FreshRSS

๐Ÿ”’
โŒ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
Today โ€” October 26th 2025Security

This Samsung smart monitor effectively replaced my OLED TV for a week - but there's more to it

The Samsung M90SF is the company's latest OLED smart monitor, and it's got several tricks up its sleeves.

The best 8 gizmos to gift the person who has everything, according to a gadget expert

There's a good chance that there's something on this list for the person who has everything.
Yesterday โ€” October 25th 2025Security

Weekly Update 475

Weekly Update 475

It was the Synthient threat data that ate most of my time this week, and it continues to do so now, the weekend after recording this video. Data like this is equal parts enormously damaging to victims and frustratingly noisy to process. I have to be confident enough that it's new enough, legit enough and impactful enough to justify loading and that the value presented to breach victims sufficiently offsets the inevitable chorus of "what am I meant to do with this, tell me exactly what password was exposed for my record". It's an expensive exercise too; we're currently running an Azure SQL Hyperscale database at 80 cores to analyse the ~2 billion credential stuffing email addresses in this corpus. That's 2 billion unique email addresses too ๐Ÿ˜ฎ More on that in the next video, let's just work out if it's going to go live in the system first.

Weekly Update 475
Weekly Update 475
Weekly Update 475
Weekly Update 475

References

  1. Sponsored by:ย Report URI: Guarding you from rogue JavaScript! Donโ€™t get pwned; get real-time alerts & prevent breaches #SecureYourSite
  2. We poured 183M email addresses from Synthient's threat data collection into HIBP (over 16M of those hadn't been seen by us before)
  3. We're now up to well over 17 billion monthly queries on Pwned Passwords (every month seems to add another billion... or so)
  4. I've had loads of good feedback on the PC build Gist (I've now sent that to a couple of local builders, I'll share the results)

5 ways ambitious IT pros can future-proof their tech careers in an age of AI

Mid-career IT professionals who climb the corporate ladder successfully have a number of things in common. Here's how to smash that glass ceiling.

Amazon Explains How Its AWS Outage Took Down the Web

Plus: The Jaguar Land Rover hack sets an expensive new record, OpenAIโ€™s new Atlas browser raises security fears, Starlink cuts off scam compounds, and more.

MPs urge government to stop Britain's phone theft wave through tech

Committee says Apple, Google, and Samsung could render stolen handsets worthless if compelled to act

The UK's Home Secretary should use her powers to push the tech industry to deploy stronger technical measures against the surge in phone thefts, according to a House of Commons committee.โ€ฆ

I let Edge's Copilot Mode buy me a new space heater - here's how the AI browser did

Microsoft Edge has morphed into a full-fledged AI browser that can even shop for you. So, I put it to the test.

DHS Wants a Fleet of AI-Powered Surveillance Trucks

US border patrol is asking companies to submit plans to turn standard 4x4 trucks into AI-powered watchtowersโ€”combining radar, cameras, and autonomous tracking to extend surveillance on demand.
Before yesterdaySecurity

Get your news from AI? Watch out - it's wrong almost half the time

New research from the European Broadcasting Union and the BBC has found that four leading chatbots routinely generate flawed summaries of news stories.

Pentesting Next.js Server Actions

Next.js server actions present an interesting challenge during penetration tests. These server-side functions appear in proxy tools as POST requests with hashed identifiers like a9fa42b4c7d1 in the Next-Action header, making it difficult to understand what each request actually does. When applications have productionBrowserSourceMaps enabled, this Burp extension NextjsServerActionAnalyzer bridges that gap by automatically mapping these hashes to their actual function names.

During a typical web application assessment, endpoints usually have descriptive names and methods: GET /api/user/1 clearly indicates its purpose. Next.js server actions work differently. They all POST to the same endpoint, distinguished only by hash values that change with each build. Without tooling, testers must manually track which hash performs which actionโ€”a time-consuming process that becomes impractical with larger applications.

The extension's effectiveness stems from understanding how Next.js bundles server actions in production. When productionBrowserSourceMaps is enabled, JavaScript chunks contain mappings between action hashes and their original function names.

The tool simply uses flexible regex patterns to extract these mappings from minified JavaScript.

