FreshRSS

🔒
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ ☆ ✇ The Register - Security

Don't panic, but it's only a matter of time before critical 'CitrixBleed 2' is under attack

— June 24th 2025 at 21:01

Why are you even reading this story? Patch now!

Citrix patched a critical vulnerability in its NetScaler ADC and NetScaler Gateway products that is already being compared to the infamous CitrixBleed flaw exploited by ransomware gangs and other cyber scum, although there haven't been any reports of active exploitation. Yet.…

☐ ☆ ✇ ZDNet | security RSS

Generative AI and privacy are best frenemies - a new study ranks the best and worst offenders

— June 24th 2025 at 20:14
Le Chat and Grok are the most respectful of your privacy. So which ones are the worst offenders?
☐ ☆ ✇ The Hacker News

New U.S. Visa Rule Requires Applicants to Set Social Media Account Privacy to Public

By: Ravie Lakshmanan — June 24th 2025 at 18:47
The United States Embassy in India has announced that applicants for F, M, and J nonimmigrant visas should make their social media accounts public. The new guideline seeks to help officials verify the identity and eligibility of applicants under U.S. law. The U.S. Embassy said every visa application review is a "national security decision." "Effective immediately, all individuals applying for an
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

New Kerio Control Advisory!

By: /u/Straight-Zombie-646 — June 24th 2025 at 18:03

Kerio Control has a design flaw in the implementation of the communication with GFI AppManager, leading to an authentication bypass vulnerability in the product under audit. Once the authentication bypass is achieved, the attacker can execute arbitrary code and commands.

submitted by /u/Straight-Zombie-646
[link] [comments]
☐ ☆ ✇ ZDNet | security RSS

AT&T customer? You might get a cut of $177 million data breach settlement

— June 24th 2025 at 17:53
Millions of customers had their data stolen. Now AT&T is offering compensation.
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

TrashTalk.me - A new secure way to chat

By: /u/merklerkmanitee — June 24th 2025 at 17:44

I made TrashTalk.me - A free, zero-log, end-to-end encrypted web chat that destroys itself. TL;DR: I built a simple, anonymous, and secure web chat. You click one button, get a private link, share it with one person, and the entire chat is permanently destroyed the moment one of you leaves. No sign-ups, no logs, no history.

Hey Reddit,

For a while now, I've wanted a truly ephemeral way to have a quick, private conversation online without needing to download an app, create an account, or trust a company with my data. I wanted something as simple as handing someone a note that self-destructs after they read it.

So, I built trashtalk.me.

What is it?

It's a dead-simple, free web application that does one thing:

Click "Create Anonymous Chat" - This instantly generates a unique, 64-character URL.

Share the Link - Send this link to the one person you want to talk to. The room is strictly limited to two people.

Chat Securely - Your conversation is end-to-end encrypted directly in your browsers. The server can't read your messages.

Destroy It - The moment one person closes the tab or clicks the trash can icon, the connection is severed, and the chat room ceases to exist. The server keeps no record of it.

That's it. It’s designed for those moments when you need to share something sensitive—a password, a private thought, a confidential link—and want zero trace of it left behind.

How It Works (For the Tech-Curious)

I wanted this to be as private as possible, which meant minimizing what the server does and knows.

No Database, No Logs: The backend is a simple Python WebSocket server running on my Linode instance. Its only job is to be a temporary matchmaker for two browsers to find each other. It holds no user data, stores no messages, and doesn't even log chat room IDs. Once you disconnect, the room is gone from the server's memory.

End-to-End Encryption (E2EE): The real security happens on your device. The app uses the browser's built-in Web Crypto API to generate a new, temporary key pair for every session. These keys are used to establish a shared secret between you and your peer, and every single message is encrypted and decrypted on your respective devices. The unencrypted text never touches my server.

Peer-to-Peer (P2P) Connection: After the initial handshake, the encrypted messages are sent directly between the two users via WebRTC whenever possible, which is more private and efficient.

Why I Built This

In a world of data breaches and constant tracking, I believe we need more tools that are simple, private-by-design, and don't require you to hand over your personal information just to have a conversation. This is my small contribution to that idea. It's not meant to replace robust apps like Signal, but rather to be a quick, disposable tool for one-off private conversations.

