Cybersecurity

Last update (UTC): 10:45 - 29/11/2025

Security.nl

Zwitserse FG's: opslag overheidsdata in Amerikaanse cloud vaak onacceptabel

15:33 - 28/11/2025
  View item as page
Het gebruik van Amerikaanse clouddiensten voor de opslag van gevoelige overheidsdata is vaak onacceptabel, zo stelt Privatim, ...

https://www.security.nl/posting/915127/Zwitserse+FG%27s%3A+opslag+overheidsdata+


Simone Smit wordt volgend jaar maart nieuwe directeur van AIVD

14:22 - 28/11/2025
  View item as page
Simone Smit wordt volgend jaar maart de nieuwe directeur van de AIVD en volgt daarmee Erik Akerboom op die eerder zijn vertrek ...

https://www.security.nl/posting/915109/Simone+Smit+wordt+volgend+jaar+maart+nieu


Onderzoek naar aparte domeinextensie voor overheidssites nog gaande

13:56 - 28/11/2025
  View item as page
Het onderzoek naar een aparte domeinextensie voor overheidswebsites is nog gaande en wordt op zijn vroegst eind dit jaar ...

https://www.security.nl/posting/915102/Onderzoek+naar+aparte+domeinextensie+voor


Spaanse luchthavenbeheerder krijgt 10 miljoen euro boete voor gezichtsscanners

13:26 - 28/11/2025
  View item as page
De Spaanse privacytoezichthouder AEPD heeft de Spaanse luchthavenbeheerder Aena een boete van 10 miljoen euro opgelegd wegens ...

https://www.security.nl/posting/915085/Spaanse+luchthavenbeheerder+krijgt+10+mil


GrapheneOS haalt servers weg uit Frankrijk: 'Land is niet veilig voor open source'

11:55 - 28/11/2025
  View item as page
De makers van het besturingssysteem GrapheneOS hebben hun servers weggehaald uit Frankrijk. Volgens de ontwikkelaars is het ...

https://www.security.nl/posting/915075/GrapheneOS+haalt+servers+weg+uit+Frankrij


Studenten en it-professionals vinden lekken in systemen van Belgische overheid

11:02 - 28/11/2025
  View item as page
Studenten en it-professionals hebben de afgelopen weken tientallen kwetsbaarheden in systemen van de Belgische overheid ...

https://www.security.nl/posting/915065/Studenten+en+it-professionals+vinden+lekk


D-Link waarschuwt voor botnet dat kwetsbare NAS-systemen aanvalt

10:29 - 28/11/2025
  View item as page
Hardwarefabrikant D-Link waarschuwt gebruikers voor een botnet dat kwetsbare NAS-systemen aanvalt en roept op tot het vervangen ...

https://www.security.nl/posting/915061/D-Link+waarschuwt+voor+botnet+dat+kwetsba


Britse overheid adviseert mkb passphrases, updates en wachtwoordmanager

10:05 - 28/11/2025
  View item as page
De Britse overheid roept mkb-bedrijven op om gebruik te maken van passphrases en een wachtwoordmanager en updates op tijd te ...

https://www.security.nl/posting/915052/Britse+overheid+adviseert+mkb+passphrases


'Meeste jonge cybercriminelen stoppen als ze de twintig zijn gepasseerd'

09:42 - 28/11/2025
  View item as page
De meeste jonge cybercriminelen stoppen als ze de twintig zijn gepasseerd, wat overeenkomt met andere vormen van criminaliteit, ...

https://www.security.nl/posting/915048/%27Meeste+jonge+cybercriminelen+stoppen+a


Uitgever Vanity Fair krijgt 750.000 euro boete voor illegaal plaatsen van cookies

16:56 - 27/11/2025
  View item as page
De Franse uitgever Conde Nast heeft een boete van 750.000 euro gekregen omdat het illegaal cookies plaatste bij bezoekers van ...

https://www.security.nl/posting/915004/Uitgever+Vanity+Fair+krijgt+750_000+euro+


Slashdot

The Mysterious Black Fungus From Chernobyl That May Eat Radiation

00:00 - 29/11/2025
  View item as page
Black fungus found growing inside Chernobyl's destroyed reactor may be feeding on radiation, and researchers have tested samples of the same species aboard the International Space Station to explore whether it could eventually shield astronauts from cosmic rays. Ukrainian scientist Nelli Zhdanova first discovered the melanin-rich mould colonizing the walls and ceilings of the exploded reactor building during a May 1997 survey. Her research indicated that the fungal hyphae were actually growing toward sources of ionizing radiation rather than merely tolerating it. In 2007, nuclear scientist Ekaterina Dadachova at the Albert Einstein College of Medicine found that melanised fungi grew 10% faster when exposed to radioactive caesium compared to control samples, leading her to propose "radiosynthesis" -- a process where organisms convert radiation into metabolic energy. The same strain, Cladosporium sphaerospermum, traveled to the ISS in December 2018 and grew an average of 1.21 times faster over 26 days compared to Earth-based controls. Nils Averesch, a biochemist at the University of Florida and co-author of that study, remains cautious about attributing the growth boost to radiation harvesting since zero gravity could also be responsible.

Read more of this story at Slashdot.

https://news.slashdot.org/story/25/11/28/1516243/the-mysterious-black-fungus-fro


Airbus Issues Major A320 Recall, Threatening Global Flight Disruption

00:00 - 29/11/2025
  View item as page
Europe's Airbus said on Friday it was ordering immediate repairs to 6,000 of its widely used A320 family of jets in a sweeping recall affecting more than half the global fleet, threatening upheaval during the busiest travel weekend of the year in the United States and disruption worldwide. From a report: The setback appears to be among the largest recalls affecting Airbus in its 55-year history and comes weeks after the A320 overtook the Boeing 737 as the most-delivered model. At the time Airbus issued its bulletin to the plane's more than 350 operators, some 3,000 A320-family jets were in the air. The fix mainly involves reverting to earlier software and is relatively simple, but must be carried out before the planes can fly again, other than repositioning to repair centres, according to the bulletin to airlines seen by Reuters. Airlines from the United States to South America, Europe, India and New Zealand warned the repairs could potentially cause flight delays or cancellations.

Read more of this story at Slashdot.

https://news.slashdot.org/story/25/11/29/0515215/airbus-issues-major-a320-recall


EU To Examine If Apple Ads and Maps Subject To Tough Rules, Apple Says No

00:00 - 29/11/2025
  View item as page
EU antitrust regulators will examine whether Apple's Apple Ads and Apple Maps should be subject to the onerous requirements of the bloc's digital rules after both services hit key criteria, with the U.S. tech giant saying they should be exempted. From a report: Apple's App Store, iOS operating system and Safari web browser were designated core platform services under the Digital Markets Act two years ago aimed at reining in the power of Big Tech and opening up the field to rivals so consumers can have more choice. The European Commission said that Apple has notified it that Apple Ads and Apple Maps met the Act's two thresholds to be considered "gatekeepers." The DMA designates companies with services with more than 45 million monthly active users and $79 billion in market capitalisation as gatekeepers subject to a list of dos and don'ts.

Read more of this story at Slashdot.

https://apple.slashdot.org/story/25/11/28/172222/eu-to-examine-if-apple-ads-and-


Scientists Think They've Solved Why One of History's Most Advanced Civilizations Vanished

00:00 - 29/11/2025
  View item as page
A new study published in Communications Earth & Environment has reconstructed the climate conditions of the ancient Indus River Valley civilization between 3000 and 1000 B.C., finding that four intense droughts -- each lasting more than 85 years -- likely drove the gradual decline of one of the world's earliest advanced societies. The research team, led by Hiren Solanki at the Indian Institute of Technology, Gandhinagar, combined paleoclimate data from cave formations and lake records with computer models to determine that the region shifted from wetter-than-present monsoon conditions to prolonged dry spells as the tropical Pacific Ocean warmed. The third drought, peaking around 1733 B.C., proved the most severe: it lasted 164 years, reduced annual rainfall by 13%, and affected nearly the entire region. Overall temperatures rose by 0.5 degrees Celsius and rainfall dropped between 10 and 20%. These changes shrank lakes and rivers, dried soils, and made agriculture increasingly difficult in areas away from major waterways. Harappan settlements progressively relocated eastward toward the Indus River over roughly 2,000 years. The civilization's long survival under repeated climate stress -- through crop switching, trade diversification, and settlement relocation -- offers lessons for modern communities facing environmental pressures, the researchers said.

Read more of this story at Slashdot.

https://science.slashdot.org/story/25/11/28/1721249/scientists-think-theyve-solv


China-Netherlands Chip Fight Turns Into Corporate Civil War

00:00 - 28/11/2025
  View item as page
The bitter standoff between Dutch chipmaker Nexperia -- which supplies basic chips crucial to 49% of European automakers, over 85% of medical device companies, and the entire defense industry -- and its Chinese parent company Wingtech escalated on Friday when both Wingtech and Nexperia's Chinese unit accused the Dutch business of secretly building a supply chain that would cut China out entirely. The accusations came one day after Nexperia's Dutch headquarters published an open letter claiming it had repeatedly tried and failed to contact its Chinese unit. Nexperia China demanded the Dutch side halt its overseas expansion plans, specifically a $300 million investment in a Malaysian plant, and alleged an internal company target to source 90% of production outside China by mid-2026. The Chinese unit also accused its European counterparts of deleting employee email accounts and cutting off access to IT systems. The dispute traces back to September when the Dutch government invoked a Cold War-era law to seize control of Nexperia on economic security grounds. An Amsterdam court subsequently stripped Wingtech of its ownership rights. Beijing retaliated by halting exports of finished Nexperia chips on October 4, triggering warnings of production shutdowns from automakers including Nissan and Bosch. Export curbs were relaxed in early November, and the Dutch government suspended its intervention last week following talks, but the court ruling remains in force. Wingtech warned that supply disruptions could return if the control issue remains unresolved.

Read more of this story at Slashdot.

https://slashdot.org/story/25/11/28/1636212/china-netherlands-chip-fight-turns-i


Australia Risks 2035 Climate Goal Without Bigger Emissions Cuts

00:00 - 28/11/2025
  View item as page
Australia warned it's in danger of missing its 2035 climate targets without deeper pollution cuts, which in turn threatens the nation's ambitions to reach net zero by mid-century. From a report: Emissions are set to fall 48% by 2035 from 2005 levels based on current projections [non-paywalled source], the government said in a report on Thursday. That's short of an official pledge to cut greenhouse gases between 62% and 70%. The forecast doesn't take into account new action planned under the nation's Net Zero Plan. Still, the targets remain achievable and officials plan to take additional measures to meet them, Minister for Climate Change and Energy Chris Bowen said in a speech to parliament.

Read more of this story at Slashdot.

https://news.slashdot.org/story/25/11/28/1654207/australia-risks-2035-climate-go


Singapore Takes Top Spot in Global Talent Index

00:00 - 28/11/2025
  View item as page
Singapore has claimed the top spot in the 2025 Global Talent Competitiveness Index for the first time, displacing Switzerland from a position the European nation had held since the ranking's inception in 2013. The index, produced by business school INSEAD and the Portulans Institute, measured 135 economies across 77 indicators spanning soft skills, AI talent concentration, and formal education systems. The city-state ranked first globally in formal education and what the report calls "Generalist Adaptive Skills," a category covering soft skills, digital literacy, and innovation-oriented thinking. A key factor in Singapore's rise was a seven-place jump in talent retention, moving from 38th to 31st. The United States fell from third place in 2023 to ninth this year, its weakest showing in 12 years, due to declines in openness and lifelong learning metrics. High-income European countries continue to dominate the top ten, holding seven positions.

Read more of this story at Slashdot.

https://news.slashdot.org/story/25/11/28/1646244/singapore-takes-top-spot-in-glo


Europe Fears It Can't Catch Up in Great Power Competition

00:00 - 28/11/2025
  View item as page
European leaders have spent years warning that the continent risked falling behind the U.S., China and Russia in the global contest for economic, technological and military dominance, and officials now believe they have reached that point. The mood darkened over the summer when Europe found itself on the sidelines as Washington and Beijing negotiated a reset of global trade rules, and turned bleak this month when the White House presented a Ukraine cease-fire plan without consulting European capitals. In July, the EU accepted a trade deal allowing the U.S. to impose 15% tariffs without retaliation. President Trump ignored European calls to pressure Moscow before meeting Vladimir Putin in Alaska in August, telling reporters "this is not to do with Europe, Europe's not telling me what to do." Germany has eased its debt brake to pour $580 billion into a decade-long rearmament program, and the EU has set a 2030 rearmament goal -- defense spending across the region is set to exceed $560 billion this year, double what it was a decade ago. "Battle lines for a new world order, based on power, are being drawn right now," European Commission President Ursula von der Leyen said in September. "A new Europe must emerge."

Read more of this story at Slashdot.

https://slashdot.org/story/25/11/28/1712223/europe-fears-it-cant-catch-up-in-gre


Someone Is Trying To 'Hack' People Through Apple Podcasts

00:00 - 28/11/2025
  View item as page
Apple's Podcasts app on both iOS and Mac has been exhibiting strange behavior for months, spontaneously launching and presenting users with obscure religion, spirituality and education podcasts they never subscribed to -- and at least one of these podcasts contains a link attempting a cross-site scripting attack, 404 Media reports. Joseph Cox, a journalist at the outlet, documented the issue after repeatedly finding his Mac had launched the Podcasts app on its own, presenting bizarre podcasts with titles containing garbled code, external URLs to Spotify and Google Play, and in one case, what appears to be XSS attack code embedded directly in the podcast title itself. Patrick Wardle, a macOS security expert and creator of Objective-See, confirmed he could replicate similar behavior: simply visiting a website can trigger the Podcasts app to open and load an attacker-chosen podcast without any user prompt or approval. Wardle said this creates "a very effective delivery mechanism" if a vulnerability exists in the Podcasts app, and the level of probing suggests adversaries are actively evaluating it as a potential target. The XSS-attempting podcast dates from around 2019. A recent review in the app asked "How does Apple allow this attempted XSS attack?" Asked for comment five times by 404 Media, Apple did not respond.

