An August 5 posting by the Google Threat Intelligence Group has confirmed that one of the corporate databases was impacted by hackers thought to be associated with the ShinyHunters ransomware group, more formally known as UNC6040.

The database in question was a Salesforce instance “used to store contact information and related notes for small and medium businesses.”

https://www.forbes.com/sites/daveywinder/2025/08/07/google-confirms-it-has-been-hacked---user-data-stolen/

#security #google

Greg Lloyd
Greg Lloyd boosted
#mcp is going to need to rediscover all the #security pitfalls of URI invocation that plagued #mobile devices and were ultimately solved through mechanisms to claim authoritative use of URIs to prevent applications from hijacking them.

MCP has two likely weaknesses by design: 1) Tool invocation hijacking (there's a global tool registry indexed by tool names and URI-like namespaces but zero assurance the right tool is bound to that namespace) and 2) Resource hijacking ( represented as URIs)

#mcp is going to need to rediscover all the #security pitfalls of URI invocation that plagued #mobile devices and were ultimately solved through mechanisms to claim authoritative use of URIs to prevent applications from hijacking them.

MCP has two likely weaknesses by design: 1) Tool invocation hijacking (there's a global tool registry indexed by tool names and URI-like namespaces but zero assurance the right tool is bound to that namespace) and 2) Resource hijacking ( represented as URIs)

Anke
Anke boosted

Smartphone security tip of the week: Do not use your anonymous SIM card at the same time as a non-anonymous card

If you use an anonymous SIM card, but a second non-anonymous card is inserted in your device at the same time, the anonymous SIM card is no longer anonymous. This also applies to a second phone that you carry with you.

Read more about this topic: https://smartphone-dont-spy.de/en/list/do-not-use-your-anonymous-sim-card-at-the-same-time-as-a-non-anonymous-card

#smartphone #privacy #security

Smartphone security tip of the week: Do not use your anonymous SIM card at the same time as a non-anonymous card

If you use an anonymous SIM card, but a second non-anonymous card is inserted in your device at the same time, the anonymous SIM card is no longer anonymous. This also applies to a second phone that you carry with you.

Read more about this topic: https://smartphone-dont-spy.de/en/list/do-not-use-your-anonymous-sim-card-at-the-same-time-as-a-non-anonymous-card

#smartphone #privacy #security

Mre. Dartigen [maker mode]
Michał "rysiek" Woźniak · 🇺🇦
Mre. Dartigen [maker mode] and 1 other boosted

Microsoft - as always, a threat to your security and privacy

I know some people don’t have the choice, but if you do, consider a different option. ‘Recall’ is a direct threat to your personal information.

https://www.theregister.com/2025/08/01/microsoft_recall_captures_credit_card_info/

#Microsoft#Security#Windows#Recall#Privacy#JustSayNo

Neil Brown
Neil Brown boosted

Credentials shouldn't be around in plain text files. But I also don't want to set up a fully fledged credentials management solution for my homelab.

Wouldn't it be nice to dynamically load the credentials I need when I step into my work directory, and remove then when I leave it?

Let's use @bitwarden and direnv to keep credentials safe in all simplicity!

https://ergaster.org/posts/2025/07/28-direnv-bitwarden-integration/

#homelab #security #sysadmin

Introduction to Qubes OS when you do not know what it is

In this article, you will learn about major features of the Qubes OS operating system and what makes it unique.

https://dataswamp.org/~solene/2025-08-03-introduction-to-qubes-os.html

gemini://perso.pw/blog/articles/introduction-to-qubes-os.gmi
#qubes #security

@solene

der.hans
Dane  🇮🇪 ☮️🕉️⚛️☸️
jbz
der.hans and 3 others boosted

***infosec specialists are needed in the resistance ***

The world needs tech security specialists to run workshops at public libraries for all ages & abilities to remove spyware, AI, reduce surveillance, understand the issues, & for more advanced, move to Linux, degooglefy, etc.

Libraries will pay good wages for these workshops.
If you have these skills, please consider offering them.

#libraries #library #tech #infosec #privacy #security #activism #antifa #resistance

I keep reading posts recommending consumer VPNs to aid privacy.

Here's my concern - tell me I'm wrong.

1. Most consumer VPNs are installed on a device. You need to sign in as a paying customer. So they know who you are. And your credit card details strengthen that ability to know who you are. Meanwhile a household internet access via an ISP can't easily pin down who is making the internet requests in a home.

2. These consumer VPN providers route all your internet traffic. They have a fuller, if not complete, custody of your internet traffic even if you move from home ISP to cafe WiFi to office guest WiFi to mobile 4G data. That is, with no VPN your traffic is separated through different networks.

3. You likely have done zero due diligence on who the VPN providers are. How can you trust them as individuals? How can you trust their technology and processes? Even if they say they don't log your metadata, how do you know? And how do you know they won't start selling it next year even if they don't now.

4. If they get hacked, all your traffic is at risk. With multiple internet routes (home, office, 4G, cafe) your traffic eggs are not all in one easy basket.

5. VPN software installs with elevated privileges on your device. Makes malware easier.

#tech #privacy #security

Buniboo hovers in the air. A rabbit type creature cartoon with spinning ears like a helicopter
Buniboo hovers in the air. A rabbit type creature cartoon with spinning ears like a helicopter