Search results

Apparently AMD's AutoUpdate downloads the updates over HTTP and executes them without any validation (presumably as SYSTEM user). AMD was notified of the vulnerability but according to them "attack requiring physical access to victim's computer/device, man in the middle or compromised user accounts" are out of scope.

Madness.

source: web.archive.org/web/2026020615

0
0
0

:

I'm an independent reporter based in and heading into my final year of law school next year. After becoming more interested in and , I also (impulsively) enrolled in a computer science minor to learn more.

I've covered topics including refugee and immigration policy, bushfire management, animal rights, weapons companies' involvement in Australia's education system, and the incoming social media age ban.

My commitment to journalism stems from a conviction that information should be free, and my quest to understand technology better has given me hope that we can seize the means of communication and create a better news and information ecosystem.

I have a statement on journalism ethics that outlines how I approach my work, and why I do what I do. You can read that here: ivanadaskalovic.com/on-journal

0
0
0

It's an post!

I live in with my family, my wife @Andrle and our son. We love a lot of the same things — playing and , building with , and reading . is of course a huge influence on us, too. 🖖🏻

I've been since 2015 and like to when I can.

I am a Principal working at in . I love to mentor newer engineers.

0

Hello hello! Made my way back to Mastodon after a while and I'm in a new instance, so may as well do an post.

Hi! I’m Karen. I’m in my late 40s. Bi, liberal, fat, nerdy, tattooed, and married. I live near New Orleans, LA. I work in IT and am working on my degree.

My fave things:

- - both analog and digital, collecting cameras
- music, mostly , electronic, , 80s and 90s alternative

A pink haired woman is taking a selfie and raising her fingers in a peace sign.A purple haired woman stands behind a camera on a tripod, she is raising a finger and looking at someone to the left side.
0
0
0
0

Apparently a state-sponsored group was using Notepad++ update functionality to infect targeted people.

"According to the former hosting provider, the shared hosting server was compromised until September 2, 2025. Even after losing server access, attackers maintained credentials to internal services until December 2, 2025, which allowed them to continue redirecting Notepad++ update traffic to malicious servers."

source: notepad-plus-plus.org/news/hij

0

Signal President Meredith Whittaker warns AI agents embedded in OSes are eroding end-to-end encryption's real-world security, despite its mathematical soundness. With root-like access to messages & data, they bypass E2EE isolation—urgent rethink needed! 🔒🤖❌
cyberinsider.com/signal-presid

0
0
1

It was interesting to read up on the AI assisted code review at lesswrong.com/posts/7aJwgbMEiK

For context: I'm personally responsible for at least 29 curl CVEs. Out of the recent 6 CVEs mentioned in the blog post I found two. This gives me some perspective, I think.

I do not utilise AI tools in my vulnerability research. I am also fiercely critical of harmful proliferation of AI. This is due to the unsustainable way it is currently pushed, and use of as marketing ploy and gimmick rather than producing measurable benefit to users. This leads to negative impacts on economy, education & learning, not to mention impacts to nature due to wasteful use of energy.

This doesn't mean I am against AI. I have written by own AI tooling (fully local RAG with support for arbitrary number of models running on local nodes, implemented in python). I found the usefulness of such tool to be limited at best. It is somewhat useful in mass analysis of large document bases, but the level of analysis is superficial at best. These AI models are after all just language models, and do not have any true understanding or intelligence.

And here is the gist of it: The current tools are not intelligent. Understanding this limitation is the key of successful deployment and utilisation of AI tools. The tools can be useful in certain tasks, but they do not replace true intelligence.

The AI tooling AISLE are developing certainly is one of the better uses of AI, and definitely surpasses all my personal dabbling around it. It is clear that the tool does find vulnerabilities. The key question is how much hallucinations and false positives it produces: If the tool generates thousands of FPs and the true findings are hidden among them this limits the value and usefulness of the tool (of course it doesn't entirely negate it, many tools produce false positives). In short: The quality of the findings is key, and poor signal-to-noise ratio is highly undesirable.

Either way, I think there is a future for AI tools and they definitely will be helpful in vulnerability research.

