326
2

A Starter #Guide to Protecting Your Data From Hackers and Corporations

https://www.wired.com/story/guide-protect-data-from-hackers-corporations/

#cybersecurity

327
4

Why the #iPhone's Messages App Refuses Audio Messages That Mention 'Dave & Buster's'

https://apple.slashdot.org/story/25/05/26/0159210/why-the-iphones-messages-app-refuses-audio-messages-that-mention-dave-busters

#cybersecurity #Apple

328
2

Fake #Zenmap. #WinMRT sites target IT staff with #Bumblebee #malware

https://www.bleepingcomputer.com/news/security/bumblebee-malware-distributed-via-zenmap-winmrt-seo-poisoning/

#cybersecurity

329
2

How Many #Qubits Will It Take to Break Secure Public Key #Cryptography Algorithms?

https://it.slashdot.org/story/25/05/24/0530234/how-many-qubits-will-it-take-to-break-secure-public-key-cryptography-algorithms

#cybersecurity

330
3

#Naukri exposed recruiter email addresses, researcher says

https://techcrunch.com/2025/05/23/naukri-exposed-recruiter-email-addresses-researcher-says/

#cybersecurity #privacy #DataBreach

331
2

I received an "important email" from #Dreamhost about my domain registration. You'd think that #email security would be paramount for them.

They have no DKIM setting, so it's impossible to see if the email was tampered with in transit and if it was sent by the claimed sender. And, their DMARC policy is p=none, which tells email providers, "don't do anything special if you can't verify me".

Their dreamhostregistry.com domain is wide open for spoofing because they've configured it to be wide open for spoofing.

How can a web hosting company be so lax about email security? How can I trust emails they send to me if I have no assurance they sent it, and it wasn't modified in transit?

#Cybersecurity #DKIM #SPF #Spoofing #EmailSecurity

332
2

How can Europe better secure the open #digitalinfrastructure that underpins its public services, or #digitaleconomy?

We are delighted to announce the next #EOSA Webinar, #OpenSource for #Cybersecurity: Securing and Maintaining Europe's Open Source Dependencies.
This webinar looks at how Europe's cybersecurity and digital policy agendas are increasingly intertwined.

Learn more and register today: https://tinyurl.com/yf7xyadr

333
1

"My experiment harness executes this N times (N=100 for this particular experiment) and saves the results. It’s worth noting, if you rerun this you may not get identical results to me as between running the original experiment and writing this blog post I had removed the file containing the code to be analysed, and had to regenerate it. I believe it is effectively identical, but have not re-run the experiment.

o3 finds the kerberos authentication vulnerability in the benchmark in 8 of the 100 runs. In another 66 of the runs o3 concludes there is no bug present in the code (false negatives), and the remaining 28 reports are false positives. For comparison, Claude Sonnet 3.7 finds it 3 out of 100 runs and Claude Sonnet 3.5 does not find it in 100 runs. So on this benchmark at least we have a 2x-3x improvement in o3 over Claude Sonnet 3.7.

For the curious, I have uploaded a sample report from o3 (here) and Sonnet 3.7 (here). One aspect I found interesting is their presentation of results. With o3 you get something that feels like a human-written bug report, condensed to just present the findings, whereas with Sonnet 3.7 you get something like a stream of thought, or a work log. There are pros and cons to both. o3’s output is typically easier to follow due to its structure and focus. On the other hand, sometimes it is too brief, and clarity suffers."

https://sean.heelan.io/2025/05/22/how-i-used-o3-to-find-cve-2025-37899-a-remote-zeroday-vulnerability-in-the-linux-kernels-smb-implementation/

#AI #GenerativeAI #O3 #OpenAI #CyberSecurity #Linux #Kernel #ZeroDay

334
1

Dozens of malicious packages on #NPM collect host and network data

https://www.bleepingcomputer.com/news/security/dozens-of-malicious-packages-on-npm-collect-host-and-network-data/

#cybersecurity

335
1

Hacker steals $223 million in #CetusProtocol #cryptocurrency heist

https://www.bleepingcomputer.com/news/security/hacker-steals-223-million-in-cetus-protocol-cryptocurrency-heist/

#cybersecurity #crypto

336
2

FBI warns of #LunaMoth extortion attacks targeting law firms

https://www.bleepingcomputer.com/news/security/fbi-warns-of-luna-moth-extortion-attacks-targeting-law-firms/

#cybersecurity

337
3

Mysterious hacking group #Careto was run by the Spanish government, sources say

https://techcrunch.com/2025/05/23/mysterious-hacking-group-careto-was-run-by-the-spanish-government-sources-say/

#Spain #cybersecurity

338
2

#TikTok videos now push #infostealer #malware in #ClickFix attacks

https://www.bleepingcomputer.com/news/security/tiktok-videos-now-push-infostealer-malware-in-clickfix-attacks/

#cybersecurity

339
11

""This latest technology helps ensure that we know who is boarding flights," said TSA’s Federal Security Director for Pennsylvania and Delaware Gerardo Spero in a news release last month. "Credential authentication plays an important role in passenger identity verification. It improves a TSA officer’s ability to validate a traveler’s photo identification while also identifying any inconsistencies associated with fraudulent travel documents."

