FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
Today β€” February 14th 2026Your RSS feeds
Yesterday β€” February 13th 2026Your RSS feeds

I built a vulnerable AI banking CTFβ€”5 flags covering prompt injection techniques (write-up in comments)

Full context: I built SecureBank AI Assistant, a deliberately vulnerable AI banking chatbot powered by Groq's Llama 3 70B.

5 exploitation techniques. 100% success rate against standard protections.

Flags cover:

  1. System prompt extraction

  2. Content filter bypass

  3. Function calling abuse

  4. Persistent backdoor injection

  5. RAG document poisoning

CTF challenge to practice: github.com/oussamaafnakkar/AccessDenied

Try it, break it, learn from it.

submitted by /u/Sad_Professor_518
[link] [comments]

Got a TCL TV? Change these 16 settings ASAP - here's why

Your TCL TV's default settings aren't that great. A few quick changes can make a suprising difference at home.

Why my favorite Linux distro is slowing down - and I'm thrilled about it

Linux Mint release cycles are changing: Here's why and when to expect the next one.

Attackers finally get around to exploiting critical Microsoft bug from 2024

As if admins haven't had enough to do this week

Ignore patches at your own risk. According to Uncle Sam, a SQL injection flaw in Microsoft Configuration Manager patched in October 2024 is now being actively exploited, exposing unpatched businesses and government agencies to attack.…

Looking for an OLED laptop with great battery life? Here's one I recommend

Asus' Vivobook S15 has a vivid OLED display and an excellent battery for a competitive price during Presidents' Day sales.

Want off-grid Starlink Mini? This power bank kept mine online for hours

No AC outlet? No problem with the XTAR-Link MP158 power bank, made especially for the Starlink Mini.

Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs

A previously undocumented threat actor has been attributed to attacks targeting Ukrainian organizations with malware known as CANFAIL. Google Threat Intelligence Group (GTIG) described the hack group as possibly affiliated with Russian intelligence services. The threat actor is assessed to have targeted defense, military, government, and energy organizations within the Ukrainian regional and

Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations

Several state-sponsored actors, hacktivist entities, and criminal groups from China, Iran, North Korea, and Russia have trained their sights on the defense industrial base (DIB) sector, according to findings from Google Threat Intelligence Group (GTIG). The tech giant's threat intelligence division said the adversarial targeting of the sector is centered around four key themes: striking defense

UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors

A previously unknown threat actor tracked as UAT-9921 has been observed leveraging a new modular framework called VoidLink in its campaigns targeting the technology and financial services sectors, according to findings from Cisco Talos. "This threat actor seems to have been active since 2019, although they have not necessarily used VoidLink over the duration of their activity," researchers Nick

The secret to AI job security? Stop stressing and pivot at work now - here's how

Professionals are fearful about how AI is reshaping their work. Here's how to feel more comfortable in a fast-changing workplace.

Top Dutch telco Odido admits 6.2M customers caught in contact system caper

Names, addresses, bank account numbers accessed – but biz insists passwords and call data untouched

The Netherlands' largest mobile network operator (MNO) has admitted that a breach of its customer contact system may have affected around 6.2 million people.…

Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History

Cybersecurity researchers have discovered a malicious Google Chrome extension that's designed to steal data associated with Meta Business Suite and Facebook Business Manager. The extension, named CL Suite by @CLMasters (ID: jkphinfhmfkckkcnifhjiplhfoiefffl), is marketed as a way to scrape Meta Business Suite data, remove verification pop-ups, and generate two-factor authentication (2FA) codes.

I've been reviewing laptops for years - these older models work great and will save you money

Even as newer models hit the market, these previous-model laptops deliver reliable performance and exceptional value - and some of them are on sale for Presidents' Day.

npm’s Update to Harden Their Supply Chain, and Points to Consider

By: Unknown
In December 2025, in response to the Sha1-Hulud incident, npm completed a major authentication overhaul intended to reduce supply-chain attacks. While the overhaul is a solid step forward, the changes don’t make npm projects immune from supply-chain attacks. npm is still susceptible to malware attacks – here’s what you need to know for a safer Node community. Let’s start with the original

This futuristic robot vacuum and mop changed how I clean my floors - here's how

The Mova Mobius 60 is one of those cool inventions you see at trade shows, and can now have in your house.

Researchers Observe In-the-Wild Exploitation of BeyondTrust CVSS 9.9 Vulnerability

Threat actors have started to exploit a recently disclosed critical security flaw impacting BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) products, according to watchTowr. "Overnight we observed first in-the-wild exploitation of BeyondTrust across our global sensors," Ryan Dewhurst, head of threat intelligence at watchTowr, said in a post on X. "Attackers are abusing

Spotify vs. YouTube Music: I paid for both services, and this one gave me better value

Spotify and YouTube Music offer different streaming experiences, so here's what you should know before subscribing.

