M&S tells hundreds of warehouse staff to stay at home after cyber-attack
#WarehouseStaff #OnlineDistributionCentre #MS #Cybersecurity #FourthDay
https://www.theguardian.com/business/2025/apr/28/m-and-s-marks-spencer-warehouse-staff-cyber-attack
M&S tells hundreds of warehouse staff to stay at home after cyber-attack
#WarehouseStaff #OnlineDistributionCentre #MS #Cybersecurity #FourthDay
https://www.theguardian.com/business/2025/apr/28/m-and-s-marks-spencer-warehouse-staff-cyber-attack
SAS names reportedly available online for a decade
#PersonalData #Cybersecurity #DecadeOfAvailability #OnlineExposure #SAS
Your iPhone holds your secrets.
Your Mac knows everything about you.
So why are you still running default settings? 👀
Hackers love lazy security.
🔓 Don’t be easy prey
https://airacademy.gumroad.com/l/ktnfx
#cybersecurity #infosec #hacking #tech #ai #hackers
🚨 9X Surge in Scanning for Ivanti Connect Secure. No CVEs are tied to this yet, but patterns like this often precede exploitation. Full analysis + suspicious IPs: https://www.greynoise.io/blog/surge-ivanti-connect-secure-scanning-activity #Ivanti #Cybersecurity #Scanning
Pete Hegseth Reportedly Set Up Signal on Several Pentagon Computers to Circumvent Restrictions
#Mediaite #SignalApp #PeteHegseth #Cybersecurity #DefenseDepartment
#GoEuropean: mailbox(dot)org offer for switching to the European alternative
As someone who spends a portion of my workdays running logging and monitoring systems, it’s amazing to me that this image is NOT more widely used in #cybersecurity #infosec
Ransomware scum and other crims bilked victims out of a 'staggering' $16.6B last year, says FBI
#Cybercrime #CyberSecurity #CyberThreat #DigitalExtortion #BusinessRisk
https://go.theregister.com/feed/www.theregister.com/2025/04/24/ransomware_scum_and_other_crims/
Ex-NSA chief warns AI devs: Don't repeat infosec's early-day screwups
#AIengineering #InfoSecLessons #Cybersecurity #DevSecOps #MikeRogers
https://go.theregister.com/feed/www.theregister.com/2025/04/23/exnsa_boss_ai/
How can a simple SQL command open the door to full system takeover and cryptocurrency mining? 🐚🪙
A recent cloud attack campaign is exploiting misconfigured PostgreSQL servers, using legitimate database functionality to run malicious code on compromised systems. The operation, tracked by Wiz under the name JINX-0126, has targeted more than 1,500 exposed PostgreSQL instances so far. It builds on an earlier wave of attacks identified in mid-2024, but now includes more advanced evasion techniques.
At the core is the misuse of PostgreSQL's `COPY ... FROM PROGRAM` command. This command, intended for importing data, is leveraged to execute arbitrary shell commands directly on the host. Once inside, the attacker runs a Base64-decoded shell script that removes rival miners and installs a binary called PG_CORE.
A critical piece of this attack is an obfuscated Golang binary named *postmaster*. It mimics PostgreSQL’s real process, helping it blend in. It also sets up persistence through cron jobs, creates new privileged roles, and writes a binary named *cpu_hu* to disk.
That binary fetches and launches the XMRig cryptocurrency miner—without leaving files behind. This uses Linux's `memfd_create`, a technique that loads executables directly into memory to bypass detection tools that scan disk activity.
Each infected system is assigned a unique worker identity and connected to one of three Monero wallets controlled by the attacker. With about 550 active miners tied to each wallet, the impact spans at least 1,500 machines.
The broader issue is clear: many PostgreSQL services remain poorly secured with weak or default credentials. Combined with powerful features like programmatic file imports, they become easy targets for attackers looking to monetize unauthorized access without raising alarms.
#Infosec #Cybersecurity #Software #Technology #News #CTF #Cybersecuritycareer #hacking #redteam #blueteam #purpleteam #tips #opensource #cloudsecurity
— ✨
🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴☠️
Ofcom closes technical loophole used by criminals to intercept mobile calls and texts
#IneffectiveSolutions #MobileSafety #BankSecurityCodes #CyberSecurity #OfcomAction
▶ Easter meltdowns explode as censorship grows, Signalgate returns 4/21/25 TDPS Podcast
#InternetFreedom #TechNews #Cybersecurity #NetNeutrality #Politics
Wiz Acquisition Puts Israeli Intelligence In Charge Of Google Data
#GoogleWizDeal #CyberSecurity #TechAndSurveillance #GoogleWizAcquisition #BigTechTakeovers
Think that image attachment is safe? Phishing attacks using SVG files (which look like images but can hide code!) are up a staggering 1,800%. They're often disguised as voicemails or logos. Yikes. #Cybersecurity #TechNews
https://www.bleepingcomputer.com/news/security/tycoon2fa-phishing-kit-targets-microsoft-365-with-new-tricks/
From yesterday. This is the kind of news that's been emerging in the past couple of days that now make me wonder if OpenA's purpose isn't actually mass surveillance.
Tech Crunch: ChatGPT is referring to users by their names unprompted, and some find it ‘creepy’ https://techcrunch.com/2025/04/18/chatgpt-is-referring-to-users-by-their-names-unprompted-and-some-find-it-creepy/ @TechCrunch @kylelwiggers #cybersecurity #infosec #AI
Disinformation is endangering democracy ahead of Canada's 2025 federal election
#DigitalDefense #CyberSecurity #InfoWarfare #FakeNewsCanada #DemocracyAtRisk #cdnpoli
#Chrome extensions with 6 million installs have hidden tracking code
CVE fallout: The splintering of the standard vulnerability tracking system has begun
#CVE #Cybersecurity #Commentary #IT #Standardization
https://go.theregister.com/feed/www.theregister.com/2025/04/18/splintering_cve_bug_tracking/
CISA has updated the KEV catalogue.
- CVE-2025-31200: Apple Multiple Products Memory Corruption Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-31200
- CVE-2025-31201: Apple Multiple Products Arbitrary Read and Write Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-31201
- CVE-2025-24054: Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-24054 #CISA #cybersecurity #infosec #Apple #Microsoft
Krebs throws himself on the grenade, resigns from SentinelOne after Trump revokes clearances
#Trump #Cybersecurity #SentinelOne #ChrisKrebs #ExecutiveOrder
https://go.theregister.com/feed/www.theregister.com/2025/04/17/krebs_quits_sentinelone/
GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.
All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.