I added hover over text, it messed up some of the formatting. But whatever, I gotta go write my TPS report.

Krebs on Security

Dark Reading

The Hacker News [ THN ] - Best Security Blog

2025-12-05 - JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
2025-12-04 - Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
2025-12-04 - ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
2025-12-04 - 5 Threats That Reshaped Web Security This Year [2025]
2025-12-04 - GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
2025-12-04 - Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts
2025-12-03 - Critical RSC Bugs in React and Next.js Allow Unauthenticated Remote Code Execution
2025-12-03 - Discover the AI Tools Fueling the Next Cybercrime Wave — Watch the Webinar
2025-12-03 - Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation
2025-12-03 - WordPress King Addons Flaw Under Active Attack Lets Hackers Make Admin Accounts
2025-12-03 - Brazil Hit by Banking Trojan Spread via WhatsApp Worm and RelayNFC NFC Relay Fraud
2025-12-03 - Chopping AI Down to Size: Turning Disruptive Technology into a Strategic Advantage
2025-12-03 - Picklescan Bugs Allow Malicious PyTorch Models to Evade Scans and Execute Code
2025-12-03 - Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems
2025-12-02 - India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse
2025-12-02 - Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera
2025-12-02 - GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools
2025-12-02 - Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools
2025-12-02 - Iran-Linked Hackers Hit Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks
2025-12-02 - SecAlerts Cuts Through the Noise with a Smarter, Faster Way to Track Vulnerabilities
2025-12-02 - Google Patches 107 Android Flaws, Including Two Framework Bugs Exploited in the Wild
2025-12-01 - India Orders Phone Makers to Pre-Install Government App to Tackle Telecom Fraud
2025-12-01 - ShadyPanda Turns Popular Browser Extensions with 4.3 Million Installs Into Spyware
2025-12-01 - ⚡ Weekly Recap: Hot CVEs, npm Worm Returns, Firefox RCE, M365 Email Raid & More
2025-12-01 - Webinar: The "Agentic" Trojan Horse: Why the New AI Browsers War is a Nightmare for Security Teams
2025-12-01 - New Albiriox MaaS Malware Targets 400+ Apps for On-Device Fraud and Screen Control
2025-12-01 - Tomiris Shifts to Public-Service Implants for Stealthier C2 in Attacks on Government Targets

Schneier on Security

2025-12-02 - Future Politics,” British barrister Jamie Susskind wrote that the dominant question of the 20th century was “How much of our collective life should be determined by the state, and what should be left to the market and civil society?” But in the early decades of this century, Susskind suggested that we face a different question: “To what extent should our lives be directed and controlled by powerful digital systems—and on what terms?”

Artificial intelligence (AI) forces us to confront this question. It is a technology that in theory amplifies the power of its users: A manager, marketer, political campaigner, or opinionated internet user can utter a single instruction, and see their message—whatever it is—instantly written, personalized, and propagated via email, text, social, or other channels to thousands of people within their organization, or millions around the world. It also allows us to individualize solicitations for political donations, elaborate a grievance into a well-articulated policy position, or tailor a persuasive argument to an identity group, or even a single person...

">Like Social Media, AI Requires Difficult Choices
2025-12-01 - banning VPNs, because…think of the children!

As of this writing, Wisconsin lawmakers are escalating their war on privacy by targeting VPNs in the name of “protecting children” in A.B. 105/S.B. 130. It’s an age verification bill that requires all websites distributing material that could conceivably be deemed “sexual content” to both implement an age verification system and also to block the access of users connected via VPN. The bill seeks to broadly expand the definition of materials that are “harmful to minors” beyond the type of speech that states can prohibit minors from accessing­ potentially encompassing things like depictions and discussions of human anatomy, sexuality, and reproduction...

">Banning VPNs
2025-12-01 - found dead on an Israeli beach. The species is rare in the Mediterranean.

As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.

Blog moderation policy.