I personally will keep exercising my wetware for this work, however.

0
0
0

How does your organization view security in the application stack?

71% of leaders find security/app modernization alignment "very easy," enabling them to accelerate AI.

Vote below, then read the report: cfl.re/4k4LrsF

0

RE: mastodon.social/@FirewallDrago

Thank you to @FirewallDragonsFirewalls Don't Stop Dragons for covering the AI age verification bill being considered in the Florida Legislature! Between this and the Florida App Stores Accountability Act, we have our work cut out for us.

If you live in Florida, please call your state legislators and tell them you oppose these age verification bills!

0

Sup , I found my way back!

Here's a new

I live in now, I still *REALLY* love , , , , and

I've still got a Master's degree, but now it's been verified by two countries! I've still got a CISSP. I only have one job finally...

===

Hallo, Fediverse, ich komme gerade zurück!

Es gibt hier ein neues .

Ich wohne jetzt in Berlin, ich liebe noch , , , , und

Ich habe noch einen Masterabschluss, aber jetzt in zwei Ländern verifiziert! Ich habe auch noch mein CISSP. Zuletzt habe ich nur eine Position für Arbeit …

0
0

⚠️🚨 STOP Using Social Media Platform Hootsuite

👉 They Partnered with ICE 👈

"A Hootsuite employee mentioned geolocation, saying the company could drill down to street-level data."
Note: There are Four articles in this post including a Bypass Paywall to the Globe and Mail

"While Hootsuite is based in Canada, it has hundreds of employees globally, including CEO Irina Novoselsky who is based in N.Y City. The company serves major brands like Adobe and Ikea and more .."

h/t @todTod Maffin 🇨🇦 FREE PATREON



theglobeandmail.com/business/a

You will also want to read this link👇

rswebsols.com/news/canadian-ne

Bypass paywall : Globe and Mail Article removepaywalls.com/https://www

Link to Hootsuite website: hootsuite.com/platform/integra

0
0
0

New because I forgot to pin it...

Hello. My name is C64Whiz.

I started out on the when my parents went to a time-share presentation and received a free gift - a Timex 1000 complete with 16K memory expansion box and 3 applications on cassette.

After that, my friend in junior high showed me Summer Games on the which began the begging to my parents for my own .

My parents finally caved, and on the day they got it, we set it up and I wanted to jump right in. My parents said "Not until you practice your violin for 2 hours" and then left for a social function. I did not practice. I sat on that for hours.

When they got home, I confessed I did some amazing things on our new computer instead of the violin. They put me on restriction from the computer for 2 weeks. Totally f'n worth it!!!!

Since then I've been a computer geek/nerd. I worked as a sys-admin for a Novell network, but then did DB programming when the company learned I could code. After that I started teaching and also got a job as a Unix sys-admin which morphed into the /#InfoSec job which I have today (though I do still teach at the university level).

My goal is to get back into complete with making videos (see link in my profile), posting tips/tricks, etc, etc, etc. I'm primarily at the moment but intend on diving into ][, , , , , and more. Unfortunately, I don't have a lot of space or hardware so while I will be doing a few repairs, most of what I do will be software/emulation for now. My hope is to record/document everything from the beginning to be an example for others getting into this hobby.

0
0
0
0
0
0

Cybersecurity for Network and Information Security by Dietmar P.E. Moller, 2026

This book demonstrates how information security requires a deep understanding of organizations assets, threats, and processes, combined with security measures that can best protect their information security. In today’s digital world, a rigorous security approach is central to defend organizations digital systems, networks, and infrastructure resources from malicious threat incidents.