I'd love for you to try it out and let me know what you think. I'm open to any feedback, criticism, or ideas you might have.

Thanks for checking it out!

submitted by /u/merklerkmanitee
[link] [comments]
☐ ☆ ✇ The Register - Security

Beware of fake SonicWall VPN app that steals users' credentials

— June 24th 2025 at 17:22

A good reminder not to download apps from non-vendor sites

Unknown miscreants are distributing a fake SonicWall app to steal users' VPN credentials.…

☐ ☆ ✇ ZDNet | security RSS

How to get Windows 10 extended security updates for free: 2 options

— June 24th 2025 at 17:00
Don't want to fork over $30 for a one-year subscription to Windows 10 Extended Security Updates? Microsoft is offering a couple of ways to avoid the fee. But there is a catch.
☐ ☆ ✇ The Register - Security

The vulnerability management gap no one talks about

— June 24th 2025 at 15:01

If an endpoint goes ping but isn't on the network, does anyone hear it?

Partner content Recently, I've been diving deep into security control data across dozens of organizations, and what I've found has been both fascinating and alarming. Most security teams I work with can rattle off their vulnerability management statistics with confidence. They know their scan schedules, their remediation timelines, and their critical vulnerability counts. They point to clean dashboards and comprehensive reports as proof that their programs are working.…

☐ ☆ ✇ The Hacker News

Researchers Find Way to Shut Down Cryptominer Campaigns Using Bad Shares and XMRogue

By: Ravie Lakshmanan — June 24th 2025 at 14:17
Cybersecurity researchers have detailed two novel methods that can be used to disrupt cryptocurrency mining botnets. The methods take advantage of the design of various common mining topologies in order to shut down the mining process, Akamai said in a new report published today. "We developed two techniques by leveraging the mining topologies and pool policies that enable us to reduce a
☐ ☆ ✇ ZDNet | security RSS

Want a free VPN? How to use ProtonVPN on Android without having to pay

— June 24th 2025 at 13:32
The best part is you don't need to sign in or even create a ProtonVPN account. Here's how.
☐ ☆ ✇ The Hacker News

Hackers Target Over 70 Microsoft Exchange Servers to Steal Credentials via Keyloggers

By: Ravie Lakshmanan — June 24th 2025 at 13:26
Unidentified threat actors have been observed targeting publicly exposed Microsoft Exchange servers to inject malicious code into the login pages that harvest their credentials. Positive Technologies, in a new analysis published last week, said it identified two different kinds of keylogger code written in JavaScript on the Outlook login page - Those that save collected data to a local file
☐ ☆ ✇ ZDNet | security RSS

2 clever ways Android 16 guards your security - but you need to enable them

— June 24th 2025 at 12:35
Once you turn on these new Android 16 security features, your information and phone will be better protected against harm.
☐ ☆ ✇ The Register - Security

Four REvil ransomware crooks walk free, escape gulag fate, after admitting guilt

— June 24th 2025 at 11:46

Russian judge lets off accused with time served – but others who refused to plead guilty face years in penal colony

Four convicted members of the once-supreme ransomware operation REvil are leaving captivity after completing most of their five-year sentences.…

☐ ☆ ✇ The Hacker News

Between Buzz and Reality: The CTEM Conversation We All Need

By: Ravie Lakshmanan — June 24th 2025 at 11:00
I had the honor of hosting the first episode of the Xposure Podcast live from Xposure Summit 2025. And I couldn’t have asked for a better kickoff panel: three cybersecurity leaders who don’t just talk security, they live it. Let me introduce them. Alex Delay, CISO at IDB Bank, knows what it means to defend a highly regulated environment. Ben Mead, Director of Cybersecurity at Avidity
☐ ☆ ✇ The Hacker News

Hackers Exploit Misconfigured Docker APIs to Mine Cryptocurrency via Tor Network

By: Ravie Lakshmanan — June 24th 2025 at 09:57
Misconfigured Docker instances are the target of a campaign that employs the Tor anonymity network to stealthily mine cryptocurrency in susceptible environments. "Attackers are exploiting misconfigured Docker APIs to gain access to containerized environments, then using Tor to mask their activities while deploying crypto miners," Trend Micro researchers Sunil Bharti and Shubham Singh said in an
☐ ☆ ✇ The Hacker News

U.S. House Bans WhatsApp on Official Devices Over Security and Data Protection Issues

By: Ravie Lakshmanan — June 24th 2025 at 09:16
The U.S. House of Representatives has formally banned congressional staff members from using WhatsApp on government-issued devices, citing security concerns. The development was first reported by Axios. The decision, according to the House Chief Administrative Officer (CAO), was motivated by worries about the app's security. "The Office of Cybersecurity has deemed WhatsApp a high-risk to users
☐ ☆ ✇ The Hacker News

APT28 Uses Signal Chat to Deploy BEARDSHELL Malware and COVENANT in Ukraine

By: Ravie Lakshmanan — June 24th 2025 at 09:06
The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of a new cyber attack campaign by the Russia-linked APT28 (aka UAC-0001) threat actors using Signal chat messages to deliver two new malware families dubbed BEARDSHELL and COVENANT. BEARDSHELL, per CERT-UA, is written in C++ and offers the ability to download and execute PowerShell scripts, as well as upload the results of the
☐ ☆ ✇ The Register - Security

Psylo browser tries to obscure digital fingerprints by giving every tab its own IP address

— June 24th 2025 at 06:32

Gotta keep 'em separated so the marketers and snoops can't come out and play

Psylo, which bills itself as a new kind of private web browser, debuted last Tuesday in Apple's App Store, one day ahead of a report warning about the widespread use of browser fingerprinting for ad tracking and targeting.…

☐ ☆ ✇ The Hacker News

China-linked Salt Typhoon Exploits Critical Cisco Vulnerability to Target Canadian Telecom

By: Ravie Lakshmanan — June 24th 2025 at 03:00
The Canadian Centre for Cyber Security and the U.S. Federal Bureau of Investigation (FBI) have issued an advisory warning of cyber attacks mounted by the China-linked Salt Typhoon actors to breach major global telecommunications providers as part of a cyber espionage campaign. The attackers exploited a critical Cisco IOS XE software (CVE-2023-20198, CVSS score: 10.0) to access configuration
☐ ☆ ✇ The Register - Security

Typhoon-like gang slinging TLS certificate 'signed' by the Los Angeles Police Department

— June 23rd 2025 at 23:45

Chinese crew built 1,000+ device network that runs on home devices then targets critical infrastructure

A stealthy, ongoing campaign to gain long-term access to networks bears all the markings of intrusions conducted by China’s ‘Typhoon’ crews and has infected at least 1,000 devices, primarily in the US and South East, according to Security Scorecard's Strike threat intel analysts. And it uses a phony certificate purportedly signed by the Los Angeles police department to try and gain access to critical infrastructure.…

☐ ☆ ✇ The Register - Security

Iran cyberattacks against US biz more likely following air strikes

— June 23rd 2025 at 18:41

Plus 'low-level' hacktivist attempts

The US Department of Homeland Security has warned American businesses to guard their networks against Iranian government-sponsored cyberattacks along with "low-level" digital intrusions by pro-Iran hacktivists.…

☐ ☆ ✇ WIRED

Telegram Purged Chinese Crypto Scam Markets—Then Watched as They Rebuilt

By: Andy Greenberg — June 23rd 2025 at 16:48
Last month, Telegram banned black markets that sold tens of billions of dollars in crypto scam-related services. Now, as those markets rebrand and bounce back, it’s done nothing to stop them.
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

haveibeenpwned.watch - Open-source, no-fluff charts showcasing haveibeenpwned.com's pwned account data

By: /u/iosifache — June 23rd 2025 at 15:59

After discovering that the haveibeenpwned.com data is accessible via the API and noticing the lack of a visualization tool, I dedicated a few evenings to building haveibeenpwned.watch. This single-page website processes and presents data on leaks from Have I Been Pwned, with daily updates.

