Tag: Internet
-
Internet Yiff Machine: We hacked 93GB of anonymous crime tips
Ultra-sensitive data may have been hacked. First seen on arstechnica.com Jump to article: arstechnica.com/security/2026/03/internet-yiff-machine-we-hacked-93gb-of-anonymous-crime-tips/
-
UK sanctions Xinbi marketplace linked to Asian scam centers
The United Kingdom’s Foreign, Commonwealth and Development Office (FCDO) has sanctioned Xinbi, a Chinese-language cryptocurrency-based online marketplace that sells stolen data and satellite internet equipment to scam networks in Southeast Asia. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/uk-sanctions-xinbi-marketplace-linked-to-asian-scam-centers/
-
WatchGuard Internet Security Report 2HJ. 2025 – Deutschland Platz drei bei Office-Exploits weltweit
First seen on security-insider.de Jump to article: www.security-insider.de/watchguard-report-2025-deutschland-office-exploits-web-shells-a-cf10d914b701cfad4dfbf9975b19b0d9/
-
New critical Citrix NetScaler hole of similar severity to CitrixBleed2, says expert
CSO in an email, because the hole allows an unauthenticated remote attacker to leak potentially sensitive information from the appliance’s memory.”This vulnerability is one that threat actors and researchers alike are paying attention to,” he said.The vulnerability carries similar ramifications to 2023’s CitrixBleed and 2025’s CitrixBleed2 memory leak vulnerabilities, Emmons added. Then, unauthenticated attackers with…
-
FCC Bans Foreign-Made Routers Over National Security Concerns
The US Federal Communications Commission has placed all “consumer-grade” internet routers produced outside the US on its “covered list” First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/us-fcc-bans-foreign-made-routers/
-
Trivy supply chain breach compromises over 1,000 SaaS environments, Lapsus$ joins the extortion wave
Tags: access, breach, business, ceo, control, credentials, extortion, github, incident response, Internet, malicious, mandiant, open-source, saas, software, supply-chain, theft, updateA pattern of persistent access: This is the second compromise affecting the Trivy ecosystem within roughly a month. Socket identified compromised Aqua Trivy VS Code extension releases on OpenVSX in late February, and now trivy-action, Trivy’s official GitHub Action for running scans in CI/CD workflows, has been abused through manipulated version tags to distribute malicious…
-
Iranians Don’t Have a Missile Alert System, So Volunteers Built Their Own Warning Map
The crowdsourced website and app Mahsa Alert provides citizens in Iran with crucial information amid the country’s ongoing war with the US and Israel”, and an internet blackout. First seen on wired.com Jump to article: www.wired.com/story/iranians-dont-have-a-missile-alert-system-so-volunteers-built-their-own-warning-map/
-
Azure APIM Signup Bypass: 97.9% of Developer Portals Still Exploitable Anonymously and from the Internet
The Azure APIM signup bypass is a critical vulnerability affecting 97.9% of internet-facing Developer Portals. Azure API Management (APIM) exposes APIs to external consumers through a Developer Portal, the interface where developers self-register, obtain API keys, and make API calls. The default APIM configuration ships with Basic Authentication enabled as the identity provider and the……
-
Azure APIM Signup Bypass: 97.9% of Developer Portals Still Exploitable Anonymously and from the Internet
The Azure APIM signup bypass is a critical vulnerability affecting 97.9% of internet-facing Developer Portals. Azure API Management (APIM) exposes APIs to external consumers through a Developer Portal, the interface where developers self-register, obtain API keys, and make API calls. The default APIM configuration ships with Basic Authentication enabled as the identity provider and the……
-
TeamPCP Unleashes Iran-Targeted CanisterWorm Kubernetes Wiper
CanisterWorm’s latest evolution turns TeamPCP’s cloud-native toolkit into a geopolitically tuned wiper, capable of bricking entire Kubernetes clusters when it lands on systems configured for Iran. The campaign reuses the same Internet Computer Protocol (ICP) canister C2 and backdoor infrastructure seen in the earlier Trivy and NPM CanisterWorm incidents. However, it now adds selective destruction…
-
Auf der DMEA zeigt Claroty wie sich Cyberbedrohungen durch Priorisierung effektiv bekämpfen lassen
