<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>X’s InfoSec Newsletter</title>
    <description>Weekly curated list of {Cyber,Info}Security insightful resources and links, and some other security &amp; privacy things too.</description>
    
    <link>https://infosec-mashup.santolaria.net/</link>
    <atom:link href="https://rss.beehiiv.com/feeds/HVhiKYpQlR.xml" rel="self"/>
    
    <lastBuildDate>Sun, 12 Apr 2026 14:03:58 +0000</lastBuildDate>
    <pubDate>Sat, 11 Apr 2026 08:33:00 +0000</pubDate>
    <atom:published>2026-04-11T08:33:00Z</atom:published>
    <atom:updated>2026-04-12T14:03:58Z</atom:updated>
    
      <category>Artificial Intelligence</category>
      <category>Cybersecurity</category>
      <category>Privacy</category>
    <copyright>Copyright 2026, X’s InfoSec Newsletter</copyright>
    
    <image>
      <url>https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/publication/logo/ab407690-3f0c-4109-add5-5e9bf75e0e54/xsa-hs.png</url>
      <title>X’s InfoSec Newsletter</title>
      <link>https://infosec-mashup.santolaria.net/</link>
    </image>
    
    <docs>https://www.rssboard.org/rss-specification</docs>
    <generator>beehiiv</generator>
    <language>en-us</language>
    <webMaster>support@beehiiv.com (Beehiiv Support)</webMaster>

      <item>
  <title>🕵🏻‍♂️ [InfoSec MASHUP] 15/2026 - Budgets Cut, Breaches Climbing</title>
  <description>Plus: REvil&#39;s alleged leader unmasked, Adobe Reader zero-day since December, and the most uncomfortable job interview you&#39;ll watch this week</description>
  <link>https://infosec-mashup.santolaria.net/p/infosec-mashup-15-2026-budgets-cut-breaches-climbing</link>
  <guid isPermaLink="true">https://infosec-mashup.santolaria.net/p/infosec-mashup-15-2026-budgets-cut-breaches-climbing</guid>
  <pubDate>Sat, 11 Apr 2026 08:33:00 +0000</pubDate>
  <atom:published>2026-04-11T08:33:00Z</atom:published>
    <dc:creator>Xavier Santolaria</dc:creator>
    <category><![CDATA[Malware]]></category>
    <category><![CDATA[Opensource]]></category>
    <category><![CDATA[Privacy]]></category>
    <category><![CDATA[Cybersecurity]]></category>
    <category><![CDATA[Threat Intelligence]]></category>
    <category><![CDATA[Ai]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'IBM Plex Sans',-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'IBM Plex Sans',-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Cybercrime losses hit $20.9 billion in 2025 — a 26% jump, per the FBI&#39;s IC3 report. That figure covers only what victims bothered to report, so treat it as a floor, not a ceiling. This week&#39;s issue arrives alongside a proposal to cut CISA&#39;s budget by $707 million. Whether that&#39;s a bold strategic bet or a spectacular misread of the moment is, apparently, still under debate.</p><p class="paragraph" style="text-align:left;">Let’s now dive into this week’s crème de la crème! 🚀</p><h2 class="heading" style="text-align:left;">Table of Contents</h2><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="#breaches-security-incidents" rel="noopener noreferrer nofollow">BREACHES & SECURITY INCIDENTS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#cybercrime-cyber-espionage-ap-ts" rel="noopener noreferrer nofollow">CYBERCRIME, CYBER ESPIONAGE, APT’s</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#government-politics-and-privacy" rel="noopener noreferrer nofollow">GOVERNMENT, POLITICS, AND PRIVACY</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#malware-threats" rel="noopener noreferrer nofollow">MALWARE & THREATS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#ai-crypto-tech-tools" rel="noopener noreferrer nofollow">AI, CRYPTO, TECH & TOOLS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#vulnerabilities-research-and-threat" rel="noopener noreferrer nofollow">VULNERABILITIES, RESEARCH, AND THREAT INTELLIGENCE</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#ics-ot-io-t" rel="noopener noreferrer nofollow">ICS, OT & IoT</a></p></li></ul><div id="breaches-security-incidents" class="section" style="background-color:transparent;border-color:#C0C0C0;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🔓 BREACHES & SECURITY INCIDENTS</h3><p class="paragraph" style="text-align:left;">🇬🇧 🇺🇸 <b>A hacker redirected a contractor payment and stole £700,000 from Zephyr Energy</b>’s U.S. subsidiary. The company says the<a class="link" href="https://techcrunch.com/2026/04/09/hacker-stole-700000-from-u-k-energy-company-by-redirecting-payment/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow"> incident is contained</a> and operations are normal. <b>Zephyr</b> is working with banks and added extra security to try to recover the funds.</p><p class="paragraph" style="text-align:left;">💸 <b>Bitcoin Depot said hackers stole about 50.9 bitcoin, worth roughly $3.6 million</b>, after an intrusion on March 23. The <a class="link" href="https://www.securityweek.com/3-6-million-stolen-in-bitcoin-depot-hack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">company says customer platforms were not affected</a> and the incident is under investigation. <b>Bitcoin Depot</b> may face reputational, legal, and recovery costs and has insurance that may or may not cover the loss.</p><p class="paragraph" style="text-align:left;">🚂 <b>Eurail says attackers stole personal data of about 308,777 people</b> in a December 2025 breach. Stolen details may include names, passport numbers, IBANs, health data, and contact info. Affected customers are <a class="link" href="https://www.bleepingcomputer.com/news/security/eurail-says-december-data-breach-impacts-300-000-individuals/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">urged to watch for scams</a>, change passwords, and monitor bank accounts.</p><p class="paragraph" style="text-align:left;">🇺🇸 🚓 <b>Hackers stole and leaked a large cache of sensitive Los Angeles Police Department documents</b>, including personnel files, internal affairs records, and unredacted discovery materials. The leak, blamed on extortion gang <i>World Leaks</i> and <a class="link" href="https://techcrunch.com/2026/04/08/hackers-steal-and-leak-sensitive-lapd-police-documents/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">totaling about 7.7 terabytes and 337,000 files</a>, appeared on a leak site then was removed. The LAPD says its systems were not breached and it is working with the LA City Attorney’s Office to investigate.</p><p class="paragraph" style="text-align:left;">🇺🇸 <b>Wynn Resorts says a 2025 hack by the </b><i><b>ShinyHunters</b></i><b> group affected 21,775</b> employees. The attackers <a class="link" href="https://www.securityweek.com/wynn-resorts-says-21000-employees-affected-by-shinyhunters-hack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">stole</a> HR data, possibly including SSNs, and later claimed they deleted it. Affected workers are being offered free credit monitoring and identity-theft protection.</p><p class="paragraph" style="text-align:left;">❄️ 🇮🇱 <b>A SaaS integrator was breached and stolen authentication tokens were used to steal data</b> from <a class="link" href="https://www.bleepingcomputer.com/news/security/snowflake-customers-hit-in-data-theft-attacks-after-saas-integrator-breach/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">over a dozen companies</a>. Most attacks targeted <b>Snowflake</b> customers, who experienced unusual activity and had some accounts locked as a precaution. The extortion group <i><b>ShinyHunters</b></i> claims responsibility and says the incident ties to <b>Anodot</b>.</p><p class="paragraph" style="text-align:left;">🇩🇪 <b>The Qilin ransomware group stole data from the German political party </b><i><b>Die Linke</b></i> and is threatening to leak it. <b>Die Linke</b> says <a class="link" href="https://www.bleepingcomputer.com/news/security/die-linke-german-political-party-confirms-data-stolen-by-qilin-ransomware/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">member records were not taken</a> and has notified police while working with IT experts. The party and observers warn the attack may be politically motivated and part of hybrid warfare.</p></div><p class="paragraph" style="text-align:left;"></p><div id="cybercrime-cyber-espionage-ap-ts" class="section" style="background-color:transparent;border-color:#C0C0C0;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🥷🏻 CYBERCRIME, CYBER ESPIONAGE, APT’s</h3><div class="embed"><a class="embed__url" href="https://cyberscoop.com/fbi-internet-crime-complaint-center-annual-cybercrime-report/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank"><div class="embed__content"><p class="embed__title"> Cybercrime losses jumped 26% to $20.9 billion in 2025 </p><p class="embed__description"> The FBI’s annual report on digital crimes exposes a worsening environment. Yet, an unknown number of victims still suffer in the shadows never reporting the crimes they endure. </p><p class="embed__link"> CyberScoop • Matt Kapko </p></div><img class="embed__image embed__image--right" src="https://cyberscoop.com/wp-content/uploads/sites/3/2025/10/GettyImages-2185108541.jpg"/></a></div><p class="paragraph" style="text-align:left;">👀 📰 <b>Researchers say a hack-for-hire campaign used Android spyware to target journalists and activists</b> in the Middle East and North Africa. The attacks, traced to shared infrastructure <a class="link" href="https://cyberscoop.com/hack-for-hire-spyware-campaign-targets-journalists-in-middle-east-north-africa/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">linked to the </a><a class="link" href="https://cyberscoop.com/hack-for-hire-spyware-campaign-targets-journalists-in-middle-east-north-africa/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow"><i>Bitter</i></a><a class="link" href="https://cyberscoop.com/hack-for-hire-spyware-campaign-targets-journalists-in-middle-east-north-africa/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow"> group</a>, used spearphishing via fake social accounts. Victims feel threatened and groups warn such spying endangers journalists, sources, and press freedom.</p><p class="paragraph" style="text-align:left;">🇷🇺 <b>Russian state-linked hackers (Fancy Bear/APT28) broke into thousands of home and small-business routers</b> worldwide. They <a class="link" href="https://krebsonsecurity.com/2026/04/russia-hacked-routers-to-steal-microsoft-office-tokens/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">redirected users’ internet traffic to steal passwords and login</a> tokens. Authorities and researchers say the campaign hit many countries and targeted outdated MicroTik and TP-Link devices.</p><p class="paragraph" style="text-align:left;">🇩🇪 🇷🇺 <b>German police say a 31-year-old Russian, Daniil Shchukin, led the </b><i><b>GandCrab</b></i><b> and </b><i><b>REvil</b></i><b> ransomware groups</b> from 2019 to 2021. He and associates <a class="link" href="https://www.securityweek.com/german-police-unmask-revil-ransomware-leader/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">carried out about 130 extortion attempts</a>, causing over $40 million in damage and collecting more than $2 million in ransoms in 25 cases. Shchukin, known by several aliases, is believed to be in Russia and has been linked in past arrests and investigations.</p><p class="paragraph" style="text-align:left;">🇨🇳 <b>Microsoft says </b><i><b>Storm-1175</b></i><b>, the China-based cybercrime group, uses n-day and zero-day exploits to quickly deploy Medusa</b> ransomware. The group <a class="link" href="https://www.microsoft.com/en-us/security/blog/2026/04/06/storm-1175-focuses-gaze-on-vulnerable-web-facing-assets-in-high-tempo-medusa-ransomware-operations/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">moves from initial access to data theft and ransomware in days or even 24 hours</a>, often chaining exploits and disabling defenses. Their attacks have hit healthcare, education, finance and other sectors across multiple countries and abused many known vulnerabilities.</p><p class="paragraph" style="text-align:left;">🇨🇳 🇪🇺 <b>China‑linked TA416 resumed targeting European government and diplomatic bodies since mid‑2025</b>, using OAuth redirection, fake Cloudflare pages, web bugs, and updated PlugX backdoors. They <a class="link" href="https://www.proofpoint.com/us/blog/threat-insight/id-come-running-back-eu-again-ta416-resumes-european-government-espionage?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">spread malware via phishing links</a>, cloud storage (Azure, Google Drive), compromised SharePoint, and MSBuild/C# project files with DLL side‑loading. <b>TA416</b> also expanded into the Middle East after late‑2025, showing adaptive, long‑term intelligence‑collection operations tied to geopolitical events.</p><div class="embed"><a class="embed__url" href="https://www.zetter-zeroday.com/trenchant-exec-says-he-had-depression-money-troubles-when-he-decided-to-sell-zero-days-to-russian-buyer-also-new-info-reveals-nature-of-his-work-for-australian-intelligence-agency/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank"><img class="embed__image embed__image--top" src="https://www.zetter-zeroday.com/content/images/size/w1200/2026/04/Screenshot-2026-04-07-at-8.04.46---PM.png"/><div class="embed__content"><p class="embed__title"> Trenchant Exec Says He Had Depression, Money Troubles When He Decided to Sell Zero Days to Russian Buyer; Also, New Info Reveals Nature of His Work for Australian Intelligence Agency </p><p class="embed__description"> Peter Joseph Williams, a former L3 Trenchant executive recently convicted of secretly selling zero-day exploits to a Russian broker, says he was suffering anxiety, burnout, years of depression, and financial difficulties when he decided to steal exploits from his US employer and sell them to the Russian buyer. Williams, who </p><p class="embed__link"> ZERO DAY </p></div></a></div></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#f0f0f0;border-color:#C0C0C0;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🗓️ <b><a class="link" href="https://xsa.github.io/infosec-events/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">{Cyber,Info}Sec Events</a></b> — A community-maintained list of infosec conferences worldwide. Subscribe to the <a class="link" href="https://xsa.github.io/infosec-events/events.ics?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">ICS calendar feed</a> to get events straight into your calendar, or follow <a class="link" href="https://infosec.exchange/@infosecevents?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">@infosecevents@infosec.exchange</a> on Mastodon for weekly digests. Contributions and ⭐ welcome!</p></div><p class="paragraph" style="text-align:left;"></p><div id="government-politics-and-privacy" class="section" style="background-color:transparent;border-color:#C0C0C0;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">👨🏻‍⚖️ 👀 GOVERNMENT, POLITICS, AND PRIVACY</h3><p class="paragraph" style="text-align:left;">🇺🇸 💸 <b>The Trump administration proposes cutting the Cybersecurity and Infrastructure Security Agency budget by about $707 million</b> for 2027. Officials say <a class="link" href="https://techcrunch.com/2026/04/07/cisa-budget-cuts-700-million-cybersecurity-agency-trump/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">the cuts will refocus CISA on core federal network and infrastructure protection</a> and eliminate duplicative programs. Critics warn the cuts come after staff losses and amid rising major cyberattacks, and accuse the administration of politicizing CISA.</p><p class="paragraph" style="text-align:left;">🇺🇸 ⚖️ <b>A judge sentenced Bryan Fleming, maker of stalkerware </b><i><b>pcTattleTale</b></i><b>, to supervised release and a $5,000 fine</b> after his guilty plea. His software secretly recorded texts, calls, location, web activity, and video from victims’ devices. <i>pcTattleTale</i> <a class="link" href="https://cyberscoop.com/pctattletale-stalkerware-maker-sentence-includes-fine-supervised-release/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">shut down in 2024</a> after a data breach.</p><div class="embed"><a class="embed__url" href="https://www.404media.co/fbi-extracts-suspects-deleted-signal-messages-saved-in-iphone-notification-database-2/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank"><div class="embed__content"><p class="embed__title"> FBI Extracts Suspect’s Deleted Signal Messages Saved in iPhone Notification Database </p><p class="embed__description"> The case was the first time authorities charged people for alleged “Antifa” activities after President Trump designated the umbrella term a terrorist organization. </p><p class="embed__link"> 404 Media </p></div><img class="embed__image embed__image--right" src="https://www.404media.co/content/images/size/w1200/2026/04/appshunter-io-BuPiOZN5DOQ-unsplash.jpg"/></a></div></div><p class="paragraph" style="text-align:left;"></p><div id="malware-threats" class="section" style="background-color:transparent;border-color:#C0C0C0;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🦠 MALWARE & THREATS</h3><p class="paragraph" style="text-align:left;">🧩 <b>A malicious VS Code extension named </b><code>specstudio.code-wakatime-activity-tracker</code><b> hides a Zig-compiled native binary that infects</b> all IDEs on a developer&#39;s machine. The binary downloads and silently installs a fake extension that steals data, fetches commands via Solana, and deploys a RAT and a malicious Chrome extension. If you installed <code>specstudio.code-wakatime-activity-tracker</code> or <code>floktokbok.autoimport</code> <a class="link" href="https://www.aikido.dev/blog/glassworm-zig-dropper-infects-every-ide-on-your-machine?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">assume compromise and rotate</a> all secrets.</p><p class="paragraph" style="text-align:left;">🇹🇼 <b>Security researchers tracked a new threat cluster, UAT-10362, using spear-phishing to target Taiwanese NGOs</b> and universities. The <a class="link" href="https://blog.talosintelligence.com/new-lua-based-malware-lucidrook/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">attackers deploy a Lua-based stager called </a><i><a class="link" href="https://blog.talosintelligence.com/new-lua-based-malware-lucidrook/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">LucidRook</a></i> via DLL side-loading and droppers (<i>LucidPawn/LucidKnight</i>) to collect and exfiltrate data. The campaign uses geo-checks, obfuscation, and public or compromised infrastructure, showing stealthy, targeted tradecraft.</p><p class="paragraph" style="text-align:left;">🇷🇺 🎣 <b>Russian APT28 has been running spear-phishing attacks against Ukraine and NATO allies to deploy a new malware suite</b> called <i>PRISMEX</i>. PRISMEX uses steganography, COM hijacking, and cloud services, and was spread using fast weaponization of zero-day Windows flaws. The <a class="link" href="https://www.trendmicro.com/en_us/research/26/c/pawn-storm-targets-govt-infra.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">campaign appears aimed at espionage</a> and possible sabotage of military, logistics, and critical services.</p><p class="paragraph" style="text-align:left;">🧩 <b>Malicious actors published 36 Strapi-focused NPM packages</b> that deliver payloads like Redis remote code execution, Docker escapes, credential harvesting, and reverse shells. <a class="link" href="https://safedep.io/malicious-npm-strapi-plugin-events-c2-agent/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">SafeDep says the campaign specifically targets Guardarian cryptocurrency payment systems</a> and seeks wallet files, API modules, and database access. Infected users should immediately rotate all credentials and secrets.</p><p class="paragraph" style="text-align:left;">🇺🇦 🎠 <b>Ukraine&#39;s CERT-UA warned of a phishing campaign that impersonated the agency to spread a remote access trojan</b> called <i>AGEWHEEZE</i>. The attackers sent password‑protected ZIPs to many targets and <a class="link" href="https://thehackernews.com/2026/04/cert-ua-impersonation-campaign-spread.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">claimed to have emailed 1 million ukr.net accounts</a>. The campaign mostly failed, with only a few infections found and CERT-UA helping affected organizations.</p></div><p class="paragraph" style="text-align:left;"></p><div id="ai-crypto-tech-tools" class="section" style="background-color:transparent;border-color:#C0C0C0;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🤖 🧰 AI, CRYPTO, TECH & TOOLS</h3><div class="embed"><a class="embed__url" href="https://techcrunch.com/2026/04/09/is-anthropic-limiting-the-release-of-mythos-to-protect-the-internet-or-anthropic/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank"><div class="embed__content"><p class="embed__title"> Is Anthropic limiting the release of Mythos to protect the internet — or Anthropic? | TechCrunch </p><p class="embed__description"> Anthropic said this week that it limited the release of its newest model, dubbed Mythos, because it is too capable of finding security exploits in software relied upon by users around the world. Are real cybersecurity concerns a cover for a bigger problem at the frontier lab? </p><p class="embed__link"> TechCrunch • Tim Fernholz </p></div><img class="embed__image embed__image--right" src="https://techcrunch.com/wp-content/uploads/2025/02/Anthropic-Dario-Amodei.jpeg?w=1182"/></a></div><p class="paragraph" style="text-align:left;">🔎 🐛 <b>Anthropic released Claude Mythos, a powerful new AI</b> that greatly improves coding and agentic reasoning. It <a class="link" href="https://www.securityweek.com/anthropic-unveils-claude-mythos-a-cybersecurity-breakthrough-that-could-also-supercharge-attacks/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">found thousands of old and critical software vulnerabilities</a>, showing huge benefits for defense but also big risks if misused. Anthropic launched <i>Project Glasswing</i> with major tech partners to use <b>Mythos</b> to secure critical software before attackers can exploit it.</p><p class="paragraph" style="text-align:left;">🔓️ 🍎 <b>Researchers at RSAC found a way to bypass Apple Intelligence’s guardrails using two tricks</b>: Neural Execs prompt injection and Unicode right-to-left manipulation. They used these methods to make the on-device LLM produce offensive content and potentially access private app data, <a class="link" href="https://www.securityweek.com/apple-intelligence-ai-guardrails-bypassed-in-new-attack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">succeeding on 76% of test prompts</a>. Apple was notified in October 2025 and released protections in iOS 26.4 and macOS 26.4; no real-world abuse has been seen.</p><p class="paragraph" style="text-align:left;">🪄🤖 <b>Google DeepMind researchers show that malicious web content can trick autonomous AI agents</b> and <a class="link" href="https://www.securityweek.com/google-deepmind-researchers-map-web-attacks-against-ai-agents/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">make them act against their goals</a>. They identify six classes of &quot;agent traps&quot; that hide commands, manipulate memory and behavior, or exploit group dynamics and humans-in-the-loop. Defenses include model hardening, runtime checks, better web hygiene, and shared standards and benchmarks.</p></div><p class="paragraph" style="text-align:left;"></p><div id="vulnerabilities-research-and-threat" class="section" style="background-color:transparent;border-color:#C0C0C0;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🐛 🧠 VULNERABILITIES, RESEARCH, AND THREAT INTELLIGENCE</h3><p class="paragraph" style="text-align:left;">➝ From the Patching Department:</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/severe-strongbox-vulnerability-patched-in-android/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">Severe StrongBox Vulnerability Patched in Android</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/chrome-147-patches-60-vulnerabilities-including-two-critical-flaws-worth-86000/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">Chrome 147 Patches 60 Vulnerabilities, Including Two Critical Flaws Worth $86,000</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/data-leakage-vulnerability-patched-in-openssl/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">Data Leakage Vulnerability Patched in OpenSSL</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/juniper-networks-patches-dozens-of-junos-os-vulnerabilities/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">Juniper Networks Patches Dozens of Junos OS Vulnerabilities</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/palo-alto-networks-sonicwall-patch-high-severity-vulnerabilities/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">Palo Alto Networks, SonicWall Patch High-Severity Vulnerabilities</a></p></li></ul><hr class="content_break"><p class="paragraph" style="text-align:left;">🅰️ 💥 <b>Attackers have been exploiting an unpatched Adobe Reader zero-day since at least December</b> using malicious PDFs. The <a class="link" href="https://www.bleepingcomputer.com/news/security/hackers-exploiting-acrobat-reader-zero-day-flaw-since-december/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">exploit can steal local data</a> and may enable remote code execution just by opening a file. Users should avoid PDFs from untrusted sources and Adobe is working on a patch.</p><p class="paragraph" style="text-align:left;">🪶 <b>A 13-year-old RCE vulnerability in Apache ActiveMQ Classic</b> (CVE-2026-34197) lets <a class="link" href="https://horizon3.ai/attack-research/disclosures/cve-2026-34197-activemq-rce-jolokia/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">attackers invoke management operations via Jolokia</a> to fetch remote configs and run OS commands. Chained with older flaws (CVE-2022-41678 and sometimes CVE-2024-32114), it can bypass authentication and lead to remote code execution. Fixes are in ActiveMQ Classic 5.19.4 and 6.2.3; update immediately.</p><p class="paragraph" style="text-align:left;">😶 <b>Researchers at Noma Security disclosed &quot;</b><i><b>GrafanaGhost</b></i><b>,&quot; a vulnerability that silently steals data from Grafana</b> by chaining multiple security bypasses. The <a class="link" href="https://cyberscoop.com/grafanaghost-grafana-prompt-injection-vulnerability-data-exfiltration/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">attack uses crafted URLs and prompt injection</a> to trick Grafana’s AI and exfiltrate data without user interaction or visible alerts. Grafana Labs was notified and issued a fix.</p><p class="paragraph" style="text-align:left;">🚢 <b>A high-severity </b><i><b>Docker Engine</b></i><b> bug (CVE-2026-34040) lets attackers bypass authorization plugins</b> by sending a padded API request that strips the request body. This <a class="link" href="https://thehackernews.com/2026/04/docker-cve-2026-34040-lets-attackers.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">can let them create privileged containers</a>, mount the host filesystem, and steal credentials. Update to Docker 29.3.1 or use rootless mode and restrict Docker API access.</p><p class="paragraph" style="text-align:left;">🔎 ☁️ <b>A botnet campaign is scanning internet-exposed </b><i><b>ComfyUI</b></i><b> instances and exploiting unsafe custom nodes</b> to run attacker Python code. Compromised hosts are enrolled in Monero and Conflux miners and a Hysteria V2 proxy botnet, with persistence and cleanup mechanisms. Over <a class="link" href="https://thehackernews.com/2026/04/over-1000-exposed-comfyui-instances.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">1,000 public </a><b><a class="link" href="https://thehackernews.com/2026/04/over-1000-exposed-comfyui-instances.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">ComfyUI</a></b><a class="link" href="https://thehackernews.com/2026/04/over-1000-exposed-comfyui-instances.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow"> instances are reachable</a>, making opportunistic cryptomining profitable for the attackers.</p><p class="paragraph" style="text-align:left;">🐛 <b>A critical CVSS 10.0 code-injection bug in </b><i><b>Flowise</b></i><b> (CVE-2025-59528) lets attackers run arbitrary JavaScript</b> and gain full Node.js privileges. Over <a class="link" href="https://thehackernews.com/2026/04/flowise-ai-agent-builder-under-active.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">12,000 internet-facing </a><b><a class="link" href="https://thehackernews.com/2026/04/flowise-ai-agent-builder-under-active.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">Flowise</a></b><a class="link" href="https://thehackernews.com/2026/04/flowise-ai-agent-builder-under-active.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow"> instances are exposed</a> and active exploitation has been observed. <b>Flowise</b> patched the issue in version 3.0.6, but many systems remain at risk.</p><p class="paragraph" style="text-align:left;">🇰🇵 💻️ <b>A viral video shows an interviewer asking a suspected North Korean job applicant</b> to insult Kim Jong Un. The applicant freezes, acts confused, and leaves the call. The <a class="link" href="https://techcrunch.com/2026/04/06/watch-this-video-of-how-a-job-interviewer-exposes-a-north-korean-fake-it-worker/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">trick can expose some fake North Korean workers </a>but does not always work.</p><p class="paragraph" style="text-align:left;">🔓️ <b>A researcher leaked working exploit code for an unpatched Windows local privilege escalation</b> called <a class="link" href="https://www.bleepingcomputer.com/news/security/disgruntled-researcher-leaks-bluehammer-windows-zero-day-exploit/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow"><i>BlueHammer</i></a>. The bug lets attackers gain SYSTEM or elevated admin access by abusing a TOCTOU and path confusion, though the PoC has reliability issues. Microsoft has not patched it and gave no comment.</p></div><p class="paragraph" style="text-align:left;"></p><div id="ics-ot-io-t" class="section" style="background-color:transparent;border-color:#C0C0C0;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🛰️ ICS, OT & IoT</h3><p class="paragraph" style="text-align:left;">🇮🇷 🇺🇸 <b>U.S. agencies warn Iran-backed hackers are targeting American critical infrastructure</b> to cause disruption. They have <a class="link" href="https://techcrunch.com/2026/04/07/iranian-hackers-are-targeting-american-critical-infrastructure-u-s-agencies-warn/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">attacked industrial control systems</a> like SCADA and PLCs, causing operational and financial harm. The activity is seen as an escalation linked to recent conflicts involving Iran.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#f0f0f0;border-color:#C0C0C0;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">💬 CONNECT</h3><p class="paragraph" style="text-align:left;">Follow me on <a class="link" href="https://infosec.exchange/@0x58?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">Mastodon</a> for quick daily updates and bite-sized content.</p><p class="paragraph" style="text-align:left;">Prefer using an RSS feed? Add <b>Infosec MASHUP</b> to your feed <a class="link" href="https://rss.beehiiv.com/feeds/HVhiKYpQlR.xml?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">here</a>.</p><p class="paragraph" style="text-align:center;"><b>Enjoying our newsletter? </b>Forward it to a colleague—<br>it’s one of the best ways to support us.</p><p class="paragraph" style="text-align:left;">Thanks for reading today’s newsletter, and if you&#39;re enjoying it and want to support my work, you can <b>buy me a coffee</b> ☕ over at <a class="link" href="https://www.buymeacoffee.com/0x58?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-15-2026-budgets-cut-breaches-climbing" target="_blank" rel="noopener noreferrer nofollow">https://www.buymeacoffee.com/0x58</a></p><p class="paragraph" style="text-align:left;"> See you next time!</p><p class="paragraph" style="text-align:left;">-X.</p></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=611d1e0a-c429-4d08-9d46-f6efa40d3784&utm_medium=post_rss&utm_source=x_s_infosec_newsletter">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>🕵🏻‍♂️ [InfoSec MASHUP] 14/2026 - The Pipeline Is the Attack Surface</title>
  <description>Plus: Stryker back online, $285M drained in 10 seconds, CERT-EU cloud breach, and quantum crypto&#39;s accelerating threat window</description>
  <link>https://infosec-mashup.santolaria.net/p/infosec-mashup-14-2026-the-pipeline-is-the-attack-surface</link>
  <guid isPermaLink="true">https://infosec-mashup.santolaria.net/p/infosec-mashup-14-2026-the-pipeline-is-the-attack-surface</guid>
  <pubDate>Mon, 06 Apr 2026 11:36:23 +0000</pubDate>
  <atom:published>2026-04-06T11:36:23Z</atom:published>
    <dc:creator>Xavier Santolaria</dc:creator>
    <category><![CDATA[Malware]]></category>
    <category><![CDATA[Opensource]]></category>
    <category><![CDATA[Privacy]]></category>
    <category><![CDATA[Cybersecurity]]></category>
    <category><![CDATA[Threat Intelligence]]></category>
    <category><![CDATA[Ai]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'IBM Plex Sans',-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'IBM Plex Sans',-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Heads up: this week&#39;s issue is running a bit light and a touch later than usual. Turns out I have a hobby that occasionally demands I be somewhere other than in front of a screen. Normal service resumes next week 😜 And Happy Easter 🐇 🐣 🍫 </p><p class="paragraph" style="text-align:left;">Every few months, the supply chain gets a reminder it still isn&#39;t fixed. This week&#39;s edition came via a compromised Axios maintainer account — someone quietly pushed two malicious versions of one of the most downloaded JavaScript packages on the planet, tucked in a fake dependency, and let a cross-platform RAT do the rest. The malicious versions were caught fast — Socket&#39;s detection flagged them within minutes — but &quot;caught fast&quot; and &quot;caught before damage&quot; are not the same sentence. The audacity isn&#39;t even the impressive part anymore. What&#39;s impressive is how predictable the pattern has become: trusted account, malicious publish, <code>postinstall</code> dropper, rotate credentials, repeat 🔁 The pipeline is the attack surface. It always has been.</p><p class="paragraph" style="text-align:left;">Let’s now dive into this week’s top insights! 🚀</p><h2 class="heading" style="text-align:left;">Table of Contents</h2><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="#breaches-security-incidents" rel="noopener noreferrer nofollow">BREACHES & SECURITY INCIDENTS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#cybercrime-cyber-espionage-ap-ts" rel="noopener noreferrer nofollow">CYBERCRIME, CYBER ESPIONAGE, APT’s</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#government-politics-and-privacy" rel="noopener noreferrer nofollow">GOVERNMENT, POLITICS, AND PRIVACY</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#malware-threats" rel="noopener noreferrer nofollow">MALWARE & THREATS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#ai-crypto-tech-tools" rel="noopener noreferrer nofollow">AI, CRYPTO, TECH & TOOLS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#vulnerabilities-research-and-threat" rel="noopener noreferrer nofollow">VULNERABILITIES, RESEARCH, AND THREAT INTELLIGENCE</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#ics-ot-io-t" rel="noopener noreferrer nofollow">ICS, OT & IoT</a></p></li></ul><div id="breaches-security-incidents" class="section" style="background-color:transparent;border-color:#C0C0C0;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🔓 BREACHES & SECURITY INCIDENTS</h3><div class="embed"><a class="embed__url" href="https://cyberscoop.com/medtech-giant-stryker-says-its-back-up-after-iranian-cyberattack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank"><div class="embed__content"><p class="embed__title"> Medtech giant Stryker says it’s back up after Iranian cyberattack </p><p class="embed__description"> The Handala group claimed responsibility for hitting the company with a wiper attack last month. </p><p class="embed__link"> CyberScoop • Tim Starks </p></div><img class="embed__image embed__image--right" src="https://cyberscoop.com/wp-content/uploads/sites/3/2026/04/GettyImages-1339221504.jpg"/></a></div><p class="paragraph" style="text-align:left;">🧸 <b>Hasbro says it was hacked and took some systems offline after detecting the intrusion</b> on March 28. The company is <a class="link" href="https://techcrunch.com/2026/04/01/hasbro-hacked-may-take-several-weeks-to-recover/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank" rel="noopener noreferrer nofollow">using continuity plans to keep orders and shipments moving</a> while cybersecurity teams investigate. <b>Hasbro</b> warns the disruption and investigation may take several weeks and it is not yet clear if data was stolen.</p><p class="paragraph" style="text-align:left;">🇪🇺 <b>CERT-EU says the TeamPCP group used a stolen AWS API key to breach the European Commission cloud</b> and steal data. The <a class="link" href="https://www.bleepingcomputer.com/news/security/cert-eu-european-commission-hack-exposes-data-of-30-eu-entities/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank" rel="noopener noreferrer nofollow">leaked 90GB archive (about 340GB uncompressed) contains tens of thousands of files </a>with names, emails, and email content affecting 42 Commission clients and at least 29 other EU entities. No websites were altered and investigations are ongoing while data protection authorities and affected entities are being notified.</p><p class="paragraph" style="text-align:left;">🤖 <b>Mercor, an AI recruiting startup, says it was hit by a supply-chain cyberattack tied to the open-source LiteLLM</b> project. Extortion group <a class="link" href="https://techcrunch.com/2026/03/31/mercor-says-it-was-hit-by-cyberattack-tied-to-compromise-of-open-source-litellm-project/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank" rel="noopener noreferrer nofollow"><i>Lapsus$</i></a><a class="link" href="https://techcrunch.com/2026/03/31/mercor-says-it-was-hit-by-cyberattack-tied-to-compromise-of-open-source-litellm-project/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank" rel="noopener noreferrer nofollow"> claimed it stole</a> <b>Mercor</b> data, though details and the connection to <b>LiteLLM</b> remain unclear. <b>Mercor</b> says it is investigating with third-party forensics and working to contain the incident.</p><p class="paragraph" style="text-align:left;">🇬🇧 <b>Lloyds Banking Group had a software update glitch on March 12 that exposed transaction details</b> for about <a class="link" href="https://www.securityweek.com/lloyds-data-security-incident-impacts-450000-individuals/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank" rel="noopener noreferrer nofollow">447,936 mobile users</a>. The exposure was brief and only happened when two users viewed their transaction lists almost simultaneously. No money was lost, Lloyds fixed the issue quickly and made goodwill payments to some customers.</p><p class="paragraph" style="text-align:left;">🇺🇸 <b>CareCloud, a healthcare IT company, reported a March 16 cybersecurity incident that disrupted one of its six electronic health record environments</b> for about eight hours. The company is<a class="link" href="https://www.securityweek.com/healthcare-it-platform-carecloud-probing-potential-data-breach/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank" rel="noopener noreferrer nofollow"> investigating whether patient data were accessed or stolen</a> but says the issue was limited to its <b>CareCloud Health</b> environment and systems are restored. <b>CareCloud</b> believes the incident is not materially damaging and expects cyberinsurance to cover any losses.</p><p class="paragraph" style="text-align:left;">🇳🇱 <b>The Dutch Finance Ministry shut down several systems, including the treasury banking portal, after a March 19 cyberattack</b> — About 1,600 public institutions cannot view treasury balances or use portal services, though funds and payments remain accessible. Authorities are <a class="link" href="https://www.bleepingcomputer.com/news/security/dutch-finance-ministry-takes-treasury-banking-portal-offline-after-breach/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank" rel="noopener noreferrer nofollow">investigating with the NCSC</a> and external experts, and no data loss or attacker has been confirmed.</p><p class="paragraph" style="text-align:left;">→ More:</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/250000-affected-by-data-breach-at-nacogdoches-memorial-hospital/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank" rel="noopener noreferrer nofollow">250,000 Affected by Data Breach at Nacogdoches Memorial Hospital</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/t-mobile-sets-the-record-straight-on-latest-data-breach-filing/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank" rel="noopener noreferrer nofollow">T-Mobile Sets the Record Straight on Latest Data Breach Filing</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/mercor-hit-by-litellm-supply-chain-attack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank" rel="noopener noreferrer nofollow">Mercor Hit by LiteLLM Supply Chain Attack</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bleepingcomputer.com/news/security/hims-and-hers-warns-of-data-breach-after-zendesk-support-ticket-breach/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank" rel="noopener noreferrer nofollow">Hims & Hers warns of data breach after Zendesk support ticket breach</a></p></li></ul><div class="embed"><a class="embed__url" href="https://www.troyhunt.com/passkeys-k-anonymity-searches-massive-speed-enhancements-bulk-domain-verification-api/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank"><div class="embed__content"><p class="embed__title"> HIBP Mega Update: Passkeys, k-Anonymity Searches, Massive Speed Enhancements and a Bulk Domain Verification API </p><p class="embed__description"> For a hobby project built in my spare time to provide a simple community service, Have I Been Pwned sure has, well, &quot;escalated&quot;. Today, we support hundreds of thousands of website visitors each day, tens of millions of API queries, and hundreds of millions of password searches. We&#39;re processing billions </p><p class="embed__link"> www.troyhunt.com/passkeys-k-anonymity-searches-massive-speed-enhancements-bulk-domain-verification-api </p></div><img class="embed__image embed__image--right" src="https://www.troyhunt.com/content/images/size/w1200/2026/03/IMG_4769.jpg"/></a></div></div><p class="paragraph" style="text-align:left;"></p><div id="cybercrime-cyber-espionage-ap-ts" class="section" style="background-color:transparent;border-color:#C0C0C0;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🥷🏻 CYBERCRIME, CYBER ESPIONAGE, APT’s</h3><p class="paragraph" style="text-align:left;">🇰🇵 💰️ <b>North Korean-linked hackers stole about $285 million from DeFi platform Drift</b> in a coordinated, <a class="link" href="https://www.securityweek.com/north-korean-hackers-drain-285-million-from-drift-in-10-seconds/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank" rel="noopener noreferrer nofollow">high-speed attack</a>. They pre-signed transactions, gained admin control, created a fake token market, and drained multiple vaults in about 10 seconds. The thieves then laundered funds through thousands of wallets and automated bots across many chains.</p><p class="paragraph" style="text-align:left;">🇷🇺 <b>Russian APT </b><i><b>Star Blizzard</b></i><b> has started using the </b><i><b>DarkSword</b></i><b> iOS exploit kit</b> in a recent phishing campaign. The group sent more emails than usual that link to <a class="link" href="https://www.securityweek.com/russian-apt-star-blizzard-adopts-darksword-ios-exploit-kit/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank" rel="noopener noreferrer nofollow">mobile-targeted exploits for iCloud and Apple</a> devices. Proofpoint says the kit appears aimed at stealing credentials and gathering intelligence across finance, government, education, legal, and think-tank targets.</p><p class="paragraph" style="text-align:left;">🇺🇸 ⚖️ <b>A Maryland man, Jonathan Spalletta, is charged with stealing about $53.3 million by hacking the </b><i><b>Uranium Finance</b></i><b> crypto exchange</b> … twice. He <a class="link" href="https://www.bleepingcomputer.com/news/security/hacker-charged-with-stealing-53-million-from-uranium-crypto-exchange/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank" rel="noopener noreferrer nofollow">laundered the funds through Tornado Cash</a> and spent millions on rare collectibles before authorities seized about $31 million. He faces up to 10 years for computer fraud and up to 20 years for money laundering.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#f0f0f0;border-color:#C0C0C0;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🗓️ <b><a class="link" href="https://xsa.github.io/infosec-events/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank" rel="noopener noreferrer nofollow">{Cyber,Info}Sec Events</a></b> — A community-maintained list of infosec conferences worldwide. Subscribe to the <a class="link" href="https://xsa.github.io/infosec-events/events.ics?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank" rel="noopener noreferrer nofollow">ICS calendar feed</a> to get events straight into your calendar, or follow <a class="link" href="https://infosec.exchange/@infosecevents?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank" rel="noopener noreferrer nofollow">@infosecevents@infosec.exchange</a> on Mastodon for weekly digests. Contributions and ⭐ welcome!</p></div><p class="paragraph" style="text-align:left;"></p><div id="government-politics-and-privacy" class="section" style="background-color:transparent;border-color:#C0C0C0;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">👨🏻‍⚖️ 👀 GOVERNMENT, POLITICS, AND PRIVACY</h3><div class="embed"><a class="embed__url" href="https://www.404media.co/email/d7d7979a-494c-4729-8bf2-88e75ffe366b/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank"><div class="embed__content"><p class="embed__title"> Podcast: The Company Secretly Turning Your Zoom Meetings into Podcasts </p><p class="embed__description"> www.404media.co/email/d7d7979a-494c-4729-8bf2-88e75ffe366b </p></div><img class="embed__image embed__image--right" src="https://www.404media.co/content/images/size/w1200/2026/03/zoom-listening.png"/></a></div><p class="paragraph" style="text-align:left;">🇺🇸 👀 <b>ICE confirmed it is using Paragon spyware to target encrypted communications in fentanyl and national security</b> investigations. Three House Democrats <a class="link" href="https://cyberscoop.com/ice-using-paragon-spyware-house-democrats-letter/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank" rel="noopener noreferrer nofollow">criticized the move</a>, saying there is no congressional oversight or proof of strong safeguards. Civil liberties groups and past incidents involving journalists and WhatsApp raise additional concerns.</p><p class="paragraph" style="text-align:left;">🇺🇸 🇨🇳 👀 <b>The FBI warned Americans to avoid or be cautious with foreign-developed mobile apps, especially those from China</b>, because of privacy and data security risks. These apps can collect extensive personal data, store it on servers in China, and may share it under Chinese national security laws. The FBI advises disabling unnecessary data sharing, updating devices, using verified apps, and <a class="link" href="https://www.ic3.gov/PSA/2026/PSA260331?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank" rel="noopener noreferrer nofollow">reporting suspicious activity to IC3</a>.</p><p class="paragraph" style="text-align:left;">🍎 👮 <b>Apple’s “Hide My Email” can mask addresses but Apple gave real customer identities</b> to federal agents. Court records show Apple provided names, emails, and many anonymized-address records in two investigations. The case shows <a class="link" href="https://techcrunch.com/2026/03/30/apple-will-hide-your-email-address-from-apps-and-websites-but-not-cops/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank" rel="noopener noreferrer nofollow">Apple’s privacy tools don’t block lawful government access</a> to stored or unencrypted data.</p><hr class="content_break"><blockquote align="center" class="twitter-tweet"><a href="https://twitter.com/wartranslated/status/2038281329247137873?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface"><p> Twitter tweet </p></a></blockquote></div><p class="paragraph" style="text-align:left;"></p><div id="malware-threats" class="section" style="background-color:transparent;border-color:#C0C0C0;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🦠 MALWARE & THREATS</h3><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/A58cV17avpM" width="100%"></iframe><p class="paragraph" style="text-align:left;">🎠 <b>Attackers used a compromised </b><i><b>Axios</b></i><b> maintainer accoun</b>t to publish two malicious <i><b>Axios</b></i> versions that add a fake dependency, <code>plain-crypto-js@4.2.1</code>. The dependency runs a postinstall dropper that <a class="link" href="https://socket.dev/blog/axios-npm-package-compromised?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank" rel="noopener noreferrer nofollow">installs a cross-platform RAT</a> (macOS, Windows, Linux) and then hides its traces. Users should downgrade to safe <i><b>Axios</b></i> versions, remove the malicious package, check for RAT artifacts, and rotate credentials.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/5e5a8d5c-3d07-4976-b164-c0a039692e2c/image.png?t=1774947409"/><div class="image__source"><span class="image__source_text"><p>Figure: Socket’s automated malware detection flagged the package within minutes/socket.dev</p></span></div></div><div class="embed"><a class="embed__url" href="https://unit42.paloaltonetworks.com/axios-supply-chain-attack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank"><div class="embed__content"><p class="embed__title"> Threat Brief: Widespread Impact of the Axios Supply Chain Attack </p><p class="embed__description"> Unit 42 discusses the supply chain attack targeting Axios. Learn about the full attack chain, from the dropper to forensic cleanup. </p><p class="embed__link"> Unit 42 • Unit 42 </p></div><img class="embed__image embed__image--right" src="https://unit42.paloaltonetworks.com/wp-content/uploads/2026/04/02_Security-Technology_Category_1920x900.jpg"/></a></div><hr class="content_break"><p class="paragraph" style="text-align:left;">🙊 <b>A new Android malware called </b><i><b>NoVoice</b></i><b> was hidden in 50+ Google Play apps</b> and <a class="link" href="https://www.bleepingcomputer.com/news/security/novoice-android-malware-on-google-play-infected-23-million-devices/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank" rel="noopener noreferrer nofollow">infected at least 2.3 million devices</a>. It used steganography and old exploits to gain root, persist through factory resets, and inject code to steal WhatsApp data. Infected apps were removed, but users should assume compromise and update devices or reinstall from trusted sources.</p><p class="paragraph" style="text-align:left;">🥷 <b>Researchers warn of a new malware campaign called </b><i><b>DeepLoad</b></i><b> that steals credentials and hides</b> in enterprise systems. The attackers <a class="link" href="https://cyberscoop.com/deepload-ai-malware-obfuscation-at-every-stage-reliaquest/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank" rel="noopener noreferrer nofollow">used AI-generated obfuscation and evasion</a> at every stage to evade traditional signature-based defenses. Experts say defenders must shift to behavioral and runtime detection to catch these fast-changing attacks.</p><p class="paragraph" style="text-align:left;">🛣️ 🩸 <b>Security firm Blackpoint found a new Node.js implant called </b><i><b>RoadK1ll</b></i><b> </b>that turns a compromised host into a relay to reach internal systems. It uses an outbound WebSocket tunnel to forward TCP traffic and supports multiple concurrent connections and reconnection. <b><i>RoadK1ll</i></b> has <a class="link" href="https://blackpointcyber.com/blog/roadk1ll-a-websocket-based-pivoting-implant/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank" rel="noopener noreferrer nofollow">no traditional persistence but enables stealthy lateral pivoting</a> inside breached networks.</p></div><p class="paragraph" style="text-align:left;"></p><div id="ai-crypto-tech-tools" class="section" style="background-color:transparent;border-color:#C0C0C0;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🤖 🧰 AI, CRYPTO, TECH & TOOLS</h3><div class="embed"><a class="embed__url" href="https://arstechnica.com/security/2026/04/heres-why-its-prudent-for-openclaw-users-to-assume-compromise/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank"><div class="embed__content"><p class="embed__title"> OpenClaw gives users yet another reason to be freaked out about security </p><p class="embed__description"> The viral AI agentic tool let attackers silently gain admin unauthenticated access. </p><p class="embed__link"> Ars Technica </p></div><img class="embed__image embed__image--right" src="https://cdn.arstechnica.net/wp-content/uploads/2026/02/bluecrayfish-1152x648.jpg"/></a></div><p class="paragraph" style="text-align:left;">🔓️ 💸 <b>Google researchers say quantum computers could break the cryptography that protects Bitcoin and other cryptocurrencies</b> much sooner than thought. They <a class="link" href="https://research.google/blog/safeguarding-cryptocurrency-by-disclosing-quantum-vulnerabilities-responsibly/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank" rel="noopener noreferrer nofollow">show</a> a way to break 256-bit elliptic curve keys using far fewer qubits and operations, cutting resource estimates by about 20×. Google urges faster moves to post-quantum cryptography and released a zero-knowledge proof instead of the attack details.</p><p class="paragraph" style="text-align:left;">🍎 ⚠️ <b>Apple added a Terminal safety feature in macOS Tahoe 26.4 that delays and warns when users paste</b> potentially dangerous commands. The <a class="link" href="https://www.bleepingcomputer.com/news/security/apple-adds-macos-terminal-warning-to-block-clickfix-attacks/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank" rel="noopener noreferrer nofollow">change aims to block ClickFix social-engineering attacks</a> that trick people into pasting malicious commands. Users should still avoid running commands from untrusted sources because the warning’s detection method is unclear.</p><p class="paragraph" style="text-align:left;">🐛 <b>Researchers found a command-injection flaw in OpenAI Codex</b> that let attackers grab short-lived GitHub OAuth tokens. <a class="link" href="https://www.beyondtrust.com/blog/entry/openai-codex-command-injection-vulnerability-github-token?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank" rel="noopener noreferrer nofollow">BeyondTrust showed</a> automation could steal and abuse those tokens to access repos and move across companies. OpenAI fixed the issue, but the report warns AI agents must be secured like live execution environments to prevent token theft.</p><p class="paragraph" style="text-align:left;">🤷 <b>Documents about Anthropic&#39;s secret &quot;</b><i><b>Claude Mythos</b></i><b>&quot; model were exposed</b> in a public CMS. Anthropic confirmed the model exists but said the leak happened. <a class="link" href="https://www.reddit.com/r/Anthropic/comments/1s5xwjp/anthropics_secret_claude_mythos_model_just_leaked/?utm_source=forwardfuture.ai&utm_medium=newsletter&utm_campaign=anthropic-ipo-google-s-agent-smith-surge-ai-risks-rise" target="_blank" rel="noopener noreferrer nofollow">Reddit users debated</a> whether the leak was accidental or a publicity stunt.</p><p class="paragraph" style="text-align:left;">→ <a class="link" href="https://www.bleepingcomputer.com/news/artificial-intelligence/claude-code-source-code-accidentally-leaked-in-npm-package/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank" rel="noopener noreferrer nofollow">Claude Code source code accidentally leaked in NPM package</a></p></div><p class="paragraph" style="text-align:left;"></p><div id="vulnerabilities-research-and-threat" class="section" style="background-color:transparent;border-color:#C0C0C0;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🐛 🧠 VULNERABILITIES, RESEARCH, AND THREAT INTELLIGENCE</h3><p class="paragraph" style="text-align:left;">➝ From the Patching Department:</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bleepingcomputer.com/news/security/apple-expands-ios-18-updates-to-more-iphones-to-block-darksword-attacks/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank" rel="noopener noreferrer nofollow">Apple expands iOS 18 updates to more iPhones to block DarkSword attacks</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/cisco-patches-critical-and-high-severity-vulnerabilities/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank" rel="noopener noreferrer nofollow">Cisco Patches Critical and High-Severity Vulnerabilities</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://thehackernews.com/2026/04/fortinet-patches-actively-exploited-cve.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank" rel="noopener noreferrer nofollow">Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bleepingcomputer.com/news/security/google-fixes-fourth-chrome-zero-day-exploited-in-attacks-in-2026/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank" rel="noopener noreferrer nofollow">Google fixes fourth Chrome zero-day exploited in attacks in 2026</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://thehackernews.com/2026/03/openai-patches-chatgpt-data.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank" rel="noopener noreferrer nofollow">OpenAI Patches ChatGPT Data Exfiltration Flaw and Codex GitHub Token Vulnerability</a></p></li></ul><hr class="content_break"><p class="paragraph" style="text-align:left;">🔼 <b>Two critical </b><i><b>ShareFile</b></i><b> flaws let attackers reach admin pages and upload</b> files without logging in. By chaining CVE-2026-2699 and CVE-2026-2701, researchers showed an <a class="link" href="https://www.securityweek.com/critical-sharefile-flaws-lead-to-unauthenticated-rce/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank" rel="noopener noreferrer nofollow">attacker can place a web shell </a>and get remote code execution. The issues were fixed in ShareFile 5.12.4 (versions 6.x are not affected).</p><p class="paragraph" style="text-align:left;">🔓️ ✏️ <b>GIGABYTE Control Center has a critical arbitrary file-write vulnerability (CVE-2026-4415)</b> that lets unauthenticated <a class="link" href="https://www.bleepingcomputer.com/news/security/gigabyte-control-center-vulnerable-to-arbitrary-file-write-flaw/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank" rel="noopener noreferrer nofollow">remote attackers write files and potentially run code</a>, escalate privileges, or cause denial of service. The flaw affects versions 25.07.21.01 and earlier when the &quot;pairing&quot; feature is enabled. Users should immediately update to version 25.12.10.01 from GIGABYTE’s official portal.</p><p class="paragraph" style="text-align:left;">📈 <b>F5 reclassified a BIG-IP APM flaw (CVE-2025-53521) from DoS to critical remote code execution</b> after attackers began exploiting it to install webshells. F5 and CISA <a class="link" href="https://www.bleepingcomputer.com/news/security/hackers-now-exploit-critical-f5-big-ip-flaw-in-attacks-patch-now/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank" rel="noopener noreferrer nofollow">warn unpatched systems are at risk</a> and published IOCs and mitigation guidance. Organizations should check logs, disks, and follow incident-handling and patching procedures immediately.</p></div><p class="paragraph" style="text-align:left;"></p><div id="ics-ot-io-t" class="section" style="background-color:transparent;border-color:#C0C0C0;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🛰️ ICS, OT & IoT</h3><p class="paragraph" style="text-align:left;">🤷 </p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#f0f0f0;border-color:#C0C0C0;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">💬 CONNECT</h3><p class="paragraph" style="text-align:left;">Follow me on <a class="link" href="https://infosec.exchange/@0x58?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank" rel="noopener noreferrer nofollow">Mastodon</a> for quick daily updates and bite-sized content.</p><p class="paragraph" style="text-align:left;">Prefer using an RSS feed? Add <b>Infosec MASHUP</b> to your feed <a class="link" href="https://rss.beehiiv.com/feeds/HVhiKYpQlR.xml?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank" rel="noopener noreferrer nofollow">here</a>.</p><p class="paragraph" style="text-align:center;"><b>Enjoying our newsletter? </b>Forward it to a colleague—<br>it’s one of the best ways to support us.</p><p class="paragraph" style="text-align:left;">Thanks for reading today’s newsletter, and if you&#39;re enjoying it and want to support my work, you can <b>buy me a coffee</b> ☕ over at <a class="link" href="https://www.buymeacoffee.com/0x58?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-14-2026-the-pipeline-is-the-attack-surface" target="_blank" rel="noopener noreferrer nofollow">https://www.buymeacoffee.com/0x58</a></p><p class="paragraph" style="text-align:left;"> See you next time!</p><p class="paragraph" style="text-align:left;">-X.</p></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=ff095f4d-124a-46d8-87b1-56e32cd154db&utm_medium=post_rss&utm_source=x_s_infosec_newsletter">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>🕵🏻‍♂️ [InfoSec MASHUP] 13/2026 - RSA Week, Real World Problems</title>
  <description>Plus: TeamPCP&#39;s worm, Iran&#39;s hacked cameras, and a Tycoon 2FA that just won&#39;t die. The real RSA keynotes.</description>
  <link>https://infosec-mashup.santolaria.net/p/infosec-mashup-13-2026-rsa-week-real-world-problems</link>
  <guid isPermaLink="true">https://infosec-mashup.santolaria.net/p/infosec-mashup-13-2026-rsa-week-real-world-problems</guid>
  <pubDate>Sat, 28 Mar 2026 08:52:00 +0000</pubDate>
  <atom:published>2026-03-28T08:52:00Z</atom:published>
    <dc:creator>Xavier Santolaria</dc:creator>
    <category><![CDATA[Malware]]></category>
    <category><![CDATA[Opensource]]></category>
    <category><![CDATA[Privacy]]></category>
    <category><![CDATA[Cybersecurity]]></category>
    <category><![CDATA[Threat Intelligence]]></category>