However, there are rising concerns around the safety of biometric information storage, stemming from the lack of transparency around the database where the information is being stored.

"It's not about the integrity of your face or driver's license, it's about the database where you have no control," said India McKinney, director of federal affairs at the Electronic Frontier Foundation. There's the risk of misidentification, security breaches, plus human or technological error. The screening process also varies at different airports and even terminals, putting the burden on the traveler."

https://eu.usatoday.com/story/travel/news/2025/05/20/tsa-facial-recognition-safety/83726603007/

#USA #Surveillance #Biometrics #FacialRecognition #TSA #AirsportScreening #CyberSecurity

340
6

Police takes down 300 servers in #ransomware supply-chain crackdown

https://www.bleepingcomputer.com/news/security/police-takes-down-300-servers-in-ransomware-supply-chain-crackdown/

#cybersecurity #cybercrime #OperationEndgame

341
5

TikTok videos now push infostealer malware in ClickFix attacks

"One of the videos claiming to provide instructions on how to "boost your Spotify experience instantly," has reached almost 500,000 views, with over 20,000 likes and more than 100 comments."

OMG. These are such naive people. Over 20,000 likes for a malware video! Disheartening. And I feel sorry for the real experience they've boosted.

https://www.bleepingcomputer.com/news/security/tiktok-videos-now-push-infostealer-malware-in-clickfix-attacks/

#Malware #CyberSecurity #Tiktok

342
1

Feds Charge 16 Russians Allegedly Tied to Botnets Used in #Ransomware, Cyberattacks, and Spying

https://www.wired.com/story/us-charges-16-russians-danabot-malware/

#cybersecurity #botnet #DanaBot #cybercrime

343
3

Oversharing on social media can not only be embarrassing but could also put your privacy at risk, damage your personal or professional reputation, or present a target to scammers who may use the information you shared to steal your identity. Read more at @ZDNet. #SocialMedia #Cybersecurity #DataPrivacy #OnlineSafety #Tech #Technology https://flip.it/26XlAA

344
1

US indicts leader of #Qakbot #botnet linked to #ransomware attacks

https://www.bleepingcomputer.com/news/security/us-indicts-leader-of-qakbot-botnet-linked-to-ransomware-attacks/

#cybersecurity #cybercrime

345
3

Destructive #malware available in #NPM repo went unnoticed for 2 years

https://arstechnica.com/information-technology/2025/05/destructive-malware-available-in-npm-repo-went-unnoticed-for-2-years/

#cybersecurity

346
3

Hackers use fake #Ledger apps to steal #Mac users’ seed phrases

https://www.bleepingcomputer.com/news/security/hackers-use-fake-ledger-apps-to-steal-mac-users-seed-phrases/

#crypto #cybersecurity

347
1

Hacker Conference #HOPE Says U.S. #Immigration Crackdown Caused Massive Crash in Ticket Sales

https://www.404media.co/hacker-conference-hope-says-fewer-people-buying-tickets-because-u-s-immigration-crackdown/

#cybersecurity #hacking

348
3

Wir haben ein internationales Treffen in Berlin veranstaltet. 26 Teilnehmende aus neun Ländern teilten ihr Wissen zur länderübergreifenden Harmonisierung von Cybersecurity-Labelling-Programmen für digitale Produkte am Verbrauchermarkt.

Mehr Eindrücke findet ihr im Video.

Mit dem IT-Sicherheitskennzeichen bieten wir als BSI ein eigenes, nationales #Cybersecurity Label an, das Hersteller digitaler Geräte und Dienste freiwillig bei uns beantragen können: http://www.bsi.bund.de/it-sik/hersteller

video/mp4

349
6

#FTC finalizes order requiring #GoDaddy to secure #hosting services

https://www.bleepingcomputer.com/news/security/ftc-finalizes-order-requiring-godaddy-to-secure-hosting-services/

#cybersecurity #WebHosting

350
7

Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials

https://www.wired.com/story/mysterious-database-logins-governments-social-media/

#cybersecurity #privacy #DataBreach

view more: ‹ prev next ›

Cybersecurity

2 readers
13 users here now

An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!

Rules

Community Rules

founded 2 years ago
MODERATORS