The extension automatically scans proxy history for JavaScript chunks, identifies those containing createServerReference calls, and builds a comprehensive mapping of hash IDs to function names.

Rather than simply tracking which hash IDs have been executed, it tracks function names. This is important since the same function might have different hash IDs across builds, but the function name will remain constant.

For example, if deleteUserAccount() has a hash of a9f8e2b4c7d1 in one build and b7e3f9a2d8c5 in another, manually tracking these would see these as different actions. The extension recognizes they're the same function, providing accurate unused action detection even across multiple application versions.

A useful feature of the extension is its ability to transform discovered but unused actions into testable requests. When you identify an unused action like exportFinancialData(), the extension can automatically:

  1. Find a template request with proper Next.js headers
  2. Replace the action ID with the unused action's hash
  3. Create a ready-to-test request in Burp Repeater

This removes the manual work of manually creating server action requests.

We recently assessed a Next.js application with dozens of server actions. The client had left productionBrowserSourceMaps enabled in their production environmentโ€”a common configuration that includes debugging information in JavaScript files. This presented an opportunity to improve our testing methodology.

Using the Burp extension, we:

  1. Captured server action requests during normal application usage
  2. Extracted function names from the source maps in JavaScript bundles
  3. Mapped hashes to functions like updateUserProfile() and fetchReportData()
  4. Discovered unused actions that weren't triggered through the UI

The function name mapping transformed our testing approach. Instead of tracking anonymous hashes, we could see that b7e3f9a2 mapped to deleteUserAccount() and c4d8b1e6 mapped to exportUserData(). This clarity helped us create more targeted test cases.

https://github.com/Adversis/NextjsServerActionAnalyzer

submitted by /u/ok_bye_now_
[link] [comments]

Walmart is selling the Nintendo Switch with gray Joy-Con for under $300 right now

Walmart is now selling the infamous Nintendo Switch with gray Joy-Con for under $300. Grab a brand-new Switch this fall for $66 off while you can.

Here's where to get an iPad Pro M4 256GB for the lowest price right now

We found the 11-inch iPad Pro M4 256GB for $100 off at this retailer, less than at Amazon or Walmart - here's how to take advantage of the deal.

OpenAI's latest acquisition could mean more agentic experiences for your Mac

The company just bought the maker of Sky app. MacOS 26 Shortcuts and AI browsers like Perplexity's Comet may have some competition soon.

Shop the 20+ best early Best Buy deals for Black Friday 2025

Black Friday is a month away, but Best Buy already has plenty of savings ready.

Sneaky Mermaid attack in Microsoft 365 Copilot steals data

Redmond says it's fixed this particular indirect prompt injection vuln

updated Microsoft fixed a security hole in Microsoft 365 Copilot that allowed attackers to trick the AI assistant into stealing sensitive tenant data โ€“ like emails โ€“ via indirect prompt injection attacks.โ€ฆ

Best early Black Friday iPad deals 2025: 9 sales out already

Looking to find a deal on an iPad this holiday season? There are plenty of early Black Friday deals on the iPad Pro, iPad Mini, and more live now.

Smishing Triad Linked to 194,000 Malicious Domains in Global Phishing Operation

The threat actors behind a large-scale, ongoing smishing campaign have been attributed to more than 194,000 malicious domains since January 1, 2024, targeting a broad range of services across the world, according to new findings from Palo Alto Networks Unit 42. "Although these domains are registered through a Hong Kong-based registrar and use Chinese nameservers, the attack infrastructure is

Did your Windows PC crash? 6 solutions I can always rely on to fix my computer

Don't panic, there are easy ways to recover from the BSOD and get your PC running smoothly again.

Internet bill too high? Verizon's new plan starts at $20/month - here's who qualifies

Designed for use outside 5G or fiber areas, Home Internet Lite provides unlimited data and download speeds of up to 25 Mbps. Here's everything you need to know.

Windows 11's Snipping Tool just got a Google Lens-like feature - here's how to use it

The Snipping Tool's new visual search engine can analyze and identify the object that you've selected. See how it works.

Alibaba's new smart glasses take on Meta Ray-Bans - here's what they offer

Pre-orders for the Quark AI smart glasses are now open.

Newly Patched Critical Microsoft WSUS Flaw Comes Under Active Exploitation

Microsoft on Thursday released out-of-band security updates to patch a critical-severity Windows Server Update Service (WSUS) vulnerability with a proof-of-concept (Poc) exploit publicly available and has come under active exploitation in the wild. The vulnerability in question is CVE-2025-59287 (CVSS score: 9.8), a remote code execution flaw in WSUS that was originally fixed by the tech giant

Get Surfshark VPN and antivirus for $2.19 a month with this early Black Friday deal

Black Friday arrives early with a substantial discount on Surfshark's premium VPN plan, which comes with VPN access, antivirus, a data breach scanner, and more.

Finally, a power bank that quickly charges my MacBook Pro (and is safe for flights)

With a massive 27,650mAh capacity, the Rapid Pro pushes the limit of what you can take on a plane - it's as big as power banks get.

Missed out on Meta Ray-Ban Display? Verizon is selling the smart glasses now, but act fast

You'll still have to demo before buying the Meta glasses, but it's another chance for those who missed the first wave of sales.

APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign

A Pakistan-nexus threat actor has been observed targeting Indian government entities as part of spear-phishing attacks designed to deliver a Golang-based malware known as DeskRAT. The activity, observed in August and September 2025 by Sekoia, has been attributed to Transparent Tribe (aka APT36), a state-sponsored hacking group known to be active since at least 2013. It also builds upon a prior

Why open source may not survive the rise of generative AI

Generative AI may be eroding the foundation of open source software. Provenance, licensing, and reciprocity are breaking down.

Are AI browsers worth the security risk? Why experts are worried

There are a lot of 'what ifs' surrounding AI browsers right now.

Microsoft drops surprise Windows Server patch before weekend downtime

You didn't have plans, did you?

Microsoft has released an out-of-band update to patch a critical vulnerability in Windows Server Update Services (WSUS).โ€ฆ

SSE That Thinks in Identity and Adapts Access

Identity doesnโ€™t stay still. Trust shifts. Behavior fluctuates. Posture changes. Cisco Secure Access leverages rich data from identity, behaviors, and devices.

Digital ID is now less about illegal working, more about rummaging through drawers

Starmer rebrands unpopular scheme as convenience tool after backlash

UK Prime Minister Keir Starmer has relaunched his digital ID scheme as something that will make people's lives easier, less than four weeks after announcing it as a measure to tackle illegal working.โ€ฆ

The Cybersecurity Perception Gap: Why Executives and Practitioners See Risk Differently

By: Unknown
Does your organization suffer from a cybersecurity perception gap? Findings from theย Bitdefender 2025 Cybersecurity Assessment suggest the answer is probably โ€œyesโ€ โ€” and many leaders may not even realize it. This disconnect matters. Small differences in perception today can evolve into major blind spots tomorrow. After all, perception influences what organizations prioritize, where they

3,000 YouTube Videos Exposed as Malware Traps in Massive Ghost Network Operation

A malicious network of YouTube accounts has been observed publishing and promoting videos that lead to malware downloads, essentially abusing the popularity and trust associated with the video hosting platform for propagating malicious payloads. Active since 2021, the network has published more than 3,000 malicious videos to date, with the volume of such videos tripling since the start of the

Transferring to eSIM? I expected a nightmare, but this carrier proved me wrong

Transferring your phone number can be a mess, especially if you're going from iPhone to Android. Here's how I flipped the script.

Shield AI shows off not-at-all-terrifying autonomous VTOL combat drone

Runways? Where we're going, we don't need runways

US defense technology biz Shield AI claims it can build a jet-powered vertical take-off and landing (VTOL) autonomous fighter drone that doesn't need a runway to operate.โ€ฆ

Self-Spreading 'GlassWorm' Infects VS Code Extensions in Widespread Supply Chain Attack

Cybersecurity researchers have discovered a self-propagating worm that spreads via Visual Studio Code (VS Code) extensions on the Open VSX Registry and the Microsoft Extension Marketplace, underscoring how developers have become a prime target for attacks. The sophisticated threat, codenamed GlassWorm by Koi Security, is the second such supply chain attack to hit the DevOps space within a span

Iran's MuddyWater wades into 100+ government networks in latest spying spree

Group-IB says Tehran-linked crew used hijacked mailbox and VPN to sling phishing emails across Middle East

Iran's favorite muddy-footed cyberespionage crew is at it again, this time breaching more than 100 government entities across the Middle East and North Africa, according to researchers at Group-IB.โ€ฆ

This $300 Android phone is the complete opposite of my Google Pixel - here's why I still love it

If you're looking for a phone that is as rugged as a tank, but performs more like a Chevy Supersport, Oukitel might have one just for you.