Read more of this story at Slashdot.

https://apple.slashdot.org/story/25/11/28/1531245/someone-is-trying-to-hack-peop


Australia's Streaming Quotas Become Law

00:00 - 28/11/2025
  View item as page
Australia's streaming quotas have become law. Legislation requiring the likes of Netflix, Disney+ and HBO Max to spend a portion of their local earnings on original Australian content has been passed in parliament, and now comes into effect. From a report: The quotas were announced earlier this month. This will see global streamers with more than one million Australian subscribers made to spend 10% of their total Australian expenditure -- or 7.5% of their revenues -- on local originals, whether they are dramas, children's shows, docs, or arts and educational programs. Failing to comply with the rules will see streamers fined up to ten times their annual revenues in Australia. This is more than what broadcasters are liable for if they breach their quota rules laws. Streamers will be given three years to get their production operations in line. Streamers have long opposed government-set quotas and content levies, arguing they already meaningfully invest in the production sectors of the countries in which they operate. Producers, in general, have welcomed the systems, but remain wary that they could push streaming services out of their countries.

Read more of this story at Slashdot.

https://entertainment.slashdot.org/story/25/11/28/1522252/australias-streaming-q


theregister.com/security

PostHog admits Shai-Hulud 2.0 was its biggest ever security bungle

16:22 - 28/11/2025
  View item as page
Automation flaw in CI/CD workflow let a bad pull request unleash worm into npm

PostHog says the Shai-Hulud 2.0 npm worm compromise was "the largest and most impactful security incident" it's ever experienced after attackers slipped malicious releases into its JavaScript SDKs and tried to auto-loot developer credentials....

https://go.theregister.com/feed/www.theregister.com/2025/11/28/posthog_shaihulud


Brit telco Brsk confirms breach as bidding begins for 230K+ customer records

15:52 - 28/11/2025
  View item as page
Crims claim to know which customers are marked 'vulnerable'

British telco Brsk is investigating claims that it was attacked by cybercriminals who made off with more than 230,000 files....

https://go.theregister.com/feed/www.theregister.com/2025/11/28/brsk_breach/


GrapheneOS bails on OVHcloud over France's privacy stance

15:44 - 28/11/2025
  View item as page
Project cites fears of state access as cloud sovereignty row deepens

French cloud outfit OVHcloud took another hit this week after GrapheneOS, a mobile operating system, said it was ditching the company's servers over concerns about France's approach to digital privacy....

https://go.theregister.com/feed/www.theregister.com/2025/11/28/grapheneos_ovhclo


TryHackMe races to add women to Christmas cyber challenge roster after backlash

13:32 - 28/11/2025
  View item as page
Training outfit scrambles to fix all-male lineup before December kickoff

Cybersecurity training provider TryHackMe is scrambling to recruit women infosec pros to help with its Christmas challenge following backlash concerning a lack of gender diversity....

https://go.theregister.com/feed/www.theregister.com/2025/11/28/tryhackme_diversi


OBR drags in cyber bigwig after Budget leak blunder

12:02 - 28/11/2025
  View item as page
Ex-NCSC chief Ciaran Martin asked to examine how forecast ended up online ahead of schedule

The Office for Budget Responsibility (OBR) has drafted in former National Cyber Security Centre (NCSC) chief Ciaran Martin to sniff out how its Budget day forecast wandered onto the open internet before the Chancellor had even reached the dispatch box....

https://go.theregister.com/feed/www.theregister.com/2025/11/28/obr_ciaran_martin


UK digital ID plan gets a price tag at last – £1.8B

11:19 - 28/11/2025
  View item as page
OBR says the scheme will cost £600M a year with no identified savings

The UK government has finally put a £1.8 billion price tag on its digital ID plans – days after the minister responsible refused to name a figure....

https://go.theregister.com/feed/www.theregister.com/2025/11/28/digital_id_cost/


Korean web giant Naver acquired crypto exchange Upbit, which reported a $30m heist a day later

00:41 - 28/11/2025
  View item as page
Talk about buyer’s remorse

South Korean web giant Naver has had an interesting week, after it acquired a cryptocurrency exchange that the next day revealed it had suffered a serious cyberattack....

https://go.theregister.com/feed/www.theregister.com/2025/11/28/naver_upbit_crypt


Zendesk users targeted as Scattered Lapsus$ Hunters spin up fake support sites

16:30 - 27/11/2025
  View item as page
ReliaQuest finds fresh crop of phishing domains and toxic tickets

Scattered Lapsus$ Hunters may be circling Zendesk users for its latest extortion campaign, with new phishing domains and weaponized helpdesk tickets uncovered by ReliaQuest....

https://go.theregister.com/feed/www.theregister.com/2025/11/27/scattered_lapsus_


OpenAI cuts off Mixpanel after analytics leak exposes API users

15:45 - 27/11/2025
  View item as page
ChatGPT maker places other vendors under review following breach

OpenAI says API users may be affected by a recent breach at its former data analytics provider, Mixpanel....

https://go.theregister.com/feed/www.theregister.com/2025/11/27/openai_mixpanel_a


FCC sounds alarm after emergency tones turned into potty-mouthed radio takeover

14:00 - 27/11/2025
  View item as page
Agency flags hijacks of insecure studio-to-transmitter gear after attackers pipe in fake alerts and vulgar audio

Malicious intruders have hijacked US radio gear to turn emergency broadcast tones into a profanity-laced alarm system....

https://go.theregister.com/feed/www.theregister.com/2025/11/27/fcc_radio_hijack/


CISO2CISO.com

Thinking About Becoming a Licensed Engineer? Start Here.

14:04 - 13/09/2025
  View item as page

NCEES explains why licensure matters for engineers and answers your top questions about the FE and PE exams. Source Views: 8

La entrada Thinking About Becoming a Licensed Engineer? Start Here. se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

https://ciso2ciso.com/thinking-about-becoming-a-licensed-engineer-start-here/


Celebrate Hispanic Heritage Month With SWE

14:04 - 13/09/2025
  View item as page

View our compilation of online stories and resources highlighting the Hispanic community and their contributions to STEM. Source Views: 6

La entrada Celebrate Hispanic Heritage Month With SWE se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

https://ciso2ciso.com/celebrate-hispanic-heritage-month-with-swe/


The Critical Role of Sboms (Software Bill of Materials) In Defending Medtech From Software Supply Chain Threats – Source: www.cyberdefensemagazine.com

10:04 - 13/09/2025
  View item as page

Source: www.cyberdefensemagazine.com – Author: News team Software supply chain attacks have emerged as a serious threat in the rapidly evolving field of cybersecurity, especially in medical devices. As these devices become more and more interconnected and dependent on complex software ecosystems, the potential for exploitation through the supply chain has grown exponentially. One powerful tool […]

La entrada The Critical Role of Sboms (Software Bill of Materials) In Defending Medtech From Software Supply Chain Threats – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

https://ciso2ciso.com/the-critical-role-of-sboms-software-bill-of-materials-in-d


Ransomware Tactics Are Shifting. Here’s How to Keep Up – Source: www.cyberdefensemagazine.com

10:04 - 13/09/2025
  View item as page

Source: www.cyberdefensemagazine.com – Author: News team It’s common knowledge in the cybersecurity industry that ransomware is on the rise, with median demands rising 20% year-over-year across virtually all industries. But it’s not only the ransom sums themselves that are escalating; threat actors are engaging in increasingly aggressive tactics and techniques to extort their victims. It’s […]

La entrada Ransomware Tactics Are Shifting. Here’s How to Keep Up – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

https://ciso2ciso.com/ransomware-tactics-are-shifting-heres-how-to-keep-up-sourc


French Advisory Sheds Light on Apple Spyware Activity – Source: www.darkreading.com

07:04 - 13/09/2025
  View item as page

Source: www.darkreading.com – Author: Rob Wright CERT-FR’s advisory follows last month’s disclosure of a zero-day flaw Apple said was used in “sophisticated” attacks against targeted individuals. Original Post URL: https://www.darkreading.com/vulnerabilities-threats/french-sheds-light-apple-spyware-activity Category & Tags: – Views: 5

La entrada French Advisory Sheds Light on Apple Spyware Activity – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

https://ciso2ciso.com/french-advisory-sheds-light-on-apple-spyware-activity-sour


Without Federal Help, Cyber Defense Is Up to the Rest of Us – Source: www.darkreading.com

07:04 - 13/09/2025
  View item as page

Source: www.darkreading.com – Author: Riaz Lakhani Together, we can foster a culture of collaboration and vigilance, ensuring that we are not just waiting for a hero to save us, but actively working to protect ourselves and our communities. Original Post URL: https://www.darkreading.com/cyberattacks-data-breaches/without-federal-help-cyber-defense-cisa Category & Tags: – Views: 9

La entrada Without Federal Help, Cyber Defense Is Up to the Rest of Us – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

https://ciso2ciso.com/without-federal-help-cyber-defense-is-up-to-the-rest-of-us


Safer Conversational AI for Cybersecurity: The BIX Approach – Source: securityboulevard.com

06:04 - 13/09/2025
  View item as page

Source: securityboulevard.com – Author: Gaurav Banga Here’s a scenario security teams increasingly face. A user—or an attacker pretending to be one—types something like: This is how many prompt injection attempts begin. The phrase looks harmless, but it’s a red flag: the user is telling the AI to forget its built‐in rules. What follows is often […]

La entrada Safer Conversational AI for Cybersecurity: The BIX Approach – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

https://ciso2ciso.com/safer-conversational-ai-for-cybersecurity-the-bix-approach


Operation Eastwood: Measuring the Real Impact on NoName057(16) – Source: securityboulevard.com

06:04 - 13/09/2025
  View item as page

Source: securityboulevard.com – Author: Sofia Naer Introduction On July 16, 2025, Europol revealed the details of Operation Eastwood, a coordinated international strike against one of the most active pro-Russian cybercrime groups, NoName057(016). The announcement promised a major disruption to the group’s activities. In this blog, we explore whether Operation Eastwood had any real impact on […]

La entrada Operation Eastwood: Measuring the Real Impact on NoName057(16) – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

https://ciso2ciso.com/operation-eastwood-measuring-the-real-impact-on-noname0571


CISA Lays Out Roadmap for CVE Program’s ‘Quality Era’ – Source: securityboulevard.com

06:04 - 13/09/2025
  View item as page

Source: securityboulevard.com – Author: Jeffrey Burt Five months after the future of the CVE program was thrown in doubt, CISA this week released a roadmap that calls for steps to take for its new “quality era,” which includes public sponsorship, expanded public-private partnership, and modernization. The post CISA Lays Out Roadmap for CVE Program’s ‘Quality […]

La entrada CISA Lays Out Roadmap for CVE Program’s ‘Quality Era’ – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

https://ciso2ciso.com/cisa-lays-out-roadmap-for-cve-programs-quality-era-source-


Randall Munroe’s XKCD ‘Dual Roomba’ – Source: securityboulevard.com

06:04 - 13/09/2025
  View item as page

Source: securityboulevard.com – Author: Marc Handelman via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Dual Roomba’ appeared first on Security Boulevard. Original Post URL: https://securityboulevard.com/2025/09/randall-munroes-xkcd-dual-roomba/?utm_source=rss&utm_medium=rss&utm_campaign=randall-munroes-xkcd-dual-roomba Category & Tags: Humor,Security Bloggers Network,Randall Munroe,Sarcasm,satire,XKCD – Humor,Security Bloggers Network,Randall Munroe,Sarcasm,satire,XKCD Views: 8

La entrada Randall Munroe’s XKCD ‘Dual Roomba’ – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

https://ciso2ciso.com/randall-munroes-xkcd-dual-roomba-source-securityboulevard-


Hackread.com

Report Names Teen in Scattered LAPSUS$ Hunters, Group Denies

17:19 - 27/11/2025
  View item as page
Scattered LAPSUS$ Hunters admin "Rey," allegedly a 15-year-old named Saif Khader from Jordan, has been named in a report linking him to the group. He denies the claim.

https://hackread.com/report-names-teen-scattered-lapsus-hunters-group/



Cronos Kicks Off $42K Global Hackathon Focused on AI-Powered On-Chain Payments

13:39 - 27/11/2025
  View item as page
Cronos launches x402 PayTech Hackathon with $42K prize pool to drive AI-powered on-chain payments using agent tech and Crypto.com tools.

https://hackread.com/cronos-hackathon-ai-powered-chain-payments/


OpenAI API User Data Exposed in Mixpanel Breach, ChatGPT Unaffected

12:19 - 27/11/2025
  View item as page
OpenAI confirmed a third-party data breach via Mixpanel, exposing limited API user metadata like names, emails and browser…

https://hackread.com/openai-api-mixpanel-data-breach-chatgpt/


Elena Lazar: Failures are Inevitable – Reliability is a Choice

22:53 - 26/11/2025
  View item as page
Reliability engineer on why resilience must be designed, not patched, and how decades of global experience taught her to turn outages into insights.

https://hackread.com/elena-lazar-inevitable-failures-reliability-choice/


AI Meeting Assistants Are Rising – But Is Your Data Safe? A Deep Look at TicNote AI

16:57 - 26/11/2025
  View item as page
AI meeting assistants have become essential tools for professionals who want fast, accurate, and automated transcription. Yet behind…

https://hackread.com/ai-meeting-assistants-data-security-ticnote-ai/


Microsoft Teams Flaw in Guest Chat Exposes Users to Malware Attacks

16:13 - 26/11/2025
  View item as page
New research from Ontinue exposes a major security flaw in Microsoft Teams B2B Guest Access. Learn how attackers bypass all Defender for Office 365 protections with a single invite.

https://hackread.com/microsoft-teams-guest-chat-flaw-malware/



Samourai Wallet Founders Jailed in $237M Crypto Laundering Case

13:12 - 26/11/2025
  View item as page
Samourai Wallet founders Keonne Rodriguez and William Hill were sentenced to 4 and 5 years for laundering $237M via their crypto mixer.

https://hackread.com/samourai-wallet-founders-jailed-crypto-laundering/


Fake Battlefield 6 Downloads Are Spreading Malware, Stealing Player Data

11:14 - 26/11/2025
  View item as page
Bitdefender Labs found fake Battlefield 6 pirated copies and trainers spreading aggressive malware, C2 agents, and infostealers, designed to steal player data and crypto-wallets.

https://hackread.com/fake-battlefield-6-downloads-malware-data/


Vuldb

CVE-2025-6666 | motogadget mo.lock Ignition Lock up to 20251125 NFC hard-coded key (EUVD-2025-199909)

10:01 - 29/11/2025
  View item as page
A vulnerability labeled as problematic has been found in motogadget mo.lock Ignition Lock up to 20251125. Affected by this vulnerability is an unknown functionality of the component NFC Handler. Executing manipulation can lead to use of hard-coded cryptographic key . The identification of this vulnerability is CVE-2025-6666. The physical device can be targeted for the attack. Furthermore, there is an exploit available. The vendor was contacted early about this disclosure but did not respond in any way.

https://vuldb.com/?id.333785


CVE-2025-66036 | Anjaliavv51 Retro up to 2.4.6 cross site scripting (GHSA-gvv6-p6h6-2vj2 / EUVD-2025-199889)

09:22 - 29/11/2025
  View item as page
A vulnerability identified as problematic has been detected in Anjaliavv51 Retro up to 2.4.6. Affected is an unknown function. Performing manipulation results in cross site scripting. This vulnerability was named CVE-2025-66036. The attack may be initiated remotely. There is no available exploit. You should upgrade the affected component.

https://vuldb.com/?id.333784


CVE-2025-65540 | xmall 1.1 cross site scripting (Issue 101 / EUVD-2025-199901)

09:22 - 29/11/2025
  View item as page
A vulnerability categorized as problematic has been discovered in xmall 1.1. This impacts an unknown function. Such manipulation leads to cross site scripting. This vulnerability is uniquely identified as CVE-2025-65540. The attack can be launched remotely. No exploit exists.

https://vuldb.com/?id.333783


CVE-2025-65892 | krpano up to 1.23.1 URL passQueryParameters xml cross site scripting (EUVD-2025-199902)

09:22 - 29/11/2025
  View item as page
A vulnerability was found in krpano up to 1.23.1. It has been rated as problematic. This affects the function passQueryParameters of the component URL Handler. This manipulation of the argument xml causes cross site scripting. This vulnerability is handled as CVE-2025-65892. The attack can be initiated remotely. There is not any exploit available. Upgrading the affected component is advised.

https://vuldb.com/?id.333782


CVE-2025-66201 | danny-avila LibreChat up to 0.8.1-rc1 OpenAPI server-side request forgery (GHSA-7m2q-fjwr-5x8v / EUVD-2025-199888)

09:22 - 29/11/2025
  View item as page
A vulnerability was found in danny-avila LibreChat up to 0.8.1-rc1. It has been declared as critical. The impacted element is an unknown function of the component OpenAPI Handler. The manipulation results in server-side request forgery. This vulnerability is known as CVE-2025-66201. It is possible to launch the attack remotely. No exploit is available. It is recommended to upgrade the affected component.

https://vuldb.com/?id.333781


CVE-2025-65112 | ricardoboss PubNet up to 1.1.2 /api/storage/upload author-id authorization (GHSA-pg82-fqrg-q6j5 / EUVD-2025-199884)

09:21 - 29/11/2025
  View item as page
A vulnerability was found in ricardoboss PubNet up to 1.1.2. It has been classified as critical. The affected element is an unknown function of the file /api/storage/upload. The manipulation of the argument author-id leads to missing authorization. This vulnerability is traded as CVE-2025-65112. It is possible to initiate the attack remotely. There is no exploit available. Upgrading the affected component is recommended.

https://vuldb.com/?id.333780


CVE-2025-66219 | shama willitmerge up to 0.2.1 User Control command injection (GHSA-j9wj-m24m-7jj6 / EUVD-2025-199887)

09:21 - 29/11/2025
  View item as page
A vulnerability was found in shama willitmerge up to 0.2.1 and classified as critical. Impacted is an unknown function of the component User Control. Executing manipulation can lead to command injection. This vulnerability appears as CVE-2025-66219. The attack may be performed from remote. There is no available exploit.

https://vuldb.com/?id.333779


CVE-2025-66216 | jvde-github AIS-catcher up to 0.63 AIS::Message buffer size (GHSA-v53x-f5hh-g2g6 / EUVD-2025-199899)

09:21 - 29/11/2025
  View item as page
A vulnerability has been found in jvde-github AIS-catcher up to 0.63 and classified as critical. This issue affects the function AIS::Message. Performing manipulation results in incorrect calculation of buffer size. This vulnerability is reported as CVE-2025-66216. The attack is possible to be carried out remotely. No exploit exists. The affected component should be upgraded.

https://vuldb.com/?id.333778


CVE-2025-53897 | kiteworks MFT up to 9.0.x cross-site request forgery (GHSA-cxwc-7899-3h4m / EUVD-2025-199897)

09:21 - 29/11/2025
  View item as page
A vulnerability, which was classified as problematic, was found in kiteworks MFT up to 9.0.x. This vulnerability affects unknown code. Such manipulation leads to cross-site request forgery. This vulnerability is documented as CVE-2025-53897. The attack can be executed remotely. There is not any exploit available. You should upgrade the affected component.

https://vuldb.com/?id.333777


CVE-2025-53896 | Kiteworks MFT up to 9.0.x session expiration (GHSA-23h2-3jj8-58hm / EUVD-2025-199898)

09:21 - 29/11/2025
  View item as page
A vulnerability, which was classified as problematic, has been found in Kiteworks MFT up to 9.0.x. This affects an unknown part. This manipulation causes session expiration. This vulnerability is registered as CVE-2025-53896. The attack needs to be launched locally. No exploit is available. It is advisable to upgrade the affected component.

https://vuldb.com/?id.333776


Debian.org/security











Microsoft Security

CVE-2025-64660 GitHub Copilot and Visual Studio Code Remote Code Execution Vulnerability

08:00 - 25/11/2025
  View item as page
The following revisions have been made: 1) In the Security Updates table, corrected the impact entries to Remote Code Execution. 2) The CVSS scores have been updated. These are informational changes only. Customers who have successfully installed the update do not need to take any further action.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64660







CVE-2025-64656 Application Gateway Elevation of Privilege Vulnerability

08:00 - 20/11/2025
  View item as page
Out-of-bounds read in Application Gateway allows an unauthorized attacker to elevate privileges over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64656


CVE-2025-64655 Dynamics OmniChannel SDK Storage Containers Elevation of Privilege Vulnerability

08:00 - 20/11/2025
  View item as page
Improper authorization in Dynamics OmniChannel SDK Storage Containers allows an unauthorized attacker to elevate privileges over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64655




advisories.ncsc.nl

NCSC-2025-0378 [1.00] [M/H] Kwetsbaarheden verholpen in Mattermost

09:53 - 28/11/2025
  View item as page
Mattermost heeft kwetsbaarheden verholpen in versies 11.0.x (tot en met 11.0.3), 10.12.x (tot en met 10.12.1), 10.11.x (tot en met 10.11.4) en 10.5.x (tot en met 10.5.12). De kwetsbaarheden stellen een geauthenticeerde aanvaller in staat om een account over te nemen via een zorgvuldig vervaardigd e-mailadres tijdens het authenticatieproces. Dit vereist specifieke instellingen die geconfigureerd moeten zijn, wat gebruikersaccounts bloot kan stellen aan ongeautoriseerde toegang. Daarnaast kan een geauthenticeerde aanvaller met teamcreatieprivileges de OAuth state token validatie misbruiken om een gebruikersaccount over te nemen door authenticatiegegevens te manipuleren, vooral als e-mailverificatie is uitgeschakeld. Voor deze laatste kwetsbaarheid moet de kwaadwillende beschikken over twee accounts, waarvan er een nog niet eerder ingelogd is geweest. Misbruik is hiermee ingewikkeld te realiseren.

https://advisories.ncsc.nl/advisory?id=NCSC-2025-0378


NCSC-2025-0377 [1.00] [M/H] Kwetsbaarheden verholpen in GitLab

13:35 - 27/11/2025
  View item as page
GitLab heeft kwetsbaarheden verholpen in zijn Community Edition (CE) en Enterprise Edition (EE) versies. De kwetsbaarheden omvatten onder andere de mogelijkheid voor niet-geauthenticeerde gebruikers om Denial of Service (DoS) condities te veroorzaken door het indienen van kwaadaardige JSON-verzoeken. Daarnaast konden niet-geauthenticeerde gebruikers zich aansluiten bij willekeurige organisaties door verzoekheaders te wijzigen, wat leidde tot ongeautoriseerde toegang tot organisatorische middelen. Geauthenticeerde gebruikers konden ook ongeautoriseerde toegang krijgen tot gevoelige tokens uit bepaalde logs, wat verdere exploitatie mogelijk maakte. Bovendien konden geauthenticeerde gebruikers met specifieke rechten een Denial of Service-conditie veroorzaken via HTTP-responsverwerking. Tot slot was er een risico op ongeautoriseerde toegang tot beveiligingsrapportinformatie in bepaalde configuraties. Deze kwetsbaarheden vereisten onmiddellijke aandacht van de leverancier om de integriteit en beschikbaarheid van de getroffen systemen te waarborgen.

https://advisories.ncsc.nl/advisory?id=NCSC-2025-0377


NCSC-2025-0376 [1.00] [M/H] Kwetsbaarheden verholpen in SonicWall Email Security appliances

16:06 - 21/11/2025
  View item as page
SonicWall heeft kwetsbaarheden verholpen in SonicWall Email Security appliances. De kwetsbaarheden bevinden zich in de manier waarop SonicWall Email Security appliances omgaan met onbetrouwbare root filesystem images en directory-traversal. Een aanvaller kan deze kwetsbaarheden misbruiken om ongecontroleerde code uit te voeren of ongeautoriseerde toegang te krijgen tot bestanden buiten de aangewezen paden. Dit kan leiden tot ernstige beveiligingsrisico's.

https://advisories.ncsc.nl/advisory?id=NCSC-2025-0376


NCSC-2025-0375 [1.00] [M/H] Kwetsbaarheid verholpen in Progress MOVEit Transfer

16:06 - 21/11/2025
  View item as page
Progress heeft een kwetsbaarheid verholpen in MOVEit Transfer (Specifiek voor versies vóór 2024.1.8 en van 2025.0.0 tot vóór 2025.0.4). De kwetsbaarheid betreft een server-side request forgery (SSRF). Deze kwetsbaarheid stelt aanvallers in staat om ongeautoriseerde verzoeken vanaf de server te verzenden, wat kan leiden tot ongeautoriseerde toegang tot interne bronnen. Dit kan ernstige gevolgen hebben voor de beveiliging van de interne infrastructuur, of mogelijk toegang tot gevoelige gegevens binnen de context van het slachtoffer.

https://advisories.ncsc.nl/advisory?id=NCSC-2025-0375


NCSC-2025-0334 [1.01] [M/H] Kwetsbaarheden verholpen in Oracle Fusion Middleware

16:03 - 21/11/2025
  View item as page
Oracle heeft kwetsbaarheden verholpen in Oracle Fusion Middleware componenten. De kwetsbaarheden stellen ongeauthenticeerde aanvallers in staat om toegang te krijgen tot kritieke gegevens via HTTP, wat kan leiden tot een gedeeltelijke Denial-of-Service. De ernst van deze kwetsbaarheden wordt onderstreept door CVSS-scores van 7.5, wat wijst op aanzienlijke impact op de beschikbaarheid. Daarnaast zijn er kwetsbaarheden die kunnen leiden tot ongeautoriseerde toegang tot specifieke gegevens, met een CVSS-score van 5.3, wat duidt op een gematigd niveau van vertrouwelijkheidsimpact. Het NCSC ontvangt berichten dat er media-aandacht is voor de kwetsbaarheid met kenmerk CVE-2025-61757. Betrouwbare partners nemen scanverkeer waar, waarin actief gezocht wordt naar mogelijke uitvoer van willekeurige code. De kwetsbaarheid bevindt zich in **Oracle Identity Manager** en betreft een issue waarbij authenticatie kan worden omzeild omdat bestanden eindigend op de extensie `.wadl` vrijgesteld zijn van authenticatie. Zomaar `.wadl` toevoegen als extensie bij een willekeurige URL zal geen effect hebben, omdat dan een niet-bestaand bestand wordt benaderd. Echter, onderzoekers hebben ontdekt dat het toevoegen van een `;` aan de extensie in theorie code-executie mogelijk kan maken. In logging kan worden gezocht naar `;.wadl` als extensie. Dit duidt in elk geval op scanverkeer. Nadere analyse van de logging moet uitwijzen of uitvoer van code heeft plaatsgevonden. Op dit moment is (nog) geen indicatie ontvangen dat uitvoer van willekeurige code daadwerkelijk ergens heeft plaatsgevonden. Het NCSC kan daarom (nog) geen IoC's delen om de eigen logging te analyseren. Het NCSC verwacht vanwege de media-aandacht en de publicatie van de onderzoekers echter wel op korte termijn een toename van scanverkeer en mogelijk werkende Proof-of-Concept-code (PoC) en adviseert de updates zo spoedig mogelijk in te zetten, indien dit (nog) niet is gebeurd.