Thus, the book demonstrates how information security requires a deep understanding of organizations assets, threats, and processes, combined with security measures that can best protect their information security. It provides step-by-step guidance on how to analyze organizational processes from a security perspective, while also introducing international security concepts and techniques with their requirements designing security strategies. Hence, this interdisciplinary book is intended for business and technology audiences as a professional book in the context of security trends, principles, methods, techniques, applications and best practices to help the reader mastering the material required defending against malicious threat risk incidents. Organizations must first understand the particular threats that an organization may be prone to, including different types of security attacks, social engineering, and fraud incidents, as well as addressing applicable regulation standards. This international edition covers relevant international security standards for business application sectors and provide security controls and security planning. Security planning includes information security, network and physical security, incident response and metrics, to achieve business continuity, which include data privacy, cloud security, zero trust, secure software requirements and lifecycle, security by design and default, and artificial intelligence in security.
0

The UK needs digital sovereignty to keep our communications, banking, energy, travel and healthcare systems secure.

If we stay dependent on foreign tech firms for our digital infrastructure, the UK risks its independence and resilience.

Sign our petition ⬇️

you.38degrees.org.uk/petitions

0
0
0
0
0
0
0
0

Just published: Apple Health + ChatGPT: The Privacy Tradeoff.

OpenAI’s new ChatGPT Health feature can connect to Apple Health (and even medical records). The convenience is real, but so is the expanded attack surface. With healthcare breaches hitting millions of records, my blunt take is: if you care about privacy, don’t use it. Full stop.

If you do use it anyway, I break down what “not used for training” does and doesn’t mean, why HIPAA isn’t a force field here, and the practical steps to reduce your blast radius.

kylereddoch.me/blog/apple-heal

0

8.18.0 has been released. This release fixes 2 medium and 4 low level vulnerabilities:
- CVE-2025-13034: No QUIC certificate pinning with GnuTLS curl.se/docs/CVE-2025-13034.ht
- CVE-2025-14017: broken TLS options for threaded LDAPS curl.se/docs/CVE-2025-14017.ht
- CVE-2025-14524: bearer token leak on cross-protocol redirect curl.se/docs/CVE-2025-14524.ht
- CVE-2025-14819: OpenSSL partial chain store policy bypass curl.se/docs/CVE-2025-14819.ht
- CVE-2025-15079: libssh global knownhost override curl.se/docs/CVE-2025-15079.ht
- CVE-2025-15224: libssh key passphrase bypass without agent set curl.se/docs/CVE-2025-15224.ht

I discovered the last 2 vulnerabilities.

Download curl 8.18.0 from curl.se/download.html

0
0
0

The UK Cybersecurity Bill is being debated now.

ORG's Programme Manager @JamesBaker is listening in to the goings on with MPs.

Follow this thread for live updates ⬇️

social.openrightsgroup.org/@Ja

0
0

Spies in the Bits and Bytes; The Art of Cyber Threat Intelligence by Atif Ali & Baber Majid Bhatti, 2024

Offers in-depth analysis of cyber threats, cutting-edge defense strategies using AI and machine learning, real-world case studies, accessible insights, and forward-looking perspectives on the future of cyber threats and defense. This book equips readers for the ongoing battle against digital threats.



0
0
0
0

, your go-to place for discussions on the Fediverse and Bluesky, now supports email alerts.

cvecrowd.com

Here's how it works:

- You define one or more alert keywords
- Keywords are matched against vendor, product, and package names from official CVE data
- If a post mentions a CVE that matches one of your keywords, you receive an email notification

Read more below 🧵

0

🔓 Found critical vulns in Taimi (LGBTQ+ dating app) - all fixed, $10k bounty

What I found:

  • "Expiring" videos didn't expire, URLs stayed valid forever
  • Decrement attachment ID = anyone's private videos
  • Location feature bypassed photo permission checks (why upload a map preview image through the photo system??)
  • Fake system messages (made a Raid Shadow Legends sponsorship lol)

The good news: Taimi actually handled this right. Fast response, $10k bounty, everything fixed quickly. No lawyers, no threats.

This is how disclosure should work. Take notes, Lovense.

Full writeup: bobdahacker.com/blog/taimi-idor

0

혹시 여러분은 .NET이 미 국방부(DoD)의 가장 까다로운 보안 가이드라인인 STIG를 100% 충족하는 기술이라는 사실을 알고 계셨나요?

