everyone calm down, the enormous #NPM supply chain attack of the incredibly popular (27,000 #github stars) #nx#AI build tool thingamajig is probably aimed solely at crypto bros. if you don't have any crypto you (hopefully) don't have anything to worry about.

my fact free, completely unsupported by evidence hunch is that we will find this came from #NorthKorea (because if it's a well orchestrated attempt to steal a bunch of crypto it's pretty much always north korea).

https://universeodon.com/@cryptadamist/115102035321832152

#crypto #cryptocurrency #ethereum #npm #nodejs #node #js#javascript#webdev#DPRK#LazarusGroup #cybersecurity #infosec #threatintel #claude #gemini

Pentagon Warns Microsoft: Company’s Use of China-Based Engineers Was a “Breach of Trust”
---

The Defense Department is opening an investigation to determine if the tech giant’s use of overseas engineers to maintain sensitive U.S. government computer systems compromised national security.
https://www.propublica.org/article/microsoft-china-defense-department-digital-escorts-investigation-warning?utm_source=mastodon&utm_medium=social&utm_campaign=mastodon-post

#News#Microsoft#Tech#Pentagon#Defense #Technology#Cybersecurity

Tuta
Tuta boosted

🔐 Tuta Mail introduces key verification to strengthen end-to-end encryption and defend against MITM attacks 👥
Users can now verify contacts’ public keys via QR code or manual comparison.
If skipped, Tuta defaults to TOFU (Trust On First Use) for seamless encryption 🧩

@Tutanota
🔗 https://tuta.com/blog/key-verification

#Encryption#CyberSecurity#Privacy#Tuta#Tutanota#TutaMail#EmailSecurity#OpenSource#FOSS#E2EE#PGP#Email#Mail#TechNews#DataProtection#Crypto#DigitalRights#OnlinePrivacy

🔐 Tuta Mail introduces key verification to strengthen end-to-end encryption and defend against MITM attacks 👥
Users can now verify contacts’ public keys via QR code or manual comparison.
If skipped, Tuta defaults to TOFU (Trust On First Use) for seamless encryption 🧩

@Tutanota
🔗 https://tuta.com/blog/key-verification

#Encryption#CyberSecurity#Privacy#Tuta#Tutanota#TutaMail#EmailSecurity#OpenSource#FOSS#E2EE#PGP#Email#Mail#TechNews#DataProtection#Crypto#DigitalRights#OnlinePrivacy

Japanese authorities have issued a joint advisory about Salt Typhoon, a Chinese government-backed hacker group, in a document prepared by the United States and signed by 13 countries including the U.K. and Canada. https://www.japantimes.co.jp/news/2025/08/28/japan/crime-legal/china-hacker-group-warning/?utm_medium=Social&utm_source=mastodon #japan #crimelegal #cybersecurity #hacking #japanesepolice

⚠️ NX Compromised to Steal Wallets and Credentials

「 That malware steals wallets and API keys (.npmrc, env variables, etc.) and pushes them in that repository in the results.b64 file. Interestingly, the malware checks for the presence of Claude Code CLI or Gemini CLI on the system to offload much of the fingerprintable code to a prompt 」

https://semgrep.dev/blog/2025/security-alert-nx-compromised-to-steal-wallets-and-credentials/

#nx #malware #cybersecurity

everyone calm down, the enormous #NPM supply chain attack of the incredibly popular (27,000 #github stars) #nx#AI build tool thingamajig is probably aimed solely at crypto bros. if you don't have any crypto you (hopefully) don't have anything to worry about.

my fact free, completely unsupported by evidence hunch is that we will find this came from #NorthKorea (because if it's a well orchestrated attempt to steal a bunch of crypto it's pretty much always north korea).

https://universeodon.com/@cryptadamist/115102035321832152

#crypto #cryptocurrency #ethereum #npm #nodejs #node #js#javascript#webdev#DPRK#LazarusGroup #cybersecurity #infosec #threatintel #claude #gemini

beka valentine
Christine Lemmer-Webber 🌀
Tim Chambers
beka valentine and 2 others boosted

Security researchers from Palo Alto Networks' Unit 42 have discovered the key to getting large language model (LLM) chatbots to ignore their guardrails, and it's quite simple.