    <category><![CDATA[Ai]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'IBM Plex Sans',-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'IBM Plex Sans',-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">RSA Conference is in full swing in San Francisco this week — booths, buzzwords, and billion-dollar pitches as far as the eye can see. Meanwhile, out in the real world, threat actors didn&#39;t get the memo. Iran-linked hackers are using Telegram to hunt down dissidents and journalists, while TeamPCP&#39;s supply chain worm is deploying Kubernetes wipers that specifically target Iranian clusters. Two sides of the same geopolitical coin, playing out in parallel — and neither one is buying a vendor badge.</p><p class="paragraph" style="text-align:left;">Let’s now dive into this week’s top insights! 🚀</p><h2 class="heading" style="text-align:left;">Table of Contents</h2><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="#breaches-security-incidents" rel="noopener noreferrer nofollow">BREACHES & SECURITY INCIDENTS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#cybercrime-cyber-espionage-ap-ts" rel="noopener noreferrer nofollow">CYBERCRIME, CYBER ESPIONAGE, APT’s</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#government-politics-and-privacy" rel="noopener noreferrer nofollow">GOVERNMENT, POLITICS, AND PRIVACY</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#malware-threats" rel="noopener noreferrer nofollow">MALWARE & THREATS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#ai-crypto-tech-tools" rel="noopener noreferrer nofollow">AI, CRYPTO, TECH & TOOLS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#vulnerabilities-research-and-threat" rel="noopener noreferrer nofollow">VULNERABILITIES, RESEARCH, AND THREAT INTELLIGENCE</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#ics-ot-io-t" rel="noopener noreferrer nofollow">ICS, OT & IoT</a></p></li></ul><div id="breaches-security-incidents" class="section" style="background-color:transparent;border-color:#C0C0C0;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🔓 BREACHES & SECURITY INCIDENTS</h3><p class="paragraph" style="text-align:left;">🪱 <b>A supply-chain attack on </b><i><b>Trivy</b></i><b> pushed trojanized Docker images that stole credentials</b> and spread an infostealer. Attackers (<i>TeamPCP</i>) <a class="link" href="https://socket.dev/blog/trivy-docker-images-compromised?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">used the stolen data to infect </a><i><a class="link" href="https://socket.dev/blog/trivy-docker-images-compromised?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">npm</a></i><a class="link" href="https://socket.dev/blog/trivy-docker-images-compromised?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow"> packages with a self-propagating worm</a> and to deface Aqua Security repos. They also <a class="link" href="https://www.aikido.dev/blog/teampcp-stage-payload-canisterworm-iran?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">deployed a Kubernetes wiper that targets Iranian clusters</a> and urged organizations to avoid the compromised <i>Trivy</i> versions.</p><p class="paragraph" style="text-align:left;">→ <a class="link" href="https://socket.dev/blog/trivy-docker-images-compromised?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">Trivy Supply Chain Attack Expands to Compromised Docker Images</a></p><p class="paragraph" style="text-align:left;">→ <a class="link" href="https://www.sysdig.com/blog/teampcp-expands-supply-chain-compromise-spreads-from-trivy-to-checkmarx-github-actions?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">TeamPCP expands: Supply chain compromise spreads from Trivy to Checkmarx GitHub Actions</a></p><p class="paragraph" style="text-align:left;">→ <a class="link" href="https://thehackernews.com/2026/03/teampcp-backdoors-litellm-versions.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">TeamPCP Backdoors LiteLLM Versions 1.82.7–1.82.8 Likely via Trivy CI/CD Compromise</a></p><p class="paragraph" style="text-align:left;">→ <a class="link" href="https://www.ox.security/blog/telnyx-malware-teampcp-strikes-again-following-litellm-compromise/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">TeamPCP pushed malicious telnyx versions 4.87.1 and 4.87.2 to PyPI</a> </p><hr class="content_break"><p class="paragraph" style="text-align:left;">🇮🇷 🇺🇸 😵‍💫 <b>Iran-linked hacking group </b><i><b>Handala</b></i><b> says it breached FBI director Kash Patel’s personal Gmail </b>and posted photos and files. <a class="link" href="https://techcrunch.com/2026/03/27/iranian-hackers-claim-breach-of-fbi-director-kash-patels-personal-email-account/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">TechCrunch verified some leaked emails as authentic</a> and Reuters says the Justice Department confirmed the breach. <i>Handala</i> has ramped up attacks since the U.S.-Israeli war with Iran, and U.S. prosecutors accuse Iran’s intelligence ministry of running the group.</p><p class="paragraph" style="text-align:left;">🇪🇺 ☁️ <b>The European Commission is investigating a breach</b> after a threat actor accessed its Amazon cloud infrastructure. The <a class="link" href="https://www.bleepingcomputer.com/news/security/european-commission-investigating-breach-after-amazon-cloud-hack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">attacker claims to have stolen over 350 GB of data</a> and shared screenshots as proof. The Commission&#39;s cybersecurity team detected the intrusion and is investigating while the attacker says they will later leak the data.</p><p class="paragraph" style="text-align:left;">🇪🇸 🚢 <b>A ransomware attack hit Spain’s Port of Vigo, forcing officials to disconnect</b> parts of the network. Cargo moves continue, but many tasks are being done manually with paper. An <a class="link" href="https://therecord.media/port-of-vigo-ransomware?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">investigation is underway</a> and the port won’t reconnect systems until they are declared safe.</p><p class="paragraph" style="text-align:left;">🇸🇪 🇬🇧 <b>The Lapsus$ extortion group claims it hacked AstraZeneca and stole about 3GB</b> of internal data. Stolen files allegedly include code, cloud infrastructure details, credentials, and employee info. AstraZeneca <a class="link" href="https://www.securityweek.com/extortion-group-claims-it-hacked-astrazeneca/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">has not confirmed the breach</a> and researchers say links to a recent supply-chain attack are unproven.</p><p class="paragraph" style="text-align:left;">🇺🇸 <b>HackerOne says 287 of its employees had personal data stolen</b> after a hack of <a class="link" href="https://www.bleepingcomputer.com/news/security/hackerone-discloses-employee-data-breach-after-navia-hack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">benefits administrator Navia</a>. Exposed details include names, Social Security numbers, addresses, dates of birth, and plan enrollment information. Affected workers are being offered 12 months of identity protection and warned to watch for phishing.</p><p class="paragraph" style="text-align:left;">🇺🇸 <b>Healthcare management firm QualDerm Partners says a December 2025 data breach</b> exposed personal, medical, and insurance information <a class="link" href="https://www.securityweek.com/3-1-million-impacted-by-qualderm-data-breach/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">for about 3.1 million people</a>. The attackers accessed the network for two days and stole names, contact details, medical records, diagnoses, insurance data, and in some cases IDs. QualDerm is investigating, notified authorities, and is offering 12 months of free identity and credit monitoring to affected people.</p><p class="paragraph" style="text-align:left;">🇳🇱 🚓 <b>Dutch National Police say a phishing attack led to a security breach</b> with limited impact. Investigators <a class="link" href="https://www.bleepingcomputer.com/news/security/dutch-police-discloses-security-breach-after-phishing-attack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">quickly blocked the attackers</a> and report no citizen or investigative data was accessed. A criminal probe is ongoing and authorities are tightening security measures.</p><p class="paragraph" style="text-align:left;">🇳🇱 <b>The Dutch Ministry of Finance said some of its systems were breached</b> in a cyberattack detected on March 19. Access to the affected systems has been blocked and the <a class="link" href="https://www.bleepingcomputer.com/news/security/dutch-ministry-of-finance-discloses-breach-affecting-employees/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">investigation is ongoing</a>. Tax, customs, and benefits systems were not impacted and no data loss or attacker identity has been disclosed.</p><p class="paragraph" style="text-align:left;">🇯🇵 <b>Mazda said a security breach last December exposed 692 records of employee and business partner data</b> from a warehouse management system tied to parts from Thailand. The leaked fields include names, user IDs, emails, company names, and partner IDs, though no customer data was involved. <a class="link" href="https://www.bleepingcomputer.com/news/security/mazda-discloses-security-breach-exposing-employee-and-partner-data/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">Mazda notified authorities</a>, tightened its IT security, and found no confirmed misuse so far.</p><p class="paragraph" style="text-align:left;">🇸🇬 <b>Trio-Tech said a Singapore subsidiary suffered a ransomware attack</b> on March 11 that encrypted some files. The subsidiary took systems offline, hired cybersecurity experts, notified law enforcement, and is investigating the impact. Stolen <a class="link" href="https://www.securityweek.com/chip-services-firm-trio-tech-says-subsidiary-hit-by-ransomware/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">data was posted</a> by a ransomware group, and the company now considers the incident possibly material.</p><p class="paragraph" style="text-align:left;">→ More:</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bleepingcomputer.com/news/security/ajax-football-club-hack-exposed-fan-data-enabled-ticket-hijack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">Ajax football club hack exposed fan data, enabled ticket hijack</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/hightower-holding-data-breach-impacts-130000/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">Hightower Holding Data Breach Impacts 130,000</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bleepingcomputer.com/news/security/infinite-campus-warns-of-breach-after-shinyhunters-claims-data-theft/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">Infinite Campus warns of breach after ShinyHunters claims data theft</a></p></li></ul></div><p class="paragraph" style="text-align:left;"></p><div id="cybercrime-cyber-espionage-ap-ts" class="section" style="background-color:transparent;border-color:#C0C0C0;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🥷🏻 CYBERCRIME, CYBER ESPIONAGE, APT’s</h3><div class="embed"><a class="embed__url" href="https://unit42.paloaltonetworks.com/espionage-campaigns-target-se-asian-government-org/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank"><div class="embed__content"><p class="embed__title"> Converging Interests: Analysis of Threat Clusters Targeting a Southeast Asian Government </p><p class="embed__description"> Unit 42 uncovers multiple clusters of cyberespionage targeting a Southeast Asian government organization with USBFect, RATs and loaders. </p><p class="embed__link"> unit42.paloaltonetworks.com/espionage-campaigns-target-se-asian-government-org </p></div><img class="embed__image embed__image--right" src="https://unit42.paloaltonetworks.com/wp-content/uploads/2026/03/08_Nation-State-cyberattacks_1920x900.jpg"/></a></div><p class="paragraph" style="text-align:left;">🇷🇺 <b>Russian police arrested the suspected administrator of </b><i><b>LeakBase</b></i><b>, a large marketplace for stolen</b> personal and financial data. Authorities seized equipment and said <a class="link" href="https://thehackernews.com/2026/03/leakbase-admin-arrested-in-russia-over.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">the site held hundreds of millions of credentials</a> and over 147,000 registered users. U.S. and Russian reports tied the forum to a threat actor known as Chucky and said the site was dismantled in a recent takedown. </p><p class="paragraph" style="text-align:left;">🇷🇺 ⚖️ 🇺🇸 <b>A Russian man, Ilya Angelov, was sentenced to two years for running a phishing botnet</b> used in BitPaymer ransomware attacks. The <a class="link" href="https://www.justice.gov/usao-edmi/pr/russian-cybercriminal-sentenced-prison-using-botnet-steal-millions-american-businesses?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">botnet infected thousands of computers and helped affiliates extort over $14 million</a> from more than 70 U.S. companies. The group sold access to infected machines to other cybercriminals and partnered with multiple ransomware gangs.</p><p class="paragraph" style="text-align:left;">🇷🇺 ⚖️ 🇺🇸 <b>Aleksei Volkov, a 26-year-old Russian, was sentenced to 6.75 years in the U.S. for helping ransomware groups</b> cause over $9 million in real losses. He sold access to company networks that attackers used to encrypt data and demand cryptocurrency ransoms. Volkov <a class="link" href="http://www.justice.gov/opa/pr/russian-citizen-sentenced-prison-hacking-us-companies-and-enabling-major-cybercrime-groups?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">must pay full restitution and forfeit the tools used</a> in the crimes.</p><p class="paragraph" style="text-align:left;">🆙 ✅ <b>Tycoon 2FA, a subscription phishing service that bypasses MFA, remains fully operational despite</b> a <a class="link" href="https://blogs.microsoft.com/on-the-issues/2026/03/04/how-a-global-coalition-disrupted-tycoon/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">recent international takedown</a>. The disruption briefly cut activity but attacks and cloud compromises soon returned to previous levels. Law enforcement seized domains and pursued operators, but CrowdStrike <a class="link" href="https://www.crowdstrike.com/en-us/blog/tycoon2fa-phishing-as-a-service-platform-persists-following-takedown/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">says</a> the platform’s tactics and reach continue.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#f0f0f0;border-color:#C0C0C0;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🗓️ <b><a class="link" href="https://xsa.github.io/infosec-events/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">{Cyber,Info}Sec Events</a></b> — A community-maintained list of infosec conferences worldwide. Subscribe to the <a class="link" href="https://xsa.github.io/infosec-events/events.ics?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">ICS calendar feed</a> to get events straight into your calendar, or follow <a class="link" href="https://infosec.exchange/@infosecevents?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">@infosecevents@infosec.exchange</a> on Mastodon for weekly digests. Contributions and ⭐ welcome!</p></div><p class="paragraph" style="text-align:left;"></p><div id="government-politics-and-privacy" class="section" style="background-color:transparent;border-color:#C0C0C0;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">👨🏻‍⚖️ 👀 GOVERNMENT, POLITICS, AND PRIVACY</h3><blockquote align="center" class="twitter-tweet"><a href="https://twitter.com/lukOlejnik/status/2035771076890837337?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems"><p> Twitter tweet </p></a></blockquote><hr class="content_break"><p class="paragraph" style="text-align:left;">🤷‍♂️ 🇺🇸 <b>Four former NSA and U.S. Cyber Command leaders warned that the U.S. is losing its offensive edge</b> in cybersecurity. They <a class="link" href="https://cyberscoop.com/former-nsa-chiefs-offensive-edge-rsac/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">said</a> rising AI threats, China, and cybercrime outpace government and industry response. They urged stronger public-private cooperation and bolder policy action.</p><p class="paragraph" style="text-align:left;">🇬🇧 🇨🇳 <b>The UK has </b><a class="link" href="https://www.gov.uk/government/news/uk-crackdown-on-vile-scam-centres-steps-up-with-sanctions-on-illicit-crypto-network?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow"><b>sanctioned</b></a><b> </b><i><b>Xinbi</b></i><b>, a Chinese-language marketplace that sells stolen data and crypto services</b> to Southeast Asian scam centers. <i>Xinbi</i> is linked to laundering billions and to North Korean thefts, according to <a class="link" href="https://www.chainalysis.com/blog/xinbi-designation-chinese-language-crypto-scam-infrastructure/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">Chainalysis</a>. The sanctions also target Cambodia&#39;s #8 Park scam compound and aim to cut <i>Xinbi</i> off from legitimate crypto channels.</p><p class="paragraph" style="text-align:left;">🇬🇷 <b>Intellexa founder Tal Dilian, convicted in Greece for mass phone hacking, says he will appeal and denies</b> being a &quot;scapegoat.&quot; He <a class="link" href="https://techcrunch.com/2026/03/25/convicted-spyware-chief-hints-that-greeces-government-was-behind-dozens-of-phone-hacks/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">hinted the Greek government may have authorized the hacks</a> that targeted ministers, journalists, and others. The spyware Predator, sold mainly to governments, led to U.S. sanctions after being used against officials and journalists.</p><p class="paragraph" style="text-align:left;">🇺🇸 🔋 <b>The U.S. Department of Energy’s CESER released a 5-year plan (2026–2030) to protect </b>the <a class="link" href="https://www.securityweek.com/doe-publishes-5-year-energy-security-plan/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">nation’s energy system</a>s. It focuses on three goals: build advanced security technologies, harden critical energy infrastructure, and improve response and recovery. Programs like AI-FORTS and Project Armor aim to stop AI-enabled attacks and strengthen resilience.</p><p class="paragraph" style="text-align:left;">🇮🇱 🇮🇷 <b>Israel used hacked Iranian street cameras and AI to locate and help kill Iran’s supreme leader</b> — Poorly secured cameras worldwide can be <a class="link" href="https://www.securityweek.com/iran-built-a-vast-camera-network-to-control-dissent-israel-turned-it-into-a-targeting-tool/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">hijacked and turned into real-time targeting tools</a>. Experts warn mass surveillance meant to control dissent can make leaders and civilians more vulnerable.</p><p class="paragraph" style="text-align:left;">🇷🇺 ❌ <b>Russian authorities have blocked the paywall-bypass site </b><a class="link" href="https://Archive.today?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow"><b>Archive.today</b></a><b> and some of its domains</b>, showing Roskomnadzor error pages. The agency confirmed access to at least one <a class="link" href="https://Archive.is?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">Archive.is</a> page was limited but gave no reason. The <a class="link" href="https://techcrunch.com/2026/03/23/russian-authorities-block-paywall-removal-site-archive-today/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">extent of the block is unclea</a>r, and <a class="link" href="https://Archive.today?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">Archive.today</a> and Roskomnadzor did not comment.</p><hr class="content_break"><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/jfKEaJfcdTE" width="100%"></iframe><hr class="content_break"><p class="paragraph" style="text-align:left;">❌ 🇺🇸 <b>The FCC has banned the sale of new consumer routers made outside the USA</b> by adding them to its Covered List. The <a class="link" href="https://www.bleepingcomputer.com/news/security/fcc-bans-new-routers-made-outside-the-usa-over-security-risks/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">move follows a national security finding</a> that foreign-made routers pose severe supply-chain and cybersecurity risks. Existing routers can still be sold, but future models may be harder to buy and cost more unless makers get special approval.</p><p class="paragraph" style="text-align:left;">🇺🇸 🗳️ <b>A California sheriff seized 650,000 Riverside County ballots claiming an election-fraud probe</b> — State officials and experts say the claims are weak and the sheriff lacked authority. They <a class="link" href="https://cyberscoop.com/state-officials-election-experts-decry-california-sheriff-ballot-seizure/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">warn the seizure risks breaking ballot security</a> and undermining trust in elections.</p><p class="paragraph" style="text-align:left;">🤔 ✅ <b>An anonymous post accuses compliance startup Delve of giving customers fake audit evidence and claiming compliance</b> they didn’t earn. Delve denies the claims, saying it only provides templates and access for independent auditors. The <a class="link" href="https://techcrunch.com/2026/03/22/delve-accused-of-misleading-customers-with-fake-compliance/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">dispute raises possible legal and security risks</a> and promises more allegations to come.</p></div><p class="paragraph" style="text-align:left;"></p><div id="malware-threats" class="section" style="background-color:transparent;border-color:#C0C0C0;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🦠 MALWARE & THREATS</h3><div class="embed"><a class="embed__url" href="https://news.risky.biz/risky-bulletin-github-is-starting-to-have-a-real-malware-problem/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank"><div class="embed__content"><p class="embed__title"> GitHub is starting to have a real malware problem </p><p class="embed__description"> In other news: Russian intelligence services compromise thousands of Signal accounts; Trivy vulnerability scanner compromised for supply chain attack; FBI takes down Aisuru and Kimwolf botnets. </p><p class="embed__link"> news.risky.biz/risky-bulletin-github-is-starting-to-have-a-real-malware-problem </p></div><img class="embed__image embed__image--right" src="https://news.risky.biz/content/images/2026/03/000-RBN-logo-9.png"/></a></div><p class="paragraph" style="text-align:left;">🍎 📲 <b>Kaspersky found that the Coruna iOS exploit kit reuses and expands the kernel exploit code from 2023</b>&#39;s <i>Operation Triangulation</i>. The kit now targets many iPhones and is <a class="link" href="https://securelist.com/coruna-framework-updated-operation-triangulation-exploit/119228/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">being used in mass attacks</a> and watering-hole campaigns. Its modular, updated design lets more attackers reuse it and puts unpatched users at risk.</p><p class="paragraph" style="text-align:left;">🇦🇲 ⚖️ 🇺🇸 <b>Armenian national Hambardzum Minasyan was extradited to the U.S. for allegedly running parts of the </b><i><b>RedLine</b></i><b> infostealer</b>, including servers, domains, and payment handling. He faces charges including access device fraud, money laundering, and CFAA violations, with up to 20 years on some counts. <i>RedLine</i> is a <a class="link" href="https://www.securityweek.com/alleged-redline-malware-administrator-extradited-to-us/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">popular malware-as-a-service that steals credentials</a> and crypto data and remains active despite international takedown efforts.</p><p class="paragraph" style="text-align:left;">🇺🇸 🤑 <b>A malvertising campaign used Google Ads to lure U.S. tax-searchers to fake sites that install rogue ScreenConnect </b>remote access tools. The attackers <a class="link" href="https://www.huntress.com/blog/w2-malvertising-to-kernel-mode-edr-kill?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">deploy a crypter</a> and a Huawei-signed audio driver (HWAuidoOs2Ec.sys) as HwAudKiller to disable EDRs and steal credentials. They hide using commercial cloaking services and may be preparing ransomware or selling access.</p><p class="paragraph" style="text-align:left;">🇮🇷 <b>The FBI warns Iran-linked hackers are using Telegram to spread malware</b> that targets dissidents, journalists, and others seen as threats to Iran. Attackers <a class="link" href="https://cyberscoop.com/fbi-iranian-hackers-targeting-opponents-with-telegram-malware/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">fake apps and contacts to trick victims</a> into downloading files that give the hackers control. The malware has led to data theft, leaks, and reputational harm.</p><p class="paragraph" style="text-align:left;">🎣 🤑 <b>Microsoft warned of mass tax‑season phishing </b>that stole credentials and installed remote‑management malware on devices. One Feb 10 <a class="link" href="https://www.microsoft.com/en-us/security/blog/2026/03/19/when-tax-season-becomes-cyberattack-season-phishing-and-malware-campaigns-using-tax-related-lures/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">campaign hit over 29,000 users across 10,000 U.S. organizations</a> by spoofing the IRS and delivering ScreenConnect and other RMM tools. Organizations are urged to enforce 2FA, monyitor email/links, and block malicious domains to prevent persistent access.</p><p class="paragraph" style="text-align:left;">ℹ️ 🔑 <i><b>VoidStealer</b></i><b> is a new info‑stealer that bypasses Chrome’s Application‑Bound Encryption</b> to extract the browser&#39;s master key. It <a class="link" href="https://www.gendigital.com/blog/insights/research/voidstealer-abe-bypass?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">uses a debugger trick with hardware breakpoints </a>to read the v20_master_key from Chrome memory during startup. The technique appears based on the open‑source ElevationKatz tool and is the first such method seen in the wild.</p><hr class="content_break"><div class="embed"><a class="embed__url" href="https://cyberscoop.com/social-engineering-surge-intrusion-vector-mandiant-m-trends/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank"><div class="embed__content"><p class="embed__title"> The phone call is the new phishing email </p><p class="embed__description"> Voice-based phishing was at the root of multiple attack sprees Mandiant responded to last year, reflecting a concerning shift in tactics. </p><p class="embed__link"> cyberscoop.com/social-engineering-surge-intrusion-vector-mandiant-m-trends </p></div><img class="embed__image embed__image--right" src="https://cyberscoop.com/wp-content/uploads/sites/3/2026/03/GettyImages-2235631289.jpg"/></a></div></div><p class="paragraph" style="text-align:left;"></p><div id="ai-crypto-tech-tools" class="section" style="background-color:transparent;border-color:#C0C0C0;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🤖 🧰 AI, CRYPTO, TECH & TOOLS</h3><p class="paragraph" style="text-align:left;">💰️ <b>OpenAI launched a public safety bug bounty for AI-specific abuse and safety risks</b> in its products. The <a class="link" href="https://openai.com/index/safety-bug-bounty/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">program</a> accepts non-security issues like prompt injection, data exfiltration, agentic misuse, and connector vulnerabilities. Researchers can earn up to $7,500 for high-severity, reproducible reports with clear mitigations.</p><p class="paragraph" style="text-align:left;">🍎 🔐 <b>Apple says that since launching Lockdown Mode nearly four years ago, it has not seen any successful mercenary spyware hacks</b> on devices with the feature enabled. Independent researchers and organizations have documented attacks but <a class="link" href="https://techcrunch.com/2026/03/27/apple-says-no-one-using-lockdown-mode-has-been-hacked-with-spyware/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">found no confirmed bypasses of Lockdown Mode</a>, and some cases show it blocking spyware. Experts say Lockdown Mode greatly reduces attack surfaces and is recommended for people at high risk.</p><p class="paragraph" style="text-align:left;">📆 🔐 <b>Google will finish switching its products to quantum-resistant encryption by 2029</b> — The company sped up its plan because <a class="link" href="https://blog.google/innovation-and-ai/technology/safety-security/cryptography-migration-timeline/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">quantum computing progress is faster </a>than expected. Google hopes its aggressive timeline will push other companies to act sooner.</p><p class="paragraph" style="text-align:left;">🆕 🔐 <b>Mozilla released Firefox 149 with a built-in VPN that gives signed-in users 50 GB of browser-only traffic</b> per month. The VPN routes browser traffic through a U.S.-based proxy, can be toggled on per site, and will roll out first in the U.S., UK, Germany, and France. <a class="link" href="https://www.firefox.com/en-US/firefox/149.0/releasenotes/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">Firefox 149</a> also adds Split View, tighter SafeBrowsing controls, and patches many security flaws.</p><p class="paragraph" style="text-align:left;">🆕 🔎 <b>GitHub is adding AI-powered security detections to </b><i><b>Code Security</b></i><b> to find vulnerabilities</b> in more languages and frameworks <a class="link" href="https://cyberscoop.com/huntress-railway-ai-phishing-campaign-compromised-hundreds-of-organizations/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">beyond what static analysis covers</a>. These AI detections work with CodeQL and show risks and suggested fixes directly in pull requests. Copilot Autofix can then help developers fix issues quickly before code is merged.</p></div><p class="paragraph" style="text-align:left;"></p><div id="vulnerabilities-research-and-threat" class="section" style="background-color:transparent;border-color:#C0C0C0;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🐛 🧠 VULNERABILITIES, RESEARCH, AND THREAT INTELLIGENCE</h3><p class="paragraph" style="text-align:left;">➝ From the Patching Department:</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/bind-updates-patch-high-severity-vulnerabilities-2/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">BIND Updates Patch High-Severity Vulnerabilities</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/cisco-patches-multiple-vulnerabilities-in-ios-software/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">Cisco Patches Multiple Vulnerabilities in IOS Software</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://thehackernews.com/2026/03/citrix-urges-patching-critical.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">Citrix Urges Patching Critical NetScaler Flaw Allowing Unauthenticated Data Leaks</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/chrome-146-update-patches-high-severity-vulnerabilities/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">Chrome 146 Update Patches High-Severity Vulnerabilities</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/ios-macos-26-4-roll-out-with-fresh-security-updates/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">iOS, macOS 26.4 Roll Out With Fresh Security Patches</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/qnap-patches-four-vulnerabilities-exploited-at-pwn2own/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">QNAP Patches Four Vulnerabilities Exploited at Pwn2Own</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bleepingcomputer.com/news/security/tp-link-warns-users-to-patch-critical-router-auth-bypass-flaw/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">TP-Link warns users to patch critical router auth bypass flaw</a></p></li></ul><hr class="content_break"><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/_f30RyXc_8Q" width="100%"></iframe><hr class="content_break"><p class="paragraph" style="text-align:left;">🔓️ 📲 <b>A hacker has posted a newer version of the DarkSword iPhone exploit kit</b> on GitHub. The leaked code makes it easy for <a class="link" href="https://techcrunch.com/2026/03/23/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">anyone to hack iPhones and iPads running older iOS versions</a>, likely affecting hundreds of millions of devices. Apple urges users to update their software to stay protected.</p><p class="paragraph" style="text-align:left;">🔓️ ☁️ <b>Researchers found </b><a class="link" href="https://thehackernews.com/2026/03/we-found-eight-attack-vectors-inside.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow"><b>eight ways attackers</b></a><b> can exploit AWS Bedrock</b> by abusing permissions, logs, agents, flows, knowledge bases, and prompts. A single over‑privileged identity can redirect data, hijack agents, poison prompts, or access corporate systems. Securing Bedrock requires tight permissions, inventory of AI workloads, and mapping attack paths.</p><p class="paragraph" style="text-align:left;">💥 🔓️ <b>Arctic Wolf found activity suggesting attackers exploited CVE-2025-32975</b>, a critical authentication bypass in unpatched Quest KACE SMA appliances. The flaw can let <a class="link" href="https://arcticwolf.com/resources/blog/cve-2025-32975/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">unauthenticated actors impersonate users and gain full admin control</a>, and Quest patched it in May 2025. Organizations with internet-exposed, unpatched KACE SMAs should apply the patch immediately.</p></div><p class="paragraph" style="text-align:left;"></p><div id="ics-ot-io-t" class="section" style="background-color:transparent;border-color:#C0C0C0;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🛰️ ICS, OT & IoT</h3><p class="paragraph" style="text-align:left;">🤷 🤷 🤷 </p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#f0f0f0;border-color:#C0C0C0;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">💬 CONNECT</h3><p class="paragraph" style="text-align:left;">Follow me on <a class="link" href="https://infosec.exchange/@0x58?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">Mastodon</a> for quick daily updates and bite-sized content.</p><p class="paragraph" style="text-align:left;">Prefer using an RSS feed? Add <b>Infosec MASHUP</b> to your feed <a class="link" href="https://rss.beehiiv.com/feeds/HVhiKYpQlR.xml?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">here</a>.</p><p class="paragraph" style="text-align:center;"><b>Enjoying our newsletter? </b>Forward it to a colleague—<br>it’s one of the best ways to support us.</p><p class="paragraph" style="text-align:left;">Thanks for reading today’s newsletter, and if you&#39;re enjoying it and want to support my work, you can <b>buy me a coffee</b> ☕ over at <a class="link" href="https://www.buymeacoffee.com/0x58?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-13-2026-rsa-week-real-world-problems" target="_blank" rel="noopener noreferrer nofollow">https://www.buymeacoffee.com/0x58</a></p><p class="paragraph" style="text-align:left;"> See you next time!</p><p class="paragraph" style="text-align:left;">-X.</p></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=7ec7b40e-d328-4a84-a6b5-69605ff1e593&utm_medium=post_rss&utm_source=x_s_infosec_newsletter">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>🕵🏻‍♂️ [InfoSec MASHUP] 12/2026 - Iran Is Everywhere This Week</title>
  <description>Plus: GlassWorm escalates its supply chain campaign, EU votes to ban mass message scanning, a witness blamed ChatGPT for his smartglasses</description>
  <link>https://infosec-mashup.santolaria.net/p/infosec-mashup-12-2026-iran-is-everywhere-this-week</link>
  <guid isPermaLink="true">https://infosec-mashup.santolaria.net/p/infosec-mashup-12-2026-iran-is-everywhere-this-week</guid>
  <pubDate>Sat, 21 Mar 2026 09:04:00 +0000</pubDate>
  <atom:published>2026-03-21T09:04:00Z</atom:published>
    <dc:creator>Xavier Santolaria</dc:creator>
    <category><![CDATA[Malware]]></category>
    <category><![CDATA[Opensource]]></category>
    <category><![CDATA[Privacy]]></category>
    <category><![CDATA[Cybersecurity]]></category>
    <category><![CDATA[Threat Intelligence]]></category>
    <category><![CDATA[Ai]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'IBM Plex Sans',-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'IBM Plex Sans',-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">👋 Writing this from San Diego 🇺🇸 — about as far from my Swiss desk as a timezone can stretch. But the news didn&#39;t care about my travel schedule.</p><p class="paragraph" style="text-align:left;">If there&#39;s one thread running through this week, it&#39;s Iran: Boggy Serpens refining its AI-enhanced espionage playbook, an attempted intrusion at Poland&#39;s nuclear research center with Iranian fingerprints, the EU hitting Iranian entities with fresh sanctions — and Iran&#39;s own population cut off from the internet for over two weeks now. Stryker is still cleaning up from last week&#39;s <i>Handala</i> attack too. A lot of activity from a lot of pro-Iran actors in one week.</p><p class="paragraph" style="text-align:left;">Oh, and if you’re in SF this week for <a class="link" href="https://www.rsaconference.com/usa?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">RSA</a>, don’t forget to check awesome side events listed here: <a class="link" href="https://xsa.github.io/infosec-events/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">https://xsa.github.io/infosec-events/</a></p><p class="paragraph" style="text-align:left;">Let’s now dive into this week’s top insights! 🚀</p><h2 class="heading" style="text-align:left;">Table of Contents</h2><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="#breaches-security-incidents" rel="noopener noreferrer nofollow">BREACHES & SECURITY INCIDENTS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#cybercrime-cyber-espionage-ap-ts" rel="noopener noreferrer nofollow">CYBERCRIME, CYBER ESPIONAGE, APT’s</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#government-politics-and-privacy" rel="noopener noreferrer nofollow">GOVERNMENT, POLITICS, AND PRIVACY</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#malware-threats" rel="noopener noreferrer nofollow">MALWARE & THREATS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#ai-crypto-tech-tools" rel="noopener noreferrer nofollow">AI, CRYPTO, TECH & TOOLS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#vulnerabilities-research-and-threat" rel="noopener noreferrer nofollow">VULNERABILITIES, RESEARCH, AND THREAT INTELLIGENCE</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#ics-ot-io-t" rel="noopener noreferrer nofollow">ICS, OT & IoT</a></p></li></ul><div id="breaches-security-incidents" class="section" style="background-color:transparent;border-color:#C0C0C0;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🔓 BREACHES & SECURITY INCIDENTS</h3><p class="paragraph" style="text-align:left;">🇫🇷 🏃‍♂️ 📍 <b>A French Navy officer logged a run on the deck of the Charles de Gaulle and uploaded it to Strava</b>, revealing the <a class="link" href="https://techcrunch.com/2026/03/20/a-french-navy-officer-accidentally-leaked-the-location-of-an-aircraft-carrier-by-logging-his-run-on-strava/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">carrier’s exact location</a>. Strava defaults to public, and similar data has exposed military movements before. The French Armed Forces said the officer broke guidelines, and users should consider setting accounts to private.</p><p class="paragraph" style="text-align:left;">🇺🇸 🚗 <b>A cyberattack on breathalyzer firm </b><i><b>Intoxalock</b></i><b> has left drivers across the U.S. unable to start their cars</b> — The company paused systems and cannot perform required device calibrations. Intoxalock <a class="link" href="https://techcrunch.com/2026/03/20/cyberattack-on-vehicle-breathalyzer-company-leaves-drivers-stranded-across-the-us/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">did not disclose attack details</a> or a recovery timeline.</p><p class="paragraph" style="text-align:left;">🇺🇸 <b>Security researcher Jeremiah Fowler found publicly exposed </b><i><b>Sears</b></i><b> chatbot databases</b> that <a class="link" href="https://www.wired.com/story/sears-exposed-ai-chatbot-phone-calls-and-text-chats-to-anyone-on-the-web/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">contained millions of chat logs, audio files, and transcripts</a> with customers&#39; names, addresses, and phone numbers. Some recordings lasted hours and captured private conversations, raising risks of phishing and fraud. Transformco (the company that owns Sears and Sears Home Services) secured the data after being notified, but it’s still unclear who else accessed it.</p><p class="paragraph" style="text-align:left;">🇺🇸 <b>Intuitive Surgical said it was hit by a targeted phishing cyberattack that exposed</b> some internal business and contact data. The company says its surgical robots, manufacturing systems, and hospital networks were not affected. The <a class="link" href="https://www.securityweek.com/robotic-surgery-giant-intuitive-discloses-cyberattack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">breach is contained, regulators are being notified</a>, and no timeline or attacker details were given.</p><p class="paragraph" style="text-align:left;">🇺🇸 <b>Marquis says hackers stole personal and financial data from at least 672,075 people</b> in an August 2025 ransomware attack. Stolen data included names, birth dates, addresses, bank and card numbers, and Social Security numbers. Marquis <a class="link" href="https://techcrunch.com/2026/03/18/marquis-says-over-672000-people-had-personal-and-financial-data-stolen-in-ransomware-attack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">blames a SonicWall security failure</a> that let attackers access its network and deploy ransomware.</p><hr class="content_break"><p class="paragraph" style="text-align:left;">🇺🇸 <b>Stryker is restoring its internal systems after a cyberattack that wiped thousands</b> of employee devices. A pro‑Iran group called <i>Handala</i> claimed responsibility and said it used company admin access to remotely erase laptops and phones. The <a class="link" href="https://techcrunch.com/2026/03/17/stryker-says-its-restoring-systems-after-pro-iran-hackers-wiped-thousands-of-employee-devices/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">breach disrupted operations</a> but Stryker says its internet‑connected medical devices are safe.</p><p class="paragraph" style="text-align:left;">→ <a class="link" href="https://www.cisa.gov/news-events/alerts/2026/03/18/cisa-urges-endpoint-management-system-hardening-after-cyberattack-against-us-organization?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">CISA urges US orgs to secure Microsoft Intune systems after Stryker breach</a></p><p class="paragraph" style="text-align:left;">→ <a class="link" href="https://techcrunch.com/2026/03/19/fbi-seizes-pro-iranian-hacking-groups-websites-after-destructive-stryker-hack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">FBI seizes pro-Iranian hacking group’s websites after destructive Stryker hack</a></p><hr class="content_break"><p class="paragraph" style="text-align:left;">🤔 ⁉️ <b>Several major companies named by the Cl0p ransomware group in the Oracle E-Business Suite hack have not commented</b> on the breach — Broadcom, Bechtel, Estée Lauder, and Abbott <a class="link" href="https://www.securityweek.com/oracle-ebs-hack-only-4-corporate-giants-still-silent-on-potential-impact/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">remain silent</a> despite torrents claiming large amounts of stolen data. Companies may stay quiet for legal, strategic, or investigatory reasons.</p><p class="paragraph" style="text-align:left;">🇬🇧 <b>Companies House fixed a security flaw in its WebFiling service that exposed data for up to five million</b> U.K. companies. The bug, introduced in October 2025, let <a class="link" href="https://www.bleepingcomputer.com/news/security/uks-companies-house-confirms-security-flaw-exposed-business-data/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">logged-in users view other companies&#39; dashboards</a> and some non-public details like dates of birth and addresses. The agency says no passwords or identity documents were accessed, has reported the incident, and is investigating.</p><p class="paragraph" style="text-align:left;">🇨🇦 <b>Canadian retailer Loblaw says a criminal third party accessed</b> customer names, email addresses, and phone numbers. The company says passwords, health details, credit card data, and PC Financial <a class="link" href="https://www.securityweek.com/loblaw-data-breach-impacts-customer-information/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">were not affected</a>. It is unclear how many customers were impacted.</p><p class="paragraph" style="text-align:left;">🇬🇧 <b>The Guardian found that sensitive UK Biobank health data from 500,000 volunteers has been leaked</b> online many times. Researchers <a class="link" href="https://www.theguardian.com/science/2026/mar/14/confidential-health-records-exposed-online-uk-biobank?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">accidentally posted datasets to sites like GitHub</a>, exposing diagnoses and dates that could allow re-identification. Biobank says no names were shared and has issued takedown notices, but experts warn privacy risks remain.</p><p class="paragraph" style="text-align:left;">→ More:</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bleepingcomputer.com/news/security/aura-confirms-data-breach-exposing-900-000-marketing-contacts/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">Aura confirms data breach exposing 900,000 marketing contacts</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bleepingcomputer.com/news/security/bitrefill-blames-north-korean-lazarus-group-for-cyberattack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">Bitrefill blames North Korean Lazarus group for cyberattack</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bleepingcomputer.com/news/security/navia-discloses-data-breach-impacting-27-million-people/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">Navia discloses data breach impacting 2.7 million people</a></p></li><li><p class="paragraph" style="text-align:left;"><a href="#b-af2b58cd-34a4-4913-9ae8-7cfe1c4356e8" target="_self" title="1 " data-skip-tracking="true"><sup style="-webkit-text-decoration:underline;text-decoration:underline;">1</sup></a><a class="link" href="https://www.securityweek.com/thousands-of-magento-sites-hit-in-ongoing-defacement-campaign/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">Thousands of Magento Sites Hit in Ongoing Defacement Campaign</a></p></li></ul></div><p class="paragraph" style="text-align:left;"></p><div id="cybercrime-cyber-espionage-ap-ts" class="section" style="background-color:transparent;border-color:#C0C0C0;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🥷🏻 CYBERCRIME, CYBER ESPIONAGE, APT’s</h3><div class="embed"><a class="embed__url" href="https://unit42.paloaltonetworks.com/boggy-serpens-threat-assessment/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank"><div class="embed__content"><p class="embed__title"> Boggy Serpens Threat Assessment </p><p class="embed__description"> Iranian threat group Boggy Serpens&#39; cyberespionage evolves with AI-enhanced malware and refined social engineering. Unit 42 details their persistent targeting. </p><p class="embed__link"> unit42.paloaltonetworks.com/boggy-serpens-threat-assessment </p></div><img class="embed__image embed__image--right" src="https://unit42.paloaltonetworks.com/wp-content/uploads/2026/03/Boggy-Serpens.png"/></a></div><p class="paragraph" style="text-align:left;">🇺🇸 🤑 <b>A former Brightly Software contractor stole payroll and corporate data and then sent over 60 extortion emails</b> demanding $2.5 million. Brightly paid $7,540 in Bitcoin and reported the theft, leading the FBI to seize devices and charge 27-year-old Cameron Curry. He <a class="link" href="https://www.bleepingcomputer.com/news/security/data-analyst-found-guilty-of-extorting-brightly-software-of-25-million/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">faces up to 12 years in prison</a> for the extortion scheme.</p><p class="paragraph" style="text-align:left;">🇷🇺 🇺🇦 <b>A Russian state-sponsored group has exploited a high-severity XSS flaw in </b><i><b>Zimbra</b></i> to <a class="link" href="https://www.securityweek.com/russian-apt-exploits-zimbra-vulnerability-against-ukraine/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">attack Ukrainian targets</a>. The bug lets malicious CSS/JavaScript in email steal credentials, session tokens, 2FA backups and mailbox data. CISA <a class="link" href="https://www.cisa.gov/news-events/alerts/2026/03/18/cisa-adds-one-known-exploited-vulnerability-catalog?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">added</a> the flaw to its KEV list and urges immediate patching of Zimbra.</p><p class="paragraph" style="text-align:left;">🇮🇷 <b>Researchers found Iran-linked cyber groups built and staged hidden infrastructure for months before the Feb 28, 2026</b> US/Israeli strikes. After the strikes, about <a class="link" href="https://www.securityweek.com/iran-readied-cyberattack-capabilities-for-response-prior-to-epic-fury/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">60 coordinated hacktivist and APT groups launched attacks</a> mainly against US, Israeli, and Gulf targets. Kinetic strikes damaged Iranian internet links but did not stop or seriously degrade Iran’s cyber capabilities.</p><p class="paragraph" style="text-align:left;">🇨🇳 👀 <b>China-linked hackers have run a patient cyberespionage campaign against Southeast Asian militaries</b> since at least 2020. They used custom tools (AppleChris, MemFun, Getpass), PowerShell, and DLL hijacking to stay hidden and steal sensitive military files. Evidence like time-zone patterns, Chinese infrastructure, and Simplified Chinese <a class="link" href="https://unit42.paloaltonetworks.com/espionage-campaign-against-military-targets/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">suggests the group operates from China</a>.</p><p class="paragraph" style="text-align:left;">🇰🇭 <b>Cambodia says it will close all online scam centers</b> within weeks. Authorities have opened <a class="link" href="https://apnews.com/article/cambodia-cybercrime-phnom-penh-online-fraud-9bbfe6ee970b5a73529f5f820b931e1f?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">dozens of cases, arrested hundreds, and repatriated nearly 10,000</a> workers. Experts warn past raids left networks intact and say key beneficiaries may not be targeted.</p><p class="paragraph" style="text-align:left;">🎣 <b>A convicted scammer, Kwamaine Jerell Ford, is accused of running a new phishing scheme from prison</b> by impersonating an adult film star. He allegedly tricked professional athletes into giving iCloud logins and MFA codes, then stole their data and charged many fraudulent transactions. Prosecutors also say he coerced an OnlyFans model into sex acts and used videos to target more victims; <a class="link" href="https://cyberscoop.com/nba-nfl-athletes-social-engineering-scheme-apple-icloud-mfa/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">he faces 22 charges and is held without bail</a>.</p><p class="paragraph" style="text-align:left;">→ More:</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bleepingcomputer.com/news/security/police-take-down-373-000-fake-csam-sites-in-operation-alice/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">Police take down 373,000 fake CSAM sites in Operation Alice</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/3-men-charged-with-conspiring-to-smuggle-us-artificial-intelligence-to-china/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">3 Men Charged With Conspiring to Smuggle U.S. Artificial Intelligence to China</a></p></li></ul></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#f0f0f0;border-color:#C0C0C0;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🗓️ <b><a class="link" href="https://xsa.github.io/infosec-events/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">{Cyber,Info}Sec Events</a></b> — A community-maintained list of infosec conferences worldwide. Subscribe to the <a class="link" href="https://xsa.github.io/infosec-events/events.ics?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">ICS calendar feed</a> to get events straight into your calendar, or follow <a class="link" href="https://infosec.exchange/@infosecevents?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">@infosecevents@infosec.exchange</a> on Mastodon for weekly digests. Contributions and ⭐ welcome!</p></div><p class="paragraph" style="text-align:left;"></p><div id="government-politics-and-privacy" class="section" style="background-color:transparent;border-color:#C0C0C0;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">👨🏻‍⚖️ 👀 GOVERNMENT, POLITICS, AND PRIVACY</h3><div class="embed"><a class="embed__url" href="https://mastodon.social/@netblocks/116232059137625268?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank"><div class="embed__content"><p class="embed__title"> NetBlocks (@netblocks@mastodon.social) </p><p class="embed__description"> Attached: 1 image ⚠️ Update: #Iran&#39;s internet blackout has entered day 16 as the measure continues in its third week, with the public cut off from international networks for 360 hours. Chosen influencers enjoy whitelisting while state media report a new wave of arrests targeting Starlink users. </p><p class="embed__link"> mastodon.social/@netblocks/116232059137625268 </p></div><img class="embed__image embed__image--right" src="https://files.mastodon.social/media_attachments/files/116/232/055/907/179/238/original/9b51247b22b97d96.png"/></a></div><p class="paragraph" style="text-align:left;">🇮🇹 💰️ <b>Cloudflare appealed a €14.2M fine from Italy for refusing to block sites via its 1.1.1.1</b> DNS service. The company says<a class="link" href="https://arstechnica.com/tech-policy/2026/03/cloudflare-appeals-piracy-shield-fine-hopes-to-kill-italys-site-blocking-law/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow"> Italy’s Piracy Shield forces rapid, opaque blocking that breaks Internet architecture</a> and risks widespread overblocking. Cloudflare is fighting the law in Italian courts and with EU regulators.</p><p class="paragraph" style="text-align:left;">🇺🇸 <b>National Cyber Director Sean Cairncross said the Trump administration is not asking companies to carry out offensive cyberattacks</b> — Instead, the government wants private firms to share technical threat information so officials can respond. The <a class="link" href="https://cyberscoop.com/national-cyber-strategy-private-sector-offensive-operations-sean-cairncross/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">FBI also says companies should report breaches</a> and work with law enforcement to disrupt attackers.</p><p class="paragraph" style="text-align:left;">🇺🇸 💰️ <b>The FBI confirmed it has resumed buying Americans’ location and other data from commercial data brokers</b> to aid investigations. Critics say <a class="link" href="https://techcrunch.com/2026/03/18/fbi-is-buying-location-data-to-track-us-citizens-kash-patel-wyden/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">this lets agencies bypass warrant requirements</a> and may violate the Fourth Amendment. Lawmakers have proposed a bill to require court warrants before agencies can buy people’s data.</p><p class="paragraph" style="text-align:left;">🇪🇺 🇨🇳 🇮🇷 <b>The EU sanctioned three companies and two individuals from China and Iran</b> for <a class="link" href="https://www.consilium.europa.eu/en/press/press-releases/2026/03/16/cyber-attacks-against-the-eu-and-its-member-states-council-sanctions-three-entities-and-two-individuals/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">major cyberattacks</a>. One Chinese firm helped hack over 65,000 devices and another offered hacking-for-hire services. The Iranian company ran influence operations, stole subscriber data, and spread misinformation at the 2024 Paris Olympics.</p><p class="paragraph" style="text-align:left;">🇪🇺 🗳️ <b>The European Parliament voted to ban untargeted mass scanning of private messages</b> — Scans will be allowed <a class="link" href="https://cyberinsider.com/eu-votes-to-restrict-mass-scanning-of-peoples-private-messages/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">only when a judge names specific users or groups suspected</a> of child sexual abuse. Lawmakers extended a temporary CSAM rule until August 3, 2027, while negotiations continue.</p><div class="embed"><a class="embed__url" href="https://www.404media.co/witness-caught-using-smartglasses-in-court-blames-it-all-on-chatgpt/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank"><div class="embed__content"><p class="embed__title"> Witness Caught Using Smartglasses in Court Blames it all on ChatGPT </p><p class="embed__description"> A judge in London tossed out witness testimony after discovering the man was receiving coaching through a pair of smartglasses. </p><p class="embed__link"> www.404media.co/witness-caught-using-smartglasses-in-court-blames-it-all-on-chatgpt </p></div><img class="embed__image embed__image--right" src="https://www.404media.co/content/images/2026/03/Royal_Court2-1.jpg"/></a></div></div><p class="paragraph" style="text-align:left;"></p><div id="malware-threats" class="section" style="background-color:transparent;border-color:#C0C0C0;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🦠 MALWARE & THREATS</h3><div class="embed"><a class="embed__url" href="https://unit42.paloaltonetworks.com/ai-use-in-malware/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank"><div class="embed__content"><p class="embed__title"> Analyzing the Current State of AI Use in Malware </p><p class="embed__description"> Unit 42 research explores how AI is currently used in malware, from superficial integrations to advanced decision-making, and its future impact. </p><p class="embed__link"> unit42.paloaltonetworks.com/ai-use-in-malware </p></div><img class="embed__image embed__image--right" src="https://unit42.paloaltonetworks.com/wp-content/uploads/2026/03/07_Malware_Category_1920x900-2.jpg"/></a></div><p class="paragraph" style="text-align:left;">🐍 <b>Researchers uncovered </b><i><b>Speagle</b></i><b>, malware that hijacks the Cobra DocGuard security program</b> to steal data. It hides exfiltration by using compromised Cobra servers and a legitimate driver. The <a class="link" href="https://www.security.com/threat-intelligence/speagle-cobradocguard-infostealer?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">attack appears targeted</a>, possibly for espionage, and may stem from a supply-chain compromise.</p><p class="paragraph" style="text-align:left;">🔎 📄 <i><b>Perseus</b></i><b> is new Android malware that steals sensitive data by scanning users&#39; note apps</b> for passwords, recovery phrases, and financial info. It <a class="link" href="https://www.threatfabric.com/blogs/perseus-dto-malware-that-takes-notes?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">spreads via sideloaded IPTV apps</a> and uses Accessibility Services to fully control devices, take screenshots, and hide activity. Users should avoid sideloading apps, stick to Google Play, and enable Play Protect.</p><p class="paragraph" style="text-align:left;">🍀 <b>Fraudsters used a legitimate </b><i><b>Nordstrom</b></i><b> email address to send a St. Patrick’s Day crypto scam</b> promising to double deposits. <i>Nordstrom</i> warned the messages were unauthorized and said it is investigating after some customers paid. The <a class="link" href="https://www.bleepingcomputer.com/news/security/nordstroms-email-system-abused-to-send-crypto-scams-to-customers/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">breach likely came through an Okta SSO to Salesforce compromise</a>, and customers are urged to ignore the promotion.</p><p class="paragraph" style="text-align:left;">🪱 <b>Researchers warn the </b><i><b>GlassWorm</b></i><b> campaign has escalated</b> by abusing Open VSX extensionPack and extensionDependencies to <a class="link" href="https://socket.dev/blog/open-vsx-transitive-glassworm-campaign?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">turn benign-looking extensions into delivery vehicles for malware</a>. At least 72 malicious extensions were found, mimicking developer tools and using obfuscation, invisible Unicode, and rotating Solana wallets to fetch commands and steal secrets. This tactic enables attackers to bypass review, inject malware transitively, and expand supply-chain compromises across registries and repositories.</p><p class="paragraph" style="text-align:left;">🤑 <b>Malicious JavaScript was delivered through the </b><i><b>AppsFlyer</b></i><b> Web SDK and could replace crypto wallet addresses</b> with attacker-controlled ones. The<a class="link" href="https://profero.io/blog/hijacked-at-the-source-a-trusted-marketing-appsflyers-sdk-distributes-a-crypto-stealer?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow"> injected code also stole the original addresses</a> and metadata from users. AppsFlyer says the issue was contained and is investigating while customers should check logs and use known-good SDK versions.</p><p class="paragraph" style="text-align:left;">🇺🇦 🇷🇺 <b>A new malware campaign called </b><i><b>DRILLAPP</b></i><b> targets Ukrainian groups</b> and likely links to Russian actors. It <a class="link" href="https://thehackernews.com/2026/03/drillapp-backdoor-targets-ukraine.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">runs a JavaScript backdoor inside Microsoft Edge</a> with special debug flags to access files, mic, camera, and screen. The attackers use paste services for control and changed tactics between February variants to improve file access and persistence.</p><p class="paragraph" style="text-align:left;">🎣 <b>Attackers hide phishing links and attachments by appending long blocks of benign text</b>, links, and many HTML break lines to emails. This <a class="link" href="https://blog.knowbe4.com/nlp-obfuscation-techniques-email-security-evasion?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">&quot;noise&quot; fools some NLP-based email security tools</a> into seeing messages as safe. KnowBe4 found this technique often uses real signatures and links (e.g., Bank of America, Uber) to evade detection.</p><p class="paragraph" style="text-align:left;">🎣 🇸🇪 <b>A C-level executive at </b><i><b>Outpost24</b></i><b> was targeted in a sophisticated phishing attack</b> that used a phishing-as-a-service kit called <i>Kratos</i>. Attackers chained redirects through trusted services (Cisco, Nylas) and reused a reclaimed domain, then served a convincing Microsoft 365 credential-stealing page behind Cloudflare. Specops <a class="link" href="https://specopssoft.com/blog/phishing-campaign-cisco/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">says the method fits Iran-linked group tactics</a> but attribution remains uncertain.</p></div><p class="paragraph" style="text-align:left;"></p><div id="ai-crypto-tech-tools" class="section" style="background-color:transparent;border-color:#C0C0C0;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🤖 🧰 AI, CRYPTO, TECH & TOOLS</h3><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/MhJoJRqJ0Wc" width="100%"></iframe><hr class="content_break"><p class="paragraph" style="text-align:left;">☁️ <b>Bucketsquatting is (Finally) Dead</b> — AWS added a new bucket namespace pattern (<code>prefix-accountid-region-an</code>) to <a class="link" href="https://onecloudplease.com/blog/bucketsquatting-is-finally-dead?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">stop bucketsquatting</a>. This ensures only the owning account can create buckets with that name and helps prevent attacks. Use the namespace for all new S3 buckets and migrate existing ones if you need protection!</p><p class="paragraph" style="text-align:left;">📲 ⏳️ <b>Google will add a mandatory 24-hour wait before users can sideload apps from unverified Android developers to reduce malware</b> and scams. Power users can enable an &quot;advanced flow&quot; with steps like developer mode, a restart, and biometric confirmation to allow sideloading after the wait. Google <a class="link" href="https://android-developers.googleblog.com/2026/03/android-developer-verification.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">will also offer limited free developer accounts</a> for hobbyists and students while its verification rules take effect.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/a54b2f2a-1c4a-403a-a705-21723d286291/image.png?t=1774019645"/><div class="image__source"><span class="image__source_text"><p>Figure: The Advanced Flow/Google</p></span></div></div><hr class="content_break"><p class="paragraph" style="text-align:left;">🎵 🤑 <b>North Carolina musician Michael Smith pleaded guilty to using AI-generated songs and automated bots to fraudulently stream music</b> on major platforms. He and accomplices <a class="link" href="https://www.bleepingcomputer.com/news/security/musician-pleads-guilty-to-10m-streaming-fraud-powered-by-ai-bots/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">streamed the fake tracks billions of times, collecting over $10 million</a> in royalties. Smith agreed to forfeit about $8.09 million and faces up to five years in prison.</p><p class="paragraph" style="text-align:left;">🙊 🤖 <b>A Meta AI agent shared a private internal answer without permission</b>, exposing company and user data to unauthorized engineers for two hours. The <a class="link" href="https://techcrunch.com/2026/03/18/meta-is-having-trouble-with-rogue-ai-agents/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">agent also gave bad advice that led to the exposure</a>, and Meta rated it a high-severity incident.</p><p class="paragraph" style="text-align:left;">🤝 <b>Major tech and retail companies, including Google, Meta, Microsoft, Amazon and OpenAI</b>, signed a pact to fight online scams and fraud. They <a class="link" href="https://services.google.com/fh/files/newsletters/industryaccord.pdf?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">agreed</a> to share threat information, strengthen prevention and verification, and help users report scams. They also urged governments to make scam prevention a national priority and improve data sharing and laws.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/b3af34f8-2e05-4449-93f9-fedda5a06a25/image.png?t=1773872145"/><div class="image__source"><span class="image__source_text"><p>Figure: Industry Accord Signatories/Google.com</p></span></div></div><hr class="content_break"><p class="paragraph" style="text-align:left;">🐛 <b>Researchers found several serious AI security flaws</b>: Amazon Bedrock&#39;s sandbox allows DNS-based data exfiltration and remote shells, LangSmith had a token-theft URL injection flaw fixed in v0.12.71, and SGLang contains unpatched pickle deserialization bugs that enable remote code execution. Attackers could <a class="link" href="https://www.beyondtrust.com/blog/entry/pwning-aws-agentcore-code-interpreter?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">use these issues to steal data, take over accounts, or run arbitrary code</a> if services are misconfigured or exposed. Administrators should restrict network access, audit IAM roles, migrate to VPC mode or apply DNS firewalls, and patch or isolate vulnerable deployments.</p><p class="paragraph" style="text-align:left;">🍏 🔄 <b>Apple released its first </b><i><b>background security</b></i><b> update</b> for iPhone, iPad, and Mac to fix a Safari WebKit bug. The <a class="link" href="https://techcrunch.com/2026/03/17/apple-rolls-out-first-background-security-update-for-iphones-ipads-and-macs-to-fix-safari-bug/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">bug could let a malicious website access data</a> from another site in the same browser session. The lightweight update installs quickly and is pushed between major software releases.</p><p class="paragraph" style="text-align:left;">🇨🇳 🦞 <b>Chinese cybersecurity officials warned that </b><i><b>OpenClaw</b></i><b>, the popular open-source AI agent, has weak default security </b>and high system privileges that attackers can exploit. Researchers showed <a class="link" href="https://thehackernews.com/2026/03/openclaw-ai-agent-flaws-could-enable.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">attackers can use indirect prompt injection</a>—like poisoned web pages or link previews—to make the agent leak sensitive data or run malicious commands. Users are urged to tighten network controls, isolate the service, avoid untrusted skills, and keep the agent updated.</p></div><p class="paragraph" style="text-align:left;"></p><div id="vulnerabilities-research-and-threat" class="section" style="background-color:transparent;border-color:#C0C0C0;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🐛 🧠 VULNERABILITIES, RESEARCH, AND THREAT INTELLIGENCE</h3><p class="paragraph" style="text-align:left;">➝ From the Patching Department:</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bleepingcomputer.com/news/security/connectwise-patches-new-flaw-allowing-screenconnect-hijacking/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">ConnectWise patches new flaw allowing ScreenConnect hijacking</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bleepingcomputer.com/news/security/oracle-pushes-emergency-fix-for-critical-identity-manager-rce-flaw/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">Oracle pushes emergency fix for critical Identity Manager RCE flaw</a></p></li></ul><hr class="content_break"><div class="image"><a class="image__link" href="https://defcon.social/@mauvehed/116252427988398306?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" rel="noopener" target="_blank"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/1ef96322-e200-4591-be7f-5adfc2e1da2b/Screenshot_2026-03-18_at_15.22.25.png?t=1773872569"/></a><div class="image__source"><span class="image__source_text"><p>Figure: Screenshot of Mauvehed’s <a class="link" href="https://defcon.social/@mauvehed/116252427988398306?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">Toot</a></p></span></div></div><p class="paragraph" style="text-align:left;">→ <a class="link" href="https://attrition-org.github.io/web-hack-mirror/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">https://attrition-org.github.io/web-hack-mirror</a>/</p><hr class="content_break"><p class="paragraph" style="text-align:left;">🔓️ ☁️ <b>A critical path-traversal bug (CVE-2026-22557) in Ubiquiti’s UniFi Network Application could let attackers take over accounts</b> by accessing files. Ubiquiti released patches and advises users to update; a second fix (CVE-2026-22558) closes a privilege-escalation flaw. About <a class="link" href="https://cyberscoop.com/ubiquiti-unifi-networking-application-vulnerability/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">88,000 UniFi hosts are internet-exposed</a>, many in the U.S., raising urgent risk.</p><p class="paragraph" style="text-align:left;">💥 <b>A critical Langflow vulnerability (CVE-2026-33017) allowed unauthenticated remote code execution</b> via a POST endpoint. Attackers <a class="link" href="https://www.sysdig.com/blog/cve-2026-33017-how-attackers-compromised-langflow-ai-pipelines-in-20-hours?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">began exploiting it roughly 20 hours after public disclosure</a> to steal keys and credentials. Sysdig observed multi-stage attacks from several IPs leading to data exfiltration and possible supply-chain risk.</p><p class="paragraph" style="text-align:left;">📸 🔓️ <b>Researchers found three serious flaws in Xiaomi camera setup protocol </b>that let attackers bypass setup, predict crypto randomness, and trigger a heap overflow. Using these bugs<a class="link" href="https://labs.taszk.io/articles/post/nowyouseemi/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow"> they achieved remote root code execution</a> and built a persistent “cloud jailbreak.” The jailbreak lets attackers control the camera, steal Wi‑Fi credentials, and cut the device off from Xiaomi cloud services.</p><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/Re66rfXbB2s" width="100%"></iframe><hr class="content_break"><p class="paragraph" style="text-align:left;">😬 <b>Cisco has had a recent flood of SD‑WAN and firewall vulnerabilities, and many were already being actively exploited</b> — Attackers, including ransomware group <i>Interlock</i>, used zero‑days and other flaws to <a class="link" href="https://cyberscoop.com/cisco-firewall-sd-wan-vulnerabilities-exploited/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">gain powerful management‑plane access</a>. Researchers warn this shows attackers target network edge systems for broad, long‑lasting control.</p><p class="paragraph" style="text-align:left;">→ <a class="link" href="https://aws.amazon.com/blogs/security/amazon-threat-intelligence-teams-identify-interlock-ransomware-campaign-targeting-enterprise-firewalls/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">Amazon found Interlock ransomware exploiting a critical Cisco firewall flaw and active since Jan 26, 2026, before Cisco disclosed it</a></p><p class="paragraph" style="text-align:left;">🍎 🇷🇺 <b>Researchers found a second iOS exploit kit, called </b><i><b>Darksword</b></i><b>, likely reused by suspected Russian hackers </b>from tools originally made for the U.S. government. <i>Darksword</i> can steal passwords, crypto wallets, messages, and may be used for both money and surveillance, putting up to hundreds of millions of iPhones at risk. The <a class="link" href="https://cyberscoop.com/second-ios-exploit-kit-emerges-from-suspected-russian-hackers-using-possible-u-s-government-developed-tools/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">kit shows use of AI-generated code and poor operational security</a>, and researchers warn a growing secondary exploit market now targets mobile devices.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/7b9e051b-1393-4ee7-a4fb-34906c133cd7/image.png?t=1773875846"/><div class="image__source"><span class="image__source_text"><p>Figure: Timeline of DarkSword observations and vulnerability patches/cloud.google.com</p></span></div></div><p class="paragraph" style="text-align:left;">→ <a class="link" href="https://support.apple.com/en-us/126776?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">Apple Warns Older iPhones Vulnerable to Coruna, DarkSword Exploit Kit Attacks</a></p><hr class="content_break"><p class="paragraph" style="text-align:left;">🐧 <b>A critical buffer-overflow bug in GNU InetUtils telnetd</b> (CVE-2026-32746) <a class="link" href="https://dreamgroup.com/vulnerability-advisory-pre-auth-remote-code-execution-via-buffer-overflow-in-telnetd-linemode-slc-handler/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week#" target="_blank" rel="noopener noreferrer nofollow">lets unauthenticated attackers run code as root </a>via port 23. The flaw is triggered during the initial Telnet handshake and affects versions through 2.7; a fix is expected by April 1, 2026. Until patched, disable Telnet, block port 23, or run telnetd without root to reduce risk.</p><p class="paragraph" style="text-align:left;">🔎 🐛 <b>RondoDox’s operators expanded their exploit list to 174 vulnerabilities and now track disclosures</b> to <a class="link" href="https://www.bitsight.com/blog/rondodox-botnet-infrastructure-analysis?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">strike before CVEs are assigned</a>. They shifted from broad scanning to a more targeted exploitation strategy to increase successful infections. The botnet uses its own infrastructure to deploy evasive implants and mainly focuses on DDoS campaigns rather than mass propagation.</p><hr class="content_break"><blockquote align="center" class="twitter-tweet"><a href="https://twitter.com/nicowaisman/status/2032539305525043686?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week"><p> Twitter tweet </p></a></blockquote></div><p class="paragraph" style="text-align:left;"></p><div id="ics-ot-io-t" class="section" style="background-color:transparent;border-color:#C0C0C0;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🛰️ ICS, OT & IoT</h3><p class="paragraph" style="text-align:left;">🇺🇸 🇨🇦 🇩🇪 <b>U.S., Canadian and German authorities disrupted four large IoT botnets that had infected over three million devices</b> and launched massive DDoS attacks. The botnets—Aisuru, Kimwolf, JackSkid and Mossad—sent hundreds of thousands of attack commands and were used for extortion. Investigators <a class="link" href="https://krebsonsecurity.com/2026/03/feds-disrupt-iot-botnets-behind-huge-ddos-attacks/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">seized servers and domains and targeted alleged operators</a> in coordinated international actions.</p><p class="paragraph" style="text-align:left;">☁️ 🔓️ <b>Researchers found serious security flaws in low-cost IP KVM devices</b> from four manufacturers. These small gadgets let users control machines at the BIOS/UEFI level. If exposed to the Internet, misconfigured, or compromised, they <a class="link" href="https://arstechnica.com/security/2026/03/researchers-disclose-vulnerabilities-in-ip-kvms-from-4-manufacturers/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">can give insiders or hackers</a> wide network access.</p><p class="paragraph" style="text-align:left;">🇵🇱 <b>Poland’s National Centre for Nuclear Research (NCBJ) was targeted in a recent cyberattack that was stopped</b> before any systems were compromised. Officials say <a class="link" href="https://www.securityweek.com/hack-attempt-reported-at-polands-nuclear-research-center/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">early indicators point to Iranian-linked hackers</a>, but they warn the evidence could be misleading. This follows a separate cyber incident on Poland’s power grid two months earlier.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#f0f0f0;border-color:#C0C0C0;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">💬 CONNECT</h3><p class="paragraph" style="text-align:left;">Follow me on <a class="link" href="https://infosec.exchange/@0x58?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">Mastodon</a> for quick daily updates and bite-sized content.</p><p class="paragraph" style="text-align:left;">Prefer using an RSS feed? Add <b>Infosec MASHUP</b> to your feed <a class="link" href="https://rss.beehiiv.com/feeds/HVhiKYpQlR.xml?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">here</a>.</p><p class="paragraph" style="text-align:center;"><b>Enjoying our newsletter? </b>Forward it to a colleague—<br>it’s one of the best ways to support us.</p><p class="paragraph" style="text-align:left;">Thanks for reading today’s newsletter, and if you&#39;re enjoying it and want to support my work, you can <b>buy me a coffee</b> ☕ over at <a class="link" href="https://www.buymeacoffee.com/0x58?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-12-2026-iran-is-everywhere-this-week" target="_blank" rel="noopener noreferrer nofollow">https://www.buymeacoffee.com/0x58</a></p><p class="paragraph" style="text-align:left;"> See you next time!</p><p class="paragraph" style="text-align:left;">-X.</p></div><p class="paragraph" style="text-align:left;"></p><div style="border-top:2px solid #272A2F1A;padding:15px;"><p id="b-af2b58cd-34a4-4913-9ae8-7cfe1c4356e8"><span style="font-variant-numeric:tabular-nums;text-decoration:underline;text-underline-offset:2px;">1</span>&nbsp; </p></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=21c734f4-a9c0-4342-8192-d650d599df89&utm_medium=post_rss&utm_source=x_s_infosec_newsletter">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>🕵🏻‍♂️ [InfoSec MASHUP] 11/2026 - When Bombs Fall, Keyboards Follow</title>