Der Spezialist für die Sicherheit von cyberphysischen Systemen (CPS), Claroty, präsentiert auch in diesem Jahr auf der DMEA seine Lösung zum Schutz medizinischer Geräte und Netzwerke vor Cyberbedrohungen. Aktuelle Untersuchungen zeigen, dass 89 Prozent der Einrichtungen über Systeme mit öffentlich zugänglichen Exploits verfügen (Known-Exploited-Vulnerabilities/KEV), welche aktiv von Ransomware-Banden genutzt werden, sowie unsicher mit dem Internet…
-
V2X macht das Auto zum Teil des Internets – Das Connected Car wird zum Computer auf vier Rädern
First seen on security-insider.de Jump to article: www.security-insider.de/connected-car-software-defined-vehicle-v2x-a-33c39f2ab5bc9ed046764e3ac3084a12/
-
âš¡ Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers & More
Another week, another reminder that the internet is still a mess. Systems people thought were secure are being broken in simple ways, showing many still ignore basic advisories.This edition covers a mix of issues: supply chain attacks hitting CI/CD setups, long-abused IoT devices being shut down, and exploits moving quickly from disclosure to real attacks.…
-
âš¡ Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers & More
Another week, another reminder that the internet is still a mess. Systems people thought were secure are being broken in simple ways, showing many still ignore basic advisories.This edition covers a mix of issues: supply chain attacks hitting CI/CD setups, long-abused IoT devices being shut down, and exploits moving quickly from disclosure to real attacks.…
-
511,000+ EndLife IIS Instances Found Online, Raising Security Risks
Security researchers at The Shadowserver Foundation have identified a massive internet-facing attack surface, discovering more than 511,000 End-of-Life Microsoft Internet Information Services (IIS) instances currently active online. This widespread deployment of outdated web servers presents a significant security risk to global networks, as these systems no longer receive standard security updates from the vendor. 511,000+…
-
Behavioral XDR and threat intel nab North Korean fake IT worker within 10 days of hire
Key signs of NK-linked insider infiltration: SpiderLabs has found that these threat actors commonly operate from China rather than North Korea because the internet is more stable and they can employ VPN services to conceal their true geographic origin.Astrill VPN has the ability to bypass China’s Great Firewall and allows threat actors to tunnel traffic…
-
NIST Updates DNS Security Guidance After 12 Years with SP 800-81r3
The latest update to DNS security guidance from the National Institute of Standards and Technology (NIST) marks a new in how organizations are expected to secure one of the internet’s most critical systems. Published as NIST SP 800-81r3, this revision replaces the previous 2013 version, ending a gap of more than twelve years without major federal updates in this area. First…
-
Cyberkriminelle nehmen vermehrt kritische Infrastrukturen ins Visier
Angriffe auf kritische Infrastruktur erfolgen immer häufiger über cyberphysische Systeme Vier von fünf Angriffe (82 %) erfolgen über exponierte, mit dem Internet verbundenen Ressourcen Attacken größtenteils durch politische oder gesellschaftliche Ziele motiviert Cyberphysische Systeme (CPS) werden mehr und mehr zu einem bevorzugten Ziel opportunistischer Angreifer. Dabei sind viele der Attacken von geopolitischen Ereignissen beeinflusst… First…
-
Microsoft breaks Microsoft account sign-ins in Windows 11 with latest update
OneDrive, Office, Teams Free users greeted with phantom ‘no internet’ errors, restart may help if you’re lucky First seen on theregister.com Jump to article: www.theregister.com/2026/03/20/microsoft_account_not_working_have/
-
TDL 018 – How To Think, Not What To Think – Mitch Prior
Tags: access, ai, apple, attack, backup, blockchain, business, cctv, china, ciso, cloud, computer, conference, control, credentials, cvss, cyber, cybersecurity, data, defense, detection, exploit, finance, firmware, google, infrastructure, intelligence, Internet, iot, jobs, law, mail, malware, military, network, phone, privacy, resilience, risk, router, software, strategy, switch, technology, threat, tool, vulnerability, wifi, zero-trustThe Human Algorithm in a Zero-Trust World In the latest episode of The Defender’s Log, host David Redekop sits down with cybersecurity expert Mitch Prior to discuss the intersection of high-tech security and human intuition. From their first meeting in 2018″, the early days of Zero Trust”, the duo explores why the “why” behind technical…
-
US, allies move to dismantle four high-volume IoT botnets