https://advisories.ncsc.nl/advisory?id=NCSC-2025-0334


NCSC-2025-0374 [1.00] [M/H] Kwetsbaarheden verholpen in Arista EOS

11:48 - 20/11/2025
  View item as page
Arista heeft kwetsbaarheden verholpen in de Arista EOS-platform. De kwetsbaarheden zijn gerelateerd aan de verwerking van verkeerd gevormde berichten, wat kan leiden tot systeemcrashes en Denial-of-Service-omstandigheden. Aanvallers met hoge privileges kunnen deze kwetsbaarheden misbruiken, wat leidt tot ernstige operationele verstoringen. Daarnaast kan het verzenden van willekeurige bytes naar het CVX-systeem de ControllerOob-agent laten herstarten, wat ook kan resulteren in een Denial-of-Service. Bovendien heeft de Arista EOS-platform een kwetsbaarheid die systemen met IPsec beïnvloedt, waardoor de dataplane stopt met het verwerken van al het IPsec-verkeer. Dit kan een systeemreset vereisen, zonder garantie op herstel van de verkeersverwerking. Voor misbruik heeft de kwaadwillende geen authenticatie nodig. Tot slot kan een geauthenticeerde Redis-sessie volledige roottoegang krijgen tot alle servers binnen de CVX-cluster, wat een ernstige bedreiging vormt voor de beveiliging.

https://advisories.ncsc.nl/advisory?id=NCSC-2025-0374


NCSC-2025-0373 [1.00] [M/H] Kwetsbaarheden verholpen in Fortinet FortiOS

08:35 - 19/11/2025
  View item as page
Fortinet heeft kwetsbaarheden verholpen in FortiOS (meerdere versies). De kwetsbaarheden omvatten een stack-gebaseerde buffer overflow die aanvallers in staat stelt om ongeautoriseerde code of commando's uit te voeren door speciaal vervaardigde pakketten te verzenden. Een specifieke kwetsbaarheid in de FortiOS CAPWAP-daemon stelt een externe, niet-geauthenticeerde aanvaller op een aangrenzend netwerk in staat om deze pakketten te verzenden, mits de aanvaller controle heeft over een geautoriseerde FortiAP en zich op hetzelfde lokale IP-subnet bevindt. Daarnaast kunnen geauthenticeerde beheerders de trusted host policy omzeilen door op maat gemaakte CLI-commando's uit te voeren, wat kan leiden tot ongeautoriseerde toegang of acties binnen de getroffen omgevingen.

https://advisories.ncsc.nl/advisory?id=NCSC-2025-0373


NCSC-2025-0372 [1.00] [M/H] Kwetsbaarheid verholpen in Fortinet FortiWeb

08:34 - 19/11/2025
  View item as page
Fortinet heeft een kwetsbaarheid verholpen in FortiWeb. De kwetsbaarheid bevindt zich in de wijze waarop Fortinet FortiWeb omgaat met HTTP-verzoeken en CLI-commando's. Geauthenticeerde aanvallers kunnen deze kwetsbaarheid misbruiken om ongeautoriseerde code uit te voeren via zorgvuldig samengestelde HTTP-verzoeken of CLI-commando's. Fortinet heeft bevestigd dat deze kwetsbaarheid actief wordt misbruikt. Er is (nog) geen publieke Proof-of-Concept-code (PoC) of exploit beschikbaar. Het NCSC verwacht dat PoC of Exploits op korte termijn beschikbaar komen, waarmee het risico op misbruik toeneemt.

https://advisories.ncsc.nl/advisory?id=NCSC-2025-0372


NCSC-2025-0371 [1.00] [M/H] Kwetsbaarheden verholpen in Google Chrome

09:01 - 18/11/2025
  View item as page
Google heeft kwetsbaarheden verholpen in Chrome (Specifiek voor versies vóór 142.0.7444.175). De kwetsbaarheden bevinden zich in de V8-engine van Google Chrome en stelt externe aanvallers in staat om heap-corruptie te exploiteren via speciaal vervaardigde HTML-pagina's, wat kan leiden tot ongeautoriseerde acties, zoals toegang tot gevoelige gegevens of uitvoer van willekeurige code. Google meldt informatie te hebben dat de kwetsbaarheid met kenmerk CVE-2025-13223 actief is misbruikt. Voor succesvol misbruik moet de kwaadwillende het slachtoffer misleiden een malafide pagina te bezoeken.

https://advisories.ncsc.nl/advisory?id=NCSC-2025-0371


NCSC-2025-0370 [1.00] [M/H] Kwetsbaarheden verholpen in Cisco Unified Contact Center Express

07:04 - 18/11/2025
  View item as page
Cisco heeft kwetsbaarheden verholpen in Cisco Unified Contact Center Express (CCX). De kwetsbaarheden bevinden zich in de Java RMI-proces en de Contact Center Express Editor van Cisco Unified CCX. Ongeauthenticeerde aanvallers kunnen deze kwetsbaarheden misbruiken om bestanden te uploaden, commando's uit te voeren met rootrechten en administratieve machtigingen te verkrijgen voor het maken en uitvoeren van scripts. Dit stelt aanvallers in staat om de authenticatiemechanismen te omzeilen en hun privileges te verhogen, wat een ernstige bedreiging vormt voor de integriteit en beveiliging van de getroffen systemen.

https://advisories.ncsc.nl/advisory?id=NCSC-2025-0370


NCSC Nieuws

Cybersecuritybeeld 2025: dreigingen divers en onvoorspelbaar, digitale basishygiëne op orde blijft cruciaal

12:00 - 26/11/2025
  View item as page
De Nationaal Coördinator Terrorismebestrijding en Veiligheid (NCTV) heeft het Cybersecuritybeeld Nederland 2025 (CSBN) gepubliceerd. Het CSBN schetst een beeld van een digitaal dreigingslandschap dat steeds complexer en onvoorspelbaarder wordt. Cyberaanvallen worden geavanceerder terwijl digitale systemen onderling sterk van elkaar afhankelijk zijn. Deze ontwikkeling vraagt om een brede, proactieve aanpak om digitale weerbaarheid te vergroten. In dit bericht belichten we de belangrijkste aandachtspunten uit het CSBN voor Nederlandse organisaties en bedrijven.

https://www.ncsc.nl/actueel/nieuws/2025/11/26/cybersecuritybeeld-2025-dreigingen


Terugkijken: Webinar 'De Cyberbeveiligingswet komt eraan'

10:19 - 21/10/2025
  View item as page
Op dinsdag 18 november organiseerden het NCSC, de NCTV en RDI een webinar over de aankomende Cyberbeveiligingswet voor Cbw-organisaties.

https://www.ncsc.nl/actueel/nieuws/2025/10/21/terugkijken-webinar-de-cyberbeveil


28 publieke en private partijen tekenen convenant samenwerking Cyclotron

14:08 - 30/09/2025
  View item as page
Vandaag heeft het NCSC samen met 27 partijen het convenant samenwerking Cyclotron ondertekend op de ONE Conference. De ondertekenaars zijn een groot aantal private partijen en daarnaast ook de AIVD, MIVD, Politie en het NCTV. De ondertekening is een volgende belangrijke stap in de samenwerking met als doel om het beeld op cyberdreigingen en incidenten te versterken door het structureel delen van informatie, het gezamenlijk analyseren van informatie en het verstrekken van informatie uit die analyses aan belanghebbende organisaties. Hiermee wordt de digitale weerbaarheid van Nederland verhoogd.

https://www.ncsc.nl/actueel/nieuws/2025/09/30/28-publieke-en-private-partijen-te


Subsidie voor mkb-bedrijven nog 1 maand beschikbaar

12:29 - 26/09/2025
  View item as page
Voor kleine bedrijven die een financiële drempel ervaren bij het (laten) uitvoeren van cybermaatregelen, is tijdelijk een subsidie beschikbaar: Mijn Cyberweerbare Zaak. Deze subsidie dekt 50% van de kosten van diverse cybermaatregelen, tot een maximum van € 1.250. Kleinere bedrijven met 1 tot en met 50 medewerkers voor wie cybersecurity vaak niet een kerntaak is, kunnen nu met deze subsidie van het ministerie van Economische Zaken de nodige stappen zetten om hun bedrijf beter te beschermen tegen de toenemende cyberdreigingen en eisen die andere bedrijven in de bedrijfsketen stellen.

https://www.ncsc.nl/actueel/nieuws/2025/09/26/subsidie-voor-mkb-bedrijven-nog-1-


Cyberweerbaarheidsnetwerk bouwplan voor stevigere basis van cyberweerbaarheid in het Koninkrijk der Nederlanden

13:25 - 10/09/2025
  View item as page
De cyberweerbaarheid van Nederland is niet langer op te vangen met losse initiatieven. Deze tijd vraagt om één samenhangend netwerk: het Cyberweerbaarheidsnetwerk, kortweg CWN. In het CWN komen publieke en private organisaties samen. Daar brengen ze hun kennis, expertise en ervaring in om gezamenlijk aan opgaven te werken die bijdragen aan de cyberweerbaarheid van alle organisaties in het Koninkrijk der Nederlanden, en daarmee ook de overzeese gebieden. Want alleen samen worden we weerbaarder.

https://www.ncsc.nl/actueel/nieuws/2025/09/10/cyberweerbaarheidsnetwerk-bouwplan


Nieuwe malwarecampagne ontdekt via ManualFinder

10:26 - 29/08/2025
  View item as page
Recentelijk kwam een wereldwijde malwareinfectie van Windows computers aan het licht dankzij software die gebruikers zelf installeerden. Het NCSC adviseert daarom toegang tot de betreffende C2-domeinen te blokkeren, te controleren op de aanwezigheid van de applicaties “Manualfinder”, “PDF-editor” en varianten daarvan, te controleren op de aanwezigheid van JavaScript bestanden met een op een GUID lijkende naam in de directory /AppData/Local/TEMP en om eindgebruikers er met klem op te wijzen om geen externe, onvertrouwde tools te installeren.

https://www.ncsc.nl/actueel/nieuws/2025/08/29/nieuwe-malwarecampagne-ontdekt-via


Nieuwe kwetsbaarheden in Citrix Netscaler ontdekt

18:25 - 26/08/2025
  View item as page
Er zijn nieuwe kwetsbaarheden in Citrix Netscaler ontdekt. Met een eerder gepubliceerd detectiescript van het NCSC kan compromittatie worden gedetecteerd.

https://www.ncsc.nl/actueel/nieuws/2025/08/26/nieuwe-kwetsbaarheden-in-citrix-ne


Eefje Zents Chief Relations Officer/directeur Samenwerking Digitale weerbaarheid bij NCSC

09:30 - 15/08/2025
  View item as page
Eefje Zents wordt met ingang van 15 september 2025 Chief Relations Officer/directeur Samenwerking Digitale weerbaarheid bij het Nationaal Cyber Security Centrum (NCSC) van het ministerie van Justitie en Veiligheid.

https://www.ncsc.nl/actueel/nieuws/2025/08/15/eefje-zents-chief-relations-office


Casus: Citrix kwetsbaarheid (Update 13-08-2025)

11:13 - 13/08/2025
  View item as page
Via deze pagina biedt het NCSC een update op de eerdere berichtgeving. We bieden hierin de publicatie van twee nieuwe checkscripts die voorzien zijn van nieuwe indicators of compromise, aanvullende context waarbij we belichten dat het hier om een geraffineerde aanval gaat waarbij meerdere Nederlandse organisaties succesvol aangevallen zijn. Daarnaast deelt het NCSC aanvullende adviezen in het licht van deze digitale aanval. Hiermee willen we organisaties aansporen en ondersteunen om hun digitale weerbaarheid verder te verhogen en zich op de juiste elementen van digitale veiligheid te richten.

https://www.ncsc.nl/actueel/nieuws/2025/07/22/casus-citrix-kwetsbaarheid


Casus: Microsoft SharePoint Server kwetsbaarheden

16:27 - 23/07/2025
  View item as page
Op deze pagina gaat het NCSC verder in op de recent ontdekte kwetsbaarheden in Microsoft SharePoint Server en bieden we handelingsperspectief in het omgaan met deze kwetsbaarheden.

https://www.ncsc.nl/actueel/nieuws/2025/07/23/casus-microsoft-sharepoint


wid.cert-bund.de

[UPDATE] [mittel] Mattermost Server: Mehrere Schwachstellen

12:42 - 28/11/2025
  View item as page
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Mattermost Server ausnutzen, um Informationen offenzulegen und einen nicht näher spezifizierten Angriff durchzuführen.

https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2463


[UPDATE] [hoch] Mattermost Server: Mehrere Schwachstellen ermöglichen die Umgehung von Sicherheitsmaßnahmen

12:42 - 28/11/2025
  View item as page
Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen im Mattermost Server ausnutzen, um Sicherheitsmaßnahmen zu umgehen und so eine Kontoübernahme durchzuführen.

https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2434


[UPDATE] [kritisch] Redis: Mehrere Schwachstellen

12:27 - 28/11/2025
  View item as page
Ein Angreifer kann mehrere Schwachstellen in Redis ausnutzen, um beliebigen Programmcode auszuführen, um Daten zu manipulieren, um einen Denial of Service Angriff durchzuführen, und um Informationen offenzulegen.

https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2196


[UPDATE] [hoch] Xwayland und X.Org X11: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff

12:27 - 28/11/2025
  View item as page
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Xwayland und X.Org X11 ausnutzen, um einen nicht näher spezifizierten Angriff durchzuführen.

https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2436


[UPDATE] [hoch] Apache Tomcat: Mehrere Schwachstellen

12:27 - 28/11/2025
  View item as page
Ein entfernter, authentisierter oder anonymer Angreifer kann mehrere Schwachstellen in Apache Tomcat ausnutzen, um beliebigen Programmcode auszuführen, Sicherheitsmaßnahmen zu umgehen, Daten zu manipulieren und einen Denial-of-Service-Zustand zu verursachen.

https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2420


[UPDATE] [mittel] Mattermost Server und Mobile: Mehrere Schwachstellen

12:22 - 28/11/2025
  View item as page
Ein Angreifer kann mehrere Schwachstellen in Mattermost Server und Mobile ausnutzen, um Informationen offenzulegen oder einen Denial of Service zu verursachen.

https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2315


[UPDATE] [hoch] Redis: Schwachstelle ermöglicht Codeausführung

12:22 - 28/11/2025
  View item as page
Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in Redis ausnutzen, um beliebigen Programmcode auszuführen.

https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2469


[UPDATE] [mittel] Dovecot IMAP Server: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen und Offenlegung von Informationen

12:22 - 28/11/2025
  View item as page
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Dovecot ausnutzen, um Sicherheitsvorkehrungen zu umgehen und vertrauliche Informationen offenzulegen.

https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2439


[UPDATE] [mittel] libssh: Mehrere Schwachstellen

11:12 - 28/11/2025
  View item as page
Ein Angreifer kann mehrere Schwachstellen in libssh ausnutzen, um einen Denial of Service Angriff durchzuführen, um Sicherheitsvorkehrungen zu umgehen, und potentiell weitere nicht spezifizierte Auswirkungen zu verursachen.

https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1423


[UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen

11:12 - 28/11/2025
  View item as page
Ein Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuführen und weitere nicht näher spezifizierte Auswirkungen zu erzielen.

https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1201


cert.ssi.gouv.fr

Multiples vulnérabilités dans Liferay (03 novembre 2025)

00:00 - 03/11/2025
  View item as page
De multiples vulnérabilités ont été découvertes dans Liferay. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une injection de code indirecte à distance (XSS) et un problème de sécurité non spécifié par l'éditeur.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0954/


Multiples vulnérabilités dans les produits IBM (14 novembre 2025)

00:00 - 14/11/2025
  View item as page
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-1013/


Vulnérabilité dans Fortinet FortiWeb (14 novembre 2025)

00:00 - 14/11/2025
  View item as page
Une vulnérabilité a été découverte dans Fortinet FortiWeb. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité. Fortinet indique que la vulnérabilité CVE-2025-64446 est activement exploitée.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-1014/


Multiples vulnérabilités dans les produits NetApp (17 novembre 2025)

00:00 - 17/11/2025
  View item as page
De multiples vulnérabilités ont été découvertes dans les produits NetApp. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-1015/


Multiples vulnérabilités dans Mozilla Thunderbird (17 novembre 2025)

00:00 - 17/11/2025
  View item as page
De multiples vulnérabilités ont été découvertes dans Mozilla Thunderbird. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un contournement de la politique de sécurité et un problème de sécurité non spécifié par l'éditeur.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-1016/


Multiples vulnérabilités dans Mattermost Server (17 novembre 2025)

00:00 - 17/11/2025
  View item as page
De multiples vulnérabilités ont été découvertes dans Mattermost Server. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-1017/


Multiples vulnérabilités dans Google Chrome (18 novembre 2025)

00:00 - 18/11/2025
  View item as page
De multiples vulnérabilités ont été découvertes dans Google Chrome. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur. Google indique que la vulnérabilité CVE-2025-13223 est activement exploitée.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-1018/


Multiples vulnérabilités dans Mattermost Server (18 novembre 2025)

00:00 - 18/11/2025
  View item as page
De multiples vulnérabilités ont été découvertes dans Mattermost Server. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-1019/


Multiples vulnérabilités dans les produits SolarWinds (19 novembre 2025)

00:00 - 19/11/2025
  View item as page
De multiples vulnérabilités ont été découvertes dans les produits SolarWinds. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une injection de code indirecte à distance (XSS) et un contournement de la politique de sécurité.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-1020/


Multiples vulnérabilités dans les produits HPE Aruba Networking (19 novembre 2025)

00:00 - 19/11/2025
  View item as page
De multiples vulnérabilités ont été découvertes dans les produits HPE Aruba Networking. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-1021/


theHackerNews

Legacy Python Bootstrap Scripts Create Domain-Takeover Risk in Multiple PyPI Packages

21:57 - 28/11/2025
  View item as page
Cybersecurity researchers have discovered vulnerable code in legacy Python packages that could potentially pave the way for a supply chain compromise on the Python Package Index (PyPI) via a domain takeover attack. Software supply chain security company ReversingLabs said it found the "vulnerability" in bootstrap files provided by a build and deployment automation tool named "zc.buildout." "The

https://thehackernews.com/2025/11/legacy-python-bootstrap-scripts-create.html


North Korean Hackers Deploy 197 npm Packages to Spread Updated OtterCookie Malware

21:48 - 28/11/2025
  View item as page
The North Korean threat actors behind the Contagious Interview campaign have continued to flood the npm registry with 197 more malicious packages since last month. According to Socket, these packages have been downloaded over 31,000 times, and are designed to deliver a variant of OtterCookie that brings together the features of BeaverTail and prior versions of OtterCookie. Some of the

https://thehackernews.com/2025/11/north-korean-hackers-deploy-197-npm.html


Why Organizations Are Turning to RPAM

16:39 - 28/11/2025
  View item as page
As IT environments become increasingly distributed and organizations adopt hybrid and remote work at scale, traditional perimeter-based security models and on-premises Privileged Access Management (PAM) solutions no longer suffice. IT administrators, contractors and third-party vendors now require secure access to critical systems from any location and on any device, without compromising

https://thehackernews.com/2025/11/why-organizations-are-turning-to-rpam.html


MS Teams Guest Access Can Remove Defender Protection When Users Join External Tenants

14:03 - 28/11/2025
  View item as page
Cybersecurity researchers have shed light on a cross-tenant blind spot that allows attackers to bypass Microsoft Defender for Office 365 protections via the guest access feature in Teams. "When users operate as guests in another tenant, their protections are determined entirely by that hosting environment, not by their home organization," Ontinue security researcher Rhys Downing said in a report

https://thehackernews.com/2025/11/ms-teams-guest-access-can-remove.html


Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan

23:43 - 27/11/2025
  View item as page
The threat actor known as Bloody Wolf has been attributed to a cyber attack campaign that has targeted Kyrgyzstan since at least June 2025 with the goal of delivering NetSupport RAT. As of October 2025, the activity has expanded to also single out Uzbekistan, Group-IB researchers Amirbek Kurbanov and Volen Kayo said in a report published in collaboration with Ukuk, a state enterprise under the

https://thehackernews.com/2025/11/bloody-wolf-expands-java-based.html


Microsoft to Block Unauthorized Scripts in Entra ID Logins with 2026 CSP Update

21:07 - 27/11/2025
  View item as page
Microsoft has announced plans to improve the security of Entra ID authentication by blocking unauthorized script injection attacks starting a year from now. The update to its Content Security Policy (CSP) aims to enhance the Entra ID sign-in experience at "login.microsoftonline[.]com" by only letting scripts from trusted Microsoft domains run. "This update strengthens security and adds an extra

https://thehackernews.com/2025/11/microsoft-to-block-unauthorized-scripts.html


Webinar: Learn to Spot Risks and Patch Safely with Community-Maintained Tools

20:29 - 27/11/2025
  View item as page
If you're using community tools like Chocolatey or Winget to keep systems updated, you're not alone. These platforms are fast, flexible, and easy to work with—making them favorites for IT teams. But there’s a catch... The very tools that make your job easier might also be the reason your systems are at risk. These tools are run by the community. That means anyone can add or update packages. Some

https://thehackernews.com/2025/11/webinar-learn-to-spot-risks-and-patch.html


ThreatsDay Bulletin: AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories

15:33 - 27/11/2025
  View item as page
Hackers have been busy again this week. From fake voice calls and AI-powered malware to huge money-laundering busts and new scams, there’s a lot happening in the cyber world. Criminals are getting creative — using smart tricks to steal data, sound real, and hide in plain sight. But they’re not the only ones moving fast. Governments and security teams are fighting back, shutting down fake

https://thehackernews.com/2025/11/threatsday-bulletin-ai-malware-voice.html


Gainsight Expands Impacted Customer List Following Salesforce Security Alert

12:33 - 27/11/2025
  View item as page
Gainsight has disclosed that the recent suspicious activity targeting its applications has affected more customers than previously thought. The company said Salesforce initially provided a list of 3 impacted customers and that it has "expanded to a larger list" as of November 21, 2025. It did not reveal the exact number of customers who were impacted, but its CEO, Chuck Ganapathi, said "we

https://thehackernews.com/2025/11/gainsight-expands-impacted-customer.html


Shai-Hulud v2 Spreads From npm to Maven, as Campaign Exposes Thousands of Secrets

23:38 - 26/11/2025
  View item as page
The second wave of the Shai-Hulud supply chain attack has spilled over to the Maven ecosystem after compromising more than 830 packages in the npm registry. The Socket Research Team said it identified a Maven Central package named org.mvnpm:posthog-node:4.18.1 that embeds the same two components associated with Sha1-Hulud: the "setup_bun.js" loader and the main payload "bun_environment.js." The

https://thehackernews.com/2025/11/shai-hulud-v2-campaign-spreads-from-npm.html


Techrepublic

Asahi Confirms Cyberattack Exposed Data of 1.5M Customers

09:25 - 28/11/2025
  View item as page

The incident occurred in September, and the Japanese firm has now released its full internal investigation results.

The post Asahi Confirms Cyberattack Exposed Data of 1.5M Customers appeared first on TechRepublic.

https://www.techrepublic.com/article/news-asahi-cyberattack-investigation/



Crypto Exchange Upbit Suffers Security Breach After $10B Deal

15:01 - 27/11/2025
  View item as page

The timing is awful. The breach occurred just hours after its parent company, Dunamu Inc., unveiled a massive $10.3 billion takeover by tech giant Naver Corp.

The post Crypto Exchange Upbit Suffers Security Breach After $10B Deal appeared first on TechRepublic.

https://www.techrepublic.com/article/news-upbit-security-breach/


UK Budget 2025: Reactions From Tech Leaders

14:18 - 27/11/2025
  View item as page

While many leaders welcome fresh commitments to AI infrastructure and innovation, others warn about limited investment and a lack of cyber resilience.

The post UK Budget 2025: Reactions From Tech Leaders appeared first on TechRepublic.

https://www.techrepublic.com/article/news-uk-budget-2025-reaction/


Cyberattack Disrupts Services Across London Councils

13:55 - 27/11/2025
  View item as page

Kensington and Chelsea, Westminster, and Hammersmith & Fulham councils have triggered their emergency response plans.

The post Cyberattack Disrupts Services Across London Councils appeared first on TechRepublic.

https://www.techrepublic.com/article/news-cyberattack-london-councils/


Rare APT Collaboration Emerges Between Russia and North Korea

18:45 - 26/11/2025
  View item as page

Researchers say Russia’s Gamaredon and North Korea’s Lazarus may be sharing infrastructure — a rare APT collaboration.

The post Rare APT Collaboration Emerges Between Russia and North Korea appeared first on TechRepublic.

https://www.techrepublic.com/article/news-apt-collaboration-russia-north-korea/


Price Drop: This Complete Ethical Hacking Bundle is Now $33

13:00 - 26/11/2025
  View item as page

Get a comprehensive, potentially lucrative ethical hacking education with 18 courses on today's top tools and tech. This bundle is just $34.97 for a limited time.

The post Price Drop: This Complete Ethical Hacking Bundle is Now $33 appeared first on TechRepublic.

https://www.techrepublic.com/article/ethical-hacking-course-bundle/



SitusAMC Cyber Breach Sparks Fallout for JPMorgan, Citi, and Morgan Stanley

20:08 - 24/11/2025
  View item as page

A cyberattack on fintech firm SitusAMC has major US banks scrambling to assess potential data exposure tied to mortgages and real estate loans.

The post SitusAMC Cyber Breach Sparks Fallout for JPMorgan, Citi, and Morgan Stanley appeared first on TechRepublic.

https://www.techrepublic.com/article/news-situsamc-cyber-breach/


Shopping Online This Holiday Season? 5 Ways to Stay Cyber Safe

19:59 - 24/11/2025
  View item as page

Learn five easy ways to avoid scams and stay cyber safe while holiday shopping, with expert tips to protect your accounts, devices, and personal info.

