Cybersecurity

12 readers
14 users here now

An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!

Rules

Community Rules

founded 2 years ago
MODERATORS
26
 
 

The timeline in the "SEC Consult SA-20250611-0 :: Undocumented Root Shell Access on SIMCom SIM7600G Modem" advisory is mind blowing:

https://seclists.org/fulldisclosure/2025/Jun/17

#CVE_2025_26412 #infosec #cybersecurity #vulnerability

27
 
 

A 100-year-old German company has reportedly filed for insolvency after a ransomware attack. An employee who arrived at the company in the morning even found extortion notes on the printers.

Fasana, which makes paper table napkins and employs around 240 people, was hit by hackers last month.

You know who we need to put out of business? Ransomware gangs.

#cybersecurity #ransomware

News report about ransomware-hit company

28
 
 

According to a new report, there are 13 China-owned VPN apps in the Apple App Store. None of them clearly disclose their links to China, and some use shell companies to hide their origin.

There are similar problems in Android's Google Play store.

Would you trust your internet traffic to a company that can be compelled to share its user data with the Chinese government?

Don't you think Apple and Google should be protecting their users better?

#cybersecurity #vpn #privacy

29
 
 

New #Veeam RCE flaw lets domain users hack backup servers

https://www.bleepingcomputer.com/news/security/new-veeam-rce-flaw-lets-domain-users-hack-backup-servers/

#cybersecurity

30
31
 
 

#Sitecore #CMS exploit chain starts with hardcoded 'b' password

https://www.bleepingcomputer.com/news/security/sitecore-cms-exploit-chain-starts-with-hardcoded-b-password/

#cybersecurity

32
 
 

#WindowsHello face unlock no longer works in the dark, and #Microsoft says it's not a bug

https://www.windowscentral.com/software-apps/windows-11/windows-hello-face-unlock-no-longer-works-in-the-dark-and-microsoft-says-its-not-a-bug

#biometrics #cybersecurity

33
 
 

Over 46,000 #Grafana instances exposed to account takeover bug

https://www.bleepingcomputer.com/news/security/over-46-000-grafana-instances-exposed-to-account-takeover-bug/

#cybersecurity

34
 
 

#Zoomcar discloses security breach impacting 8.4 million users

https://www.bleepingcomputer.com/news/security/zoomcar-discloses-security-breach-impacting-84-million-users/

#cybersecurity #DataBreach #privacy

35
 
 

#WestJet investigates #cyberattack disrupting internal systems

https://www.bleepingcomputer.com/news/security/westjet-investigates-cyberattack-disrupting-internal-systems/

#cybersecurity #travel #Canada

36
 
 

📢 European #cybersecurity is evolving! Explore how the #CRA & #NIS2 will affect small to medium #opensource vendors at the #openSUSE Conference.
✅ Legal alignment
✅ Risk response
✅ Community readiness
🗓️ June 26 | Nuremberg
#opensource #compliance #EU #regulations https://events.opensuse.org/

37
 
 

Researchers Create World's First Completely Verifiable Random Number Generator

https://science.slashdot.org/story/25/06/16/1656252/researchers-create-worlds-first-completely-verifiable-random-number-generator

#cybersecurity #randomness

38
 
 

#Signalgate 2.0 proves it - there’s no such thing as a “Backdoor for the Good Guys Only”

https://tuta.com/blog/opinion-signalgate

#cybersecurity #encryption

39
 
 

Genetic testing company 23andMe has sold itself to a nonprofit led by the company’s former CEO Anne Wojcicki. @Techcrunch reports:

https://flip.it/bhw2IJ

#Tech #23AndMe #BioTech #Health #CyberSecurity

40
 
 

As #grocery shortages persist, #UNFI says it’s recovering from #cyberattack

https://techcrunch.com/2025/06/16/food-distributor-unfi-says-its-recovering-from-cyberattack-as-grocery-shortages-persist/

#cybersecurity

41
 
 

#Anubis #ransomware adds wiper to destroy files beyond recovery

https://www.bleepingcomputer.com/news/security/anubis-ransomware-adds-wiper-to-destroy-files-beyond-recovery/

#cybersecurity

42
 
 

"- A company owned by a Russian network engineer named Vladimir Vedeneev controls thousands of Telegram IP addresses and maintains its servers.

  • Vedeneev’s other companies have a history of collaborating with Russia’s defense sector, the FSB security service, and other highly sensitive agencies.

  • Because of the way Telegram’s encryption protocols work, even users who use its “end-to-end” encryption features are vulnerable to being tracked by anyone who can monitor its network traffic."

https://www.occrp.org/en/investigation/telegram-the-fsb-and-the-man-in-the-middle

#CyberSecurity #Privacy #Telegram #Russia #Encryption #FSB

43
 
 

Help Us Shape the New #Filen Hub – We Want Your Feedback!

https://blog.filen.io/help-us-shape-the-new-filen-hub-we-want-your-feedback/

#FOSS #cybersecurity

44
 
 

#VictoriasSecret restores critical systems after #cyberattack

https://www.bleepingcomputer.com/news/security/victorias-secret-restores-critical-systems-after-cyberattack/

#cybersecurity

45
 
 

#Cloudflare: Outage not caused by security incident, data is safe

https://www.bleepingcomputer.com/news/security/cloudflare-outage-not-caused-by-security-incident-data-is-safe/

#cybersecurity

46
 
 

Introducing premium accounts to fund the matrix(dot)org homeserver

https://matrix.org/blog/2025/06/funding-homeserver-premium/

#FOSS #Matrix #cybersecurity #privacy

47
 
 

#Microsoft confirms auth issues affecting #Microsoft365 users

https://www.bleepingcomputer.com/news/microsoft/microsoft-confirms-auth-issues-affecting-microsoft-365-users/

#cybersecurity

48
 
 

"As AI agents powered by Large Language Models (LLMs) become increasingly versatile and capable of addressing a broad spectrum of tasks, ensuring their security has become a critical challenge. Among the most pressing threats are prompt injection attacks, which exploit the agent’s resilience on natural language inputs — an especially dangerous threat when agents are granted tool access or handle sensitive information. In this work, we propose a set of principled design patterns for building AI agents with provable resistance to prompt injection. We systematically analyze these patterns, discuss their trade-offs in terms of utility and security, and illustrate their real-world applicability through a series of case studies."

https://arxiv.org/html/2506.08837v2

#AI #GenerativeAI #LLMs #PromptInjection #AIAgents #AgenticAI #CyberSecurity

49
 
 

Coming to #Apple OSes: A seamless, secure way to import and export #passkeys

https://arstechnica.com/security/2025/06/apple-previews-new-import-export-feature-to-make-passkeys-more-interoperable/

#cybersecurity

50
view more: ‹ prev next ›