FreshRSS

🔒
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ ☆ ✇ ZDNet | security RSS

12+ laptop accessories that I recommend to both students and professionals

— September 9th 2025 at 07:10
These accessories can turn your basic laptop setup into an exceptional one (and you don't have to spend an arm and a leg).
☐ ☆ ✇ ZDNet | security RSS

This Fedora spin is perfect for one particular kind of new Linux user

— September 9th 2025 at 07:00
With Windows 10 support ending, you might be looking for an alternative. If you like the idea of Fedora, but are afraid it isn't user-friendly enough, Nobara has your back.
☐ ☆ ✇ The Register - Security

UK toughens Online Safety Act with ban on self-harm content

— September 9th 2025 at 06:29

Charities welcome change, but critics warn the law is already too broad

Tech companies will be legally required to prevent content involving self-harm from appearing on their platforms – rather than responding and removing it – in a planned amendment to the UK's controversial Online Safety Act.…

☐ ☆ ✇ The Hacker News

20 Popular npm Packages With 2 Billion Weekly Downloads Compromised in Supply Chain Attack

By: Ravie Lakshmanan — September 9th 2025 at 06:13
Multiple npm packages have been compromised as part of a software supply chain attack after a maintainer's account was compromised in a phishing attack. The attack targeted Josh Junon (aka Qix), who received an email message that mimicked npm ("support@npmjs[.]help"), urging them to update their update their two-factor authentication (2FA) credentials before September 10, 2025, by clicking on
☐ ☆ ✇ The Register - Security

Forget disappearing messages – now Signal will store 100MB of them for you for free

— September 9th 2025 at 03:33

Including messages sent to users, a potential problem for the privacy-conscious

Encrypted messaging app Signal is rolling out a free storage system for its users, with extra space if folks are willing to pay for it.…

☐ ☆ ✇ WIRED

Massive Leak Shows How a Chinese Company Is Exporting the Great Firewall to the World

By: Zeyi Yang — September 9th 2025 at 03:00
Geedge Networks, a company with ties to the founder of China’s mass censorship infrastructure, is selling its censorship and surveillance systems to at least four other countries in Asia and Africa.
☐ ☆ ✇ ZDNet | security RSS

How to undo OneDrive Backup and restore your personal files to your Windows 11 PC

— September 9th 2025 at 02:30
Microsoft is getting more aggressive about insisting that you use its OneDrive cloud for your Windows 11 and Microsoft 365 files. If you'd prefer to keep those files out of the cloud, follow these step-by-step instructions.
☐ ☆ ✇ ZDNet | security RSS

Traveling soon? 5 simple ways I thwart phone thieves - and you can too

— September 9th 2025 at 02:00
Phone theft is on the rise. Here are a few simple but effective things anyone can do to protect their device while on the go.
☐ ☆ ✇ ZDNet | security RSS

Apple is playing a dangerous game with the iPhone 17 - and it might just pay off

— September 9th 2025 at 01:23
The iPhone is getting its biggest shakeup since the Mini was introduced in 2020. How will consumers respond?
☐ ☆ ✇ The Hacker News

45 Previously Unreported Domains Expose Longstanding Salt Typhoon Cyber Espionage

By: Ravie Lakshmanan — September 9th 2025 at 00:27
Threat hunters have discovered a set of previously unreported domains, some going back to May 2020, that are associated with China-linked threat actors Salt Typhoon and UNC4841. "The domains date back several years, with the oldest registration activity occurring in May 2020, further confirming that the 2024 Salt Typhoon attacks were not the first activity carried out by this group," Silent Push
☐ ☆ ✇ ZDNet | security RSS

Signal lets you back up your chats for free now - plus its first-ever paid feature

— September 8th 2025 at 23:36
The new backup feature is opt-in. But there's a catch to that.
☐ ☆ ✇ The Register - Security

