#infosec

2025-12-11

DroidLock - Android-Malware übernimmt das Gerät

Das Forschungsteam von zLabs habe eine neue Bedrohungskampagne entdeckt, die zunächst spanischsprachige Android‑Nutzer ins Visier nimmt. DroidLock, eine quasi-Ransomware, verbreitet sich über Phishing‑Websites. Sie kann den Bildschirm von Geräten mit einer ransomware‑ähnlichen Überlagerung sperren und illegal die Anmeldedaten von App‑Sperren erlangen...

Mehr:
maniabel.work/archiv/763

#Android #malware #ransomware #DroidLock #Phishing #infosec #infosecnews #BeDiS

urlDNA.io :verified:urldna@infosec.exchange
2025-12-11

Possible Phishing 🎣
on: ⚠️hxxps[:]//scedasterminalfr[.]web[.]app
🧬 Analysis at: urldna.io/scan/693ac8623b77500
#cybersecurity #phishing #infosec #urldna #scam #infosec

2025-12-11

🔒 Security News Digest - 2025-12-11

📊 10 updates from 4 sources:

🔹 Security Boulevard: An Inside Look at the Israeli Cyber Scene
securityboulevard.com/2025/12/

🦠 Malwarebytes: DroidLock malware locks you out of your Android device and demands ransom
malwarebytes.com/blog/news/202

🔹 Security Boulevard: Guided redaction in Tonic Textual: Human-precision, streamlined by AI
securityboulevard.com/2025/12/

🔹 Security Boulevard: AIs Exploiting Smart Contracts
securityboulevard.com/2025/12/

🔹 Security Boulevard: Attackers Worldwide are Zeroing In on React2Shell Vulnerability
securityboulevard.com/2025/12/

🔹 BleepingComputer: UK fines LastPass over 2022 data breach impacting 1.6 million users
bleepingcomputer.com/news/secu

🔹 The Record from Recorded Future News: New 'DroidLock' malware demands a ransom, locks user out of device
therecord.media/android-droidl

🔹 Security Boulevard: Identity Management in the Fragmented Digital Ecosystem: Challenges and Frameworks
securityboulevard.com/2025/12/

🔹 Security Boulevard: Hacks Up, Budgets Down: OT Oversight Must Be An IT Priority
securityboulevard.com/2025/12/

🔹 Security Boulevard: Rethinking Security as Access Control Moves to the Edge
securityboulevard.com/2025/12/

#InfoSec #SecurityNews

2025-12-11

RE: social.vivaldi.net/@NetscapeNa

⚠️ Please double-check to make sure your site is using the latest Fediverse software:

Misskey: 2025.12.0
Mastodon: 4.5.3
PeerTube: 8.0.0
PixelFed: 0.12.6
Loops: 1.0.0 Beta 5
Mbin: 1.8.4
Lenny: 0.19.14
Akkoma: 2025.12
Sharkey: 2025.4.4
Pleroma: 2.9.1

#Fediverse #ActivityPub #Mastodon #Misskey #PixelFed #PeerTube #Sharkey #Loops #Akkoma #Pleroma #Mbin #Lemmy #InfoSec #Security #Hack #Foss #OpenSource #Linux #SystemAdmin #Administrator #WebMaster #ITTech #FediAdmin

2025-12-11

Tuần này: Lừa đảo giọng nói AI gia tăng, Google vá lỗi nghiêm trọng, tấn công xác thực không mật khẩu, mã độc GhostRabbit nhắm vào freelancer, trang phishing AI không thể phát hiện, đánh cắp token OAuth, ransomware dùng AI do thám. 74% vi phạm liên quan đến thông tin đăng nhập. Chuyển sang xác thực không mật khẩu, bật 2FA, dùng passkeys, kiểm tra email bị lộ. #Cybersecurity #AI #Deepfake #Phishing #Malware #Passwordless #ChromeUpdate #Infosec #AnToanThongTin #GianLan #MatKhau #AI #BaoMat

https:

Laurent Cheyluslcheylus@bsd.network
2025-12-11

Comparing AI Agents to Cybersecurity Professionals in Real-World Penetration Testing - Research paper from Standford comparing 10 cybersecurity professionals alongside 6 existing AI agents #Infosec #AI arxiv.org/abs/2512.09882

⚯ Michel de Cryptadamus ⚯cryptadamist@universeodon.com
2025-12-11

get in losers, we’re gamifying everything now

> “NoName published a daily leaderboard of volunteers who launched the most attacks… and paid top-ranking volunteers in cryptocurrency”

justice.gov/opa/pr/justice-dep

#Russia #FSB #GRU #putin #vladimirPutin #uspol #cybersecurity #infosec #noName #ukpol #eupol #botnet #DDoS #ukraine #ukrainewar #crypto #cryptocurrency #litecoin #bitcoin #gamification

Gamified manipulation to motivate pro-Russian
cyberattacks

Investigations by national authorities identified NoName057(16) as an ideological criminal network that has been
seen to profess support to the Russian Federation and, in the context of the Russian war of aggression against
Ukraine, has been linked to numerous DDoS cyberattacks. During such attacks, a website or online service is
flooded with traffic with the objective of overloading it and rendering it unavailable. In addition to the activities of the
network, estimated at over 4 000 supporters, the group was also able to construct their own botnet made up of
several hundred servers, used to increase the attack load.