The post Shopping Online This Holiday Season? 5 Ways to Stay Cyber Safe appeared first on TechRepublic.

https://www.techrepublic.com/article/news-holiday-shopping-cyber-tips/


BleepingComputer.com

Man behind in-flight Evil Twin WiFi attacks gets 7 years in prison

13:25 - 28/11/2025
  View item as page
A 44-year-old man was sentenced to seven years and four months in prison for operating an "evil twin" WiFi network to steal the data of unsuspecting travelers at various airports across Australia. [...]

https://www.bleepingcomputer.com/news/security/man-behind-in-flight-evil-twin-wi


Microsoft: Windows updates make password login option invisible

13:07 - 28/11/2025
  View item as page
Microsoft warned users that Windows 11 updates released since August may cause the password sign-in option to disappear from the lock screen options, even though the button remains functional. [...]

https://www.bleepingcomputer.com/news/microsoft/microsoft-windows-updates-hide-p


Public GitLab repositories exposed more than 17,000 secrets

12:43 - 28/11/2025
  View item as page
After scanning all 5.6 million public repositories on GitLab Cloud, a security engineer discovered more than 17,000 exposed secrets across over 2,800 unique domains. [...]

https://www.bleepingcomputer.com/news/security/public-gitlab-repositories-expose


French Football Federation discloses data breach after cyberattack

11:12 - 28/11/2025
  View item as page
The French Football Federation (FFF) disclosed a data breach on Friday after attackers used a compromised account to gain access to administrative management software used by football clubs. [...]

https://www.bleepingcomputer.com/news/security/french-football-federation-fff-di


Malicious LLMs empower inexperienced hackers with advanced tools

12:15 - 27/11/2025
  View item as page
Unrestricted large language models (LLMs) like WormGPT 4 and KawaiiGPT are improving their capabilities to generate malicious code, delivering functional scripts for ransomware encryptors and lateral movement. [...]

https://www.bleepingcomputer.com/news/security/malicious-llms-empower-inexperien


GreyNoise launches free scanner to check if you're part of a botnet

10:11 - 27/11/2025
  View item as page
GreyNoise Labs has launched a free tool called GreyNoise IP Check that lets users check if their IP address has been observed in malicious scanning operations, like botnet and residential proxy networks. [...]

https://www.bleepingcomputer.com/news/security/greynoise-launches-free-scanner-t


OpenAI discloses API customer data breach via Mixpanel vendor hack

06:27 - 27/11/2025
  View item as page
OpenAI is notifying some ChatGPT API customers that limited identifying information was exposed following a breach at its third-party analytics provider Mixpanel. [...]

https://www.bleepingcomputer.com/news/security/openai-discloses-api-customer-dat


New ShadowV2 botnet malware used AWS outage as a test opportunity

17:24 - 26/11/2025
  View item as page
A new Mirai-based botnet malware named 'ShadowV2' has been observed targeting IoT devices from D-Link, TP-Link, and other vendors with exploits for known vulnerabilities. [...]

https://www.bleepingcomputer.com/news/security/new-shadowv2-botnet-malware-used-


NordVPN Black Friday Deal: Unlock 77% off VPN plans in 2025

15:00 - 26/11/2025
  View item as page
The NordVPN Black Friday Deal is now live, and you can get the best discount available: 77% off that applies automatically when you follow our link. If you've been waiting for the right moment to upgrade your online security, privacy, and streaming freedom, this is the one VPN deals this Black Friday. [...]

https://www.bleepingcomputer.com/news/security/nordvpn-black-friday-deal-unlock-


Popular Forge library gets fix for signature verification bypass flaw

14:32 - 26/11/2025
  View item as page
A vulnerability in the 'node-forge' package, a popular JavaScript cryptography library, could be exploited to bypass signature verifications by crafting data that appears valid. [...]

https://www.bleepingcomputer.com/news/security/popular-forge-library-gets-fix-fo


securityboulevard.com

Cybersecurity Coalition to Government: Shutdown is Over, Get to Work

18:37 - 28/11/2025
  View item as page

The Cybersecurity Coalition, an industry group of almost a dozen vendors, is urging the Trump Administration and Congress now that the government shutdown is over to take a number of steps to strengthen the country's cybersecurity posture as China, Russia, and other foreign adversaries accelerate their attacks.

The post Cybersecurity Coalition to Government: Shutdown is Over, Get to Work appeared first on Security Boulevard.

https://securityboulevard.com/2025/11/cybersecurity-coalition-to-government-shut




FBI: Account Takeover Scammers Stole $262 Million this Year

21:51 - 26/11/2025
  View item as page

The FBI says that account takeover scams this year have resulted in 5,100-plus complaints in the U.S. and $262 million in money stolen, and Bitdefender says the combination of the growing number of ATO incidents and risky consumer behavior is creating an increasingly dangerous environment that will let such fraud expand.

The post FBI: Account Takeover Scammers Stole $262 Million this Year appeared first on Security Boulevard.

https://securityboulevard.com/2025/11/fbi-account-takeover-scammers-stole-262-mi


NDSS 2025 – VoiceRadar: Voice Deepfake Detection Using Micro-Frequency And Compositional Analysis

20:00 - 26/11/2025
  View item as page

Session 4B: Audio Security

Authors, Creators & Presenters:

PAPER
VoiceRadar: Voice Deepfake Detection using Micro-Frequency And Compositional Analysis
Recent advancements in synthetic speech generation, including text-to-speech (TTS) and voice conversion (VC) models, allow the generation of convincing synthetic voices, often referred to as audio deepfakes. These deepfakes pose a growing threat as adversaries can use them to impersonate individuals, particularly prominent figures, on social media or bypass voice authentication systems, thus having a broad societal impact. The inability of state-of-the-art verification systems to detect voice deepfakes effectively is alarming. We propose a novel audio deepfake detection method, VoiceRadar, that augments machine learning with physical models to approximate frequency dynamics and oscillations in audio samples. This significantly enhances detection capabilities. VoiceRadar leverages two main physical models: (i) the Doppler effect to understand frequency changes in audio samples and (ii) drumhead vibrations to decompose complex audio signals into component frequencies. VoiceRadar identifies subtle variations, or micro-frequencies, in the audio signals by applying these models. These micro-frequencies are aggregated to compute the observed frequency, capturing the unique signature of the audio. This observed frequency is integrated into the machine learning algorithm's loss function, enabling the algorithm to recognize distinct patterns that differentiate human-produced audio from AI-generated audio. We constructed a new diverse dataset to comprehensively evaluate VoiceRadar, featuring samples from leading TTS and VC models. Our results demonstrate that VoiceRadar outperforms existing methods in accurately identifying AI-generated audio samples, showcasing its potential as a robust tool for audio deepfake detection.

ABOUT NDSS
The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.

Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the Organizations' YouTube Channel.

Permalink

The post NDSS 2025 – VoiceRadar: Voice Deepfake Detection Using Micro-Frequency And Compositional Analysis appeared first on Security Boulevard.

https://securityboulevard.com/2025/11/ndss-2025-voiceradar-voice-deepfake-detect



The Trust Crisis: Why Digital Services Are Losing Consumer Confidence

17:45 - 26/11/2025
  View item as page

According to the Thales Consumer Digital Trust Index 2025, global confidence in digital services is slipping fast. After surveying more than 14,000 consumers across 15 countries, the findings are clear: no sector earned high trust ratings from even half its users. Most industries are seeing trust erode — or, at best, stagnate. In an era..

The post The Trust Crisis: Why Digital Services Are Losing Consumer Confidence appeared first on Security Boulevard.

https://securityboulevard.com/2025/11/the-trust-crisis-why-digital-services-are-


How to Protect from Online Fraud This Holiday Season

17:00 - 26/11/2025
  View item as page

Peak e-commerce season hits retailers every year just as the Halloween decorations start to come down. Unsurprisingly, cyber criminals see this time as an opportunity to strike, and criminal activity online spikes alongside sales. Shockingly, 4.6% of attempted e-commerce transactions during the 2024 Black Friday period were suspected to be digital fraud. In the UK..

The post How to Protect from Online Fraud This Holiday Season appeared first on Security Boulevard.

https://securityboulevard.com/2025/11/how-to-protect-from-online-fraud-this-holi


CrewAI GitHub Token Exposure Highlights the Growing Risk of Static Credentials in AI Systems

16:56 - 26/11/2025
  View item as page

3 min readAs AI platforms grow more complex and interdependent, small failures can cast long shadows. That’s what happened inside the open-source CrewAI platform, where a vulnerability in its error-handling logic surfaced during a provisioning failure. The resulting “exception response” – the message a service returns when it encounters an unhandled error during a request – contained [...]

The post CrewAI GitHub Token Exposure Highlights the Growing Risk of Static Credentials in AI Systems appeared first on Aembit.

The post CrewAI GitHub Token Exposure Highlights the Growing Risk of Static Credentials in AI Systems appeared first on Security Boulevard.

https://securityboulevard.com/2025/11/crewai-github-token-exposure-highlights-th


Russian-Backed Threat Group Uses SocGholish to Target U.S. Company

16:10 - 26/11/2025
  View item as page

The Russian state-sponsored group behind the RomCom malware family used the SocGholish loader for the first time to launch an attack on a U.S.-based civil engineering firm, continuing its targeting of organizations that offer support to Ukraine in its ongoing war with its larger neighbor.

The post Russian-Backed Threat Group Uses SocGholish to Target U.S. Company appeared first on Security Boulevard.

https://securityboulevard.com/2025/11/russian-backed-threat-group-uses-socgholis


CXSecurity.com

Fortinet FortiWeb Auth-8.0.0 Bypass CVE-2025-64446

22:53 - 24/11/2025
  View item as page
Topic: Fortinet FortiWeb Auth-8.0.0 Bypass CVE-2025-64446 Risk: High Text:# Titles: Fortinet FortiWeb Auth-8.0.0 Bypass CVE-2025-64446 # Author: nu11secur1ty # Date: 11/17/2025 # Vendor: https://www...

https://cxsecurity.com/issue/WLB-2025110017


Royal Elementor Addons - Unauthenticated Remote Code Execution

22:53 - 24/11/2025
  View item as page
Topic: Royal Elementor Addons - Unauthenticated Remote Code Execution Risk: High Text:#!/usr/bin/env python3 # Title Royal Elementor Addons - Unauthenticated Remote Code Execution CVE-2023-5360 # Author @ibrahim...

https://cxsecurity.com/issue/WLB-2025110016


Oracle WebLogic Server and allows remote code execution

22:53 - 24/11/2025
  View item as page
Topic: Oracle WebLogic Server and allows remote code execution Risk: Medium Text:# CVE-2025-61757 -- Proof‐of‐Concept (Private) `NOT` (Public) **Author:** nu11secur1ty **Status:** *Confirmed exploitab...

https://cxsecurity.com/issue/WLB-2025110015


Fortinet FortiWeb Auth-8.0.0 Bypass CVE-2025-64446

22:54 - 19/11/2025
  View item as page
Topic: Fortinet FortiWeb Auth-8.0.0 Bypass CVE-2025-64446 Risk: Medium Text:# Titles: Fortinet FortiWeb Auth-8.0.0 Bypass CVE-2025-64446 # Author: nu11secur1ty # Date: 11/17/2025 # Vendor: https://www...

https://cxsecurity.com/issue/WLB-2025110014


Fortinet FortiWeb Auth. Bypass

17:54 - 17/11/2025
  View item as page
Topic: Fortinet FortiWeb Auth. Bypass Risk: High Text:# Titles: Fortinet FortiWeb Auth. Bypass CVE-2025-64446 # Author: nu11secur1ty # Date: 11/15/2025 # Vendor: https://www.fort...

https://cxsecurity.com/issue/WLB-2025110012


Logitech Streamlabs Desktop 1.19.6 (overlay) CPU Exhaustion

17:35 - 13/11/2025
  View item as page
Topic: Logitech Streamlabs Desktop 1.19.6 (overlay) CPU Exhaustion Risk: Medium Text:#!/usr/bin/env python3 # # # Logitech Streamlabs Desktop 1.19.6 (overlay) CPU Exhaustion # # # Vendor: Logitech | General...

https://cxsecurity.com/issue/WLB-2025110011


is-localhost-ip 2.0.0 - SSRF via Restrictions bypass

17:33 - 13/11/2025
  View item as page
Topic: is-localhost-ip 2.0.0 - SSRF via Restrictions bypass Risk: Medium Text:# Titles: is-localhost-ip 2.0.0 - SSRF via Restrictions bypass # Author: nu11secur1ty # Date: 11/09/2025 # Vendor: https://g...

https://cxsecurity.com/issue/WLB-2025110010


moew.government.bg Cross-site scripting (reflected)

17:33 - 13/11/2025
  View item as page
Topic: moew.government.bg Cross-site scripting (reflected) Risk: Low Text:## Titles: moew.government.bg Cross-site scripting (reflected) ## Author: nu11secur1ty ## Date: 11/10/2025 ## Vendor: https...

https://cxsecurity.com/issue/WLB-2025110009


hop.bg | web app | Cross-site scripting (reflected)

22:47 - 07/11/2025
  View item as page
Topic: hop.bg | web app | Cross-site scripting (reflected) Risk: Low Text:## Titles: hop.bg | web app | Cross-site scripting (reflected) ## Author: nu11secur1ty ## Date: 11/03/2025 ## Vendor: https...

https://cxsecurity.com/issue/WLB-2025110008


3kits template via imgGallery.php SQL Injection id parameter

22:42 - 07/11/2025
  View item as page
Topic: 3kits template via imgGallery.php SQL Injection id parameter Risk: Medium Text:#Exploit Title: 3kits - Sql Injection #Google Dork: "Designed & Developed by 3kits" #Date: 2025-11-02 #Exploit Author: Hosse...

https://cxsecurity.com/issue/WLB-2025110007


Brian Krebs

Meet Rey, the Admin of ‘Scattered Lapsus$ Hunters’

17:22 - 26/11/2025
  View item as page
A prolific cybercriminal group that calls itself "Scattered LAPSUS$ Hunters" made headlines regularly this year by stealing data from and publicly mass extorting dozens of major corporations. But the tables seem to have turned somewhat for "Rey," the moniker chosen by the technical operator and public face of the hacker group: Earlier this week, Rey confirmed his real life identity and agreed to an interview after KrebsOnSecurity tracked him down and contacted his father.

https://krebsonsecurity.com/2025/11/meet-rey-the-admin-of-scattered-lapsus-hunte


Is Your Android TV Streaming Box Part of a Botnet?

