#attackers

Osna.FMosnafm
2025-10-27

The protracted legal battle surrounding the suspected mastermind of the Nord Stream pipeline explosions has taken a significant turn. An Italian court has overt... news.osna.fm/?p=20958 |

2025-10-09

#Discord says 70,000 users may have had their government IDs leaked in #breach | The Verge

Discord claims that the #attackers are circulating inaccurate information about the breach of a customer service provider as part of an #extortion attempt.
#privacy #security

theverge.com/news/797051/disco

2025-08-29

#Google warns that mass data theft hitting #Salesloft #AIagent has grown bigger

Google is advising users of the #SalesloftDriftAI #chat #agent to consider all #security #tokens connected to the platform compromised following the discovery that unknown #attackers used some of the #credentials to access email from #GoogleWorkspace accounts.
#privacy #security

arstechnica.com/security/2025/

Rod2ik 🇪🇺 🇨🇵 🇪🇸 🇺🇦 🇨🇦 🇩🇰 🇬🇱☮🕊️rod2ik
2025-08-22
Rod2ik 🇪🇺 🇨🇵 🇪🇸 🇺🇦 🇨🇦 🇩🇰 🇬🇱 ☮🕊️rod2ik.bsky.social@bsky.brid.gy
2025-08-22

#ArchLinux continues to feel the force of a #DDoS #attack after two brutal weeks — #attackers yet #to #be #identified as project struggles to restore full service #jealousy : a wonderful project.. May be #Windows 11 attacking ? www.tomshardware.com/software/lin...

Arch Linux continues to feel t...

2025-07-06

Ubuntu Security Flaw Lets Attackers Bypass Full Disk Encryption
#OMGUbuntu article: omgubuntu.co.uk/2025/07/ubuntu

“Not all #Linux distributions are affected, such as #OpenSUSE_Tumbleweed.”

#Attackers with physical access to a Linux system can access a debug shell simply by entering the wrong #decryption #password several times in a row. On Ubuntu, they hit esc at the password prompt, punch in a few key combos and debug shell appears.
They can mount a USB drive with tools that let them modify the #initramfs (Initial RAM Filesystem – a temporary system run during boot to prep the main OS) to inject #maliciouscode, and then repack it – without tripping any #security flags.
Then, the next time the owner boots up their #laptop and enters their correct password, the code runs with elevated privileges to do whatever the #attacker wants.”

“Impactful though this exploit could be in the wild, there is no reason for most #Ubuntu users to be concerned about it.
This #vulnerability is what the security industry refer to as an '#evilmaidattack': it requires physical access to a #device to pull off.”

“Finally, protecting against this #vulnerability is easy. Users can simply tweak their system #kernel so that the #computer #reboots on failed password attempts, instead of providing a #debug shell.”

Michal Hrušecký :turris: :geeko:michal@hrusecky.net
2025-03-23

I will have a #LightningTalk today in the evening at #CLT2025 about #TurrisSentinel and some basic statistics we collected about #attackers through our #security #research program.

h o ʍ l e t thomlett@mamot.fr
2025-01-10

→ New Gemini for Workspace Vulnerability
hiddenlayer.com/innovation-hub

“[W]e’ve demonstrated that attackers can manipulate Gemini for Workspace’s outputs in Gmail, Google Slides, and Google Drive, allowing them to perform #phishing attacks and manipulate the #chatbot’s behavior. While #Google classifies these as "Intended Behaviors", the vulnerabilities explored highlight the importance of being #vigilant when using LLM-powered tools.”

#Vulnerability #attackers #Gemini #Workspace #Gmail #Drive #LLM

Daniel J. Bernsteindjb@cr.yp.to
2024-10-28

New blog post "The sins of the 90s": Questioning a puzzling claim about mass surveillance. #attackers #governments #corporations #surveillance #cryptowars blog.cr.yp.to/20241028-surveil

2024-08-09

‘Sinkclose’ Flaw in Hundreds of Millions of #AMD Chips Allows Deep, Virtually Unfixable Infections

Researchers warn that a bug in AMD’s chips would allow #attackers to root into some of the most privileged portions of a computer—and that it has persisted in the company’s processors for decades.
#sinkclose #security

wired.com/story/amd-chip-sinkc

OWASP Foundationowasp@infosec.exchange
2024-07-22

The newly designed OWASP Global AppSec US Conference is coming to San Francisco Sept 23-27

Join Abhay Bhargav for his 3-day training session on Attacking and Defending.

Learn more and register for training sessions by following the link below 👇

eventbrite.com/e/owasp-global-

#AppSec #SanFran #Defenders #Attackers #Training

2024-07-10

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst