Bruce Schneier - Critical GitHub Attack: "This isserious: A sophisticated cascading supply chain attack has compromised multiple GitHub Actions, exposing critical CI/CD secrets across tens of thousands of repositories. The attack, which originally targeted the widely used “tj-actions/changed-files” utility, is now believed to have originated from an earlier breach of the “reviewdog/action-setup@v1” GitHub Action, according to a report."
Bruce Schneier - Is Security Human Factors Research Skewed Towards Western Ideas and Habits?: "Really interesting research: “How WEIRD is Usable Privacy and Security Research?” by Ayako A. Hasegawa Daisuke Inoue, and Mitsuaki Akiyama."
Bruce Schneier - Improvements in Brute Force Attacks: "New paper: “GPU Assisted Brute Force Cryptanalysis of GPRS, GSM, RFID, and TETRA: Brute Force Cryptanalysis of KASUMI, SPECK, and TEA3."
Bruce Schneier - TP-Link Router Botnet: "There is a new botnet that isinfecting TP-Link routers: The botnet can lead to command injection which then makes remote code execution (RCE) possible so that the malware can spread itself across the internet automatically. This high severity security flaw (tracked asCVE-2023-1389) has also been used to spread other malware families as far back as April 2023 when it was used in theMirai botnet malware attacks. The flaw also linked to the Condi and AndroxGh0st malware attacks."
Catalyst -mySCADA myPRO Manager and Runtime RCE Vulnerabilities: Supervisory Control and Data Acquisition (SCADA) systems are at the core of industrial automation, ensuring seamless operation across sectors such as energy, manufacturing, and critical infrastructure. With the digital transformation of these industries, SCADA systems are increasingly becoming targets for cyber threats.
Unlock access to the largest independent learning library in Tech for FREE!
Get unlimited access to 7500+ expert-authored eBooks and video courses covering every tech area you can think of.
Renews at $19.99/month. Cancel anytime
CISA - CISA Adds Three Known Exploited Vulnerabilities to Catalog:CISA has added three new vulnerabilities to itsKnown Exploited Vulnerabilities Catalog, based on evidence of active exploitation; CVE-2025-1316 Edimax IC-7100 IP Camera OS Command Injection Vulnerability; CVE-2024-48248 NAKIVO Backup and Replication Absolute Path Traversal Vulnerability; and, CVE-2017-12637 SAP NetWeaver Directory Traversal Vulnerability.
The Citizen Lab - Virtue or Vice? A First Look at Paragon’s Proliferating Spyware Operations: Paragon Solutions Ltd. was established in Israel in 2019. The founders of Paragon include Ehud Barak, the former Israeli Prime Minister, and Ehud Schneorson, the former commander of Israel’sUnit 8200. Paragon sells a spyware product called Graphite, whichreportedlyprovides “access to the instant messaging applications on a device, rather than taking complete control of everything on a phone,” like NSO Group’s Pegasus spyware.
Krebs On Security - ClickFix: How to Infect Your PC in Three Easy Steps: "A clever malware deployment schemefirst spotted in targeted attacks last yearhas now gone mainstream. In this scam, dubbed “ClickFix,” the visitor to a hacked or malicious website is asked to distinguish themselves from bots by pressing a combination of keyboard keys that causesMicrosoft Windowsto download password-stealing malware."
Trellix - Analysis of Black Basta Ransomware Chat Leaks: "On Feb 11, 2025 a Telegram user @ExploitWhispers shared via their Telegram channel ‘shopotbasta’ (EN: ‘basta whisper’) Black Basta RaaS (Ransomware as a Service) Matrix chat leaks containing over 200,000 messages spanning from September 2023 to September 2024. The @ExploitWhispers claim that Black Basta has recently attacked Russian banks and thus crossed the line, therefore they decided to leak their internal chat communications."
Pillar - New Vulnerability in GitHub Copilot and Cursor: How Hackers Can Weaponize Code Agents:Pillar Security researchers have uncovered a dangerous new supply chain attack vector we've named"Rules File Backdoor."This technique enables hackers to silently compromise AI-generated code by injecting hidden malicious instructions into seemingly innocent configuration files used by Cursor and GitHub Copilot—the world's leading AI-powered code editors.