WhatsApp's former security boss claims reporting infosec failings led to ousting

— September 8th 2025 at 23:36

Meta shrugs off allegations of improper dismissal, ignoring privacy and security

WhatsApp's former head of security, Attaullah Baig, has filed a lawsuit against its parent company, Meta, alleging that the social media megalith retaliated against him for reporting security failings that violated legal commitments.…

☐ ☆ ✇ ZDNet | security RSS

New 3D mapping tech goes way beyond GPS to let us see the earth in ways never before possible

— September 8th 2025 at 23:26
Project Orbion brings together several cutting edge technologies to create a digital twin of the planet that will enable geospatial vision like we've never seen before.
☐ ☆ ✇ Krebs on Security

18 Popular Code Packages Hacked, Rigged to Steal Crypto

By: BrianKrebs — September 8th 2025 at 22:53

At least 18 popular JavaScript code packages that are collectively downloaded more than two billion times each week were briefly compromised with malicious software today, after a developer involved in maintaining the projects was phished. The attack appears to have been quickly contained and was narrowly focused on stealing cryptocurrency. But experts warn that a similar attack with a slightly more nefarious payload could lead to a disruptive malware outbreak that is far more difficult to detect and restrain.

This phishing email lured a developer into logging in at a fake NPM website and supplying a one-time token for two-factor authentication. The phishers then used that developer’s NPM account to add malicious code to at least 18 popular JavaScript code packages.

Aikido is a security firm in Belgium that monitors new code updates to major open-source code repositories, scanning any code updates for suspicious and malicious code. In a blog post published today, Aikido said its systems found malicious code had been added to at least 18 widely-used code libraries available on NPM (short for) “Node Package Manager,” which acts as a central hub for JavaScript development and the latest updates to widely-used JavaScript components.

JavaScript is a powerful web-based scripting language used by countless websites to build a more interactive experience with users, such as entering data into a form. But there’s no need for each website developer to build a program from scratch for entering data into a form when they can just reuse already existing packages of code at NPM that are specifically designed for that purpose.

Unfortunately, if cybercriminals manage to phish NPM credentials from developers, they can introduce malicious code that allows attackers to fundamentally control what people see in their web browser when they visit a website that uses one of the affected code libraries.

According to Aikido, the attackers injected a piece of code that silently intercepts cryptocurrency activity in the browser, “manipulates wallet interactions, and rewrites payment destinations so that funds and approvals are redirected to attacker-controlled accounts without any obvious signs to the user.”

“This malware is essentially a browser-based interceptor that hijacks both network traffic and application APIs,” Aikido researcher Charlie Eriksen wrote. “What makes it dangerous is that it operates at multiple layers: Altering content shown on websites, tampering with API calls, and manipulating what users’ apps believe they are signing. Even if the interface looks correct, the underlying transaction can be redirected in the background.”

Aikido said it used the social network Bsky to notify the affected developer, Josh Junon, who quickly replied that he was aware of having just been phished. The phishing email that Junon fell for was part of a larger campaign that spoofed NPM and told recipients they were required to update their two-factor authentication (2FA) credentials. The phishing site mimicked NPM’s login page, and intercepted Junon’s credentials and 2FA token. Once logged in, the phishers then changed the email address on file for Junon’s NPM account, temporarily locking him out.

Aikido notified the maintainer on Bluesky, who replied at 15:15 UTC that he was aware of being compromised, and starting to clean up the compromised packages.

Junon also issued a mea culpa on HackerNews, telling the community’s coder-heavy readership, “Hi, yep I got pwned.”

“It looks and feels a bit like a targeted attack,” Junon wrote. “Sorry everyone, very embarrassing.”

Philippe Caturegli, “chief hacking officer” at the security consultancy Seralys, observed that the attackers appear to have registered their spoofed website — npmjs[.]help — just two days before sending the phishing email. The spoofed website used services from dnsexit[.]com, a “dynamic DNS” company that also offers “100% free” domain names that can instantly be pointed at any IP address controlled by the user.