Cyber exec with lavish lifestyle charged with selling secrets to Russia

The 0-days have left the building

Federal prosecutors have charged a former general manager of US government defense contractor L3Harris's cyber arm Trenchant with selling secrets to an unidentified Russian buyer for $1.3 million.โ€ฆ

How Hacked Card Shufflers Allegedly Enabled a Mob-Fueled Poker Scam That Rocked the NBA

WIRED recently demonstrated how to cheat at poker by hacking the Deckmate 2 card shufflers used in casinos. The mob was allegedly using the same trick to fleece victims for millions.

Playtimeโ€™s over: Crooks swipe Toys R Us Canada customer data and dump it online

What?! No complimentary credit monitoring?

The Canadian outpost of retailer Toys R Us on Thursday notified customers that attackers accessed a database, stole some of their personal information, then posted the data online.โ€ฆ

These users now prefer Gemini over ChatGPT - here's why

OpenAI still dominates the market, but new data shows Google's chatbot has been making impressive gains. We asked users why they prefer Gemini over the competition.

Is this the best Apple Watch band yet? I've tested hundreds, and this one checks all the boxes

The Nomad Stratos Band might just be my favorite Apple Watch band of all time. Here's why.

I tried Snapchat's new AI image lens, and the results were surprisingly good

Snapchat's image-generation lens is free to try in the US now. Here's how to find it, plus my tips for getting the best results.

Walmart is selling $150 Beats headphones for a limited time - and I highly recommend them

The Beats Solo 4 bring upgraded sound and refined style while keeping the signature qualities that made the lineup so popular.

How a programmer got Doom to run on a space satellite and what happened next

The first-person shooter is famous for being ported to almost every computer on the planet. Now, we know it can run off the Earth as well.

Claude is getting one of ChatGPT's most helpful features - here's who can try it

Anthropic's Memory feature aims to create a more personalized experience while prioritizing user control.

Don't be fooled by this massive YouTube scam network - how to protect yourself

Researchers say it is 'one of the largest malware operations seen on YouTube.'

Microsoft gives Copilot a 'real talk' upgrade - and an (optional) cartoon face

In the massive Copilot Fall Release, Microsoft is unveiling a flurry of AI-powered features, including large group chat support, a chatbot to help you find credible medical information, and a Clippy-esque cartoon blob you can talk to.

Not sure what to buy? Amazon's latest shopping tool can help you decide - here's how it works

The AI-driven feature takes your shopping history and preferences into account.

OpenAI is already planning updates to Atlas - here's what we know so far

Taking on Google's and Microsoft's browser dominance, OpenAI is swiftly trying to catch up with these Atlas upgrades.

Trump's workforce cuts blamed as America's cyber edge dulls

The Cyberspace Solarium Commission says years of progress are being undone amid current administration's cuts

America's once-ambitious cyber defences are starting to rust, according to the latest annual report from the US Cyberspace Solarium Commission (CSC), which warns that policy momentum has slowed and even slipped backwards thanks to Trump-era workforce and budget cuts.โ€ฆ

ChatGPT was down Thursday - what we know about the outage

It's not just ChatGPT. Other services, including Grok, appear to be experiencing outages today.

North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets

Threat actors with ties to North Korea have been attributed to a new wave of attacks targeting European companies active in the defense industry as part of a long-running campaign known as Operation Dream Job. "Some of these [companies] are heavily involved in the unmanned aerial vehicle (UAV) sector, suggesting that the operation may be linked to North Korea's current efforts to scale up its

The best AI chatbots of 2025: ChatGPT, Copilot, and others worth trying

We pushed eight free AI chatbots to their limits, from writing stories to generating images. See which ones scored high marks and which failed to keep up.
โŒ