You just have to ensure that your prompt uses terrible grammar and is one massive run-on sentence like this one which includes all the information before any full stop which would give the guardrails a chance to kick in before the jailbreak can take effect and guide the model into providing a "toxic" or otherwise verboten response the developers had hoped would be filtered out.

https://www.theregister.com/2025/08/26/breaking_llms_for_fun/

#cybersecurity#AI

"Last week, Russia announced it will require that all new phones and tablets sold within its borders pre-install a messaging app called Max. Security experts who did technical analyses of Max’s software for Forbes said it’s a privacy nightmare.

While Russia’s interior ministry has claimed the app, made by Russian social media giant VK, is more secure than competitors, a cybersecurity researcher found that Max constantly monitored all user activity on the app with“excessive tracking.” The researcher, who completed the analysis with phone forensics tool Corellium, asked to remain anonymous for fear of reprisals by Russian intelligence agencies.

“This app just gathers all the data and logs it. I don’t remember seeing that in any messenger app,” they said. “Max is not secure at all. There is no cryptography, unless it’s hidden very well, but I doubt that. It is insecure by design to serve its purpose: people surveillance.”

Max was launched in March, and appears to be limited to Russian and Belarussian phone numbers. Functionally it works similar to messaging apps like Telegram and Whatsapp, but it also has an AI chatbot called GigaChat 2.0 and the ability to book travel and make bank transfers."

https://www.forbes.com/sites/thomasbrewster/2025/08/26/kremlin-whatsapp-rival-is-designed-to-spy-on-users/

#Russia#CyberSecurity#Messaging#Privacy#LocationTracking#Spyware#Surveillance

"Last week, Russia announced it will require that all new phones and tablets sold within its borders pre-install a messaging app called Max. Security experts who did technical analyses of Max’s software for Forbes said it’s a privacy nightmare.

While Russia’s interior ministry has claimed the app, made by Russian social media giant VK, is more secure than competitors, a cybersecurity researcher found that Max constantly monitored all user activity on the app with“excessive tracking.” The researcher, who completed the analysis with phone forensics tool Corellium, asked to remain anonymous for fear of reprisals by Russian intelligence agencies.

“This app just gathers all the data and logs it. I don’t remember seeing that in any messenger app,” they said. “Max is not secure at all. There is no cryptography, unless it’s hidden very well, but I doubt that. It is insecure by design to serve its purpose: people surveillance.”

Max was launched in March, and appears to be limited to Russian and Belarussian phone numbers. Functionally it works similar to messaging apps like Telegram and Whatsapp, but it also has an AI chatbot called GigaChat 2.0 and the ability to book travel and make bank transfers."

https://www.forbes.com/sites/thomasbrewster/2025/08/26/kremlin-whatsapp-rival-is-designed-to-spy-on-users/

#Russia#CyberSecurity#Messaging#Privacy#LocationTracking#Spyware#Surveillance

I find this report by Group-IB quite intriguing since it would appear to suggest a collaboration between Chinese and Russian actors.

That itself is interesting and would appear to mimic the geopolitical landscape where Russia and China are quite cozy.

https://www.group-ib.com/blog/shadowsilk/

#ThreatIntel#Cybersecurity#Russia#China#ShadowSilk

Whistleblower: DOGE hat Daten zu allen Menschen in den USA in die Cloud kopiert

In der US-Sozialkasse haben Angestellte von DOGE laut einer Whistleblower-Beschwerde eine hochsensible Datenbank in die Cloud kopiert. Das Risiko sei enorm.

https://www.heise.de/news/Whistleblower-DOGE-hat-Daten-zu-allen-Menschen-in-den-USA-in-die-Cloud-kopiert-10622689.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&utm_source=mastodon

#Cybersecurity#Datenschutz#Datensicherheit#ElonMusk#IT #news

ajuvo ✔
ajuvo ✔ boosted

Puh endlich ist unsere große Wechselrichter-Geschichte erschienen. Sie ist voller Sicherheitslücken und anderer Angriffspunkte und mir ist mit jedem Interview und jeder Analyse klar geworden: es sieht nicht gut aus. 80 Prozent der Technik auch in privaten Solaranlagen stammt aus China und kann von dort fern gesteuert werden. Und es gibt Sicherheitslücken noch und nöcher.
(Paywall; freier Link folgt für Follower:innen im Thread)
https://www.zeit.de/digital/2025-08/sicherheit-solaranlagen-wechselrichter-angriff-hacker
#cybersecurity #solar #photovoltaik