Junon’s mea cupla on Hackernews today listed the affected packages.

Caturegli said it’s remarkable that the attackers in this case were not more ambitious or malicious with their code modifications.

“The crazy part is they compromised billions of websites and apps just to target a couple of cryptocurrency things,” he said. “This was a supply chain attack, and it could easily have been something much worse than crypto harvesting.”

Akito’s Eriksen agreed, saying countless websites dodged a bullet because this incident was handled in a matter of hours. As an example of how these supply-chain attacks can escalate quickly, Eriksen pointed to another compromise of an NPM developer in late August that added malware to “nx,” an open-source code development toolkit with as many as six million weekly downloads.

In the nx compromise, the attackers introduced code that scoured the user’s device for authentication tokens from programmer destinations like GitHub and NPM, as well as SSH and API keys. But instead of sending those stolen credentials to a central server controlled by the attackers, the malicious code created a new public repository in the victim’s GitHub account, and published the stolen data there for all the world to see and download.

Eriksen said coding platforms like GitHub and NPM should be doing more to ensure that any new code commits for broadly-used packages require a higher level of attestation that confirms the code in question was in fact submitted by the person who owns the account, and not just by that person’s account.

“More popular packages should require attestation that it came through trusted provenance and not just randomly from some location on the Internet,” Eriksen said. “Where does the package get uploaded from, by GitHub in response to a new pull request into the main branch, or somewhere else? In this case, they didn’t compromise the target’s GitHub account. They didn’t touch that. They just uploaded a modified version that didn’t come where it’s expected to come from.”

Eriksen said code repository compromises can be devastating for developers, many of whom end up abandoning their projects entirely after such an incident.

“It’s unfortunate because one thing we’ve seen is people have their projects get compromised and they say, ‘You know what, I don’t have the energy for this and I’m just going to deprecate the whole package,'” Eriksen said.

Kevin Beaumont, a frequently quoted security expert who writes about security incidents at the blog doublepulsar.com, has been following this story closely today in frequent updates to his account on Mastodon. Beaumont said the incident is a reminder that much of the planet still depends on code that is ultimately maintained by an exceedingly small number of people who are mostly overburdened and under-resourced.

“For about the past 15 years every business has been developing apps by pulling in 178 interconnected libraries written by 24 people in a shed in Skegness,” Beaumont wrote on Mastodon. “For about the past 2 years orgs have been buying AI vibe coding tools, where some exec screams ‘make online shop’ into a computer and 389 libraries are added and an app is farted out. The output = if you want to own the world’s companies, just phish one guy in Skegness.”

Image: https://infosec.exchange/@GossiTheDog@cyberplace.social.

Aikido recently launched a product that aims to help development teams ensure that every code library used is checked for malware before it can be used or installed. Nicholas Weaver, a researcher with the International Computer Science Institute, a nonprofit in Berkeley, Calif., said Aikido’s new offering exists because many organizations are still one successful phishing attack away from a supply-chain nightmare.

Weaver said these types of supply-chain compromises will continue as long as people responsible for maintaining widely-used code continue to rely on phishable forms of 2FA.

“NPM should only support phish-proof authentication,” Weaver said, referring to physical security keys that are phish-proof — meaning that even if phishers manage to steal your username and password, they still can’t log in to your account without also possessing that physical key.

“All critical infrastructure needs to use phish-proof 2FA, and given the dependencies in modern software, archives such as NPM are absolutely critical infrastructure,” Weaver said. “That NPM does not require that all contributor accounts use security keys or similar 2FA methods should be considered negligence.”