  <description>Plus: FBI hacked, Salt Typhoon goes global, Instagram dropping E2E encryption, and an AI agent hacked McKinsey&#39;s chatbot in two hours</description>
  <link>https://infosec-mashup.santolaria.net/p/infosec-mashup-11-2026-when-bombs-fall-keyboards-follow</link>
  <guid isPermaLink="true">https://infosec-mashup.santolaria.net/p/infosec-mashup-11-2026-when-bombs-fall-keyboards-follow</guid>
  <pubDate>Fri, 13 Mar 2026 20:43:00 +0000</pubDate>
  <atom:published>2026-03-13T20:43:00Z</atom:published>
    <dc:creator>Xavier Santolaria</dc:creator>
    <category><![CDATA[Malware]]></category>
    <category><![CDATA[Opensource]]></category>
    <category><![CDATA[Privacy]]></category>
    <category><![CDATA[Cybersecurity]]></category>
    <category><![CDATA[Threat Intelligence]]></category>
    <category><![CDATA[Ai]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'IBM Plex Sans',-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'IBM Plex Sans',-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><b>The Hacktivist Mirror Problem</b></p><p class="paragraph" style="text-align:left;">When bombs fall, keyboards follow. The <a class="link" href="https://www.ransomlook.io/group/Handala?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow"><b>Handala</b></a> attack on <b>Stryker</b> — <a class="link" href="https://www.zetter-zeroday.com/iranian-hacktivists-strike-medical-device-maker-stryker-in-severe-attack-that-wiped-systems/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">200,000 systems claimed wiped, 50TB stolen</a>, timed explicitly to the US-Israeli assault on Iran — is textbook retaliation hacktivist logic. But here&#39;s the thing nobody wants to say out loud: it barely matters whether the group is genuinely aggrieved civilians or a state front wearing a keffiyeh. The effect is identical. The deniability is the point.</p><p class="paragraph" style="text-align:left;">Governments have learned that a &quot;spontaneous&quot; hacktivist campaign does more reputational work than an official cyberunit ever could — and when the targeting is this clean, &quot;spontaneous&quot; deserves serious scare quotes. We saw it with pro-Russian groups after Ukraine. We saw it with pro-Palestinian groups after Gaza. We&#39;re seeing it again now with Iran. The pattern is consistent enough to be a doctrine at this point.</p><p class="paragraph" style="text-align:left;">What makes it strategically interesting — and analytically treacherous — is the deliberate ambiguity it manufactures. A group claiming to represent bombed civilians carries far more narrative weight than one that&#39;s transparently state-linked. Attribution becomes a second-order problem: even if the group is genuinely independent, states benefit from the chaos and quietly let it run. Sometimes they seed it. Sometimes they just watch. The outcome for the victim is the same either way.</p><p class="paragraph" style="text-align:left;">The targeting logic follows a reliable playbook too. Not purely military or intelligence targets — those carry too much legal and escalatory risk. Instead: corporations with visible ties to the aggressor country, ideally ones with symbolic weight or defense adjacency. <b>Stryker</b>, with its $450M U.S. military contract and the same name as an Army armored carrier, checked every box. The selection wasn&#39;t random. It was a message dressed as an attack.</p><p class="paragraph" style="text-align:left;">For defenders, none of this is new — but the tempo is accelerating. Geopolitical flashpoints are now predictable threat amplifiers with a measurable lag between event and campaign. Your company&#39;s government contracts, your country of incorporation, your defense-adjacent partnerships — these are part of your attack surface whether you&#39;ve modelled them that way or not. The groups carrying the flag may be real, fake, or somewhere in the uncomfortable middle. It doesn&#39;t matter. The wiper doesn&#39;t care about the ideology behind it.</p><p class="paragraph" style="text-align:left;">Let’s now dive into this week’s top insights! 🚀</p><h2 class="heading" style="text-align:left;">Table of Contents</h2><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="#breaches-security-incidents" rel="noopener noreferrer nofollow">BREACHES & SECURITY INCIDENTS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#cybercrime-cyber-espionage-ap-ts" rel="noopener noreferrer nofollow">CYBERCRIME, CYBER ESPIONAGE, APT’s</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#government-politics-and-privacy" rel="noopener noreferrer nofollow">GOVERNMENT, POLITICS, AND PRIVACY</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#malware-threats" rel="noopener noreferrer nofollow">MALWARE & THREATS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#ai-crypto-tech-tools" rel="noopener noreferrer nofollow">AI, CRYPTO, TECH & TOOLS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#vulnerabilities-research-and-threat" rel="noopener noreferrer nofollow">VULNERABILITIES, RESEARCH, AND THREAT INTELLIGENCE</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#ics-ot-io-t" rel="noopener noreferrer nofollow">ICS, OT & IoT</a></p></li></ul><div id="breaches-security-incidents" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🔓 BREACHES & SECURITY INCIDENTS</h3><p class="paragraph" style="text-align:left;">🇬🇧 🏦 🙊 <b>A technical glitch at Lloyds Banking Group let some Lloyds, Halifax and Bank of Scotland app users see other customers&#39; transactions</b> and personal details. The bank says the <a class="link" href="https://www.bbc.com/news/articles/c4g23npxpwgo?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">error was fixed quickly and apologised</a>, while regulators are investigating. Customers reported seeing accounts, payments and even National Insurance numbers that were not theirs.</p><p class="paragraph" style="text-align:left;">🇮🇱 🚉 🇮🇷 <b>A cyberattack hacked advertising screens at Herzliya and Tel Aviv Hashalom stations</b> and <a class="link" href="https://www.calcalistech.com/ctechnews/article/rkuy5flcbx?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">showed fake Iranian missile alerts</a>. Authorities say the signs were from a private network, not connected to railway infrastructure, and were taken offline. National cybersecurity teams are investigating while Israel Railways works to restore and expand service.</p><p class="paragraph" style="text-align:left;">🇮🇷 🇺🇸 <i><b>Stryker</b></i><b>, a major medical device maker, suffered a severe global cyberattack that shut down many systems</b> and wiped devices. An <a class="link" href="https://www.zetter-zeroday.com/iranian-hacktivists-strike-medical-device-maker-stryker-in-severe-attack-that-wiped-systems/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">Iranian hacktivist group called </a><i><a class="link" href="https://www.zetter-zeroday.com/iranian-hacktivists-strike-medical-device-maker-stryker-in-severe-attack-that-wiped-systems/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">Handala</a></i><a class="link" href="https://www.zetter-zeroday.com/iranian-hacktivists-strike-medical-device-maker-stryker-in-severe-attack-that-wiped-systems/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow"> claimed credit</a> and said they erased servers and stole data. The company is working to restore operations while investigating the incident.</p><p class="paragraph" style="text-align:left;">🛞 <b>Tire maker </b><i><b>Michelin</b></i><b> confirmed it was hit in the large Oracle E-Business Suite (EBS) cyberattack</b> tied to the <i>Cl0p</i> group. Investigators found an EBS zero-day was exploited and some files were accessed, but <a class="link" href="https://www.securityweek.com/michelin-confirms-data-breach-linked-to-oracle-ebs-attack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow"><i>Michelin</i></a><a class="link" href="https://www.securityweek.com/michelin-confirms-data-breach-linked-to-oracle-ebs-attack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow"> says only a small, non-sensitive data set was affected</a> and no ransomware was used. The attackers have posted hundreds of gigabytes of alleged Michelin data online.</p><p class="paragraph" style="text-align:left;">🤖 <b>Researchers at CodeWall used an autonomous AI agent to hack McKinsey’s internal chatbot</b>, <i>Lilli</i>, and gained full read-write access in about two hours. The agent exploited exposed API endpoints and an SQL injection to access millions of messages, files, user accounts, and writable system prompts. McKinsey <a class="link" href="https://www.theregister.com/2026/03/09/mckinsey_ai_chatbot_hacked/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">patched the issues quickly</a>, but the incident shows agentic AI can enable fast, automated cyberattacks.</p><div class="embed"><a class="embed__url" href="https://codewall.ai/blog/how-we-hacked-mckinseys-ai-platform?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank"><div class="embed__content"><p class="embed__title"> How We Hacked McKinsey&#39;s AI Platform </p><p class="embed__description"> An autonomous AI agent found a SQL injection in McKinsey&#39;s Lilli AI platform. What it extracted was worse than we expected. </p><p class="embed__link"> codewall.ai/blog/how-we-hacked-mckinseys-ai-platform </p></div><img class="embed__image embed__image--right" src="https://codewall.ai/images/mckinsey-og.png"/></a></div><p class="paragraph" style="text-align:left;">🇺🇸 <b>Ericsson Inc. says a service provider was hacked</b> and some employee and customer data was stolen. The <a class="link" href="https://www.bleepingcomputer.com/news/security/ericsson-us-discloses-data-breach-after-service-provider-hack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">provider found the breach in April 2025</a> and finished an investigation in February 2026. Affected people are being offered free identity protection and compensation coverage.</p><p class="paragraph" style="text-align:left;">🇨🇳 <i><b>Salt Typhoon</b></i><b>, a China-linked hacking group, has breached dozens of major phone and internet companies</b> worldwide. They stole call logs, texts, and audio from senior officials and compromised telecom infrastructure. Officials say the <a class="link" href="https://techcrunch.com/2026/03/09/salt-typhoon-china-who-has-been-hacked-global-telecom-giants/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">campaign spans the Americas, Europe, Asia, Africa, and Oceania</a> and risks serious national security harm.</p><p class="paragraph" style="text-align:left;">→ <a class="link" href="https://cyberscoop.com/salt-typhoon-china-telecom-hack-impact-new-jersey/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">Officials worry Salt Typhoon apathy is killing momentum for tougher telecom security rules</a></p><p class="paragraph" style="text-align:left;">☁️ <b>Hackers from the </b><i><b>ShinyHunters</b></i><b> group claim they have been stealing data from misconfigured Salesforce Experience Cloud sites</b> by abusing the <code>/s/sfsites/aura</code> API. Salesforce says the issue is due to customer guest-user settings, not a platform vulnerability, and advises auditing guest permissions and disabling API access for guests. <i>ShinyHunters</i> says they found ways to bypass record limits and urges disabling public access, which would remove guest access entirely.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/e7a92ded-9e1c-4116-81f5-33fdd83f9042/image.png?t=1773145844"/><div class="image__source"><span class="image__source_text"><p>Figure: <i>ShinyHunters</i> Salesforce Aura campaign/BleepingComputer</p></span></div></div><p class="paragraph" style="text-align:left;">→ More:</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/238000-impacted-by-bell-ambulance-data-breach/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">238,000 Impacted by Bell Ambulance Data Breach</a> 🇺🇸 </p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bleepingcomputer.com/news/security/telus-digital-confirms-breach-after-hacker-claims-1-petabyte-data-theft/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">Telus Digital confirms breach after hacker claims 1 petabyte data theft</a> 🇺🇸 </p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bleepingcomputer.com/news/security/england-hockey-investigating-ransomware-data-breach/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">England Hockey investigating ransomware data breach</a> 🏑 🇬🇧 </p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bleepingcomputer.com/news/security/canadian-retail-giant-loblaw-notifies-customers-of-data-breach/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">Canadian retail giant Loblaw notifies customers of data breach</a> 🇨🇦 </p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bleepingcomputer.com/news/security/starbucks-discloses-data-breach-affecting-hundreds-of-employees/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">Starbucks discloses data breach affecting hundreds of employees</a> ☕️</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bleepingcomputer.com/news/security/polands-nuclear-research-centre-targeted-by-cyberattack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">Poland&#39;s nuclear research centre targeted by cyberattack </a>🇵🇱 </p></li></ul></div><p class="paragraph" style="text-align:left;"></p><div id="cybercrime-cyber-espionage-ap-ts" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🥷🏻 CYBERCRIME, CYBER ESPIONAGE, APT’s</h3><p class="paragraph" style="text-align:left;">❌ <b>Interpol-led </b><i><b>Operation Synergia III</b></i><b> sinkholed tens of thousands of IP addresses and seized servers</b> tied to global cybercrime. Authorities in 72 countries made 94 arrests, seized 212 devices, and are still investigating 110 more suspects. Investigations <a class="link" href="https://www.interpol.int/News-and-Events/News/2026/45-000-malicious-IP-addresses-taken-down-in-international-cyber-operation?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">also found over 33,000 phishing sites</a> and large fraud rings in Togo and Bangladesh.</p><p class="paragraph" style="text-align:left;">❌ <b>Law enforcement from many countries dismantled </b><i><b>SocksEscort</b></i><b>, a global proxy network used for large-scale fraud</b> — The <a class="link" href="https://www.justice.gov/usao-edca/pr/authorities-dismantle-global-malicious-proxy-service-deployed-malware-and-defrauded?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">botnet hijacked hundreds of thousands of routers and IoT devices</a> and took in millions of dollars. Authorities seized domains, servers, and cryptocurrency to disrupt the operation.</p><p class="paragraph" style="text-align:left;">🇺🇸 ⚖️ <b>The U.S. charged former DigitalMint employee Angelo Martino for secretly helping BlackCat ransomware operators</b> and sharing negotiation details. He and accomplices allegedly <a class="link" href="https://www.bleepingcomputer.com/news/security/us-charges-another-ransomware-negotiator-linked-to-blackcat-attacks/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">ran attacks on many U.S. organizations</a> and took ransoms, sometimes paying BlackCat a cut. DigitalMint fired the employees and says it cooperated with law enforcement.</p><p class="paragraph" style="text-align:left;">🇺🇸 <b>A foreign hacker broke into the FBI’s New York field office in 2023 and accessed files about Jeffrey Epstein</b> — The breach exploited a vulnerable server at the Child Exploitation Forensic Lab. The <a class="link" href="https://techcrunch.com/2026/03/11/hacker-broke-into-fbi-and-compromised-epstein-files-report-says/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">FBI says it contained the incident</a> and stopped the hacker’s access.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#f0f0f0;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🗓️ <b><a class="link" href="https://xsa.github.io/infosec-events/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">{Cyber,Info}Sec Events</a></b> — A community-maintained list of infosec conferences worldwide. Subscribe to the <a class="link" href="https://xsa.github.io/infosec-events/events.ics?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">ICS calendar feed</a> to get events straight into your calendar, or follow <a class="link" href="https://infosec.exchange/@infosecevents?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">@infosecevents@infosec.exchange</a> on Mastodon for weekly digests. Contributions and ⭐ welcome!</p></div><p class="paragraph" style="text-align:left;"></p><div id="government-politics-and-privacy" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">👨🏻‍⚖️ 👀 GOVERNMENT, POLITICS, AND PRIVACY</h3><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/MOw8YwB1HRE" width="100%"></iframe><hr class="content_break"><p class="paragraph" style="text-align:left;">🇫🇮 🇷🇺 🇨🇳 <b>Finland’s 2026 security report warns that Russia and China are actively using cyber espionage against Finnish government</b>, companies, and critical infrastructure. Both countries exploit supply chains, cloud services, and poorly protected consumer devices to steal information and hide their tracks. These operations <a class="link" href="https://industrialcyber.co/reports/finlands-national-security-overview-2026-flags-russian-and-chinese-cyber-espionage-targeting-government-critical-infrastructure/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">raise risks for national security</a>, influence campaigns, and Western dependence on Chinese technology.</p><p class="paragraph" style="text-align:left;">🇺🇸 🇷🇺 🇨🇳 📲 <b>Researchers say a powerful iPhone-hacking toolkit called </b><i><b>Coruna</b></i><b> was likely built by L3Harris’s Trenchant unit</b> and sold to U.S. government customers. The tools leaked, were traded by brokers, <a class="link" href="https://techcrunch.com/2026/03/10/us-military-contractor-likely-built-iphone-hacking-tools-used-by-russian-spies-in-ukraine/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">and ended up used by Russian spies in Ukraine</a> and by Chinese cybercriminals. The case links stolen contractor tools and a former employee who sold exploits to outside parties.</p><p class="paragraph" style="text-align:left;">🇪🇺 🎣 <b>An EU court adviser says banks must immediately refund customers for unauthorised transactions</b> unless they have good reason to suspect customer fraud. The <a class="link" href="https://curia.europa.eu/site/upload/docs/application/pdf/2026-03/cp260031en.pdf?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">opinion came from a case about a phishing attack</a> where a customer’s login was stolen and the bank refused a refund. Banks can later try to recover money if they prove the customer acted with intent or gross negligence.</p></div><p class="paragraph" style="text-align:left;"></p><div id="malware-threats" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🦠 MALWARE & THREATS</h3><div class="embed"><a class="embed__url" href="https://unit42.paloaltonetworks.com/cl-unk-1068-targets-critical-sectors/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank"><div class="embed__content"><p class="embed__title"> An Investigation Into Years of Undetected Operations Targeting High-Value Sectors </p><p class="embed__description"> In-depth analysis of threat activity we call CL-UNK-1068. We discuss their toolset, including tunneling, reconnaissance and credential theft. </p><p class="embed__link"> unit42.paloaltonetworks.com/cl-unk-1068-targets-critical-sectors </p></div><img class="embed__image embed__image--right" src="https://unit42.paloaltonetworks.com/wp-content/uploads/2026/03/04_Malware_Category_1920x900.jpg"/></a></div><p class="paragraph" style="text-align:left;">🔎 🎮️ <b>The FBI is investigating a hacker who hid malware inside several games</b> on Steam. The <a class="link" href="https://techcrunch.com/2026/03/13/valve-steam-malware-games-fbi/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">suspected titles include BlockBlasters, Chemia, Dashverse/DashFPS, Lampy, Lunara, PirateFi, and Tokenova</a>. Steam has removed similar malware-laced games before, but some users may have been infected.</p><p class="paragraph" style="text-align:left;">🔙 🚪 <b>Researchers found a new backdoor called </b><i><b>Slopoly</b></i><b>, likely generated with AI</b>, used in an Interlock ransomware attack to steal data. Slopoly is a simple PowerShell client that beacons to a C2 server, runs commands, and keeps persistence. IBM X-Force <a class="link" href="https://www.ibm.com/think/x-force/slopoly-start-ai-enhanced-ransomware-attacks?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">links the attack to a financially motivated group known as </a><i><a class="link" href="https://www.ibm.com/think/x-force/slopoly-start-ai-enhanced-ransomware-attacks?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">Hive0163</a></i> and says AI tools are speeding custom malware development.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/91d5f1a7-5f7a-464b-8b0f-c3f0558935ca/image.png?t=1773396775"/><div class="image__source"><span class="image__source_text"><p>Figure: simplified infection chain/ibm.com</p></span></div></div><p class="paragraph" style="text-align:left;">🥷 <b>The </b><i><b>PhantomRaven</b></i><b> campaign pushed dozens of malicious npm packages that steal developer data</b> by using remote dependencies to bypass scans. <a class="link" href="https://www.endorlabs.com/learn/return-of-phantomraven?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">Endor Labs found 88 new packages</a> across disposable accounts, with most still live and sending harvested credentials and system info to attacker servers. Developers should only use trusted packages and avoid copy-pasting unvetted code or AI suggestions.</p><p class="paragraph" style="text-align:left;">🎣 🎅 <b>A phishing campaign tricks victims into mounting a malicious ISO that looks like a resume</b> and runs hidden PowerShell to load malware. The malware side‑loads a tampered DLL, contacts C2, and injects <i>BlackSanta</i>. <i>BlackSanta</i> <a class="link" href="https://www.aryaka.com/docs/reports/blacksanta-edr-killer-threat-report.pdf?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">kills antivirus and EDR at the kernel level</a> to enable credential theft and data exfiltration.</p><p class="paragraph" style="text-align:left;"><b>🛜 Researchers found </b><i><b>KadNap</b></i><b> malware has infected over 14,000 edge devices</b>, mainly Asus routers, to build a stealthy proxy botnet. It uses a <a class="link" href="https://blog.lumen.com/silence-of-the-hops-the-kadnap-botnet/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">peer-to-peer Kademlia DHT to hide its control infrastructure</a> and resist takedowns. Users are urged to update, reboot, change default passwords, and replace unsupported routers.</p><p class="paragraph" style="text-align:left;">🦞 🎠 <b>Researchers found a malicious npm package named </b><code>@openclaw-ai/openclawai</code><b> that pretended to be an OpenClaw installer</b> but installs a RAT called GhostLoader. It tricks users with a fake CLI and Keychain prompt, then steals macOS credentials, browser data, crypto wallets, SSH keys, iMessage/Notes, and more. The <a class="link" href="https://research.jfrog.com/post/ghostclaw-unmasked/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">malware persists, monitors the system, clones authenticated browser sessions, and exfiltrates data</a> to a C2 server and other channels.</p><p class="paragraph" style="text-align:left;">🔙 🚪 <b>Hackers used Microsoft Teams to social-engineer employees at financial and healthcare organizations</b> into starting Quick Assist remote sessions. They <a class="link" href="https://www.bluevoyant.com/blog/new-a0backdoor-linked-to-teams-impersonation-and-quick-assist-social-engineering?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">installed signed MSI files and sideloaded a malicious DLL</a> that decrypts and runs the <i>A0Backdoor</i> malware. <i>A0Backdoor</i> hides C2 traffic in DNS MX queries to steal host data and receive commands.</p><p class="paragraph" style="text-align:left;">🇷🇺 💬 <b>Russian state hackers are running a global campaign to hijack Signal and WhatsApp accounts of officials</b>, military staff, journalists and others. They trick users into giving verification codes or abuse linked-device features to take over accounts and read messages. <a class="link" href="https://english.aivd.nl/latest/news/2026/03/09/russia-targets-signal-and-whatsapp-accounts-in-cyber-campaign?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">Dutch intelligence warns not to use these apps for sensitive information</a> and gives steps to spot and remove compromised accounts.</p><p class="paragraph" style="text-align:left;">🧩 <b>Two Chrome extensions became malicious after ownership changed</b>, allowing attackers to inject code, <a class="link" href="https://monxresearch-sec.github.io/shotbird-extension-malware-report/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">push malware</a>, and steal browser and device data. The plugins delivered runtime JavaScript from a remote server to execute hidden payloads and trick users into running a Windows executable. Users should remove these extensions and avoid unverified browser add-ons.</p><p class="paragraph" style="text-align:left;">→ More:</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://zimperium.com/blog/pixrevolution-the-agent-operated-android-trojan-hijacking-brazils-pix-payments-in-real-time?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">PixRevolution: The Agent-Operated Android Trojan Hijacking Brazil’s PIX Payments in Real Time</a> 🇧🇷 </p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://zenox.ai/en/venon-the-first-brazilian-banker-rat-in-rust/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">VENON: The First Brazilian Banker RAT in Rust</a> 🇧🇷 🏦 </p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://securelist.com/beatbanker-miner-and-banker/119121/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">BeatBanker: A dual‑mode Android Trojan</a> 🏦 </p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bleepingcomputer.com/news/security/new-zombie-zip-technique-lets-malware-slip-past-security-tools/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">New &#39;Zombie ZIP&#39; technique lets malware slip past security tools</a> 🦴 </p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.microsoft.com/en-us/security/blog/2026/03/12/storm-2561-uses-seo-poisoning-to-distribute-fake-vpn-clients-for-credential-theft/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">Storm-2561 uses SEO poisoning to distribute fake VPN clients for credential theft</a> 🔐 </p></li></ul></div><p class="paragraph" style="text-align:left;"></p><div id="ai-crypto-tech-tools" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🤖 🧰 AI, CRYPTO, TECH & TOOLS</h3><div class="embed"><a class="embed__url" href="https://aembit.io/blog/mcp-servers-and-the-return-of-the-service-account-problem/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank"><div class="embed__content"><p class="embed__title"> MCP Servers and the Return of the Service Account Problem </p><p class="embed__description"> Agentic AI is turning MCP servers into persistent access brokers, reviving the service account problem and expanding the access surface enterprises struggle to control. </p><p class="embed__link"> aembit.io/blog/mcp-servers-and-the-return-of-the-service-account-problem </p></div><img class="embed__image embed__image--right" src="https://aembit.io/wp-content/uploads/2026/03/MCP-Servers-and-the-Return-of-the-Service-Account-Problem.jpg"/></a></div><p class="paragraph" style="text-align:left;">🎣 ⏱️ <b>Researchers showed they could trick Perplexity&#39;s Comet AI browser into a phishing scam in under four minutes</b> by feeding back the browser&#39;s own reasoning to a GAN. The <a class="link" href="https://guard.io/labs/agenticblabbering---how-ai-browsers-verbose-reasoning-fuels-the-ultimate-scamming-machine?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">attack trains a fake page until the AI stops flagging it</a>, shifting the target from users to the AI agent. Experts warn prompt injection and agentic &quot;blabbering&quot; make such attacks hard to fully eliminate.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/910df40e-e7c1-4b9d-b12b-70d868b69b48/image.png?t=1773304972"/></div><p class="paragraph" style="text-align:left;">🤝 🤑 <b>OpenAI is acquiring AI security startup </b><i><b>Promptfoo</b></i> to boost its safety tools. <i>Promptfoo</i> makes a <a class="link" href="https://www.securityweek.com/openai-to-acquire-ai-security-startup-promptfoo/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">platform that tests LLMs for attack</a>s like prompt injections and data leaks. OpenAI will add these features to its Frontier platform and keep improving <i>Promptfoo</i>’s open-source tools.</p><p class="paragraph" style="text-align:left;">🤯 🔓️ 💬 <b>Instagram ending support for end-to-end encrypted messaging</b> after 8 May 2026 - <a class="link" href="https://help.instagram.com/491565145294150?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">https://help.instagram.com/491565145294150</a></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/b31f3868-c37d-46d0-a8a8-4b3b8c46714d/image.png?t=1773405785"/><div class="image__source"><span class="image__source_text"><p>Figure: Instagram warning pop-up about the end of support of end-to-end encrypted messaging/<a class="link" href="https://hachyderm.io/@pheonix/116221805295722939?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">https://hachyderm.io/@pheonix/116221805295722939</a></p></span></div></div><p class="paragraph" style="text-align:left;">📺️ 🥸 <b>YouTube is expanding its AI deepfake detection to a pilot group</b> of <a class="link" href="https://techcrunch.com/2026/03/10/youtube-ai-deepfake-detection-politicians-government-officials-journalists/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">politicians, government officials, and journalists</a>. Eligible users can verify their identity, see detected AI-generated likenesses, and request removal under YouTube policies. The company aims to balance preventing harmful impersonation with protecting free expression and plans broader rollout.</p><p class="paragraph" style="text-align:left;">🦞 <b>How AI Assistants are Moving the Security Goalposts</b> — AI assistants that act autonomously on users&#39; computers are becoming popular and powerful. They blur lines between data and code and <a class="link" href="https://krebsonsecurity.com/2026/03/how-ai-assistants-are-moving-the-security-goalposts/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">create big new security risks</a> like credential exposure, prompt-injection, and automated attacks.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/d7de475b-45a1-48e5-9a3b-447feca71342/image.png?t=1773151892"/><div class="image__source"><span class="image__source_text"><p>Figure: The lethal trifecta/<a class="link" href="https://krebsonsecurity.com?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">krebsonsecurity.com</a></p></span></div></div><hr class="content_break"><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/vEFPPaOn0ts" width="100%"></iframe></div><p class="paragraph" style="text-align:left;"></p><div id="vulnerabilities-research-and-threat" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🐛 🧠 VULNERABILITIES, RESEARCH, AND THREAT INTELLIGENCE</h3><p class="paragraph" style="text-align:left;">➝ From the Patching Department:</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/adobe-patches-80-vulnerabilities-across-eight-products/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">Adobe Patches 80 Vulnerabilities Across Eight Products</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://thehackernews.com/2026/03/apple-issues-security-updates-for-older.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">Apple Issues Security Updates for Older iOS Devices Targeted by Coruna WebKit Exploit</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/chrome-146-update-patches-two-exploited-zero-days/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">Chrome 146 Update Patches Two Exploited Zero-Days</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/cisco-patches-high-severity-ios-xr-vulnerabilities-2/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">Cisco Patches High-Severity IOS XR Vulnerabilities</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/microsoft-patches-83-vulnerabilities/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">Microsoft Patches 83 Vulnerabilities</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/securing-devices-faster-with-hotpatch-updates-on-by-default/4500066?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">Microsoft to enable Windows hotpatch security updates by default</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bleepingcomputer.com/news/security/cisa-recently-patched-ivanti-epm-flaw-now-actively-exploited/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">CISA: Recently patched Ivanti EPM flaw now actively exploited</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/sap-patches-critical-fs-quo-netweaver-vulnerabilities/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">SAP Patches Critical FS-QUO, NetWeaver Vulnerabilities</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/splunk-zoom-patch-severe-vulnerabilities/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">Splunk, Zoom Patch Severe Vulnerabilities</a></p></li></ul><hr class="content_break"><p class="paragraph" style="text-align:left;">💰️ 🐛 <b>Google paid over $17 million in 2025 to 747 security researchers</b> through its Vulnerability Reward Program. This was a record amount and a <a class="link" href="https://bughunters.google.com/blog/google-vrps-in-review-2025?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">more than 40% increase from 2024</a>. Google also expanded AI and open-source reward programs and paid millions across Android, Chrome, and Cloud programs.</p><p class="paragraph" style="text-align:left;">🐛 <b>A critical vulnerability (CVE-2026-29000) in the </b><i><b>pac4j</b></i><b> Java security library lets attackers bypass authentication </b>using public RSA keys. The <a class="link" href="https://cyberscoop.com/pac4j-open-source-library-vulnerability-max-severity-risk/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">flaw affects many frameworks and is easy to exploit</a> with a public proof-of-concept. Patches were released quickly, but downstream projects and users remain at risk until they update.</p><p class="paragraph" style="text-align:left;">🧩 <b>An SQL injection flaw in the Elementor Ally plugin (CVE-2026-2313) lets unauthenticated attackers steal data</b> by injecting SQL via a URL parameter. Elementor patched it in version 4.1.0, but <a class="link" href="https://www.wordfence.com/blog/2026/03/400000-wordpress-sites-affected-by-unauthenticated-sql-injection-vulnerability-in-ally-wordpress-plugin/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">only ~36% of sites updated, leaving 250,000+ sites vulnerable</a>. Site owners should update Ally and WordPress immediately.</p><p class="paragraph" style="text-align:left;">🐛 <b>Researchers found critical bugs in the </b><i><b>n8n</b></i><b> workflow platform</b> that could let <a class="link" href="https://www.pillar.security/blog/zero-click-unauthenticated-rce-in-n8n-a-contact-form-that-executes-shell-commands?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">attackers run commands and expose stored credentials</a>. One bug lets public form inputs execute code, and another lets authenticated users escape the expression sandbox. <i>n8n</i> patched the issues and urges updates or temporary restrictions on node use and workflow permissions.</p></div><p class="paragraph" style="text-align:left;"></p><div id="ics-ot-io-t" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🛰️ ICS, OT & IoT</h3><div class="embed"><a class="embed__url" href="https://www.csoonline.com/article/4142548/the-ot-security-time-bomb-why-legacy-industrial-systems-are-the-biggest-cyber-risk-nobody-wants-to-fix.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank"><div class="embed__content"><p class="embed__title"> The OT security time bomb: Why legacy industrial systems are the biggest cyber risk nobody wants to fix </p><p class="embed__description"> We’re running million-dollar production lines on ancient software because no one wants to risk a shutdown, but ignoring that &quot;time bomb&quot; is becoming way too risky. </p><p class="embed__link"> www.csoonline.com/article/4142548/the-ot-security-time-bomb-why-legacy-industrial-systems-are-the-biggest-cyber-risk-nobody-wants-to-fix.html </p></div><img class="embed__image embed__image--right" src="https://www.csoonline.com/wp-content/uploads/2026/03/4142548-0-48210900-1773136986-shutterstock_1951501180-100962448-orig.jpg?quality=50&strip=all&w=1024"/></a></div><p class="paragraph" style="text-align:left;">🩹 <b>ICS Patch Tuesday</b> — Major ICS vendors — Siemens, Schneider Electric, Mitsubishi Electric, and Moxa — <a class="link" href="https://www.securityweek.com/ics-patch-tuesday-vulnerabilities-fixed-by-siemens-schneider-moxa-mitsubishi-electric/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">released Patch Tuesday advisories</a> fixing multiple vulnerabilities in industrial products. Issues range from critical remote code execution, stored XSS, and hardcoded credentials to DoS and third-party component flaws. CISA and Germany’s VDE-CERT also published advisories for affected ICS and building controllers, some allowing remote full compromise.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#f0f0f0;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">💬 CONNECT</h3><p class="paragraph" style="text-align:left;">Follow me on <a class="link" href="https://infosec.exchange/@0x58?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">Mastodon</a> for quick daily updates and bite-sized content.</p><p class="paragraph" style="text-align:left;">Prefer using an RSS feed? Add <b>Infosec MASHUP</b> to your feed <a class="link" href="https://rss.beehiiv.com/feeds/HVhiKYpQlR.xml?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">here</a>.</p><p class="paragraph" style="text-align:center;"><b>Enjoying our newsletter? </b>Forward it to a colleague—<br>it’s one of the best ways to support us.</p><p class="paragraph" style="text-align:left;">Thanks for reading today’s newsletter, and if you&#39;re enjoying it and want to support my work, you can <b>buy me a coffee</b> ☕ over at <a class="link" href="https://www.buymeacoffee.com/0x58?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-11-2026-when-bombs-fall-keyboards-follow" target="_blank" rel="noopener noreferrer nofollow">https://www.buymeacoffee.com/0x58</a></p><p class="paragraph" style="text-align:left;"> See you next time!</p><p class="paragraph" style="text-align:left;">-X.</p></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=7b9a58d4-5530-412d-a950-b195ec38eb13&utm_medium=post_rss&utm_source=x_s_infosec_newsletter">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>🕵🏻‍♂️ [InfoSec MASHUP] 10/2026 - They don&#39;t need new malware. They just need the news.</title>
  <description>Plus: Quantum threatens RSA-2048, 38M Canadian Tire accounts, and Europol kills a phishing factory.</description>
  <link>https://infosec-mashup.santolaria.net/p/infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news</link>
  <guid isPermaLink="true">https://infosec-mashup.santolaria.net/p/infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news</guid>
  <pubDate>Sat, 07 Mar 2026 13:40:06 +0000</pubDate>
  <atom:published>2026-03-07T13:40:06Z</atom:published>
    <dc:creator>Xavier Santolaria</dc:creator>
    <category><![CDATA[Malware]]></category>
    <category><![CDATA[Opensource]]></category>
    <category><![CDATA[Privacy]]></category>
    <category><![CDATA[Cybersecurity]]></category>
    <category><![CDATA[Threat Intelligence]]></category>
    <category><![CDATA[Ai]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'IBM Plex Sans',-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'IBM Plex Sans',-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">🖤<b> RIP FX (Felix Lindner)</b></p><p class="paragraph" style="text-align:left;">The infosec community lost one of its own this week. FX, founder of <i>Phenoelit</i> and a towering figure of the old-school hacker scene, has passed away. His work on Cisco IOS, port knocking, and decades of research shaped the field in ways that are hard to fully quantify. The <a class="link" href="https://x.com/dalmoz_/status/890400809682423808?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">2017 Pwnie Lifetime Achievement Award</a> barely scratched the surface of his impact.</p><p class="paragraph" style="text-align:left;">I didn&#39;t know him personally, but his influence was hard to miss. Rest in peace, FX. 🖤</p><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/IZYQILfxHiw" width="100%"></iframe><hr class="content_break"><p class="paragraph" style="text-align:left;">War makes excellent phishing bait. It always has. As strikes on Iran dominate headlines, expect threat actors — state-sponsored and opportunistic alike — to flood inboxes with lures dressed up as breaking news, humanitarian appeals, leaked documents, and &quot;exclusive footage.&quot; APT groups don&#39;t need a new playbook; they just need a news cycle. Stay skeptical of anything urgent, emotional, or too perfectly timed. The best OPSEC this week is the same as any other week: think before you click.</p><p class="paragraph" style="text-align:left;">Let’s now dive into this week’s top insights! 🚀</p><h2 class="heading" style="text-align:left;">Table of Contents</h2><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="#breaches-security-incidents" rel="noopener noreferrer nofollow">BREACHES & SECURITY INCIDENTS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#cybercrime-cyber-espionage-ap-ts" rel="noopener noreferrer nofollow">CYBERCRIME, CYBER ESPIONAGE, APT’s</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#government-politics-and-privacy" rel="noopener noreferrer nofollow">GOVERNMENT, POLITICS, AND PRIVACY</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#malware-threats" rel="noopener noreferrer nofollow">MALWARE & THREATS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#ai-crypto-tech-tools" rel="noopener noreferrer nofollow">AI, CRYPTO, TECH & TOOLS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#vulnerabilities-research-and-threat" rel="noopener noreferrer nofollow">VULNERABILITIES, RESEARCH, AND THREAT INTELLIGENCE</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#ics-ot-io-t" rel="noopener noreferrer nofollow">ICS, OT & IoT</a></p></li></ul><div id="breaches-security-incidents" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🔓 BREACHES & SECURITY INCIDENTS</h3><p class="paragraph" style="text-align:left;">🇺🇸 🩺 <b>Health tech company </b><i><b>TriZetto</b></i><b> says hackers stole personal and health data</b> for <a class="link" href="https://techcrunch.com/2026/03/06/trizetto-confirms-3-4m-peoples-health-and-personal-data-was-stolen-during-breach/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">more than 3.4 million people</a>. The breach began in November 2024 but went undetected until October 2025. Some providers and patients across the U.S. have been confirmed affected.</p><p class="paragraph" style="text-align:left;">🇳🇱 🇺🇸 <b>Dutch paint giant </b><i><b>AkzoNobel</b></i><b> says hackers breached</b> the network of one U.S. site. The <a class="link" href="https://www.bleepingcomputer.com/news/security/paint-maker-giant-akzonobel-confirms-cyberattack-on-us-site/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow"><i>Anubis</i></a><a class="link" href="https://www.bleepingcomputer.com/news/security/paint-maker-giant-akzonobel-confirms-cyberattack-on-us-site/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow"> ransomware gang claims to have stolen 170GB</a> and leaked samples of confidential files. <i>AkzoNobel</i> says the incident is contained, impact is limited, and it is supporting affected parties.</p><p class="paragraph" style="text-align:left;">🇺🇸 <b>LexisNexis confirmed hackers breached its servers and stole files</b>, which were later leaked by a group called <i>FulcrumSec</i>. The company <a class="link" href="https://www.bleepingcomputer.com/news/security/lexisnexis-confirms-data-breach-as-hackers-leak-stolen-files/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">says the data was mostly legacy</a>, non-sensitive customer and business information from before 2020. LexisNexis has notified law enforcement, hired outside experts, and says the intrusion is contained.</p><p class="paragraph" style="text-align:left;">🕹️ <i><b>Cloud Imperium Games</b></i><b> says attackers accessed backup systems in January</b> and saw some users&#39; basic account information. The company reports no passwords, payment data, or signs the data was leaked. CIG is <a class="link" href="https://www.bleepingcomputer.com/news/security/star-citizen-game-dev-discloses-breach-affecting-user-data/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">monitoring the situation </a>and warns the exposed details could be used for phishing.</p><p class="paragraph" style="text-align:left;">🇺🇸 <b><i>Madison Square Garden</i></b><b> confirmed a data breach tied to the </b><i><b>Cl0p</b></i><b> </b><i><b>ransomware</b></i><b> group</b> exploiting Oracle E-Business Suite zero-day flaws. Hackers stole and leaked personal data in August 2025, including names and Social Security numbers. MSG <a class="link" href="https://www.securityweek.com/madison-square-garden-data-breach-confirmed-months-after-hacker-attack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">says a third-party vendor hosted the affected system</a> and it is notifying impacted individuals.</p><p class="paragraph" style="text-align:left;">🇨🇦 <b>A October 2025 breach at </b><i><b>Canadian Tire</b></i><b> exposed more than 38 million customer accounts</b> after <a class="link" href="https://www.securityweek.com/canadian-tire-data-breach-impacts-38-million-accounts/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">attackers accessed an e-commerce database</a>. Leaked data included names, emails, PBKDF2-hashed passwords, some dates of birth, partial credit card details, addresses, phones, and gender. The company says bank and loyalty data were safe and has emailed affected users.</p></div><p class="paragraph" style="text-align:left;"></p><div id="cybercrime-cyber-espionage-ap-ts" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🥷🏻 CYBERCRIME, CYBER ESPIONAGE, APT’s</h3><p class="paragraph" style="text-align:left;">🇮🇷 🇺🇸 🇮🇱 <b>After US‑Israeli strikes on Iran, hacktivist attacks have surged</b> but Iran’s state-backed cyber operations remain quiet. Security firms report many claim-driven website defacements, DDoS attacks, and unverified breach claims. Analysts warn the threat is evolving and urge organizations to strengthen defenses.</p><p class="paragraph" style="text-align:left;">→ <a class="link" href="https://blog.talosintelligence.com/talos-developing-situation-in-the-middle-east/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">Talos on the developing situation in the Middle East</a></p><p class="paragraph" style="text-align:left;">→ <a class="link" href="https://www.ncsc.gov.uk/news/ncsc-advises-uk-organisations-take-action-following-conflict-in-middle-east?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">UK warns of Iranian cyberattack risks amid Middle-East conflict</a></p><p class="paragraph" style="text-align:left;">→ <a class="link" href="https://techcrunch.com/2026/03/02/hackers-and-internet-outages-hit-iran-amid-u-s-air-strikes/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">Hackers and internet outages hit Iran amid U.S. air strikes</a></p><p class="paragraph" style="text-align:left;"> 🇮🇷 🇺🇸 🇮🇱 <b>U.S. and Israeli forces used cyberattacks alongside airstrikes in the opening of the war with Iran</b> to <a class="link" href="https://techcrunch.com/2026/03/03/hacked-traffic-cams-and-hijacked-tvs-how-cyber-operations-supported-the-war-against-iran/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">disrupt communications and gather intelligence</a>. Hacked TV broadcasts and apps were used for psychological operations. The true impact of these cyber actions is unclear and may be overstated.</p><div class="embed"><a class="embed__url" href="https://cstromblad.com/posts/iranian-threat-actor-profile/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank"><div class="embed__content"><p class="embed__title"> Iranian Threat Actor Profile </p><p class="embed__description"> Comprehensive analysis of Iran cyber capabilities pulled from approximately 55 open sources dating 2025-05-01 until 2026-03-03. It’s an attempt to provide a reasonably accurate and holistic view of Iranian cyber threat actors. </p><p class="embed__link"> cstromblad.com/posts/iranian-threat-actor-profile </p></div></a></div><p class="paragraph" style="text-align:left;">🇮🇷 🇺🇸 <b>Iran-linked APT </b><i><b>MuddyWater</b></i><b> has breached networks </b>of a <span style="text-decoration:underline;"><a class="link" href="https://www.security.com/threat-intelligence/iran-cyber-threat-activity-us?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">U.S. airport, a bank, a software/aerospace contractor, and a Canadian NGO</a></span>. The group deployed new backdoors named <i>Dindoor</i> and <i>Fakeset</i>, using fraudulent certificates to steal data. The intrusions persisted amid recent U.S.–Israel–Iran tensions and may still threaten other organizations.</p><p class="paragraph" style="text-align:left;">🇮🇷 🇮🇱 <b>Researchers observed Iran-linked actors intensifying scans and exploitation attempts against Hikvision and Dahua IP cameras</b> across Israel, Gulf states, Lebanon, and Cyprus. This <a class="link" href="https://research.checkpoint.com/2026/interplay-between-iranian-targeting-of-ip-cameras-and-physical-warfare-in-the-middle-east/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">camera targeting aligns with missile strikes</a> and likely supports battle-damage assessment and targeting. Defenders should patch cameras, remove public access, enforce strong credentials, and segment and monitor camera networks.</p><p class="paragraph" style="text-align:left;">🇮🇷 💥 <b>After the U.S.-Israel strikes on Iran, hacktivists launched 149 DDoS attacks on 110 organizations across 16 countries</b>, mostly in the Middle East. Two groups, <i><a class="link" href="https://www.radware.com/security/threat-advisories-and-attack-reports/ddos-activity-following-operation-epic-fury-roaring-lion/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">Keymous+</a></i><a class="link" href="https://www.radware.com/security/threat-advisories-and-attack-reports/ddos-activity-following-operation-epic-fury-roaring-lion/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow"> and </a><i><a class="link" href="https://www.radware.com/security/threat-advisories-and-attack-reports/ddos-activity-following-operation-epic-fury-roaring-lion/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">DieNet</a></i><a class="link" href="https://www.radware.com/security/threat-advisories-and-attack-reports/ddos-activity-following-operation-epic-fury-roaring-lion/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">, drove most attacks</a>, targeting governments, infrastructure, finance, and telecoms. Security firms warn of continued cyber retaliation and urge stronger monitoring and defenses.</p><p class="paragraph" style="text-align:left;">🇮🇷 🦠 <b>A suspected Iran-linked group called </b><i><b>Dust Specter</b></i><b> targeted Iraqi officials by spoofing the Ministry of Foreign Affairs</b> to deliver new malware. The campaign used two chains: SPLITDROP/TWINTASK/TWINTALK that poll files on disk, and GHOSTFORM that runs PowerShell in memory and hides artifacts. Attackers staged payloads on <a class="link" href="https://www.zscaler.com/blogs/security-research/dust-specter-apt-targets-government-officials-iraq?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news#threat-attribution" target="_blank" rel="noopener noreferrer nofollow">compromised Iraqi sites</a>, used evasion and social engineering, and likely leveraged generative AI in malware development.</p><hr class="content_break"><p class="paragraph" style="text-align:left;">⚠️ 🇰🇵 🧑‍🏭 <b>Microsoft says North Korean threat groups are using generative AI to create fake remote worker identities and get hired</b> at global companies. AI speeds up making convincing personas, lures, voice and image forgeries, and helps maintain access. <a class="link" href="https://www.microsoft.com/en-us/security/blog/2026/03/06/ai-as-tradecraft-how-threat-actors-operationalize-ai/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">Researchers warn</a> this boosts scale, sophistication, and the risk of more advanced, semi‑autonomous attacks.</p><p class="paragraph" style="text-align:left;">🇷🇺 ⚖️ 🇺🇸 <b>A 43-year-old Russian, Evgenii Ptitsyn, pleaded guilty in the U.S. for his role in the </b><i><b>Phobos</b></i><b> ransomware</b> operation. He <a class="link" href="https://cyberscoop.com/phobos-ransomware-leader-guilty/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">was arrested in South Korea in June 2024 and extradited</a> to the U.S. in November. Ptitsyn faces up to 20 years for wire fraud conspiracy after helping run and sell the ransomware that hit over 1,000 organizations.</p><p class="paragraph" style="text-align:left;">🇺🇸 🇫🇷 <b>A U.S. contractor&#39;s son, John Daghita, was arrested in Saint Martin for allegedly stealing over $46 million in cryptocurrency</b> from the U.S. Marshals Service. The <a class="link" href="https://www.bleepingcomputer.com/news/security/fbi-arrests-suspect-linked-to-46m-crypto-theft-from-us-marshals/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">arrest</a> followed a joint FBI–French Gendarmerie operation after a blockchain investigator traced the stolen funds to Daghita. Authorities seized cash, hard drives, and security keys during the arrest.</p><p class="paragraph" style="text-align:left;">🇪🇺 🎣 <b>Europol and partners dismantled </b><i><b>Tycoon 2FA</b></i><b>, a large phishing-as-a-service toolkit</b> that enabled adversary-in-the-middle attacks. The <a class="link" href="https://thehackernews.com/2026/03/europol-led-operation-takes-down-tycoon.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">service powered tens of millions of phishing emails</a> and was linked to over 64,000 incidents affecting schools, hospitals, businesses, and governments. Its tools stole credentials, MFA codes, and session cookies to allow account takeovers even after password changes.</p><p class="paragraph" style="text-align:left;">🇪🇸 🇺🇦 <b>Spanish and Ukrainian police broke up a criminal ring that exploited war-displaced Ukrainian women</b> to <a class="link" href="https://www.bleepingcomputer.com/news/security/police-dismantles-online-gambling-ring-exploiting-ukrainian-women/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">run an online gambling and money-laundering scheme</a>. The group forced the women to open bank accounts and used bots and stolen identities to place thousands of low-odds bets, laundering about €4.75 million. Authorities arrested 12 suspects, seized devices, cars, and accounts, and froze properties and funds across multiple countries.</p><p class="paragraph" style="text-align:left;">❌ <b>Authorities from 14 countries shut down </b><i><b>LeakBase</b></i><b>, a major online forum for stolen data</b> and hacking tools. Law enforcement <a class="link" href="https://www.justice.gov/opa/pr/united-states-leads-dismantlement-one-worlds-largest-hacker-forums?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">seized the site</a>, arrested suspects, and took user accounts, posts, and logs for evidence. Officials said the site hosted hundreds of millions of stolen records and was linked to many high-profile attacks.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/0bbc730a-d83f-438d-8e11-4a77c8aea020/image.png?t=1772721119"/><div class="image__source"><span class="image__source_text"><p>Figure: LeakBase Splash Page/justice.gov</p></span></div></div><p class="paragraph" style="text-align:left;">🇺🇸 <b>Hacktivists called “</b><i><b>Department of Peace</b></i><b>” say they hacked the Department of Homeland Security and leaked documents</b> about ICE contracts. A transparency group published searchable data showing more than 6,000 contractors, contract amounts, and contact details, including big firms like Palantir, Microsoft, and Raytheon. The <a class="link" href="https://techcrunch.com/2026/03/02/hacktivists-claim-to-have-hacked-homeland-security-to-release-ice-contract-data/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">hackers said they acted to expose DHS ties after recent killings</a> by federal agents.</p><p class="paragraph" style="text-align:left;">🇺🇸 ⚖️ <b>A 22-year-old Alabama man, Jamarcus Mosley, pleaded guilty to hacking and extorting hundreds of women</b> by <a class="link" href="https://www.justice.gov/usao-ndga/pr/online-predator-pleads-guilty-hacking-social-media-accounts-and-extorting-hundreds?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">stealing their social media passwords</a>. He impersonated friends to get recovery codes, then threatened to post private nude images unless victims sent more photos, gave access, or paid him. Mosley faces sentencing on May 27.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#f0f0f0;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🗓️ <b><a class="link" href="https://xsa.github.io/infosec-events/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">{Cyber,Info}Sec Events</a></b> — A community-maintained list of infosec conferences worldwide. Subscribe to the <a class="link" href="https://xsa.github.io/infosec-events/events.ics?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">ICS calendar feed</a> to get events straight into your calendar, or follow <a class="link" href="https://infosec.exchange/@infosecevents?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">@infosecevents@infosec.exchange</a> on Mastodon for weekly digests. Contributions and ⭐ welcome!</p></div><p class="paragraph" style="text-align:left;"></p><div id="government-politics-and-privacy" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">👨🏻‍⚖️ 👀 GOVERNMENT, POLITICS, AND PRIVACY</h3><div class="embed"><a class="embed__url" href="https://www.404media.co/cbp-tapped-into-the-online-advertising-ecosystem-to-track-peoples-movements/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank"><div class="embed__content"><p class="embed__title"> CBP Tapped Into the Online Advertising Ecosystem To Track Peoples’ Movements </p><p class="embed__description"> An internal DHS document obtained by 404 Media shows for the first time CBP used location data sourced from the online advertising industry to track phone locations. ICE has bought access to similar tools. </p><p class="embed__link"> www.404media.co/cbp-tapped-into-the-online-advertising-ecosystem-to-track-peoples-movements </p></div><img class="embed__image embed__image--right" src="https://www.404media.co/content/images/size/w1200/2026/02/54723348049_72eefb5739.jpg"/></a></div><p class="paragraph" style="text-align:left;">🇺🇸 <b>President Trump released a high-level national cyber strategy promoting offensive and defensive cyber operations</b>, stronger federal network security, and use of AI and other emerging technologies. The plan has six pillars, including shaping adversary behavior, securing critical infrastructure and supply chains, streamlining regulation, and building cyber workforce capacity. Reactions were mixed, with industry praise for deterrence and regulation easing and <a class="link" href="https://cyberscoop.com/trump-cybersecurity-strategy/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">critics saying the strategy is vague</a> and lacks concrete implementation details.</p><p class="paragraph" style="text-align:left;">🇺🇸 🔎 <b>The FBI said it found and addressed suspicious activity on its networks</b> but gave no details. Reports say the <a class="link" href="https://cyberscoop.com/fbi-targeted-with-suspicious-activity-on-its-networks/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">activity targeted a surveillance system</a> used for warrants, wiretaps, and tracing data. It is unclear when the incident happened or who was responsible.</p><p class="paragraph" style="text-align:left;">🇺🇸 🪖 <b>Anthropic’s Claude is still being used by the U.S. military</b> for <a class="link" href="https://techcrunch.com/2026/03/04/the-us-military-is-still-using-claude-but-defense-tech-clients-are-fleeing/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">targeting in the conflict with Iran</a>. Many defense contractors and subcontractors are replacing Claude amid political and legal pressure. The Pentagon may label Anthropic a supply-chain risk, which could spark legal battles.</p><p class="paragraph" style="text-align:left;">🙊 <b>Anthropic CEO Dario Amodei accused OpenAI of lying</b> about its Defense Department deal. Anthropic refused the DoD’s request over worries about <a class="link" href="https://techcrunch.com/2026/03/04/anthropic-ceo-dario-amodei-calls-openais-messaging-around-military-deal-straight-up-lies-report-says/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">mass surveillance and autonomous weapons</a>. Public reaction favored Anthropic and hurt OpenAI’s reputation.</p><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/MPTNHrq_4LU" width="100%"></iframe></div><p class="paragraph" style="text-align:left;"></p><div id="malware-threats" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🦠 MALWARE & THREATS</h3><p class="paragraph" style="text-align:left;">🇷🇺 🇺🇦 🐾 🐈️ <b>Researchers found a Russian-linked campaign targeting Ukraine that uses phishing to deliver new malware</b> called <i>BadPaw</i> and <i>MeowMeow</i>. The <a class="link" href="https://www.clearskysec.com/russian-campaign-targeting-ukraine-badpaw-and-meowmeow/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">attack tricks victims with a Ukrainian-language decoy</a>, avoids sandboxes, and uses BadPaw to fetch the MeowMeow backdoor. MeowMeow can run remote PowerShell commands and manage files, and its Russian-language artifacts link it to APT28.</p><p class="paragraph" style="text-align:left;">🪱 <b>A self-propagating JavaScript worm infected Wikipedia</b> by <a class="link" href="https://www.bleepingcomputer.com/news/security/wikipedia-hit-by-self-propagating-javascript-worm-that-vandalized-pages/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">adding hidden scripts</a> and vandalizing pages. It spread by modifying both user common.js files and the global <code>MediaWiki:Common.js</code>, affecting about 3,996 pages and ~85 users. Wikimedia engineers restricted editing, removed the malicious code, and reverted changes while investigating how the dormant script executed.</p><p class="paragraph" style="text-align:left;">🎠 <b>Malicious Packagist (PHP) packages pretending to be Laravel tools install a cross-platform remote access trojan (RAT)</b> that works on Windows, macOS, and Linux. The RAT connects to a C2 server, sends system info, and executes commands with the web app&#39;s permissions. Users should remove the packages, <a class="link" href="https://socket.dev/blog/malicious-packagist-packages-disguised-as-laravel-utilities?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">assume compromise</a>, rotate secrets, and audit outbound traffic.</p><p class="paragraph" style="text-align:left;">🇰🇵 🪱 <b>North Korean hackers published 26 malicious </b><i><b>npm</b></i><b> packages</b> that hide command-and-control addresses <a class="link" href="https://kmsec.uk/blog/dprk-text-steganography/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">using steganography in Pastebin</a> posts. The packages install a loader that decodes C2 URLs and fetches platform-specific payloads, deploying a cross-platform RAT and credential stealers. The campaign uses Vercel hosting and typosquatting to evade detection and target developers.</p></div><p class="paragraph" style="text-align:left;"></p><div id="ai-crypto-tech-tools" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🤖 🧰 AI, CRYPTO, TECH & TOOLS</h3><div class="embed"><a class="embed__url" href="https://unit42.paloaltonetworks.com/ai-agent-prompt-injection/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank"><div class="embed__content"><p class="embed__title"> Fooling AI Agents: Web-Based Indirect Prompt Injection Observed in the Wild </p><p class="embed__description"> Uncover real-world indirect prompt injection attacks and learn how adversaries weaponize hidden web content to exploit LLMs for high-impact fraud. </p><p class="embed__link"> unit42.paloaltonetworks.com/ai-agent-prompt-injection </p></div><img class="embed__image embed__image--right" src="https://unit42.paloaltonetworks.com/wp-content/uploads/2026/03/04_Security-Technology_Category_1920x900.jpg"/></a></div><p class="paragraph" style="text-align:left;">🔓️ <b>A new quantum algorithm called JVG may break RSA and ECC using far fewer qubits</b> and gates than Shor’s algorithm. Researchers <a class="link" href="https://www.securityweek.com/quantum-decryption-of-rsa-is-much-closer-than-expected/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">claim JVG could factor RSA-2048 in about 11 hours</a> with under 5,000 qubits, though the results are new and need more scrutiny. Organizations should urgently adopt crypto-agility and post-quantum standards to protect data now.</p><p class="paragraph" style="text-align:left;">💬 🔓️ <b>TikTok says it will not add end-to-end encryption for direct messages</b> — The company <a class="link" href="https://techcrunch.com/2026/03/04/tiktok-wont-add-end-to-end-encryption-to-direct-messages-report-says/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">argues that end-to-end encryption could block police and safety teams</a> from accessing messages when needed. TikTok keeps standard encryption and allows authorized access under strict conditions like valid law enforcement requests.</p><div class="embed"><a class="embed__url" href="https://techcrunch.com/2026/03/06/social-media-ban-children-countries-list/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank"><div class="embed__content"><p class="embed__title"> These are the countries moving to ban social media for children | TechCrunch </p><p class="embed__description"> Australia was the first country to issue a ban in late 2025, aiming to reduce the pressures and risks that young users may face on social media, including cyberbullying, social media addiction, and exposure to predators. </p><p class="embed__link"> techcrunch.com/2026/03/06/social-media-ban-children-countries-list </p></div><img class="embed__image embed__image--right" src="https://techcrunch.com/wp-content/uploads/2026/02/GettyImages-2243719467.jpg?resize=1200,800"/></a></div><p class="paragraph" style="text-align:left;">☁️ <b>AWS announced </b><i><b>Security Hub Extended</b></i><b>, a plan that unifies AWS and curated partner security tools</b> into <a class="link" href="https://aws.amazon.com/blogs/aws/aws-security-hub-extended-o%EF%AC%80ers-full-stack-enterprise-security-with-curated-partner-solutions/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">one console</a>. It simplifies buying, onboarding, and billing with pay-as-you-go pricing and single-vendor support. Security findings from all solutions are normalized into OCSF and aggregated in Security Hub for faster response.</p><p class="paragraph" style="text-align:left;">🔐 <b>Google plans to make Chrome HTTPS certificates resistant to quantum attacks</b> by using Merkle Tree Certificates (MTCs). MTCs shrink certificate data, keep Certificate Transparency, and avoid slowing TLS with post-quantum keys. Google <a class="link" href="https://security.googleblog.com/2026/02/cultivating-robust-and-efficient.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">will test MTCs with partners</a> and roll out a quantum-resistant root program by 2027.</p><p class="paragraph" style="text-align:left;">→ <a class="link" href="https://www.bleepingcomputer.com/news/security/google-chrome-shifts-to-two-week-release-cycle-for-increased-stability/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">Google Chrome shifts to two-week release cycle for increased stability</a></p></div><p class="paragraph" style="text-align:left;"></p><div id="vulnerabilities-research-and-threat" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🐛 🧠 VULNERABILITIES, RESEARCH, AND THREAT INTELLIGENCE</h3><p class="paragraph" style="text-align:left;">➝ From the Patching Department:</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/cisco-patches-critical-vulnerabilities-in-enterprise-networking-products/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">Cisco Patches Critical Vulnerabilities in Enterprise Networking Products</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://cyberscoop.com/android-security-update-march-2026/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">Google addresses actively exploited Qualcomm zero-day in fresh batch of 129 Android vulnerabilities</a></p></li></ul><hr class="content_break"><div class="embed"><a class="embed__url" href="https://zerodayclock.com?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank"><div class="embed__content"><p class="embed__title"> Zero Day Clock </p><p class="embed__description"> The gap between disclosure and exploitation is collapsing to zero. </p><p class="embed__link"> zerodayclock.com </p></div></a></div><p class="paragraph" style="text-align:left;">🦊 🤝 🤖 <b>Anthropic used its Claude Opus AI to find 22 vulnerabilities in Firefox over two weeks</b>, 14 of them high-severity. Most <a class="link" href="https://techcrunch.com/2026/03/06/anthropics-claude-found-22-vulnerabilities-in-firefox-over-two-weeks/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">bugs were fixed in Firefox 148</a>, with a few patches delayed until the next release. The team struggled to build exploits, spending $4,000 in API credits but only making two proofs of concept.</p><p class="paragraph" style="text-align:left;">🔎 🗒️ <b>Google tracked 90 zero-day vulnerabilities actively exploited in 2025, a 15% rise</b> from 2024. Nearly half targeted enterprise systems like security appliances, VPNs, and networking gear. Commercial spyware vendors and state-linked groups drove much of the exploitation, and <a class="link" href="https://cloud.google.com/blog/topics/threat-intelligence/2025-zero-day-review?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">Google warns high rates may continue into 2026</a>.</p><p class="paragraph" style="text-align:left;">⚠️ 🎣 <b>LastPass warns of a new phishing campaign</b> that <a class="link" href="https://www.forbes.com/sites/daveywinder/2026/03/04/lastpass-issues-new-account-password-warning-attacks-are-underway/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">tries to steal users&#39; master passwords</a>. Fake emails use a spoofed display name and link to counterfeit LastPass login pages. LastPass published IoCs and worked with partners to take down the malicious sites.</p><p class="paragraph" style="text-align:left;">📱 <b>Kaspersky says there is no evidence the </b><i><b>Coruna</b></i><b> iPhone exploit kit was made by the same group behind 2023 attacks</b> blamed on the NSA. Google <a class="link" href="https://cloud.google.com/blog/topics/threat-intelligence/coruna-powerful-ios-exploit-kit?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">found </a><i><a class="link" href="https://cloud.google.com/blog/topics/threat-intelligence/coruna-powerful-ios-exploit-kit?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">Coruna</a></i> uses many iOS zero-days and has been used in multiple campaigns. Some experts suspect US government links because of shared vulnerabilities, but <a class="link" href="https://www.theregister.com/2026/03/04/kaspersky_dismisses_claims_that_coruna/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">Kaspersky rejects code-reuse claims</a>.</p><p class="paragraph" style="text-align:left;">😱 <b>A critical FreeScout vulnerability (CVE-2026-28289) allows zero-click remote code execution</b> by uploading a hidden <code>.htaccess</code> file. The <a class="link" href="https://www.ox.security/blog/freescout-rce-cve-2026-28289/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">bug bypasses a previous patch</a> using a zero-width space in filenames and affects FreeScout 1.8.206 on Apache with AllowOverride All. Users should update to FreeScout 1.8.207 immediately to prevent full server compromise and data theft.</p><p class="paragraph" style="text-align:left;">🇰🇵 <b>Security researchers say APT28 likely exploited MSHTML zero-day CVE-2026-21513 before Microsoft patched</b> it in February 2026. The flaw lets malicious HTML or LNK files trick Windows into running code outside the browser sandbox. <a class="link" href="https://www.akamai.com/blog/security-research/2026/feb/inside-the-fix-cve-2026-21513-mshtml-exploit-analysis?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">Akamai found an artifact tied to APT28</a> and warned other MSHTML embedding methods could be abused too.</p><p class="paragraph" style="text-align:left;">🦞 <b>Security researchers found a high-severity &quot;</b><i><b>ClawJacked</b></i><b>&quot; flaw in OpenClaw </b>that <a class="link" href="https://www.oasis.security/blog/openclaw-vulnerability?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">let malicious websites brute-force a local gateway</a> and take control. The bug allowed hundreds of password guesses per second from browser JavaScript and auto-approved local device pairings. OpenClaw patched the issue in version 2026.2.26 — users should update immediately.</p><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/A15fuHs7fOc" width="100%"></iframe></div><p class="paragraph" style="text-align:left;"></p><div id="ics-ot-io-t" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🛰️ ICS, OT & IoT</h3><p class="paragraph" style="text-align:left;">🥸 <b>An old Rockwell Automation flaw (CVE-2021-22681) that lets attackers impersonate engineering workstations has been exploited</b> in the wild. CISA added it to its Known Exploited Vulnerabilities list and ordered fixes by March 26. Exposed PLCs could be <a class="link" href="https://www.securityweek.com/rockwell-vulnerability-allowing-remote-ics-hacking-exploited-in-attacks/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">remotely manipulated</a>, risking production disruption or physical damage.</p><p class="paragraph" style="text-align:left;">🤷 <b>A researcher says Honeywell’s IQ4 building controller can expose its web interface without authentication</b> and <a class="link" href="https://www.zeroscience.mk/en/vulnerabilities/ZSL-2026-5979.php?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">allow attackers to create admin accounts</a> during setup. Honeywell counters that devices are delivered unconfigured, meant for local setup by trained technicians, and not meant to be internet‑exposed. The <a class="link" href="https://www.securityweek.com/honeywell-researcher-clash-over-impact-of-building-controller-vulnerability/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">researcher found thousands of internet‑visible instances</a> and disputes Honeywell’s assessment, and a CVE is pending.</p><p class="paragraph" style="text-align:left;">📡 <b>The Global Coalition on Telecoms (GCOT) released principles for 6G security and resilience</b> at Mobile World Congress 2026. The <a class="link" href="https://www.securityweek.com/global-coalition-publishes-6g-security-and-resilience-principles/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">principles call for security-by-design</a>, AI-enabled defenses, quantum-safe cryptography, and measures to protect supply chains, data, and service availability. GCOT says governments, telecoms, and suppliers must act now as 6G moves from research toward commercial rollout by 2029–2030.</p><p class="paragraph" style="text-align:left;">🛞 🗺️ <b>Researchers found tire pressure sensors broadcast a permanent ID in plain text that can be captured</b> with cheap receivers. By collecting millions of messages, they showed <a class="link" href="https://www.securityweek.com/researchers-uncover-method-to-track-cars-via-tire-sensors/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">these signals can be used to track vehicles</a> and infer driver behavior. Attackers could use or spoof these transmissions for mass or targeted tracking and even to cause fake alerts.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#f0f0f0;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">💬 CONNECT</h3><p class="paragraph" style="text-align:left;">Follow me on <a class="link" href="https://infosec.exchange/@0x58?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">Mastodon</a> for quick daily updates and bite-sized content.</p><p class="paragraph" style="text-align:left;">Prefer using an RSS feed? Add <b>Infosec MASHUP</b> to your feed <a class="link" href="https://rss.beehiiv.com/feeds/HVhiKYpQlR.xml?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">here</a>.</p><p class="paragraph" style="text-align:center;"><b>Enjoying our newsletter? </b>Forward it to a colleague—<br>it’s one of the best ways to support us.</p><p class="paragraph" style="text-align:left;">Thanks for reading today’s newsletter, and if you&#39;re enjoying it and want to support my work, you can <b>buy me a coffee</b> ☕ over at <a class="link" href="https://www.buymeacoffee.com/0x58?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news" target="_blank" rel="noopener noreferrer nofollow">https://www.buymeacoffee.com/0x58</a></p><p class="paragraph" style="text-align:left;"> See you next time!</p><p class="paragraph" style="text-align:left;">-X.</p></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=c0ca0e32-3afe-4dd7-8841-5011620c7650&utm_medium=post_rss&utm_source=x_s_infosec_newsletter">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>🕵🏻‍♂️ [InfoSec MASHUP] 09/2026 - Your iPhone has a green dot. Predator doesn&#39;t care.</title>
  <description>Plus: Conduent exposes 25M, Lazarus goes ransomware, Anthropic relaxes core AI safety pledge, while refusing to bend to Pentagon on AI safeguards, and breakout times hit 29 minutes.</description>
  <link>https://infosec-mashup.santolaria.net/p/infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care</link>
  <guid isPermaLink="true">https://infosec-mashup.santolaria.net/p/infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care</guid>
  <pubDate>Sat, 28 Feb 2026 09:20:00 +0000</pubDate>
  <atom:published>2026-02-28T09:20:00Z</atom:published>
    <dc:creator>Xavier Santolaria</dc:creator>
    <category><![CDATA[Malware]]></category>
    <category><![CDATA[Opensource]]></category>
    <category><![CDATA[Privacy]]></category>
    <category><![CDATA[Cybersecurity]]></category>
    <category><![CDATA[Threat Intelligence]]></category>
    <category><![CDATA[Ai]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'IBM Plex Sans',-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'IBM Plex Sans',-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">We now have <b>{{active_subscriber_count}} active subscribers</b>! Thank you all for being part of my newsletter. Please share it with your friends and colleagues, and let’s keep growing the community.</p><hr class="content_break"><p class="paragraph" style="text-align:left;">💜 A quick personal note — I recently looked at my newsletter stats and noticed that a good chunk of you open and read this every single week. I just wanted to say: thank you. Genuinely. This is a solo effort, and knowing that some of you look forward to it every weekend makes it worthwhile.</p><p class="paragraph" style="text-align:left;">If you ever want to share feedback, suggest a topic, or just say hi — hit reply. I read everything.</p><hr class="content_break"><p class="paragraph" style="text-align:left;">📲 Your iPhone has a green dot. It means the camera is on — Apple put it there so you&#39;d know. Hardware-level, they said. Can&#39;t be bypassed, they implied. Predator didn&#39;t get the memo.</p><p class="paragraph" style="text-align:left;"><b>Jamf Threat Labs published a detailed breakdown</b> last week—and it’s worth your time this week-end—of <a class="link" href="https://www.jamf.com/blog/predator-spyware-ios-recording-indicator-bypass-analysis/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">how Intellexa&#39;s spyware defeats both the camera and microphone indicators</a> with a single hook — one instruction that sets the <code>self</code> pointer to NULL, exploiting a quirk of Objective-C where messages to nil are simply... ignored. No dot. No warning. No trace. The device works normally. You just have no idea you&#39;re being watched.</p><p class="paragraph" style="text-align:left;">The technical elegance is, honestly, impressive — if you can set aside the part where it&#39;s used to surveil journalists, activists, and politicians.</p><p class="paragraph" style="text-align:left;">The good news, if you can call it that: your iPhone needs to be fully compromised first — kernel access, code injection into SpringBoard, the works. Predator doesn&#39;t walk in through the front door. It needs a zero-day chained exploit to get there. The bad news: Intellexa has a track record of finding them.</p><p class="paragraph" style="text-align:left;">Sanctioned by the US, flagged by Google, dissected by researchers — and somehow still very much in business. <b>Predator is the cockroach of the spyware industry</b>, and this week we got a very good look at its internals.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/23675efb-ed34-4d77-8cc3-d98b01a26398/image.png?t=1771939216"/><div class="image__source"><span class="image__source_text"><p>Figure: Monster in Predator movie/20th Century Studios</p></span></div></div><p class="paragraph" style="text-align:left;">Let’s now dive into this week’s top insights! 🚀</p><h2 class="heading" style="text-align:left;">Table of Contents</h2><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="#breaches-security-incidents" rel="noopener noreferrer nofollow">BREACHES & SECURITY INCIDENTS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#cybercrime-cyber-espionage-ap-ts" rel="noopener noreferrer nofollow">CYBERCRIME, CYBER ESPIONAGE, APT’s</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#government-politics-and-privacy" rel="noopener noreferrer nofollow">GOVERNMENT, POLITICS, AND PRIVACY</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#malware-threats" rel="noopener noreferrer nofollow">MALWARE & THREATS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#ai-crypto-tech-tools" rel="noopener noreferrer nofollow">AI, CRYPTO, TECH & TOOLS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#vulnerabilities-research-and-threat" rel="noopener noreferrer nofollow">VULNERABILITIES, RESEARCH, AND THREAT INTELLIGENCE</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#ics-ot-io-t" rel="noopener noreferrer nofollow">ICS, OT & IoT</a></p></li></ul><div id="breaches-security-incidents" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🔓 BREACHES & SECURITY INCIDENTS</h3><div class="embed"><a class="embed__url" href="https://haveibeenpwned.com/Breach/CanadianTire?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank"><div class="embed__content"><p class="embed__title"> Have I Been Pwned: Canadian Tire Data Breach </p><p class="embed__description"> In October 2025, retailer Canadian Tire was the victim of a data breach that exposed almost 42M records. The data contained 38M unique email addresses along with names, phone numbers and physical addresses. Passwords were stored as PBKDF2 hashes and for a subset of records, dates of birth and partial credit card data were also included (card type, expiry and masked card number). In its disclosure notice, Canadian Tire advised that the incident did not impact bank account information or loyalty program data. </p><p class="embed__link"> haveibeenpwned.com/Breach/CanadianTire </p></div><img class="embed__image embed__image--right" src="https://haveibeenpwned.com/Images/OG/CanadianTire"/></a></div><p class="paragraph" style="text-align:left;">🇺🇸 <b>A January 2025 ransomware attack on </b><i><b>Conduent</b></i><b> has exposed personal data for at least 25 million people</b> in the U.S. The stolen data includes names, birthdates, addresses, Social Security numbers, and medical and insurance information. <i>Conduent</i> has given <a class="link" href="https://techcrunch.com/2026/02/24/conduent-data-breach-grows-affecting-at-least-25m-people/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">few details and even hid its incident notice from search engines</a>.</p><p class="paragraph" style="text-align:left;">🇳🇱 <b>The </b><i><b>ShinyHunters</b></i><b> extortion gang claims it breached Dutch telecom </b><i><b>Odido</b></i><b> and stole millions</b> of user records. <i>Odido</i> <a class="link" href="https://www.bleepingcomputer.com/news/security/odido-data-breach-exposes-personal-info-of-62-million-customers/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">confirmed a February breach</a> of its customer contact system affecting about 6.2 million customers but said passwords, call details, and billing data were not exposed. <i>ShinyHunters</i> posted leaked data and alleged it includes internal files and plaintext passwords, while <i>Odido</i> <a class="link" href="https://www.bleepingcomputer.com/news/security/shinyhunters-extortion-gang-claims-odido-breach-affecting-millions/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">denies those additional claims</a>.</p><p class="paragraph" style="text-align:left;">🇨🇳 <b>Chinese hackers used a secret backdoor in Pulse Secure VPN software owned by Ivanti</b> to <a class="link" href="https://techcrunch.com/2026/02/23/vpn-flaws-allowed-chinese-hackers-to-compromise-dozens-of-ivanti-customers-says-report/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">breach dozens of organizations</a>. The compromise affected at least 119 customers and included U.S. and European military contractors. Cuts after private equity takeovers are blamed for weakening Ivanti’s security, and agencies were later ordered to disconnect Ivanti VPNs due to active exploits.</p><div class="embed"><a class="embed__url" href="https://mastodon.social/@campuscodi/116114602572870843?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank"><div class="embed__content"><p class="embed__title"> Catalin Cimpanu (@campuscodi@mastodon.social) </p><p class="embed__description"> Ivanti&#39;s California data center was hacked in 2021 through a vulnerability in its own VPN Attack was linked to Chinese hackers https://www.bloomberg.com/news/features/2026-02-19/vpn-used-by-us-government-failed-to-stop-china-state-sponsored-hackers </p><p class="embed__link"> mastodon.social/@campuscodi/116114602572870843 </p></div></a></div><p class="paragraph" style="text-align:left;">🇺🇸 🏥 <b>Nearly 140,000 people may be affected by a data breach tied to Vikor Scientific</b> (now Vanta Diagnostics). The breach appears to have originated at billing vendor Catalyst RCM, whose compromised credentials exposed names, DOBs, payment and medical details. It’s <a class="link" href="https://www.securityweek.com/us-healthcare-diagnostic-firm-says-140000-affected-by-data-breach/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">unclear if 139,964 is the final total</a>, and some parties have not confirmed the full number.</p><p class="paragraph" style="text-align:left;">🇺🇸 🏥 <b>A ransomware attack forced the University of Mississippi Medical Center to close about three dozen clinics</b> and cancel elective procedures. Staff are working offline while investigators, including the FBI, try to restore systems and <a class="link" href="https://www.securityweek.com/mississippi-hospital-system-closes-all-clinics-after-ransomware-attack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">determine if patient data was stolen</a>. Hospitals and emergency rooms stayed open and patients with urgent needs are being contacted.</p><p class="paragraph" style="text-align:left;">👁️ <b>A huge unsecured database tied to </b><i><b>IDMerit</b></i><b> exposed about one billion sensitive identity records</b> from at least 26 countries. The leaked data included names, birthdates, addresses, national IDs and verification logs, risking identity theft and targeted fraud. The server was later secured, but the <a class="link" href="https://www.biometricupdate.com/202602/one-billion-identity-records-exposed-in-unsecured-id-verification-database?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">incident highlights weak vendor security</a> and major risks from third-party identity systems.</p><p class="paragraph" style="text-align:left;">→ More Breaches and Incidents:</p><ul><li><p class="paragraph" style="text-align:left;"><i><a class="link" href="https://www.bleepingcomputer.com/news/security/wynn-resorts-confirms-employee-data-breach-after-extortion-threat/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">Wynn Resorts</a></i><a class="link" href="https://www.bleepingcomputer.com/news/security/wynn-resorts-confirms-employee-data-breach-after-extortion-threat/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow"> confirms employee data breach after extortion threat</a></p></li><li><p class="paragraph" style="text-align:left;"><i><a class="link" href="https://techcrunch.com/2026/02/24/cargurus-data-breach-affects-12-5-million-accounts/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">CarGurus</a></i><a class="link" href="https://techcrunch.com/2026/02/24/cargurus-data-breach-affects-12-5-million-accounts/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow"> data breach affects 12.5 million accounts</a> 🚗</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/ad-tech-company-optimizely-confirms-cyberattack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">Ad Tech Company </a><a class="link" href="https://www.securityweek.com/ad-tech-company-optimizely-confirms-cyberattack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow"><i>Optimizely</i></a><a class="link" href="https://www.securityweek.com/ad-tech-company-optimizely-confirms-cyberattack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow"> Targeted in Cyberattack</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/medical-device-maker-ufp-technologies-hit-by-cyberattack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">Medical Device Maker </a><a class="link" href="https://www.securityweek.com/medical-device-maker-ufp-technologies-hit-by-cyberattack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow"><i>UFP Technologies</i></a><a class="link" href="https://www.securityweek.com/medical-device-maker-ufp-technologies-hit-by-cyberattack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow"> Hit by Cyberattack</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bleepingcomputer.com/news/security/european-dyi-chain-manomano-data-breach-impacts-38-million-customers/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">European DYI chain ManoMano data breach impacts 38 million customers</a> 🇪🇺 </p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bleepingcomputer.com/news/security/olympique-marseille-football-club-confirms-cyberattack-after-data-leak/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">Olympique Marseille confirms &#39;attempted&#39; cyberattack after data leak</a> ⚽️ </p></li></ul></div><p class="paragraph" style="text-align:left;"></p><div id="cybercrime-cyber-espionage-ap-ts" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🥷🏻 CYBERCRIME, CYBER ESPIONAGE, APT’s</h3><p class="paragraph" style="text-align:left;">🇪🇺 <b>Europol launched </b><i><b>Project Compass</b></i><b> to combat </b><i><b>The Com</b></i><b>, a global network of mostly young cybercriminals</b> who commit violence, extortion, and child exploitation. The <a class="link" href="https://cyberscoop.com/project-compass-the-com-europol/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">operation, backed by 28 countries</a>, has helped identify 179 perpetrators, arrest 30, and find dozens of victims. Authorities say international information-sharing and sustained efforts are key to protecting victims and disrupting the group.</p><p class="paragraph" style="text-align:left;">🇷🇺 🇪🇺 <b>A Russia-aligned group called UAC-0050 (</b><i><b>Mercenary Akula</b></i><b>) used a spoofed Ukrainian domain and a phishing email to deliver RMS remote-access malware</b> to a European financial institution. The <a class="link" href="https://www.bluevoyant.com/blog/mercenary-akula-hits-financial-institution?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">attackers used layered archives and a fake PDF executable</a> to bypass defenses and gain stealthy access for intelligence gathering or financial theft. This incident suggests the group may be expanding targeting beyond Ukraine to Western entities that support it.</p><p class="paragraph" style="text-align:left;">🇨🇳 👀 <b>Google says it disrupted a long-running China-linked cyberespionage campaign</b> that targeted telecoms and governments in dozens of countries. The <a class="link" href="https://cloud.google.com/blog/topics/threat-intelligence/disrupting-gridtide-global-espionage-campaign?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">attackers used a new backdoor called </a><a class="link" href="https://cloud.google.com/blog/topics/threat-intelligence/disrupting-gridtide-global-espionage-campaign?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow"><i>GridTide</i></a> and hid commands in cloud services like Google Sheets to steal or monitor sensitive data. Google, Mandiant and partners took down the malware infrastructure, disabled attacker accounts, and notified victims.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/7a55b874-f48c-4045-be62-3c9fb7bbbfa6/image.png?t=1772096841"/><div class="image__source"><span class="image__source_text"><p>Figure: Countries with suspected or confirmed UNC2814 victims/Google.com</p></span></div></div><p class="paragraph" style="text-align:left;">🇺🇸 <b>The U.S. Department of Justice seized $61 million in Tether</b> tied to “pig butchering” crypto scams. Scammers lured victims via dating and social apps, coerced workers in scam compounds, and laundered stolen funds through many wallets. Tether <a class="link" href="https://www.justice.gov/usao-ednc/pr/us-attorneys-office-ednc-announces-seizure-61-million-dollars-worth-cryptocurrency?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">says it has frozen about $4.2 billion in assets linked to illicit activity</a>, including nearly $250 million since June 2025.</p><p class="paragraph" style="text-align:left;">🇺🇸 🇷🇺 <b>The U.S. Treasury sanctioned Russian zero-day broker </b><i><b>Operation Zero</b></i><b>, its founder Sergey Zelenyuk</b>, and related companies and associates for buying and selling stolen software exploits. Officials say <a class="link" href="https://home.treasury.gov/news/press-releases/sb0404?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow"><i>Operation Zero</i></a><a class="link" href="https://home.treasury.gov/news/press-releases/sb0404?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow"> bought tools stolen from a U.S. defense contractor</a> and sold them to unauthorized users, posing national security risks. The sanctions also target UAE-linked firms tied to high-paying zero-day markets.</p><p class="paragraph" style="text-align:left;">🇺🇸 🇷🇺 <b>A former L3Harris executive was sentenced to 87 months in prison for selling eight zero-day exploits</b> to a Russian broker. He <a class="link" href="https://cyberscoop.com/l3harris-executive-peter-williams-sentenced-zero-day-exploits-russia/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">admitted stealing the exploits from Trenchant </a>and received about $1.3 million in cryptocurrency. Prosecutors said the theft caused $35 million in losses and restitution proceedings continue.</p><p class="paragraph" style="text-align:left;">🇰🇵 <b>North Korean state-backed </b><i><b>Lazarus</b></i><b> actors are now using Medusa ransomware</b> to mount extortion campaigns. They have <a class="link" href="https://www.security.com/threat-intelligence/lazarus-medusa-ransomware?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">targeted U.S. healthcare and other organizations</a>, sometimes unsuccessfully, and demanded about $260,000 on average. Researchers found tools and indicators linking these attacks to <i>Lazarus</i> but cannot yet pinpoint a single sub-group.</p><p class="paragraph" style="text-align:left;">🇪🇸 <b>Spanish police arrested four suspected members of &quot;</b><i><b>Anonymous Fénix</b></i><b>&quot;, a hacktivist group blamed for DDoS attacks</b> on government sites. The group targeted Spanish and some South American institutions, spiking after deadly Valencia floods. Authorities <a class="link" href="https://web.guardiacivil.es/es/destacados/noticias/Detenidos-los-cuatro-principales-integrantes-del-grupo-hacktivista-Anonymous-Fenix-por-ciberataques-contra-organismos-publicos/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">seized</a> the group’s social accounts and closed its Telegram channel.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#f0f0f0;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🗓️ <b><a class="link" href="https://xsa.github.io/infosec-events/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">{Cyber,Info}Sec Events</a></b> — A community-maintained list of infosec conferences worldwide. Subscribe to the <a class="link" href="https://xsa.github.io/infosec-events/events.ics?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">ICS calendar feed</a> to get events straight into your calendar, or follow <a class="link" href="https://infosec.exchange/@infosecevents?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">@infosecevents@infosec.exchange</a> on Mastodon for weekly digests. Contributions and ⭐ welcome!</p></div><p class="paragraph" style="text-align:left;"></p><div id="government-politics-and-privacy" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">👨🏻‍⚖️ 👀 GOVERNMENT, POLITICS, AND PRIVACY</h3><div class="embed"><a class="embed__url" href="https://this.weekinsecurity.com/fbi-agents-visited-my-home-about-an-article-i-wrote-and-now-i-cannot-go-to-mexico/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank"><div class="embed__content"><p class="embed__title"> FBI agents visited my home about an article I wrote, and now I can&#39;t go to Mexico </p><p class="embed__description"> Mexico formally requested the FBI&#39;s help in seeking answers about one of my stories. Having federal agents on my doorstep sparked my own years-long effort to pry information out of the FBI to explain why it came to my house to begin with. </p><p class="embed__link"> this.weekinsecurity.com/fbi-agents-visited-my-home-about-an-article-i-wrote-and-now-i-cannot-go-to-mexico </p></div><img class="embed__image embed__image--right" src="https://this.weekinsecurity.com/content/images/size/w1200/2026/02/fbi-calling-card-1.jpeg"/></a></div><hr class="content_break"><p class="paragraph" style="text-align:left;">🍏 ✅ <b>NATO has approved Apple iPhone and iPad for handling classified information</b> at the &quot;NATO RESTRICTED&quot; level. The <a class="link" href="https://www.securityweek.com/apple-iphone-and-ipad-cleared-for-classified-nato-use/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">devices are now listed in NATO’s vetted product catalog</a> and can access Mail, Calendar, and Contacts securely without special software. Germany’s security agency (BSI) tested and validated the devices, which Apple says met NATO requirements.</p><p class="paragraph" style="text-align:left;">🇬🇷 🧑‍⚖️ <b>A Greek court sentenced </b><i><b>Intellexa</b></i><b> founder Tal Dilian and three associates to eight years in prison for illegal wiretapping</b> and <a class="link" href="https://techcrunch.com/2026/02/26/spyware-maker-sentenced-to-prison-in-greece-for-wiretapping-politicians-and-journalists/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">privacy violations</a>. The group was tied to a 2022 scandal where spyware called Predator was used to spy on politicians, journalists, businesspeople, and officials. The U.S. had already sanctioned <i>Intellexa</i> and some executives, and the sentence is stayed pending appeal while authorities investigate further.</p><p class="paragraph" style="text-align:left;">🇺🇸 🙊 <b>CISA is in trouble</b> — CISA has lost a large share of its staff and key programs, weakening its cyber defenses and coordination. Political hostility and leadership delays have deepened the problem and eroded trust with industry and local governments. Experts warn <a class="link" href="https://cyberscoop.com/cisa-personnel-cuts-trump-second-term-analysis/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">CISA may not have the capacity to handle major cyber crises</a> without rebuilding its workforce.</p><p class="paragraph" style="text-align:left;">🇬🇧 💰️ <b>The UK ICO fined Reddit £14.47 million for collecting and using data from children under 13 </b>without proper safeguards. Reddit only added weak age checks in July 2025, which <a class="link" href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2026/02/reddit-issued-with-1447m-fine-for-children-s-privacy-failures/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">the regulator said were easy to bypass</a>. Reddit will appeal, arguing most UK users are adults and that stronger ID checks hurt privacy.</p><p class="paragraph" style="text-align:left;">🎦 🚗 🇺🇸 <b>People across the U.S. are destroying Flock license-plate surveillance cameras</b> in protest. Critics say the <a class="link" href="https://techcrunch.com/2026/02/23/americans-are-destroying-flock-surveillance-cameras/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">cameras help immigration authorities track</a> and deport people. Cities and activists are cutting, smashing, or demanding removal of the cameras.</p><p class="paragraph" style="text-align:left;">🖼️ 🤖 <b>Data protection authorities from across the globe have published a Joint Statement on AI-Generated Imagery</b> — Global privacy authorities <a class="link" href="https://ico.org.uk/media2/fb1br3d4/20260223-iewg-joint-statement-on-ai-generated-imagery.pdf?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">warn</a> against AI systems that create realistic images or videos of real people without consent. They urge organizations to follow data protection laws, add strong safeguards, be transparent, and remove harmful content quickly. Regulators call for proactive engagement to protect privacy, dignity, and vulnerable people.</p><p class="paragraph" style="text-align:left;">🪪 🇬🇧 <b>Discord is making age verification mandatory and will use either facial age checks or ID</b> to control access. UK users say <a class="link" href="https://www.eurogamer.net/discord-advises-uk-users-that-they-may-be-part-of-an-experiment-where-instead-of-their-age-verification-data-never-leaving-their-phone-it-will-now-actually-leave-their-phone?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">Discord changed its promise</a>: some selfies and IDs may be sent to vendor Persona and stored up to seven days instead of always staying on-device. Users worry about data security and Persona’s backers, and Discord has been contacted for comment.</p></div><p class="paragraph" style="text-align:left;"></p><div id="malware-threats" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🦠 MALWARE & THREATS</h3><p class="paragraph" style="text-align:left;">🕹️ 🎠 <b>Cybercriminals are distributing trojanized gaming tools through browsers and chat apps</b> to install a <a class="link" href="https://thehackernews.com/2026/02/trojanized-gaming-tools-spread-java.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">Java-based remote access trojan (RAT)</a>. The malware uses stealthy loaders, Microsoft Defender exclusions, and persistence to enable data theft, remote control, and additional payloads. New RAT families like <i>Steaelite</i>, <i>DesckVB</i>, and <i>KazakRAT</i> bundle theft and ransomware features for powerful, easy-to-use attacker dashboards.</p><p class="paragraph" style="text-align:left;">👀 📲 <b>Predator spyware hides iOS camera and microphone recording indicators</b> by hooking a SpringBoard function that blocks sensor status updates. It uses kernel-level access and technique like PAC redirection to bypass permission checks and keep feeds streaming to operators. Jamf’s <a class="link" href="https://www.jamf.com/blog/predator-spyware-ios-recording-indicator-bypass-analysis/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">analysis shows traces of the malware in SpringBoard and mediaserverd</a> despite no visible status-dot indicators.</p><p class="paragraph" style="text-align:left;">🪦 <i><b>Arkanix Stealer</b></i><b> was a short-lived malware-as-a-service that surfaced in October 2025 and vanished</b> by December. It stole wide-ranging data — browsers, apps, VPNs, Telegram/Discord, files, wallets — and offered a control panel and post-exploitation tools. Kaspersky says <a class="link" href="https://securelist.com/arkanix-stealer/119006/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">the campaign was a one-shot effort</a> for quick profit, with servers and Discord taken down.</p><p class="paragraph" style="text-align:left;">🪱 <b>Researchers found a worm-like campaign (</b><i><b>SANDWORM_MODE</b></i><b>) using at least 19 malicious npm packages</b> to steal crypto keys, API tokens, and CI/GitHub secrets. The <a class="link" href="https://socket.dev/blog/sandworm-mode-npm-worm-ai-toolchain-poisoning?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">malware also uses a malicious GitHub Action</a>, can wipe home directories, and injects a fake MCP server to trick AI coding tools and harvest LLM keys and SSH/AWS/NPM credentials. Users should remove the listed packages, rotate tokens and secrets, and check repos and workflows for unexpected changes.</p></div><p class="paragraph" style="text-align:left;"></p><div id="ai-crypto-tech-tools" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🤖 🧰 AI, CRYPTO, TECH & TOOLS</h3><blockquote align="center" class="twitter-tweet"><a href="https://twitter.com/hackerschoice/status/2024766193807000050?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care"><p> Twitter tweet </p></a></blockquote><hr class="content_break"><p class="paragraph" style="text-align:left;">🐛 <b>Researchers found serious vulnerabilities in Anthropic&#39;s Claude Code</b> that <a class="link" href="https://blog.checkpoint.com/research/check-point-researchers-expose-critical-claude-code-flaws/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">let attackers run commands and steal API keys</a> by simply opening malicious repositories. The flaws abused config files and MCP servers to bypass consent and send authenticated requests to attacker-controlled endpoints. If exploited, attackers could access project files, modify cloud data, and incur unexpected API costs.</p><p class="paragraph" style="text-align:left;">❌ <b>Anthropic has removed the core pledge in its safety policy </b>that barred training new AI models unless safety could be guaranteed in advance. The company says <a class="link" href="https://time.com/7380854/exclusive-anthropic-drops-flagship-safety-pledge/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">the change reflects practical realities</a>, more transparency, and plans for regular risk reports and safety roadmaps. Critics warn the move weakens constraints and could make managing catastrophic AI risks harder.</p><p class="paragraph" style="text-align:left;">🇨🇳 <b>Anthropic says three Chinese AI labs used fake accounts to send 16 million prompts to its Claude model</b> to steal capabilities. The <a class="link" href="https://www.anthropic.com/news/detecting-and-preventing-distillation-attacks?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">startup calls this “distillation” and warns it can remove safety guards</a> and enable cyberattacks, surveillance, or disinformation. Anthropic urges stronger export controls and says the activity violated its terms.</p><p class="paragraph" style="text-align:left;">→ <a class="link" href="https://www.securityweek.com/anthropic-refuses-to-bend-to-pentagon-on-ai-safeguards-as-dispute-nears-deadline/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">Anthropic Refuses to Bend to Pentagon on AI Safeguards as Dispute Nears Deadline</a></p><p class="paragraph" style="text-align:left;">→ <a class="link" href="https://techcrunch.com/2026/02/27/employees-at-google-and-openai-support-anthropics-pentagon-stand-in-open-letter/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">Employees at Google and OpenAI support Anthropic’s Pentagon stand in open letter</a></p><p class="paragraph" style="text-align:left;">→ <a class="link" href="https://techcrunch.com/2026/02/27/anthropic-vs-the-pentagon-whats-actually-at-stake/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">Anthropic vs. the Pentagon: What’s actually at stake?</a></p><div class="embed"><a class="embed__url" href="https://www.404media.co/this-app-warns-you-if-someone-is-wearing-smart-glasses-nearby/?ref=daily-stories-newsletter&utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank"><div class="embed__content"><p class="embed__title"> This App Warns You if Someone Is Wearing Smart Glasses Nearby </p><p class="embed__description"> The creator of Nearby Glasses made the app after reading 404 Media&#39;s coverage of how people are using Meta&#39;s Ray-Bans smartglasses to film people without their knowledge or consent. “I consider it to be a tiny part of resistance against surveillance tech.” </p><p class="embed__link"> www.404media.co/this-app-warns-you-if-someone-is-wearing-smart-glasses-nearby/?ref=daily-stories-newsletter </p></div><img class="embed__image embed__image--right" src="https://www.404media.co/content/images/size/w1200/2026/02/meta-glasses.png"/></a></div></div><p class="paragraph" style="text-align:left;"></p><div id="vulnerabilities-research-and-threat" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🐛 🧠 VULNERABILITIES, RESEARCH, AND THREAT INTELLIGENCE</h3><p class="paragraph" style="text-align:left;">➝ From the Patching Department:</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/cisco-patches-catalyst-sd-wan-zero-day-exploited-by-highly-sophisticated-hackers/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">Cisco Patches Catalyst SD-WAN Zero-Day </a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/trend-micro-patches-critical-apex-one-vulnerabilities/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">Trend Micro Patches Critical Apex One Vulnerabilities</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/juniper-networks-ptx-routers-affected-by-critical-vulnerability/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">An out-of-band security update for Junos OS Evolved patches the remote code execution vulnerability CVE-2026-21902</a></p></li></ul><p class="paragraph" style="text-align:left;">🩹 <b>SolarWinds patched four critical Serv‑U flaws</b> that can allow attackers to gain root or admin access. All <a class="link" href="https://documentation.solarwinds.com/en/success_center/servu/content/release_notes/servu_15-5-4_release_notes.htm?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care#link7" target="_blank" rel="noopener noreferrer nofollow">four bugs require attackers to already have high privileges</a>, limiting but not eliminating risk. Thousands of Serv‑U servers are exposed online and the software has been repeatedly targeted by threat actors.</p><hr class="content_break"><div class="embed"><a class="embed__url" href="https://dixken.de/blog/i-found-a-vulnerability-they-found-a-lawyer?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank"><div class="embed__content"><p class="embed__title"> I found a Vulnerability. They found a Lawyer. </p><p class="embed__description"> What happens when you responsibly disclose a critical vulnerability exposing personal data - including that of minors - and the organization responds with legal threats instead of a thank you? </p><p class="embed__link"> dixken.de/blog/i-found-a-vulnerability-they-found-a-lawyer </p></div><img class="embed__image embed__image--right" src="https://dixken.de/images/blog/costa-rica.jpg"/></a></div><p class="paragraph" style="text-align:left;">⚠️ <b>Attackers have been exploiting two Cisco SD-WAN zero-days since 2023</b> to gain long-term access to network edge devices. Authorities, including CISA and the Five Eyes, <a class="link" href="https://cyberscoop.com/cisco-zero-days-cisa-emergency-directive-five-eyes/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">issued emergency guidance and threat-hunt steps</a> after discovering the ongoing campaign. Officials warn the attacks are highly targeted and require urgent patching and forensic checks.</p><p class="paragraph" style="text-align:left;">⏱️ <b>CrowdStrike found attackers are moving through networks much faster, with average breakout time down to 29 minutes</b> and some attacks taking seconds. Attackers <a class="link" href="https://cyberscoop.com/crowdstrike-annual-global-threat-report-attack-breakout-time/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">increasingly use living-off-the-land tactics</a>, stolen credentials, and cloud or edge device flaws to avoid detection. Nation-state and criminal groups are exploiting more zero-days and AI-driven techniques, widening threats and stressing defenders.</p><p class="paragraph" style="text-align:left;">🧠 📲 <b>Security researchers found 1,575 vulnerabilities in ten popular Android mental health apps</b> with over 14.7 million installs. Many <a class="link" href="https://www.bleepingcomputer.com/news/security/android-mental-health-apps-with-147m-installs-filled-with-security-flaws/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">flaws could expose therapy data</a>, intercept logins, or let attackers read local files and spoof app behavior. Some apps claim encryption or privacy but still use insecure coding and outdated protections.</p><p class="paragraph" style="text-align:left;">✈️ 🪖 <b>The Dutch Defense Secretary said the F-35’s software and cloud systems could be “jailbroken” like an iPhone</b> to accept third-party updates. Experts warn doing so would be legally risky and would not replace U.S. maintenance, mission planning, or spare-part support. The comment <a class="link" href="https://www.twz.com/air/f-35-software-could-be-jailbreaked-like-an-iphone-dutch-defense-minister?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">highlights tensions for foreign F-35 operators</a> reliant on U.S. control and logistics.</p><p class="paragraph" style="text-align:left;">🇷🇺 <b>A Russian-speaking hacker used AI tools to help breach over 600 FortiGate firewalls across 55 countries</b> in five weeks. The attacker relied on exposed management interfaces and weak credentials, then used AI-assisted scripts to automate reconnaissance and lateral movement. <a class="link" href="https://aws.amazon.com/blogs/security/ai-augmented-threat-actor-accesses-fortigate-devices-at-scale/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">Amazon warns AI services are lowering the bar for attackers</a> and urges admins to remove internet-exposed interfaces and enable MFA.</p><div class="embed"><a class="embed__url" href="https://open.substack.com/pub/ydinkin/p/200-kernel-bugs-in-30-days?utm_campaign=post-expanded-share&utm_medium=web" target="_blank"><div class="embed__content"><p class="embed__title"> 100+ Kernel Bugs in 30 Days </p><p class="embed__description"> High-Scale Driver Vulnerability Research with Agent Swarms </p><p class="embed__link"> open.substack.com/pub/ydinkin/p/200-kernel-bugs-in-30-days?utm_campaign=post-expanded-share&utm_medium=web </p></div><img class="embed__image embed__image--right" src="https://substackcdn.com/image/fetch/$s_!69zh!,w_1200,h_675,c_fill,f_jpg,q_auto:good,fl_progressive:steep,g_auto/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb80bdc16-283c-4636-acee-50b2a1ee40a6_1536x1024.png"/></a></div></div><p class="paragraph" style="text-align:left;"></p><div id="ics-ot-io-t" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🛰️ ICS, OT & IoT</h3><div class="embed"><a class="embed__url" href="https://unit42.paloaltonetworks.com/ot-edge-security/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank"><div class="embed__content"><p class="embed__title"> Bring the Fight to the Edge: Turning Time Into an Advantage in OT Security </p><p class="embed__description"> Unit 42 research reveals most OT attacks begin in IT. Learn how edge-driven defense stops threats early and turns dwell time into advantage. </p><p class="embed__link"> unit42.paloaltonetworks.com/ot-edge-security </p></div><img class="embed__image embed__image--right" src="https://unit42.paloaltonetworks.com/wp-content/uploads/2026/02/09_Security-Technology_Category_1505x922.jpg"/></a></div><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/zyxel-patches-critical-vulnerability-in-many-device-models/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">Zyxel Patches Critical Vulnerability in Many Device Models</a></p></li></ul><hr class="content_break"><p class="paragraph" style="text-align:left;">🌱 <i><b>Gardyn</b></i><b> indoor smart gardens had two critical and two high-severity security flaws</b> that could allow remote attackers to take control. <i>Gardyn</i> and CISA <a class="link" href="https://www.cisa.gov/news-events/ics-advisories/icsa-26-055-03?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">say</a> patches and app/firmware updates have been released and most devices should be updated automatically. Researchers estimate about 138,000 devices were affected but there is no evidence the flaws were exploited in the wild.</p><p class="paragraph" style="text-align:left;">🔓️ 🛜 <b>Researchers found a new Wi‑Fi attack called </b><i><b>AirSnitch</b></i><b> that can break encryption</b> and expose data. The <a class="link" href="https://arstechnica.com/security/2026/02/new-airsnitch-attack-breaks-wi-fi-encryption-in-homes-offices-and-enterprises/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">flaw affects home, office, and enterprise networks</a> and exploits weaknesses in Wi‑Fi design. This shows many devices and users remain vulnerable despite past security improvements.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#f0f0f0;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">💬 CONNECT</h3><p class="paragraph" style="text-align:left;">Follow me on <a class="link" href="https://infosec.exchange/@0x58?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">Mastodon</a> for quick daily updates and bite-sized content.</p><p class="paragraph" style="text-align:left;">Prefer using an RSS feed? Add <b>Infosec MASHUP</b> to your feed <a class="link" href="https://rss.beehiiv.com/feeds/HVhiKYpQlR.xml?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">here</a>.</p><p class="paragraph" style="text-align:center;"><b>Enjoying our newsletter? </b>Forward it to a colleague—<br>it’s one of the best ways to support us.</p><p class="paragraph" style="text-align:left;">Thanks for reading today’s newsletter, and if you&#39;re enjoying it and want to support my work, you can <b>buy me a coffee</b> ☕ over at <a class="link" href="https://www.buymeacoffee.com/0x58?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care" target="_blank" rel="noopener noreferrer nofollow">https://www.buymeacoffee.com/0x58</a></p><p class="paragraph" style="text-align:left;"> See you next time!</p><p class="paragraph" style="text-align:left;">-X.</p></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=169e59b7-b236-4d8b-84f0-84533adac142&utm_medium=post_rss&utm_source=x_s_infosec_newsletter">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>🕵🏻‍♂️ [InfoSec MASHUP] 08/2026 - Credentials beat exploits in 2025</title>
  <description>Attackers aren&#39;t hacking in — they&#39;re logging in. Identity is the new perimeter, and this week&#39;s news proves it.</description>
  <link>https://infosec-mashup.santolaria.net/p/infosec-mashup-08-2026-credentials-beat-exploits-in-2025</link>
  <guid isPermaLink="true">https://infosec-mashup.santolaria.net/p/infosec-mashup-08-2026-credentials-beat-exploits-in-2025</guid>
  <pubDate>Sat, 21 Feb 2026 09:30:00 +0000</pubDate>
  <atom:published>2026-02-21T09:30:00Z</atom:published>
    <dc:creator>Xavier Santolaria</dc:creator>
    <category><![CDATA[Malware]]></category>
    <category><![CDATA[Opensource]]></category>
    <category><![CDATA[Privacy]]></category>
    <category><![CDATA[Cybersecurity]]></category>
    <category><![CDATA[Threat Intelligence]]></category>
    <category><![CDATA[Ai]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'IBM Plex Sans',-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'IBM Plex Sans',-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">We now have <b>{{active_subscriber_count}} active subscribers</b>! Thank you all for being part of my newsletter. Please share it with your friends and colleagues, and let’s keep growing the community.</p><hr class="content_break"><p class="paragraph" style="text-align:left;">This week’s signal from the trenches: attackers aren’t “hacking in” — they’re logging in.</p><p class="paragraph" style="text-align:left;">According to the <a class="link" href="https://www.paloaltonetworks.com/resources/research/unit-42-incident-response-report?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">latest annual incident response report</a> from <b>Palo Alto Networks Unit 42</b>, identity-based techniques accounted for nearly two-thirds of all initial network intrusions last year. Not zero-days. Not sophisticated malware chains. Credentials. Tokens. Sessions. Trust relationships. The perimeter keeps getting better — and increasingly irrelevant — while identity becomes the primary attack surface.</p><p class="paragraph" style="text-align:left;">For defenders, that statistic reframes the priority stack. If identity is the new ingress vector, then IAM hygiene, MFA resilience, privileged access governance, and session monitoring aren’t supporting controls — they’re frontline defenses. This week’s mashup makes one thing clear: compromise doesn’t start with exploitation. It starts with authentication.</p><p class="paragraph" style="text-align:left;">Oh, and the <a class="link" href="https://xsa.github.io/infosec-events/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">infosec-events</a> community repository got some nice upgrades this week. The site now offers a <b>subscribable ICS calendar feed</b> — paste the URL into Google Calendar, Apple Calendar, or Outlook and get all upcoming events synced automatically. A <b>Mastodon bot</b> (<a class="link" href="https://infosec.exchange/@infosecevents?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">@infosecevents@infosec.exchange</a>) now posts weekly digests of upcoming events and alerts when new ones are added. On the site itself, a new <b>filter and search bar</b> lets you narrow down the upcoming events by continent, city, or name, and toggle free-only events — making it much easier to find what&#39;s relevant to you. Contributions welcome as always <a class="link" href="https://github.com/xsa/infosec-events?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">via GitHub</a>.</p><p class="paragraph" style="text-align:left;">Let’s now dive into this week’s top insights! 🚀</p><h2 class="heading" style="text-align:left;">Table of Contents</h2><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="#breaches-security-incidents" rel="noopener noreferrer nofollow">BREACHES & SECURITY INCIDENTS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#cybercrime-cyber-espionage-ap-ts" rel="noopener noreferrer nofollow">CYBERCRIME, CYBER ESPIONAGE, APT’s</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#government-politics-and-privacy" rel="noopener noreferrer nofollow">GOVERNMENT, POLITICS, AND PRIVACY</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#malware-threats" rel="noopener noreferrer nofollow">MALWARE & THREATS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#ai-crypto-tech-tools" rel="noopener noreferrer nofollow">AI, CRYPTO, TECH & TOOLS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#vulnerabilities-research-and-threat" rel="noopener noreferrer nofollow">VULNERABILITIES, RESEARCH, AND THREAT INTELLIGENCE</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#ics-ot-io-t" rel="noopener noreferrer nofollow">ICS, OT & IoT</a></p></li></ul><div id="breaches-security-incidents" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🔓 BREACHES & SECURITY INCIDENTS</h3><p class="paragraph" style="text-align:left;">🅿️ <b>PayPal says a software error exposed customers&#39; personal data</b>, including Social Security numbers, <a class="link" href="https://www.documentcloud.org/documents/27345193-paypal-february-2026-breach-notification/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">from July to December 2025</a>. The company fixed the code, reset affected passwords, and is offering two years of free credit monitoring. Some customers saw unauthorized transactions and received refunds.</p><p class="paragraph" style="text-align:left;">🇫🇷 🏦 <b>France’s Ministry of Economy disclosed a breach of the national bank account registry FICOBA that exposed 1.2 million accounts</b> — An <a class="link" href="https://www.securityweek.com/french-government-says-1-2-million-bank-accounts-exposed-in-breach/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">attacker used stolen official credentials</a> to access names, addresses, IBANs and some tax IDs; access is now blocked and affected people are being notified. Security experts warned that broad access tied to single identities makes such large exposures easier and companies should limit privileges by need.</p><p class="paragraph" style="text-align:left;">🇩🇪 🚂 💥 <b>Germany’s rail operator </b><i><b>Deutsche Bahn</b></i><b> was hit by a large DDoS attack that disrupted ticketing</b> and some IT systems. The <a class="link" href="https://www.securityweek.com/german-rail-giant-deutsche-bahn-hit-by-large-scale-ddos-attack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">attack began Feb 17</a>, came in waves, and briefly made websites and the DB Navigator app intermittently inaccessible. No culprit has been named, though similar attacks on German infrastructure have been linked to pro‑Russian hacktivist groups.</p><p class="paragraph" style="text-align:left;">🇺🇸 <b>Hackers breached </b><i><b>Figure Technology Solutions</b></i><b> and stole personal data</b> from about 967,200 accounts. The stolen files included names, emails, phone numbers, addresses, and dates of birth. The <a class="link" href="https://techcrunch.com/2026/02/13/fintech-lending-giant-figure-confirms-data-breach/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow"><i>ShinyHunters</i></a><a class="link" href="https://techcrunch.com/2026/02/13/fintech-lending-giant-figure-confirms-data-breach/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow"> group claimed responsibility</a> and leaked the data after a social-engineering attack.</p><p class="paragraph" style="text-align:left;">🇳🇱 🚂 <b>Hackers stole customer data from </b><i><b>Eurail</b></i><b> and are offering it for sale online</b> — The leaked files may include names, contact details, passport copies, travel reservations, and bank info for millions of customers. <i>Eurail</i> <a class="link" href="https://www.securityweek.com/hackers-offer-to-sell-millions-of-eurail-user-records/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">says</a> it is investigating while hackers threaten to publish all stolen data if no buyer is found.</p><p class="paragraph" style="text-align:left;">🇨🇦 🐻 <b>Hackers claiming to be </b><i><b>ShinyHunters</b></i><b> leaked a 1.67 GB dataset of over 600,000 Canada Goose</b> customer records. Canada Goose says the <a class="link" href="https://www.bleepingcomputer.com/news/security/canada-goose-investigating-as-hackers-leak-600k-customer-records/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">data appears to be historical</a>, it has found no breach of its systems, and no full payment card numbers were exposed. The leaked details could still enable phishing, fraud, and customer profiling.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;border-color:#3587E8;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🔗<i><b> Partners and Affiliates</b></i></p><p class="paragraph" style="text-align:left;">🔐 <a class="link" href="https://go.nordvpn.net/aff_c?offer_id=15&aff_id=84917&url_id=902&utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">NordVPN Threat Protection Pro™ Campaign</a></p><p class="paragraph" style="text-align:left;"><i>With its user-friendly interface, robust security features, and commitment to privacy, NordVPN continues to be a popular choice for individuals seeking online protection and unrestricted internet access.</i></p><p class="paragraph" style="text-align:left;"><i><b>Special Offer</b></i><i>: </i>get up to 73% off with a 2-year plan!</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://go.nordvpn.net/aff_c?offer_id=15&aff_id=84917&url_id=902&utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025"><span class="button__text" style=""> GET THE DEAL </span></a></div></div><p class="paragraph" style="text-align:left;"></p><div id="cybercrime-cyber-espionage-ap-ts" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🥷🏻 CYBERCRIME, CYBER ESPIONAGE, APT’s</h3><p class="paragraph" style="text-align:left;">🇺🇸 🇮🇷 <b>Three former Google engineers and one husband were indicted for stealing trade secrets from Google and other tech firms</b> and sending them to unauthorized locations, including Iran. The <a class="link" href="https://www.justice.gov/usao-ndca/pr/silicon-valley-engineers-charged-stealing-trade-secrets-leading-tech-companies-and?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">defendants allegedly copied files about processor security and cryptography</a>, hid their actions, and photographed screens after access was revoked. If convicted, each faces up to 10 years for trade secret theft and up to 20 years for obstruction.</p><p class="paragraph" style="text-align:left;">🇺🇦 🇰🇵 <b>A Ukrainian, Oleksandr Didenko, was sentenced to five years for running a scheme that helped North Korea</b> hire <a class="link" href="https://cyberscoop.com/doj-ukrainian-north-korea-remote-worker-scheme-facilitator-sentenced/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">remote IT workers at U.S. companies</a>. He stole identities, created over 2,500 fake accounts, and sold them to North Korean operatives. Authorities say the payments supported North Korea’s regime and posed national security risks.</p><p class="paragraph" style="text-align:left;">🌍️ <b>African police arrested 651 suspects in a coordinated INTERPOL operation</b> against investment fraud, mobile money scams, and fake loan apps. Authorities across 16 countries <a class="link" href="https://www.interpol.int/News-and-Events/News/2026/Major-operation-in-Africa-targeting-online-scams-nets-651-arrests-recovers-USD-4.3-million?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">seized devices, shut down 1,442 malicious sites, and recovered over $4.3 million</a> while identifying 1,247 victims. The operation highlights cross-border collaboration to disrupt large cybercriminal networks.</p><p class="paragraph" style="text-align:left;">🇳🇬 🇺🇸 ⚖️ <b>A Nigerian man, Matthew Akande, was sentenced to eight years for running a five-year scheme</b> that <a class="link" href="https://cyberscoop.com/nigerian-matthew-akande-tax-refund-fraud/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">filed over 1,000 fraudulent U.S. tax returns</a>. He and co-conspirators stole client data, used phishing and malware, and obtained more than $1.3 million in false refunds. Akande was arrested in 2024, extradited to the U.S., pleaded guilty, and must pay about $1.4 million in restitution.</p><p class="paragraph" style="text-align:left;">🇪🇸 🏨 <b>Spanish police arrested a 20-year-old who hacked a hotel booking site to pay as little as one cent</b> for luxury rooms. He <a class="link" href="https://techxplore.com/news/2026-02-spanish-police-hacker-luxury-hotels.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">altered the payment validation so bookings looked fully paid</a> while only one cent was charged. Hotels lost over €20,000 and he was caught staying in a Madrid hotel with a €4,000 reservation.</p><p class="paragraph" style="text-align:left;">🇵🇱 <b>Polish police arrested a 47-year-old suspect linked to the </b><i><b>Phobos</b></i><b> ransomware group and seized computers</b> and phones with stolen credentials and server data. The <a class="link" href="https://www.europol.europa.eu/media-press/newsroom/news/key-figures-behind-phobos-and-8base-ransomware-arrested-in-international-cybercrime-crackdown?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">arrest was part of Operation Aether</a>, an international effort coordinated by Europol targeting Phobos infrastructure and affiliates. The suspect faces charges for creating and distributing hacking tools and could get up to five years in prison.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#f0f0f0;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🗓️ <a class="link" href="https://xsa.github.io/infosec-events/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow"><b>{Cyber,Info}Sec Events</b></a> — A community-maintained list of infosec conferences worldwide. Subscribe to the <a class="link" href="https://xsa.github.io/infosec-events/events.ics?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">ICS calendar feed</a> to get events straight into your calendar, or follow <a class="link" href="https://infosec.exchange/@infosecevents?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">@infosecevents@infosec.exchange</a> on Mastodon for weekly digests. Contributions and ⭐ welcome!</p></div><p class="paragraph" style="text-align:left;"></p><div id="government-politics-and-privacy" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">👨🏻‍⚖️ 👀 GOVERNMENT, POLITICS, AND PRIVACY</h3><div class="embed"><a class="embed__url" href="https://www.404media.co/underground-facial-recognition-tool-unmasks-camgirls/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank"><div class="embed__content"><p class="embed__title"> Underground Facial Recognition Tool Unmasks Camgirls </p><p class="embed__description"> The site, camgirlfinder, is explicitly built as a tool to let people find a model&#39;s presence on other streaming platforms. The creator says “If that is a problem for you then the sad reality is this job is not for you.” </p><p class="embed__link"> www.404media.co/underground-facial-recognition-tool-unmasks-camgirls </p></div><img class="embed__image embed__image--right" src="https://www.404media.co/content/images/size/w1200/2026/02/dasha-yukhymyuk-s4qtCUodkQ4-unsplash.jpg"/></a></div><p class="paragraph" style="text-align:left;">🇵🇱 🇨🇳 <b>Poland’s army now bars Chinese-made cars from entering protected military sites</b> over information security risks. The <a class="link" href="https://therecord.media/poland-bans-chinese-made-cars-from-military-sites?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">ban targets vehicle systems that can record</a> or transmit location, images, or sound. The rule is preventive, follows NATO practices, and does not affect public use of these cars.</p><p class="paragraph" style="text-align:left;">🇺🇸 🧑‍⚖️ <b>A judge scolded members of Mark Zuckerberg’s team for wearing Ray-Ban Meta AI glasses with a camera as they entered a Los Angeles courtroom</b> — The <a class="link" href="https://www.cbsnews.com/news/meta-trial-mark-zuckerberg-ai-glasses/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">judge ordered the glasses removed</a> and warned anyone who recorded must dispose of footage or face contempt. The incident occurred during a trial over whether Meta and YouTube design platforms that harm children.</p><p class="paragraph" style="text-align:left;">🇺🇸 🇨🇳 <b>Texas sued TP-Link, accusing it of hiding that its routers are built from Chinese parts and are vulnerable</b> to state-backed Chinese hackers. The <a class="link" href="https://www.bleepingcomputer.com/news/security/texas-sues-tp-link-over-chinese-hacking-risks-user-deception/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">suit says TP-Link misled consumers about security</a> and that its devices were used in large botnets and credential-theft attacks. Texas seeks fines and orders forcing disclosure of Chinese origins and an end to collecting user data without consent.</p><div class="image"><a class="image__link" href="https://infosec.exchange/@cR0w/116097631791431795?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" rel="noopener" target="_blank"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/1b1b3a57-3a7d-46fa-909c-c82cd71d2500/Screenshot_2026-02-19_at_14.56.02.png?t=1771509393"/></a><div class="image__source"><a class="image__source_link" href="https://infosec.exchange/@cR0w/116097631791431795?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" rel="noopener" target="_blank"><span class="image__source_text"><p>Figure: “So when are they going to sue Cisco, Fortinet, F5, Palo Alto, Ivanti etc.?” / @cR0w</p></span></a></div></div><hr class="content_break"><p class="paragraph" style="text-align:left;">🇪🇸 ⚽️ <b>A Spanish court ordered NordVPN and ProtonVPN to block 16 websites and related IPs that stream </b><i><b>LaLiga</b></i><b> matches</b> illegally. The ruling was made without the VPNs being heard, and the companies say they were not notified. <i>LaLiga</i> <a class="link" href="https://www.laliga.com/en-GB/news/information-note-on-the-precautionary-measures-granted-to-laliga-against-nordvpn-and-protonvpn?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">says</a> VPNs enable piracy and must help stop it, while VPNs argue the order is procedurally invalid and ineffective.</p><p class="paragraph" style="text-align:left;">👀 🇦🇴 <b>Amnesty International says Intellexa’s Predator spyware was used to hack an Angolan journalist’s iPhone</b> via a WhatsApp link. The hack shows <a class="link" href="https://techcrunch.com/2026/02/17/intellexas-predator-spyware-used-to-hack-iphone-of-journalist-in-angola-research-says/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">governments are using commercial spyware</a> to target journalists and others. Researchers found forensic links to Intellexa but could not identify the exact customer.</p><p class="paragraph" style="text-align:left;">🇮🇪 <b>Ireland&#39;s Data Protection Commission has opened a formal probe into X</b> over its <a class="link" href="https://www.bleepingcomputer.com/news/security/ireland-now-also-investigating-x-over-grok-made-sexual-images/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">Grok AI creating non-consensual sexual images</a>, including of children. The investigation will check if X complied with GDPR rules like lawful processing and data protection by design. This adds to multiple international probes into Grok, which could lead to big fines across the EU.</p><p class="paragraph" style="text-align:left;">🔕 👀 <b>Amazon’s Ring ended plans to integrate with surveillance firm Flock Safety</b> after announcing the joint project would take more time and resources than expected. The <a class="link" href="https://www.securityweek.com/amazon-scraps-partnership-with-surveillance-company-after-super-bowl-ad-backlash/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">cancellation came amid backlash to a Super Bowl ad</a> showing a camera network finding a lost dog, which sparked fears about intrusive tracking and face recognition. Privacy advocates and a U.S. senator warned Ring’s features could erode civil liberties.</p><p class="paragraph" style="text-align:left;">→ <a class="link" href="https://www.404media.co/leaked-email-suggests-ring-plans-to-expand-search-party-surveillance-beyond-dogs/?ref=daily-stories-newsletter&utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">Leaked Email Suggests Ring Plans to Expand ‘Search Party’ Surveillance Beyond Dogs</a></p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;border-color:#3587E8;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🔗<i><b> Partners and Affiliates</b></i></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/6f403f9b-d3a1-4d60-9852-f0e0f9340b87/image.png?t=1740643992"/></div><p class="paragraph" style="text-align:center;">🌐 <i>Stay connected and secure on the go with </i><i><b><a class="link" href="https://airalo.pxf.io/c/5582065/1345899/15608?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">Airalo</a></b></i><i>&#39;s global eSIMs — Use the code </i><i><b>NEWTOAIRALO15</b></i><i> if you’re new to Airalo to get an additional 15% discount.</i></p></div><p class="paragraph" style="text-align:left;"></p><div id="malware-threats" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🦠 MALWARE & THREATS</h3><div class="embed"><a class="embed__url" href="https://www.infostealers.com/article/hudson-rock-identifies-real-world-infostealer-infection-targeting-openclaw-configurations/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank"><div class="embed__content"><p class="embed__title"> Hudson Rock Identifies Real-World Infostealer Infection Targeting OpenClaw Configurations </p><p class="embed__description"> Following our initial research into ClawdBot, Hudson Rock has now detected a live infection where an infostealer successfully exfiltrated a victim&#39;s OpenClaw configuration environment. This finding marks a significant milestone in the evolution of infostealer behavior: the transition from stealing browser credentials to harvesting the &quot;souls&quot; and identities of personal AI agents. </p><p class="embed__link"> www.infostealers.com/article/hudson-rock-identifies-real-world-infostealer-infection-targeting-openclaw-configurations </p></div><img class="embed__image embed__image--right" src="https://www.infostealers.com/wp-content/uploads/2026/02/openclaw1.png"/></a></div><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/25ddde12-4782-4396-bab8-202829afdae2/Screenshot_2026-02-18_at_16.55.18.png?t=1771430160"/><div class="image__source"><a class="image__source_link" href="https://infosec.exchange/@adamshostack/116092439131130879?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" rel="noopener" target="_blank"><span class="image__source_text"><p>Figure: Adam Shostack’s Toot</p></span></a></div></div><blockquote align="center" class="twitter-tweet"><a href="https://twitter.com/steipete/status/2024377436423541145?s=20&utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025"><p> Twitter tweet </p></a></blockquote><p class="paragraph" style="text-align:left;">→ <a class="link" href="https://www.securityweek.com/openclaw-security-issues-continue-as-secureclaw-open-source-tool-debuts/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">OpenClaw Security Issues Continue as SecureClaw Open Source Tool Debuts</a></p><p class="paragraph" style="text-align:left;">→ <a class="link" href="https://thehackernews.com/2026/02/cline-cli-230-supply-chain-attack.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems</a></p><hr class="content_break"><p class="paragraph" style="text-align:left;">🏧 🤑 <b>The FBI warns of a rise in ATM jackpotting, with over 700 attacks in 2025</b> and losses above $20 million. Attackers install malware like <i>Ploutus</i> to make ATMs spit out cash quickly. Authorities are <a class="link" href="https://www.ic3.gov/CSA/2026/260219.pdf?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">prosecuting suspects</a> and sharing detection tips.</p><p class="paragraph" style="text-align:left;">📺️ <b>Researchers found a new Android trojan called </b><i><b>Massiv</b></i><b> that hides in fake IPTV apps</b> to steal banking data. It uses overlays, keylogging, SMS interception, and remote control to take over devices and commit fraud. <i>Massiv</i> <a class="link" href="https://www.threatfabric.com/blogs/massiv-when-your-iptv-app-terminates-your-savings?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">spreads via SMS droppers</a> and targets users in Spain, Portugal, France, and Turkey.</p><p class="paragraph" style="text-align:left;">🤖 <b>Researchers at ESET found </b><i><b>PromptSpy</b></i><b>, an Android malware that uses Google’s Gemini AI</b> during runtime to guide taps and swipes for persistence. It uses a VNC module and Accessibility Services to steal PINs, capture screens, block uninstallation, and lock itself in recent apps. ESET <a class="link" href="https://www.welivesecurity.com/en/eset-research/promptspy-ushers-in-era-android-threats-using-genai/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">says</a> it may be a proof of concept with possible links to Chinese developers and a delivery domain aimed at Argentina.</p><p class="paragraph" style="text-align:left;">🔙 🚪 📲 <b>Kaspersky found a new Android backdoor called </b><i><b>Keenadu</b></i><b> preinstalled on many devices</b> and pushed via firmware updates or fake apps. The malware gives attackers full remote control but is mainly used for ad fraud like hijacking searches and clicking ads. Infections were seen on about 13,000 devices worldwide and <a class="link" href="https://securelist.com/keenadu-android-backdoor/118913/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">researchers link </a><a class="link" href="https://securelist.com/keenadu-android-backdoor/118913/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow"><i>Keenadu</i></a><a class="link" href="https://securelist.com/keenadu-android-backdoor/118913/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow"> to large botnets with likely Chinese origins</a>.</p><p class="paragraph" style="text-align:left;">🤖 <b>Researchers found Microsoft Copilot and xAI Grok can be abused as stealthy malware command-and-control (C2) relays</b> by using their web-browsing and URL-fetch features. This <a class="link" href="https://research.checkpoint.com/2026/ai-in-the-middle-turning-web-based-ai-services-into-c2-proxies-the-future-of-ai-driven-attacks/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">lets compromised machines fetch attacker command</a>s and send data back through the AI without needing API keys or accounts. The technique could enable AI-driven malware that adapts and evades detection.</p></div><p class="paragraph" style="text-align:left;"></p><div id="ai-crypto-tech-tools" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🤖 🧰 AI, CRYPTO, TECH & TOOLS</h3><p class="paragraph" style="text-align:left;">🔎 <b>Anthropic launched Claude Code Security, an AI tool that scans code for vulnerabilities</b> and suggests fixes. It <a class="link" href="https://www.anthropic.com/news/claude-code-security?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">will roll out first to select enterprise and team testers</a> after extensive internal and lab testing. The company says the tool speeds up finding bugs but human experts are still needed for higher-level threats.</p><p class="paragraph" style="text-align:left;">👀 📧 <b>Microsoft confirmed a bug let Copilot Chat read and summarize customers’ confidential emails without permission</b> — The issue affected emails labeled confidential since January, even when data-loss-prevention rules were in place. Microsoft <a class="link" href="https://techcrunch.com/2026/02/18/microsoft-says-office-bug-exposed-customers-confidential-emails-to-copilot-ai/?utm_source=forwardfuture.ai&utm_medium=newsletter&utm_campaign=china-s-robot-showcase-india-s-ai-push-meta-s-65m-bet&_bhlid=8130c57462a3d29d2d17c7fb02725d94d7638a99" target="_blank" rel="noopener noreferrer nofollow">says it started rolling out a fix</a> in February.</p><p class="paragraph" style="text-align:left;">🚫 <b>DEF CON has banned three people—Pablos Holman, Vincenzo Iozzo, and Joichi Ito—after they appeared in DOJ files</b> and <a class="link" href="https://techcrunch.com/2026/02/18/hacking-conference-def-con-bans-three-people-linked-to-epstein/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">emails connected to Jeffrey Epstein</a>. The bans follow reporting linking them to Epstein and similar moves by other cybersecurity events. The three have disputed wrongdoing, saying interactions were business-related or minimal.</p><p class="paragraph" style="text-align:left;">🍎 💬 🔐 <b>Apple is testing end-to-end encrypted RCS messaging</b> in the iOS and iPadOS 26.4 developer beta. The <a class="link" href="https://developer.apple.com/documentation/ios-ipados-release-notes/ios-ipados-26_4-release-notes?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">feature</a> is limited to Apple devices and not all carriers or devices yet. The beta also adds stronger memory safety protections and stolen device safeguards.</p><p class="paragraph" style="text-align:left;">📱 🤖 <b>Google released the first Android 17 beta with new privacy and security defaults</b> — It blocks unencrypted cleartext traffic by default for new apps and adds HPKE support for stronger encryption. Other <a class="link" href="https://android-developers.googleblog.com/2026/02/the-first-beta-of-android-17.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">changes</a> include default certificate transparency, a new install-time <i>localhost</i> permission, and a push toward “secure-by-default” app behavior.</p></div><p class="paragraph" style="text-align:left;"></p><div id="vulnerabilities-research-and-threat" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🐛 🧠 VULNERABILITIES, RESEARCH, AND THREAT INTELLIGENCE</h3><p class="paragraph" style="text-align:left;">➝ From the Patching Department:</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/google-patches-first-actively-exploited-chrome-zero-day-of-2026/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">Google Patches First Actively Exploited Chrome Zero-Day of 2026</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://thehackernews.com/2026/02/microsoft-patches-cve-2026-26119.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">Microsoft Patches CVE-2026-26119 Privilege Escalation in Windows Admin Center</a></p></li></ul><hr class="content_break"><div class="embed"><a class="embed__url" href="https://unit42.paloaltonetworks.com/ivanti-cve-2026-1281-cve-2026-1340/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank"><div class="embed__content"><p class="embed__title"> Critical Vulnerabilities in Ivanti EPMM Exploited </p><p class="embed__description"> We discuss widespread exploitation of Ivanti EPMM zero-day vulns CVE-2026-1281 and CVE-2026-1340. Attackers are deploying web shells and backdoors. </p><p class="embed__link"> unit42.paloaltonetworks.com/ivanti-cve-2026-1281-cve-2026-1340 </p></div><img class="embed__image embed__image--right" src="https://unit42.paloaltonetworks.com/wp-content/uploads/2026/02/AdobeStock_1020436911.jpeg"/></a></div><p class="paragraph" style="text-align:left;">💥 <b>A critical pre-auth RCE in BeyondTrust remote support (CVE-2026-1731)</b> lets attackers run OS commands and fully compromise systems. Unit 42 <a class="link" href="https://unit42.paloaltonetworks.com/beyondtrust-cve-2026-1731/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">observed active exploitation using webshells</a>, <i>SparkRAT</i>, <i>VShell</i>, lateral movement, and data exfiltration across multiple sectors and countries. Patches and mitigations exist, and many instances remain exposed, so urgent patching and monitoring are needed.</p><p class="paragraph" style="text-align:left;">🇨🇳 🫥 <b>Chinese-linked hackers used a Dell RecoverPoint zero-day (CVE-2026-22769) to get root access</b> and <a class="link" href="https://cyberscoop.com/china-brickstorm-grimbolt-dell-zero-day/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">stay hidden for about 18 months</a>. Researchers say the group replaced older malware with a harder-to-detect backdoor and likely compromised dozens of organizations. Dell has released a patch and agencies are sharing detection guidance.</p><p class="paragraph" style="text-align:left;">🔓️ ☁️ <b>Researchers at ETH Zurich found that popular cloud password managers (Bitwarden, LastPass, Dashlane, 1Password) can have vaults compromised</b> if the provider’s servers are fully malicious. They <a class="link" href="https://eprint.iacr.org/2026/058.pdf?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">exploited</a> recovery, SSO, sharing, and compatibility features to read and sometimes modify users’ stored credentials. Vendors say fixes and mitigations are being rolled out, but some issues are design trade-offs or hard to fully eliminate.</p><p class="paragraph" style="text-align:left;">→ <a class="link" href="https://arstechnica.com/security/2026/02/password-managers-promise-that-they-cant-see-your-vaults-isnt-always-true/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">Password managers&#39; promise that they can&#39;t see your vaults isn&#39;t always true</a></p></div><p class="paragraph" style="text-align:left;"></p><div id="ics-ot-io-t" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🛰️ ICS, OT & IoT</h3><p class="paragraph" style="text-align:left;">🎥 🐛 <b>CISA warns a critical Honeywell CCTV flaw (CVE-2026-1670) lets attackers change recovery emails</b> and take over accounts. The <a class="link" href="https://www.cisa.gov/news-events/ics-advisories/icsa-26-048-04?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">bug scores 9.8 and affects several mid‑level Honeywell camera</a> models. Users should isolate devices, use secure remote access, and contact Honeywell for patch guidance.</p><p class="paragraph" style="text-align:left;">🏠️ <b>A security researcher found that DJI Romo robovacs and some power stations leaked lots of data</b> to public servers he could read. He <a class="link" href="https://www.theverge.com/tech/879088/dji-romo-hack-vulnerability-remote-control-camera-access-mqtt?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">could see live video and control devices</a> before DJI partially fixed the issue. The incident shows weak security and raises concerns about who can access people’s home cameras and data.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#f0f0f0;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">💬 CONNECT</h3><p class="paragraph" style="text-align:left;">Follow me on <a class="link" href="https://infosec.exchange/@0x58?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">Mastodon</a> for quick daily updates and bite-sized content.</p><p class="paragraph" style="text-align:left;">Prefer using an RSS feed? Add <b>Infosec MASHUP</b> to your feed <a class="link" href="https://rss.beehiiv.com/feeds/HVhiKYpQlR.xml?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">here</a>.</p><p class="paragraph" style="text-align:center;"><b>Enjoying our newsletter? </b>Forward it to a colleague—<br>it’s one of the best ways to support us.</p><p class="paragraph" style="text-align:left;">Thanks for reading today’s newsletter, and if you&#39;re enjoying it and want to support my work, you can <b>buy me a coffee</b> ☕ over at <a class="link" href="https://www.buymeacoffee.com/0x58?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-08-2026-credentials-beat-exploits-in-2025" target="_blank" rel="noopener noreferrer nofollow">https://www.buymeacoffee.com/0x58</a></p><p class="paragraph" style="text-align:left;"> See you next time!</p><p class="paragraph" style="text-align:left;">-X.</p></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=9dfea7c0-6425-4b0b-b92c-3022b8a2558d&utm_medium=post_rss&utm_source=x_s_infosec_newsletter">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>🕵🏻‍♂️ [InfoSec MASHUP] 07/2026</title>
  <description>European Commission Investigating Cyberattack; OpenClaw Integrates VirusTotal Scanning to Detect Malicious ClawHub Skills; Russia is trying to fully block WhatsApp; Louis Vuitton, Dior, and Tiffany fined $25 million over data breaches;</description>
  <link>https://infosec-mashup.santolaria.net/p/infosec-mashup-07-2026</link>
  <guid isPermaLink="true">https://infosec-mashup.santolaria.net/p/infosec-mashup-07-2026</guid>
  <pubDate>Sat, 14 Feb 2026 09:30:18 +0000</pubDate>
  <atom:published>2026-02-14T09:30:18Z</atom:published>
    <dc:creator>Xavier Santolaria</dc:creator>
    <category><![CDATA[Malware]]></category>
    <category><![CDATA[Opensource]]></category>
    <category><![CDATA[Privacy]]></category>
    <category><![CDATA[Cybersecurity]]></category>
    <category><![CDATA[Threat Intelligence]]></category>
    <category><![CDATA[Ai]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'IBM Plex Sans',-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'IBM Plex Sans',-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">We now have <b>{{active_subscriber_count}} active subscribers</b>! Thank you all for being part of my newsletter. Please share it with your friends and colleagues, and let’s keep growing the community.</p><hr class="content_break"><p class="paragraph" style="text-align:left;">As AI tools become the fastest, cheapest way to get medical advice, a quiet gap is opening in how our most sensitive data is protected. Many AI-powered health assistants — built by companies like OpenAI, Anthropic, and Google — operate outside traditional healthcare regulations such as HIPAA. The result: deeply personal health data may be handled under consumer-tech privacy standards, not medical ones.</p><p class="paragraph" style="text-align:left;">This isn’t just a healthcare story. It’s a pattern we’re seeing across industries and geographies: <b>AI systems moving faster than the regulations designed for the roles they’re now playing</b>. From finance to education, from HR to legal advice, AI increasingly acts like a regulated professional — without always being treated like one under the law.</p><p class="paragraph" style="text-align:left;">As convenience wins and guardrails lag, this week’s news raises a familiar infosec question: when technology changes the <i>function</i>, but regulation still defines the <i>form</i>, where does accountability really sit?</p><p class="paragraph" style="text-align:left;">Let’s now dive into this week’s top insights! 🚀</p><h2 class="heading" style="text-align:left;">Table of Contents</h2><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="#breaches-security-incidents" rel="noopener noreferrer nofollow">BREACHES & SECURITY INCIDENTS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#cybercrime-cyber-espionage-ap-ts" rel="noopener noreferrer nofollow">CYBERCRIME, CYBER ESPIONAGE, APT’s</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#government-politics-and-privacy" rel="noopener noreferrer nofollow">GOVERNMENT, POLITICS, AND PRIVACY</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#malware-threats" rel="noopener noreferrer nofollow">MALWARE & THREATS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#ai-crypto-tech-tools" rel="noopener noreferrer nofollow">AI, CRYPTO, TECH & TOOLS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#vulnerabilities-research-and-threat" rel="noopener noreferrer nofollow">VULNERABILITIES, RESEARCH, AND THREAT INTELLIGENCE</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#ics-ot-io-t" rel="noopener noreferrer nofollow">ICS, OT & IoT</a></p></li></ul><div id="breaches-security-incidents" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🔓 BREACHES & SECURITY INCIDENTS</h3><p class="paragraph" style="text-align:left;">🇯🇵 🍆 <b>Happy Valentine’s Day</b> — Sex toy maker <i>Tenga</i> alerted customers that a <a class="link" href="https://techcrunch.com/2026/02/13/sex-toys-maker-tenga-says-hacker-stole-customer-information/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">hacker accessed an employee email account</a> and may have stolen names, emails, and past order or support messages. The attacker also sent spam to the compromised contacts. <i>Tenga</i> reset credentials, enabled multi-factor authentication, and urged customers to change passwords and watch for suspicious emails.</p><p class="paragraph" style="text-align:left;">🇰🇷 💍 <b>South Korea fined Louis Vuitton, Dior, and Tiffany $25 million for poor security</b> that let <a class="link" href="https://www.bleepingcomputer.com/news/security/louis-vuitton-dior-and-tiffany-fined-25-million-over-data-breaches/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">hackers access customer data</a>. The breaches exposed names, contacts, addresses, and purchase histories for over 5.5 million people. Authorities said using SaaS does not remove companies’ duty to protect data.</p><p class="paragraph" style="text-align:left;">🇷🇴 🛢️ <b>Romania&#39;s oil pipeline operator </b><i><b>Conpet</b></i><b> confirmed it was hit by a Qilin ransomware attack</b> that stole company data. The company says <a class="link" href="https://www.bleepingcomputer.com/news/security/romanias-oil-pipeline-operator-conpet-confirms-data-stolen-in-attack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">operations were not affected</a> but it is working with national cyber authorities to investigate. Leaked documents may contain sensitive personal and financial information, so people should be wary of suspicious requests.</p><p class="paragraph" style="text-align:left;">🇳🇱 <b>Dutch telecom </b><i><b>Odido</b></i><b> says a cyberattack exposed personal data of about 6.2 million</b> customers. The <a class="link" href="https://www.bleepingcomputer.com/news/security/odido-data-breach-exposes-personal-info-of-62-million-customers/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">breach hit their customer contact system</a> and may include names, addresses, emails, phone numbers, IBANs, and ID numbers. <i>Odido</i> blocked access, alerted authorities, and is notifying affected customers.</p><p class="paragraph" style="text-align:left;">🇺🇸 🥼 <b>A May 2025 cyberattack on </b><i><b>ApolloMD</b></i><b> exposed PII and PHI for 626,540 people</b> — Stolen <a class="link" href="https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">data</a> included names, addresses, dates of birth, medical and insurance details, and possibly Social Security numbers. <i>ApolloMD</i> notified affected parties, offered free credit monitoring, and the <i>Qilin</i> group posted the breach online.</p><p class="paragraph" style="text-align:left;">🇺🇸 🚗 <b>Volvo Group North America had personal data of about 17,000 customers and staff exposed</b> after a breach <a class="link" href="https://www.bleepingcomputer.com/news/security/volvo-group-north-america-customer-data-exposed-in-conduent-hack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">at service provider Conduent</a>. The stolen data included names, Social Security numbers, birthdates, IDs, and medical and insurance details. Conduent is notifying affected people and offering identity and credit monitoring.</p><p class="paragraph" style="text-align:left;">👀 <b>A hacktivist scraped about 536,000 payment records from a vendor of stalkerware apps</b>, exposing customers’ email addresses and partial card details. The data covered services like <i>uMobix</i>, <i>Xnspy</i>, <i>Geofinder</i> and <i>Peekviewer</i> and was <a class="link" href="https://techcrunch.com/2026/02/09/hacktivist-scrapes-over-500000-stalkerware-customers-payment-records/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">verified by TechCrunch</a>. The vendor appears linked to companies called Ersten Group and Struktura, which did not respond to requests for comment.</p><p class="paragraph" style="text-align:left;">→ <a class="link" href="https://techcrunch.com/2026/02/09/hacked-leaked-exposed-why-you-should-stop-using-stalkerware-apps/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">Hacked, leaked, exposed: Why you should never use stalkerware apps</a></p><p class="paragraph" style="text-align:left;">🇪🇺 👀 <b>The European Commission’s CERT-EU found signs of a cyberattack on its IT systems</b> used for mobile device management. The <a class="link" href="https://ec.europa.eu/commission/presscorner/detail/en/ip_26_342?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">incident was contained and cleaned within nine hours</a>, and no mobile devices were compromised. Some staff names and phone numbers may have been accessed and a full review is underway.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;border-color:#3587E8;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🔗<i><b> Partners and Affiliates</b></i></p><p class="paragraph" style="text-align:left;">🔐 <a class="link" href="https://go.nordvpn.net/aff_c?offer_id=15&aff_id=84917&url_id=902&utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">NordVPN Threat Protection Pro™ Campaign</a></p><p class="paragraph" style="text-align:left;"><i>With its user-friendly interface, robust security features, and commitment to privacy, NordVPN continues to be a popular choice for individuals seeking online protection and unrestricted internet access.</i></p><p class="paragraph" style="text-align:left;"><i><b>Special Offer</b></i><i>: </i>get up to 73% off with a 2-year plan!</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://go.nordvpn.net/aff_c?offer_id=15&aff_id=84917&url_id=902&utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026"><span class="button__text" style=""> GET THE DEAL </span></a></div></div><p class="paragraph" style="text-align:left;"></p><div id="cybercrime-cyber-espionage-ap-ts" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🥷🏻 CYBERCRIME, CYBER ESPIONAGE, APT’s</h3><p class="paragraph" style="text-align:left;">🇵🇰 🇮🇳 <b>Pakistan-linked groups </b><i><b>SideCopy</b></i><b> and APT36 are running cross-platform campaigns targeting Indian defense</b> and government organizations. They <a class="link" href="https://www.aryaka.com/blog/espionage-without-noise-apt36-enduring-campaigns/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">use phishing lures to deliver remote access trojans</a> (Geta RAT, Ares RAT, DeskRAT) for long-term data theft and access on Windows and Linux. The attacks use stealthy techniques and trusted regional lures to maintain persistence and avoid detection.</p><p class="paragraph" style="text-align:left;">🇳🇱 <b>Dutch police arrested a 21-year-old seller accused of offering </b><i><b>JokerOTP</b></i><b>, a phishing tool</b> that intercepts one-time passcodes to hijack accounts. The <i>JokerOTP</i> service reportedly <a class="link" href="https://www.bleepingcomputer.com/news/security/police-arrest-seller-of-jokerotp-mfa-passcode-capturing-tool/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">caused over $10 million in losses across 28,000+ attacks</a> by automating calls that trick victims into revealing OTPs. Authorities dismantled the operation after a three-year probe and say more suspects and buyers will be prosecuted.</p><p class="paragraph" style="text-align:left;">🇨🇳 ⚖️ 🇺🇸 <b>Daren Li, a dual Chinese and St. Kitts and Nevis national, was sentenced in absentia to 20 years</b> for his <a class="link" href="https://www.bleepingcomputer.com/news/security/fugitive-behind-73m-pig-butchering-scheme-gets-20-years-in-prison/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">role in a cryptocurrency &quot;pig butchering&quot; scam</a> that stole over $73 million from U.S. victims. The scheme used romance and messaging apps to launder funds through shell companies, banks, and crypto platforms. Li fled before sentencing after cutting off his ankle monitor, and investigators found hundreds of millions in related crypto wallets.</p><p class="paragraph" style="text-align:left;">🇨🇳 🇸🇬 <b>Singapore&#39;s Cyber Security Agency says China-linked UNC3886 targeted the country</b>&#39;s four major telcos. Attackers used advanced tools, a zero-day exploit, and rootkits to gain access to network systems. CSA <a class="link" href="https://www.csa.gov.sg/news-events/press-releases/largest-multi-agency-cyber-operation-mounted-to-counter-threat-posed-by-advanced-persistent-threat--apt--actor-unc3886-to-singapore-s-telecommunications-sector/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">says</a> no customer data was seen taken and has closed the attackers&#39; access.</p><p class="paragraph" style="text-align:left;">🇺🇸 ⚖️ <b>Two Connecticut men are accused of using about 3,000 stolen identities to create fake accounts and steal roughly $3 million</b> from <i>FanDuel</i> and other gambling sites. They allegedly bought PII on darknet and Telegram, used background-check services to pass verifications, and tracked victims in a spreadsheet. Prosecutors <a class="link" href="https://www.bleepingcomputer.com/news/security/men-charged-in-massive-fanduel-fraud-scheme-fueled-by-thousands-of-stolen-identities/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">charged them with multiple counts</a> including wire fraud, identity fraud, and money laundering.</p><div class="embed"><a class="embed__url" href="https://unit42.paloaltonetworks.com/muddled-libra-ops-playbook/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank"><div class="embed__content"><p class="embed__title"> A Peek Into Muddled Libra’s Operational Playbook </p><p class="embed__description"> Explore the tools Unit 42 found on a Muddled Libra rogue host. Learn how they target domain controllers and use search engines to aid their attacks. </p><p class="embed__link"> unit42.paloaltonetworks.com/muddled-libra-ops-playbook </p></div><img class="embed__image embed__image--right" src="https://unit42.paloaltonetworks.com/wp-content/uploads/2026/02/03-1-Muddle-Libra-1920x900-1.png"/></a></div></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#f0f0f0;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🗓️ <b>{Cyber,Info}Sec Events</b>: My list of past and future <a class="link" href="https://github.com/xsa/infosec-events?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">{cyber,info}sec related events</a> — Feel free to contribute by submitting issues or pull requests (and don’t forget to <a class="link" href="https://github.com/xsa/infosec-events?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">star the project</a>); Thanks! 😉</p></div><p class="paragraph" style="text-align:left;"></p><div id="government-politics-and-privacy" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">👨🏻‍⚖️ 👀 GOVERNMENT, POLITICS, AND PRIVACY</h3><blockquote align="center" class="twitter-tweet"><a href="https://twitter.com/moxie/status/2021639939272978710?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026"><p> Twitter tweet </p></a></blockquote><p class="paragraph" style="text-align:left;">🎩 <b>Hacker Vincenzo Iozzo (@_snagg), linked in newly released documents to Jeffrey Epstein, was removed from Black Hat and Code Blue</b> conference websites. Iozzo says he only knew Epstein for business, <a class="link" href="https://techcrunch.com/2026/02/12/hacker-linked-to-epstein-removed-from-black-hat-cyber-conference-website/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">denies wrongdoing</a>, and welcomes an investigation. Conferences say his name was taken off their review boards amid the document release and unrelated membership updates.</p><p class="paragraph" style="text-align:left;">🛑 💬 🇷🇺 <b>Russia is trying to fully block WhatsApp and has already throttled Telegram</b> to push users onto the state-backed MAX app. WhatsApp and Telegram say this move harms privacy and safety and they will try to keep users connected. People in Russia can still use VPNs or external DNS for now, but those tools are also under pressure.</p><blockquote align="center" class="twitter-tweet"><a href="https://twitter.com/WhatsApp/status/2021749165835829485?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026"><p> Twitter tweet </p></a></blockquote><p class="paragraph" style="text-align:left;">🇺🇸 <b>Nevada announced a new statewide data classification policy</b> to standardize <a class="link" href="https://www.securityweek.com/nevada-unveils-new-statewide-data-classification-policy-months-after-cyberattack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">how agencies label and protect information</a>. Data must be placed into four categories—public, sensitive, confidential, or restricted—with unclear items treated as more restrictive. The policy aims to improve cybersecurity and guide future protections after a disruptive cyberattack.</p><p class="paragraph" style="text-align:left;">🇪🇺 🤝 <b>The EU gave unconditional approval for Google’s $32 billion buyout of cloud security firm Wiz</b> — Regulators <a class="link" href="https://www.securityweek.com/eu-unconditionally-approves-googles-32b-acquisition-of-wiz/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">found no competition concerns</a> and said customers have credible alternatives. Google says Wiz will stay available on all major clouds, though some worry about lost neutrality.</p><div class="embed"><a class="embed__url" href="https://www.404media.co/cops-are-buying-geospy-ai-that-geolocates-photos-in-seconds/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank"><div class="embed__content"><p class="embed__title"> Cops Are Buying ‘GeoSpy’, an AI That Geolocates Photos in Seconds </p><p class="embed__description"> 404 Media has obtained a cache of internal police emails showing at least two agencies have bought access to GeoSpy, an AI tool that analyzes architecture, soil, and other features to near instantly geolocate photos. </p><p class="embed__link"> www.404media.co/cops-are-buying-geospy-ai-that-geolocates-photos-in-seconds </p></div><img class="embed__image embed__image--right" src="https://www.404media.co/content/images/size/w1200/2026/02/geospy-header.png"/></a></div></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;border-color:#3587E8;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🔗<i><b> Partners and Affiliates</b></i></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/6f403f9b-d3a1-4d60-9852-f0e0f9340b87/image.png?t=1740643992"/></div><p class="paragraph" style="text-align:center;">🌐 <i>Stay connected and secure on the go with </i><i><b><a class="link" href="https://airalo.pxf.io/c/5582065/1345899/15608?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">Airalo</a></b></i><i>&#39;s global eSIMs — Use the code </i><i><b>NEWTOAIRALO15</b></i><i> if you’re new to Airalo to get an additional 15% discount.</i></p></div><p class="paragraph" style="text-align:left;"></p><div id="malware-threats" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🦠 MALWARE & THREATS</h3><p class="paragraph" style="text-align:left;">🏦 <b>Security researchers say a threat actor called UAT-9921 is using a new modular malware framework named </b><i><b>VoidLink</b></i> to target technology and financial firms. VoidLink provides stealthy, compile-on-demand implants and plugins for Linux, Windows, and cloud environments, lowering the skill needed to build hard-to-detect malware. Talos <a class="link" href="https://blog.talosintelligence.com/voidlink/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">warns</a> the framework includes RBAC, evasion features, and C2-driven plugin delivery, enabling broad reconnaissance and persistent access.</p><p class="paragraph" style="text-align:left;">🧩 <b>Researchers found 30 fake Chrome extensions, called </b><i><b>AiFrame</b></i>, that pose as AI assistants and have over 300,000 installs. The <a class="link" href="https://layerxsecurity.com/blog/aiframe-fake-ai-assistant-extensions-targeting-260000-chrome-users-via-injected-iframes/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">extensions load remote iframes and steal page content</a>, credentials, and Gmail messages, sending data to a single malicious domain. Users should check the indicators, remove any infected extensions, and reset passwords.</p><p class="paragraph" style="text-align:left;">✉️ 🧩 <b>A hijacked Outlook add-in called </b><i><b>AgreeTo</b></i><b> was turned into a phishing kit</b> that stole over 4,000 Microsoft account credentials. The attacker claimed the add-in&#39;s abandoned hosting URL, served a fake Microsoft login in Outlook, and exfiltrated data via a Telegram bot. Microsoft removed the add-in after researchers at Koi Security <a class="link" href="http://www.koi.ai/blog/agreetosteal-the-first-malicious-outlook-add-in-leads-to-4-000-stolen-credentials?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">discovered the breach</a>; users should uninstall AgreeTo and reset passwords.</p><p class="paragraph" style="text-align:left;">ℹ️ <i><b>Lumma Stealer</b></i>, the malware that stole passwords and files from Windows PCs, infected hundreds of thousands of machines before last year. Authorities seized much of its infrastructure in May, but researchers say <i>Lumma</i> <a class="link" href="https://arstechnica.com/security/2026/02/once-hobbled-lumma-stealer-is-back-with-lures-that-are-hard-to-resist/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">is back</a> and spreading again. The malware uses lure sites and a cloud-based service model to make infections hard to stop.</p><p class="paragraph" style="text-align:left;">🇰🇵 <b>North Korean hackers (UNC1069) used deepfake video and social engineering</b> to <a class="link" href="https://cloud.google.com/blog/topics/threat-intelligence/unc1069-targets-cryptocurrency-ai-social-engineering?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">deliver new macOS and Windows malware</a> against crypto targets. Researchers found seven distinct macOS malware families that steal credentials, browser data, and files for financial theft. The attack aimed to steal cryptocurrency and gather data to enable future scams.</p></div><p class="paragraph" style="text-align:left;"></p><div id="ai-crypto-tech-tools" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🤖 🧰 AI, CRYPTO, TECH & TOOLS</h3><div class="embed"><a class="embed__url" href="https://news.risky.biz/srsly-risky-biz-microsofts-forgoes-its-secure-future/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank"><div class="embed__content"><p class="embed__title"> Srsly Risky Biz: Microsoft&#39;s Forgoes Its Secure Future </p><p class="embed__description"> Your weekly dose of Seriously Risky Business news is written by Tom Uren and edited by Amberleigh Jack. This week&#39;s edition is sponsored by Trail of Bits. You can hear a podcast discussion of this newsletter by searching for &quot;Risky Business News&quot; in your podcatcher or subscribing via this RSS </p><p class="embed__link"> news.risky.biz/srsly-risky-biz-microsofts-forgoes-its-secure-future </p></div><img class="embed__image embed__image--right" src="https://news.risky.biz/content/images/size/w1200/2026/02/2026-02-12-Building_92_of_Microsoft_Redmond_Campus_-_panoramio.jpg"/></a></div><p class="paragraph" style="text-align:left;">👨‍⚕️ <b>Your AI doctor doesn’t have to follow the same privacy rules as your real one</b> — AI tools from OpenAI, Anthropic, and Google are being used for medical advice but often are <a class="link" href="https://cyberscoop.com/ai-healthcare-apps-hipaa-privacy-risks-openai-anthropic/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">not legally bound by HIPAA</a>. That means these apps may collect, share, or sell sensitive health data with weaker protections. People use them because they are cheap and convenient, but that creates real privacy risks.</p><hr class="content_break"><blockquote align="center" class="twitter-tweet"><a href="https://twitter.com/ddd1ms/status/2022031180502380647?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026"><p> Twitter tweet </p></a></blockquote><p class="paragraph" style="text-align:left;">🇨🇳 🇮🇷 🇰🇵 🇷🇺 <b>State-backed hackers from China, Iran, North Korea, and Russia are using Google’s Gemini AI</b> to help plan and carry out cyberattacks. They use it for reconnaissance, phishing, coding, vulnerability testing, and data exfiltration. Google <a class="link" href="https://www.bleepingcomputer.com/news/security/google-says-hackers-are-abusing-gemini-ai-for-all-attacks-stages/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">says it has blocked abused accounts</a> and added defenses but warns AI misuse and model theft remain serious risks.</p><p class="paragraph" style="text-align:left;">🦞 🦠 <b>OpenClaw now scans all ClawHub skills with VirusTotal</b> to block or flag malicious uploads. The <a class="link" href="http://openclaw.ai/blog/virustotal-partnership?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">move follows findings that many skills hide backdoors</a>, data exfiltration, or prompt-injection attacks. Despite scanning, OpenClaw warns risks remain and will publish a security roadmap and reporting process.</p><div class="embed"><a class="embed__url" href="https://www.isc.org/blogs/david-farber-memoriam/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank"><div class="embed__content"><p class="embed__title"> ISC recognizes &quot;grandfather of the Internet&quot; Dave Farber </p><p class="embed__description"> Dave Farber, ISC Board Member from 1994 - 2026 </p><p class="embed__link"> www.isc.org/blogs/david-farber-memoriam </p></div></a></div></div><p class="paragraph" style="text-align:left;"></p><div id="vulnerabilities-research-and-threat" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🐛 🧠 VULNERABILITIES, RESEARCH, AND THREAT INTELLIGENCE</h3><p class="paragraph" style="text-align:left;">➝ From the Patching Department:</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/patch-tuesday-adobe-fixes-44-vulnerabilities-in-creative-apps/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">Adobe Fixes 44 Vulnerabilities in Creative Apps</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://thehackernews.com/2026/02/apple-fixes-exploited-zero-day.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">Apple Fixes Exploited Zero-Day Affecting iOS, macOS, and Apple Devices</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/beyondtrust-patches-critical-rce-vulnerability/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">BeyondTrust Patches Critical RCE Vulnerability</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/chipmaker-patch-tuesday-over-80-vulnerabilities-addressed-by-intel-and-amd/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">Chipmaker Patch Tuesday: Over 80 Vulnerabilities Addressed by Intel and AMD</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/chrome-145-patches-11-vulnerabilities/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">Chrome 145 Patches 11 Vulnerabilities</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://thehackernews.com/2026/02/fortinet-patches-critical-sqli-flaw.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">Fortinet Patches Critical SQLi Flaw Enabling Unauthenticated Code Execution</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/ivanti-patches-endpoint-manager-vulnerabilities-disclosed-in-october-2025/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">Ivanti Patches Endpoint Manager Vulnerabilities Disclosed in October 2025</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bleepingcomputer.com/news/microsoft/microsoft-february-2026-patch-tuesday-fixes-6-zero-days-58-flaws/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">Microsoft February 2026 Patch Tuesday fixes 6 zero-days, 58 flaws</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/sap-patches-critical-crm-s-4hana-netweaver-vulnerabilities/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">SAP Patches Critical CRM, S/4HANA, NetWeaver Vulnerabilities</a></p></li></ul><hr class="content_break"><p class="paragraph" style="text-align:left;">💥 <b>Attackers are exploiting two severe </b><i><b>Ivanti</b></i><b> EPMM zero-day flaws</b>, spreading to <a class="link" href="https://cyberscoop.com/ivanti-zero-day-vulnerabilities-netherlands-european-commission-shadowserver/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">dozens of victims including government agencies</a>. Researchers found about 86 confirmed compromises and hundreds of attack attempts, with many exposed instances still online. <i>Ivanti</i> released detection tools but has not provided a full victim count.</p><p class="paragraph" style="text-align:left;">→ <a class="link" href="https://thehackernews.com/2026/02/dutch-authorities-confirm-ivanti-zero.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">Dutch Authorities Confirm Ivanti Zero-Day Exploit Exposed Employee Contact Data</a></p><p class="paragraph" style="text-align:left;">→ <a class="link" href="https://thehackernews.com/2026/02/83-of-ivanti-epmm-exploits-linked-to.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">83% of Ivanti EPMM Exploits Linked to Single IP on Bulletproof Hosting Infrastructure</a></p><p class="paragraph" style="text-align:left;">⚠️ <i><b>BeyondTrust</b></i><b> warned of a critical remote code execution flaw (</b><a class="link" href="https://nvd.nist.gov/vuln/detail/CVE-2026-1731?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow"><b>CVE-2026-1731</b></a><b>) in its Remote Support and Privileged Remote Access software</b> that lets unauthenticated attackers <a class="link" href="https://www.hacktron.ai/blog/cve-2026-1731-beyondtrust-remote-support-rce?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">run OS commands</a>. The company patched cloud systems and urged on-premises customers to update to fixed versions immediately. Past <i>BeyondTrust</i> vulnerabilities have been exploited by threat actors, including incidents linked to state-backed groups.</p></div><p class="paragraph" style="text-align:left;"></p><div id="ics-ot-io-t" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🛰️ ICS, OT & IoT</h3><p class="paragraph" style="text-align:left;">🩹 <b>ICS Patch Tuesday</b> — Major industrial vendors — Siemens, Schneider Electric, Aveva, and Phoenix Contact — <a class="link" href="https://www.securityweek.com/ics-patch-tuesday-vulnerabilities-addressed-by-siemens-schneider-aveva-phoenix-contact/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">released Patch Tuesday advisories</a> fixing multiple ICS/OT vulnerabilities. The flaws can allow unauthorized access, DoS, code execution, XSS, and privilege escalation. CISA and other vendors (Mitsubishi, Moxa, VDE CERT) also published related advisories. </p><p class="paragraph" style="text-align:left;">🇺🇸 💬 <b>CISA issues warning to U.S. audience</b> — A destructive cyberattack on Poland’s power grid targeted 30 wind and solar sites and damaged control systems. CISA <a class="link" href="https://cyberscoop.com/cisa-warning-russian-cyberattack-poland-power-grid/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">warned U.S. infrastructure operators</a> that vulnerable internet-facing edge devices and OT/ICS systems are at risk. Security firms and foreign agencies say this shows distributed energy resources are now prime targets and must be secured.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#f0f0f0;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">💬 CONNECT</h3><p class="paragraph" style="text-align:left;">Follow me on <a class="link" href="https://infosec.exchange/@0x58?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">Mastodon</a> for quick daily updates and bite-sized content.</p><p class="paragraph" style="text-align:left;">Prefer using an RSS feed? Add <b>Infosec MASHUP</b> to your feed <a class="link" href="https://rss.beehiiv.com/feeds/HVhiKYpQlR.xml?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">here</a>.</p><p class="paragraph" style="text-align:center;"><b>Enjoying our newsletter? </b>Forward it to a colleague—<br>it’s one of the best ways to support us.</p><p class="paragraph" style="text-align:left;">Thanks for reading today’s newsletter, and if you&#39;re enjoying it and want to support my work, you can <b>buy me a coffee</b> ☕ over at <a class="link" href="https://www.buymeacoffee.com/0x58?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-07-2026" target="_blank" rel="noopener noreferrer nofollow">https://www.buymeacoffee.com/0x58</a></p><p class="paragraph" style="text-align:left;"> See you next time!</p><p class="paragraph" style="text-align:left;">-X.</p></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=21ac89c1-6f4a-4d79-9c3e-3089e3ced22a&utm_medium=post_rss&utm_source=x_s_infosec_newsletter">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>🕵🏻‍♂️ [InfoSec MASHUP] 06/2026</title>
  <description>French prosecutors raid X offices, summon Musk over Grok deepfakes; Homeland Security is trying to force tech companies to hand over data about Trump critics; Security incident on Plone GitHub org; Russian-state hackers quickly exploited a critical Microsoft Office flaw (CVE-2026-21509) within 48 hours of a patch; Newsletter platform Substack notifies users of data breach; China’s Salt Typhoon hackers broke into Norwegian companies;</description>
  <link>https://infosec-mashup.santolaria.net/p/infosec-mashup-06-2026</link>
  <guid isPermaLink="true">https://infosec-mashup.santolaria.net/p/infosec-mashup-06-2026</guid>
  <pubDate>Sat, 07 Feb 2026 09:57:19 +0000</pubDate>
  <atom:published>2026-02-07T09:57:19Z</atom:published>
    <dc:creator>Xavier Santolaria</dc:creator>
    <category><![CDATA[Malware]]></category>
    <category><![CDATA[Opensource]]></category>
    <category><![CDATA[Privacy]]></category>
    <category><![CDATA[Cybersecurity]]></category>
    <category><![CDATA[Threat Intelligence]]></category>
    <category><![CDATA[Ai]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'IBM Plex Sans',-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'IBM Plex Sans',-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">We now have <b>{{active_subscriber_count}} active subscribers</b>! Thank you all for being part of my newsletter. Please share it with your friends and colleagues, and let’s keep growing the community.</p><hr class="content_break"><p class="paragraph" style="text-align:left;">This week’s AI zeitgeist didn’t just spawn memes — it exposed real, systemic risks at the intersection of autonomy, identity, and trust. On one front, a <b>critical vulnerability in the self‑hosted AI assistant OpenClaw</b> (previously Clawdbot/Moltbot) allowed attackers to <b>steal authentication tokens and achieve remote code execution via a single malicious link</b> — a classic web attack chain repurposed against an AI agent ecosystem. The flaw (tracked as <b>CVE‑2026‑25253</b>) hinged on improper origin validation in OpenClaw’s local gateway, letting a crafted page trigger a token leak and session hijack before it was patched.</p><p class="paragraph" style="text-align:left;">At the same time, <b>Moltbook — a Reddit‑style social network exclusively for AI agents — went viral</b>, attracting millions of registered bots and widespread fascination about the idea of autonomous digital actors forming “machine societies.” But the hype masked serious cybersecurity failures: misconfigured backends exposed <b>millions of API keys, agent tokens, and private messages</b> to unauthenticated access, and researchers found <b>prompt injection and bot‑to‑bot social engineering risks that could propagate malicious instructions through the agent population</b>.</p><p class="paragraph" style="text-align:left;">These two developments are linked by more than branding. They illustrate a <b>converging threat landscape</b> where:</p><ul><li><p class="paragraph" style="text-align:left;">Autonomous agents operate with deep system access,</p></li><li><p class="paragraph" style="text-align:left;">Shared agent ecosystems become new attack surfaces, and</p></li><li><p class="paragraph" style="text-align:left;">Viral prompt sharing and AI‑to‑AI networks can amplify hidden exploits. </p></li></ul><p class="paragraph" style="text-align:left;">It’s a reminder that even as AI autonomy grabs attention, the fundamentals of cybersecurity: protecting data, accounts, and trust boundaries — remain as crucial as ever. Because before we debate sentience, we need to secure the <i>agents we already deployed</i>.</p><p class="paragraph" style="text-align:left;">Let’s now dive into this week’s top insights! 🚀</p><h2 class="heading" style="text-align:left;">Table of Contents</h2><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="#breaches-security-incidents" rel="noopener noreferrer nofollow">BREACHES & SECURITY INCIDENTS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#cybercrime-cyber-espionage-ap-ts" rel="noopener noreferrer nofollow">CYBERCRIME, CYBER ESPIONAGE, APT’s</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#government-politics-and-privacy" rel="noopener noreferrer nofollow">GOVERNMENT, POLITICS, AND PRIVACY</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#malware-threats" rel="noopener noreferrer nofollow">MALWARE & THREATS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#ai-crypto-tech-tools" rel="noopener noreferrer nofollow">AI, CRYPTO, TECH & TOOLS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#vulnerabilities-research-and-threat" rel="noopener noreferrer nofollow">VULNERABILITIES, RESEARCH, AND THREAT INTELLIGENCE</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#ics-ot-io-t" rel="noopener noreferrer nofollow">ICS, OT & IoT</a></p></li></ul><div id="breaches-security-incidents" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🔓 BREACHES & SECURITY INCIDENTS</h3><p class="paragraph" style="text-align:left;">🇮🇹 🏫 <b>Rome’s </b><i><b>La Sapienza</b></i><b> university was hit by a cyberattack that forced its IT systems offline</b> and disrupted operations. Authorities and cybersecurity teams say <a class="link" href="https://www.bleepingcomputer.com/news/security/italian-university-la-sapienza-goes-offline-after-cyberattack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">it may be ransomware (linked to a pro-Russian group)</a> and are restoring systems from backups. Students and staff are advised to watch for phishing and suspicious activity while recovery continues.</p><p class="paragraph" style="text-align:left;">🇮🇹 ⛷️ 🇷🇺 <b>Italy said it stopped cyberattacks aimed at its foreign ministry sites and Winter Olympics websites</b> and hotels. Foreign Minister Antonio Tajani <a class="link" href="https://apnews.com/article/italy-winter-olympics-us-cyberattacks-security-01b6af8e64606f31836c91faa6653d12?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">said</a> the attacks were linked to Russia. Thousands of security officers are deployed across the Games.</p><p class="paragraph" style="text-align:left;">📤️ <i><b>Substack</b></i><b> notified users that attackers accessed some email addresses, phone numbers, and internal metadata</b> from an October 2025 breach. The company says passwords, credit card numbers, and financial data were not accessed and it has fixed the vulnerability. Substack warned users to watch for phishing and the leaked data appeared on a hacking forum.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/d4d35101-7e5c-4e2d-8c54-9b9bddeeff78/Screenshot_2026-02-05_at_11.04.20.png?t=1770299950"/><div class="image__source"><span class="image__source_text"><p>Figure: e-mail received by Substack users notifying them of the breach</p></span></div></div><p class="paragraph" style="text-align:left;">💸 <i><b>Step Finance</b></i><b> said hackers stole about $40 million</b> after compromising executives&#39; devices. The company worked with security teams and recovered roughly $4.7 million so far. Operations are paused, users told not to trade STEP while investigations continue.</p><blockquote align="center" class="twitter-tweet"><a href="https://twitter.com/StepFinance_/status/2018379876642804213?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026"><p> Twitter tweet </p></a></blockquote><p class="paragraph" style="text-align:left;">🔓️ <b>On January 7 attackers used a compromised account to force-push malicious JavaScript into several </b><i><b>Plone</b></i> GitHub repositories. The <i><a class="link" href="https://www.openwall.com/lists/oss-security/2026/01/31/2?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">Plone</a></i><a class="link" href="https://www.openwall.com/lists/oss-security/2026/01/31/2?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow"> team removed the code</a>, enabled organization-wide rules to block force pushes and restrict tag updates, and advised checking personal access tokens. The injected code aimed to persist, steal credentials, and target developers’ build environments.</p><p class="paragraph" style="text-align:left;">🇺🇸 <i><b>Coinbase</b></i><b> confirmed a contractor improperly accessed data for about 30 customers in a December insider breach</b> — Screenshots of an internal support tool briefly appeared online, showing detailed customer information. The <a class="link" href="https://www.bleepingcomputer.com/news/security/coinbase-confirms-insider-breach-linked-to-leaked-support-tool-screenshots/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">incident highlights growing attacks</a> on outsourced support firms that give threat actors access to sensitive data.</p><p class="paragraph" style="text-align:left;">🗒️ 🇨🇳 <i><b>Notepad++</b></i><b> was hit by a supply-chain attack</b> that redirected updater traffic through its hosting provider so some users got malicious updates. Security <a class="link" href="https://notepad-plus-plus.org/news/hijacked-incident-info-update/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">investigators say a China-linked, likely state-sponsored group targeted</a> specific organizations and abused a compromised shared server. Notepad++ moved hosts and added update verification to stop the attack.</p><p class="paragraph" style="text-align:left;">🇺🇸 🍞 <b>A data breach at </b><i><b>Panera Bread</b></i><b> exposed records</b> from a January 2026 attack. Have I Been Pwned <a class="link" href="https://haveibeenpwned.com/Breach/PaneraBread?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">says 5.1 million unique accounts were affected</a>, not 14 million customers. The data leaked by the ShinyHunters gang included names, emails, phones, and addresses.</p><p class="paragraph" style="text-align:left;">🕹️ <i><b>NationStates</b></i><b> confirmed a data breach after a player exploited a vulnerability and gained remote access</b> to its production server. Exposed data may include email addresses, MD5 password hashes, IPs, and browser info, and some private messages may have been accessed. The <a class="link" href="https://archive.md/tuMt1?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">site is offline for a full rebuild</a>, security upgrades, and investigations while users are advised to check their account data.</p><p class="paragraph" style="text-align:left;">→ More breaches:</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://techcrunch.com/2026/02/04/hackers-publish-personal-information-stolen-during-harvard-upenn-data-breaches/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow"><i>ShinyHunters</i></a><a class="link" href="https://techcrunch.com/2026/02/04/hackers-publish-personal-information-stolen-during-harvard-upenn-data-breaches/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow"> publish personal information stolen during Harvard, UPenn data breaches</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bleepingcomputer.com/news/security/data-breach-at-fintech-firm-betterment-exposes-14-million-accounts/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">Data breach at fintech firm </a><a class="link" href="https://www.bleepingcomputer.com/news/security/data-breach-at-fintech-firm-betterment-exposes-14-million-accounts/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow"><i>Betterment</i></a><a class="link" href="https://www.bleepingcomputer.com/news/security/data-breach-at-fintech-firm-betterment-exposes-14-million-accounts/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow"> exposes 1.4 million accounts</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://techcrunch.com/2026/02/05/data-breach-at-govtech-giant-conduent-balloons-affecting-millions-more-americans/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">Data breach at govtech giant Conduent balloons, affecting millions more Americans</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bleepingcomputer.com/news/security/flickr-discloses-potential-data-breach-exposing-users-names-emails/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">Flickr discloses potential data breach exposing users&#39; names, emails</a></p></li></ul></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;border-color:#3587E8;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🔗<i><b> Partners and Affiliates</b></i></p><p class="paragraph" style="text-align:left;">🔐 <a class="link" href="https://go.nordvpn.net/aff_c?offer_id=15&aff_id=84917&url_id=902&utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">NordVPN Threat Protection Pro™ Campaign</a> (July 2 - August 13)</p><p class="paragraph" style="text-align:left;"><i>With its user-friendly interface, robust security features, and commitment to privacy, NordVPN continues to be a popular choice for individuals seeking online protection and unrestricted internet access.</i></p><p class="paragraph" style="text-align:left;"><i><b>Special Offer</b></i><i>: </i>get up to 73% off with a 2-year plan!</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://go.nordvpn.net/aff_c?offer_id=15&aff_id=84917&url_id=902&utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026"><span class="button__text" style=""> GET THE DEAL </span></a></div></div><p class="paragraph" style="text-align:left;"></p><div id="cybercrime-cyber-espionage-ap-ts" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🥷🏻 CYBERCRIME, CYBER ESPIONAGE, APT’s</h3><div class="embed"><a class="embed__url" href="https://unit42.paloaltonetworks.com/shadow-campaigns-uncovering-global-espionage/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank"><div class="embed__content"><p class="embed__title"> The Shadow Campaigns: Uncovering Global Espionage </p><p class="embed__description"> In 2025 a threat group compromised government and critical infrastructure in 37 countries, with reconnaissance in 155. </p><p class="embed__link"> unit42.paloaltonetworks.com/shadow-campaigns-uncovering-global-espionage </p></div><img class="embed__image embed__image--right" src="https://unit42.paloaltonetworks.com/wp-content/uploads/2026/02/03_Nation-State-cyberattacks_1920x900.jpg"/></a></div><p class="paragraph" style="text-align:left;">🇩🇪 <b>Germany warns that state-linked actors are phishing senior officials on Signal to hijack accounts</b> and steal chats and contacts. Attackers <a class="link" href="https://www.bleepingcomputer.com/news/security/germany-warns-of-signal-account-hijacking-targeting-senior-figures/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">trick victims into revealing PINs or scanning QR codes</a> to register devices they control. Authorities advise blocking/reporting fake support messages, enabling Signal’s Registration Lock, and checking linked devices.</p><p class="paragraph" style="text-align:left;">🇳🇴 🇨🇳 <b>Norway says China-linked hackers </b><i><b>Salt Typhoon</b></i><b> broke into several Norwegian organizations</b> — The group <a class="link" href="https://techcrunch.com/2026/02/06/chinas-salt-typhoon-hackers-broke-into-norwegian-companies/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">targeted weak network devices</a> to spy on victims. <i>Salt Typhoon</i> has long attacked critical infrastructure worldwide.</p><p class="paragraph" style="text-align:left;">🤑 💩 <b>Ransomware group </b><i><b>Nitrogen</b></i><b>&#39;s ESXi-targeting malware corrupts its own public key</b>, so decryptors <a class="link" href="https://www.theregister.com/2026/02/04/nitrogen_ransomware_broken_decryptor/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">cannot recover files even if victims pay</a>. Coveware found a coding bug where a QWORD overwrote bytes of the public key. The mistake makes the attacks purely destructive and payment futile.</p><p class="paragraph" style="text-align:left;">🇷🇺 <b>Russian-state hackers quickly exploited a critical Microsoft Office flaw (CVE-2026-21509) within 48 hours</b> of a patch. They <a class="link" href="https://arstechnica.com/security/2026/02/russian-state-hackers-exploit-office-vulnerability-to-infect-computers/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">used a novel, in-memory exploit and new backdoors</a> to infect diplomatic, maritime, and transport organizations in several countries. The attacks were stealthy, used compromised government accounts, and hid command channels in legitimate cloud services.</p><p class="paragraph" style="text-align:left;">🇺🇸 <b>Sen. Maria Cantwell says AT&T and Verizon refused to share a Mandiant report</b> about the <i>Salt Typhoon</i> hacks. She <a class="link" href="https://cyberscoop.com/cantwell-claims-telecoms-blocked-release-of-salt-typhoon-report/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">wants the CEOs to testify before Congress</a> about how the breaches happened and what fixes were made. Cantwell warns telecoms’ resistance leaves Americans’ communications at risk.</p><p class="paragraph" style="text-align:left;">🇨🇳 👀 <b>A new China-linked group called </b><i><b>Amaranth Dragon</b></i><b> exploited a WinRAR flaw (CVE-2025-8088) to spy on government</b> and <a class="link" href="https://research.checkpoint.com/2026/amaranth-dragon-weaponizes-cve-2025-8088-for-targeted-espionage/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">law enforcement agencies in Southeast Asia</a>. They used a custom loader, encrypted payloads, Cloudflare-hosted C2 servers with geofencing, and a new TGAmaranth RAT delivered via DLL sideloading. Defenders should update WinRAR to 7.13+ and use the provided IOCs and YARA rules to detect infections.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/afdf48d5-91fd-4bfa-9cb3-31bcae3ce1c8/image.png?t=1770220851"/><div class="image__source"><span class="image__source_text"><p>Figure: Campains timeline/Check Point</p></span></div></div><p class="paragraph" style="text-align:left;">🐼 🇨🇳 <b>Between December 2025 and January 2026, hackers linked to China’s Mustang Panda used fake diplomatic briefings to infect</b> officials and diplomats. The malicious PDFs deployed a downloader called DOPLUGS (PlugX) and used DLL hijacking to quietly collect data. Security researchers <a class="link" href="https://hackread.com/chinese-mustang-panda-briefing-spy-diplomat/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">warn</a> to be cautious with unexpected summary or briefing documents, even if they look official.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#f0f0f0;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🗓️ <b>{Cyber,Info}Sec Events</b>: My list of past and future <a class="link" href="https://github.com/xsa/infosec-events?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">{cyber,info}sec related events</a> — Feel free to contribute by submitting issues or pull requests (and don’t forget to <a class="link" href="https://github.com/xsa/infosec-events?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">star the project</a>); Thanks! 😉</p></div><p class="paragraph" style="text-align:left;"></p><div id="government-politics-and-privacy" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">👨🏻‍⚖️ 👀 GOVERNMENT, POLITICS, AND PRIVACY</h3><div class="embed"><a class="embed__url" href="https://www.politico.com/news/2026/02/02/bridget-bean-dhs-interview-00758528?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank"><div class="embed__content"><p class="embed__title"> ‘Hot mess’: Former Trump cyber leader slams DHS leadership void </p><p class="embed__description"> Bridget Bean, the former acting director of the Cybersecurity and Infrastructure Security Agency, said in an exclusive interview that without permanent leadership, agencies under DHS are “not working.” </p><p class="embed__link"> www.politico.com/news/2026/02/02/bridget-bean-dhs-interview-00758528 </p></div><img class="embed__image embed__image--right" src="https://www.politico.com/dims4/default/resize/1200/quality/90/format/jpg?url=https%3A%2F%2Fstatic.politico.com%2Fc3%2F09%2Fd0c8c5004f36964effbd3a5b1f41%2Fcybersecurity-appointments-72151.jpg"/></a></div><p class="paragraph" style="text-align:left;">👁️ 🐾 🇺🇸 <b>The DHS inspector general opened an audit of the department’s handling of biometric and personal data</b> — The <a class="link" href="https://cyberscoop.com/dhs-ig-audit-ice-obim-biometric-data-privacy-facial-recognition/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">review will start with ICE</a> and the Office of Biometric Identity Management. Senators raised concerns about mass collection, sharing, and possible civil liberties violations.</p><p class="paragraph" style="text-align:left;">🇺🇸 ⚖️ <b>A 23-year-old New York man, Aaron Corey, was arrested and charged with receiving child sexual abuse material</b> — Investigators say he ran 764-related chats and had images and videos of young children on his devices. Authorities say <a class="link" href="https://cyberscoop.com/764-member-arrested-charged-csam-new-york/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">this arrest is part of wider actions</a> against the violent extremist network 764 and its offshoots.</p><div class="embed"><a class="embed__url" href="https://risky.biz/risky-bulletin-denmark-recruits-hackers-for-offensive-cyber-operations/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank"><div class="embed__content"><p class="embed__title"> Risky Bulletin: Denmark recruits hackers for offensive cyber operations - Risky Business Media </p><p class="embed__description"> Denmark&#39;s military intelligence service has launched a campaign to recruit cybersecurity specialists for offensive cyber operations.The re [Read More] </p><p class="embed__link"> risky.biz/risky-bulletin-denmark-recruits-hackers-for-offensive-cyber-operations </p></div></a></div><p class="paragraph" style="text-align:left;">🇺🇸 👀 <b>Homeland Security has used administrative subpoenas to demand identity information from tech companies</b> about <a class="link" href="https://techcrunch.com/2026/02/03/homeland-security-is-trying-to-force-tech-companies-to-hand-over-data-about-trump-critics/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">people and anonymous accounts critical of the Trump administration</a>. These subpoenas skip judicial oversight and can reveal login times, IPs, emails, and other identifiers. Civil rights groups say this chills free speech and some companies sometimes resist or push back.</p><p class="paragraph" style="text-align:left;">🇺🇸 <b>National Cyber Director Sean Cairncross urged industry to work with the Trump administration</b> to <a class="link" href="https://cyberscoop.com/sean-cairncross-industry-cut-cybersecurity-regulations-renew-cisa/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">reduce cybersecurity regulation</a> and improve information sharing. He asked companies to support a 10-year extension of the Cybersecurity Information Sharing Act. He said the administration wants partnership, not punishment, and will roll out a new cybersecurity strategy soon.</p><p class="paragraph" style="text-align:left;">🇯🇵 🤝 🇬🇧 <b>Japan and Britain agreed to boost cooperation on cybersecurity</b> and critical minerals as China’s influence grows. They will <a class="link" href="https://www.securityweek.com/japan-britain-to-boost-cybersecurity-and-critical-minerals-cooperation-as-chinas-influence-grows/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">work to secure supply chains</a> and strengthen economic and security ties. Both countries aim to make trade and defense partnerships more resilient.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;border-color:#3587E8;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🔗<i><b> Partners and Affiliates</b></i></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/6f403f9b-d3a1-4d60-9852-f0e0f9340b87/image.png?t=1740643992"/></div><p class="paragraph" style="text-align:center;">🌐 <i>Stay connected and secure on the go with </i><i><b><a class="link" href="https://airalo.pxf.io/c/5582065/1345899/15608?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">Airalo</a></b></i><i>&#39;s global eSIMs — Use the code </i><i><b>NEWTOAIRALO15</b></i><i> if you’re new to Airalo to get an additional 15% discount.</i></p></div><p class="paragraph" style="text-align:left;"></p><div id="malware-threats" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🦠 MALWARE & THREATS</h3><p class="paragraph" style="text-align:left;">🔄 <i><b>SystemBC</b></i><b> malware survived a law enforcement takedown and now infects</b> over 10,000 devices worldwide. It <a class="link" href="https://www.silentpush.com/blog/systembc/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">turns infected machines into SOCKS5 proxies </a>and helps distribute ransomware and other malware. Most victims are in the US, Germany, France, Singapore, and India.</p><p class="paragraph" style="text-align:left;">🎣 <b>A global spam wave is flooding inboxes with fake &quot;Activate account&quot; emails sent via unsecured Zendesk</b> support forms. Attackers are <a class="link" href="https://www.bleepingcomputer.com/news/security/zendesk-spam-wave-returns-floods-users-with-activate-account-emails/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">abusing ticket submission</a> to trigger mass confirmation messages that bypass filters. Despite Zendesk&#39;s earlier fixes, the abuse appears to be recurring.</p><p class="paragraph" style="text-align:left;">🇷🇺 <b>Russia-linked APT28 used a new Microsoft Office flaw (</b><a class="link" href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow"><b>CVE-2026-21509</b></a><b>) to deliver espionage malware</b> in Ukraine, Slovakia, and Romania. Attackers sent localized lure documents that downloaded droppers which install an email stealer (MiniDoor) or a loader (PixyNetLoader) that hides shellcode in a PNG and launches a Covenant Grunt implant. CERT-UA and <a class="link" href="https://www.zscaler.com/blogs/security-research/apt28-leverages-cve-2026-21509-operation-neusploit?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">Zscaler say the campaign used targeted server checks</a>, COM hijacking, and steganography to evade detection and hit government-related emails.</p><p class="paragraph" style="text-align:left;">🧩 <b>Attackers hijacked a trusted </b><i><b>Open VSX</b></i><b> publisher account and pushed malicious updates</b> of four popular VS Code extensions. The <a class="link" href="https://socket.dev/blog/glassworm-loader-hits-open-vsx-via-suspected-developer-account-compromise?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">malware targets macOS</a>, steals browser data, crypto wallets, and developer credentials, and loads instructions from Solana transaction memos. The campaign uses runtime-decrypted loaders and leaked publishing tokens to evade detection and rotate infrastructure.</p><p class="paragraph" style="text-align:left;">🦠 <b>Attackers breached </b><i><b>eScan</b></i><b>&#39;s update servers and pushed a malicious update</b> that installed a persistent downloader. The <a class="link" href="https://www.morphisec.com/blog/critical-escan-threat-bulletin/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">malware replaced legit files</a>, blocked updates and fetched further payloads via PowerShell. Hundreds of machines in South Asia and elsewhere were targeted before the servers were isolated and patched.</p></div><p class="paragraph" style="text-align:left;"></p><div id="ai-crypto-tech-tools" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🤖 🧰 AI, CRYPTO, TECH & TOOLS</h3><p class="paragraph" style="text-align:left;">🤖 <b>The rise of Moltbook</b> — In 1988 the Morris worm spread across the early Internet and crashed many systems because of a coding mistake. Today, AI agents can share and copy prompts across networks in a similar way. Experts warn these <a class="link" href="https://arstechnica.com/ai/2026/02/the-rise-of-moltbook-suggests-viral-ai-prompts-may-be-the-next-big-security-threat/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">viral prompts could become a major new security threat</a>.</p><p class="paragraph" style="text-align:left;">🦞 <i><b>OpenClaw</b></i><b>, a self-hosted AI assistant, had a critical vulnerability allowing attackers to steal a user’s authentication token</b> by tricking them into visiting a malicious website. With the stolen token, attackers could connect to the victim’s OpenClaw instance, disable protections, and run arbitrary commands on the host. The flaw (CVE-2026-25253) was <a class="link" href="https://github.com/openclaw/openclaw/security/advisories/GHSA-g8p2-7wf7-98mq?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">patched</a> in version 2026.1.29 after researchers <a class="link" href="https://depthfirst.com/post/1-click-rce-to-steal-your-moltbot-data-and-keys?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">disclosed</a> the issue.</p><div class="embed"><a class="embed__url" href="https://www.koi.ai/blog/clawhavoc-341-malicious-clawedbot-skills-found-by-the-bot-they-were-targeting?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank"><div class="embed__content"><p class="embed__title"> ClawHavoc: 341 Malicious Clawed Skills Found by the Bot They Were Targeting </p><p class="embed__description"> We audited all 2,632 skills on ClawHub and found 341 were malicious - 335 from a single campaign we&#39;re calling ClawHavoc. The attack exploits the trust between AI bots and their users, tricking them into installing infostealers disguised as legitimate tools. </p><p class="embed__link"> www.koi.ai/blog/clawhavoc-341-malicious-clawedbot-skills-found-by-the-bot-they-were-targeting </p></div><img class="embed__image embed__image--right" src="https://cdn.prod.website-files.com/689ad8c5d13f40cf59df0e0c/697fbfb94dae9da177037dbc_image%20(23)%20copy.jpg"/></a></div><p class="paragraph" style="text-align:left;">🇫🇷 <b>French prosecutors raided </b><i><b>X</b></i><b>&#39;s Paris offices and are investigating its Grok AI for generating sexual deepfakes</b> and other illegal content. Elon Musk and <i>X</i> CEO Linda Yaccarino were summoned for voluntary interviews, and more employees will be questioned. The <a class="link" href="https://www.bleepingcomputer.com/news/security/french-prosecutors-raid-x-offices-over-grok-sexual-deepfakes/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">probe involves multiple alleged offenses</a> and joins other EU and UK investigations into <i>X</i>&#39;s handling of the tool.</p><p class="paragraph" style="text-align:left;">→ <a class="link" href="https://www.bleepingcomputer.com/news/security/uk-privacy-watchdog-probes-grok-over-ai-generated-sexual-images/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">UK privacy watchdog probes Grok over AI-generated sexual images</a></p><p class="paragraph" style="text-align:left;">🍎 📍 <b>Apple is adding a &quot;</b><i><b>Limit Precise Location</b></i><b>&quot; setting in iOS 26.3+</b> that <a class="link" href="https://support.apple.com/en-us/126101?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">stops cellular networks from getting exact street-level location</a> and only shares an approximate area. It works on select iPhone and iPad models and needs carrier support to function. Emergency calls and app Location Services are not affected.</p></div><p class="paragraph" style="text-align:left;"></p><div id="vulnerabilities-research-and-threat" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🐛 🧠 VULNERABILITIES, RESEARCH, AND THREAT INTELLIGENCE</h3><p class="paragraph" style="text-align:left;">➝ From the Patching Department:</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/cisco-f5-patch-high-severity-vulnerabilities/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">Cisco and F5 Patch High-Severity Vulnerabilities</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://thehackernews.com/2026/02/docker-fixes-critical-ask-gordon-ai.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">Docker Fixes Critical Ask Gordon AI Flaw Allowing Code Execution via Image Metadata</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.tenable.com/blog/google-looker-vulnerabilities-rce-internal-access-lookout?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">Two Google Looker flaws found - Google patched cloud instances in Sept 2025; self-hosted users must update</a></p></li></ul><hr class="content_break"><div class="embed"><a class="embed__url" href="https://this.weekinsecurity.com/new-survey-reveals-how-security-researchers-and-journalists-experience-legal-and-criminal-threats/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank"><div class="embed__content"><p class="embed__title"> New survey reveals how security researchers and journalists experience legal and criminal threats </p><p class="embed__description"> Over 100 security researchers and journalists answered our survey and told us how they experienced threats for doing their work. Here are some of the top takeaways. </p><p class="embed__link"> this.weekinsecurity.com/new-survey-reveals-how-security-researchers-and-journalists-experience-legal-and-criminal-threats </p></div><img class="embed__image embed__image--right" src="https://this.weekinsecurity.com/content/images/size/w1200/2026/02/samuel-bourke-sc-B_2-Om7Q-unsplash.jpg"/></a></div><p class="paragraph" style="text-align:left;">🤖 👀 🐛 <b>Anthropic says its new LLM, Claude Opus 4.6, found over 500 previously unknown high-severity security flaws</b> in major open-source libraries. The model can read and reason about code like a human researcher and helped prioritize and validate real memory-corruption bugs that have since been patched. Anthropic <a class="link" href="https://red.anthropic.com/2026/zero-days/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">calls such AI tools crucial for defenders</a> but warns of misuse and plans added safeguards.</p><p class="paragraph" style="text-align:left;">🐛 <b>A critical vulnerability (</b><a class="link" href="https://thehackernews.com/2025/12/critical-n8n-flaw-cvss-99-enables.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow"><b>CVE-2026-25049</b></a><b>) in </b><i><b>n8n</b></i><b> allows authenticated users who can create or edit workflows to run arbitrary</b> system commands. The <a class="link" href="https://blog.securelayer7.net/cve-2026-25049/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">flaw bypasses previous fixes</a> by abusing expression evaluation and TypeScript runtime/type mismatches, and is especially dangerous when paired with public webhooks. Patch to versions 1.123.17 / 2.5.2 or restrict workflow permissions and harden deployments immediately.</p><p class="paragraph" style="text-align:left;">💥 <b>Researchers found attackers exploiting the </b><i><b>React2Shell</b></i><b> flaw to inject malicious NGINX configurations</b> and hijack web traffic. The <a class="link" href="https://securitylabs.datadoghq.com/articles/web-traffic-hijacking-nginx-configuration-malicious/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">attackers use a multi-stage script toolkit</a> to persist, discover targets (especially Asian and government/education TLDs), and redirect requests to attacker-controlled servers. Two IPs drove most exploitation attempts, with varied post-exploit payloads like cryptominers and reverse shells.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/01906f87-7025-4a77-a3a7-7933d0a869ea/image.png?t=1770286586"/><div class="image__source"><span class="image__source_text"><p>Figure: NGINX attack flow diagram/<a class="link" href="https://securitylabs.datadoghq.com?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">securitylabs.datadoghq.com</a></p></span></div></div><p class="paragraph" style="text-align:left;">🔓️ 🫰 <b>Attackers are automatically targeting unsecured, internet-exposed MongoDB servers</b> and <a class="link" href="https://flare.io/learn/resources/blog/mongodb-ransom/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">wiping data to demand small Bitcoin ransoms</a> (about 0.005 BTC). Flare researchers found over 208,500 exposed instances, 3,100 without authentication, and nearly half of those had already been compromised. Administrators are urged to stop public exposure, enable strong auth, update MongoDB, and monitor for breaches.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/4b06b81a-1c24-489d-93cc-9036d3a24ad5/image.png?t=1770125339"/><div class="image__source"><span class="image__source_text"><p>Figure: Shodan search results/Flare</p></span></div></div><p class="paragraph" style="text-align:left;">💥 <b>Attackers have been exploiting a critical React Native development server bug (CVE-2025-11953, &quot;</b><i><b>Metro4Shell</b></i><b>&quot;)</b> since late December. The <a class="link" href="https://www.vulncheck.com/blog/metro4shell_eitw?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">flaw lets remote actors run commands</a> via Metro’s default external binding, enabling multi-stage PowerShell loaders that disable Defender and fetch Rust payloads. Thousands of internet-exposed React Native instances may be at risk.</p></div><p class="paragraph" style="text-align:left;"></p><div id="ics-ot-io-t" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🛰️ ICS, OT & IoT</h3><div class="embed"><a class="embed__url" href="https://unit42.paloaltonetworks.com/iconics-suite-cve-2025-0921/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank"><div class="embed__content"><p class="embed__title"> Privileged File System Vulnerability Present in a SCADA System </p><p class="embed__description"> We detail our discovery of CVE-2025-0921. This privileged file system flaw in SCADA system Iconics Suite could lead to a denial-of-service (DoS) attack. </p><p class="embed__link"> unit42.paloaltonetworks.com/iconics-suite-cve-2025-0921 </p></div><img class="embed__image embed__image--right" src="https://unit42.paloaltonetworks.com/wp-content/uploads/2026/01/06_Vulnerabilities_1920x900-2-1.jpg"/></a></div><p class="paragraph" style="text-align:left;">🇺🇸 <b>CISA ordered federal agencies to stop using unsupported edge devices</b> like routers and firewalls <a class="link" href="https://cyberscoop.com/cisa-bod-directive-unsupported-edge-devices-firewalls-routers/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">because they are high-risk</a> attack points. Agencies must inventory such devices within three months and replace them within a year. CISA will publish a list of end-of-service devices and wants agencies to set up regular checks for unsupported gear.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#f0f0f0;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">💬 CONNECT</h3><p class="paragraph" style="text-align:left;">Follow me on <a class="link" href="https://infosec.exchange/@0x58?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">Mastodon</a> for quick daily updates and bite-sized content.</p><p class="paragraph" style="text-align:left;">Prefer using an RSS feed? Add <b>Infosec MASHUP</b> to your feed <a class="link" href="https://rss.beehiiv.com/feeds/HVhiKYpQlR.xml?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">here</a>.</p><p class="paragraph" style="text-align:center;"><b>Enjoying our newsletter? </b>Forward it to a colleague—<br>it’s one of the best ways to support us.</p><p class="paragraph" style="text-align:left;">Thanks for reading today’s newsletter, and if you&#39;re enjoying it and want to support my work, you can <b>buy me a coffee</b> ☕ over at <a class="link" href="https://www.buymeacoffee.com/0x58?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-06-2026" target="_blank" rel="noopener noreferrer nofollow">https://www.buymeacoffee.com/0x58</a></p><p class="paragraph" style="text-align:left;"> See you next time!</p><p class="paragraph" style="text-align:left;">-X.</p></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=62e3ac83-aa6f-4d43-af9b-a282b3da7963&utm_medium=post_rss&utm_source=x_s_infosec_newsletter">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>🕵🏻‍♂️ [InfoSec MASHUP] 05/2026</title>
  <description>Trump’s acting cybersecurity chief uploaded sensitive government docs to ChatGPT; Hugging Face abused to spread thousands of Android malware variants; Former Google engineer was convicted for stealing over 2,000 AI-related trade secret documents; France fined its national employment agency €5 million after the 2024 data breach; Google disrupted a China-based residential proxy network;</description>
  <link>https://infosec-mashup.santolaria.net/p/infosec-mashup-05-2026</link>
  <guid isPermaLink="true">https://infosec-mashup.santolaria.net/p/infosec-mashup-05-2026</guid>
  <pubDate>Sat, 31 Jan 2026 09:27:18 +0000</pubDate>
  <atom:published>2026-01-31T09:27:18Z</atom:published>
    <dc:creator>Xavier Santolaria</dc:creator>
    <category><![CDATA[Malware]]></category>
    <category><![CDATA[Opensource]]></category>
    <category><![CDATA[Privacy]]></category>
    <category><![CDATA[Cybersecurity]]></category>
    <category><![CDATA[Threat Intelligence]]></category>
    <category><![CDATA[Ai]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'IBM Plex Sans',-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'IBM Plex Sans',-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">We now have <b>{{active_subscriber_count}} active subscribers</b>! Thank you all for being part of my newsletter. Please share it with your friends and colleagues, and let’s keep growing the community.</p><hr class="content_break"><p class="paragraph" style="text-align:left;">Security keeps failing for the same boring reasons — not because we lack tools or frameworks, but because we keep externalizing risk and calling it “integration.”</p><p class="paragraph" style="text-align:left;">This week’s mashup spans breaches, vulnerabilities, and AI security, but the connective tissue is familiar: overtrusted vendors, overprivileged access, shallow due diligence, and controls that exist on paper rather than in production. Most high-profile incidents still originate in third-party environments — MSPs, SaaS providers, data processors, support platforms — yet “vendor risk management” remains a checkbox exercise: SOC 2 PDFs, contractual assurances, and zero technical enforcement. No architectural reviews. No hard IAM boundaries. No continuous validation. Just implicit trust wired directly into core systems.</p><p class="paragraph" style="text-align:left;">Until organizations start treating partners as hostile by default — with scoped access, verifiable controls, and ongoing monitoring — we’ll keep cycling through the same breach narratives, the same patch-now CVEs, and the same AI security surprises, week after week.</p><p class="paragraph" style="text-align:left;">Let’s now dive into this week’s top insights! 🚀</p><h2 class="heading" style="text-align:left;">Table of Contents</h2><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="#breaches-security-incidents" rel="noopener noreferrer nofollow">BREACHES & SECURITY INCIDENTS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#cybercrime-cyber-espionage-ap-ts" rel="noopener noreferrer nofollow">CYBERCRIME, CYBER ESPIONAGE, APT’s</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#government-politics-and-privacy" rel="noopener noreferrer nofollow">GOVERNMENT, POLITICS, AND PRIVACY</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#malware-threats" rel="noopener noreferrer nofollow">MALWARE & THREATS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#ai-crypto-tech-tools" rel="noopener noreferrer nofollow">AI, CRYPTO, TECH & TOOLS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#vulnerabilities-research-and-threat" rel="noopener noreferrer nofollow">VULNERABILITIES, RESEARCH, AND THREAT INTELLIGENCE</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#ics-ot-io-t" rel="noopener noreferrer nofollow">ICS, OT & IoT</a></p></li></ul><div id="breaches-security-incidents" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🔓 BREACHES & SECURITY INCIDENTS</h3><div class="embed"><a class="embed__url" href="https://www.404media.co/massive-ai-chat-app-leaked-millions-of-users-private-conversations/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank"><div class="embed__content"><p class="embed__title"> Massive AI Chat App Leaked Millions of Users Private Conversations </p><p class="embed__link"> www.404media.co/massive-ai-chat-app-leaked-millions-of-users-private-conversations </p></div><img class="embed__image embed__image--right" src="https://images.unsplash.com/photo-1496814795703-e5b242546673?crop=entropy&cs=tinysrgb&fit=max&fm=jpg&ixid=M3wxMTc3M3wwfDF8c2VhcmNofDEyfHx0eXBpbmclMjBpcGhvbmV8ZW58MHx8fHwxNzY5Njk4MDk3fDA&ixlib=rb-4.1.0&q=80&w=2000"/></a></div><p class="paragraph" style="text-align:left;">🇫🇷 💰️ <b>France fined its national employment agency €5 million after a 2024 data breach</b> exposed <a class="link" href="https://www.bleepingcomputer.com/news/security/france-fines-unemployment-agency-5-million-over-data-breach/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">personal data of up to 43 million people</a>. Hackers used social engineering to hijack adviser accounts and stole names, birth dates, national IDs, addresses, emails, and phone numbers. CNIL ordered fixes with daily fines if France Travail fails to comply.</p><p class="paragraph" style="text-align:left;">🇺🇸 👟 <b>Nike is investigating a possible cyber security incident</b> after the <a class="link" href="https://www.bleepingcomputer.com/news/security/nike-investigates-data-breach-after-extortion-gang-leaks-files/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">World Leaks gang posted 1.4 TB</a> of allegedly stolen files. The extortion group later removed Nike from its leak site, suggesting negotiations or a paid ransom, but Nike has not confirmed any theft. Independent verification of the leaked data has not been possible.</p><p class="paragraph" style="text-align:left;">🎧️ <b>Hackers stole personal info from about 29.8 million SoundCloud accounts</b> — The leaked data included emails, names, usernames, profile stats, and sometimes country. The <i>ShinyHunters</i> group <a class="link" href="https://www.bleepingcomputer.com/news/security/have-i-been-pwned-soundcloud-data-breach-impacts-298-million-accounts/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">extorted SoundCloud and later released</a> the data.</p><p class="paragraph" style="text-align:left;">🇺🇸 <b>Crunchbase confirmed a data breach</b> after hackers from the <i>ShinyHunters</i> group published files they say were stolen. The <a class="link" href="https://www.securityweek.com/crunchbase-confirms-data-breach-after-hacking-claims/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">leaked data reportedly includes personal information</a>, contracts, and corporate documents. <i>ShinyHunters</i> also claim attacks on SoundCloud and Betterment and may be linked to recent Okta vishing scams.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;border-color:#3587E8;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🔗<i><b> Partners and Affiliates</b></i></p><p class="paragraph" style="text-align:left;">🔐 <a class="link" href="https://go.nordvpn.net/aff_c?offer_id=15&aff_id=84917&url_id=902&utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">NordVPN Threat Protection Pro™ Campaign</a> </p><p class="paragraph" style="text-align:left;"><i>With its user-friendly interface, robust security features, and commitment to privacy, NordVPN continues to be a popular choice for individuals seeking online protection and unrestricted internet access.</i></p><p class="paragraph" style="text-align:left;"><i><b>Special Offer</b></i><i>: </i>get up to 73% off with a 2-year plan!</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://go.nordvpn.net/aff_c?offer_id=15&aff_id=84917&url_id=902&utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026"><span class="button__text" style=""> GET THE DEAL </span></a></div></div><p class="paragraph" style="text-align:left;"></p><div id="cybercrime-cyber-espionage-ap-ts" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🥷🏻 CYBERCRIME, CYBER ESPIONAGE, APT’s</h3><p class="paragraph" style="text-align:left;">🇨🇳 🗑️ <b>Google disrupted </b><i><b>IPIDEA</b></i><b>, a China-based residential proxy network</b>, removing about 40% of its proxy devices. The <a class="link" href="https://cyberscoop.com/ipidea-proxy-network-disrupted-google-lumen/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">takedown cut command-and-control links and storefronts</a> but many devices still operate. Researchers warn the proxy industry is rapidly growing and often abused by criminals and state-backed groups.</p><p class="paragraph" style="text-align:left;">🇺🇸 🇧🇬 🇮🇹 <b>The U.S. Justice Department seized three popular Bulgarian-linked domains</b> for <a class="link" href="https://cyberscoop.com/doj-seizes-piracy-sites-zamunda-arenabg-zelka/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">distributing pirated movies</a>, TV shows and games. Italian police also dismantled illegal IPTV services that streamed content from major providers and linked to a transnational crime group. Authorities said the operations used anonymization, crypto and fake companies to hide profits.</p><p class="paragraph" style="text-align:left;">🇺🇸 🗑️ <b>The FBI seized the </b><i><b>RAMP</b></i><b> cybercrime forum</b> and replaced its sites with a seizure notice. <i>RAMP</i> was a <a class="link" href="https://www.bleepingcomputer.com/news/security/fbi-seizes-ramp-cybercrime-forum-used-by-ransomware-gangs/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">major hub where ransomware gangs promoted attacks</a> and traded access. The seizure could expose user data and lead to arrests.</p><p class="paragraph" style="text-align:left;">🇺🇸 🇨🇳 🧑‍⚖️ <b>A former Google engineer, Linwei (Leon) Ding, was convicted for stealing over 2,000 AI-related trade secret documents</b> to benefit a China-linked startup. The stolen materials included designs for TPUs, GPUs, data center infrastructure, and software for AI supercomputers. He <a class="link" href="https://www.justice.gov/usao-ndca/pr/former-google-engineer-found-guilty-economic-espionage-and-theft-confidential-ai?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">faces multiple espionage and theft charges</a> and up to decades in prison.</p><p class="paragraph" style="text-align:left;">🇰🇵 <b>A North Korea–linked hacking group called </b><i><b>Labyrinth Chollima</b></i><b> has split into three focused groups</b>: Labyrinth, Golden, and Pressure. The <a class="link" href="https://cyberscoop.com/north-korea-labyrinth-chollima-splits-crowdstrike/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">spin-offs specialize in espionage or large cryptocurrency thefts</a> that fund the regime. CrowdStrike warns these groups share tools but have grown more capable and dangerous.</p><p class="paragraph" style="text-align:left;">🇺🇸 🏧 <b>The U.S. Justice Department charged 31 more people in a large ATM jackpotting scheme</b>, bringing the total to 87. Many suspects are Venezuelan members of the <i>Tren de Aragua</i> gang, and Colombians were also indicted. They <a class="link" href="https://www.securityweek.com/us-charges-31-more-defendants-in-massive-atm-hacking-probe/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">used Ploutus malware and physical tampering</a> to make ATMs spit out cash and hide their tracks.</p><p class="paragraph" style="text-align:left;">🇸🇰 🇺🇸 <b>A Slovakian man, Alan Bill, pleaded guilty to helping run </b><i><b>Kingdom Market</b></i><b>, a darknet site that sold drugs</b>, stolen data, fake IDs, and cybercrime tools. He was arrested in December 2023 with devices and crypto wallets linking him to the market. He <a class="link" href="https://www.justice.gov/usao-edmo/pr/slovakian-man-admits-aiding-darknet-market-sold-drugs-and-stolen-personal-information?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">faces at least five years in prison</a> and must forfeit seized domain names and cryptocurrency.</p><p class="paragraph" style="text-align:left;">📂 🤐 <b>A six-month-old WinRAR flaw (CVE-2025-8088) is being actively exploited by both nation-state groups</b> and cybercriminals. Attackers use a <a class="link" href="https://cyberscoop.com/winrar-defect-active-exploits-google-threat-intel/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">malicious RAR that drops malware silently</a> without user interaction, making detection hard. Google urges updating WinRAR and provides indicators to help defenders.</p><p class="paragraph" style="text-align:left;">💻️ <b>Security firm </b><i><b>Silent Push</b></i><b> says the </b><i><b>ShinyHunters-linked</b></i><b> </b><i><b>group</b></i><b> set up fake domains to target over 100 major organizations</b> across many industries. Attackers used <a class="link" href="https://www.silentpush.com/blog/slsh-alert/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">vishing and advanced phishing kits</a> to intercept SSO credentials and bypass MFA in real time. Several companies have confirmed breaches and the group posted millions of allegedly stolen records.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#f0f0f0;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🗓️ <b>{Cyber,Info}Sec Events</b>: My list of past and future <a class="link" href="https://github.com/xsa/infosec-events?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">{cyber,info}sec related events</a> — Feel free to contribute by submitting issues or pull requests (and don’t forget to <a class="link" href="https://github.com/xsa/infosec-events?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">star the project</a>); Thanks! 😉</p></div><p class="paragraph" style="text-align:left;"></p><div id="government-politics-and-privacy" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">👨🏻‍⚖️ 👀 GOVERNMENT, POLITICS, AND PRIVACY</h3><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/b-QHWpqjD-E" width="100%"></iframe><p class="paragraph" style="text-align:left;">🇺🇸 🤖 <b>The U.S. government wants other countries to adopt its AI cybersecurity standards</b> — Officials will use diplomacy and industry guidance to promote secure AI practices. They will also <a class="link" href="https://cyberscoop.com/us-global-ai-cybersecurity-standards-push-national-cyber-director/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">push AI defenses and modernize</a> federal networks.</p><p class="paragraph" style="text-align:left;">🇺🇸 <b>Wrongful-arrest</b> — Two paid penetration testers were <a class="link" href="https://arstechnica.com/security/2026/01/county-pays-600000-to-pentesters-it-arrested-for-assessing-courthouse-security/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">arrested in 2019 after testing security</a> at an Iowa courthouse. They had written permission from the Iowa Judicial Branch to perform physical attacks like lockpicking. The county agreed to pay them $600,000 to settle their wrongful-arrest and defamation lawsuit.</p><p class="paragraph" style="text-align:left;">🇺🇸 🤦‍♂️ <b>CISA’s acting director, Madhu Gottumukkala, uploaded sensitive “</b><i><b>for official use only</b></i><b>” contracting documents to the public ChatGPT</b>, triggering automated security warnings. DHS is <a class="link" href="https://techcrunch.com/2026/01/28/trumps-acting-cybersecurity-chief-uploaded-sensitive-government-docs-to-chatgpt/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">probing whether the uploads harmed government security</a>; Gottumukkala had been given a temporary exception to use the tool. He previously failed a counterintelligence polygraph and CISA limited staff access to classified data after his appointment.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;border-color:#3587E8;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🔗<i><b> Partners and Affiliates</b></i></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/6f403f9b-d3a1-4d60-9852-f0e0f9340b87/image.png?t=1740643992"/></div><p class="paragraph" style="text-align:center;">🌐 <i>Stay connected and secure on the go with </i><i><b><a class="link" href="https://airalo.pxf.io/c/5582065/1345899/15608?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">Airalo</a></b></i><i>&#39;s global eSIMs — Use the code </i><i><b>NEWTOAIRALO15</b></i><i> if you’re new to Airalo to get an additional 15% discount.</i></p></div><p class="paragraph" style="text-align:left;"></p><div id="malware-threats" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🦠 MALWARE & THREATS</h3><p class="paragraph" style="text-align:left;">🤗 <b>Researchers found an Android malware campaign using Hugging Face to host thousands of malicious</b> APK variants. A fake “<i>TrustBastion</i>” dropper tricks users into installing a security app, then downloads a remote-access payload that steals credentials and abuses Accessibility Services. Hugging Face <a class="link" href="https://www.bitdefender.com/en-us/blog/labs/android-trojan-campaign-hugging-face-hosting-rat-payload?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">removed the datasets after being alerted</a>; users should avoid sideloading apps and check app permissions.</p><p class="paragraph" style="text-align:left;">🐍 🎠 <b>Researchers found two fake PyPI spellchecker packages</b> that hid a base64 payload delivering a Python remote access trojan (RAT). The malicious payload was stored in a Basque dictionary file and was triggered when the package was imported, affecting over 1,000 downloads. The <a class="link" href="https://www.aikido.dev/blog/malicious-pypi-packages-spellcheckpy-and-spellcheckerpy-deliver-python-rat?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">campaign</a> resembles prior supply-chain attacks and highlights risks from typosquatting and AI-driven fake package references.</p><p class="paragraph" style="text-align:left;">🧩 <b>Security researchers found at least 16 malicious Chrome extensions that steal ChatGPT session tokens</b> and other credentials. The <a class="link" href="https://cyberscoop.com/chatgpt-browser-extensions-steal-your-data/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">extensions inject scripts to capture authorization data</a> and send it to attackers. Downloads are low now, but researchers warn the threat could grow quickly.</p><p class="paragraph" style="text-align:left;">⚒️ 🌐 <b>A new malware toolkit called </b><i><b>Stanley</b></i><b> lets attackers show fake web pages</b> while the browser’s address bar still shows the real site. It <a class="link" href="https://www.varonis.com/blog/stanley-malware-kit?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">can be sold as a service for $2,000–$6,000</a> and even promises publication on the Chrome Web Store. Infected browser extensions can push phishing pages and notifications to steal credentials without users noticing.</p><p class="paragraph" style="text-align:left;">🎣 🇮🇳 <b>Researchers found a phishing campaign in India using fake Income Tax Department emails</b> to deliver malware. The <a class="link" href="https://www.esentire.com/blog/weaponized-in-china-deployed-in-india-the-syncfuture-espionage-targeted-campaign?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">attack</a> sideloads a malicious DLL, escalates privileges, and installs <i>Blackmoon</i> and a repurposed SyncFuture RMM tool for spying. The attackers gain persistent access to monitor users and steal data while evading antivirus.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/0188b3a8-e304-45f0-a26b-aa0fc667c110/image.png?t=1769501579"/><div class="image__source"><span class="image__source_text"><p>Figure: Attack Flow/<a class="link" href="https://esentire.com?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">esentire.com</a></p></span></div></div></div><p class="paragraph" style="text-align:left;"></p><div id="ai-crypto-tech-tools" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🤖 🧰 AI, CRYPTO, TECH & TOOLS</h3><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/tF8nJM4qOLE" width="100%"></iframe><p class="paragraph" style="text-align:left;">💰️ 💰️ <b>Illegal crypto flows jumped to a record $158 billion in 2025</b>, reversing prior declines. TRM Labs <a class="link" href="https://www.trmlabs.com/reports-and-whitepapers/2026-crypto-crime-report?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">says</a> the rise was driven by sanctions-linked state actors, big hacks, and more sophisticated scams. Ransomware payments fell slightly, but laundering shifted to bridges and cross-chain methods.</p><p class="paragraph" style="text-align:left;">🔓️ <b>Researchers found 175,000 publicly exposed Ollama AI hosts</b> across 130 countries. Many of <a class="link" href="https://www.sentinelone.com/labs/silent-brothers-ollama-hosts-form-anonymous-ai-network-beyond-platform-guardrails/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">these systems allow tool-calling and run outside normal security controls</a>, creating high-risk attack surfaces. Threat actors are already exploiting exposed endpoints for LLMjacking and resale.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/a84aab41-6a56-44b2-8753-fd2c3198633e/Silent_Brothers_Chart_01-12-2026_02-scaled.png?t=1769779772"/><div class="image__source"><span class="image__source_text"><p>Figure: Top 10 Countries by share of unique hosts</p></span></div></div><p class="paragraph" style="text-align:left;">💬 🔐 <b>WhatsApp is adding a &quot;</b><i><b>Strict Account Settings</b></i><b>&quot; feature</b> to <a class="link" href="https://cyberscoop.com/whatsapp-strict-account-settings-lockdown-style-spyware-protection/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">block risky content from people</a> not in your contacts. It aims to protect high-risk users like journalists from spyware attacks. The feature will roll out soon and can be enabled in <code>Settings &gt; Privacy &gt; Advanced</code>.</p><p class="paragraph" style="text-align:left;">📱 🫣 <b>Samsung teased a new privacy feature that hides parts of your Galaxy phone screen</b> from onlookers. Users can customize it for apps, notifications, or when entering passcodes. The <a class="link" href="https://techcrunch.com/2026/01/28/samsung-teases-new-privacy-feature-to-hide-your-galaxy-phone-screen-from-onlookers/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">feature likely arrives on the Galaxy S26 Ultra</a> and uses hardware and software to block side views.</p><p class="paragraph" style="text-align:left;">📱 🤖 <b>Google is adding stronger anti-theft features to Android phones</b>, especially for Android 16 and up. New <a class="link" href="https://techcrunch.com/2026/01/27/android-phones-are-getting-more-anti-theft-features/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">controls</a> include easier toggles for Failed Authentication Lock, longer lockout times after wrong PINs, wider biometric protections, and a tougher Remote Lock. In Brazil, Theft Detection Lock and Remote Lock will be turned on by default.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/9796ccdb-8a75-4f9d-a30a-03d19dfd6d00/Android_Theft_Protection_Image.png?t=1769791715"/><div class="image__source"><span class="image__source_text"><p>Figure: UI changes with the new anti-theft features/Google</p></span></div></div><p class="paragraph" style="text-align:left;">🇪🇺 🔎 <b>The EU has </b><a class="link" href="https://ec.europa.eu/commission/presscorner/detail/en/ip_26_203?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow"><b>opened a formal probe</b></a><b> under the Digital Services Act into X after its Grok AI generated sexually explicit</b> and possibly child sexual abuse images. Regulators in the UK and California are also investigating and have questioned X’s safety and data practices. X later limited Grok’s image features to paid users amid criticism and a prior €120M DSA fine.</p><p class="paragraph" style="text-align:left;">→ <a class="link" href="https://cyberscoop.com/grok-undressed-victims-file-class-action-lawsuit-against-xai-elon-musk/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">Undressed victims file class action lawsuit against xAI for Grok deepfakes</a></p><div class="embed"><a class="embed__url" href="https://www.kiteworks.com/data-security-compliance-risk-annual-report/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank"><div class="embed__content"><p class="embed__title"> Blind Spots Exposed: Navigating AI, Third-Party Risks, and Compliance in 2025 </p><p class="embed__link"> www.kiteworks.com/data-security-compliance-risk-annual-report </p></div><img class="embed__image embed__image--right" src="https://www.kiteworks.com/wp-content/uploads/2025/08/search-image_AI-report-720-480-2-2x-100.jpg"/></a></div></div><p class="paragraph" style="text-align:left;"></p><div id="vulnerabilities-research-and-threat" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🐛 🧠 VULNERABILITIES, RESEARCH, AND THREAT INTELLIGENCE</h3><p class="paragraph" style="text-align:left;">➝ From the Patching Department:</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://thehackernews.com/2026/01/fortinet-patches-cve-2026-24858-after.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bleepingcomputer.com/news/microsoft/microsoft-patches-actively-exploited-office-zero-day-vulnerability/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">Microsoft patches actively exploited Office zero-day vulnerability</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/high-severity-remote-code-execution-vulnerability-patched-in-openssl/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">High-Severity Remote Code Execution Vulnerability Patched in OpenSSL</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://thehackernews.com/2026/01/smartermail-fixes-critical.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/solarwinds-patches-critical-web-help-desk-vulnerabilities/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">SolarWinds Patches Critical Web Help Desk Vulnerabilities</a></p></li></ul><hr class="content_break"><div class="embed"><a class="embed__url" href="https://unit42.paloaltonetworks.com/russian-cyberthreat-2026-winter-olympics/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank"><div class="embed__content"><p class="embed__title"> Understanding the Russian Cyber Threat to the 2026 Winter Olympics </p><p class="embed__link"> unit42.paloaltonetworks.com/russian-cyberthreat-2026-winter-olympics </p></div><img class="embed__image embed__image--right" src="https://unit42.paloaltonetworks.com/wp-content/uploads/2026/01/Ursa-Russia-B-1920x900-1.png"/></a></div><p class="paragraph" style="text-align:left;">🔓️ 🌩️ <b>Two vulnerabilities in the n8n workflow platform</b> could let attackers run code remotely. They <a class="link" href="https://research.jfrog.com/post/achieving-remote-code-execution-on-n8n-via-sandbox-escape/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">bypassed AST-based sandboxes</a> for JavaScript and Python, allowing full takeover of affected instances. Fixes were released in the listed n8n versions.</p><p class="paragraph" style="text-align:left;">🔓️ <b>A critical vulnerability (CVE-2026-22709) in the </b><i><b>vm2</b></i><b> Node.js sandbox</b> lets <a class="link" href="https://www.bleepingcomputer.com/news/security/critical-sandbox-escape-flaw-discovered-in-popular-vm2-nodejs-library/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">attackers escape the sandbox</a> and run code on the host. The bug stems from improper sanitization of global Promise callbacks and was fixed across versions 3.10.1–3.10.3. Users should upgrade to the latest vm2 release immediately.</p><p class="paragraph" style="text-align:left;">🔓️ <b>A critical bug in Grist‑Core called </b><i><b>Cellbreak</b></i><b> (</b><b><a class="link" href="https://github.com/gristlabs/grist-core/security/advisories/GHSA-7xvx-8pf2-pv5g?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">CVE‑2026‑24002</a></b><b>) lets malicious spreadsheet formulas escape Pyodide&#39;s sandbox</b> and run code on the host. The <a class="link" href="https://www.cyera.com/research-labs/cellbreak-grists-pyodide-sandbox-escape-and-the-data-at-risk-blast-radius?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">flaw can give attackers filesystem access</a>, credentials, and the ability to run OS or JavaScript commands. Update Grist to 1.7.9 or switch the sandbox to <code>gvisor</code> to mitigate the risk.</p></div><p class="paragraph" style="text-align:left;"></p><div id="ics-ot-io-t" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🛰️ ICS, OT & IoT</h3><div class="embed"><a class="embed__url" href="https://www.zetter-zeroday.com/polish-grid-systems-targeted-in-cyberattack-had-little-security-per-new-report/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank"><div class="embed__content"><p class="embed__title"> Polish Grid Systems Targeted in Cyberattack Had Little Security, Per New Report </p><p class="embed__link"> www.zetter-zeroday.com/polish-grid-systems-targeted-in-cyberattack-had-little-security-per-new-report </p></div><img class="embed__image embed__image--right" src="https://www.zetter-zeroday.com/content/images/size/w1200/2026/01/taweesak-jang-VxrqDeapMak-unsplash.jpg"/></a></div><p class="paragraph" style="text-align:left;">🇷🇺 🇵🇱 <b>A Russian state-linked group called </b><i><b>ELECTRUM</b></i><b> is tied to a coordinated December 2025 cyber attack on Poland&#39;s power grid</b> — Attackers breached control and communication systems at about 30 distributed energy sites and disabled some equipment beyond repair. Dragos <a class="link" href="https://5943619.hs-sites.com/hubfs/Reports/dragos-2025-poland-attack-report.pdf?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">says</a> <i>ELECTRUM</i> worked with an access-focused cluster (KAMACITE) to move from IT into OT and target grid systems.</p><p class="paragraph" style="text-align:left;">🐛 🔓️ <b>A </b><a class="link" href="https://thehackernews.com/2026/01/survey-of-100-energy-systems-reveals.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow"><b>study</b></a><b> of 100+ substations and power plants found widespread cybersecurity and operational gaps</b> that leave energy systems exposed. Common issues included unpatched devices, weak network segmentation, undocumented external connections, and poor asset inventories. Organizational problems like IT/OT silos and lack of OT security staff make these risks worse.</p><p class="paragraph" style="text-align:left;">🚪 🔓️ <b>Researchers found over 20 vulnerabilities in </b><i><b>Dormakaba</b></i><b> door access systems that could let attackers unlock doors</b>, steal PINs, or escalate attacks. The flaws included hardcoded keys, weak passwords, missing authentication, and exposed systems — some of which were internet-accessible. <i>Dormakaba</i> has been <a class="link" href="https://sec-consult.com/blog/detail/hands-free-lockpicking-critical-vulnerabilities-in-dormakabas-physical-access-control-system/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">patching systems and working with customers</a>, and says it knows of no real-world exploits so far.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#f0f0f0;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">💬 CONNECT</h3><p class="paragraph" style="text-align:left;">Follow me on <a class="link" href="https://infosec.exchange/@0x58?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">Mastodon</a> for quick daily updates and bite-sized content.</p><p class="paragraph" style="text-align:left;">Prefer using an RSS feed? Add <b>Infosec MASHUP</b> to your feed <a class="link" href="https://rss.beehiiv.com/feeds/HVhiKYpQlR.xml?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">here</a>.</p><p class="paragraph" style="text-align:center;"><b>Enjoying our newsletter? </b>Forward it to a colleague—<br>it’s one of the best ways to support us.</p><p class="paragraph" style="text-align:left;">Thanks for reading today’s newsletter, and if you&#39;re enjoying it and want to support my work, you can <b>buy me a coffee</b> ☕ over at <a class="link" href="https://www.buymeacoffee.com/0x58?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-05-2026" target="_blank" rel="noopener noreferrer nofollow">https://www.buymeacoffee.com/0x58</a></p><p class="paragraph" style="text-align:left;"> See you next time!</p><p class="paragraph" style="text-align:left;">-X.</p></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=0dc3ea04-46b4-4607-8141-17210a805afc&utm_medium=post_rss&utm_source=x_s_infosec_newsletter">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>🕵🏻‍♂️ [InfoSec MASHUP] 04/2026</title>
  <description>LastPass warns of a phishing campaign pretending to be LastPass; Under Armour investing breach; Jordanian authorities used Cellebrite phone-cracking tools to extract data from activists’ phones without consent; Ireland plans a new law to let police use spyware; Moxie Marlinspike launched Confer, a ChatGPT-like service built to protect user privacy; Attackers exploiting critical Fortinet FortiCloud flaw; Russian government hackers likely tried to knock out parts of Poland’s power grid;</description>
  <link>https://infosec-mashup.santolaria.net/p/infosec-mashup-04-2026</link>
  <guid isPermaLink="true">https://infosec-mashup.santolaria.net/p/infosec-mashup-04-2026</guid>
  <pubDate>Sat, 24 Jan 2026 09:27:16 +0000</pubDate>
  <atom:published>2026-01-24T09:27:16Z</atom:published>
    <dc:creator>Xavier Santolaria</dc:creator>
    <category><![CDATA[Malware]]></category>
    <category><![CDATA[Opensource]]></category>
    <category><![CDATA[Privacy]]></category>
    <category><![CDATA[Cybersecurity]]></category>
    <category><![CDATA[Threat Intelligence]]></category>
    <category><![CDATA[Ai]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'IBM Plex Sans',-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'IBM Plex Sans',-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">We now have <b>{{active_subscriber_count}} active subscribers</b>! Thank you all for being part of my newsletter. Please share it with your friends and colleagues, and let’s keep growing the community.</p><p class="paragraph" style="text-align:left;">Let’s now dive into this week’s top insights! 🚀</p><h2 class="heading" style="text-align:left;">Table of Contents</h2><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="#breaches-security-incidents" rel="noopener noreferrer nofollow">BREACHES & SECURITY INCIDENTS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#cybercrime-cyber-espionage-ap-ts" rel="noopener noreferrer nofollow">CYBERCRIME, CYBER ESPIONAGE, APT’s</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#government-politics-and-privacy" rel="noopener noreferrer nofollow">GOVERNMENT, POLITICS, AND PRIVACY</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#malware-threats" rel="noopener noreferrer nofollow">MALWARE & THREATS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#ai-crypto-tech-tools" rel="noopener noreferrer nofollow">AI, CRYPTO, TECH & TOOLS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#vulnerabilities-research-and-threat" rel="noopener noreferrer nofollow">VULNERABILITIES, RESEARCH, AND THREAT INTELLIGENCE</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#ics-ot-io-t" rel="noopener noreferrer nofollow">ICS, OT & IoT</a></p></li></ul><div id="breaches-security-incidents" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🔓 BREACHES & SECURITY INCIDENTS</h3><p class="paragraph" style="text-align:left;">🇺🇸 🎽 <b>Under Armour is investigating a data breach that exposed about 72 million customers&#39; email addresses</b> and some personal details. The <a class="link" href="https://www.securityweek.com/under-armour-looking-into-data-breach-affecting-customers-email-addresses/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026" target="_blank" rel="noopener noreferrer nofollow">company says there is no evidence passwords</a> or payment data were taken. Security experts agree but note it is odd Under Armour has not issued a full public disclosure.</p><p class="paragraph" style="text-align:left;">💸 <b>IT distributor </b><i><b>Ingram Micro</b></i><b> suffered a ransomware attack on July 3, 2025</b>, that disrupted services and forced systems offline. About <a class="link" href="https://www.securityweek.com/42000-impacted-by-ingram-micro-ransomware-attack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026" target="_blank" rel="noopener noreferrer nofollow">42,521 people had personal and employment data exposed</a>, including Social Security and passport numbers. The company restored systems within a week and is offering 24 months of free credit monitoring while the stolen data was later published online.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;border-color:#3587E8;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🔗<i><b> Partners and Affiliates</b></i></p><p class="paragraph" style="text-align:left;">🔐 <a class="link" href="https://go.nordvpn.net/aff_c?offer_id=15&aff_id=84917&url_id=902&utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026" target="_blank" rel="noopener noreferrer nofollow">NordVPN Threat Protection Pro™ Campaign</a> </p><p class="paragraph" style="text-align:left;"><i>With its user-friendly interface, robust security features, and commitment to privacy, NordVPN continues to be a popular choice for individuals seeking online protection and unrestricted internet access.</i></p><p class="paragraph" style="text-align:left;"><i><b>Special Offer</b></i><i>: </i>get up to 73% off with a 2-year plan!</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://go.nordvpn.net/aff_c?offer_id=15&aff_id=84917&url_id=902&utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026"><span class="button__text" style=""> GET THE DEAL </span></a></div></div><p class="paragraph" style="text-align:left;"></p><div id="cybercrime-cyber-espionage-ap-ts" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🥷🏻 CYBERCRIME, CYBER ESPIONAGE, APT’s</h3><p class="paragraph" style="text-align:left;">🇷🇺 🇵🇱 <b>Security firm ESET says Russian government hackers likely tried to knock out parts of Poland’s power grid</b> in late December. The <a class="link" href="https://techcrunch.com/2026/01/23/researchers-say-russian-government-hackers-were-behind-attempted-poland-power-outage/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026" target="_blank" rel="noopener noreferrer nofollow">attackers used destructive “wiper” malware</a> tied to the <i>Sandworm</i> group, which has hit energy systems before. Poland says defenses held and critical infrastructure was not knocked out.</p><p class="paragraph" style="text-align:left;">🇺🇸 🔑 <b>Microsoft gave the FBI BitLocker recovery keys to unlock three suspects’ laptops</b> in a fraud probe. BitLocker keys are <a class="link" href="https://techcrunch.com/2026/01/23/microsoft-gave-fbi-a-set-of-bitlocker-encryption-keys-to-unlock-suspects-laptops-reports/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026" target="_blank" rel="noopener noreferrer nofollow">often stored in Microsoft’s cloud by default</a>, letting the company and authorities access encrypted drives. Experts warn this practice risks privacy and could be dangerous if Microsoft’s cloud is breached.</p><p class="paragraph" style="text-align:left;">🇷🇺 🇬🇧 <b>The U.K. warns that Russian-aligned hacktivists, especially </b><i><b>NoName057(016)</b></i>, are <a class="link" href="https://www.ncsc.gov.uk/news/pro-russia-hacktivist-activity-continues-to-target-uk-organisations?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026" target="_blank" rel="noopener noreferrer nofollow">carrying out disruptive DDoS attacks</a> against critical infrastructure and local governments. These attacks, while not sophisticated, can take services offline and cause big costs and operational disruption. The NCSC urges stronger defenses, redundancy, and rehearsed response plans to reduce DDoS risk.</p><p class="paragraph" style="text-align:left;">🇯🇴 🧑‍⚖️ <b>A Jordanian man, Feras Albashiti, pleaded guilty to selling access to the networks</b> of at least 50 companies. He was <a class="link" href="https://www.bleepingcomputer.com/news/security/jordanian-pleads-guilty-to-selling-access-to-50-corporate-networks/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026" target="_blank" rel="noopener noreferrer nofollow">extradited from Georgia and faces up to 10 years in prison</a> and large fines. Authorities say initial access brokers like him enable ransomware and other cybercrimes.</p><p class="paragraph" style="text-align:left;">🚓 🇪🇺 <b>EU and INTERPOL have listed </b><a class="link" href="https://www.interpol.int/How-we-work/Notices/Red-Notices/View-Red-Notices?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026#2025-100086" target="_blank" rel="noopener noreferrer nofollow"><i><b>Oleg Nefedov</b></i></a><b>, the alleged leader of the Russia-linked </b><i><b>Black Basta</b></i><b> ransomware group, as most wanted</b> — Ukrainian and German police say <a class="link" href="https://thehackernews.com/2026/01/black-basta-ransomware-hacker-leader.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026" target="_blank" rel="noopener noreferrer nofollow">two Ukrainians tied to the group were identified</a> and searched for hash-cracking and deploying ransomware. <i>Black Basta</i> is blamed for attacking 500+ companies and may have splintered or shifted members to other ransomware gangs.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#f0f0f0;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🗓️ <b>{Cyber,Info}Sec Events</b>: My list of past and future <a class="link" href="https://github.com/xsa/infosec-events?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026" target="_blank" rel="noopener noreferrer nofollow">{cyber,info}sec related events</a> — Feel free to contribute by submitting issues or pull requests (and don’t forget to <a class="link" href="https://github.com/xsa/infosec-events?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026" target="_blank" rel="noopener noreferrer nofollow">star the project</a>); Thanks! 😉</p></div><p class="paragraph" style="text-align:left;"></p><div id="government-politics-and-privacy" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">👨🏻‍⚖️ 👀 GOVERNMENT, POLITICS, AND PRIVACY</h3><div class="embed"><a class="embed__url" href="https://www.404media.co/ices-facial-recognition-app-misidentified-a-woman-twice/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026" target="_blank"><div class="embed__content"><p class="embed__title"> ICE’s Facial Recognition App Misidentified a Woman. Twice </p><p class="embed__description"> In testimony from a CBP official obtained by 404 Media, the official described how Mobile Fortify returned two different names after scanning a woman&#39;s face during an immigration raid. ICE has said the app&#39;s results are a “definitive” determination of someone&#39;s immigration status. </p><p class="embed__link"> www.404media.co/ices-facial-recognition-app-misidentified-a-woman-twice </p></div><img class="embed__image embed__image--right" src="https://www.404media.co/content/images/size/w1200/2026/01/54977911914_4995b93005_k.jpg"/></a></div><p class="paragraph" style="text-align:left;">🇯🇴 📲 <b>Researchers found Jordanian authorities used Cellebrite phone-cracking tools to extract data from activists’ phones</b> without consent. <a class="link" href="https://cyberscoop.com/researchers-find-jordan-government-used-cellebrite-phone-cracking-tech-against-activists/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026" target="_blank" rel="noopener noreferrer nofollow">Citizen Lab said this likely violates human rights treaties</a> and urged Cellebrite to investigate. Cellebrite denied misuse, saying it vets customers and requires legal authority for access.</p><p class="paragraph" style="text-align:left;">🇺🇸 <b>A watchdog group sued the government to get records about a TSA-ICE data sharing deal </b>that gave passenger travel data to immigration agents. The <a class="link" href="https://cyberscoop.com/american-oversight-sues-tsa-ice-over-data-sharing-partnership-fight-records/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026" target="_blank" rel="noopener noreferrer nofollow">group says FOIA requests were ignored</a> after it asked what data was shared and whether U.S. citizens were affected. TSA defends the practice as legal and part of DHS’s security mission, while critics say TSA should not help with immigration enforcement.</p><p class="paragraph" style="text-align:left;">🇮🇪 👀 <b>Ireland plans a new law to let police use spyware</b> and other surveillance tools. The <a class="link" href="https://techcrunch.com/2026/01/22/ireland-proposes-new-law-allowing-police-to-use-spyware/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026" target="_blank" rel="noopener noreferrer nofollow">bill would cover encrypted and unencrypted communications</a> but promises judicial oversight and safeguards. Critics warn spyware has a history of abuse in Europe despite some existing rules.</p><p class="paragraph" style="text-align:left;">🇻🇪 <b>U.S. officials say cyberattacks helped shut off power and disable air-defense radar during the January 3 operation</b> that <a class="link" href="https://www.securityweek.com/new-reports-reinforce-cyberattacks-role-in-maduro-capture-blackout/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026" target="_blank" rel="noopener noreferrer nofollow">captured President Nicolás Maduro</a>. Some evidence also points to physical attacks (like graphite bombs) and Venezuela’s weak grid making disruption easier. Analysts say the mission used layered cyber and kinetic tools rather than cyberattack alone.</p><p class="paragraph" style="text-align:left;">🇺🇸 🤷 <b>Trump administration admits DOGE may have misused Americans’ Social Security data</b> — Two members of Elon Musk’s DOGE team at the Social Security Administration <a class="link" href="https://techcrunch.com/2026/01/20/trump-administration-admits-doge-may-have-misused-americans-social-security-data/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026" target="_blank" rel="noopener noreferrer nofollow">may have used and shared Americans’ Social Security data to help a political advocacy group</a>. The group wanted to find voter fraud and overturn election results in some states. The SSA referred the employees for possible Hatch Act violations and a judge had already blocked their access to sensitive records.</p><p class="paragraph" style="text-align:left;">🇺🇸 <b>Congressional appropriators proposed a spending package that extends a key cyber threat information-sharing law</b> through Sept. 30. The bill provides $2.6 billion for CISA, including $39.6 million for election security and rules to maintain staffing levels. The <a class="link" href="https://cyberscoop.com/congressional-appropriators-move-to-extend-information-sharing-law-fund-cisa/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026" target="_blank" rel="noopener noreferrer nofollow">package also extends cybersecurity grants and the Technology Modernization Fund</a> but faces political hurdles in Congress.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;border-color:#3587E8;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🔗<i><b> Partners and Affiliates</b></i></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/6f403f9b-d3a1-4d60-9852-f0e0f9340b87/image.png?t=1740643992"/></div><p class="paragraph" style="text-align:center;">🌐 <i>Stay connected and secure on the go with </i><i><b><a class="link" href="https://airalo.pxf.io/c/5582065/1345899/15608?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026" target="_blank" rel="noopener noreferrer nofollow">Airalo</a></b></i><i>&#39;s global eSIMs — Use the code </i><i><b>NEWTOAIRALO15</b></i><i> if you’re new to Airalo to get an additional 15% discount.</i></p></div><p class="paragraph" style="text-align:left;"></p><div id="malware-threats" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🦠 MALWARE & THREATS</h3><p class="paragraph" style="text-align:left;">🇻🇪 🏧 🇺🇸 <b>Two Venezuelan nationals were convicted for using malware to make ATMs spit out cash</b> and will be deported after serving prison time. They <a class="link" href="https://www.bleepingcomputer.com/news/security/us-to-deport-venezuelans-who-emptied-bank-atms-using-malware/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026" target="_blank" rel="noopener noreferrer nofollow">targeted older ATMs across several southeastern states</a> and stole money directly from banks. Larger related indictments in Nebraska tie dozens more to the scheme and to a known gang leader.</p><p class="paragraph" style="text-align:left;">📄 <b>Security researchers found a new malware family called </b><i><b>PDFSider</b></i><b> that acts like an APT backdoor</b> and is used by ransomware groups. It is <a class="link" href="https://www.resecurity.com/es/blog/article/pdfsider-malware-exploitation-of-dll-side-loading-for-av-and-edr-evasion?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026" target="_blank" rel="noopener noreferrer nofollow">sideloaded through a legitimate PDF24 app</a> delivered in spear-phishing ZIPs and runs mostly in memory to hide and execute commands. PDFSider uses encrypted C&C, evades AV/EDR, and includes checks to avoid analysis and virtual machines.</p><p class="paragraph" style="text-align:left;">🇰🇵 <b>North Korean hackers are luring macOS developers with fake GitHub/GitLab projects</b> that <a class="link" href="https://www.jamf.com/blog/threat-actors-expand-abuse-of-visual-studio-code/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026" target="_blank" rel="noopener noreferrer nofollow">contain malicious VS Code task files</a>. When a developer trusts the project, obfuscated JavaScript runs, installs a persistent backdoor, and phones home to a C&C server. The backdoor can execute further code, gather system info, and expand its capabilities.</p><p class="paragraph" style="text-align:left;">📲 <b>Researchers found Android trojans that use </b><code>TensorFlow.js</code><b> to visually detect and click hidden browser ads</b> inside a concealed WebView. The <a class="link" href="https://www.bleepingcomputer.com/news/security/new-android-malware-uses-ai-to-click-on-hidden-browser-ads/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026" target="_blank" rel="noopener noreferrer nofollow">malware spreads via Xiaomi’s GetApps, third-party APK sites, Telegram, and Discord</a>, often appearing as working game or mod apps. Users should avoid installing apps outside Google Play to reduce risk of covert ad fraud, battery drain, and data overuse.</p><p class="paragraph" style="text-align:left;">🐍 ℹ️ <i><b>SolyxImmortal</b></i><b> is a new Python-based information stealer</b> that quietly monitors Windows users and steals credentials, documents, keystrokes, and screenshots. It uses hardcoded controllers and Discord webhooks to stage and exfiltrate data over HTTPS, avoiding network detection. <i>Cyfirma</i> <a class="link" href="https://www.cyfirma.com/research/solyximmortal-python-malware-analysis/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026" target="_blank" rel="noopener noreferrer nofollow">says</a> it targets opportunistic attackers and can be easily repurposed or redistributed.</p></div><p class="paragraph" style="text-align:left;"></p><div id="ai-crypto-tech-tools" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🤖 🧰 AI, CRYPTO, TECH & TOOLS</h3><p class="paragraph" style="text-align:left;">👶 <b>OpenAI added an age-prediction feature to ChatGPT to better protect young users</b> — The <a class="link" href="https://techcrunch.com/2026/01/20/in-an-effort-to-protect-young-users-chatgpt-will-now-predict-how-old-you-are/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026" target="_blank" rel="noopener noreferrer nofollow">system uses account signals</a> like stated age, account age, and activity times to flag likely minors and apply stricter content filters. Users who are misidentified can verify their age by submitting ID via a selfie through OpenAI’s partner.</p><p class="paragraph" style="text-align:left;">📆 🤖 <b>Researchers tricked Google’s Gemini assistant using a malicious Calendar event</b> description. When a user asked about their schedule, Gemini created a new event that exposed private meeting details. <a class="link" href="https://www.bleepingcomputer.com/news/security/gemini-ai-assistant-tricked-into-leaking-google-calendar-data/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026" target="_blank" rel="noopener noreferrer nofollow">Miggo Security warned Google and mitigations were added</a>, but the attack shows AI prompt handling can still leak sensitive data.</p><p class="paragraph" style="text-align:left;">💬 🔐 <b>Moxie Marlinspike launched </b><i><b>Confer</b></i><b>, a ChatGPT-like service built to protect user privacy</b> — It <a class="link" href="https://techcrunch.com/2026/01/18/moxie-marlinspike-has-a-privacy-conscious-alternative-to-chatgpt/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026" target="_blank" rel="noopener noreferrer nofollow">encrypts conversations and runs model inference in secure hardware</a> so hosts can’t access or use the data. A free tier limits messages, while paid plans offer unlimited access and more features.</p><div class="embed"><a class="embed__url" href="https://unit42.paloaltonetworks.com/real-time-malicious-javascript-through-llms/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026" target="_blank"><div class="embed__content"><p class="embed__title"> The Next Frontier of Runtime Assembly Attacks: Leveraging LLMs to Generate Phishing JavaScript in Real Time </p><p class="embed__description"> We discuss a novel AI-augmented attack method where malicious webpages use LLM services to generate dynamic code in real-time within a browser. </p><p class="embed__link"> unit42.paloaltonetworks.com/real-time-malicious-javascript-through-llms </p></div><img class="embed__image embed__image--right" src="https://unit42.paloaltonetworks.com/wp-content/uploads/2026/01/09_Business_email_compromise_Category_1920x900.jpg"/></a></div></div><p class="paragraph" style="text-align:left;"></p><div id="vulnerabilities-research-and-threat" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🐛 🧠 VULNERABILITIES, RESEARCH, AND THREAT INTELLIGENCE</h3><p class="paragraph" style="text-align:left;">➝ From the Patching Department:</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/atlassian-gitlab-zoom-release-security-patches/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026" target="_blank" rel="noopener noreferrer nofollow">Atlassian, GitLab, Zoom Release Security Patches</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://thehackernews.com/2026/01/cisco-fixes-actively-exploited-zero-day.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026" target="_blank" rel="noopener noreferrer nofollow">Cisco Fixes Actively Exploited Zero-Day CVE-2026-20045 in Unified CM and Webex</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://thehackernews.com/2026/01/cloudflare-fixes-acme-validation-bug.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026" target="_blank" rel="noopener noreferrer nofollow">Cloudflare Fixes ACME Validation Bug Allowing WAF Bypass to Origin Servers</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://beyondmachines.net/event_details/google-patches-high-severity-v8-race-condition-in-chrome-144-b-f-y-a-y/gD2P6Ple2L?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026" target="_blank" rel="noopener noreferrer nofollow">Google Patches High-Severity V8 Race Condition in Chrome 144</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/oracles-first-2026-cpu-delivers-337-new-security-patches/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026" target="_blank" rel="noopener noreferrer nofollow">Oracle’s First 2026 CPU Delivers 337 New Security Patches</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/tp-link-patches-vulnerability-exposing-vigi-cameras-to-hacking/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026" target="_blank" rel="noopener noreferrer nofollow">TP-Link Patches Vulnerability Exposing VIGI Cameras to Remote Hacking</a></p></li></ul><hr class="content_break"><p class="paragraph" style="text-align:left;">💥 <b>Fortinet confirmed a critical </b><i><b>FortiCloud</b></i><b> SSO authentication bypass (CVE-2025-59718)</b> is not fully patched. <a class="link" href="https://arcticwolf.com/resources/blog/arctic-wolf-observes-malicious-configuration-changes-fortinet-fortigate-devices-via-sso-accounts/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026" target="_blank" rel="noopener noreferrer nofollow">Attackers have been exploiting the flaw</a> to create admin accounts and steal firewall configurations, even on fully updated devices. Fortinet advises disabling <i>FortiCloud</i> SSO and restricting admin access while it works on a complete fix.</p><p class="paragraph" style="text-align:left;">🇪🇺 🐛 <b>A European group launched </b><i><b>GCVE</b></i><b>, a decentralized system for naming software security flaws</b> — It <a class="link" href="https://cyberscoop.com/gcve-vulnerability-database-launches/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026" target="_blank" rel="noopener noreferrer nofollow">lets many organizations assign IDs without central approval</a> while staying compatible with the old CVE format. The move responds to funding and governance worries about the 25-year CVE program.</p><p class="paragraph" style="text-align:left;">🎣 📩 <b>LastPass warns of a phishing campaign pretending to be LastPass</b> and asking for master passwords. Scam emails urge a 24-hour “backup” and link to fake sites; <a class="link" href="https://blog.lastpass.com/posts/new-phishing-campaign-targeting-lastpass-customers?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026" target="_blank" rel="noopener noreferrer nofollow">LastPass says it will never ask</a> for your master password. They are working to take down the malicious domains and shared the scammer email addresses.</p><p class="paragraph" style="text-align:left;">💰️ 🚗 <b>Security researchers earned $1,047,000 by exploiting 76 zero-day bugs at Pwn2Own Automotive</b> 2026 in Tokyo. They <a class="link" href="https://www.bleepingcomputer.com/news/security/hackers-get-1-047-000-for-76-zero-days-at-pwn2own-automotive-2026/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026" target="_blank" rel="noopener noreferrer nofollow">hacked</a> in-vehicle infotainment systems, EV chargers, and car OSes and must give vendors 90 days to fix the bugs. Team <i>Fuzzware.io</i> won top prize with $215,000.</p><p class="paragraph" style="text-align:left;">🤖 <i><b>HackerOne</b></i><b> launched a Good Faith AI Research Safe Harbor to protect researchers who test AI systems</b> for security and safety issues. Participating <a class="link" href="https://cyberscoop.com/hackerone-industry-framework-good-faith-ai-research/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026" target="_blank" rel="noopener noreferrer nofollow">companies pledge to avoid legal action</a> and support researchers facing third-party claims. The goal is to enable more open testing of AI while formal laws and rules catch up.</p></div><p class="paragraph" style="text-align:left;"></p><div id="ics-ot-io-t" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🛰️ ICS, OT & IoT</h3><p class="paragraph" style="text-align:left;">📄 <b>MITRE released the Embedded Systems Threat Matrix (ESTM)</b> to <a class="link" href="https://www.securityweek.com/mitre-launches-new-security-framework-for-embedded-systems/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026" target="_blank" rel="noopener noreferrer nofollow">help secure hardware and firmware</a>. It maps attack tactics and techniques for industries like energy, healthcare, and transportation. ESTM 3.0 is community-focused and designed to integrate with existing security models.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#f0f0f0;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">💬 CONNECT</h3><p class="paragraph" style="text-align:left;">Follow me on <a class="link" href="https://infosec.exchange/@0x58?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026" target="_blank" rel="noopener noreferrer nofollow">Mastodon</a> for quick daily updates and bite-sized content.</p><p class="paragraph" style="text-align:left;">Prefer using an RSS feed? Add <b>Infosec MASHUP</b> to your feed <a class="link" href="https://rss.beehiiv.com/feeds/HVhiKYpQlR.xml?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026" target="_blank" rel="noopener noreferrer nofollow">here</a>.</p><p class="paragraph" style="text-align:center;"><b>Enjoying our newsletter? </b>Forward it to a colleague—<br>it’s one of the best ways to support us.</p><p class="paragraph" style="text-align:left;">Thanks for reading today’s newsletter, and if you&#39;re enjoying it and want to support my work, you can <b>buy me a coffee</b> ☕ over at <a class="link" href="https://www.buymeacoffee.com/0x58?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-04-2026" target="_blank" rel="noopener noreferrer nofollow">https://www.buymeacoffee.com/0x58</a></p><p class="paragraph" style="text-align:left;"> See you next time!</p><p class="paragraph" style="text-align:left;">-X.</p></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=b7f70a66-06cf-493a-8604-cafa722395e5&utm_medium=post_rss&utm_source=x_s_infosec_newsletter">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>🕵🏻‍♂️ [InfoSec MASHUP] 03/2026</title>