Enforcing piracy policy earned helpdesk worker death threats

Years later, he read about his antagonist doing time for murder

On Call Welcome to another installment of On Call, The Register's weekly reader-contributed column that tells your tech support tales.…

Naming and shaming: How ransomware groups tighten the screws on victims

When corporate data is exposed on a dedicated leak site, the consequences linger long after the attack fades from the news cycle

One of the best privacy upgrades you can give to your laptop costs less than you think

Privacy screens like this one by StarTech block the visibility of your laptop's display outside a 60-degree angle. See it in action.

The wireless charger I recommend to hardcore Apple fans costs just $20 (but can do a lot)

Forget traveling with multiple chargers. Here's why I charge my iPhone, Apple Watch, and AirPods with the InfinaCore T3.

Own a smart TV? These 13 features can dramatically improve your performance - here's how

Smart TVs are basically computers now, with their own hidden hacks, tips, and tricks. Here are a few I use to get the most out of my TV.

AI isn't getting smarter, it's getting more power hungry - and expensive

Frontier models such as OpenAI's GPT depend mostly on increasing computing power rather than smarter algorithms, according to a new MIT report. Here's why that matters.

Atomic vs. immutable Linux: Why choose one when these nine distros offer both?

If immutable and atomic distributions are the path forward for Linux, how do you choose? Maybe you don't have to. I break it all down.

Capture the Flag (CTF) AWS/SANS

Over $1100 worth of prizes:

Prizes

Top performers will earn no-cost access to SANS training for further cyber skills development, including four prize categories:

Prize Category Prize
Overall top finishers 1-3 A license to SEC401, Security Essentials
Overall top finishers 4-6 A license to SEC480, AWS Secure Builder
Overall top finishers 7-9 A license to SEC495, Leveraging LLMs
Regional top 20 finishers (per country) 6-month access to SANS SkillQuests by NetWars

The event is open to all students from participating AWS Skills to Jobs Tech Alliance institutions across the US, Latin America, Europe and Asia-Pacific regions.

submitted by /u/Successful_Clock2878
[link] [comments]

30+ Chrome extensions disguised as AI chatbots steal users' API keys, emails, other sensitive data

Are you a good bot or a bad bot?

More than 30 malicious Chrome extensions installed by at least 260,000 users purport to be helpful AI assistants, but they steal users' API keys, email messages, and other personal data. Even worse: many of these are still available on the Chrome Web Store as of this writing.…

Before yesterdayYour RSS feeds

Who's the bossware? Ransomware slingers like employee monitoring tools, too

As if snooping on your workers wasn't bad enough

Your supervisor may like using employee monitoring apps to keep tabs on you, but crims like the snooping software even more. Threat actors are now using legit bossware to blend into corporate networks and attempt ransomware deployment.…

OpenAI's new Spark model codes 15x faster than GPT-5.3-Codex - but there's a catch

OpenAI's new GPT-5.3-Codex-Spark promises ultra-fast, conversational AI coding, if you can tolerate a few trade-offs.

Google Reports State-Backed Hackers Using Gemini AI for Recon and Attack Support

Google on Thursday said it observed the North Korea-linked threat actor known as UNC2970 using its generative artificial intelligence (AI) model Gemini to conduct reconnaissance on its targets, as various hacking groups continue to weaponize the tool for accelerating various phases of the cyber attack life cycle, enabling information operations, and even conducting model extraction attacks. "The

An unlikely AirPods rival just launched with features I've yet to see on mainstream earbuds

LG announced its latest will.i.am collab, the Xboom Buds Plus, and they're cool for reasons beyond their audio.

My 5 favorite Discord alternatives - no ID verification required

If you want to take a stand against facial scans, check out my favorite Discord alternative platforms.

Claude's free tier just got 4 Pro features - is the $20 subscription still worth it?

Anthropic has doled out four cool perks to free users, all of which were previously available only for paid subscribers.

The $3,500 Apple Vision Pro is finally getting an official YouTube app - and it's about time

Whether it was Google's doing, Apple's, or both, you can now watch your usual YouTube content in visionOS, no strings attached.

Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems

Cybersecurity researchers have discovered a fresh set of malicious packages across npm and the Python Package Index (PyPI) repository linked to a fake recruitment-themed campaign orchestrated by the North Korea-linked Lazarus Group. The coordinated campaign has been codenamed graphalgo in reference to the first package published in the npm registry. It's assessed to be active since May 2025. "

Your LG TV is getting a big brightness boost for free - these older models included

The update makes popular OLED TVs play Dolby Vision content a lot more vividly.

I thought replacing my AirTag battery with a rechargeable one was a good idea - it wasn't

It might seem like you're saving money and helping the environment, but you're not.

These 4 critical AI vulnerabilities are being exploited faster than defenders can respond

From prompt injection to deepfake fraud, security researchers say several flaws have no known fix. Here's what to know about them.

This mini 4K webcam has quickly replaced my MacBook camera for every purpose

The PTZ webcam from Obsbot packs a punch in a tiny package. But you'll have to be willing to pay to play.