">Friday Squid Blogging: Flying Neon Squid Found on Israeli Beach
2025-12-01 - Adversarial Poetry as a Universal Single-Turn Jailbreak Mechanism in Large Language Models,” researchers found that turning LLM prompts into poetry resulted in jailbreaking the models:

Abstract: We present evidence that adversarial poetry functions as a universal single-turn jailbreak technique for Large Language Models (LLMs). Across 25 frontier proprietary and open-weight models, curated poetic prompts yielded high attack-success rates (ASR), with some providers exceeding 90%. Mapping prompts to MLCommons and EU CoP risk taxonomies shows that poetic attacks transfer across CBRN, manipulation, cyber-offence, and loss-of-control domains. Converting 1,200 ML-Commons harmful prompts into verse via a standardized meta-prompt produced ASRs up to 18 times higher than their prose baselines. Outputs are evaluated using an ensemble of 3 open-weight LLM judges, whose binary safety assessments were validated on a stratified human-labeled subset. Poetic framing achieved an average jailbreak success rate of 62% for hand-crafted poems and approximately 43% for meta-prompt conversions (compared to non-poetic baselines), substantially outperforming non-poetic baselines and revealing a systematic vulnerability across model families and safety training approaches. These findings demonstrate that stylistic variation alone can circumvent contemporary safety mechanisms, suggesting fundamental limitations in current alignment methods and evaluation protocols...

">Prompt Injection Through Poetry
2025-12-03 - World Forum on Democracy in Strasbourg, the general expectation is that democracy will be the worse for it. We have another narrative. Yes, there are risks to democracy from AI, but there are also opportunities.

We have just published the book Rewiring Democracy: How AI will Transform Politics, Government, and Citizenship. In it, we take a clear-eyed view of how AI is undermining confidence in our information ecosystem, how the use of biased AI can harm constituents of democracies and how elected officials with authoritarian tendencies can use it to consolidate power. But we also give positive examples of how AI is transforming democratic governance and politics for the better...

">Four Ways AI Is Being Used to Strengthen Democracies Worldwide

ThreatPost

Sydney Morning Herald

New York Times

2025-12-04 - Meta Weighs Cuts to Its Metaverse Unit
2025-12-04 - A.I. Deal Making Is Getting Faster
2025-12-04 - Why One Man Is Fighting for Our Right to Control Our Garage Door Openers
2025-12-03 - Bitcoin’s Predicted Sky-High Prices Have Not Panned Out
2025-12-05 - Rebecca Heineman, Transgender Video Game Pioneer, Dies at 62
2025-12-04 - His Group Made World-Class Measurements of Atomic Elements
2025-12-02 - Beta Will Sell Motors to Another Electric Aircraft Company
2025-12-02 - Silicon Valley Builds Amazon and Gmail Copycats to Train A.I. Agents
2025-12-01 - College Students Choosing A.I. Majors Over Computer Science
2025-12-01 - Silicon Valley’s Man in the White House Is Benefiting Himself and His Friends

Wall Street Journal

BBC

2025-12-04 - Porn site fined £1m over age checks has never responded to Ofcom
2025-12-03 - New homes delayed by 'energy-hungry' data centres
2025-12-03 - Production halted at Chinese factory making 'childlike' sex dolls
2025-12-03 - India scraps order to pre-install state-run cyber safety app on smartphones
2025-12-02 - Bank of England warns of AI bubble risk
2025-12-02 - Dell family to seed Trump accounts for kids with $250
2025-12-02 - YouTuber Marques Brownlee shutting down phone wallpaper app
2025-12-02 - Fashion house Valentino criticised over 'disturbing' AI handbag ads
2025-12-02 - 'First of its kind' scanner to study blast trauma
2025-12-01 - Jorja Smith's record label hits out at 'AI clone' song
2025-12-01 - Virgin Media fined £24m for leaving vulnerable customers 'at risk of harm'
2025-12-02 - Tech Life

SecurityBrief AU

ITNews AU

2025-12-04 - India revokes order to preload cyber security app on smartphones
2025-12-04 - ASX outage caused by security software upgrade
2025-12-02 - Home Affairs to unleash AI on sensitive government data
2025-12-02 - South Korean police probe massive data leak at Coupang
2025-12-02 - Watt flags more fed insourcing after BoM website outrage
2025-12-01 - WA man jailed for at least five years for evil twin attack

BleepingComputer

2025-12-04 - Hackers are exploiting ArrayOS AG VPN flaw to plant webshells
2025-12-04 - NCSC's ‘Proactive Notifications’ warns orgs of flaws in exposed devices
2025-12-04 - Predator spyware uses new infection vector for zero-click attacks
2025-12-04 - Russia blocks FaceTime and Snapchat for alleged use by terrorists
2025-12-04 - CISA warns of Chinese "BrickStorm" malware attacks on VMware servers
2025-12-04 - Contractors with hacking records accused of wiping 96 govt databases
2025-12-04 - Critical React, Next.js flaw lets hackers execute code on servers
2025-12-04 - How strong password policies secure OT systems against cyber threats
2025-12-04 - Microsoft 365 license check bug blocks desktop app downloads
2025-12-03 - Marquis data breach impacts over 74 US banks, credit unions
2025-12-03 - Critical flaw in WordPress add-on for Elementor exploited in attacks
2025-12-03 - French DIY retail giant Leroy Merlin discloses a data breach
2025-12-03 - Freedom Mobile discloses data breach exposing customer data

/r/NetSec

2025-12-01 -

Questions regarding netsec and discussion related directly to netsec are welcome here, as is sharing tool links.

Rules & Guidelines

As always, the content & discussion guidelines should also be observed on r/netsec.

Feedback

Feedback and suggestions are welcome, but don't post it here. Please send it to the moderator inbox.

submitted by /u/albinowax
[link] [comments]">r/netsec monthly discussion & tool thread
2025-12-05 - /u/alt69785
[link] [comments]">Privilege escalation with SageMaker and there's more hiding in execution roles
2025-12-04 - /u/ScottContini
[link] [comments]">Prompt Injection Inside GitHub Actions
2025-12-05 - /u/WesternBest
[link] [comments]">Scam Telegram: Uncovering a network of groups spreading crypto drainers
2025-12-04 - /u/alt69785
[link] [comments]">How I Reverse Engineered a Billion-Dollar Legal AI Tool and Found 100k+ Confidential Files
2025-12-04 - /u/rebane2001
[link] [comments]">SVG Clickjacking: A novel and powerful twist on an old classic
2025-12-04 - /u/smode21
[link] [comments]">Second order prompt injection attacks on ServiceNow Now Assist
2025-12-03 - /u/theMiddleBlue
[link] [comments]">68% Of Phishing Websites Are Protected by CloudFlare
2025-12-04 - /u/Mempodipper
[link] [comments]">High Fidelity Detection Mechanism for RSC/Next.js RCE (CVE-2025-55182 & CVE-2025-66478)
2025-12-04 -

Rolling out a small research utility I have been building. It provides a simple way to look up proof-of-concept exploit links associated with a given CVE. It is not a vulnerability database. It is a discovery surface that points directly to the underlying code. Anyone can test it, inspect it, or fold it into their own workflow.

A small rate limit is in place to stop automated scraping. The limit is visible at:

https://labs.jamessawyer.co.uk/cves/api/whoami

An API layer sits behind it. A CVE query looks like:

curl -i "https://labs.jamessawyer.co.uk/cves/api/cves?q=CVE-2025-0282"

The Web Ui is

https://labs.jamessawyer.co.uk/cves/

submitted by /u/JS-Labs
[link] [comments]">CVE PoC Search
2025-12-04 - /u/Salt-Consequence3647
[link] [comments]">Hunting the hidden gems in libraries
2025-12-03 - /u/unknownhad
[link] [comments]">Critical Security Vulnerability in React Server Components – React
2025-12-03 - /u/AlmondOffSec
[link] [comments]">From Zero to SYSTEM: Building PrintSpoofer from Scratch
2025-12-03 - /u/SRMish3
[link] [comments]">PyTorch Users at Risk: Unveiling 3 Zero-Day PickleScan Vulnerabilities
2025-12-03 -