The site provides details on the total number of recorded breaches, the number of unique services affected, and the total accounts compromised. Charts break down the data by year, showing the number of breaches, affected accounts, average accounts breached per year, accounts by data type, and accounts by industry. Additionally, tables highlight the most recent breaches, the most significant ones, and the services with the highest number of compromised accounts.

Though simple, the website can be a useful resource for use cases like strategic security planning, cybersecurity sales, risk assessment, or simply tracking trends in the security landscape.

The website is open source, with its repository hosted on GitHub.

submitted by /u/iosifache
[link] [comments]
☐ ☆ ✇ The Hacker News

Echo Chamber Jailbreak Tricks LLMs Like OpenAI and Google into Generating Harmful Content

By: Ravie Lakshmanan — June 23rd 2025 at 15:58
Cybersecurity researchers are calling attention to a new jailbreaking method called Echo Chamber that could be leveraged to trick popular large language models (LLMs) into generating undesirable responses, irrespective of the safeguards put in place. "Unlike traditional jailbreaks that rely on adversarial phrasing or character obfuscation, Echo Chamber weaponizes indirect references, semantic
☐ ☆ ✇ The Register - Security

Second attack on McLaren Health Care in a year affects 743k people

— June 23rd 2025 at 15:48

Criminals targeted the hospital and physician network’s Detroit cancer clinic this time

McLaren Health Care is in the process of writing to 743,131 individuals now that it fully understands the impact of its July 2024 cyberattack.…

☐ ☆ ✇ The Hacker News

DHS Warns Pro-Iranian Hackers Likely to Target U.S. Networks After Iranian Nuclear Strikes

By: Ravie Lakshmanan — June 23rd 2025 at 15:14
The United States government has warned of cyber attacks mounted by pro-Iranian groups after it launched airstrikes on Iranian nuclear sites as part of the Iran–Israel war that commenced on June 13, 2025. Stating that the ongoing conflict has created a "heightened threat environment" in the country, the Department of Homeland Security (DHS) said in a bulletin that cyber actors are likely to
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

What secures LLMs calling APIs via MCP? A stack of OAuth specs—here’s how they fit together

By: /u/Smooth-Loquat-4954 — June 23rd 2025 at 14:55

Model Context Protocol is quickly becoming the default way for LLMs to call out to tools and APIs—but from a security standpoint, it’s been a little hand-wavy. This post fixes that.

It shows how five OAuth specs—including dynamic client registration and protected resource metadata—combine to form a secure, auditable, standards-based auth flow for MCP.

submitted by /u/Smooth-Loquat-4954
[link] [comments]
☐ ☆ ✇ The Hacker News

XDigo Malware Exploits Windows LNK Flaw in Eastern European Government Attacks

By: Ravie Lakshmanan — June 23rd 2025 at 13:12
Cybersecurity researchers have uncovered a Go-based malware called XDigo that has been used in attacks targeting Eastern European governmental entities in March 2025. The attack chains are said to have leveraged a collection of Windows shortcut (LNK) files as part of a multi-stage procedure to deploy the malware, French cybersecurity company HarfangLab said. XDSpy is the name assigned to a cyber
☐ ☆ ✇ ZDNet | security RSS

This Linux distro routes all your traffic through the Tor network - and it's my new favorite for privacy

— June 23rd 2025 at 13:03
I could easily see myself defaulting to Securonis when I need serious security.
☐ ☆ ✇ McAfee Blogs

16 Billion Stolen Logins for Apple, Google, Facebook and More: How to Stay Safe

By: Jasdev Dhaliwal — June 23rd 2025 at 12:47

Reports last week detail a “16 billion password leak”, with major news outlets worldwide proclaiming this as one of the “largest data breach in history. The exposed dataset appears to be a massive compilation of previously leaked login credentials combined with recent information harvested from devices infected with a type of malware called an infostealer. The vast amount of stolen login credentials, especially from the platforms people use and rely on every day, serves as a powerful reminder of the need for up-to-date online security combined with strong cyber hygiene. 

Why This Matters  

If cybercriminals get hold of your login credentials, the consequences can be serious—think hijacked social media accounts, stolen identities, phishing attacks launched from your personal email account, and potentially even financial loss. The good news? You can take action right now to boost your security and stay protected from scammers. 

