526
2

#Steel giant #Nucor Corporation facing disruptions after cyberattack

https://www.bleepingcomputer.com/news/security/steel-giant-nucor-corporation-facing-disruptions-after-cyberattack/

#cybersecurity

527
4

North Korean #IT Workers Are Being Exposed on a Massive Scale

https://www.wired.com/story/north-korean-it-worker-scams-exposed/

#NorthKorea #cybersecurity #scam

528
11

#Qatar’s $400M jet for #Trump is a gold-plated security nightmare

https://www.theregister.com/2025/05/13/presidents_trump_747_qatar/

#cybersecurity #politics

529
2

#SAP patches second zero-day flaw exploited in recent attacks

https://www.bleepingcomputer.com/news/security/sap-patches-second-zero-day-flaw-exploited-in-recent-attacks/

#cybersecurity

530
3

#NorthKorea ramps up cyberspying in #Ukraine to assess war risk

https://www.bleepingcomputer.com/news/security/north-korea-ramps-up-cyberspying-in-ukraine-to-assess-war-risk/

#cybersecurity

531
1

#Ivanti fixes #EPMM zero-days chained in code execution attacks

https://www.bleepingcomputer.com/news/security/ivanti-fixes-epmm-zero-days-chained-in-code-execution-attacks/

#cybersecurity

532
1

#Fortinet fixes critical zero-day exploited in #FortiVoice attacks

https://www.bleepingcomputer.com/news/security/fortinet-fixes-critical-zero-day-exploited-in-fortivoice-attacks/

#cybersecurity

533
2

#GovDelivery, an email alert system used by governments, abused to send #scam messages

https://techcrunch.com/2025/05/13/government-email-alert-system-govdelivery-used-to-send-scam-messages/

#cybersecurity

534
2

#Ivanti warns of critical #NeuronsForITSM auth bypass flaw

https://www.bleepingcomputer.com/news/security/ivanti-warns-of-critical-neurons-for-itsm-auth-bypass-flaw/

#cybersecurity

535
3

New #Intel #CPU flaws leak sensitive data from privileged memory

https://www.bleepingcomputer.com/news/security/new-intel-cpu-flaws-leak-sensitive-data-from-privileged-memory/

#cybersecurity

536
2

New attack can steal #cryptocurrency by planting false memories in #AI chatbots

https://arstechnica.com/security/2025/05/ai-agents-that-autonomously-trade-cryptocurrency-arent-ready-for-prime-time/

#cybersecurity #LLM #chatbot #crypto

537
4

M&S says customer data stolen in cyberattack, forces password resets

https://www.bleepingcomputer.com/news/security/mands-says-customer-data-stolen-in-cyberattack-forces-password-resets/

#MarksAndSpencer #retail #UK #cybersecurity #privacy #DataBreach

538
3

Hackers now testing #ClickFix attacks against #Linux targets

https://www.bleepingcomputer.com/news/security/hackers-now-testing-clickfix-attacks-against-linux-targets/

#cybersecurity #FOSS

539
2

#OutputMessenger flaw exploited as zero-day in espionage attacks

https://www.bleepingcomputer.com/news/security/output-messenger-flaw-exploited-as-zero-day-in-espionage-attacks/

#cybersecurity

540
1

#Moldova arrests suspect linked to #DoppelPaymer #ransomware attacks

https://www.bleepingcomputer.com/news/security/moldova-arrests-suspect-linked-to-doppelpaymer-ransomware-attacks/

#cybersecurity

541
1

What a decade of data tells us about the state of open source security, via @TechRadar. #OpenSource #CyberSecurity #OSSRA #Tech #Technology https://flip.it/ITrry9

542
5

Malicious #npm Packages Infect 3,200+ #Cursor Users With Backdoor, Steal Credentials

https://thehackernews.com/2025/05/malicious-npm-packages-infect-3200.html

#cybersecurity #malware #AI #Apple #Mac #macOS

543
2

#iClicker site hack targeted students with #malware via fake #CAPTCHA

https://www.bleepingcomputer.com/news/security/iclicker-hack-targeted-students-with-malware-via-fake-captcha/

#cybersecurity #education

544
2

Can an #MCP-Powered #AI Client Automatically Hack a Web Server?

https://it.slashdot.org/story/25/05/11/0027236/can-an-mcp-powered-ai-client-automatically-hack-a-web-server

#cybersecurity

545
16

Yours truly just popped up on ITV News, offering some advice on the latest from Marks & Spencer on its cyberattack. Nina Hossein told me that she could read the titles on the books behind me - eek!

https://youtube.com/watch?v=6y-X9nKs9Ac&feature=shared

#cybersecurity #ransomware #databreach

546
1

Fake #AI video generators drop new #Noodlophile #infostealer #malware

https://www.bleepingcomputer.com/news/security/fake-ai-video-generators-drop-new-noodlophile-infostealer-malware/

#cybersecurity

547
21

If you're creating an application that displays URLs to users (chat app for example), please make sure to apply spoof checks to avoid use of UTF-8 confusables in IDN homograph attacks. You may want to block URLs with hostnames that get flagged, or display them in #punycode instead.

As an example, see https://github.com/chromium/chromium/tree/main/components/url_formatter/spoof_checks

In particular https://github.com/chromium/chromium/blob/8e070073d47861b8bfc7548dce8fcfc708a356fb/components/url_formatter/spoof_checks/idn_spoof_checker.cc#L177 is quite interesting read.

#cybersecurity #infosec

548
4

"Encrypted chat apps like Signal and WhatsApp are one of the best ways to keep your digital conversations as private as possible. But if you’re not careful with how those conversations are backed up, you can accidentally undermine your privacy.

When a conversation is properly encrypted end-to-end, it means that the contents of those messages are only viewable by the sender and the recipient. The organization that runs the messaging platform—such as Meta or Signal—does not have access to the contents of the messages. But it does have access to some metadata, like the who, where, and when of a message. Companies have different retention policies around whether they hold onto that information after the message is sent.

What happens after the messages are sent and received is entirely up to the sender and receiver. If you’re having a conversation with someone, you may choose to screenshot that conversation and save that screenshot to your computer’s desktop or phone’s camera roll. You might choose to back up your chat history, either to your personal computer or maybe even to cloud storage (services like Google Drive or iCloud, or to servers run by the application developer)."

https://www.eff.org/deeplinks/2025/05/back-it-back-it-let-us-begin-explain-encrypted-chat-backups

#CyberSecurity #Privacy #Encryption #Messaging #Signal #WhatsApp

549
4

There are security protections, and then there are strong security protections. How to turn on Lockdown Mode for your iPhone and Mac, from @TheVerege@flipboard.com:

https://flip.it/xzuEi5

#Tech #iPhone #Mac #CyberSecurity #Privacy

550
3

How #Signal, #WhatsApp, #Apple, and #Google Handle Encrypted Chat Backups

https://www.eff.org/deeplinks/2025/05/back-it-back-it-let-us-begin-explain-encrypted-chat-backups

#cybersecurity #privacy

view more: ‹ prev next ›

Cybersecurity

2 readers
6 users here now

An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!

Rules

Community Rules

founded 2 years ago
MODERATORS