☐ ☆ ✇ ZDNet | security RSS

7 most exciting tech accessories from IFA 2025 (and that you can actually buy)

— September 8th 2025 at 21:25
IFA 2025 had some really cool charging accessories and audio products. Here are my favorite picks from the show.
☐ ☆ ✇ The Register - Security

The US government has no idea how many cybersecurity pros it employs

— September 8th 2025 at 21:02

Auditors find federal cybersecurity workforce data messy, incomplete, and unreliable

The US federal government employs tens of thousands of cybersecurity professionals at a cost of billions per year – or at least it thinks it does, as auditors have found the figures are incomplete and unreliable. …

☐ ☆ ✇ ZDNet | security RSS

Every iPhone model that supports Apple's new iOS 26 AI features (and no, its not just the iPhone 17)

— September 8th 2025 at 20:31
Want to experience all that Apple Intelligence has to offer with iOS 26? Here's the full list of compatible devices.
☐ ☆ ✇ ZDNet | security RSS

Why I recommend these OnePlus earbuds over pricier models (including AirPods) - and they're on sale

— September 8th 2025 at 20:02
In addition to their flagship-level noise cancellation, the OnePlus Buds 4 provide bass-heavy audio and in-depth customization.
☐ ☆ ✇ The Register - Security

Drift massive attack traced back to loose Salesloft GitHub account

— September 8th 2025 at 19:52

Meanwhile the victim count grows

The Salesloft Drift breach that compromised "hundreds" of companies including Google, Palo Alto Networks, and Cloudflare, all started with miscreants gaining access to the Salesloft GitHub account in March.…

☐ ☆ ✇ ZDNet | security RSS

Report: OpenAI will launch its own AI chip next year

— September 8th 2025 at 19:41
The company behind ChatGPT is working with Broadcom to create its own custom GPUs, which it will reportedly use exclusively for internal purposes.
☐ ☆ ✇ ZDNet | security RSS

You can buy Samsung's Galaxy S25 FE for only $6 a month - how the deal works

— September 8th 2025 at 19:34
AT&T's promotion for new and current customers amounts to a whopping 66% discount on Samsung's latest midrange handset.
☐ ☆ ✇ ZDNet | security RSS

Looking for the fastest iPhone 17 model? These iPhone 16 speed test results can help

— September 8th 2025 at 19:16
Pit the iPhone 16's Qualcomm modem against Apple's C1 modem in the iPhone 16e, and the winner largely depends on your carrier and location.
☐ ☆ ✇ The Register - Security

Dev snared in crypto phishing net, 18 npm packages compromised

— September 8th 2025 at 19:06

Popular npm packages debug, chalk, and others hijacked in massive supply chain attack

Crims have added backdoors to at least 18 npm packages after developer Josh Junon inadvertently authorized a reset of the two-factor authentication protecting his npm account.…

☐ ☆ ✇ ZDNet | security RSS

Google Meet is back after an outage. Here are a few workarounds for next time

— September 8th 2025 at 21:15
The popular video conferencing service experienced a major outage. Here's what happened.
☐ ☆ ✇ ZDNet | security RSS

Linus Torvalds is sick and tired of your 'pointless links' - and AI is no excuse

— September 8th 2025 at 18:22
Pointless links in proposed code changes are wasting the Linux creator's time - and he's not happy about it. Can you blame him?
☐ ☆ ✇ The Register - Security

Salt Typhoon used dozens of domains, going back five years. Did you visit one?

— September 8th 2025 at 17:47

Plus ties to the Chinese spies who hacked Barracuda email gateways

Security researchers have uncovered dozens of domains used by Chinese espionage crew Salt Typhoon to gain stealthy, long-term access to victim organizations going back as far as 2020.…

☐ ☆ ✇ ZDNet | security RSS

New AirPods Pro tomorrow? These 3 features would be so worth upgrading for

— September 8th 2025 at 17:06
Live translation and temperature sensing in the AirPods Pro 3 sound exciting, but these improvements for everyday use sound even better to me.
☐ ☆ ✇ ZDNet | security RSS