The Real Threat You’re Facing 

Don’t let the “old data” narrative fool you into complacency. As McAfee CTO Steve Grobman notes: “With over 16 billion login credentials exposed worldwide, the scale of this breach is a stark reminder of the prevalence of data leaks and the importance of practicing good cyber hygiene.” 

This compilation represents a significant threat because: 

Password Reuse Amplifies Risk: If you reuse passwords across multiple sites, one stolen credential can unlock multiple accounts.  

Social Media Account Takeovers: “Email and social media logins are particularly valuable, as they allow scammers to reset passwords and dig even deeper into someone’s digital life, even impersonating victims,” Grobman explains. 

Identity theft: With access to information, like the username and password for your banking or financial account, cybercriminals could steal your identity to open new accounts, apply for loans, and commit fraud. 

Increase in Phishing Attacks: In Grobman’s words: “For cybercriminals, this data is gold. It gives them everything they need to scam, impersonate, and steal. With a trove of personal information circulating widely, people should be on high alert for targeted scam emails and texts that look like they’re from trusted brands or known contacts.” 

Ongoing Infostealer Infections on Unprotected Devices: New databases appear “every few weeks” with “fresh, weaponizable intelligence” which means that without the right protection you may have malware on your device silently stealing your data. And according to the researchers, the problem isn’t getting better—it’s accelerating. 

Your Action Plan: Focus on What Matters 

Following McAfee’s official guidance, here’s what you need to do immediately: 

Step 1: Check for Infections First

Before changing any passwords, scan your devices for malware. If you’re concerned that an infostealer might be present on your computer, scan your device with a trusted antivirus program before changing any passwords. Otherwise, newly entered credentials could be stolen as well. 

Step 2: Update Critical Passwords

Steve Grobman’s recommendation is clear: “Now is the time to update passwords – especially for email, banking, and shopping accounts.” You should:  

  • Audit your password reuse—if you use the same password on multiple sites, prioritize changing those first. 
  • Focus on critical accounts: Email, banking, social media, and shopping sites. 

Step 3: Implement Strong Authentication

Enable Two-Factor Authentication everywhere possible. As our CTO recommends: “Enable two-factor authentication wherever possible” to add that crucial second layer of security. 

Use authenticator apps, such as Google Authenticator, Duo, and Authy, and do not use SMS. You should avoid using SMS texts to receive 2FA codes, as threat actors can conduct SIM-swapping attacks to hijack your phone number and obtain them. 

Step 4: Deploy Scam Detection Technology

Given the elevated risk of targeted scams using your real information, Grobman specifically recommends: ” Use scam detection technology, like McAfee’s Scam Detector, to help flag risky messages before they cause harm.” 

Why Professional Identity Protection Is More Critical Than Ever 

While this specific data compilation may contain both older and newer data, it highlights a fundamental truth: your credentials are constantly being targeted by cybercrooks. 

The Infostealer Epidemic

The infostealer problem has gotten so pervasive that manual monitoring simply isn’t sufficient anymore. You need automated, professional-grade protection that works 24/7. 

How McAfee+ Addresses Modern Threats 

  • Scam Detection: We protect you from scams with a powerful, AI-powered defense system that works across all your devices. Our scam protection technology identifies and blocks phishing attempts that use your real credentials from compilations like this 16 billion record database. 
  • Comprehensive Dark Web Monitoring: We continuously scan the dark web, including criminal marketplaces, where infostealer logs and credential compilations are sold, alerting you immediately if your information appears in new dumps. 
  • Credit Monitoring: Our Advanced and Ultimate plans provide up to three-bureau credit monitoring, catching activity on your credit report that may be indicators of identity fraud. 
  • Personal Data Cleanup: One of our most powerful features automatically removes your information from data broker databases—the same sources that often feed into massive credential compilations. By reducing your digital footprint, we make you a harder target. 
  • Expert Identity Restoration: If criminals successfully use old credentials to compromise your identity, our specialist team provides step-by-step guidance for complete recovery, backed by up to $2 million in identity theft insurance.