I would easily replace my AirPods for Sony's XM6 earbuds - if it weren't for one unavoidable issue

Sony returns with the WF-1000XM6 flagship earbuds, and they compete with their predecessor as much as they do with Apple and Bose.

Sony WF-1000XM6 vs. Apple AirPods Pro 3: I listened to both earbuds, and this pair wins

The battle of ecosystems is at the center, but these factors matter, too. Here's my verdict.

I listened to Sony and Bose's flagship earbuds in 2026 - and the winner came down to this

Between the latest Sony WF-1000XM6 and Bose QuietComfort Ultra Earbuds 2, here's which pair you should buy - and why.

Apple patches decade-old iOS zero-day, possibly exploited by commercial spyware

Flaw abused 'in an extremely sophisticated attack against specific targeted individuals'

Apple patched a zero-day vulnerability affecting every iOS version since 1.0, used in what the company calls an "extremely sophisticated attack" against targeted individuals.…

Crypto-Funded Human Trafficking Is Exploding

The use of cryptocurrency in sales of human beings for prostitution and scam compounds nearly doubled in 2025, according to a conservative estimate. Many of the deals are happening in plain sight.

Accelerate Security Operations with Cisco’s New Security-Tuned Model

Explore a new frontier in LLM quality and speed. Cisco’s Foundation-Sec model delivers high-performance AI summaries for Splunk Security Operations workflows.

This free MacOS app is the secret to getting more out of your local AI models

You should consider using Reins if you're a fan of using local LLMs on MacOS.

Supply chain attacks now fuel a 'self-reinforcing' cybercrime economy

Researchers say breaches link identity abuse, SaaS compromise, and ransomware into a cascading cycle

Cybercriminals are turning supply chain attacks into an industrial-scale operation, linking breaches, credential theft, and ransomware into a "self-reinforcing" ecosystem, researchers say.…

I kept finding security issues in AI-generated code, so I built a scanner for it

Lately I've been using Al tools (Cursor / Anti gravity/ etc.) to prototype faster.

It's amazing for speed, but I noticed something

uncomfortable, a lot of the generated code had subtle security problems.

Examples I kept seeing:

Hardcoded secrets

  • Missing auth checks

Risky API routes

Potential IDOR patterns

So I built a small tool called CodeArmor Al that scans repos and PRs and classifies issues as:

Definite Vulnerabilities

Potential Risks (context required)

It also calculates a simple security score and PR risk delta. Not trying to replace real audits - more like a "sanity layer" for fast-moving / Al-heavy projects.

If anyone's curious or wants to roast it

Would genuinely love feedback from real devs

submitted by /u/AdnanBasil
[link] [comments]

Finally, I found a MagSafe power bank that's fit for traveling (and fancy dinners)

Twelve South's thin and light Power Capsule is textured in cactus leather and available in 5k or 10k mAh capacities.

ThreatsDay Bulletin: AI Prompt RCE, Claude 0-Click, RenEngine Loader, Auto 0-Days & 25+ Stories

Threat activity this week shows one consistent signal β€” attackers are leaning harder on what already works. Instead of flashy new exploits, many operations are built around quiet misuse of trusted tools, familiar workflows, and overlooked exposures that sit in plain sight. Another shift is how access is gained versus how it’s used. Initial entry points are getting simpler, while post-compromise

The CTEM Divide: Why 84% of Security Programs Are Falling Behind

By: Unknown
A new 2026 market intelligence study of 128 enterprise security decision-makers (available here) reveals a stark divide forming between organizations – one that has nothing to do with budget size or industry and everything to do with a single framework decision. Organizations implementing Continuous Threat Exposure Management (CTEM) demonstrate 50% better attack surface visibility, 23-point

This SSD enclosure is the most underrated accessory in my laptop bag - here's how I use it

The HyperDrive Next USB4 M.2 PCIe enclosure lets NVMe SSDs perform at their best, ensuring fast transfer speeds for large files.

Feeling brave? Ministry of Defence seeks Β£300K digital boss to manage Β£4.6B spend

Whoever gets it will steer UK department's IT, AI strategy, and megabucks vendor deals

The UK Ministry of Defence (MoD) is offering between Β£270,000 to Β£300,000 for a senior digital leader who will oversee more than Β£4.6 billion in spending and more than 3,000 specialist staff.…

No Legs, No Problem: Dumping BGA MCP NAND Flash

In an attempt to sharpen my hardware hacking skills, I took on the challenge of extracting firmware off a flip phone πŸ“±.

But... I kind of underestimated my opponent:

- No trace of the firmware online

- No OTA updates

- Debug interface nowhere to be found

- The chip holding the firmware has no legs

Quite the challenge.
I ended up dead-bugging the chip and wiring it to the Xgecu T48 Flash programmer.
Enjoy!

submitted by /u/fatpengoo
[link] [comments]
❌