Most open-source L7 DDoS mitigation and bot-protection approaches rely on challenges (e.g., CAPTCHA or JavaScript proof-of-work) or static rules based on the User-Agent, Referer, or client geolocation. These techniques are increasingly ineffective, as they are easily bypassed by modern open-source impersonation libraries and paid cloud proxy networks.

We explore a different approach: classifying HTTP client requests in near real time using ClickHouse as the primary analytics backend.

We collect access logs directly from Tempesta FW, a high-performance open-source hybrid of an HTTP reverse proxy and a firewall. Tempesta FW implements zero-copy per-CPU log shipping into ClickHouse, so the dataset growth rate is limited only by ClickHouse bulk ingestion performance - which is very high.

WebShield, a small open-source Python daemon:

To simplify and accelerate classification — whether automatic or manual — we introduced a new TLS fingerprinting method.

WebShield is a small and simple daemon, yet it is effective against multi-thousand-IP botnets.

The full article with configuration examples, ClickHouse schemas, and queries.

submitted by /u/krizhanovsky
[link] [comments]">Using ClickHouse for Real-Time L7 DDoS & Bot Traffic Analytics with Tempesta FW
2025-12-03 - /u/Salt-Consequence3647
[link] [comments]">Newly allocated CVEs on an ICS 5G modem
2025-12-03 - /u/duduywn
[link] [comments]">Hacking the Meatmeet BBQ Probe — BLE BBQ Botnet
2025-12-03 -

https://invicti.com/blog/security-labs/security-research-in-the-age-of-ai-tools

submitted by /u/Ok_Information1453
[link] [comments]">Security research in the age of AI tools
2025-12-01 - /u/alt69785
[link] [comments]">Shai Hulud 2.0: Analysis and Community Resources
2025-12-01 - /u/smaury
[link] [comments]">Security Audit of OpenEXR · Luma
2025-12-01 - /u/netbiosX
[link] [comments]">Bind Link – EDR Tampering
2025-12-01 -

Hey everyone, if you manage cloud infrastructure, Kubernetes, or container workloads and use tools like CSPM / CNAPP / runtime protection / WAF / IDS, you probably hope they catch real attacks. But how if they work under real-world conditions?

That’s where ARMO CTRL comes in: it’s a free, controlled attack lab that helps you simulate real web-to-cloud attacks, and validate whether your security stack actually detects them

What it does

submitted by
/u/Hefty-Bullfrog-9436
[link] [comments]">ARMO CTRL: Cloud Threat Readiness Lab for Realistic Attack Testing
2025-12-01 - /u/unknownhad
[link] [comments]">How i found a europa.eu compromise