Proactive vs. Reactive Security

Traditional approaches wait for you to discover you’ve been compromised. McAfee’s approach is different: 

  • Monitor continuously for your personal info where it shouldn’t be. 
  • Alert immediately when threats are detected. 
  • Respond automatically to remove your data from risky sources. 
  • Restore professionally if you’ve been impacted by a breach. 

The Bigger Picture: Why This Won’t Be the Last

There are thousands, if not hundreds of thousands, of similarly leaked archives being shared online, resulting in billions of credentials records released for free. This 16 billion record compilation is just the latest in an ongoing parade of massive credential dumps. 

Previous Examples:

  • Countless smaller compilations are released weekly 

The Trend Is Accelerating: As infostealers have become so abundant and commonly used, threat actors release massive compilations for free on Telegram, Pastebin, and Discord to build reputation and attract customers to their paid services. 

Long-Term Protection Strategy

Assume You’re Already Compromised

Given the scale of credential theft over the years, assume some of your information is already in criminal hands. This mindset shift changes everything: 

  • Use unique passwords everywhere—password reuse is your biggest vulnerability 
  • Enable 2FA on all critical accounts—your second line of defense 
  • Monitor automatically—manual checks may cost you precious time needed to change your password and secure your login. 
  • Respond quickly—time is critical when credentials are exploited 

Build Defense in Depth

  • Network Security: Use VPNs on public networks and be cautious about which devices access sensitive accounts. 
  • Identity Monitoring: An automated service that scans the dark web and lets you know if your personal info is found there. 
  • Credit and Transaction Monitoring: Lets you know if you have activity on your credit report and financial accounts. 

Take Action: Don’t Wait for the Next Data Leak

Your credentials are valuable to criminals, and they’re actively working to steal and exploit them. The question isn’t whether your information will appear in future compilations—it’s whether you’ll be protected when it does. 

McAfee Identity Monitoring provides timely dark web alerts, complete with guidance on how to quickly secure your info if they’re found in breaches. 

Get McAfee+, with all-in-one scam, privacy, and identity protection and gain immediate access to: 

  • Dark web monitoring for timely alerts and quick steps to fix breaches. 
  • Personal data cleanup to remove your info from data broker sites. 
  • Credit and Transaction Monitoring 
  • Expert identity restoration support 
  • Up to $2 million in identity theft insurance 
  • AI-powered scam protection 
  • 24/7 security support 

Remember: Take this opportunity to update your passwords immediately and improve your cybersecurity habits — because the threat is real, ongoing, and growing. 

 

 

The post 16 Billion Stolen Logins for Apple, Google, Facebook and More: How to Stay Safe appeared first on McAfee Blog.

☐ ☆ ✇ The Register - Security

Experts count staggering costs incurred by UK retail amid cyberattack hell

— June 23rd 2025 at 11:29

Cyber Monitoring Centre issues first severity assessment since February launch

Britain's Cyber Monitoring Centre (CMC) estimates the total cost of the cyberattacks that crippled major UK retail organizations recently could be in the region of £270-440 million ($362-591 million).…

☐ ☆ ✇ The Hacker News

How AI-Enabled Workflow Automation Can Help SOCs Reduce Burnout

By: Unknown — June 23rd 2025 at 11:25
It sure is a hard time to be a SOC analyst. Every day, they are expected to solve high-consequence problems with half the data and twice the pressure. Analysts are overwhelmed—not just by threats, but by the systems and processes in place that are meant to help them respond. Tooling is fragmented. Workflows are heavy. Context lives in five places, and alerts never slow down. What started as a
☐ ☆ ✇ The Hacker News

Google Adds Multi-Layered Defenses to Secure GenAI from Prompt Injection Attacks

By: Ravie Lakshmanan — June 23rd 2025 at 10:46
Google has revealed the various safety measures that are being incorporated into its generative artificial intelligence (AI) systems to mitigate emerging attack vectors like indirect prompt injections and improve the overall security posture for agentic AI systems. "Unlike direct prompt injections, where an attacker directly inputs malicious commands into a prompt, indirect prompt injections
☐ ☆ ✇ WIRED