Yes, you can run Windows apps on Linux - here are my top 5 ways

— September 8th 2025 at 16:50
If you're looking to jump from Windows 10 to Linux, and you have specific apps you need to use that aren't available on the open-source platform, here's how to get around that.
☐ ☆ ✇ The Hacker News

GitHub Account Compromise Led to Salesloft Drift Breach Affecting 22 Companies

By: Ravie Lakshmanan — September 8th 2025 at 15:26
Salesloft has revealed that the data breach linked to its Drift application started with the compromise of its GitHub account. Google-owned Mandiant, which began an investigation into the incident, said the threat actor, tracked as UNC6395, accessed the Salesloft GitHub account from March through June 2025. So far, 22 companies have confirmed they were impacted by a supply chain breach. "With
☐ ☆ ✇ ZDNet | security RSS

Apple Event live updates 2025: Last minute leaks on iPhone 17, AirPods 3, Apple Watch Series 11, more

— September 8th 2025 at 21:01
The clock is ticking, and ZDNET is reporting on all the latest news surrounding Apple's September iPhone event this week.
☐ ☆ ✇ ZDNet | security RSS

These potential Apple Watch Series 11 features would make me upgrade immediately

— September 8th 2025 at 17:50
Having tested every major smartwatch release in 2025, here's what's on my Apple Watch wish list ahead of this week's event.
☐ ☆ ✇ The Hacker News

GPUGate Malware Uses Google Ads and Fake GitHub Commits to Target IT Firms

By: Ravie Lakshmanan — September 8th 2025 at 15:02
Cybersecurity researchers have detailed a new sophisticated malware campaign that leverages paid ads on search engines like Google to deliver malware to unsuspecting users looking for popular tools like GitHub Desktop. While malvertising campaigns have become commonplace in recent years, the latest activity gives it a little twist of its own: Embedding a GitHub commit into a page URL containing
☐ ☆ ✇ ZDNet | security RSS

Copilot's new File Explorer tricks are serious OneDrive time-savers - how to try them

— September 8th 2025 at 14:23
With Copilot and Microsoft 365, you can summarize, ask questions, create an FAQ, and even compare certain files stored in OneDrive.
☐ ☆ ✇ ZDNet | security RSS

I was wrong about this $15 cordless screwdriver - here's how it fared in my workshop

— September 9th 2025 at 07:45
It may look different than competitors, but this cordless screwdriver is surprisingly powerful and ergonomic.
☐ ☆ ✇ ZDNet | security RSS

Is OneDrive sending your Windows files to the cloud? Here's why - and what you can do

— September 8th 2025 at 13:49
If you're not careful, your local files can be hoovered into Microsoft's OneDrive cloud storage without your knowledge. Here's how it works.
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Detect Suspicious/Malicious ICMP Echo Traffic - Using Behavioral and Protocol Semantic Analysis

By: /u/MFMokbel — September 8th 2025 at 13:30

The article explores the implementation of our ICMP detection module, detailing the engineering process and how the ICMP Echo Stream (iStream) assembler played a key role in designing its core detection rules.

submitted by /u/MFMokbel
[link] [comments]
☐ ☆ ✇ The Register - Security

PACER buckles under MFA rollout as courts warn of support delays

— September 8th 2025 at 13:15

Busy lawyers on hold for five hours as staff handhold users into deploying the security measure

US courts have warned of delays as PACER, the system for accessing court documents, struggles to support users enrolling in its mandatory MFA program.…

☐ ☆ ✇ Security – Cisco Blog

Zero Trust in the Era of Agentic AI

By: Eric Wang — September 8th 2025 at 12:00
AI agents use the same networking infrastructure as users and apps. So security solutions like zero trust should evolve to protect agentic AI communications.
☐ ☆ ✇ The Register - Security

CISA sounds alarm over TP-Link wireless routers under attack

— September 8th 2025 at 11:46

Plus: Google clears up Gmail concerns, NSA drops SBOM bomb, Texas sues PowerSchool, and more

