Discussion
Loading...

#Tag

  • About
  • Code of conduct
  • Privacy
  • Users
  • Instances
  • About Bonfire
nemo™ 🇺🇦
@nemo@mas.to  ·  activity timestamp 5 days ago

🚨 Mozilla drops urgent Firefox update patching 16 vulnerabilities incl. critical remote code execution & sandbox escapes in versions 145 & ESR 115.30/140.5. Users must update NOW to stay safe! 🔐🔥 Details: https://gbhackers.com/mozilla-issues-urgent-firefox-update-2/ #CyberSecurity #FirefoxUpdate #ZeroDay #newz

GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Mozilla Issues Urgent Firefox Update to Patch Critical Code Execution Flaws

The Mozilla Foundation released three critical security advisories on November 11, 2025, addressing 16 unique vulnerabilities.
  • Copy link
  • Flag this post
  • Block
Sascha Pallenberg 🇹🇼 ♻️ ⚡
@pallenberg@mastodon.social  ·  activity timestamp 2 weeks ago

Wenn IT-Sicherheit "oberste Prio" hat 🙈

Zero-Day-Lücke bei LNK-Anzeige in Windows gegen Diplomaten missbraucht

#Microsoft #Windows
https://www.heise.de/news/Windows-Zero-Day-Luecke-bei-LNK-Anzeige-gegen-Diplomaten-missbraucht-10983101.html?wt_mc=rss.red.ho.ho.rdf.beitrag.beitrag

Security

Windows-Zero-Day-Lücke bei LNK-Anzeige gegen Diplomaten missbraucht

Microsoft hält eine Lücke in der LNK-Anzeige für nicht behebenswert. Sie wurde inzwischen gegen europäische Diplomaten missbraucht.
:antifa: Eskalator :tux:
@Eskalator@fedifreu.de replied  ·  activity timestamp 2 weeks ago

@pallenberg
Wer weiß, wie viele Geheimdienste die #sicherheitslucken schon lange kennen, aber keinen was sagen, weil sie die Lücke selbst nutzen wollen.

Diese staatliche #Hacking-Strategie ist eine Katastrophe. Vor allem das kaufen und geheim halten von #ZeroDay|s. Die wissen dass eine Schwachstelle verkauft wird, alle User sind angreifbar, sie wissen nicht von wenn alles, aber sie sagen niemandem etwas, und finanzieren durch ihren Kauf #blackhats (kriminelle Hacker).

  • Copy link
  • Flag this comment
  • Block
Stefano Marinelli boosted
R. P. Scott
@i47i@hachyderm.io  ·  activity timestamp last month

Hackers can steal 2FA codes and private messages from Android phones

> Android devices are vulnerable to a new attack that can covertly steal 2FA codes, location timelines, and other private data in less than 30 seconds.

> The new attack, named Pixnapping by the team of academic researchers who devised it, requires a victim to first install a malicious app on an Android phone or tablet.

> The app, which requires no system permissions, can then effectively read data that any other installed app displays on the screen. Pixnapping has been demonstrated on Google Pixel phones and the Samsung Galaxy S25 phone and likely could be modified to work on other models with additional work. Google released mitigations last month, but the researchers said a modified version of the attack works even when the update is installed.
https://arstechnica.com/security/2025/10/no-fix-yet-for-attack-that-lets-hackers-pluck-2fa-codes-from-android-phones/ #Android #Cybersecurity #InfoSec #2FA #Privacy #Pixnapping #GooglePixel #Samsung #MobileSecurity #DataBreach #ZeroDay #TechNews #Hacking

  • Copy link
  • Flag this post
  • Block
R. P. Scott
@i47i@hachyderm.io  ·  activity timestamp last month

Hackers can steal 2FA codes and private messages from Android phones

> Android devices are vulnerable to a new attack that can covertly steal 2FA codes, location timelines, and other private data in less than 30 seconds.

> The new attack, named Pixnapping by the team of academic researchers who devised it, requires a victim to first install a malicious app on an Android phone or tablet.

> The app, which requires no system permissions, can then effectively read data that any other installed app displays on the screen. Pixnapping has been demonstrated on Google Pixel phones and the Samsung Galaxy S25 phone and likely could be modified to work on other models with additional work. Google released mitigations last month, but the researchers said a modified version of the attack works even when the update is installed.
https://arstechnica.com/security/2025/10/no-fix-yet-for-attack-that-lets-hackers-pluck-2fa-codes-from-android-phones/ #Android #Cybersecurity #InfoSec #2FA #Privacy #Pixnapping #GooglePixel #Samsung #MobileSecurity #DataBreach #ZeroDay #TechNews #Hacking

  • Copy link
  • Flag this post
  • Block
Greg Lloyd
@Roundtrip@federate.social  ·  activity timestamp 4 months ago

“Microsoft has released patches to “fully protect” SharePoint 2019 and SharePoint Subscription Edition servers, and the company is actively working on a patch for SharePoint 2016.

#CISA …says that the scope and impact of the attacks are still being assessed, and that any servers that have been impacted by the exploit should be disconnected from the internet until an official resolution is available.”

#Sharepoint #zerodayhttps://mastodon.social/@verge/114890559136880575

  • Copy link
  • Flag this post
  • Block
Ariadne Conill 🐰:therian: boosted
CryptGoat
@cryptgoat@fedifreu.de  ·  activity timestamp 5 months ago
#Bluetooth was a mistake: Millions of Bluetooth headphones can potentially be turned in eavesdropping devices. Best-seller #Sony and #Bose #headphones are affected by at least some of the disclosed flaws among many others. The true dimension of these flaws is yet unknown as the the vulnerable component is very widely in use under different names.

https://www.heise.de/en/news/Zero-day-Bluetooth-gap-turns-millions-of-headphones-into-listening-stations-10460704.html

Disclosure of the vulnerabilities: https://insinuator.net/2025/06/airoha-bluetooth-security-vulnerabilities/

No updates or official statements available yet. ☠️

#Security#Privacy#Audio#Airoha#ZeroDay

  • Copy link
  • Flag this post
  • Block
CryptGoat
@cryptgoat@fedifreu.de  ·  activity timestamp 5 months ago
#Bluetooth was a mistake: Millions of Bluetooth headphones can potentially be turned in eavesdropping devices. Best-seller #Sony and #Bose #headphones are affected by at least some of the disclosed flaws among many others. The true dimension of these flaws is yet unknown as the the vulnerable component is very widely in use under different names.

https://www.heise.de/en/news/Zero-day-Bluetooth-gap-turns-millions-of-headphones-into-listening-stations-10460704.html

Disclosure of the vulnerabilities: https://insinuator.net/2025/06/airoha-bluetooth-security-vulnerabilities/

No updates or official statements available yet. ☠️

#Security#Privacy#Audio#Airoha#ZeroDay

  • Copy link
  • Flag this post
  • Block
Log in

bonfire.cafe

A space for Bonfire maintainers and contributors to communicate

bonfire.cafe: About · Code of conduct · Privacy · Users · Instances
Bonfire social · 1.0.0 no JS en
Automatic federation enabled
  • Explore
  • About
  • Members
  • Code of Conduct
Home
Login