To share calls to action, tutorials, updates, and to recruit volunteers, the group leveraged pro-Russian channels,
forums, and even niche chat groups on social media and messaging apps. Volunteers often invited friends or
contacts from gaming or hacking forums, forming small recruitment circles. These actors used platforms like DDoSia
to simplify technical processes and provide guidelines, enabling new recruits to become operational quickly.
Participants were also paid in cryptocurrency, which incentivised sustained involvement and attracted opportunists.
Mimicking game-like dynamics, regular shout-outs, leader boards, or badges provided volunteers with a sense of
status. This gamified manipulation, often targeted at younger offenders, was emotionally reinforced by a narrative of
2025-12-11

This reminds me I gotta update my #tails installs. lol #infosec #computers #censorship

lemmy.jtworld.xyz/post/33196

2025-12-11

Neu auf dem CyberCrime-Markt: SpiderMan-Phishing-Kit

Das neue Phishing‑Kit Spiderman habe die Cyberkriminellen‑Szene erobert, da es selbst technisch wenig versierten Angreifern das Ausspähen von Bank‑ und Krypto‑Konten ermöglicht, berichtet VARONIS. Der Name sei Programm: Wie ein Spinnennetz verknüpfe das Toolkit zahlreiche europäische Banken und Finanzdienste zu einem einzigen Angriffspunkt.

Mehr: maniabel.work/archiv/761

#PhishingKit #Phishing #Spiderman #Crypto #infosec #infosecnews #BeDiS

BeyondMachines :verified:beyondmachines1@infosec.exchange
2025-12-11

Google patches actively exploited Chrome vulnerability

Google released an emergency Chrome security update (version 143.0.7499.109/.110) to patch a high-severity zero-day vulnerability (Issue 466192044) that is actively being exploited in the wild, along with two medium-severity vulnerabilities.

**An urgent patch for Chrome - Google is patching an actively exploited flaw in Chrome, and the flaw is nasty enough that even the basic description of it is withheld. DONT WAIT! Update all your Chrome and Chromium browsers (Edge, Opera, Brave, Vivaldi...). Updating the browser is easy, all your tabs reopen after the patch.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

urlDNA.io :verified:urldna@infosec.exchange
2025-12-11

Possible Phishing 🎣
on: ⚠️hxxps[:]//courrielweb3245[.]weebly[.]com
🧬 Analysis at: urldna.io/scan/693abf963b77500
#cybersecurity #phishing #infosec #urldna #scam #infosec

2025-12-11
urlDNA.io :verified:urldna@infosec.exchange
2025-12-11

Possible Phishing 🎣
on: ⚠️hxxps[:]//sp14652[.]sitebeat[.]crazydomains[.]com
🧬 Analysis at: urldna.io/scan/693ac0943b77500
#cybersecurity #phishing #infosec #urldna #scam #infosec

Wulfy—Speaker to the machinesn_dimension@infosec.exchange
2025-12-11

@briankrebs

#GenAiMil uses Gemini 2.5 not the latest 3.0 which is only 3 weeks old. Nevertheless, it excels at reasoning tasks (ranked #1) Its got a context window of 1 million tokens, which means one can feed a sizable document into it.

There is a joke here about reasoning #AI in an unreasoning administration, except there us a reason here, one which most Americans are unable to acknowledge. Destruction of the American state.

The good news us it's for level IL5 (Sensitive but unclassified) information, which means this clownshow is about to start feeding a whole bunch of classified content into it.
I'm looking forward to reading future #infosec breaches post mortems.

Also, remember the #Google now abandoned motto "Do no evil"? How much does evil cost?
$200 million dollars (June contract).
I vaguely remember a whole bunch of Google employees quitting.

Finally, do remember that there is absolutely no regulations WHATSOEVER controlling this tech.
This is nuclear power without safeties.
Car design without seatbelts and crumplezones
and
Food additives with no regulation.
In fact trump "administration" actively threatened states that tried to make houses about #regulateai
#LLM #skynet

Lenin alevski 🕵️💻alevsk@infosec.exchange
2025-12-11

❓How secure are your Google Workspace groups? 🤔🔒

Gubble audits Google Groups settings to uncover risky configurations like "Anyone Can Join" or "External Members Allowed." Misconfigurations like these can expose sensitive data or enable phishing scenarios. Automate the checks before risks arise!

#GoogleWorkspace #SecOps #Cybersecurity

🔗 Project link on #GitHub 👉 github.com/LowOrbitSecurity/gu

#Infosec #Cybersecurity #Software #Technology #News #CTF #Cybersecuritycareer #hacking #redteam #blueteam #purpleteam #tips #opensource #cloudsecurity

— ✨
🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️

The Alilo Smart AI bunny, for kids three and up: “Here are some types of kink that people might be interested in."

Also defined as “Pet play” by the innocuous bunny: “One: bondage. Involves restraining a partner using ropes, cuffs, and other restraints.”

Futurism: Another AI-Powered Children’s Toy Just Got Caught Having Wildly Inappropriate Conversations futurism.com/artificial-intell

Also:

McDonald’s Issues Extremely Weird Response to Its Disastrous AI Ad futurism.com/artificial-intell @Futurism #infosec

urlDNA.io :verified:urldna@infosec.exchange
2025-12-11

Possible Phishing 🎣
on: ⚠️hxxps[:]//xn--2o2bo1am34d[.]weebly[.]com
🧬 Analysis at: urldna.io/scan/693abf7b3b77500
#cybersecurity #phishing #infosec #urldna #scam #infosec

2025-12-11

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst