3p

From The Aether

Same Cybersecurity Blunders, Different Year: Why We Can’t Quit Phishing and Password Fails

During Cybersecurity Awareness Month 2025, experts discovered that password hygiene remains poor and phishing attacks continue to work, despite increased awareness efforts. While security pros advocate for longer passphrases like “my cat clarinet loves Sam,” nearly 30% of companies still cling to outdated 8-character passwords. It’s like trying to win a jousting match with a…

1 month ago

Salesforce Breached Again: ShinyHunters Strike with Gainsight App Fiasco!

Salesforce has been hit by another third-party breach, potentially involving ShinyHunters. Gainsight apps connected to Salesforce were the culprit this time. The CRM giant has revoked access tokens and removed the apps from its AppExchange to prevent further unauthorized access to customer data. Salesforce assures the issue is external, not a platform vulnerability.

1 month ago

Trump’s AI Order: A Comedy of Errors in Tech Regulation

Trump’s executive order aims to punish states regulating AI. The draft labels laws like Colorado’s AI Act as “onerous” and seeks to challenge them legally. This misguided approach could stifle progress and innovation, leaving citizens vulnerable to AI-related harms. Instead of supporting advancement, it risks setting AI regulation back to the Stone Age.

1 month ago

Sanction Showdown: US, UK, and Australia Target Russian Cyber Havens

Coordinated sanctions from the US, Australia, and the UK target Russian bulletproof hosting providers aiding ransomware groups like LockBit and BlackSuit. Media Land and its affiliates face repercussions for facilitating cybercrime, as authorities aim to disrupt these operations. The crackdown highlights global efforts to combat the misuse of bulletproof hosting services.

1 month ago

LLMs Still Struggling to Go Rogue: Malware Writing Needs a Human Touch!

Despite their best efforts, researchers have found that LLMs are getting better at writing malware but still not ready for prime time. Even when they managed to coax GPT-4 into creating malicious code, the results were deemed too unreliable for real-world deployment. Looks like evil geniuses will have to wait a bit longer!

1 month ago

Italian Railways Data Derailed: 2.3TB Leak Raises Security Alarms

Data from Italy’s FS Italiane Group has been exposed after a hacker breached Almaviva, its IT services provider. The hacker claims to have swiped 2.3 terabytes of data, now leaked on a dark web forum. Almaviva confirmed the breach, ensuring its specialized team is on the case. The investigation is ongoing.

1 month ago

Beware the Push: Matrix Push Turns Browser Alerts into Phishing Nightmares!

Matrix Push turns browser notifications into phishing tools, offering cybercriminals a command-and-control framework that’s as easy to use as a retro video game. With templates for brands like PayPal and Netflix, hackers can effortlessly lure victims into scams. The hardest part? Convincing users to click “allow” in the first place.

1 month ago

FCC’s Comedy of Errors: Cybersecurity Snafus Leave Telecoms Vulnerable!

The FCC voted to reverse a security measure aimed at protecting telecom networks from Chinese hacks. The decision sparked concerns over cybersecurity, with critics arguing that handshake agreements won’t stop state-sponsored hackers. Senator Mark Warner emphasized that flexible solutions won’t prevent future breaches like the Salt Typhoon cyberespionage campaign.

1 month ago

Watch Out, Windows Users: The Tsundere Botnet Wants to Play Games with Your Security!

The Tsundere botnet is targeting Windows users, executing arbitrary JavaScript from a command-and-control server. It cleverly uses gaming lures and employs Node.js to unleash its malicious payload. With a fondness for Ethereum and a secret identity, this botnet is like a masked bandit—only without the dramatic cape or catchy theme music.

1 month ago

Cryptojacking Chaos: Ray AI Framework Exploit Turns Clusters into Mining Botnet Bonanza

Oligo Security warns of attacks exploiting an old Ray AI framework flaw, turning NVIDIA GPU clusters into cryptocurrency mining botnets. Dubbed ShadowRay 2.0, the campaign leverages GitLab and GitHub to spread malware, turning Ray’s orchestration features into a self-propagating cryptojacking operation that can even launch DDoS attacks.