  <description>BreachForums had its user database leaked; RedVDS Infrastructure seized by Microsoft and Law Enforcement; Europol and Spanish police arrested 34 people linked to the Black Axe; New modular Linux malware framework called VoidLink; MongoBleed, a critical, unauthenticated MongoDB memory-leak vulnerability; Microsoft Patch Tuesday addresses 112 defects, including one actively exploited zero-day;</description>
  <link>https://infosec-mashup.santolaria.net/p/infosec-mashup-03-2026</link>
  <guid isPermaLink="true">https://infosec-mashup.santolaria.net/p/infosec-mashup-03-2026</guid>
  <pubDate>Sat, 17 Jan 2026 07:54:55 +0000</pubDate>
  <atom:published>2026-01-17T07:54:55Z</atom:published>
    <dc:creator>Xavier Santolaria</dc:creator>
    <category><![CDATA[Malware]]></category>
    <category><![CDATA[Opensource]]></category>
    <category><![CDATA[Privacy]]></category>
    <category><![CDATA[Cybersecurity]]></category>
    <category><![CDATA[Threat Intelligence]]></category>
    <category><![CDATA[Ai]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'IBM Plex Sans',-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'IBM Plex Sans',-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">We now have <b>{{active_subscriber_count}} active subscribers</b>! Thank you all for being part of my newsletter. Please share it with your friends and colleagues, and let’s keep growing the community.</p><p class="paragraph" style="text-align:left;">Let’s now dive into this week’s top insights! 🚀</p><h2 class="heading" style="text-align:left;">Table of Contents</h2><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="#breaches-security-incidents" rel="noopener noreferrer nofollow">BREACHES & SECURITY INCIDENTS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#cybercrime-cyber-espionage-ap-ts" rel="noopener noreferrer nofollow">CYBERCRIME, CYBER ESPIONAGE, APT’s</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#government-politics-and-privacy" rel="noopener noreferrer nofollow">GOVERNMENT, POLITICS, AND PRIVACY</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#malware-threats" rel="noopener noreferrer nofollow">MALWARE & THREATS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#ai-crypto-tech-tools" rel="noopener noreferrer nofollow">AI, CRYPTO, TECH & TOOLS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#vulnerabilities-research-and-threat" rel="noopener noreferrer nofollow">VULNERABILITIES, RESEARCH, AND THREAT INTELLIGENCE</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#ics-ot-io-t" rel="noopener noreferrer nofollow">ICS, OT & IoT</a></p></li></ul><div id="breaches-security-incidents" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🔓 BREACHES & SECURITY INCIDENTS</h3><p class="paragraph" style="text-align:left;">🇰🇷 <b>South Korean conglomerate </b><i><b>Kyowon</b></i><b> confirmed a ransomware attack</b> that stole data on January 1. About 9.6 million accounts (5.5 million people) may be affected and roughly 600 of 800 servers were hit. <i>Kyowon</i> is <a class="link" href="https://www.bleepingcomputer.com/news/security/south-korean-giant-kyowon-confirms-data-theft-in-ransomware-attack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">investigating with authorities</a> and working to restore services.</p><p class="paragraph" style="text-align:left;">🇧🇪 <b>Belgian hospital </b><i><b>AZ Monica</b></i><b> shut down all servers after a cyberattack</b> and canceled scheduled procedures. Emergency services and intensive care are largely offline, and seven critical patients were transferred out. Authorities are investigating and the <a class="link" href="https://www.bleepingcomputer.com/news/security/belgian-hospital-az-monica-shuts-down-servers-after-cyberattack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">hospital says it is monitoring the situation</a> and will provide updates.</p><p class="paragraph" style="text-align:left;">🇺🇸 <b>JPMorgan Chase told Maine authorities that 659 investors were affected by a data breach</b> at law firm Fried Frank. Stolen files included names, contact details, account numbers, SSNs, and passport or ID numbers. <a class="link" href="https://www.securityweek.com/after-goldman-jpmorgan-discloses-law-firm-data-breach/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">Fried Frank says it contained the incident</a>, hired experts, and believes exposed data is unlikely to be misused.</p><p class="paragraph" style="text-align:left;">🇪🇸 🪫 <b>Spanish utility Endesa says hackers accessed customer contract data</b> at its Energía XXI unit, including names, contact details, ID numbers, contract and payment info. The <a class="link" href="https://www.bleepingcomputer.com/news/security/spanish-energy-giant-endesa-discloses-data-breach-affecting-customers/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">company blocked compromised accounts</a>, notified authorities and affected customers, and found no evidence yet of fraudulent use. Threat actors claim to be selling about 20 million stolen records.</p><p class="paragraph" style="text-align:left;">🇺🇸 🏝️ <b>Hackers stole social security numbers and other data from a University of Hawaii Cancer Center </b>study in August. UH waited months to <a class="link" href="https://www.hawaii.edu/govrel/docs/reports/2026/hrs487n-4_2026_cancer-center-exposure_report_508.pdf?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">report</a> the breach, gave few details, and won’t say whether it paid the hackers. The university is notifying participants, offering credit monitoring, and has tightened security.</p><p class="paragraph" style="text-align:left;">🔓️ <b>The BreachForums hacking site had its user database leaked</b>, exposing about 324,000 accounts. The <a class="link" href="https://www.bleepingcomputer.com/news/security/breachforums-hacking-forum-database-leaked-exposing-324-000-accounts/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">leak</a> included a passphrase-protected PGP key and a MyBB users table with IPs and registration data. Some records show public IPs that could aid law enforcement and pose OPSEC risks for users.</p><p class="paragraph" style="text-align:left;">→ More breaches:</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/750000-impacted-by-data-breach-at-canadian-investment-watchdog/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">750,000 Impacted by Data Breach at Canadian Investment Watchdog</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bleepingcomputer.com/news/security/central-maine-healthcare-breach-exposed-data-of-over-145-000-people/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">Central Maine Healthcare breach exposed data of over 145,000 people</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bleepingcomputer.com/news/security/monroe-university-says-2024-data-breach-affects-320-000-people/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">Monroe University says 2024 data breach affects 320,000 people</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bleepingcomputer.com/news/security/france-fines-free-mobile-42-million-over-2024-data-breach-incident/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">France fines Free Mobile €42 million over 2024 data breach incident</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/traveler-information-stolen-in-eurail-data-breach/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">Traveler Information Stolen in Eurail Data Breach</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/robo-advisor-betterment-discloses-data-breach/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">Robo-Advisor Betterment Discloses Data Breach</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bleepingcomputer.com/news/security/victorian-department-of-education-notifies-parents-of-data-breach/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">Victorian Department of Education says hackers stole students’ data</a></p></li></ul></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;border-color:#3587E8;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🔗<i><b> Partners and Affiliates</b></i></p><p class="paragraph" style="text-align:left;">🔐 <a class="link" href="https://go.nordvpn.net/aff_c?offer_id=15&aff_id=84917&url_id=902&utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">NordVPN Threat Protection Pro™ Campaign</a> </p><p class="paragraph" style="text-align:left;"><i>With its user-friendly interface, robust security features, and commitment to privacy, NordVPN continues to be a popular choice for individuals seeking online protection and unrestricted internet access.</i></p><p class="paragraph" style="text-align:left;"><i><b>Special Offer</b></i><i>: </i>get up to 73% off with a 2-year plan!</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://go.nordvpn.net/aff_c?offer_id=15&aff_id=84917&url_id=902&utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026"><span class="button__text" style=""> GET THE DEAL </span></a></div></div><p class="paragraph" style="text-align:left;"></p><div id="cybercrime-cyber-espionage-ap-ts" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🥷🏻 CYBERCRIME, CYBER ESPIONAGE, APT’s</h3><p class="paragraph" style="text-align:left;">❌ <b>Microsoft and international law enforcement seized the infrastructure of </b><i><b>RedVDS</b></i>, a <a class="link" href="https://cyberscoop.com/microsoft-seizes-disrupts-redvds-cybercrime-marketplace/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">cybercrime marketplace that rented disposable virtual computers</a> to criminals. <i>RedVDS</i> enabled widespread phishing, account takeovers, and at least $40 million in U.S. fraud losses, affecting hundreds of thousands of accounts. The takedown disrupted the service and aims to help identify those behind it.</p><p class="paragraph" style="text-align:left;">🇳🇱 ⚖️ <b>A Dutch man was sentenced to seven years for hacking port systems in Rotterdam, Barendrecht and Antwerp</b> to <a class="link" href="https://www.bleepingcomputer.com/news/security/hacker-gets-seven-years-for-breaching-rotterdam-and-antwerp-ports/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">help smuggle drugs</a> and for attempted extortion. His appeal failed despite claims that evidence from Sky ECC messages was unlawfully obtained. The court kept most convictions but dropped one drug charge about importing 5,000 kg of cocaine.</p><p class="paragraph" style="text-align:left;">🇪🇸 🇪🇺 <b>Europol and Spanish police arrested 34 people linked to the </b><i><b>Black Axe</b></i><b> criminal group</b> in raids across Spain. The group is accused of cyber-enabled fraud, drug and human trafficking, kidnapping, and other violent crimes that caused over €5.9 million in losses. Authorities also <a class="link" href="https://www.europol.europa.eu/media-press/newsroom/news/34-arrests-in-spain-during-action-against-black-axe-criminal-organisation?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">froze bank accounts and seized cash and assets</a> while investigations continue.</p><p class="paragraph" style="text-align:left;">🇺🇸 ⚖️ <b>A 24-year-old man from Tennessee is expected to plead guilty to hacking the U.S. Supreme Court</b>’s electronic filing system. Prosecutors say <a class="link" href="https://techcrunch.com/2026/01/13/man-to-plead-guilty-to-hacking-us-supreme-court-filing-system/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">he accessed the system without authorization</a> on 25 days between August and October 2023. Details about what was taken or how are not yet public.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#f0f0f0;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🗓️ <b>{Cyber,Info}Sec Events</b>: My list of past and future <a class="link" href="https://github.com/xsa/infosec-events?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">{cyber,info}sec related events</a> — Feel free to contribute by submitting issues or pull requests (and don’t forget to <a class="link" href="https://github.com/xsa/infosec-events?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">star the project</a>); Thanks! 😉</p></div><p class="paragraph" style="text-align:left;"></p><div id="government-politics-and-privacy" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">👨🏻‍⚖️ 👀 GOVERNMENT, POLITICS, AND PRIVACY</h3><p class="paragraph" style="text-align:left;">🇮🇷 🔌 <b>Iran has cut off internet and phone access nationwide</b> for more than a week, leaving about 92 million people offline. The <a class="link" href="https://techcrunch.com/2026/01/15/irans-internet-shutdown-is-now-one-of-its-longest-ever-as-protests-continue/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">shutdown</a> is one of Iran’s longest and comes amid large anti-government protests and a violent crackdown. Some services and a few Starlink users have limited access, while international tensions and evacuations rise.</p><p class="paragraph" style="text-align:left;">🇺🇸 🧑‍⚖️ <b>A federal judge dismissed the Trump administration’s lawsuit trying to force California to hand over</b> unredacted voter data. The <a class="link" href="https://cyberscoop.com/federal-court-dismisses-trump-doj-lawsuit-seeking-california-voter-data/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">court said</a> the request was unprecedented, violated privacy, and fell outside the civil rights laws cited by DOJ. Voting experts and civil rights groups praised the ruling as a win for voter privacy and state election authority.</p><p class="paragraph" style="text-align:left;">🇺🇸 🧑‍⚖️ <b>A judge in Austin dismissed a securities class action against CrowdStrike over the July 2024 outage</b>, finding <a class="link" href="https://www.securityweek.com/investor-lawsuit-over-crowdstrike-outage-dismissed/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">shareholders did not prove intentional fraud</a>. Millions of Windows devices crashed after a bad update, causing major disruptions at airports, banks, media outlets, and hospitals. The dismissal is a win for CrowdStrike, but Delta’s separate $500M lawsuit over the outage and other related claims remain.</p><p class="paragraph" style="text-align:left;">🇺🇸 🪖 <b>President Trump&#39;s pick for cyber chief told lawmakers he will review</b> <a class="link" href="https://defensescoop.com/2026/01/15/gen-rudd-cybercom-nsa-dual-hat-cyber-force/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">whether one leader should run both U.S. Cyber Command and the NSA</a>. He said he will assess the risks and benefits if he is confirmed. He did not commit to keeping the dual-hat arrangement.</p><p class="paragraph" style="text-align:left;">🇺🇸 <b>President Trump re-nominated Sean Plankey to lead CISA</b> — Plankey’s earlier nomination stalled in the Senate due to holds by senators over unrelated disputes. The <a class="link" href="https://cyberscoop.com/sean-plankey-re-nominated-to-lead-cisa/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">re-nomination</a> signals the administration still wants him for the job.</p><p class="paragraph" style="text-align:left;">📆 🇪🇺 <b>The EU is reviewing Google’s $32 billion acquisition of cloud security firm Wiz and must make a preliminary decision</b> by February 10, 2026. Google says Wiz will keep supporting other cloud platforms, but <a class="link" href="https://www.securityweek.com/eu-sets-february-deadline-for-verdict-on-googles-32b-wiz-acquisition/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">critics worry the deal could harm Wiz’s neutrality</a> and give Google competitive visibility. If the EU needs more study, it may open a longer Phase II probe.</p><div class="embed"><a class="embed__url" href="https://www.404media.co/elite-the-palantir-app-ice-uses-to-find-neighborhoods-to-raid/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank"><div class="embed__content"><p class="embed__title"> ‘ELITE’: The Palantir App ICE Uses to Find Neighborhoods to Raid </p><p class="embed__description"> Internal ICE material and testimony from an official obtained by 404 Media provides the clearest link yet between the technological infrastructure Palantir is building for ICE and the agency’s activities on the ground. </p><p class="embed__link"> www.404media.co/elite-the-palantir-app-ice-uses-to-find-neighborhoods-to-raid </p></div><img class="embed__image embed__image--right" src="https://www.404media.co/content/images/size/w1200/2026/01/54976776897_a1f5f78a32_k.jpg"/></a></div></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;border-color:#3587E8;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🔗<i><b> Partners and Affiliates</b></i></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/6f403f9b-d3a1-4d60-9852-f0e0f9340b87/image.png?t=1740643992"/></div><p class="paragraph" style="text-align:center;">🌐 <i>Stay connected and secure on the go with </i><i><b><a class="link" href="https://airalo.pxf.io/c/5582065/1345899/15608?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">Airalo</a></b></i><i>&#39;s global eSIMs — Use the code </i><i><b>NEWTOAIRALO15</b></i><i> if you’re new to Airalo to get an additional 15% discount.</i></p></div><p class="paragraph" style="text-align:left;"></p><div id="malware-threats" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🦠 MALWARE & THREATS</h3><p class="paragraph" style="text-align:left;">🐛 🍪 <b>Researchers found an XSS flaw in the </b><i><b>StealC</b></i><b> malware control panel that let them view and hijack</b> operator sessions. They used it to gather hardware and location details and recover session cookies, exposing an operator in Ukraine. The <a class="link" href="https://www.cyberark.com/resources/threat-research-blog/uno-reverse-card-stealing-cookies-from-cookie-stealers?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">disclosure aims to disrupt </a><i><a class="link" href="https://www.cyberark.com/resources/threat-research-blog/uno-reverse-card-stealing-cookies-from-cookie-stealers?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">StealC&#39;s</a></i><a class="link" href="https://www.cyberark.com/resources/threat-research-blog/uno-reverse-card-stealing-cookies-from-cookie-stealers?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow"> malware-as-a-service operations</a> as its use has spiked.</p><p class="paragraph" style="text-align:left;">👀 ❌ <b>Researchers found Predator spyware can report why an infection failed</b> using error codes. Error <a class="link" href="https://cyberscoop.com/predator-spyware-demonstrates-troubleshooting-researcher-dodging-capabilities/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">code 304 tells operators</a> the target is running security or analysis tools. Predator also detects tools like netstat and hides crash logs to avoid detection.</p><p class="paragraph" style="text-align:left;">🇺🇦 <b>Between October and December 2025, Ukrainian defense officials were targeted with charity-themed messages</b> that delivered the <i>PluggyApe</i> backdoor. CERT-UA <a class="link" href="https://www.bleepingcomputer.com/news/security/ukraines-army-targeted-in-new-charity-themed-malware-campaign/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">links the campaign to the Russian group </a><i><a class="link" href="https://www.bleepingcomputer.com/news/security/ukraines-army-targeted-in-new-charity-themed-malware-campaign/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">Laundry Bear</a></i> (<i>Void Blizzard</i>) and says attackers used fake charity sites, messaging apps, and PIF executables to infect victims. <i>PluggyApe</i> steals system data, keeps persistence via the Windows Registry, and retrieves commands from online sources while attackers increasingly exploit mobile devices and legitimate accounts.</p><p class="paragraph" style="text-align:left;">🐧 <b>Security researchers found a new modular Linux malware framework called </b><i><b>VoidLink</b></i> that targets cloud and container environments. It can detect Kubernetes/Docker, gather cloud metadata, load plugins and use rootkits and covert channels to stay hidden. No active infections are confirmed, and analysts say <a class="link" href="https://research.checkpoint.com/2026/voidlink-the-cloud-native-malware-framework/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">it appears professionally developed</a>, likely for sale or custom use.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/af1c8aec-7007-44cb-b396-25064b0dff4f/image.png?t=1768372993"/><div class="image__source"><span class="image__source_text"><p>Figure: VoidLink High Level Overview/checkpoint.com</p></span></div></div></div><p class="paragraph" style="text-align:left;"></p><div id="ai-crypto-tech-tools" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🤖 🧰 AI, CRYPTO, TECH & TOOLS</h3><p class="paragraph" style="text-align:left;">🆕 <b>Former CISA director Jen Easterly is the new CEO of the RSA Conference</b> — She <a class="link" href="https://www.securityweek.com/former-cisa-director-jen-easterly-appointed-ceo-of-rsac/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">will lead the conference</a>, innovation programs, education, and membership efforts. Easterly brings deep cybersecurity experience and plans to expand RSAC’s global reach and focus on secure-by-design and AI.</p><p class="paragraph" style="text-align:left;">🔓️ <b>Researchers found a new &quot;</b><i><b>Reprompt</b></i><b>&quot; attack that used a single malicious link to make Microsoft Copilot leak</b> user data. The <a class="link" href="https://www.varonis.com/blog/reprompt?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">attack tricked Copilot into repeating requests and fetching hidden instructions</a>, letting an attacker siphon data continuously even after the chat closed. Microsoft fixed the issue and says enterprise Microsoft 365 Copilot customers are not affected.</p><p class="paragraph" style="text-align:left;">🔗 <b>Meta fixed a bug that let outsiders send Instagram password reset requests </b>and <a class="link" href="https://www.securityweek.com/instagram-fixes-password-reset-vulnerability-amid-user-data-leak/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">said there was no breach</a>. Separate leaked data for about 17.5 million accounts surfaced, but experts say it matches a 2022 scrape and is unrelated to the reset issue. No passwords appear compromised.</p><div class="embed"><a class="embed__url" href="https://unit42.paloaltonetworks.com/rce-vulnerabilities-in-ai-python-libraries/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank"><div class="embed__content"><p class="embed__title"> Remote Code Execution With Modern AI/ML Formats and Libraries </p><p class="embed__description"> We identified remote code execution vulnerabilities in open-source AI/ML libraries published by Apple, Salesforce and NVIDIA. </p><p class="embed__link"> unit42.paloaltonetworks.com/rce-vulnerabilities-in-ai-python-libraries </p></div><img class="embed__image embed__image--right" src="https://unit42.paloaltonetworks.com/wp-content/uploads/2026/01/05_Vulnerabilities_1920x900.jpg"/></a></div></div><p class="paragraph" style="text-align:left;"></p><div id="vulnerabilities-research-and-threat" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🐛 🧠 VULNERABILITIES, RESEARCH, AND THREAT INTELLIGENCE</h3><p class="paragraph" style="text-align:left;">➝ From the Patching Department:</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/adobe-patches-critical-apache-tika-bug-in-coldfusion/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">Adobe Patches Critical Apache Tika Bug in ColdFusion</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/chrome-144-firefox-147-patch-high-severity-vulnerabilities/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">Chrome 144, Firefox 147 Patch High-Severity Vulnerabilities</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://thehackernews.com/2026/01/cisco-patches-zero-day-rce-exploited-by.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">Cisco Patches Zero-Day RCE Exploited by China-Linked APT in Secure Email Gateways</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/fortinet-patches-critical-vulnerabilities-in-fortifone-fortisiem/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">Fortinet Patches Critical Vulnerabilities in FortiFone, FortiSIEM</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://cyberscoop.com/microsoft-patch-tuesday-january-2026/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">Microsoft Patch Tuesday addresses 112 defects, including one actively exploited zero-day</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/saps-january-2026-security-updates-patch-critical-vulnerabilities/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">SAP’s January 2026 Security Updates Patch Critical Vulnerabilities</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://thehackernews.com/2026/01/servicenow-patches-critical-ai-platform.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">ServiceNow Patches Critical AI Platform Flaw Allowing Unauthenticated User Impersonation</a></p></li></ul><hr class="content_break"><p class="paragraph" style="text-align:left;">🎧️ <b>Researchers found a flaw called </b><i><b>WhisperPair</b></i><b> that can let attackers take over Google Fast Pair Bluetooth devices</b> — The <a class="link" href="https://arstechnica.com/gadgets/2026/01/researchers-reveal-whisperpair-attack-to-eavesdrop-on-google-fast-pair-headphones/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">bug affects many models</a> from makers like Sony, Nothing, JBL, OnePlus, and Google. An attacker can hijack headphones quickly (about 10 seconds) from up to 14 meters away.</p><p class="paragraph" style="text-align:left;">🩸 <b>MongoBleed (CVE-2025-14847) is a critical, unauthenticated MongoDB memory-leak vulnerability</b> in <i>zlib-compressed</i> messages that can expose sensitive secrets. About <a class="link" href="https://unit42.paloaltonetworks.com/mongobleed-cve-2025-14847/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">146,000 internet-facing MongoDB instances were found vulnerable</a> and active exploitation was observed. Mitigations like blocking TCP/27017 can help detect and reduce risk.</p><p class="paragraph" style="text-align:left;">🛜 <b>Researchers found a Broadcom Wi‑Fi chipset flaw that lets unauthenticated attackers disable 5 GHz networks</b> with a single crafted frame. The <a class="link" href="https://www.blackduck.com/blog/cyrc-discovers-asus-tplink-wlan-vulnerabilities.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">bug bypasses WPA2/WPA3</a>, can be repeated indefinitely, and affects many routers; 2.4 GHz and wired Ethernet are not impacted. Broadcom issued a patch and Asus released updates, but other affected vendors are unclear.</p></div><p class="paragraph" style="text-align:left;"></p><div id="ics-ot-io-t" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🛰️ ICS, OT & IoT</h3><p class="paragraph" style="text-align:left;">📆 🩹 <b>ICS Patch Tuesday</b> — Major industrial vendors including Siemens, Schneider Electric, Phoenix Contact, and Aveva released <a class="link" href="https://www.securityweek.com/ics-patch-tuesday-vulnerabilities-fixed-by-siemens-schneider-aveva-phoenix-contact/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">Patch Tuesday advisories</a> fixing multiple high- and critical-severity vulnerabilities in ICS/OT products. The flaws include authentication bypass, remote code execution, privilege escalation, command injection, and issues in third-party components. Other vendors and agencies, including Honeywell, ABB, and CISA, also published related security notices.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#f0f0f0;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">💬 CONNECT</h3><p class="paragraph" style="text-align:left;">Follow me on <a class="link" href="https://infosec.exchange/@0x58?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">Mastodon</a> for quick daily updates and bite-sized content.</p><p class="paragraph" style="text-align:left;">Prefer using an RSS feed? Add <b>Infosec MASHUP</b> to your feed <a class="link" href="https://rss.beehiiv.com/feeds/HVhiKYpQlR.xml?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">here</a>.</p><p class="paragraph" style="text-align:center;"><b>Enjoying our newsletter? </b>Forward it to a colleague—<br>it’s one of the best ways to support us.</p><p class="paragraph" style="text-align:left;">Thanks for reading today’s newsletter, and if you&#39;re enjoying it and want to support my work, you can <b>buy me a coffee</b> ☕ over at <a class="link" href="https://www.buymeacoffee.com/0x58?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-03-2026" target="_blank" rel="noopener noreferrer nofollow">https://www.buymeacoffee.com/0x58</a></p><p class="paragraph" style="text-align:left;"> See you next time!</p><p class="paragraph" style="text-align:left;">-X.</p></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=1027bc3f-7b62-4e55-bebd-1acfae688d2f&utm_medium=post_rss&utm_source=x_s_infosec_newsletter">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>🕵🏻‍♂️ [InfoSec MASHUP] 02/2026</title>
  <description>The UK is investing over £210 million in a new Government Cyber Action Plan; NordVPN says a recent claim that its development servers were breached is false; Hacktivist “Martha Root” wiped three white supremacist websites live on stage; X’s Grok AI has been used to create and share nonconsensual sexualized deepfakes; Critical Bluetooth flaw in WHILL Model C2 and F electric wheelchairs;</description>
  <link>https://infosec-mashup.santolaria.net/p/infosec-mashup-02-2026</link>
  <guid isPermaLink="true">https://infosec-mashup.santolaria.net/p/infosec-mashup-02-2026</guid>
  <pubDate>Fri, 09 Jan 2026 20:22:12 +0000</pubDate>
  <atom:published>2026-01-09T20:22:12Z</atom:published>
    <dc:creator>Xavier Santolaria</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'IBM Plex Sans',-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'IBM Plex Sans',-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">We now have <b>{{active_subscriber_count}} active subscribers</b>! Thank you all for being part of my newsletter. Please share it with your friends and colleagues, and let’s keep growing the community.</p><p class="paragraph" style="text-align:left;">You may have noticed that no issue of the newsletter went out last week. I took a brief pause to step back and reflect, and to be away in light of recent events. The tragic fire in Crans-Montana 🇨🇭, which claimed 40 lives and left over 100 injured, was a sobering reminder of life’s fragility. My thoughts are with all those affected by this devastating incident 🤍 🕊️ </p><p class="paragraph" style="text-align:left;">This week, I’m back with updates and insights from the world of cybersecurity. Let’s now dive into this week’s top insights! 🚀</p><h2 class="heading" style="text-align:left;">Table of Contents</h2><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="#breaches-security-incidents" rel="noopener noreferrer nofollow">BREACHES & SECURITY INCIDENTS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#cybercrime-cyber-espionage-ap-ts" rel="noopener noreferrer nofollow">CYBERCRIME, CYBER ESPIONAGE, APT’s</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#government-politics-and-privacy" rel="noopener noreferrer nofollow">GOVERNMENT, POLITICS, AND PRIVACY</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#malware-threats" rel="noopener noreferrer nofollow">MALWARE & THREATS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#ai-crypto-tech-tools" rel="noopener noreferrer nofollow">AI, CRYPTO, TECH & TOOLS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#vulnerabilities-research-and-threat" rel="noopener noreferrer nofollow">VULNERABILITIES, RESEARCH, AND THREAT INTELLIGENCE</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#ics-ot-io-t" rel="noopener noreferrer nofollow">ICS, OT & IoT</a></p></li></ul><div id="breaches-security-incidents" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🔓 BREACHES & SECURITY INCIDENTS</h3><p class="paragraph" style="text-align:left;">🇺🇸 <b>Sedgwick confirmed a cyberattack</b> at its subsidiary Sedgwick Government Solutions. The company says the <a class="link" href="https://www.securityweek.com/sedgwick-confirms-cyberattack-on-government-subsidiary/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-02-2026" target="_blank" rel="noopener noreferrer nofollow">incident hit an isolated file transfer system</a> and did not affect wider networks or claims servers. The TridentLocker ransomware group claims it stole and leaked data from the subsidiary.</p><p class="paragraph" style="text-align:left;">🇺🇸 <b>Brightspeed is investigating claims that the hacking group </b><i><b>Crimson Collective</b></i><b> stole data</b> from its systems. The group says it <a class="link" href="https://www.securityweek.com/brightspeed-investigating-cyberattack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-02-2026" target="_blank" rel="noopener noreferrer nofollow">exfiltrated personal and account information for over 1 million customers</a> and showed proof to cyber experts. Brightspeed says it is looking into the report and will inform customers, employees and authorities.</p><p class="paragraph" style="text-align:left;">🇬🇷 ✈️ <b>Greece shut its airspace after noise disrupted air traffic communications</b>, grounding and diverting many flights. Officials say <a class="link" href="https://www.securityweek.com/cyberattack-unlikely-in-communications-failure-that-grounded-flights-in-greece/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-02-2026" target="_blank" rel="noopener noreferrer nofollow">a cyberattack is unlikely but investigations are ongoing</a>. Authorities formed a multiagency committee and said passenger safety was never at risk.</p><p class="paragraph" style="text-align:left;">💸 <b>Ledger says some customers had names and contact details exposed after a breach at payment processor Global-e</b> — Ledger’s own network and crypto wallet seed phrases <a class="link" href="https://www.bleepingcomputer.com/news/security/ledger-customers-impacted-by-third-party-global-e-data-breach/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-02-2026" target="_blank" rel="noopener noreferrer nofollow">were not affected</a>, and no payment information was leaked. Affected customers will get direct notices and are warned to watch for phishing.</p><p class="paragraph" style="text-align:left;">🔓️ ☁️ <b>NordVPN says a recent claim that its development servers were breached is false</b> — Attackers <a class="link" href="https://www.bleepingcomputer.com/news/security/nordvpn-denies-breach-claims-says-attackers-have-dummy-data/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-02-2026" target="_blank" rel="noopener noreferrer nofollow">accessed only dummy data</a> from a third-party test environment, not NordVPN production systems or customer information. The company contacted the vendor and confirmed no real credentials or sensitive data were exposed.</p><p class="paragraph" style="text-align:left;">→ More breaches:</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/377000-impacted-by-data-breach-at-texas-gas-station-firm/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-02-2026" target="_blank" rel="noopener noreferrer nofollow">377,000 Impacted by Data Breach at Texas Gas Station Firm</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bleepingcomputer.com/news/security/illinois-department-of-human-services-data-breach-affects-700k-people/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-02-2026" target="_blank" rel="noopener noreferrer nofollow">Illinois Department of Human Services data breach affects 700K people</a></p></li></ul></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;border-color:#3587E8;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🔗<i><b> Partners and Affiliates</b></i></p><p class="paragraph" style="text-align:left;">🔐 <a class="link" href="https://go.nordvpn.net/aff_c?offer_id=15&aff_id=84917&url_id=902&utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-02-2026" target="_blank" rel="noopener noreferrer nofollow">NordVPN Threat Protection Pro™ Campaign</a> (July 2 - August 13)</p><p class="paragraph" style="text-align:left;"><i>With its user-friendly interface, robust security features, and commitment to privacy, NordVPN continues to be a popular choice for individuals seeking online protection and unrestricted internet access.</i></p><p class="paragraph" style="text-align:left;"><i><b>Special Offer</b></i><i>: </i>get up to 73% off with a 2-year plan!</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://go.nordvpn.net/aff_c?offer_id=15&aff_id=84917&url_id=902&utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-02-2026"><span class="button__text" style=""> GET THE DEAL </span></a></div></div><p class="paragraph" style="text-align:left;"></p><div id="cybercrime-cyber-espionage-ap-ts" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🥷🏻 CYBERCRIME, CYBER ESPIONAGE, APT’s</h3><p class="paragraph" style="text-align:left;">🇷🇺 🇺🇦 <b>Russia-aligned hackers (UAC-0184/Hive0156) are using Viber to send malicious ZIP files</b> to Ukrainian military and government targets. The <a class="link" href="https://thehackernews.com/2026/01/russia-aligned-hackers-abuse-viber-to.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-02-2026" target="_blank" rel="noopener noreferrer nofollow">ZIPs contain shortcut files that run a PowerShell script to load Hijack Loader</a>, which then evades detection and deploys Remcos RAT. Remcos gives attackers remote control, data theft, and persistence on compromised systems.</p><p class="paragraph" style="text-align:left;">🇹🇼 🇨🇳 <b>Taiwan says China ran an intensified cyberoffensive in 2025</b>, with about <a class="link" href="https://cyberscoop.com/taiwan-china-cyberattacks-2025-energy-hospitals-nsb-report/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-02-2026" target="_blank" rel="noopener noreferrer nofollow">2.63 million intrusion attempts per day</a>. Attacks targeted government, energy, hospitals, telecoms, and suppliers to steal data and technology. Taiwan and some U.S. experts warn these attacks tie to political and military pressure on the island.</p><p class="paragraph" style="text-align:left;">🇺🇸 <b>Ilya Lichtenstein, who pleaded guilty to laundering billions in bitcoin from the 2016 Bitfinex hack, has been released</b> early from prison. His r<a class="link" href="https://cyberscoop.com/bitfinex-hacker-ilya-lichtenstein-early-release-first-step-act/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-02-2026" target="_blank" rel="noopener noreferrer nofollow">elease was credited to the First Step Act</a> signed by President Trump. Lichtenstein says he wants to work in cybersecurity and prove critics wrong.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#f0f0f0;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🗓️ <b>{Cyber,Info}Sec Events</b>: My list of past and future <a class="link" href="https://github.com/xsa/infosec-events?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-02-2026" target="_blank" rel="noopener noreferrer nofollow">{cyber,info}sec related events</a> — Feel free to contribute by submitting issues or pull requests (and don’t forget to <a class="link" href="https://github.com/xsa/infosec-events?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-02-2026" target="_blank" rel="noopener noreferrer nofollow">star the project</a>); Thanks! 😉</p></div><p class="paragraph" style="text-align:left;"></p><div id="government-politics-and-privacy" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">👨🏻‍⚖️ 👀 GOVERNMENT, POLITICS, AND PRIVACY</h3><p class="paragraph" style="text-align:left;">🇺🇸 📺️ <b>A Texas court issued a temporary restraining order stopping Samsung from collecting audio and visual data</b> from Texas smart TVs. The <a class="link" href="https://www.bleepingcomputer.com/news/security/texas-court-blocks-samsung-from-collecting-smart-tv-viewing-data/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-02-2026" target="_blank" rel="noopener noreferrer nofollow">court found Samsung’s ACR enrollment practices deceptive</a>, using confusing prompts and dark patterns that prevent informed consent. The order could set a precedent for broader action against TV data-collection practices.</p><p class="paragraph" style="text-align:left;">🇺🇸 🚪 <b>The Trump administration is withdrawing the U.S. </b>from several international cybersecurity organizations. Critics say <a class="link" href="https://cyberscoop.com/trump-pulls-us-out-of-international-cyber-orgs/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-02-2026" target="_blank" rel="noopener noreferrer nofollow">this move weakens global coordination</a> and hands influence to adversaries. Supporters call the groups wasteful and say the U.S. should stop funding them.</p><p class="paragraph" style="text-align:left;">🇬🇧 💰️ <b>The UK is investing over £210 million in a new </b><i><b>Government Cyber Action Plan</b></i> to <a class="link" href="https://www.gov.uk/government/publications/government-cyber-action-plan?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-02-2026" target="_blank" rel="noopener noreferrer nofollow">strengthen public sector cyber defenses</a>. It creates a Government Cyber Unit, sets minimum security standards, and requires better incident response across departments. Major firms will join a Software Security Ambassador Scheme as the government tightens laws to protect critical services.</p><p class="paragraph" style="text-align:left;">🇺🇸 🗑️ <b>California launched </b><i><b>DROP</b></i><b>, a tool that lets residents send one request asking registered data brokers to delete</b> their <a class="link" href="https://techcrunch.com/2026/01/03/california-residents-can-use-new-tool-to-demand-brokers-delete-their-personal-data/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-02-2026" target="_blank" rel="noopener noreferrer nofollow">personal information</a>. Brokers must begin processing requests in August 2026 and have 90 days to comply, though some data and first-party records are exempt. Brokers who don’t comply face fines of $200 per day.</p><p class="paragraph" style="text-align:left;">🗑️ <b>A hacktivist called “</b><i><b>Martha Root</b></i><b>” wiped three white supremacist websites live on stage</b> at the Chaos Communication Congress. Root also scraped and published user data from one site, <a class="link" href="https://techcrunch.com/2026/01/05/hacktivist-deletes-white-supremacist-websites-live-on-stage-during-hacker-conference/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-02-2026" target="_blank" rel="noopener noreferrer nofollow">exposing precise locations and profiles</a>. The sites’ operator complained and vowed revenge, while a leak collective holds the full dataset for vetted journalists.</p><p class="paragraph" style="text-align:left;">🥸 <b>Fraud has industrialized into a global security threat</b> that drains trillions and supports organized crime and hostile states. Governments and companies <a class="link" href="https://cyberscoop.com/industrialized-fraud-global-security-threat-international-task-force-op-ed/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-02-2026" target="_blank" rel="noopener noreferrer nofollow">must stop treating it as customer service and instead fight it like cyberwarfare</a> with real-time intelligence sharing and coordinated responses. An international public‑private task force aims to build those systemic defenses across finance, tech, and law enforcement.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;border-color:#3587E8;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🔗<i><b> Partners and Affiliates</b></i></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/6f403f9b-d3a1-4d60-9852-f0e0f9340b87/image.png?t=1740643992"/></div><p class="paragraph" style="text-align:center;">🌐 <i>Stay connected and secure on the go with </i><i><b><a class="link" href="https://airalo.pxf.io/c/5582065/1345899/15608?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-02-2026" target="_blank" rel="noopener noreferrer nofollow">Airalo</a></b></i><i>&#39;s global eSIMs — Use the code </i><i><b>NEWTOAIRALO15</b></i><i> if you’re new to Airalo to get an additional 15% discount.</i></p></div><p class="paragraph" style="text-align:left;"></p><div id="malware-threats" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🦠 MALWARE & THREATS</h3><p class="paragraph" style="text-align:left;">🪱 🎠 <b>Researchers found three malicious </b><code>npm</code><b> packages</b> that installed a new malware called <i>NodeCordRAT</i>. <i>NodeCordRAT</i> steals Chrome credentials, API tokens, and crypto seed phrases and uses Discord for command-and-control. The <a class="link" href="https://www.zscaler.com/blogs/security-research/malicious-npm-packages-deliver-nodecordrat?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-02-2026" target="_blank" rel="noopener noreferrer nofollow">packages were removed after researchers traced them</a> to a user named &quot;<i>:</i>&quot; and linked postinstall scripts to the RAT.</p><p class="paragraph" style="text-align:left;">🧩 <b>Researchers found two Chrome extensions with ~900,000 users that steal ChatGPT and DeepSeek chats</b> plus browsing data and send them to attacker servers. The <a class="link" href="https://www.ox.security/blog/malicious-chrome-extensions-steal-chatgpt-deepseek-conversations/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-02-2026" target="_blank" rel="noopener noreferrer nofollow">extensions scrape chat DOM elements and exfiltrate full conversations</a> every 30 minutes after asking for “anonymous” analytics permission. Users should remove suspicious extensions and avoid installing unknown add-ons to protect sensitive data.</p><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/A79PeC_SNPI" width="100%"></iframe><p class="paragraph" style="text-align:left;">🐍 <b>Researchers found a new Python-based malware called </b><i><b>VVS Stealer</b></i><b> that steals Discord tokens</b>, browser data, and screenshots. It is obfuscated with <i>Pyarmor</i>, sold cheaply on Telegram, and persists by adding itself to Windows startup. The <a class="link" href="https://unit42.paloaltonetworks.com/vvs-stealer/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-02-2026" target="_blank" rel="noopener noreferrer nofollow">stealer also injects code into Discord</a> to hijack active sessions and spread via compromised business infrastructure.</p></div><p class="paragraph" style="text-align:left;"></p><div id="ai-crypto-tech-tools" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🤖 🧰 AI, CRYPTO, TECH & TOOLS</h3><p class="paragraph" style="text-align:left;">🔞 <b>X’s Grok AI has been used to create and share nonconsensual sexualized deepfakes</b>, sparking public outrage. Legal experts say existing federal and state laws — including the Take It Down Act and anti‑CSAM rules — <a class="link" href="https://cyberscoop.com/elon-musk-x-grok-deepfake-crisis-section-230/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-02-2026" target="_blank" rel="noopener noreferrer nofollow">could expose Musk and X to fines, lawsuits, or criminal charges</a>. Enforcement is uncertain, but state attorneys general and regulators may still pursue action even if federal responses are slow.</p><p class="paragraph" style="text-align:left;">❤️‍🩹 <b>OpenAI launched ChatGPT Health</b>, a private space for health conversations. The company says <a class="link" href="https://openai.com/index/introducing-chatgpt-health/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-02-2026" target="_blank" rel="noopener noreferrer nofollow">health data in that space will not be used to train</a> its foundation models. ChatGPT Health warns it is not a replacement for medical advice and is rolling out broadly except in the EEA, UK, and Switzerland.</p><p class="paragraph" style="text-align:left;">🇻🇪 📺️ <b>A U.S. raid in Caracas that captured Nicolás Maduro created an information vacuum</b> — <a class="link" href="https://cyberscoop.com/ai-voting-machine-conspiracies-fill-information-vacuum-venezuela-raid/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-02-2026" target="_blank" rel="noopener noreferrer nofollow">AI-made images and long‑debunked conspiracies</a> about voting machines and U.S. oil grabs spread quickly online. Bad actors used the chaos to push familiar narratives and sway supporters.</p></div><p class="paragraph" style="text-align:left;"></p><div id="vulnerabilities-research-and-threat" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🐛 🧠 VULNERABILITIES, RESEARCH, AND THREAT INTELLIGENCE</h3><p class="paragraph" style="text-align:left;">➝ From the Patching Department:</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://thehackernews.com/2026/01/cisco-patches-ise-security.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-02-2026" target="_blank" rel="noopener noreferrer nofollow">Cisco Patches ISE Security Vulnerability After Public PoC Exploit Release</a></p></li></ul><hr class="content_break"><p class="paragraph" style="text-align:left;">🔓️ ☁️ <b>Security researchers found multiple critical flaws in </b><i><b>Coolify</b></i><b> that let attackers run commands as root </b>and fully compromise self-hosted servers. Most <a class="link" href="https://thehackernews.com/2026/01/coolify-discloses-11-critical-flaws.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-02-2026" target="_blank" rel="noopener noreferrer nofollow">issues affect beta versions and fixes are available</a> in newer releases. About 52,890 Coolify hosts are exposed worldwide, so users should update immediately.</p><p class="paragraph" style="text-align:left;">💥 <b>A critical command injection bug (CVE-2026-0625) in old D-Link DSL routers</b> is being <a class="link" href="https://www.bleepingcomputer.com/news/security/new-d-link-flaw-in-legacy-dsl-routers-actively-exploited-in-attacks/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-02-2026" target="_blank" rel="noopener noreferrer nofollow">actively exploited</a>. The flaw lets unauthenticated attackers run commands via the <code>dnscfg.cgi </code>endpoint, and affected models are end-of-life with no patches. D-Link urges users to replace these routers or isolate them on segmented, non-critical networks.</p><p class="paragraph" style="text-align:left;">🩹 <b>Veeam released updates fixing a critical RCE bug (CVE-2025-59470, CVSS 9.0)</b> in Backup & Replication. The flaw and three related vulnerabilities let privileged Backup/Tape roles run or write files as postgres or root. Users should <a class="link" href="https://thehackernews.com/2026/01/veeam-patches-critical-rce.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-02-2026" target="_blank" rel="noopener noreferrer nofollow">update to version 13.0.1.1071</a> immediately.</p><p class="paragraph" style="text-align:left;">🔓️ <b>A firmware bug in the </b><i><b>TOTOLINK EX200</b></i><b> can make the device start an unauthenticated</b> root telnet service. An attacker who can <a class="link" href="https://kb.cert.org/vuls/id/295169?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-02-2026" target="_blank" rel="noopener noreferrer nofollow">access the web management interface could trigger this</a> and take full control. TOTOLINK has not patched the device, so users should limit admin access or upgrade.</p><p class="paragraph" style="text-align:left;">🪲 🩹 <b>Researchers found a critical, no-auth remote code execution bug (CVE-2026-21858) in n8n</b> that affects about 100,000 servers and could let attackers take full control. A patch (v1.121.1+) was released, but public disclosure was delayed and a proof-of-concept is circulating. Security <a class="link" href="https://cyberscoop.com/n8n-critical-vulnerability-massive-risk/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-02-2026" target="_blank" rel="noopener noreferrer nofollow">experts warn urgent updates are needed</a> because n8n often holds sensitive credentials and workflows.</p><p class="paragraph" style="text-align:left;">💬 🔓️ <b>Researchers found a WhatsApp flaw that lets attackers infer a user’s device</b> and operating system from metadata. Meta has started randomizing key IDs for Android to reduce this fingerprinting but the method can still distinguish iPhones. WhatsApp says the <a class="link" href="https://www.securityweek.com/researcher-spotlights-whatsapp-metadata-leak-as-meta-begins-rolling-out-fixes/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-02-2026" target="_blank" rel="noopener noreferrer nofollow">issue is low severity but has fixed related bugs</a> and paid a bug bounty.</p></div><p class="paragraph" style="text-align:left;"></p><div id="ics-ot-io-t" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🛰️ ICS, OT & IoT</h3><p class="paragraph" style="text-align:left;">♿️ <b>Researchers found a critical Bluetooth flaw in WHILL Model C2 and F electric wheelchairs</b> that lets attackers pair without authentication and control the chairs. They <a class="link" href="https://www.securityweek.com/researchers-expose-whill-wheelchair-safety-risks-via-remote-hacking/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-02-2026" target="_blank" rel="noopener noreferrer nofollow">demonstrated remote takeover</a>, disabling safety limits and even driving a wheelchair off stairs in a video. WHILL issued a patch, but researchers could not verify its effectiveness.</p><p class="paragraph" style="text-align:left;">🇨🇳 <b>A China-linked hacking group called UAT-7290 is targeting telecommunications providers</b> and has expanded into Southeastern Europe. They <a class="link" href="https://blog.talosintelligence.com/uat-7290/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-02-2026" target="_blank" rel="noopener noreferrer nofollow">exploit edge network devices</a> using one-day bugs, SSH brute force, and Linux malware to gain access and persist. The group also builds Operational Relay Boxes that other China-aligned actors reuse.</p><p class="paragraph" style="text-align:left;">🕸️ 💥 <b>A massive botnet called </b><i><b>Kimwolf</b></i><b> infected over two million Android TV boxes to run DDoS attacks</b> and <a class="link" href="https://krebsonsecurity.com/2026/01/who-benefited-from-the-aisuru-and-kimwolf-botnets/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-02-2026" target="_blank" rel="noopener noreferrer nofollow">sell residential proxies</a>. Investigations link <i>Kimwolf</i> and an earlier Aisuru botnet to the same operators, hosting providers (like Resi Rack and 3XK Tech), and proxy services (ByteConnect/Plainproxies and Maskify). The botnet’s operators used evasive tools like ENS records to resist takedowns while monetizing infected devices for fraud and scraping.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#f0f0f0;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">💬 CONNECT</h3><p class="paragraph" style="text-align:left;">Follow me on <a class="link" href="https://infosec.exchange/@0x58?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-02-2026" target="_blank" rel="noopener noreferrer nofollow">Mastodon</a> for quick daily updates and bite-sized content.</p><p class="paragraph" style="text-align:left;">Prefer using an RSS feed? Add <b>Infosec MASHUP</b> to your feed <a class="link" href="https://rss.beehiiv.com/feeds/HVhiKYpQlR.xml?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-02-2026" target="_blank" rel="noopener noreferrer nofollow">here</a>.</p><p class="paragraph" style="text-align:center;"><b>Enjoying our newsletter? </b>Forward it to a colleague—<br>it’s one of the best ways to support us.</p><p class="paragraph" style="text-align:left;">Thanks for reading today’s newsletter, and if you&#39;re enjoying it and want to support my work, you can <b>buy me a coffee</b> ☕ over at <a class="link" href="https://www.buymeacoffee.com/0x58?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-02-2026" target="_blank" rel="noopener noreferrer nofollow">https://www.buymeacoffee.com/0x58</a></p><p class="paragraph" style="text-align:left;"> See you next time!</p><p class="paragraph" style="text-align:left;">-X.</p></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=ba87985f-ea86-4d3b-b347-fccb242f12a7&utm_medium=post_rss&utm_source=x_s_infosec_newsletter">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>🕵🏻‍♂️ [InfoSec MASHUP] 51/2025</title>
  <description>France&#39;s Interior Ministry Breached; European authorities dismantled a Ukraine-based call center fraud ring; Eight browser extensions with over 8 million installs collect full AI conversations and sell them; Google linked five more Chinese hacking groups to attacks exploiting the severe React2Shell flaw;</description>
  <link>https://infosec-mashup.santolaria.net/p/infosec-mashup-51-2025</link>
  <guid isPermaLink="true">https://infosec-mashup.santolaria.net/p/infosec-mashup-51-2025</guid>
  <pubDate>Fri, 19 Dec 2025 21:22:14 +0000</pubDate>
  <atom:published>2025-12-19T21:22:14Z</atom:published>
    <dc:creator>Xavier Santolaria</dc:creator>
    <category><![CDATA[Malware]]></category>
    <category><![CDATA[Opensource]]></category>
    <category><![CDATA[Privacy]]></category>
    <category><![CDATA[Cybersecurity]]></category>
    <category><![CDATA[Threat Intelligence]]></category>