Infosec in brief The US Cybersecurity and Infrastructure Security Agency (CISA) has said two flaws in routers made by Chinese networking biz TP-Link are under active attack and need to be fixed – but there's another flaw being exploited as well.…

☐ ☆ ✇ The Register - Security

UK tech minister booted out in weekend cabinet reshuffle

— September 8th 2025 at 11:20

Fallout from latest political drama sparks a changing of the guard

UK prime minister Sir Keir Starmer cleared out the officials in charge of tech and digital law in a dramatic cabinet reshuffle at the weekend.…

☐ ☆ ✇ ZDNet | security RSS

Your Roku has hidden settings and menu screens - here's how to unlock them

— September 8th 2025 at 11:00
A little-known button combo on your Roku remote unlocks a hidden menu packed with advanced features most users never stumble upon.
☐ ☆ ✇ The Hacker News

⚡ Weekly Recap: Drift Breach Chaos, Zero-Days Active, Patch Warnings, Smarter Threats & More

By: Ravie Lakshmanan — September 8th 2025 at 10:02
Cybersecurity never slows down. Every week brings new threats, new vulnerabilities, and new lessons for defenders. For security and IT teams, the challenge is not just keeping up with the news—it’s knowing which risks matter most right now. That’s what this digest is here for: a clear, simple briefing to help you focus where it counts. This week, one story stands out above the rest: the
☐ ☆ ✇ The Hacker News

You Didn’t Get Phished — You Onboarded the Attacker

By: Unknown — September 8th 2025 at 09:20
When Attackers Get Hired: Today’s New Identity Crisis What if the star engineer you just hired isn’t actually an employee, but an attacker in disguise? This isn’t phishing; it’s infiltration by onboarding. Meet “Jordan from Colorado,” who has a strong resume, convincing references, a clean background check, even a digital footprint that checks out. On day one, Jordan logs into email and attends
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Using AI Agents for Code Auditing: Full Walkthrough on Finding Security Bugs in a Rust REST Server with Hound

By: /u/Rude_Ad3947 — September 8th 2025 at 02:58

Hey r/netsec,

As a security researcher, I've been exploring ways to leverage AI for more effective code audits. In my latest Medium article, I dive into a complete end-to-end walkthrough using Hound, an open-source AI agent designed for code security analysis. Originally built for smart contracts, it generalizes well to other languages.

What's in the tutorial:

  • Introduction to Hound and its knowledge graph approach
  • Setup: Selecting and preparing a Rust codebase
  • Building aspect graphs (e.g., system architecture, data flows)
  • Running the audit: Generating hypotheses on vulnerabilities
  • QA: Eliminating false positives
  • Reviewing findings: A real issue uncovered
  • Exporting reports and key takeaways

At the end of the article, we create a quick proof-of-concept for one of the tool's findings.

The full post Is here:

https://medium.com/@muellerberndt/hunting-for-security-bugs-in-code-with-ai-agents-a-full-walkthrough-a0dc24e1adf0

Use it responsibly for ethical auditing only.

submitted by /u/Rude_Ad3947
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

killerPID-BOF

By: /u/clod81 — September 8th 2025 at 01:59

Struggling to get an existing handle of a browser's process which already has tthe Cookies file open and can't dump the cookies?

Extreme situations require extreme measures!

submitted by /u/clod81
[link] [comments]
☐ ☆ ✇ ZDNet | security RSS

Samsung just quietly teased its Galaxy Glasses - and almost no one noticed

— September 8th 2025 at 01:46
Samsung is partnering with Google and Qualcomm to launch smart glasses powered by Android XR that will compete with Meta Ray-Bans.
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

New iOS/macOS Critical DNG Image Processing Memory Corruption Exploitation Tutorial

By: /u/pwnguide — September 7th 2025 at 20:43

Learn about the new critical CVE-2025-43300 vulnerability that allows RCE on iOS & macOS by clicking on the post link.