1 month ago

Petrobras in Hot Water: Everest Ransomware Strikes Oil Giant with Data Breach

Everest ransomware group hit a high note by targeting Petrobras, claiming to have pilfered 176 gigabytes of seismic data. That’s a lot of earth-shattering intel! Petrobras hasn’t commented yet, but if they’re looking for advice, maybe they should start dusting off their negotiation skills—or their dancing shoes!

1 month ago

VPN Under Siege: Palo Alto Networks GlobalProtect Faces Massive 40x Surge in Malicious Scans

Malicious scanning activity on Palo Alto Networks GlobalProtect VPN portals skyrocketed, increasing 40 times in just 24 hours. GreyNoise has linked this escalation to previously identified campaigns, with a 90-day high reached in November. Primarily targeting the US, Mexico, and Pakistan, these attacks highlight the need for vigilance and proactive security measures.

1 month ago

Salesforce Revokes Tokens Amid Gainsight Data Breach Drama: What You Need to Know

Salesforce revoked refresh tokens for Gainsight apps amid a data theft probe. Apparently, this isn’t a CRM hiccup but more of an “app connection gone rogue” situation. Salesforce assures affected users they’re on it, but if you’re missing data, check behind the virtual couch cushions—just in case!

1 month ago

Ohio IT Contractor’s Revenge: $1 Million Cyber Chaos After Firing

An Ohio IT contractor really took the term “revenge is a dish best served cold” to heart, hacking into his former employer’s systems and causing nearly $1 million in damage. Maxwell Schultz’s unauthorized password reset party left thousands locked out and now he’s looking at a potential 10-year stay in a different kind of locked…

1 month ago

TP-Link vs. Netgear: Legal Drama Unpacks Alleged Smear Campaign!

TP-Link is taking legal action against Netgear, accusing it of spreading false rumors about TP-Link’s alleged ties to the Chinese government. TP-Link, which is headquartered in California, seeks damages for defamation and breach of contract, claiming Netgear’s CEO fueled these claims during earnings calls, harming TP-Link’s reputation.

1 month ago

Beware Sturnus: The Sneaky Android Trojan Targeting Your Private Chats!

Meet Sturnus, the Android banking trojan that thinks it’s a secret agent. Not content with just stealing banking info, it crashes secure messaging apps like WhatsApp, Telegram, and Signal, reads your messages, and even logs your keystrokes. It’s like having a nosy neighbor living inside your phone!

1 month ago

UNC2891 Unmasked: The ATM Fraud Saga That Left Indonesian Banks Reeling

The UNC2891 ATM fraud campaign has given “money laundering” a whole new twist. With Raspberry Pi infiltration and a touch of TeamViewer coordination, this group turned ATMs into their personal piggy banks. Their secret weapon? A CAKETAP rootkit, proving that even cybercriminals appreciate a good dessert metaphor while bypassing PINs.

1 month ago

SonicWall’s Firewall Fiasco: Patch Now or Prepare for a Cyber Meltdown!

SonicWall is urging customers to patch a high-severity SonicOS SSLVPN security flaw. This vulnerability, known as CVE-2025-40601, could crash firewalls faster than you can say “denial-of-service.” While no exploits are reported yet, staying ahead of hackers is like wearing sunscreen—better safe than scorched!

1 month ago

D-Link DIR-878 Routers: Vulnerability Buffet with a Side of Botnet Drama!

D-Link warns that the DIR-878 router is as secure as a screen door on a submarine. With three juicy command execution vulnerabilities, hackers might find it more irresistible than a catnip buffet. Despite reaching end-of-life, the router is still on sale, so consider upgrading before your network joins the botnet party!

1 month ago

LLM-Powered Malware: The Comedy of Errors in Cybersecurity’s Future

Large language models could revolutionize malware by dynamically generating code, potentially bypassing hardcoded instructions. However, their current operational reliability leaves a lot to be desired. So, while future malware might be LLM-powered, right now it’s more like a digital deer trying to navigate a virtual highway—plenty of potential, but a little shaky.

1 month ago
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?