18:44 - 24/11/2025
  View item as page
On the surface, the Superbox media streaming devices for sale at retailers like BestBuy and Walmart may seem like a steal: They offer unlimited access to more than 2,200 pay-per-view and streaming services like Netflix, ESPN and Hulu, all for a one-time fee of around $400. But security experts warn these TV boxes require intrusive software that forces the user's network to relay Internet traffic for others, traffic that is often tied to cybercrime activity such as advertising fraud and account takeovers.

https://krebsonsecurity.com/2025/11/is-your-android-tv-streaming-box-part-of-a-b


Mozilla Says It’s Finally Done With Two-Faced Onerep

19:06 - 20/11/2025
  View item as page
In March 2024, Mozilla said it was winding down its collaboration with Onerep -- an identity protection service offered with the Firefox web browser that promises to remove users from hundreds of people-search sites -- after KrebsOnSecurity revealed Onerep's founder had created dozens of people-search services and was continuing to operate at least one of them. Sixteen months later, however, Mozilla is still promoting Onerep. This week, Mozilla announced their partnership with Onerep will officially end next month.

https://krebsonsecurity.com/2025/11/mozilla-says-its-finally-done-with-two-faced


The Cloudflare Outage May Be a Security Roadmap

14:07 - 19/11/2025
  View item as page
An intermittent outage at Cloudflare on Tuesday briefly knocked many of the Internet's top destinations offline. Some affected Cloudflare customers were able to pivot away from the platform temporarily so that visitors could still access their websites. But security experts say doing so may have also triggered an impromptu network penetration test for organizations that have come to rely on Cloudflare to block many types of abusive and malicious traffic.

https://krebsonsecurity.com/2025/11/the-cloudflare-outage-may-be-a-security-road


Microsoft Patch Tuesday, November 2025 Edition

21:47 - 16/11/2025
  View item as page
Microsoft this week pushed security updates to fix more than 60 vulnerabilities in its Windows operating systems and supported software, including at least one zero-day bug that is already being exploited. Microsoft also fixed a glitch that prevented some Windows 10 users from taking advantage of an extra year of security updates, which is nice because the zero-day flaw and other critical weaknesses patched today affect all versions of Windows, including Windows 10.

https://krebsonsecurity.com/2025/11/microsoft-patch-tuesday-november-2025-editio


Google Sues to Disrupt Chinese SMS Phishing Triad

14:47 - 13/11/2025
  View item as page
Google is suing more than two dozen unnamed individuals allegedly involved in peddling a popular China-based mobile phishing service that helps scammers impersonate hundreds of trusted brands, blast out text message lures, and convert phished payment card data into mobile wallets from Apple and Google.

https://krebsonsecurity.com/2025/11/google-sues-to-disrupt-chinese-sms-phishing-


Drilling Down on Uncle Sam’s Proposed TP-Link Ban

18:14 - 09/11/2025
  View item as page
The U.S. government is reportedly preparing to ban the sale of wireless routers and other networking gear from TP-Link Systems, a tech company that currently enjoys an estimated 50% market share among home users and small businesses. Experts say while the proposed ban may have more to do with TP-Link's ties to China than any specific technical threats, much of the rest of the industry serving this market also sources hardware from China and ships products that are insecure fresh out of the box.

https://krebsonsecurity.com/2025/11/drilling-down-on-uncle-sams-proposed-tp-link


Cloudflare Scrubs Aisuru Botnet from Top Domains List

02:04 - 06/11/2025
  View item as page
For the past week, domains associated with the massive Aisuru botnet have repeatedly usurped Amazon, Apple, Google and Microsoft in Cloudflare's public ranking of the most frequently requested websites. Cloudflare responded by redacting Aisuru domain names from their top websites list. The chief executive at Cloudflare says Aisuru's overlords are using the botnet to boost their malicious domain rankings, while simultaneously attacking the company's domain name system (DNS) service.

https://krebsonsecurity.com/2025/11/cloudflare-scrubs-aisuru-botnet-from-top-dom


Alleged Jabber Zeus Coder ‘MrICQ’ in U.S. Custody

20:37 - 02/11/2025
  View item as page
A Ukrainian man indicted in 2012 for conspiring with a prolific hacking group to steal tens of millions of dollars from U.S. businesses was arrested in Italy and is now in custody in the United States, KrebsOnSecurity has learned. Sources close to the investigation say Yuriy Igorevich Rybtsov, a 41-year-old from the Russia-controlled city of Donetsk, Ukraine, was previously referenced in U.S. federal charging documents only by his online handle "MrICQ." According to a 13-year-old indictment filed by prosecutors in Nebraska, MrICQ was a developer for a cybercrime group known as "Jabber Zeus."

https://krebsonsecurity.com/2025/11/alleged-jabber-zeus-coder-mricq-in-u-s-custo


Aisuru Botnet Shifts from DDoS to Residential Proxies

00:51 - 29/10/2025
  View item as page
Aisuru, the botnet responsible for a series of record-smashing distributed denial-of-service (DDoS) attacks this year, recently was overhauled to support a more low-key, lucrative and sustainable business: Renting hundreds of thousands of infected Internet of Things (IoT) devices to proxy services that help cybercriminals anonymize their traffic. Experts says a glut of proxies from Aisuru and other sources is fueling large-scale data harvesting efforts tied to various artificial intelligence (AI) projects, helping content scrapers evade detection by routing their traffic through residential connections that appear to be regular Internet users.

https://krebsonsecurity.com/2025/10/aisuru-botnet-shifts-from-ddos-to-residentia


Troy Hunt

Weekly Update 479

04:44 - 23/11/2025
  View item as page

Presently sponsored by: Report URI: Guarding you from rogue JavaScript! Don’t get pwned; get real-time alerts & prevent breaches #SecureYourSite

I gave up on the IoT water meter reader. Being technical and thinking you can solve everything with technology is both a blessing and a curse; dogged persistence has given me the life I have today, but it has also burned serious amounts of time because I never want to

https://www.troyhunt.com/weekly-update-479/


Weekly Update 478

08:13 - 16/11/2025
  View item as page

Presently sponsored by: Report URI: Guarding you from rogue JavaScript! Don’t get pwned; get real-time alerts & prevent breaches #SecureYourSite

This week, it was an absolute privilege to be at Europol in The Hague, speaking about cyber offenders and at the InterCOP conference and spending time with some of the folks involved in the Operation Endgame actions. The latter in particular gave me a new sense of just how much

https://www.troyhunt.com/weekly-update-478/


Weekly Update 477

12:27 - 12/11/2025
  View item as page

Presently sponsored by: Report URI: Guarding you from rogue JavaScript! Don’t get pwned; get real-time alerts & prevent breaches #SecureYourSite

What. A. Week. It wasn't just the preceding weeks of technical pain as we tried to work out how to get this data loaded, it was all the subsequent queries we had to deal with too. Some of them are totally understandable, whilst others just resulted in endless

https://www.troyhunt.com/weekly-update-477/


2 Billion Email Addresses Were Exposed, and We Indexed Them All in Have I Been Pwned

06:41 - 05/11/2025
  View item as page

Presently sponsored by: Report URI: Guarding you from rogue JavaScript! Don’t get pwned; get real-time alerts & prevent breaches #SecureYourSite

I hate hyperbolic news headlines about data breaches, but for the "2 Billion Email Addresses" headline to be hyperbolic, it'd need to be exaggerated or overstated - and it isn't. It's rounded up from the more precise number of 1,957,476,

https://www.troyhunt.com/2-billion-email-addresses-were-exposed-and-we-indexed-t


Weekly Update 476

08:23 - 03/11/2025
  View item as page

Presently sponsored by: Report URI: Guarding you from rogue JavaScript! Don’t get pwned; get real-time alerts & prevent breaches #SecureYourSite

The 2 billion email address stealer log breach I talk about this week is almost ready to go at the time of writing. It's been massively time-consuming, massively expensive (we turned the cloud up to 11) and enormously frustrating. I've written about why in the draft

https://www.troyhunt.com/weekly-update-476/


How We (Almost) Found Chromium's Bug via Crash Reports to Report URI

09:09 - 27/10/2025
  View item as page

Presently sponsored by: Report URI: Guarding you from rogue JavaScript! Don’t get pwned; get real-time alerts & prevent breaches #SecureYourSite

Tracking down bugs in software is a pain that all of us who write code must bear. When we're talking about outright errors in a web page, you typically have something to get you started (such as output in the console), but that wasn't the case

https://www.troyhunt.com/how-we-almost-found-chromiums-bug-via-crash-reports-to-


Weekly Update 475

21:32 - 25/10/2025
  View item as page

Presently sponsored by: Report URI: Guarding you from rogue JavaScript! Don’t get pwned; get real-time alerts & prevent breaches #SecureYourSite

It was the Synthient threat data that ate most of my time this week, and it continues to do so now, the weekend after recording this video. Data like this is equal parts enormously damaging to victims and frustratingly noisy to process. I have to be confident enough that it&

https://www.troyhunt.com/weekly-update-475/


Inside the Synthient Threat Data

19:20 - 21/10/2025
  View item as page

Presently sponsored by: Report URI: Guarding you from rogue JavaScript! Don’t get pwned; get real-time alerts & prevent breaches #SecureYourSite

Where is your data on the internet? I mean, outside the places you've consciously provided it, where has it now flowed to and is being used and abused in ways you've never expected? The truth is that once the bad guys have your data, it often

https://www.troyhunt.com/inside-the-synthient-threat-data/


Weekly Update 474

07:09 - 20/10/2025
  View item as page

Presently sponsored by: Report URI: Guarding you from rogue JavaScript! Don’t get pwned; get real-time alerts & prevent breaches #SecureYourSite

You're not going to believe this - the criminals that took the Qantas data ignored the injunction 😮 I know, I know, we're all a bit stunned that making crime illegal hasn't appeared to stop it, but here we are. Just before the time

https://www.troyhunt.com/weekly-update-474/


Weekly Update 473

03:25 - 12/10/2025
  View item as page

Presently sponsored by: Report URI: Guarding you from rogue JavaScript! Don’t get pwned; get real-time alerts & prevent breaches #SecureYourSite

This week's video was recorded on Friday morning Aussie time, and as promised, hackers dumped data the following day. Listening back to parts of the video as I write this on a Sunday morning, pretty much what was predicted happened: data was dumped, it included Qantas, and the

https://www.troyhunt.com/weekly-update-473/


Bruce Schneier

Friday Squid Blogging: Flying Neon Squid Found on Israeli Beach

20:56 - 28/11/2025
  View item as page

A meter-long flying neon squid (Ommastrephes bartramii) was found dead on an Israeli beach. The species is rare in the Mediterranean.

https://www.schneier.com/blog/archives/2025/11/friday-squid-blogging-flying-neon


Prompt Injection Through Poetry

14:54 - 28/11/2025
  View item as page

In a new paper, “Adversarial Poetry as a Universal Single-Turn Jailbreak Mechanism in Large Language Models,” researchers found that turning LLM prompts into poetry resulted in jailbreaking the models:

Abstract: We present evidence that adversarial poetry functions as a universal single-turn jailbreak technique for Large Language Models (LLMs). Across 25 frontier proprietary and open-weight models, curated poetic prompts yielded high attack-success rates (ASR), with some providers exceeding 90%. Mapping prompts to MLCommons and EU CoP risk taxonomies shows that poetic attacks transfer across CBRN, manipulation, cyber-offence, and loss-of-control domains. Converting 1,200 ML-Commons harmful prompts into verse via a standardized meta-prompt produced ASRs up to 18 times higher than their prose baselines. Outputs are evaluated using an ensemble of 3 open-weight LLM judges, whose binary safety assessments were validated on a stratified human-labeled subset. Poetic framing achieved an average jailbreak success rate of 62% for hand-crafted poems and approximately 43% for meta-prompt conversions (compared to non-poetic baselines), substantially outperforming non-poetic baselines and revealing a systematic vulnerability across model families and safety training approaches. These findings demonstrate that stylistic variation alone can circumvent contemporary safety mechanisms, suggesting fundamental limitations in current alignment methods and evaluation protocols...

https://www.schneier.com/blog/archives/2025/11/prompt-injection-through-poetry.h


Huawei and Chinese Surveillance

12:05 - 26/11/2025
  View item as page

This quote is from House of Huawei: The Secret History of China’s Most Powerful Company.