Taiwan Is Rushing to Make Its Own Drones Before It's Too Late

By: Justin Ling — June 23rd 2025 at 10:00
Unmanned vehicles are increasingly becoming essential weapons of war. But with a potential conflict with China looming large, Taiwan is scrambling to build a domestic drone industry from scratch.
☐ ☆ ✇ The Hacker News

⚡ Weekly Recap: Chrome 0-Day, 7.3 Tbps DDoS, MFA Bypass Tricks, Banking Trojan and More

By: Ravie Lakshmanan — June 23rd 2025 at 09:30
Not every risk looks like an attack. Some problems start as small glitches, strange logs, or quiet delays that don’t seem urgent—until they are. What if your environment is already being tested, just not in ways you expected? Some of the most dangerous moves are hidden in plain sight. It’s worth asking: what patterns are we missing, and what signals are we ignoring because they don’t match old
☐ ☆ ✇ WIRED

What Satellite Images Reveal About the US Bombing of Iran's Nuclear Sites

By: Brian Barrett, Lily Hay Newman, Andrew Couts — June 22nd 2025 at 21:41
The US concentrated its attack on Fordow, an enrichment plant built hundreds of feet underground. Aerial photos give important clues about what damage the “bunker-buster” bombs may have caused.
☐ ☆ ✇ The Register - Security

Former US Army Sergeant pleads guilty after amateurish attempt at selling secrets to China

— June 23rd 2025 at 00:33

PLUS: 5.4M healthcare records leak; AI makes Spam harder to spot; Many nasty Linux vulns; and more

Infosec in brief A former US Army sergeant has admitted he attempted to sell classified data to China.…

☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Just casually broke bunq’s sandbox with 0day-level spoofing, and nobody seems to care 🇳🇱

By: /u/ficu71 — June 22nd 2025 at 02:42

So I cooked up a fake transaction for shits and giggles. No valid IBAN. No real user. No device. No signature. No token. No nothing. Just pure distilled bullshit in a JSON payload.

Guess what? “Transaction accepted” “attack_success”: true “fraud_score”: 0.99999 System looked at it and said: “yeah, looks good to me.”

I even told the sandbox I was sending 10k EUR from FAKE_IBAN_901 to INVALID_IBAN_123 using a spoofed IMEI and some RSA nonsense I made up in Notepad. Bunq backend? Nodded politely and gave me a sandbox TXID.

It gets better — it accepts critical priority flags, fake biometric hashes, invalid currency codes, all wrapped in a nice little “success” bow.

This ain’t a bug, this is a fuckin’ confessional.

If bunq staff lurking here: hit me up. This ain’t a ransom, but y’all might wanna know just how open wide your API goes when someone whispers sweet nothings like tpp_id: "lol_fake_999".

We got logs. We got timestamps. We got receipts.

Your move, bunq.

submitted by /u/ficu71
[link] [comments]
☐ ☆ ✇ WIRED

Truth Social Crashes as Trump Live-Posts Iran Bombing

By: Andrew Couts, Lily Hay Newman — June 22nd 2025 at 01:10
The social network started experiencing global outages within minutes of Donald Trump posting details of a US military strike on Iran.
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Series 2: Implementing the WPA in RAWPA - Part 2

By: /u/Dark-stash — June 21st 2025 at 23:17

RAWPA helps security researchers and penetration testers with hierarchical methodologies for testing.
This is not a "get bugs quick scheme". I fully encourage manual scouring through JS files and playing around in burp, RAWPA is just like a guided to rejuvenate your thinking.
Interested ? Join the testers now
https://forms.gle/guLyrwLWWjQW61BK9

Read more about RAWPA on my blog: https://kuwguap.github.io/

submitted by /u/Dark-stash
[link] [comments]
☐ ☆ ✇ Troy Hunt

Weekly Update 457

By: Troy Hunt — June 21st 2025 at 17:36
Weekly Update 457

Firstly, apologies for the annoying clipping in the audio. I use a Rode VideoMic that's a shotgun style that plugs straight into the iPhone and it's usually pretty solid. It was also solid when I tested it again now, just recording a video into the phone, so I don't know if this was connection related or what, but I was in no position to troubleshoot once the stream had started, unfortunately.

