Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)KI
Posts
2,247
Comments
71
Joined
1 yr. ago

Cybersecurity @sh.itjust.works

North Korea-linked actors spread XORIndex malware via 67 malicious npm packages

Cybersecurity @sh.itjust.works

MITRE Launches AADAPT Framework to Counter Real-World Attacks on Digital Asset Systems

Cybersecurity @sh.itjust.works

OpenAI's ChatGPT-powered browser is codenamed 'Aura'

Cybersecurity @sh.itjust.works

New Grok AI model surprises experts by checking Elon Musk’s views before answering - Ars Technica

Cybersecurity @sh.itjust.works

UK launches vulnerability research program for external experts

Cybersecurity @sh.itjust.works

Chasing Ghosts Over RDP: Lateral Movement in Tiny Bitmaps | by Mat Cyb3rF0x Fuchs | Jul, 2025 | Medium

Cybersecurity @sh.itjust.works

AsyncRAT evolves as ESET tracks its most popular malware forks - Help Net Security

Cybersecurity @sh.itjust.works

Interlock ransomware adopts FileFix method to deliver malware

Cybersecurity @sh.itjust.works

Indian Police Raid Tech Support Scam Call Center

Cybersecurity @sh.itjust.works

Interlock Ransomware Unleashes New RAT in Widespread Campaign - Infosecurity Magazine

Cybersecurity @sh.itjust.works

Malicious VSCode extension in Cursor IDE led to $500K crypto theft

Cybersecurity @sh.itjust.works

Flaws in Gigabyte Firmware Allow Security Bypass, Backdoor Deployment - SecurityWeek

Cybersecurity @sh.itjust.works

Global Louis Vuitton data breach impacts UK, South Korea, and Turkey

Cybersecurity @sh.itjust.works

Google Gemini flaw hijacks email summaries for phishing

Cybersecurity @sh.itjust.works

Cyber-Insurance Premiums Drop, but Coverage Is Key

Cybersecurity @sh.itjust.works

Windows 10 KB5062554 update breaks emoji panel search feature

Cybersecurity @sh.itjust.works

Business Logic Vulnerability in Dell’s Payment API — Reported via Bugcrowd | by Yeswehack | May, 2025 | InfoSec Write-ups

Cybersecurity @sh.itjust.works

Alabama city hack exposed financial data, citizens​ | Cybernews

Cybersecurity @sh.itjust.works

Dark Web Profile: Arkana Ransomware - SOCRadar® Cyber Intelligence Inc.

Cybersecurity @sh.itjust.works

Ransomware Delivered Through GitHub: A PowerShell-Powered Attack

  • The incident occurred on June 12, 2025, due to a policy change that contained blank fields, causing 503 errors in Google Cloud and Google Workspace APIs. The root cause was:

    1. A new feature added to Service Control on May 29, 2025, without adequate error handling.
    2. The policy change with blank fields was globally replicated and caused Service Control binaries to crash.
  • The first vulnerability, CVE-2025-5054, affects Ubuntu’s Apport crash reporting system, while the second, CVE-2025-4598, impacts systemd-coredump, the default core dump handler used across Red Hat Enterprise Linux 9 and 10, as well as Fedora distributions.

  • Very nice approach!

    Some points about the article:

    Nature of the Vulnerability: The vulnerability is a security flaw that allows leaking the email associated with a YouTube channel by exploiting endpoints from both YouTube and Google Pixel Recorder.

    Impact: It allows an attacker to obtain the email associated with any YouTube channel, which can lead to phishing attacks, privacy invasion, and other malicious activities. This potentially affects all YouTube users who own a channel.

    Fix Status: The vulnerability has been fixed by Google. Both parts of the exploit were resolved by 02/09/2025, and the report was disclosed on 02/12/2025.

  • Apparently was not related to a cyber attack, as stated in status page (https://status.proton.me/)

    We have resolved all service outages, and the situation has been stable for some time. We have identified the root cause of the problem, implemented a fix, and are now monitoring the results. Jan 09, 2025 - 19:27 CET

  • If you are asking if the main attack vector was phishing, they are not clear on that:

    According to statements released by Brain Cipher, they have exploited critical weaknesses within Deloitte UK’s cybersecurity infrastructure.

  • In my opinion, you will always be at the mercy of a government in this context: US, China, Russia. In the end it's a matter of choosing which one. FOSS maybe a little less, but in the end it's almost the same. That's my view, of course. That doesn't mean you can't give them a hard time ;)