“Long before anyone had heard of Ren Zhengfei or Huawei, Wan Runnan had been China’s star entrepreneur in the 1980s, with his company, the Stone Group, touted as “China’s IBM.” Wan had believed that economic change could lead to political change. He had thrown his support behind the pro-democracy protesters in 1989. As a result, he had to flee to France, with an arrest warrant hanging over his head. He was never able to return home. Now, decades later and in failing health in Paris, Wan recalled something that had happened one day in the late 1980s, when he was still living in Beijing...

https://www.schneier.com/blog/archives/2025/11/huawei-and-chinese-surveillance.h


Four Ways AI Is Being Used to Strengthen Democracies Worldwide

12:00 - 25/11/2025
  View item as page

Democracy is colliding with the technologies of artificial intelligence. Judging from the audience reaction at the recent World Forum on Democracy in Strasbourg, the general expectation is that democracy will be the worse for it. We have another narrative. Yes, there are risks to democracy from AI, but there are also opportunities.

We have just published the book Rewiring Democracy: How AI will Transform Politics, Government, and Citizenship. In it, we take a clear-eyed view of how AI is undermining confidence in our information ecosystem, how the use of biased AI can harm constituents of democracies and how elected officials with authoritarian tendencies can use it to consolidate power. But we also give positive examples of how AI is transforming democratic governance and politics for the better...

https://www.schneier.com/blog/archives/2025/11/four-ways-ai-is-being-used-to-str


IACR Nullifies Election Because of Lost Decryption Key

12:03 - 24/11/2025
  View item as page

The International Association of Cryptologic Research—the academic cryptography association that’s been putting conferences like Crypto (back when “crypto” meant “cryptography”) and Eurocrypt since the 1980s—had to nullify an online election when trustee Moti Yung lost his decryption key.

For this election and in accordance with the bylaws of the IACR, the three members of the IACR 2025 Election Committee acted as independent trustees, each holding a portion of the cryptographic key material required to jointly decrypt the results. This aspect of Helios’ design ensures that no two trustees could collude to determine the outcome of an election or the contents of individual votes on their own: all trustees must provide their decryption shares...

https://www.schneier.com/blog/archives/2025/11/iacr-nullifies-election-because-o


Friday Squid Blogging: New “Squid” Sneaker

22:08 - 21/11/2025
  View item as page

I did not know Adidas sold a sneaker called “Squid.”

As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.

Blog moderation policy.

https://www.schneier.com/blog/archives/2025/11/friday-squid-blogging-new-squid-s


More on Rewiring Democracy

19:07 - 21/11/2025
  View item as page

It’s been a month since Rewiring Democracy: How AI Will Transform Our Politics, Government, and Citizenship was published. From what we know, sales are good.

Some of the book’s forty-three chapters are available online: chapters 2, 12, 28, 34, 38, and 41.

We need more reviews—six on Amazon is not enough, and no one has yet posted a viral TikTok review. One review was published in Nature and another on the RSA Conference website, but more would be better. If you’ve read the book, please leave a review somewhere.

My coauthor and I have been doing all sort of book events, both online and in person. This ...

https://www.schneier.com/blog/archives/2025/11/71226.html


AI as Cyberattacker

12:01 - 21/11/2025
  View item as page

From Anthropic:

In mid-September 2025, we detected suspicious activity that later investigation determined to be a highly sophisticated espionage campaign. The attackers used AI’s “agentic” capabilities to an unprecedented degree­—using AI not just as an advisor, but to execute the cyberattacks themselves.

The threat actor—­whom we assess with high confidence was a Chinese state-sponsored group—­manipulated our Claude Code tool into attempting infiltration into roughly thirty global targets and succeeded in a small number of cases. The operation targeted large tech companies, financial institutions, chemical manufacturing companies, and government agencies. We believe this is the first documented case of a large-scale cyberattack executed without substantial human intervention...

https://www.schneier.com/blog/archives/2025/11/ai-as-cyberattacker.html


Scam USPS and E-Z Pass Texts and Websites

12:07 - 20/11/2025
  View item as page

Google has filed a complaint in court that details the scam:

In a complaint filed Wednesday, the tech giant accused “a cybercriminal group in China” of selling “phishing for dummies” kits. The kits help unsavvy fraudsters easily “execute a large-scale phishing campaign,” tricking hordes of unsuspecting people into “disclosing sensitive information like passwords, credit card numbers, or banking information, often by impersonating well-known brands, government agencies, or even people the victim knows.”

These branded “Lighthouse” kits offer two versions of software, depending on whether bad actors want to launch SMS and e-commerce scams. “Members may subscribe to weekly, monthly, seasonal, annual, or permanent licenses,” Google alleged. Kits include “hundreds of templates for fake websites, domain set-up tools for those fake websites, and other features designed to dupe victims into believing they are entering sensitive information on a legitimate website.”...

https://www.schneier.com/blog/archives/2025/11/scam-usps-and-e-z-pass-texts-and-


Legal Restrictions on Vulnerability Disclosure

12:04 - 19/11/2025
  View item as page

Kendra Albert gave an excellent talk at USENIX Security this year, pointing out that the legal agreements surrounding vulnerability disclosure muzzle researchers while allowing companies to not fix the vulnerabilities—exactly the opposite of what the responsible disclosure movement of the early 2000s was supposed to prevent. This is the talk.

Thirty years ago, a debate raged over whether vulnerability disclosure was good for computer security. On one side, full disclosure advocates argued that software bugs weren’t getting fixed and wouldn’t get fixed if companies that made insecure software wasn’t called out publicly. On the other side, companies argued that full disclosure led to exploitation of unpatched vulnerabilities, especially if they were hard to fix. After blog posts, public debates, and countless mailing list flame wars, there emerged a compromise solution: coordinated vulnerability disclosure, where vulnerabilities were disclosed after a period of confidentiality where vendors can attempt to fix things. Although full disclosure fell out of fashion, disclosure won and security through obscurity lost. We’ve lived happily ever after since...

https://www.schneier.com/blog/archives/2025/11/legal-restrictions-on-vulnerabili


Security Affairs

Attackers stole member data from French Soccer Federation

22:21 - 28/11/2025
  View item as page
The French Soccer Federation (FFF) disclosed a data breach after hackers used a compromised account to steal member data. A compromised account allowed attackers to breach the French Soccer Federation (FFF), stealing data belonging to its members. The organization confirmed the cyberattack on Thursday, but did not disclose the number of members impacted. “The FFF […]

https://securityaffairs.com/185160/data-breach/attackers-stole-member-data-from-


Thousands of sensitive secrets published on JSONFormatter and CodeBeautify

09:55 - 28/11/2025
  View item as page
Users of JSONFormatter and CodeBeautify leaked thousands of sensitive secrets, including credentials and private keys, WatchTowr warns. WatchTowr’s latest research reveals massive leaks of passwords, secrets, and keys across developer formatting platforms like JSONFormatter and CodeBeautify. Despite past incidents, exposed credentials remain rampant, sometimes even for critical systems. WatchTowr researchers highlight how easily sensitive data […]

https://securityaffairs.com/185150/security/thousands-of-sensitive-secrets-publi


New Mirai variant ShadowV2 tests IoT exploits amid AWS disruption

08:20 - 28/11/2025
  View item as page
ShadowV2, a new Mirai-based botnet, briefly targeted vulnerable IoT devices during October’s AWS outage, likely as a test run. During the late-October AWS disruption, FortiGuard Labs researchers observed the Mirai-based ‘ShadowV2’ malware exploiting IoT vulnerabilities across multiple countries and industries. The botnet was active only during the outage, suggesting a test run for future attacks. […]

https://securityaffairs.com/185135/malware/new-mirai-variant-shadowv2-tests-iot-


Asahi says crooks stole data of approximately 2M customers and employees

20:03 - 27/11/2025
  View item as page
Asahi says hackers stole data of approximately 2M customers and employees before a ransomware attack crippled its Japan operations. Threat actors hit Asahi with a ransomware attack in September, stealing personal data on about 2 million customers and employees and severely disrupting the company’s operations in Japan. Asahi Group Holdings, Ltd (commonly called Asahi) is […]

https://securityaffairs.com/185126/data-breach/asahi-says-crooks-stole-data-of-a


OpenAI data may have been exposed after a cyberattack on analytics firm Mixpanel

15:28 - 27/11/2025
  View item as page
OpenAI warns some users that a cyberattack on analytics firm Mixpanel may have exposed their data. Mixpanel is a product analytics platform that companies use to understand how people interact with their apps or websites. Many tech companies use Mixpanel to make data-driven decisions about features, performance, and customer journeys. OpenAI is alerting some users about […]

https://securityaffairs.com/185121/data-breach/openai-data-may-have-been-exposed


New ASUS firmware patches critical AiCloud vulnerability

08:33 - 27/11/2025
  View item as page
ASUS released new firmware to address multiple vulnerabilities, including a critical authentication bypass flaw in routers with AiCloud enabled. ASUS has issued new firmware addressing nine security vulnerabilities, including a critical authentication bypass, tracked as CVE-2025-59366 (CVSS score of 9.2), affecting routers with AiCloud enabled. “Researchers have reported potential vulnerabilities in ASUS Router. ASUS has […]

https://securityaffairs.com/185109/iot/new-asus-firmware-patches-critical-aiclou


For the first time, a RomCom payload has been observed being distributed via SocGholish

20:13 - 26/11/2025
  View item as page
RomCom malware used the SocGholish fake update loader to deliver Mythic Agent to a U.S. civil engineering firm. In September 2025, Arctic Wolf Labs observed RomCom threat actors delivering the Mythic Agent via SocGholish to a U.S. company. The researchers noticed that the payload executed about 10 minutes after initial exploitation, marking the first time […]

https://securityaffairs.com/185084/security/for-the-first-time-a-romcom-payload-


Multiple London councils faced a cyberattack

14:59 - 26/11/2025
  View item as page
Multiple London councils, including Chelsea and Westminster, faced a cyberattack that may have exposed resident data. Authorities are actively investigating the incident. A cyberattack struck multiple London councils, including Kensington & Chelsea and Westminster, which share IT systems. Officials say residents’ data may have been compromised and have notified the UK Information Commissioner’s Office. The […]

https://securityaffairs.com/185086/security/multiple-london-councils-faced-a-cyb


Emergency alerts go dark after cyberattack on OnSolve CodeRED

11:17 - 26/11/2025
  View item as page
Cyberattack on OnSolve CodeRED disrupted emergency alert services for U.S. state, local, police, and fire agencies. A cyberattack on the OnSolve CodeRED alert platform disrupted emergency notification services used by U.S. state and local governments, police, and fire agencies. OnSolve CodeRED is a cloud-based emergency alert system used by U.S. state and local governments to […]

https://securityaffairs.com/185075/cyber-crime/emergency-alerts-go-dark-after-cy


Dissecting a new malspam chain delivering Purelogs infostealer

09:02 - 26/11/2025
  View item as page
The AISI Research Center’s Cybersecurity Observatory publishes the report “Dissecting a new malspam chain delivering Purelogs infostealer” – November 25, 2025. Organizational and personal security remains under constant threat from increasingly sophisticated attack vectors, with malspam continuing to represent one of the most widespread and effective initial infection vectors for distributing malware on a large […]

https://securityaffairs.com/185066/cyber-crime/dissecting-a-new-malspam-chain-de


news.sophos.com


Modernizing trust: How UADY transformed campus security with Sophos

13:30 - 24/11/2025
  View item as page
At the Autonomous University of Yucatán (UADY), technology has long been central to supporting academic excellence. As the university expanded to serve more than 20,000 students across five campuses, its IT team faced increasing pressure on an aging cybersecurity infrastructure. Manual patching, limited firmware support, and rising costs made it harder to defend against evolving […]

https://news.sophos.com/en-us/2025/11/24/uady-college-case-study-sophos-endpoint


The Sophos Central UAE region is now live!

13:30 - 24/11/2025
  View item as page
Expanding customer choice and bringing Sophos Central closer to customers and partners across the Middle East.

https://news.sophos.com/en-us/2025/11/24/the-sophos-central-uae-region-is-now-li


WhatsApp compromise leads to Astaroth deployment

17:44 - 20/11/2025
  View item as page
Another campaign targeting WhatsApp users in Brazil spreads like a worm and employs multiple payloads for credential theft, session hijacking, and persistence

https://news.sophos.com/en-us/2025/11/20/whatsapp-compromise-leads-to-astaroth-d



Advancing Cybersecurity for Microsoft Environments

16:31 - 18/11/2025
  View item as page
From certified MDR services to open threat intelligence frameworks, Sophos is delivering the clarity, context, and confidence organizations need to stay ahead of evolving threats.

https://news.sophos.com/en-us/2025/11/18/advancing-cybersecurity-for-microsoft-e


From point-in-time audits to continuous confidence: How Sophos IT transformed identity defense

14:49 - 18/11/2025
  View item as page
“From logging in and connecting to Entra ID to seeing our first actionable findings — it took less than 45 minutes."

https://news.sophos.com/en-us/2025/11/18/sophos-itdr-case-study-sophos-identity-


Infostealers: The silent doorway to identity attacks — and why proactive defense matters

13:00 - 14/11/2025
  View item as page
Credential theft isn’t just an inconvenience. It’s often the first move in a chain reaction that ends in full-scale compromise. Beyond the dreaded password reset process, information stealers, as shown in several recent cyberattacks, can have far more consequential follow-on effects. For many small and mid-sized organizations, a single stolen identity can lead to […]

https://news.sophos.com/en-us/2025/11/14/infostealers-and-follow-on-attacks/