Moving on, it's been a ridiculously hectic week of bacb-to-back events then to top it off, we've bee dealing with crazy traffic volumes on HIBP:

Well, that explains the traffic: 2.46M visitors to Have I Been Pwned in 24 hours, mostly from Google searches. The inbound traffic is near unprecedented, with only the Collection 1 credential stuffing list in Jan 2019 and the Facebook scrape in April 2021 coming close. pic.twitter.com/li7qvfy9tk

— Troy Hunt (@troyhunt) June 21, 2025

Anyway, you just can't predict these things, hope you enjoy this week's video regardless.

Weekly Update 457
Weekly Update 457
Weekly Update 457
Weekly Update 457

References

  1. Sponsored by: 1Password Extended Access Management: Secure every sign-in for every app on every device.
  2. If you want to follow along with travels, most of the pics I post these days are going to a public Facebook account (such is the fragmented social media world today)
  3. Catch me in Rome next week for the DotNetCode Italy meetup (that'll be the last public event of the tour)
  4. Was it really 16B passwords? (obviously this story got huge traction, let's see what the data says)

☐ ☆ ✇ WIRED

Israel Says Iran Is Hacking Security Cameras for Spying

By: Lily Hay Newman — June 21st 2025 at 10:00
Plus: Ukrainian hackers reportedly knock out a key Russian internet provider, China’s Salt Typhoon hackers claim another victim, and the UK hits 23andMe with a hefty fine over its 2023 data breach.
☐ ☆ ✇ The Hacker News

Scattered Spider Behind Cyberattacks on M&S and Co-op, Causing Up to $592M in Damages

By: Ravie Lakshmanan — June 21st 2025 at 09:44
The April 2025 cyber attacks targeting U.K. retailers Marks & Spencer and Co-op have been classified as a "single combined cyber event." That's according to an assessment from the Cyber Monitoring Centre (CMC), a U.K.-based independent, non-profit body set up by the insurance industry to categorize major cyber events. "Given that one threat actor claimed responsibility for both M&S and
☐ ☆ ✇ The Register - Security

Netflix, Apple, BofA websites hijacked with fake help-desk numbers

— June 20th 2025 at 21:10

Don’t trust mystery digits popping up in your search bar

Scammers are hijacking the search results of people needing 24/7 support from Apple, Bank of America, Facebook, HP, Microsoft, Netflix, and PayPal in an attempt to trick victims into handing over personal or financial info, according to Malwarebytes senior director of research Jérôme Segura.…

☐ ☆ ✇ The Register - Security

Looks like Aflac is the latest insurance giant snagged in Scattered Spider’s web

— June 20th 2025 at 17:55

If it looks like a duck and walks like a duck...

Aflac is the latest insurance company to disclose a security breach following a string of others earlier this week, all of which appear to be part of Scattered Spider's most recent data theft campaign.…

☐ ☆ ✇ The Register - Security

Qilin ransomware top dogs treat their minions to on-call lawyers for fierier negotiations

— June 20th 2025 at 17:31

It's a marketing move to lure more affiliates, says infosec veteran

The latest marketing ploy from the ransomware crooks behind the Qilin operation involves offering affiliates access to a crack team of lawyers to ramp up pressure in ransom negotiations.…

☐ ☆ ✇ The Hacker News

Qilin Ransomware Adds "Call Lawyer" Feature to Pressure Victims for Larger Ransoms

By: Ravie Lakshmanan — June 20th 2025 at 16:35
The threat actors behind the Qilin ransomware-as-a-service (RaaS) scheme are now offering legal counsel for affiliates to put more pressure on victims to pay up, as the cybercrime group intensifies its activity and tries to fill the void left by its rivals. The new feature takes the form of a "Call Lawyer" feature on the affiliate panel, per Israeli cybersecurity company Cybereason. The
☐ ☆ ✇ ZDNet | security RSS

Were 16 billion passwords from Apple, Google, and Facebook leaked? How to protect yourself

— June 22nd 2025 at 08:30
Wondering if your information is posted online from a data breach? Here's how to check if your accounts are at risk and what to do next.
❌