The armies of hacked computers and internet of things gadgets powered disruption and extortion campaigns that sometimes cost victims tens of thousands of dollars. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/botnet-takedown-operation-us-canada-germany/815309/
-
Angeblich kein Internet: Windows-11-Update macht App-Anmeldungen kaputt
Einige Windows-11-Nutzer können sich neuerdings nicht mehr bei Microsoft-Apps anmelden. Eine Korrektur ist in Arbeit, ein Workaround hilft sofort. First seen on golem.de Jump to article: www.golem.de/news/angeblich-kein-internet-windows-11-update-macht-app-anmeldungen-kaputt-2603-206732.html
-
International joint action disrupts world’s largest DDoS botnets
Authorities from the United States, Germany, and Canada have taken down Command and Control (C2) infrastructure used by the Aisuru, KimWolf, JackSkid, and Mossad botnets to infect Internet of Things (IoT) devices. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/aisuru-kimwolf-jackskid-and-mossad-botnets-disrupted-in-joint-action/
-
Feds Disrupt IoT Botnets Behind Huge DDoS Attacks
The U.S. Justice Department joined authorities in Canada and Germany in dismantling the online infrastructure behind four highly disruptive botnets that compromised more than three million hacked Internet of Things (IoT) devices, such as routers and web cameras. The feds say the four botnets — named Aisuru, Kimwolf, JackSkid and Mossad — are responsible for…
-
DoJ Disrupts 3 Million-Device IoT Botnets Behind Record 31.4 Tbps Global DDoS Attacks
The U.S. Department of Justice (DoJ) on Thursday announced the disruption of command-and-control (C2) infrastructure used by several Internet of Things (IoT) botnets like AISURU, Kimwolf, JackSkid, and Mossad as part of a court-authorized law enforcement operation.The effort also saw authorities from Canada and Germany targeting the operators behind these botnets, with a number of…
-
Authorities Dismantle IoT Botnet Linked to Record-Shattering 30 Tbps DDoS Campaigns
A massive international law enforcement operation has successfully dismantled the command and control infrastructure behind four highly destructive Internet of Things (IoT) botnets. These sprawling networks were responsible for launching record-breaking Distributed Denial of Service (DDoS) attacks against global targets, with some traffic floods reaching an astonishing 30 Terabits per second (Tbps). The coordinated strike…
-
Authorities Dismantle IoT Botnet Linked to Record-Shattering 30 Tbps DDoS Campaigns
A massive international law enforcement operation has successfully dismantled the command and control infrastructure behind four highly destructive Internet of Things (IoT) botnets. These sprawling networks were responsible for launching record-breaking Distributed Denial of Service (DDoS) attacks against global targets, with some traffic floods reaching an astonishing 30 Terabits per second (Tbps). The coordinated strike…
-
That cheap KVM device could expose your network to remote compromise
Stealthy backdoors: A compromised KVM device can become a powerful backdoor in any environment. An attacker can inject keystrokes to execute commands or access UEFI settings to disable security features such as disk encryption and Secure Boot.Because the device operates outside the controlled system’s OS, endpoint detection tools and host firewalls cannot see it. These…
-
Bolster your defenses and close the codecloud gap with Tenable and OX
Tags: access, ai, application-security, attack, business, ciso, cloud, container, control, data, data-breach, defense, detection, endpoint, exploit, framework, identity, infrastructure, intelligence, Internet, risk, service, software, strategy, technology, threat, tool, training, vulnerabilityToday, cloud security teams face fragmented visibility and the challenge of prioritizing risks while identifying fix owners. A new joint solution from Tenable and OX helps you close the code-to-cloud gap from development through runtime. By combining CNAPP with deep AppSec, this integration is designed to eliminate visibility gaps and accelerate remediation. Key takeaways Bridge…
-
3 Things to Look for in Cloud Based Web Content Filtering Solutions
Schools rely on web content filtering to protect students, comply with regulations like the Children’s Internet Protection Act (CIPA), and maintain productive learning environments. As learning becomes increasingly digital, school districts must ensure students can access valuable online resources while preventing exposure to harmful or distracting content. Effective web filtering tools help strike that balance.…

