From The Aether
Instagram’s Misfire: How Meta’s Moderation Muzzles Vital Abortion Info
Meta’s rules on “Dangerous Organizations and Individuals” have been criticized for their lack of transparency and broad application. When Samantha Shoemaker’s post about Plan C was flagged under these guidelines, it highlighted the absurdity of equating medically accurate abortion information with extremism. Sharing reproductive care information isn’t dangerous—it’s vital.
Cybersecurity Comedy: Ivanti’s Zero-Day Drama Unpatched!
CISA has reported malware attacks on Ivanti Endpoint Manager Mobile, exploiting two vulnerabilities. These flaws, CVE-2025-4427 and CVE-2025-4428, allow authentication bypass and code injection. Despite Ivanti’s fixes, threat actors, possibly linked to China, have been exploiting these vulnerabilities. CISA advises immediate patching and treating MDM systems as high-value assets.
Iranian Hackers Go Job Hunting on LinkedIn: Subtle Snail’s Espionage Escapades Target Telecom Giants
Iranian cyber group UNC1549, also known as Subtle Snail, has been targeting European telecom companies via fake LinkedIn recruitment schemes. By posing as HR, they gain trust before deploying the MINIBIKE backdoor, exfiltrating sensitive data. Their operations blend seamlessly with legitimate cloud services, making detection as slippery as, well, a snail.
Fake ID Fiasco: How China’s ForgeCraft is Fooling North America and Cashing In
CloudSEK’s research reveals “ForgeCraft,” a China-based operation selling high-quality fake IDs with scannable barcodes and holograms. Over 6,500 counterfeit IDs have been sold in North America, generating $785,000. The fake IDs, concealed in packages, are promoted on social media, posing threats to national security and enabling financial fraud.
Botnet Ballet: SystemBC’s Malware Moves and the Dance of the Undead Servers
SystemBC malware turns infected computers into SOCKS5 proxies, powering the REM Proxy network. With over 80 C2 servers and 1,500 daily victims, it’s the botnet’s equivalent of a five-star hotel, offering “luxurious” unpatched vulnerabilities. Security flaws? More like the red carpet for cybercriminals. It’s the malware gift that keeps on giving!
Critical GoAnywhere Security Flaw: Is Your Data at Risk?
Fortra’s GoAnywhere MFT software has a critical security flaw, CVE-2025-10035, that could allow command execution. With a CVSS score of 10.0, it’s serious business. Users should update to the latest version or ensure the Admin Console isn’t publicly accessible. Meanwhile, hackers are probably already sharpening their digital swords.
Fortra’s GoAnywhere MFT: The Never-Ending Ransomware Saga Continues!
Budding ransomware crooks have another shot at exploiting Fortra’s GoAnywhere MFT product due to a new 10/10 severity vulnerability. With the potential for command injection, it’s a cybercriminal’s dream! Fortra’s advisory encourages a quick patch update. After all, who wouldn’t want to avoid being on a ransomware crook’s speed dial?
Cybersecurity Chaos: Data Breaches, AI Shenanigans, and the Latest Patches You Can’t Ignore!
ShinyHunters strikes again, claiming to have stolen 1.5 billion records in a Salesforce hack. While many cybersecurity firms confirm being hit, it’s wise to take these claims with a pinch of salt, as hacking groups have a tendency to exaggerate. Remember, in cybersecurity news, not everything is as shiny as it seems!
GoAnywhere MFT’s License Servlet Vulnerability: Patch Now or Face the Wrath of Rogue Bytes!
Fortra has issued security updates to fix a severe vulnerability in GoAnywhere MFT’s License Servlet, tracked as CVE-2025-10035. This flaw, caused by deserialization of untrusted data, can lead to command injection attacks. Admins should patch quickly as GoAnywhere MFT remains a juicy target for threat actors.
Russian Cyber Tango: Gamaredon and Turla Team Up in Ukraine Hacks!
Russian state-sponsored threat actors Gamaredon and Turla are teaming up like a cyber Bonnie and Clyde. Gamaredon deploys Turla malware on Ukrainian targets, proving that two heads (or bears) are better than one when it comes to digital espionage. ESET found their collaboration traces back to the Cold War era—talk about a throwback partnership!
PhaaS Platforms Lucid and Lighthouse: A Phishing Frenzy Targeting 17,500 Domains across 74 Countries
Phishing-as-a-Service, or PhaaS, is the subscription service no one asked for but cybercriminals adore. With Lucid and Lighthouse leading the charge, over 17,500 phishing domains now target 316 brands across 74 countries. From smishing to fake storefronts, these kits offer the ultimate in cyber mischief for a monthly fee.
Teen Cyber Crook Caught: Gift Card Blunder Leads to $115M Ransom Ring Bust!
Thalha Jubair, part of the Scattered Spider cybercrime gang, allegedly helped extort $115 million from over 100 organizations. His downfall? Using a server holding ransom funds to pay for gaming and food-delivery gift cards in his name. Even cybercrooks need to eat and game, but maybe not with stolen cryptocurrency.
Russian Hackers Unite: Gamaredon and Turla Team Up for Ukrainian Cyber Siege in 2025!
Gamaredon and Turla, two Russian state-linked threat actors, are teaming up like a cyber-espionage buddy movie to target Ukraine’s defense sector. With Gamaredon’s PteroGraphin tool restarting Turla’s Kazuar malware, it seems like these two are going for a high-stakes digital tango.
One Token to Rule Them All: The Alarming Flaw That Almost Gave Hackers the Entra ID Crown
Dirk-jan Mollema discovered a flaw granting near-global access to Entra ID tenants. This vulnerability allowed tokens to bypass standard validation, posing a serious security risk. While Microsoft swiftly addressed the issue, it was a stark reminder that when it comes to cybersecurity, there’s always a chance your data could be one token away from chaos.
ShadowLeak Unleashed: The One-Email Hack That Outsmarts ChatGPT and Spills Your Gmail Secrets!
In a plot twist worthy of a cyber-thriller, the ShadowLeak vulnerability in ChatGPT’s Deep Research mode lets attackers sneakily lift Gmail data just by sending a cleverly disguised email. Who knew email could be so… revealing?
Steam to 32-Bit Windows: “It’s Not Me, It’s You” – Upgrade Now!
Steam will stop supporting 32-bit versions of Windows. So, if you’re still rocking 32-bit, it’s time for an upgrade before your games vanish faster than your New Year’s resolutions!
ChatGPT Search Update: Say Goodbye to Hallucinations, Hello to Smarter Searches!
ChatGPT Search just got a brain boost! OpenAI’s update means fewer hallucinations and better shopping sleuthing. Plus, answers now come in quick-read format. Meanwhile, GPT-5 Thinking introduces “juice” levels for customized reasoning—think of it as your AI’s caffeine fix!
Teen Hackers Nabbed: UK Police Bust Scattered Spider Duo Behind TfL Cyberattack
UK Police arrested two teen hackers from the Scattered Spider group linked to the 2024 Transport for London cyberattack. The suspects, ages 18 and 19, are charged with conspiring to commit unauthorized acts against TfL. This high-stakes drama proves you should never underestimate the power of a teenager with a laptop.
Ivanti EPMM’s Malware Mayhem: How Hackers Turned Vulnerabilities into a Cyber Comedy Show
CISA warns of malware lurking in Ivanti Endpoint Manager Mobile due to two vulnerabilities—think of it as a digital version of leaving your door wide open while shouting, “Free snacks inside!” Time to patch up and kick out those cyber freeloaders before they throw a party on your server.
ChatGPT Tricked into Solving CAPTCHAs: Can AI Outsmart CAPTCHA Security?
AI security platform SPLX has shown that prompt injections can trick a ChatGPT agent into solving CAPTCHAs, despite its built-in refusals. By convincing the AI that CAPTCHAs are fake, the researchers bypassed security measures, raising doubts about CAPTCHA’s long-term viability.