Aggregator
Weekly Update 481
Twelve years (and one day) since launching Have I Been Pwned, it's now a service that Charlotte and I live and breathe every day. From the first thing every morning to the last thing each day, from holidays to birthdays, in sickness and in heal... wait a minute
Миф о юных гениях разрушен. Реальный хакер — это ваш 40-летний сосед
在拉斯维加斯,我看到了体育的未来
Breach Roundup: React Flaw Incites Supply Chain Risk
This week, the React flaw, a belated Windows fix, Defense Secretary Pete Hegseth's Signal group posed operational risk, more North Korean npm packages. An Australian jailed for Wi-Fi "evil twin" crimes. The US FTC will send $15.3 million to Avast users. A London council said attackers stole data.
Brickstorm Malware Hits US Critical Systems, CISA Warns
U.S. and Canadian cyber authorities say Chinese state-backed actors used a backdoor dubbed BRICKSTORM to maintain long-term access into critical infrastructure, exploiting VMware environments to exfiltrate credentials and evade detection through encrypted covert channels.
HHS Outlines AI Road Map Amid Major Department Overhaul
The U.S. Department of Health and Human Services on Thursday unveiled "version 1" of a strategic plan to implement artificial intelligence as a "practical layer" across the department and its agencies aimed at helping to break down silos, improve collaboration and increase efficiencies.
UK Government Considers Computer Misuse Act Revision
The U.K. government is considering amending its three-decade-old hacking law to include a "statutory defense" cover for security researchers. The announcement comes amid concerns that the law penalizes white hat hackers for essential security practices.
Splunk Enterprise Vulnerabilities Allows Privileges Escalation Via Incorrect File Permissions
A high-severity vulnerability has been disclosed in Splunk affecting its Enterprise and Universal Forwarder products for Windows, stemming from incorrect file permissions during installation and upgrades. The vulnerability, tracked as CVE-2025-20386 for Splunk Enterprise and CVE-2025-20387 for Universal Forwarder. Allows non-administrator users to access sensitive installation directories and their contents, creating a pathway for privilege […]
The post Splunk Enterprise Vulnerabilities Allows Privileges Escalation Via Incorrect File Permissions appeared first on Cyber Security News.
SEEDSNATCHER Android Malware Attacking Users to Exfiltrate Sensitive Data and Execute Malicious Commands
SeedSnatcher represents a significant threat to cryptocurrency users worldwide. Packaged under the seemingly innocent name “Coin” and distributed through Telegram, this Android malware has emerged as a sophisticated tool designed specifically to steal digital wallet recovery codes and execute remote commands on infected devices. The malware, registered under the package name com.pureabuladon.auxes, operates as a […]
The post SEEDSNATCHER Android Malware Attacking Users to Exfiltrate Sensitive Data and Execute Malicious Commands appeared first on Cyber Security News.
Не баг, а фича от дяди Си — новый китайский бэкдор в сетях США не лечится перезагрузкой и ворует всё подряд
Building the missing layers for an internet of agents
Cybersecurity teams are starting to think about how large language model agents might interact at scale. A new paper from Cisco Research argues that the current network stack is not prepared for this shift. The work proposes two extra layers on top of the application transport layer to help agents communicate in a structured way and agree on shared meaning before they act. Traditional OSI stack and our proposed network stack for agentic applications. We … More →
The post Building the missing layers for an internet of agents appeared first on Help Net Security.
俄罗斯屏蔽苹果 FaceTime 和游戏平台 Roblox
Netflix 接近收购 HBO
Один язык для описания всех сил природы: группы Ли объясняют реальность целиком от гравитации до квантовой физики
国家计算机病毒应急处理中心检测发现69款违法违规收集使用个人信息的移动应用
安卓电视YouTube客户端SmartTube遭入侵 恶意更新强制推送
What security leaders should watch for when companies buy or sell a business
In this Help Net Security video, Lane Sullivan, SVP, CISO and Strategy Officer at Concentric AI, explains what security leaders should think about during mergers, acquisitions, and divestitures. Sullivan talks about the types of risk an acquiring company can take on, including cyber exposure, compliance duties, and past governance decisions. He outlines why data handling matters throughout the process, from deciding what should move to keeping records of how data was sent and received. The … More →
The post What security leaders should watch for when companies buy or sell a business appeared first on Help Net Security.