그동안 '군용 수준의 하드닝'은 소수의 전문가만이 막대한 리소스를 투입해 구축할 수 있는 높은 성벽과도 같았습니다. 하지만 이제 Docker와 .NET의 협업으로 탄생한 Docker Hardened Images(DHI)가 그 장벽을 허물었습니다.

🛡️ 왜 .NET 개발자와 기업이 DHI에 주목해야 할까요?

검증된 기술의 정점: .NET은 이미 전 세계 금융과 공공, 국방 분야에서 신뢰받는 플랫폼입니다. DHI는 이 신뢰를 '인증'의 형태로 객관화했습니다.

보안의 민주화: STIG 100% 준수, FIPS 암호화 인증과 같은 최고 등급의 보안 설정을 이제 별도의 복잡한 과정 없이 베이스 이미지 교체만으로 즉시 적용할 수 있습니다.

타협 없는 완결성: 단순히 취약점을 줄이는 수준을 넘어, 설계 단계부터 보안이 내재된(Secure-by-Design) 최상의 인프라를 표준화된 방식으로 공급받게 됩니다.

이제 .NET 개발팀은 "우리 서비스가 얼마나 안전한가?"라는 질문에 대해, "미 국방부 표준을 100% 준수하는 하드닝 기술을 사용하고 있다"는 가장 강력한 답변을 내놓을 수 있습니다.

글로벌 수준의 보안 경쟁력을 확보하고 싶은 .NET 리더와 개발자분들을 위해 상세한 가이드와 인사이트를 공유합니다.

🔗 상세 내용 보기: https://forum.dotnetdev.kr/t/docker-hardened-image-dhi-net/14171

1

This Gmail hack is unsettling not because it’s flashy, but because it’s bureaucratic. Attackers aren’t breaking encryption or outsmarting algorithms. They’re filling out forms. By changing an account’s age and abusing Google’s Family Link feature, they can quietly reclassify an adult user as a “child” and assume parental control. At that point, the rightful owner isn’t hacked so much as administratively erased.

The clever part is that everything happens inside legitimate features. Passwords are changed. Two-factor settings are altered. Recovery options are overwritten. And when the user tries to get back in, Google’s automated systems see a supervised child account and do exactly what they were designed to do: say no.

Google says it’s looking into the issue, which suggests this wasn’t how the system was supposed to work. But it’s a reminder of an old lesson. Security failures often happen when protective mechanisms are combined in ways no one quite imagined. The tools aren’t broken. The assumptions are.

There’s no dramatic fix here, only mildly annoying advice that suddenly feels urgent. Review recovery settings. Lock down account changes. Use passkeys. Because once an attacker controls the recovery layer, proving you’re you can become surprisingly difficult.

TL;DR
🧠 Family safety tools are being weaponized
⚡ Account recovery can be shut down entirely
🎓 Legitimate features enable the lockout
🔍 Prevention matters more than appeals

forbes.com/sites/daveywinder/2

0
0
0

I'm taking 20+ years of experience, ~15 years of screwing around with as a daily driver, and my deep, abiding belief in personal and writing about those topics at between-two-firewalls.com/

You'll laugh, you'll cry, it's better than . (with apologies to David Letterman for that blatant steal)

0
0

This might be a bit of a long shot, but does anyone have some great examples of questions and answers pertaining to and that you'd get, as a company from your clients?

I know in the past I've had clients ask for stuff like longer log or backups retention, etc. but what sorts of questions are usually expected?

Thanks very much in advance and please boost far and wide!

0

Hello, hachyderm.io! I'm Artur Manuel, better known as @amadaluziaArtur Manuel across other platforms.

I've been on Mastodon in the past under @amadaluzia@bsd.cafeArtur Manuel, and recently moved in because I was self-consious about my status as a *BSD user. If you aren't sure who I am from that tag alone, I have a webpage that describes who I am that can be found in the following URL.

amadaluzia.is-a.dev

You should expect long posts from me, as I generally like to write long posts for the sake of detail. If you want short form posts, wait for a while until I have a reason to make a short post, which can be pretty hard to find. Otherwise, you'll at least have something to read. :D

Aside from the basic Mastodon tags, I'll add my interests as well. I hope we can get along!

0
0