
Afghanistan, fuga di dati: grave leak per il MoD britannico
#CyberSecurity
https://insicurezzadigitale.com/afghanistan-fuga-di-dati-grave-leak-per-il-mod-britannico/
Afghanistan, fuga di dati: grave leak per il MoD britannico
#CyberSecurity
https://insicurezzadigitale.com/afghanistan-fuga-di-dati-grave-leak-per-il-mod-britannico/
Exposing the Unseen: Mapping MCP Servers Across the Internet
"We identified a total of 1,862 MCP servers exposed to the internet. From this set, we manually verified a sample of 119. All 119 servers granted access to internal tool listings without authentication."
this is why I keep a very watchful eye on Knostic about AI stuff, they know the tech, the risks, and how human behavior will interact with them.
A ProPublica investigation revealed how a little-known Microsoft program could leave some of the U.S. government’s most sensitive data vulnerable to hacking from its leading cyber adversary.
Here are the biggest takeaways from our reporting.
https://www.propublica.org/article/microsoft-digital-escort-china-government-data-takeaways?utm_source=mastodon&utm_medium=social&utm_campaign=mastodon-post
#News#Tech #Technology#Microsoft#Cybersecurity#Cybercrime#Government
The CHERI Alliance is all about bringing the computing world together to adopt CHERI security technology.
We’re a mix of industry partners, open-source contributors, researchers, and governments, all working to make CHERI more accessible and widely used.
Check out who’s already on board: https://cheri-alliance.org/member/
We’ve got active working groups tackling everything from software porting to system integration and standards - all helping the community adopt and build with CHERI more effectively. Take a look: https://cheri-alliance.org/who-we-are/working-groups/
Curious? Keen to get involved? Here’s how to join us: https://cheri-alliance.org/memberships/
A Little-Known Microsoft Program Could Expose the Defense Department to Chinese Hackers
—
The Pentagon bans foreign citizens from accessing highly sensitive data, but Microsoft bypasses this by using engineers in China and elsewhere to remotely instruct American “escorts” who may lack expertise to identify malicious code.
#News#Tech#Cybersecurity #Technology#Microsoft#Government#Data
Just a quickie from one of our @DomainTools researchers today that I know @cR0w will enjoy.
Malware in DNS - specifically, malware seen being assembled from DNS TXT records.
Not a "zomg new thing!" so much as a neat example in the wild.
The Golden Triangle Special Economic Zone, an area in Laos meant for gambling and resort life, has become a center for money laundering and trafficking. https://www.japantimes.co.jp/news/2025/07/15/asia-pacific/crime-legal/las-vegas-laos-city-crime/?utm_medium=Social&utm_source=mastodon #asiapacific #crimelegal #cybercrime #goldentriangle #laos #southeastasia #cybersecurity #hacking #organizedcrime #smuggling #moneylaundering #fraud #china
This is fun. Google Gemini’s “Summarize email” function is vulnerable to invisible prompt injection utilized to deceive users, including with fake security alerts.
HTTP/1.1 101 Switching Protocols
Upgrade: Owncast Live Stream
I am now live on my Owncast instance!
I forgot to take my probiotics... So let's play Abiotic Factor with Ozoned!
#videogames #chatting #casual #english #cybersecurity #streaming #owncast
Endlich erschienen: Meine Geschichte über mein Evil Bit und wie es dazu beigetragen hat, dass ich ein Atomkraftwerk gehackt (und Barack Obamas Sicherheitsberater eine Spearphishing-E-Mail geschickt) habe.
🎁 Geschenk-Link 🎁
#Cybersecurity
https://www.zeit.de/digital/datenschutz/2025-07/cybersecurity-konferenz-europa-cyberattacken-russland-chris-kubecka?freebie=8cae0fa7
A space for Bonfire maintainers and contributors to communicate