/r/InfoSecNews

2025-12-05 - Predator spyware uses new infection vector for zero-click attacks submitted by /u/quellaman
[link] [comments] ">Predator spyware uses new infection vector for zero-click attacks
2025-12-04 - North Korean State Hacker's Device Infected with LummaC2 Infostealer Shows Links to $1.4B ByBit Breach, Tools, Specs and More submitted by /u/jamessonnycrockett
[link] [comments] ">North Korean State Hacker's Device Infected with LummaC2 Infostealer Shows Links to $1.4B ByBit Breach, Tools, Specs and More
2025-12-04 - Cloudflare Blocks Aisuru Botnet Powered Largest Ever 29.7 Tbps DDoS Attack submitted by /u/jamessonnycrockett
[link] [comments] ">Cloudflare Blocks Aisuru Botnet Powered Largest Ever 29.7 Tbps DDoS Attack
2025-12-04 - Contractors with hacking records accused of wiping 96 govt databases submitted by /u/quellaman
[link] [comments] ">Contractors with hacking records accused of wiping 96 govt databases
2025-12-04 - WebXR Flaw Hits 4 Billion Chromium Users, Update Your Browser Now submitted by /u/jamessonnycrockett
[link] [comments] ">WebXR Flaw Hits 4 Billion Chromium Users, Update Your Browser Now
2025-12-04 - Newly Sold Albiriox Android Malware Targets Banks and Crypto Holders submitted by /u/jamessonnycrockett
[link] [comments] ">Newly Sold Albiriox Android Malware Targets Banks and Crypto Holders
2025-12-04 - Kohler's Encrypted Smart Toilet Camera is not Actually end-to-end Encrypted submitted by /u/quellaman
[link] [comments] ">Kohler's Encrypted Smart Toilet Camera is not Actually end-to-end Encrypted
2025-12-04 - Marquis data breach impacts over 74 US banks, credit unions submitted by /u/quellaman
[link] [comments] ">Marquis data breach impacts over 74 US banks, credit unions
2025-12-04 - /u/quellaman
[link] [comments]">GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
2025-12-03 - French DIY retail giant Leroy Merlin discloses a data breach submitted by /u/quellaman
[link] [comments] ">French DIY retail giant Leroy Merlin discloses a data breach
2025-12-03 - Freedom Mobile discloses data breach exposing customer data submitted by /u/quellaman
[link] [comments] ">Freedom Mobile discloses data breach exposing customer data
2025-12-03 - /u/quellaman
[link] [comments]">Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation
2025-12-03 - Fake ChatGPT Atlas Browser Used in ClickFix Attack to Steal Passwords submitted by /u/jamessonnycrockett
[link] [comments] ">Fake ChatGPT Atlas Browser Used in ClickFix Attack to Steal Passwords
2025-12-03 - Deep dive into DragonForce ransomware and its Scattered Spider connection submitted by /u/quellaman
[link] [comments] ">Deep dive into DragonForce ransomware and its Scattered Spider connection
2025-12-03 - /u/quellaman
[link] [comments]">Brazil Hit by Banking Trojan Spread via WhatsApp Worm and RelayNFC NFC Relay Fraud
2025-12-03 - /u/quellaman
[link] [comments]">WordPress King Addons Flaw Under Active Attack Lets Hackers Make Admin Accounts
2025-12-03 - Russia blocks Roblox over distribution of LGBT "propaganda" submitted by /u/quellaman
[link] [comments] ">Russia blocks Roblox over distribution of LGBT "propaganda"
2025-12-03 - /u/quellaman
[link] [comments]">Critical RSC Bugs in React and Next.js Allow Unauthenticated Remote Code Execution
2025-12-03 - 7 Year Long ShadyPanda Attack Spied on 4.3M Chrome and Edge Users submitted by /u/jamessonnycrockett
[link] [comments] ">7 Year Long ShadyPanda Attack Spied on 4.3M Chrome and Edge Users
2025-12-03 - Researchers spotted Lazarus’s remote IT workers in action submitted by /u/quellaman
[link] [comments] ">Researchers spotted Lazarus’s remote IT workers in action
2025-12-03 - University of Phoenix discloses data breach after Oracle hack submitted by /u/quellaman
[link] [comments] ">University of Phoenix discloses data breach after Oracle hack
2025-12-03 - Aisuru botnet behind new record-breaking 29.7 Tbps DDoS attack submitted by /u/quellaman
[link] [comments] ">Aisuru botnet behind new record-breaking 29.7 Tbps DDoS attack
2025-12-03 - Korea arrests suspects selling intimate videos from hacked IP cameras submitted by /u/quellaman
[link] [comments] ">Korea arrests suspects selling intimate videos from hacked IP cameras
2025-12-03 - /u/quellaman
[link] [comments]">Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems
2025-12-03 - /u/quellaman
[link] [comments]">Picklescan Bugs Allow Malicious PyTorch Models to Evade Scans and Execute Code