the UK

The UK's Crown Prosecution Service (CPS) says a fraudster who claimed to be part of MI6 must repay £125,000 ($168,000) to a former love interest that he conned.…

I caught a Rust DDoS botnet on my honeypot, reverse engineered it, and now I'm monitoring its targets in real-time

During routine threat hunting on my Beelzebub honeypot, I caught something interesting: a Rust-based DDoS bot with 0 detections across 60+ AV engines at the time of capture.

TL;DR:

  • The malware exploits exposed Docker APIs on port 2375
  • Written in Rust using Tokio for async networking, bincode for the custom C2 protocol, and obfstr for string obfuscation
  • Same server (196.251.100.116) for malware distribution (port 80) and C2 (port 8080), single point of failure.
  • I decoded the C2 protocol and found it surprisingly weak: no encryption, predictable nonce, hardcoded username ("client_user")
  • I built a honeypot that impersonates a bot to monitor DDoS attack targets 👀

In the post you'll find:

  • Full attack chain of the Docker API exploitation
  • Sandbox setup for dynamic analysis (Docker inside an isolated VM)
  • Complete C2 protocol decoding
  • YARA rule and Snort rule for detection
  • All IoCs

The fact that no AV detected it shows that Rust + string obfuscation is making life hard for traditional detection engines.

Questions? AMA!

submitted by /u/mario_candela
[link] [comments]

5 tech gadgets that I didn't expect to love this much in 2025 (including surprise earbuds)

While the Samsung Galaxy Z Fold 7 remained my favorite gadget throughout the year, there were some surprising entries on my list.

This Linux distro makes your old laptop feel like a Mac - and it's free

pearOS makes switching from Mac easy. Here's why.

What are passkeys really? The simple explanation - for anyone tired of passwords

Yes, the technology underlying passkeys is confusing. Here's a plain-English guide that can help you ditch passwords today.

Why complex reasoning models could make misbehaving AI easier to catch

In a new paper from OpenAI, the company proposes a framework for analyzing AI systems' chain-of-thought reasoning to understand how, when, and why they misbehave.

Around 1,000 systems compromised in ransomware attack on Romanian water agency

On-site staff keep key systems working while all but one region battles with encrypted PCs

Romania's cybersecurity agency confirms a major ransomware attack on the country's water management administration has compromised around 1,000 systems, with work to remediate them still ongoing.…

Turn AI chaos into a career opportunity by preparing for these 4 scenarios

Gartner recently suggested four future scenarios for AI at work, and said businesses and their staff should prepare for all of them. Here's how to embrace that transformation for big benefits.

⚡ Weekly Recap: Firewall Exploits, AI Data Theft, Android Hacks, APT Attacks, Insider Leaks & More

Cyber threats last week showed how attackers no longer need big hacks to cause big damage. They’re going after the everyday tools we trust most — firewalls, browser add-ons, and even smart TVs — turning small cracks into serious breaches. The real danger now isn’t just one major attack, but hundreds of quiet ones using the software and devices already inside our networks. Each trusted system can

How to Browse the Web More Sustainably With a Green Browser

By: Unknown
As the internet becomes an essential part of daily life, its environmental footprint continues to grow.  Data centers, constant connectivity, and resource-heavy browsing habits all contribute to energy consumption and digital waste. While individual users may not see this impact directly, the collective effect of everyday browsing is significant. Choosing a browser designed with

Cyberctf.space - Early Access Open

I’ve opened the early access waitlist for CyberCTF.space, a cybersecurity CTF platform focused on real-world attacks, not puzzle only challenges. - Docker based labs - MITRE ATT&CK aligned techniques - Real World exploits

🎖 Early joiners receive Founding Hacker recognition.

I’m also looking for security practitioners interested in contributing labs, challenges, or documentation.

Join the waitlist: https://cyberctf.space/

Contributors: https://cyberctf.space/contributors

submitted by /u/Royal_Independent517
[link] [comments]
❌