submitted by /u/pwnguide
[link] [comments]
☐ ☆ ✇ ZDNet | security RSS

Meta wears Prada? Why its next-gen AR glasses may be even more fashionable than Ray-Bans

— September 7th 2025 at 19:46
Reports point to Meta launching two new pairs of smart glasses at its Meta Connect event on Sept. 17. And there may be another unexpected wearable device as well.
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

New OpenSecurityTraining2 class: "Bluetooth 2222: Bluetooth reconnaissance with Blue2thprinting" (~8 hours)

By: /u/OpenSecurityTraining — September 7th 2025 at 14:02

This class by Xeno Kovah (founder of OST2) teaches about the 30+ types of Bluetooth data that the Blue2thprinting software can collect and surface for when you're trying to determine what a device is, and whether it has any known vulnerabilities. New in v2.0+ is the BTIDALPOOL crowd-sourcing server for researchers to push & pull data about devices they've discovered.

Like all current #OST2 classes, the core content is made fully public, and you only need to register if you want to post to the discussion board or track your class progress. Based on beta testing this class takes an median of 8 hours to complete (and an average of 9 hours, with a min of 4h30m and max of 15h22m.)

The new Bluetooth learning path showing this class's relationship to others under development is available here: https://ost2.fyi/Bluetooth.html

submitted by /u/OpenSecurityTraining
[link] [comments]
☐ ☆ ✇ Troy Hunt

Weekly Update 468

By: Troy Hunt — September 7th 2025 at 08:08
Weekly Update 468

I only just realised, as I prepared this accompanying blog post, that I didn't talk about one of the points in the overview: food. One of my fondest memories as a child living in Singapore and now as an adult visiting there is the food. It's one of those rare places where the food at every level is just exceptional, and even a basic outing is a treat. As a kid, the most common "fast food" I'd eat was from local "hawker centres", probably what many people would call street food, but never in the "I'm not sure what my night will look like after eating it" kind of way. Noodles, satay, BBQ pork, and all that sort of thing. Or on the pricier side, no visit back is complete without Singapore chilli crab, which served as our final meal on Thursday before we jumped on the plane home. And that's one of the great joys of travel - the ability to experience the differences that make these trips so much more enjoyable. The last time I remember thinking how exceptional the food was was in Reykjavik earlier this year. I think it's time to pay Stefan another visit 🤤

Weekly Update 468
Weekly Update 468
Weekly Update 468
Weekly Update 468

References

  1. Sponsored by: Report URI: Guarding you from rogue JavaScript! Don’t get pwned; get real-time alerts & prevent breaches #SecureYourSite
  2. I finally have my own plaque on a wall! (31 years after graduating, I'm now a "Distinguished Alumni" 😊)

☐ ☆ ✇ The Hacker News

Noisy Bear Campaign Targeting Kazakhstan Energy Sector Outed as a Planned Phishing Test

By: Ravie Lakshmanan — September 6th 2025 at 15:13
A threat actor possibly of Russian origin has been attributed to a new set of attacks targeting the energy sector in Kazakhstan. The activity, codenamed Operation BarrelFire, is tied to a new threat group tracked by Seqrite Labs as Noisy Bear. The threat actor has been active since at least April 2025. "The campaign is targeted towards employees of KazMunaiGas or KMG where the threat entity
☐ ☆ ✇ WIRED

ICE Has Spyware Now

By: Matt Burgess, Andy Greenberg, Lily Hay Newman — September 6th 2025 at 10:30
Plus: An AI chatbot system is linked to a widespread hack, details emerge of a US plan to plant a spy device in North Korea, your job’s security training isn’t working, and more.
☐ ☆ ✇ ZDNet | security RSS

AI's not 'reasoning' at all - how this team debunked the industry hype

— September 6th 2025 at 10:00
Researchers just got very specific about what a language model's 'chain of thought' is actually doing.
❌