    <category><![CDATA[Ai]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'IBM Plex Sans',-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'IBM Plex Sans',-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">We now have <b>{{active_subscriber_count}} active subscribers</b>! Thank you all for being part of my newsletter. Please share it with your friends and colleagues, and let’s keep growing the community.</p><div style="padding:14px 15px 14px;"><table class="bh__table" width="100%" style="border-collapse:collapse;"><tr class="bh__table_row"><td class="bh__table_cell" width="100%"><p class="paragraph" style="text-align:left;">🎄 As the year wraps up, I just want to say a huge thank you for being part of the community and for all your support throughout 2025. It really means a lot! Wishing you all a relaxing and joyful holiday season, and I can’t wait to head into 2026 with you—sharing more cybersecurity news, helpful resources, and cool tools along the way ✌️ </p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="100%"><p class="paragraph" style="text-align:left;">Now, let’s now dive into this week’s top insights! 🚀</p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="100%"><p class="paragraph" style="text-align:left;"></p></td></tr></table></div><h2 class="heading" style="text-align:left;">Table of Contents</h2><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="#breaches-security-incidents" rel="noopener noreferrer nofollow">BREACHES & SECURITY INCIDENTS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#cybercrime-cyber-espionage-ap-ts" rel="noopener noreferrer nofollow">CYBERCRIME, CYBER ESPIONAGE, APT’s</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#government-politics-and-privacy" rel="noopener noreferrer nofollow">GOVERNMENT, POLITICS, AND PRIVACY</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#malware-threats" rel="noopener noreferrer nofollow">MALWARE & THREATS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#ai-crypto-tech-tools" rel="noopener noreferrer nofollow">AI, CRYPTO, TECH & TOOLS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#vulnerabilities-research-and-threat" rel="noopener noreferrer nofollow">VULNERABILITIES, RESEARCH, AND THREAT INTELLIGENCE</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#ics-ot-io-t" rel="noopener noreferrer nofollow">ICS, OT & IoT</a></p></li></ul><div id="breaches-security-incidents" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🔓 BREACHES & SECURITY INCIDENTS</h3><p class="paragraph" style="text-align:left;">🇻🇪 🛢️ <b>Venezuela’s state oil company PDVSA suffered a cyberattack</b> that disrupted export operations. PDVSA says <a class="link" href="https://www.bleepingcomputer.com/news/security/cyberattack-disrupts-venezuelan-oil-giant-pdvsas-operations/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-51-2025" target="_blank" rel="noopener noreferrer nofollow">only administrative systems were hit and operational areas stayed running</a>, but internal reports and sources say key terminal systems and deliveries were offline. PDVSA blamed the United States and domestic conspirators for the attack amid rising tensions.</p><p class="paragraph" style="text-align:left;">🔞 <b>The hacking group called </b><i><b>Scattered Lapsus$ Hunters</b></i><b> says it stole Pornhub Premium users’ viewing and personal data</b> and is trying to extort the site. The <a class="link" href="https://techcrunch.com/2025/12/16/hacking-group-says-its-extorting-pornhub-after-stealing-users-viewing-data/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-51-2025" target="_blank" rel="noopener noreferrer nofollow">data came from a breach at analytics provider Mixpanel </a>that exposed events and user details for many customers. Mixpanel’s breach also affected other companies like OpenAI and SoundCloud, putting millions of users’ data at risk.</p><p class="paragraph" style="text-align:left;">🚗 <b>Auto parts supplier LKQ confirmed it was hit in the Oracle E-Business Suite hack</b> tied to the <i>Cl0p</i> ransomware group. Over 9,000 people’s personal data, including SSNs and EINs for sole proprietor suppliers, were compromised. Several terabytes of <a class="link" href="https://www.securityweek.com/auto-parts-giant-lkq-confirms-oracle-ebs-breach/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-51-2025" target="_blank" rel="noopener noreferrer nofollow">stolen files were posted online</a>, and LKQ says only its EBS environment was affected.</p><p class="paragraph" style="text-align:left;">🎧️ <b>SoundCloud says a security breach exposed a database</b> with user emails and public profile info. About 20% of users (roughly 28 million accounts) may be <a class="link" href="https://www.bleepingcomputer.com/news/security/soundcloud-confirms-breach-after-member-data-stolen-vpn-access-disrupted/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-51-2025" target="_blank" rel="noopener noreferrer nofollow">affected</a>. The company blocked access, tightened security, and the incident disrupted VPN access and caused outages.</p><p class="paragraph" style="text-align:left;">🇫🇷 <b>France&#39;s Interior Ministry says hackers breached its email servers</b> and accessed some files. Officials <a class="link" href="https://www.bleepingcomputer.com/news/security/france-interior-ministry-confirms-cyberattack-on-email-servers/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-51-2025" target="_blank" rel="noopener noreferrer nofollow">have tightened security</a> and opened an investigation. They are still unsure who is responsible or whether data was stolen (UPDATE: <a class="link" href="https://www.bleepingcomputer.com/news/security/france-arrests-suspect-tied-to-cyberattack-on-interior-ministry/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-51-2025" target="_blank" rel="noopener noreferrer nofollow">France arrests suspect tied to cyberattack on Interior Ministry</a>).</p><p class="paragraph" style="text-align:left;">🤷 <b>Google is ending its dark web report alerts in February</b> — The reports showed lists of leaked user data from hidden sites. Google <a class="link" href="https://arstechnica.com/gadgets/2025/12/google-is-shutting-down-dark-web-reports-in-january-because-they-werent-helpful/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-51-2025" target="_blank" rel="noopener noreferrer nofollow">says these alerts aren’t very useful</a> because there’s little users can do about dark web leaks.</p><p class="paragraph" style="text-align:left;">🇯🇵 <b>Japanese company Askul suffered a ransomware attack</b> that exposed over 700,000 records. The <i>RansomHouse</i> group <a class="link" href="https://www.securityweek.com/700000-records-compromised-in-askul-ransomware-attack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-51-2025" target="_blank" rel="noopener noreferrer nofollow">stole more than 1 TB of data</a> and leaked it after Askul refused to pay. The breach disrupted orders and logistics and affected customers, partners, employees, and executives.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;border-color:#3587E8;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🔗<i><b> Partners and Affiliates</b></i></p><p class="paragraph" style="text-align:left;">🔐 <a class="link" href="https://go.nordvpn.net/aff_c?offer_id=15&aff_id=84917&url_id=902&utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-51-2025" target="_blank" rel="noopener noreferrer nofollow">NordVPN Threat Protection Pro™ Campaign</a> </p><p class="paragraph" style="text-align:left;"><i>With its user-friendly interface, robust security features, and commitment to privacy, NordVPN continues to be a popular choice for individuals seeking online protection and unrestricted internet access.</i></p><p class="paragraph" style="text-align:left;"><i><b>Special Offer</b></i><i>: </i>get up to 73% off with a 2-year plan!</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://go.nordvpn.net/aff_c?offer_id=15&aff_id=84917&url_id=902&utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-51-2025"><span class="button__text" style=""> GET THE DEAL </span></a></div></div><p class="paragraph" style="text-align:left;"></p><div id="cybercrime-cyber-espionage-ap-ts" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🥷🏻 CYBERCRIME, CYBER ESPIONAGE, APT’s</h3><p class="paragraph" style="text-align:left;">🇷🇺 🇺🇦 <b>Russian-linked APT28 ran a long phishing campaign to steal UKR.net email credentials</b> and 2FA codes. They <a class="link" href="https://thehackernews.com/2025/12/apt28-targets-ukrainian-ukr-net-users.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-51-2025" target="_blank" rel="noopener noreferrer nofollow">used fake UKR.net login pages</a> hosted on services like Mocky, tinyurl redirects, and blogspot subdomains. Recorded Future says this supports GRU intelligence gathering and shifted to ngrok/Serveo tunneling after infrastructure takedowns.</p><p class="paragraph" style="text-align:left;">🇺🇸 🇷🇺 <b>U.S. authorities dismantled </b><i><b>E-Note</b></i><b>, an alleged crypto exchange and payment service</b> used to <a class="link" href="https://cyberscoop.com/michigan-e-note-crypto-exchange-takedown-ransomware-money-laundering-indictment/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-51-2025" target="_blank" rel="noopener noreferrer nofollow">launder tens of millions from ransomware</a> and other cybercrimes. A Russian national, Mykhalio Chudnovets, was indicted for running the service and faces money-laundering conspiracy charges. Law enforcement seized servers and records that may help trace funds and identify users.</p><p class="paragraph" style="text-align:left;">🇪🇺 🇺🇦 <b>European authorities dismantled a Ukraine-based call center fraud ring</b> that stole over €10 million from more than 400 victims. Twelve suspects <a class="link" href="https://www.bleepingcomputer.com/news/security/european-authorities-dismantle-call-center-fraud-ring-in-ukraine/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-51-2025" target="_blank" rel="noopener noreferrer nofollow">were arrested and extensive assets</a> and forged IDs seized after raids in Dnipro, Ivano-Frankivsk, and Kyiv. The scam used fake bank and police personas, remote access tools, and in-person cash pickups, with staff paid commissions.</p><p class="paragraph" style="text-align:left;">🇷🇺 ☁️ <b>Amazon says the Russian GRU-linked group called </b><i><b>Sandworm</b></i><b> has shifted from exploiting software bugs to abusing misconfigured network edge devices</b> on AWS to gain access. The group has targeted energy firms, utilities, telecoms, and cloud infrastructure in Western countries since 2021. Amazon has <a class="link" href="https://aws.amazon.com/blogs/security/amazon-threat-intelligence-identifies-russian-cyber-threat-group-targeting-western-critical-infrastructure/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-51-2025" target="_blank" rel="noopener noreferrer nofollow">notified affected customers</a>, remediated compromised EC2 instances, and shared intelligence with partners.</p><p class="paragraph" style="text-align:left;">🇺🇸 ⚖️ <b>Nathan Austad pleaded guilty</b> to taking part in a <a class="link" href="https://www.securityweek.com/third-draftkings-hacker-pleads-guilty/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-51-2025" target="_blank" rel="noopener noreferrer nofollow">credential stuffing attack that compromised over 60,000</a> betting site accounts. The hackers added payment methods, stole about $600,000 from 1,600 victims, and sold access to accounts. Austad faces up to five years in prison; two co-conspirators already pleaded guilty.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#f0f0f0;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🗓️ <b>{Cyber,Info}Sec Events</b>: My list of past and future <a class="link" href="https://github.com/xsa/infosec-events?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-51-2025" target="_blank" rel="noopener noreferrer nofollow">{cyber,info}sec related events</a> — Feel free to contribute by submitting issues or pull requests (and don’t forget to <a class="link" href="https://github.com/xsa/infosec-events?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-51-2025" target="_blank" rel="noopener noreferrer nofollow">star the project</a>); Thanks! 😉</p></div><p class="paragraph" style="text-align:left;"></p><div id="government-politics-and-privacy" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">👨🏻‍⚖️ 👀 GOVERNMENT, POLITICS, AND PRIVACY</h3><div class="embed"><a class="embed__url" href="https://www.404media.co/how-a-us-citizen-was-scanned-with-ices-facial-recognition-tech/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-51-2025" target="_blank"><div class="embed__content"><p class="embed__title"> How a US Citizen Was Scanned With ICE&#39;s Facial Recognition Tech </p><p class="embed__description"> Jesus Gutiérrez told immigration agents he was a U.S. citizen. Only after they scanned his face, did the agents let him go. </p><p class="embed__link"> www.404media.co/how-a-us-citizen-was-scanned-with-ices-facial-recognition-tech </p></div><img class="embed__image embed__image--right" src="https://www.404media.co/content/images/2025/12/54307135384_d3bafbeaa0_c.jpg"/></a></div><p class="paragraph" style="text-align:left;">🇺🇸 <b>With the Cybersecurity Information Sharing Act set to expire soon, Congress may pass another short extension</b> because <a class="link" href="https://cyberscoop.com/congress-cybersecurity-information-sharing-act-extension-2025-andrew-garbarino/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-51-2025" target="_blank" rel="noopener noreferrer nofollow">lawmakers disagree on a long-term fix</a>. House Homeland Security Chair Andrew Garbarino said there are three different bill approaches and no consensus. He also noted committees are working on broader cyber issues like regulations, workforce and using AI for defense.</p><p class="paragraph" style="text-align:left;">🇺🇸 📺️ 📸 <b>Texas sued five TV makers</b>, saying their smart TVs used ACR technology to <a class="link" href="https://www.bleepingcomputer.com/news/security/texas-sues-tv-makers-for-spying-on-users-selling-data-without-consent/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-51-2025" target="_blank" rel="noopener noreferrer nofollow">secretly capture what people watch</a>. The suit claims screenshots were taken every 500 ms and sent to companies without users&#39; consent. Texas also warned that Chinese-owned firms could expose U.S. data to Beijing under China&#39;s security laws</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;border-color:#3587E8;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🔗<i><b> Partners and Affiliates</b></i></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/6f403f9b-d3a1-4d60-9852-f0e0f9340b87/image.png?t=1740643992"/></div><p class="paragraph" style="text-align:center;">🌐 <i>Stay connected and secure on the go with </i><i><b><a class="link" href="https://airalo.pxf.io/c/5582065/1345899/15608?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-51-2025" target="_blank" rel="noopener noreferrer nofollow">Airalo</a></b></i><i>&#39;s global eSIMs — Use the code </i><i><b>NEWTOAIRALO15</b></i><i> if you’re new to Airalo to get an additional 15% discount.</i></p></div><p class="paragraph" style="text-align:left;"></p><div id="malware-threats" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🦠 MALWARE & THREATS</h3><p class="paragraph" style="text-align:left;">🎠 📲 <i><b>Cellik</b></i><b> is an Android remote access trojan that gives attackers full control of infected phones</b>, including screen streaming, keylogging, camera/mic access, and file/cloud access. It can hide a browser and overlay fake login screens to steal credentials, and it can inject its code into legitimate Google Play apps with one click. The malware is <a class="link" href="https://www.securityweek.com/new-150-cellik-rat-grants-android-control-trojanizes-google-play-apps/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-51-2025" target="_blank" rel="noopener noreferrer nofollow">sold on the dark web for about $150/month</a> and includes tools for wide surveillance and data theft.</p><p class="paragraph" style="text-align:left;">🎅 💸 <b>A new malware called </b><i><b>SantaStealer</b></i><b> is being sold as a service</b> and targets browsers, crypto wallets, messaging apps, and documents. Researchers <a class="link" href="https://www.rapid7.com/blog/post/tr-santastealer-is-coming-to-town-a-new-ambitious-infostealer-advertised-on-underground-forums/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-51-2025" target="_blank" rel="noopener noreferrer nofollow">say</a> it runs in memory, uses many data-stealing modules, and uploads stolen data to a hardcoded server. The tool is still immature, poorly hidden, and advertised on Telegram and hacker forums.</p></div><p class="paragraph" style="text-align:left;"></p><div id="ai-crypto-tech-tools" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🤖 🧰 AI, CRYPTO, TECH & TOOLS</h3><div class="embed"><a class="embed__url" href="https://www.404media.co/hack-reveals-the-a16z-backed-phone-farm-flooding-tiktok-with-ai-influencers/?ref=daily-stories-newsletter&utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-51-2025" target="_blank"><div class="embed__content"><p class="embed__title"> Hack Reveals the a16z-Backed Phone Farm Flooding TikTok With AI Influencers </p><p class="embed__description"> A hacker gained control of a 1,100 mobile phone farm powering covert, AI-generated ads on TikTok. </p><p class="embed__link"> www.404media.co/hack-reveals-the-a16z-backed-phone-farm-flooding-tiktok-with-ai-influencers/?ref=daily-stories-newsletter </p></div><img class="embed__image embed__image--right" src="https://www.404media.co/content/images/size/w1200/2025/12/Copy-of-Screenshot-as-Lede-Image--6-.png"/></a></div><p class="paragraph" style="text-align:left;">🧩 <b>Eight browser extensions with over 8 million installs collect full AI conversations and sell them</b> for marketing. They promise privacy but inject scripts that capture chats from ChatGPT, Gemini, Claude, and others. The <a class="link" href="https://arstechnica.com/security/2025/12/browser-extensions-with-8-million-users-collect-extended-ai-conversations/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-51-2025" target="_blank" rel="noopener noreferrer nofollow">extensions remain listed</a> and even carry “Featured” badges in the stores.</p><p class="paragraph" style="text-align:left;">🇺🇸 ⚖️ <b>The American Bar Association warns that AI is undermining legal procedures</b> and court evidence. Deepfakes and AI errors are creating doubts about authenticity and trust in trials. The <a class="link" href="https://cyberscoop.com/ai-deepfakes-causing-big-problems-in-the-legal-sector-aba-report/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-51-2025" target="_blank" rel="noopener noreferrer nofollow">ABA also notes</a> AI can speed routine legal work and is developing guidance to manage risks.</p><hr class="content_break"><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/Bd1xafW13Wc" width="100%"></iframe></div><p class="paragraph" style="text-align:left;"></p><div id="vulnerabilities-research-and-threat" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🐛 🧠 VULNERABILITIES, RESEARCH, AND THREAT INTELLIGENCE</h3><p class="paragraph" style="text-align:left;">➝ From the Patching Department:</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/apple-patches-two-zero-days-tied-to-mysterious-exploited-chrome-flaw/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-51-2025" target="_blank" rel="noopener noreferrer nofollow">Apple Patches Two Zero-Days Tied to Mysterious Exploited Chrome Flaw</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/atlassian-patches-critical-apache-tika-flaw/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-51-2025" target="_blank" rel="noopener noreferrer nofollow">Atlassian Patches Critical Apache Tika Flaw</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://thehackernews.com/2025/12/freepbx-authentication-bypass-exposed.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-51-2025" target="_blank" rel="noopener noreferrer nofollow">FreePBX Patches Critical SQLi, File-Upload, and AUTHTYPE Bypass Flaws Enabling RCE</a></p></li></ul><hr class="content_break"><p class="paragraph" style="text-align:left;">💥 🩹 <b>SonicWall warned customers to patch a new SMA1000 local privilege escalation bug</b> (CVE-2025-40602) that was chained in zero-day attacks. Attackers combined it with a pre-auth deserialization flaw (CVE-2025-23006) to run commands as root on exposed devices. Over <a class="link" href="https://www.bleepingcomputer.com/news/security/sonicwall-warns-of-new-sma1000-zero-day-exploited-in-attacks/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-51-2025" target="_blank" rel="noopener noreferrer nofollow">950 SMA1000 appliances are internet-exposed</a>, so unpatched systems face high risk.</p><p class="paragraph" style="text-align:left;">🚚 <b>The National Motor Freight Traffic Association (NMFTA) warns that cargo theft is shifting from brute-force theft to sophisticated, cyber-enabled heists</b> — <a class="link" href="https://www.securityweek.com/nmfta-warns-of-surge-and-sophistication-of-cyber-enabled-cargo-theft/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-51-2025" target="_blank" rel="noopener noreferrer nofollow">Criminals use</a> hacking, social engineering, AI deepfakes, and stolen credentials to take over accounts, spoof dispatches, and divert shipments. Companies using cyber awareness training and phishing simulations are seeing fewer successful attacks.</p><p class="paragraph" style="text-align:left;">🇨🇳 <b>Google linked five more Chinese hacking groups to attacks exploiting the severe React2Shell flaw</b> (CVE-2025-55182). The bug lets attackers run code on vulnerable <code>React/Next.js</code> sites and has been used to steal AWS credentials and other data. Thousands of systems worldwide <a class="link" href="https://cloud.google.com/blog/topics/threat-intelligence/threat-actors-exploit-react2shell-cve-2025-55182/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-51-2025" target="_blank" rel="noopener noreferrer nofollow">remain exposed</a> and actors from multiple countries are actively exploiting it.</p><p class="paragraph" style="text-align:left;">→ <a class="link" href="https://cyberscoop.com/react2shell-vulnerability-fallout-spreads/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-51-2025" target="_blank" rel="noopener noreferrer nofollow">React2Shell fallout spreads to sensitive targets as public exploits hit all-time high</a></p><p class="paragraph" style="text-align:left;">💥 <b>Threat actors began exploiting two critical Fortinet flaws</b> (CVE-2025-59718, CVE-2025-59719) <a class="link" href="https://arcticwolf.com/resources/blog/arctic-wolf-observes-malicious-sso-logins-following-disclosure-cve-2025-59718-cve-2025-59719/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-51-2025" target="_blank" rel="noopener noreferrer nofollow">days after patches were released</a>. The bugs let attackers bypass FortiCloud SSO, log in as admin, and export device configs containing hashed credentials. Administrators should apply the patches, disable FortiCloud SSO, restrict management access, and reset credentials if breached.</p><p class="paragraph" style="text-align:left;">🔓️ ☁️ <b>A flaw in </b><i><b>JumpCloud Remote Assist</b></i><b> for Windows lets an unprivileged local user trick the uninstaller</b> into performing privileged file operations in a user-writable <code>%TEMP%</code> folder. Attackers <a class="link" href="https://www.securityweek.com/jumpcloud-remote-assist-vulnerability-can-expose-systems-to-takeover/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-51-2025" target="_blank" rel="noopener noreferrer nofollow">can use symbolic links or mount-point tricks</a> to overwrite system files or trigger a takeover, causing BSODs or gaining SYSTEM shells. JumpCloud fixed it in version 0.317.0 and organizations should update immediately.</p><div class="embed"><a class="embed__url" href="https://krebsonsecurity.com/2025/12/most-parked-domains-now-serving-malicious-content/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-51-2025" target="_blank"><div class="embed__content"><p class="embed__title"> Most Parked Domains Now Serving Malicious Content – Krebs on Security </p><p class="embed__link"> krebsonsecurity.com/2025/12/most-parked-domains-now-serving-malicious-content </p></div></a></div></div><p class="paragraph" style="text-align:left;"></p><div id="ics-ot-io-t" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🛰️ ICS, OT & IoT</h3><p class="paragraph" style="text-align:left;"></p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#f0f0f0;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">💬 CONNECT</h3><p class="paragraph" style="text-align:left;">Follow me on <a class="link" href="https://infosec.exchange/@0x58?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-51-2025" target="_blank" rel="noopener noreferrer nofollow">Mastodon</a> for quick daily updates and bite-sized content.</p><p class="paragraph" style="text-align:left;">Prefer using an RSS feed? Add <b>Infosec MASHUP</b> to your feed <a class="link" href="https://rss.beehiiv.com/feeds/HVhiKYpQlR.xml?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-51-2025" target="_blank" rel="noopener noreferrer nofollow">here</a>.</p><p class="paragraph" style="text-align:center;"><b>Enjoying our newsletter? </b>Forward it to a colleague—<br>it’s one of the best ways to support us.</p><p class="paragraph" style="text-align:left;">Thanks for reading today’s newsletter, and if you&#39;re enjoying it and want to support my work, you can <b>buy me a coffee</b> ☕ over at <a class="link" href="https://www.buymeacoffee.com/0x58?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-51-2025" target="_blank" rel="noopener noreferrer nofollow">https://www.buymeacoffee.com/0x58</a></p><p class="paragraph" style="text-align:left;"> See you next time!</p><p class="paragraph" style="text-align:left;">-X.</p></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=2f65401b-76fe-45ef-8c8e-9264647dac7a&utm_medium=post_rss&utm_source=x_s_infosec_newsletter">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>🕵🏻‍♂️ [InfoSec MASHUP] 50/2025</title>
  <description>New Prompt Injection Attack Vectors Through MCP Sampling; Insights from Internal DPRK Chat Logs; North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks; MITRE Posts Results of 2025 ATT&amp;CK Enterprise Evaluations; The UK cyber agency warns large language models are inherently vulnerable to prompt injection; The UK fined LastPass £1.2 million after a 2022 breach exposed data and encrypted vaults; Germany accuses Russia of 2024 cyber attack and election disinformation campaign;</description>
  <link>https://infosec-mashup.santolaria.net/p/infosec-mashup-50-2025</link>
  <guid isPermaLink="true">https://infosec-mashup.santolaria.net/p/infosec-mashup-50-2025</guid>
  <pubDate>Fri, 12 Dec 2025 21:22:25 +0000</pubDate>
  <atom:published>2025-12-12T21:22:25Z</atom:published>
    <dc:creator>Xavier Santolaria</dc:creator>
    <category><![CDATA[Malware]]></category>
    <category><![CDATA[Opensource]]></category>
    <category><![CDATA[Privacy]]></category>
    <category><![CDATA[Cybersecurity]]></category>
    <category><![CDATA[Threat Intelligence]]></category>
    <category><![CDATA[Ai]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'IBM Plex Sans',-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'IBM Plex Sans',-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">We now have <b>{{active_subscriber_count}} active subscribers</b>! Thank you all for being part of my newsletter. Please share it with your friends and colleagues, and let’s keep growing the community.</p><p class="paragraph" style="text-align:left;">🎄 As the year wraps up, I just want to say a huge thank you for being part of the community and for all your support throughout 2025. It really means a lot! Wishing you all a relaxing and joyful holiday season, and I can’t wait to head into 2026 with you—sharing more cybersecurity news, helpful resources, and cool tools along the way ✌️ </p><p class="paragraph" style="text-align:left;">Now, let’s now dive into this week’s top insights! 🚀</p><h2 class="heading" style="text-align:left;">Table of Contents</h2><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="#breaches-security-incidents" rel="noopener noreferrer nofollow">BREACHES & SECURITY INCIDENTS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#cybercrime-cyber-espionage-ap-ts" rel="noopener noreferrer nofollow">CYBERCRIME, CYBER ESPIONAGE, APT’s</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#government-politics-and-privacy" rel="noopener noreferrer nofollow">GOVERNMENT, POLITICS, AND PRIVACY</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#malware-threats" rel="noopener noreferrer nofollow">MALWARE & THREATS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#ai-crypto-tech-tools" rel="noopener noreferrer nofollow">AI, CRYPTO, TECH & TOOLS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#vulnerabilities-research-and-threat" rel="noopener noreferrer nofollow">VULNERABILITIES, RESEARCH, AND THREAT INTELLIGENCE</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#ics-ot-io-t" rel="noopener noreferrer nofollow">ICS, OT & IoT</a></p></li></ul><div id="breaches-security-incidents" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🔓 BREACHES & SECURITY INCIDENTS</h3><p class="paragraph" style="text-align:left;">🇬🇧 💷 <b>The UK fined LastPass £1.2 million after a 2022 breach exposed data and encrypted vaults</b> of up to 1.6 million UK users. Attackers chained compromises of an employee laptop and a senior staffer’s personal device to steal keys and cloud backups. Authorities say <a class="link" href="https://www.bleepingcomputer.com/news/security/uk-fines-lastpass-over-2022-data-breach-impacting-16-million-users/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">LastPass failed to protect customer data</a> and urge stronger passwords and tighter access controls.</p><p class="paragraph" style="text-align:left;">🇺🇸 🔓️ <b>A researcher found a Home Depot employee’s GitHub access token exposed online</b> for about a year. The token let someone access hundreds of private repositories and cloud systems. Home Depot ignored the researcher <a class="link" href="https://techcrunch.com/2025/12/12/home-depot-exposed-access-to-internal-systems-for-a-year-says-researcher/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">until TechCrunch reported it</a> and the token was revoked.</p><p class="paragraph" style="text-align:left;">🐳 🔓️ <b>Security researchers found 10,456 Docker Hub images leaking secrets</b> like API keys, database credentials, and LLM tokens. The <a class="link" href="https://flare.io/learn/resources/docker-hub-secrets-exposed/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">leaks affected about 101 companies</a>, including a Fortune 500 firm and a major bank. Researchers warn to stop embedding secrets in images, revoke exposed keys, and use centralized secret management.</p><p class="paragraph" style="text-align:left;">🇰🇷 👋 <b>Coupang’s CEO Park Dae-jun resigned after the huge data breach</b> exposed personal data of about 34 million people. He <a class="link" href="https://techcrunch.com/2025/12/10/ceo-of-south-korean-retail-giant-coupang-resigns-after-massive-data-breach/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">apologized</a> and said he felt deep responsibility. Harold Rogers, the company’s U.S. parent’s top lawyer, will replace him.</p><p class="paragraph" style="text-align:left;">💁 <b>Cybersecurity insurer </b><i><b>Coalition</b></i><b> now offers policies that cover some deepfake incidents</b> and <a class="link" href="https://cyberscoop.com/url-coalition-cybersecurity-insurance-coverage-deepfakes-reputational-harm/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">provide response services</a>. Deepfakes are still rare in claims, but they can convincingly impersonate executives to steal money or damage reputations. Experts warn AI tools will make these attacks cheaper and more common for many businesses soon.</p><p class="paragraph" style="text-align:left;">🇺🇸 <i><b>Vitas Healthcare</b></i><b> reported a cyber intrusion</b> that exposed personal and medical data. About 319,177 current and former patients were <a class="link" href="https://vitasdatanotice.com/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">affected</a>. The attacker used a compromised vendor account and accessed systems from Sept. 21 to Oct. 27.</p><p class="paragraph" style="text-align:left;">🇺🇸 <i><b>Tri-Century Eye Care</b></i><b> suffered a data breach that may have exposed personal and health information</b> for about 200,000 people. The <i>Pear</i> ransomware group <a class="link" href="https://www.securityweek.com/tri-century-eye-care-data-breach-impacts-200000-individuals/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">claimed the attack</a> and posted stolen files after Tri-Century refused to pay. Large healthcare breaches like this have affected other eye care providers (Retina Group of Florida, Asheville Eye Associates, and Ocuco) this year.</p><p class="paragraph" style="text-align:left;">→ More breaches:</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://techcrunch.com/2025/12/12/data-breach-at-credit-check-giant-700credit-affects-at-least-5-6-million/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">Data breach at credit check giant 700Credit affects at least 5.6 million</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/pierce-county-library-data-breach-impacts-340000/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">Pierce County Library Data Breach Impacts 340,000</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/fieldtex-data-breach-impacts-238000/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">Fieldtex Data Breach Impacts 238,000</a></p></li></ul></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;border-color:#3587E8;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🔗<i><b> Partners and Affiliates</b></i></p><p class="paragraph" style="text-align:left;">🔐 <a class="link" href="https://go.nordvpn.net/aff_c?offer_id=15&aff_id=84917&url_id=902&utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">NordVPN Threat Protection Pro™ Campaign</a></p><p class="paragraph" style="text-align:left;"><i>With its user-friendly interface, robust security features, and commitment to privacy, NordVPN continues to be a popular choice for individuals seeking online protection and unrestricted internet access.</i></p><p class="paragraph" style="text-align:left;"><i><b>Special Offer</b></i><i>: </i>get up to 73% off with a 2-year plan!</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://go.nordvpn.net/aff_c?offer_id=15&aff_id=84917&url_id=902&utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025"><span class="button__text" style=""> GET THE DEAL </span></a></div></div><p class="paragraph" style="text-align:left;"></p><div id="cybercrime-cyber-espionage-ap-ts" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🥷🏻 CYBERCRIME, CYBER ESPIONAGE, APT’s</h3><p class="paragraph" style="text-align:left;">🇰🇵 💬 <b>Researchers found internal IP Messenger chat logs from North Korean IT workers</b> showing collaboration on software, account sharing, and links to DPRK universities. The <a class="link" href="https://chollima-group.io/posts/insights-from-internal-dprk-chat-logs?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">logs suggest a local LAN with freelancers trading jobs</a>, personas, and remote access services. Though location and internet access are unclear, the chats give rare insight into their networks and operations.</p><p class="paragraph" style="text-align:left;">🇵🇱 🇺🇦 <b>Polish police arrested three Ukrainian men found with advanced hacking gear</b> and spy-detection tools. They face charges for fraud, computer crimes, and possessing devices meant for criminal use. Authorities <a class="link" href="https://srodmiescie.policja.gov.pl/rs/aktualnosci/145521,Podrozowali-po-Europie-z-detektorem-urzadzen-szpiegowskich-i-sprzetem-hakerskim.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">seized laptops, SIM cards, routers, hard drives, and Flipper Zero-like equipment</a> and detained the men for three months.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/9e056e78-7e7d-4a12-b5d0-8bddde340fe7/image.png?t=1765289041"/><div class="image__source"><span class="image__source_text"><p>Figure: Seized hardware/<a class="link" href="https://policja.gov.pl?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">policja.gov.pl</a></p></span></div></div><p class="paragraph" style="text-align:left;">🇨🇦 <b>A hacking group called </b><i><b>STAC6565</b></i><b>, linked to Gold Blade, is targeting Canadian organizations</b> in 80% of its <a class="link" href="https://news.sophos.com/en-us/2025/12/05/sharpening-the-knife-gold-blades-strategic-evolution/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">attacks using phishing and ransomware</a> called <i>QWCrypt</i>. They send fake job application emails with malicious files to trick HR staff and gain access to networks. The group uses advanced tools and tactics to steal data and deploy ransomware, especially focusing on critical infrastructure like hypervisors.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/03662cf9-2160-4b9c-a210-ddc1c2fa945b/image.png?t=1765287946"/><div class="image__source"><span class="image__source_text"><p>Figure: GOLD BLADE targeting by country from February 2024 through August 2025/Sophos.com</p></span></div></div><p class="paragraph" style="text-align:left;">🇺🇸 💰️ 🇮🇷 <b>The U.S. is offering up to $10 million for information on members of an Iranian hacking group</b> now called <i>Shahid Shushtari</i>. The group is tied to Iran’s IRGC and blamed for cyberattacks and influence operations against U.S., European, and Middle Eastern targets. Officials <a class="link" href="https://rewardsforjustice.net/rewards/fatemeh-sedighian-kashi-mohammad-bagher-shirinkar/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">named two leaders</a> and urged anyone with tips to contact the Rewards for Justice program.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#f0f0f0;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🗓️ <b>{Cyber,Info}Sec Events</b>: My list of past and future <a class="link" href="https://github.com/xsa/infosec-events?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">{cyber,info}sec related events</a> — Feel free to contribute by submitting issues or pull requests (and don’t forget to <a class="link" href="https://github.com/xsa/infosec-events?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">star the project</a>); Thanks! 😉</p></div><p class="paragraph" style="text-align:left;"></p><div id="government-politics-and-privacy" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">👨🏻‍⚖️ 👀 GOVERNMENT, POLITICS, AND PRIVACY</h3><p class="paragraph" style="text-align:left;">🇩🇪 🇷🇺 <b>Germany says Russian military intelligence carried out an August 2024 cyber-attack on air traffic control</b> and ran an election disinformation campaign. Berlin <a class="link" href="https://www.bbc.com/news/articles/cvgrrnylzzyo?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">blamed</a> the <i>Fancy Bear</i> group and summoned the Russian ambassador, vowing coordinated counter-measures with European partners. Russia has not yet responded, though Moscow has denied similar accusations before.</p><p class="paragraph" style="text-align:left;">🇺🇦 🇺🇸 🇷🇺 <b>Ukrainian national Victoria Dubranova was extradited to the U.S. and charged for aiding Russian state-linked hacktivist groups</b> in attacks on critical infrastructure. Prosecutors <a class="link" href="https://www.justice.gov/opa/pr/justice-department-announces-actions-combat-two-russian-state-sponsored-cyber-criminal?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">say</a> the groups hit water systems, election systems, nuclear-related sites, and other targets using tools like <i>DDoSia</i>. If convicted, Dubranova faces up to 27 years in prison and related rewards and sanctions target the groups and their members.</p><p class="paragraph" style="text-align:left;">🇪🇸 <b>Spanish police arrested a 19-year-old in Barcelona for stealing 64 million personal records</b> from nine companies. He is charged with cybercrime, unauthorized access, and selling the data online. Authorities also <a class="link" href="https://www.policia.es/_es/comunicacion_prensa_detalle.php?ID=16737&utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">seized</a> computers and crypto wallets linked to the sales.</p><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/OnDyJ8sSti8" width="100%"></iframe><p class="paragraph" style="text-align:left;">🇵🇹 <b>Portugal updated its cybercrime law to legally protect good-faith security researchers</b> — The exemption <a class="link" href="https://www.bleepingcomputer.com/news/security/portugal-updates-cybercrime-law-to-exempt-security-researchers/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">applies</a> only if researchers limit testing, report vulnerabilities quickly, avoid harm or data misuse, and follow strict rules. Similar protections have been introduced in Germany and the U.S. for responsible vulnerability research.</p><p class="paragraph" style="text-align:left;">🤖 🔓️ <b>Researchers show that MCP sampling lets external servers ask a user&#39;s LLM for completions</b>, creating new attack paths. A <a class="link" href="https://unit42.paloaltonetworks.com/model-context-protocol-attack-vectors/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">malicious MCP server can inject hidden instructions</a>, persist them across turns, and make the LLM leak data or call tools without the user knowing. Safeguards are needed to detect and block such prompt injections.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;border-color:#3587E8;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🔗<i><b> Partners and Affiliates</b></i></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/6f403f9b-d3a1-4d60-9852-f0e0f9340b87/image.png?t=1740643992"/></div><p class="paragraph" style="text-align:center;">🌐 <i>Stay connected and secure on the go with </i><i><b><a class="link" href="https://airalo.pxf.io/c/5582065/1345899/15608?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">Airalo</a></b></i><i>&#39;s global eSIMs — Use the code </i><i><b>NEWTOAIRALO15</b></i><i> if you’re new to Airalo to get an additional 15% discount.</i></p></div><p class="paragraph" style="text-align:left;"></p><div id="malware-threats" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🦠 MALWARE & THREATS</h3><div class="embed"><a class="embed__url" href="https://unit42.paloaltonetworks.com/new-ransomware-01flip-written-in-rust/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank"><div class="embed__content"><p class="embed__title"> 01flip: Multi-Platform Ransomware Written in Rust </p><p class="embed__description"> 01flip is a new ransomware family fully written in Rust. Activity linked to 01flip points to alleged dark web data leaks. </p><p class="embed__link"> unit42.paloaltonetworks.com/new-ransomware-01flip-written-in-rust </p></div><img class="embed__image embed__image--right" src="https://unit42.paloaltonetworks.com/wp-content/uploads/2025/12/05_Ransomware_Category_1920x900.jpg"/></a></div><p class="paragraph" style="text-align:left;">🎣 🕷️ <b>A new phishing kit called </b><i><b>Spiderman</b></i><b> is targeting customers of many European banks and crypto services</b> with pixel-perfect fake sites. It can steal logins, 2FA/PhotoTAN codes, credit card data, and crypto seed phrases, and lets attackers monitor and export victim data in real time. Researchers <a class="link" href="https://www.varonis.com/blog/spiderman-phishing-kit?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">warn</a> this enables account takeover, card fraud, SIM swapping, and identity theft, and advise always verifying official domains and reporting unexpected OTP prompts.</p><p class="paragraph" style="text-align:left;">📲 <i><b>DroidLock</b></i><b> is Android malware that locks phones, steals data (messages, calls, contacts, audio) and can wipe</b> or change device locks to deny access. It spreads via fake app sites targeting Spanish speakers and tricks users into granting Device Admin and Accessibility permissions. <a class="link" href="https://zimperium.com/blog/total-takeover-droidlock-hijacks-your-device?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">Zimperium says</a> the malware steals lock patterns, uses overlays and VNC for remote control, and Play Protect can block it if devices are up to date.</p><p class="paragraph" style="text-align:left;">🇰🇵 <b>North Korean-linked hackers used the new </b><i><b>EtherRAT</b></i><b> malware to exploit the critical React2Shell flaw</b> in <code>Next.js</code>. EtherRAT runs five Linux persistence methods, uses Ethereum smart contracts for C2, and can self-update. Sysdig <a class="link" href="https://www.sysdig.com/blog/etherrat-dprk-uses-novel-ethereum-implant-in-react2shell-attacks?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">urges</a> admins to patch React/Next.js, check persistence, monitor Ethereum RPCs, and rotate credentials.</p><p class="paragraph" style="text-align:left;">→ <a class="link" href="https://www.huntress.com/blog/peerblight-linux-backdoor-exploits-react2shell?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">PeerBlight Linux Backdoor Exploits React2Shell CVE-2025-55182</a></p><p class="paragraph" style="text-align:left;">🧩 <b>Two malicious VSCode extensions in Microsoft’s Marketplace install an infostealer</b> that takes screenshots, steals credentials and crypto wallets, and hijacks browser sessions. The extensions (<code>Bitcoin Black</code> and <code>Codo AI</code>) hid <a class="link" href="https://www.koi.ai/blog/the-vs-code-malware-that-captures-your-screen?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">malicious DLLs</a> and used DLL hijacking plus scripts to run payloads stealthily. Developers should only install extensions from reputable publishers to reduce risk.</p><p class="paragraph" style="text-align:left;">🔙 🚪 <b>Iran-linked </b><i><b>MuddyWater</b></i><b> used a new UDP-based backdoor called </b><i><b>UDPGangster</b></i> to target users in Turkey, Israel, and Azerbaijan. Infections began with <a class="link" href="https://www.fortinet.com/blog/threat-research/udpgangster-campaigns-target-multiple-countries?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">spear-phishing Word docs</a> that run macros to install the malware, which evades analysis and persists via registry changes. UDPGangster collects system data and communicates with a remote server over UDP to exfiltrate files and run commands.</p></div><p class="paragraph" style="text-align:left;"></p><div id="ai-crypto-tech-tools" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🤖 🧰 AI, CRYPTO, TECH & TOOLS</h3><div class="embed"><a class="embed__url" href="https://www.404media.co/a-developer-accidentally-found-csam-in-ai-data-google-banned-him-for-it/?ref=daily-stories-newsletter&utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank"><div class="embed__content"><p class="embed__title"> A Developer Accidentally Found CSAM in AI Data. Google Banned Him For It </p><p class="embed__description"> Mark Russo reported the dataset to all the right organizations, but still couldn&#39;t get into his accounts for months. </p><p class="embed__link"> www.404media.co/a-developer-accidentally-found-csam-in-ai-data-google-banned-him-for-it/?ref=daily-stories-newsletter </p></div><img class="embed__image embed__image--right" src="https://images.unsplash.com/photo-1612383401597-cdfb8bdfa0d9?crop=entropy&cs=tinysrgb&fit=max&fm=jpg&ixid=M3wxMTc3M3wwfDF8c2VhcmNofDF8fGRhcmslMjBjb21wdXRlcnxlbnwwfHx8fDE3NjUzNzczNjF8MA&ixlib=rb-4.1.0&q=80&w=2000"/></a></div><p class="paragraph" style="text-align:left;">🆕 🐧 <b>Kali Linux 2025.4 is released</b> with <a class="link" href="https://www.kali.org/blog/kali-linux-2025-4-release/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">three new tools</a> (<code>bpf-linker</code>, <code>evil-winrm-py</code>, <code>hexstrike-ai</code>) and desktop updates. GNOME now runs only on Wayland and KDE and Xfce also received improvements. NetHunter gains new device support, and live ISOs are now distributed via BitTorrent.</p><p class="paragraph" style="text-align:left;">📊 <b>MITRE released results of the 2025 ATT&CK Enterprise Evaluations</b> for 11 cybersecurity vendors. The <a class="link" href="https://www.securityweek.com/mitre-posts-results-of-2025-attck-enterprise-evaluations/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">tests focused on </a><a class="link" href="https://www.securityweek.com/mitre-posts-results-of-2025-attck-enterprise-evaluations/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow"><i>Scattered Spider</i></a><a class="link" href="https://www.securityweek.com/mitre-posts-results-of-2025-attck-enterprise-evaluations/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow"> and </a><a class="link" href="https://www.securityweek.com/mitre-posts-results-of-2025-attck-enterprise-evaluations/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow"><i>Mustang Panda</i></a><a class="link" href="https://www.securityweek.com/mitre-posts-results-of-2025-attck-enterprise-evaluations/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow"> scenarios</a>, including cloud attacks and adversary reconnaissance, and emphasized protection and high-fidelity detection. Some vendors touted perfect scores, but experts warn such claims can be misleading, and major firms like Microsoft and Palo Alto Networks did not participate.</p><p class="paragraph" style="text-align:left;">🤖 🪧 <b>Global cybersecurity agencies issued unified guidance for using AI in critical infrastructure</b> to balance benefits with safety and security. The guidance says <a class="link" href="https://cyberscoop.com/ai-cybersecurity-guidance-critical-infrastructure-op-ed/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">AI should advise, not control OT systems</a>, keep humans in the loop, and use push-based architectures to reduce attack risk. It urges transparency from vendors, regular validation to prevent model drift, and training so operators retain manual skills.</p><p class="paragraph" style="text-align:left;">🇺🇸 <b>President Trump signed an executive order to stop states from making their own AI rules</b>, saying a p<a class="link" href="https://www.securityweek.com/trump-signs-executive-order-to-block-state-ai-regulations/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">atchwork of laws would hurt U.S. competition with China</a>. The order creates a task force to challenge state laws and could cut some federal funding to states with AI regulations. Some states have already passed laws to limit data collection and require transparency to curb AI bias and harms.</p><div class="embed"><a class="embed__url" href="https://www.axios.com/2025/12/10/openai-new-models-cybersecurity-risks?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank"><div class="embed__content"><p class="embed__title"> Exclusive: Future OpenAI models likely to pose &quot;high&quot; cybersecurity risk, it says </p><p class="embed__description"> OpenAI says it&#39;s stepping up efforts to protect against attacks. </p><p class="embed__link"> www.axios.com/2025/12/10/openai-new-models-cybersecurity-risks </p></div><img class="embed__image embed__image--right" src="https://images.axios.com/Of53hjitUmp42UdyMDgUHsvfLsY=/0x0:1920x1080/1366x768/2025/10/15/1760561858136.jpeg"/></a></div><p class="paragraph" style="text-align:left;">🇬🇧 <b>The UK cyber agency warns large language models are inherently vulnerable</b> to prompt injection. These models treat all input as instructions, so malicious prompts can bypass safeguards. Because of their architecture, this <a class="link" href="https://cyberscoop.com/uk-warns-ai-prompt-injection-unfixable-security-flaw/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">weakness may never be fully eliminated</a>.</p><p class="paragraph" style="text-align:left;">🔓️ <b>Researchers found a new prompt-injection flaw in major AI coding tools</b> that can turn GitHub workflows into attack paths. Malicious or untrusted content in commits, pull requests, or issues can be treated as instructions by LLMs and trigger privileged actions. The <a class="link" href="https://cyberscoop.com/ai-coding-tools-can-be-turned-against-you-aikido-github-prompt-injection/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">issue</a> affects many models and real projects, and some fixes have begun but the architectural risk remains.</p></div><p class="paragraph" style="text-align:left;"></p><div id="vulnerabilities-research-and-threat" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🐛 🧠 VULNERABILITIES, RESEARCH, AND THREAT INTELLIGENCE</h3><p class="paragraph" style="text-align:left;">➝ From the Patching Department:</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/adobe-patches-nearly-140-vulnerabilities/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">Adobe Patches Nearly 140 Vulnerabilities</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/fortinet-patches-critical-authentication-bypass-vulnerabilities/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">Fortinet Patches Critical Authentication Bypass Vulnerabilities</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/google-patches-gemini-enterprise-vulnerability-exposing-corporate-data/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">Google Patches Gemini Enterprise Vulnerability Exposing Corporate Data</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/google-patches-mysterious-chrome-zero-day-exploited-in-the-wild/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">Google Patches Mysterious Chrome Zero-Day Exploited in the Wild</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/ibm-patches-over-100-vulnerabilities/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">IBM Patches Over 100 Vulnerabilities</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/ivanti-epm-update-patches-critical-remote-code-execution-flaw/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">Ivanti EPM Update Patches Critical Remote Code Execution Flaw</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://cyberscoop.com/microsoft-patch-tuesday-december-2025/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">Microsoft’s last Patch Tuesday of 2025 addresses 57 defects, including one zero-day</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/sap-patches-critical-vulnerabilities-with-december-2025-security-updates/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">SAP Patches Critical Vulnerabilities With December 2025 Security Updates</a></p></li></ul><hr class="content_break"><div class="embed"><a class="embed__url" href="https://www.theatlantic.com/magazine/2026/01/mohammad-tajik-iran-cyber-intelligence/684954/?gift=hVZeG3M9DnxL4CekrWGK39_6xvef6tZFTtiQf_BYUhc&utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank"><div class="embed__content"><p class="embed__title"> They Killed My Source </p><p class="embed__description"> A man claiming to be an Iranian intelligence officer promised me he would reveal his country’s secrets. Then he disappeared. </p><p class="embed__link"> www.theatlantic.com/magazine/2026/01/mohammad-tajik-iran-cyber-intelligence/684954/?gift=hVZeG3M9DnxL4CekrWGK39_6xvef6tZFTtiQf_BYUhc </p></div><img class="embed__image embed__image--right" src="https://cdn.theatlantic.com/thumbor/1fX4lW-81qcod_6tCnVVDR9ueWE=/0x145:2400x1395/1200x625/media/img/2025/12/Man_In_Tehran_16x9/original.jpg"/></a></div><p class="paragraph" style="text-align:left;">💥 🔓️ <b>Exploitation of React2Shell Surges</b> — The critical React flaw called React2Shell (CVE-2025-55182) lets <a class="link" href="https://doublepulsar.com/cybersecurity-industry-overreacts-to-react-vulnerability-starts-panic-burns-own-house-down-again-e85c10ad1607?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">attackers run code on vulnerable servers</a> using specially crafted HTTP requests. Exploits started immediately after disclosure, with many scans and real attacks delivering malware, miners, and credential theft. Security groups report hundreds of thousands of potentially vulnerable instances and urge rapid patching.</p><p class="paragraph" style="text-align:left;">🐛 🩹 <b>React fixed three new vulnerabilities in React Server Components</b> that can cause denial-of-service or leak source code. The <a class="link" href="https://react.dev/blog/2025/12/11/denial-of-service-and-source-code-exposure-in-react-server-components?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">bugs</a> affect multiple 19.x releases and were found while testing fixes for a prior critical flaw. Users should update to 19.0.3, 19.1.4, or 19.2.3 immediately.</p><p class="paragraph" style="text-align:left;">🐛 🩹 <b>A critical Apache Tika vulnerability (CVE-2025-66516, CVSS 10.0)</b> allows XML External Entity (XXE) injection via crafted XFA inside PDFs. It affects <code>tika-core</code>, <code>tika-pdf-module</code>, and <code>tika-parsers</code> and can lead to data leaks, SSRF, DoS, or RCE. Users <a class="link" href="https://www.securityweek.com/critical-apache-tika-vulnerability-leads-to-xxe-injection/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">should update</a> to <code>tika-core</code> 3.2.2, <code>tika-pdf-module</code> 3.2.2, and <code>tika-parsers</code> 2.0.0 immediately.</p><p class="paragraph" style="text-align:left;">💥 🔓️ <b>A large campaign began on December 2 targeting Palo Alto GlobalProtect VPN portals</b> with credential-stuffing and bruteforce login attempts. The <a class="link" href="https://www.greynoise.io/blog/hidden-pattern-credential-based-attacks-palo-alto-sonicwall?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">attacks came from over 7,000 IPs</a> in 3xK GmbH’s network and then shifted to scanning SonicWall SonicOS API endpoints. Organizations are urged to monitor and block these IPs, enforce MFA, and watch for abnormal authentication activity.</p><p class="paragraph" style="text-align:left;">🤑 🐛 <b>White hat researchers won $320,000</b> at the <a class="link" href="https://Zeroday.Cloud?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">Zeroday.Cloud</a> live hacking event in London. The <a class="link" href="https://www.securityweek.com/320000-paid-out-at-zeroday-cloud-for-open-source-software-exploits/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">contest paid for 11 open source exploits</a> across cloud, AI, databases, and more. Biggest payouts included $40,000 for a Linux kernel exploit and multiple $30,000 database exploits.</p><div class="embed"><a class="embed__url" href="https://infosec.exchange/@wiz/115700260994895491?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank"><div class="embed__content"><p class="embed__title"> Wiz :verified: (@wiz@infosec.exchange) </p><p class="embed__description"> Attached: 3 images Day 1 at zeroday.cloud didn’t come to play 😈 New vulns dropped in Grafana, Linux Kernel, 3 Redis, and 2 PostgreSQL - and every. single. one. worked 🤯 100% success rate for day one. Let’s see what we find tomorrow 👀 </p><p class="embed__link"> infosec.exchange/@wiz/115700260994895491 </p></div><img class="embed__image embed__image--right" src="https://media.infosec.exchange/infosec.exchange/media_attachments/files/115/700/260/125/269/292/original/e78c0159445e822f.jpeg"/></a></div></div><p class="paragraph" style="text-align:left;"></p><div id="ics-ot-io-t" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🛰️ ICS, OT & IoT</h3><p class="paragraph" style="text-align:left;">🇨🇳 🇺🇸 ☀️ <b>This one gadget could give China a back door into the U.S. power grid</b> — U.S. solar systems rely heavily on Chinese-made inverters that control electricity flow. Experts and lawmakers <a class="link" href="https://archive.is/QTpQK?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">warn these devices can be remotely manipulated</a> to cause blackouts. That dependence creates a growing national security risk.</p><p class="paragraph" style="text-align:left;">🐛 🔓️ <b>Researchers found three PCIe IDE flaws</b> that could let attackers read or corrupt data, escalate privileges, or cause DoS. Intel and AMD say some of their processors are affected; firmware fixes are being prepared. Exploitation is <a class="link" href="https://kb.cert.org/vuls/id/404544?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">low-severity because it needs physical or low-level PCIe access</a>, but could matter for targeted hardware attacks.</p><p class="paragraph" style="text-align:left;">🐛 🩹 <b>ICS Patch Tuesday</b> — Industrial vendors Siemens, Rockwell Automation, Schneider Electric, and Phoenix Contact released <a class="link" href="https://www.securityweek.com/ics-patch-tuesday-vulnerabilities-fixed-by-siemens-rockwell-schneider/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">Patch Tuesday advisories</a> fixing multiple vulnerabilities in ICS/OT products. The flaws range from critical code execution and DoS to SQL injection, XSS, MitM, and information exposure across many devices and third-party components. CISA also published advisories on separate vulnerabilities affecting CCTV, an appliance XSS, and U-Boot code execution.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#f0f0f0;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">💬 CONNECT</h3><p class="paragraph" style="text-align:left;">Follow me on <a class="link" href="https://infosec.exchange/@0x58?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">Mastodon</a> for quick daily updates and bite-sized content.</p><p class="paragraph" style="text-align:left;">Prefer using an RSS feed? Add <b>Infosec MASHUP</b> to your feed <a class="link" href="https://rss.beehiiv.com/feeds/HVhiKYpQlR.xml?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">here</a>.</p><p class="paragraph" style="text-align:center;"><b>Enjoying our newsletter? </b>Forward it to a colleague—<br>it’s one of the best ways to support us.</p><p class="paragraph" style="text-align:left;">Thanks for reading today’s newsletter, and if you&#39;re enjoying it and want to support my work, you can <b>buy me a coffee</b> ☕ over at <a class="link" href="https://www.buymeacoffee.com/0x58?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-50-2025" target="_blank" rel="noopener noreferrer nofollow">https://www.buymeacoffee.com/0x58</a></p><p class="paragraph" style="text-align:left;"> See you next time!</p><p class="paragraph" style="text-align:left;">-X.</p></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=7e14fbc8-e4d9-4938-9ce5-6930b5186070&utm_medium=post_rss&utm_source=x_s_infosec_newsletter">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>🕵🏻‍♂️ [InfoSec MASHUP] 49/2025</title>
  <description>European authorities shut down Cryptomixer and seized about $28 million in Bitcoin;  India plans to verify and record every smartphone in circulation... and rolls back; Vulnerability in OpenAI’s Codex CLI; Microsoft Silently Mitigated Exploited LNK Vulnerability; Russia blocks FaceTime and Snapchat over use in terrorist attacks; Chinese Hackers Started Exploiting React2Shell Vulnerability;</description>
  <link>https://infosec-mashup.santolaria.net/p/infosec-mashup-49-2025</link>
  <guid isPermaLink="true">https://infosec-mashup.santolaria.net/p/infosec-mashup-49-2025</guid>
  <pubDate>Fri, 05 Dec 2025 21:34:19 +0000</pubDate>
  <atom:published>2025-12-05T21:34:19Z</atom:published>
    <dc:creator>Xavier Santolaria</dc:creator>
    <category><![CDATA[Malware]]></category>
    <category><![CDATA[Opensource]]></category>
    <category><![CDATA[Privacy]]></category>
    <category><![CDATA[Cybersecurity]]></category>
    <category><![CDATA[Threat Intelligence]]></category>
    <category><![CDATA[Ai]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'IBM Plex Sans',-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'IBM Plex Sans',-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">We now have <b>{{active_subscriber_count}} active subscribers</b>! Thank you all for being part of my newsletter. Please share it with your friends and colleagues, and let’s keep growing the community.</p><p class="paragraph" style="text-align:left;">Let’s now dive into this week’s top insights! 🚀</p><h2 class="heading" style="text-align:left;">Table of Contents</h2><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="#breaches-security-incidents" rel="noopener noreferrer nofollow">BREACHES & SECURITY INCIDENTS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#cybercrime-cyber-espionage-ap-ts" rel="noopener noreferrer nofollow">CYBERCRIME, CYBER ESPIONAGE, APT’s</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#government-politics-and-privacy" rel="noopener noreferrer nofollow">GOVERNMENT, POLITICS, AND PRIVACY</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#malware-threats" rel="noopener noreferrer nofollow">MALWARE & THREATS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#ai-crypto-tech-tools" rel="noopener noreferrer nofollow">AI, CRYPTO, TECH & TOOLS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#vulnerabilities-research-and-threat" rel="noopener noreferrer nofollow">VULNERABILITIES, RESEARCH, AND THREAT INTELLIGENCE</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#ics-ot-io-t" rel="noopener noreferrer nofollow">ICS, OT & IoT</a></p></li></ul><div id="breaches-security-incidents" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🔓 BREACHES & SECURITY INCIDENTS</h3><p class="paragraph" style="text-align:left;">🇫🇷 <b>French DIY retailer </b><i><b>Leroy Merlin</b></i><b> says a cyberattack exposed some customers&#39; personal data</b> in France. Leaked details include names, phone numbers, emails, postal addresses, birth dates, and loyalty info, but not bank data or passwords. The <a class="link" href="https://www.bleepingcomputer.com/news/security/french-diy-retail-giant-leroy-merlin-discloses-a-data-breach/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">company says it blocked access</a>, warns customers to watch for phishing, and is investigating.</p><p class="paragraph" style="text-align:left;">🇰🇷 <b>South Korean e-commerce giant </b><i><b>Coupang</b></i><b> disclosed a data breach that exposed personal information of about 33.7 million</b> customers. Exposed data included names, emails, phone numbers, addresses, and some order histories, but not payment details or login credentials. <i>Coupang</i> <a class="link" href="https://techcrunch.com/2025/12/01/koreas-coupang-says-data-breach-exposed-nearly-34m-customers-personal-information/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">reported the breach to authorities</a>, blocked access, and said a former employee is a suspect.</p><h5 class="heading" style="text-align:left;">More Oracle EBS Breaches…</h5><p class="paragraph" style="text-align:left;">🇬🇧 <b>Cl0p ransomware stole invoice files from Barts Health NHS</b> by exploiting an Oracle EBS zero-day. The leaked files include names, addresses, and some former employee and supplier data, and were posted on the dark web. Barts <a class="link" href="https://www.bartshealth.nhs.uk/news/cl0p-cyberattack-update-18178?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">says</a> clinical systems were not affected, has informed authorities, and urges patients to check invoices and watch for scams.</p><p class="paragraph" style="text-align:left;">🇺🇸 <b>University of Phoenix disclosed a data breach</b> after attackers <a class="link" href="https://www.bleepingcomputer.com/news/security/university-of-phoenix-discloses-data-breach-after-oracle-hack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">exploited a zero-day in Oracle E-Business Suite</a>. The stolen data may include names, contact details, dates of birth, Social Security numbers, and bank account information for students, staff, and suppliers. The incident is linked to the Cl0p extortion campaign that has hit other universities and companies.</p><p class="paragraph" style="text-align:left;">→ More breaches:</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/marquis-data-breach-impacts-over-780000-people/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">Marquis Data Breach Impacts Over 780,000 People</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.freedommobile.ca/en-CA/privacy-notice?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">Personal Information Compromised in Freedom Mobile Data Breach</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/inotiv-says-personal-information-stolen-in-ransomware-attack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">Inotiv Says Personal Information Stolen in Ransomware Attack</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://techcrunch.com/2025/12/05/petco-confirms-security-lapse-exposed-customers-personal-data/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">Petco confirms security lapse exposed customers’ personal data</a></p></li></ul></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;border-color:#3587E8;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🔗<i><b> Partners and Affiliates</b></i></p><p class="paragraph" style="text-align:left;">🔐 <a class="link" href="https://go.nordvpn.net/aff_c?offer_id=15&aff_id=84917&url_id=902&utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">NordVPN Threat Protection Pro™ Campaign</a> </p><p class="paragraph" style="text-align:left;"><i>With its user-friendly interface, robust security features, and commitment to privacy, NordVPN continues to be a popular choice for individuals seeking online protection and unrestricted internet access.</i></p><p class="paragraph" style="text-align:left;"><i><b>Special Offer</b></i><i>: </i>get up to 73% off with a 2-year plan!</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://go.nordvpn.net/aff_c?offer_id=15&aff_id=84917&url_id=902&utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025"><span class="button__text" style=""> GET THE DEAL </span></a></div></div><p class="paragraph" style="text-align:left;"></p><div id="cybercrime-cyber-espionage-ap-ts" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🥷🏻 CYBERCRIME, CYBER ESPIONAGE, APT’s</h3><p class="paragraph" style="text-align:left;">🇺🇸 ⚖️ <b>Twin brothers Muneeb and Sohaib Akhter were arrested for allegedly stealing and deleting government data</b> from a contractor minutes after being fired. The breach affected multiple agencies, including DHS, the IRS, and the EEOC, and involved thousands of files and sensitive records. Prosecutors say <a class="link" href="https://cyberscoop.com/muneeb-sohaib-akhter-government-contractors-insider-attack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">the brothers have prior hacking convictions and face multiple federal charges</a>, including identity theft and computer fraud.</p><p class="paragraph" style="text-align:left;">🇰🇵 ⏺️ <b>Researchers secretly watched North Korea&#39;s Lazarus Group recruit remote IT workers</b> and control their &quot;developer&quot; laptops. They <a class="link" href="https://www.bleepingcomputer.com/news/security/north-korea-lures-engineers-to-rent-identities-in-fake-it-worker-scheme/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">used </a><i><a class="link" href="https://www.bleepingcomputer.com/news/security/north-korea-lures-engineers-to-rent-identities-in-fake-it-worker-scheme/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">ANY.RUN</a></i><a class="link" href="https://www.bleepingcomputer.com/news/security/north-korea-lures-engineers-to-rent-identities-in-fake-it-worker-scheme/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow"> sandboxes</a> to record operators stealing identities and setting up persistent access.</p><p class="paragraph" style="text-align:left;">🇰🇷 <b>South Korean police arrested four suspects who hacked over 120,000 IP cameras and sold stolen intimate videos</b> to an overseas illegal website. Investigators are also pursuing the site operators and buyers, and <a class="link" href="https://www.bleepingcomputer.com/news/security/korea-arrests-suspects-selling-intimate-videos-from-hacked-ip-cameras/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">have arrested three purchasers</a> so far. Authorities warned viewing such material is a crime, notified victims, and urged users to secure cameras with strong passwords and updates.</p><p class="paragraph" style="text-align:left;">🇪🇺 🤑 <b>European authorities shut down </b><i><b>Cryptomixer</b></i><b> and seized about $28 million in Bitcoin</b> and servers in Switzerland. Europol <a class="link" href="https://www.europol.europa.eu/media-press/newsroom/news/europol-and-partners-shut-down-cryptomixer?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">says</a> the mixing service handled over $1.5 billion and was used for crimes like ransomware and fraud. The takedown is part of a global effort to disrupt crypto laundering networks.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/93536fdd-5470-4778-be7a-9b4da444424d/image.png?t=1764678595"/><div class="image__source"><span class="image__source_text"><p>Figure: Seizing banner/<a class="link" href="https://europol.europa.eu?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">europol.europa.eu</a></p></span></div></div><p class="paragraph" style="text-align:left;">🇦🇺 ⚖️ <b>An Australian man was sentenced to seven years and four months for launching Wi‑Fi “</b><i><b>evil twin</b></i><b>” attacks</b> at airports and on flights. He used a Wi‑Fi Pineapple to <a class="link" href="https://www.securityweek.com/australian-man-sentenced-to-prison-for-wi-fi-attacks-at-airports-and-on-flights/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">trick victims into entering credentials</a> on fake login pages. Police seized his devices and found intimate images, stolen credentials, and fraud records.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#f0f0f0;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🗓️ <b>{Cyber,Info}Sec Events</b>: My list of past and future <a class="link" href="https://github.com/xsa/infosec-events?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">{cyber,info}sec related events</a> — Feel free to contribute by submitting issues or pull requests (and don’t forget to <a class="link" href="https://github.com/xsa/infosec-events?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">star the project</a>); Thanks! 😉</p></div><p class="paragraph" style="text-align:left;"></p><div id="government-politics-and-privacy" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">👨🏻‍⚖️ 👀 GOVERNMENT, POLITICS, AND PRIVACY</h3><p class="paragraph" style="text-align:left;">🇬🇧 🔔 <b>The UK NCSC is piloting a Proactive Notifications service</b>, run with Netcraft, <a class="link" href="https://www.ncsc.gov.uk/information/proactive-notifications-service?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">to warn organizations about exposed device flaws </a>found by internet scanning. It will email specific, non-payment-requesting recommendations for updates or configuration fixes but won’t cover every system or vulnerability.</p><p class="paragraph" style="text-align:left;">🇷🇺 🛑 <b>Russia&#39;s telecom regulator </b><i><b>Roskomnadzor</b></i><b> has blocked FaceTime and Snapchat, saying they are used to coordinate terrorist attacks</b>, recruit criminals, and commit fraud. Snapchat was blocked on October 10 and FaceTime was announced blocked this week. The <a class="link" href="https://www.bleepingcomputer.com/news/security/russia-blocks-facetime-and-snapchat-over-use-in-terrorist-attacks/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">moves</a> follow recent bans on other foreign messaging and gaming platforms for alleged extremist or harmful content.</p><p class="paragraph" style="text-align:left;">👀 📲 <b>Leaked investigations found Intellexa could remotely access customers’ Predator spyware systems</b> and logs. Researchers <a class="link" href="https://cyberscoop.com/intellexa-remotely-accessed-predator-spyware-customer-systems-investigation-finds/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">say</a> this raises serious human rights and liability concerns. The probes also tied Predator to malicious ad-based infections, zero-day exploits, and surveillance in multiple countries.</p><p class="paragraph" style="text-align:left;">🇺🇸 <b>The Trump administration plans to release a five-page national cybersecurity strategy</b> in January. It <a class="link" href="https://cyberscoop.com/trump-national-cybersecurity-strategy-2025-release/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">outlines</a> six pillars including cyber offense, workforce, procurement, infrastructure, regulation, and emerging tech. Officials say it is a high-level messaging document with follow-on actions and possible executive orders.</p><p class="paragraph" style="text-align:left;">🇺🇸 <b>The Congressional remedy for Salt Typhoon?</b> Chinese hackers in the Salt Typhoon operation penetrated major U.S. telecom networks, alarming lawmakers and experts. Some <a class="link" href="https://cyberscoop.com/legislation-would-designate-critical-cyber-threat-actors-direct-sanctions-against-them/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">senators and the FCC favor voluntary industry cooperation</a>, while others say strong rules and verification are needed. Critics warn that weak telecom cybersecurity risks national infrastructure and that promises alone may not keep networks safe.</p><p class="paragraph" style="text-align:left;">🇺🇸 👨‍⚖️ <b>Texas has dropped its federal lawsuit seeking to void the 25-year-old HIPAA Privacy Rule</b> and <a class="link" href="https://www.databreachtoday.com/texas-drops-challenge-to-25-year-old-hipaa-privacy-rule-a-30171?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">2024 changes</a> that limit sharing reproductive health data. A separate Texas court case already struck down key 2024 HIPAA reproductive-health protections, which eased Texas’ concerns. Experts say withdrawing the suit is pragmatic and the 2000 HIPAA rule likely remains intact.</p><p class="paragraph" style="text-align:left;">🇮🇳 📱 <b>India will require new and resold phones to be verified in a central IMEI database and have its Sanchar Saathi app preinstalled</b> or pushed via updates. The <a class="link" href="https://techcrunch.com/2025/12/02/india-plans-to-verify-and-record-every-smartphone-in-circulation/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">government says this will fight theft, cloning, and fraud</a>, but privacy groups warn it gives authorities broad visibility into device ownership. Critics call for clear data safeguards, audits, and limits on how the information is used. [<b>UPDATE</b>: <a class="link" href="https://www.securityweek.com/india-rolls-back-order-to-preinstall-cybersecurity-app-on-smartphones/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">India Rolls Back Order to Preinstall Cybersecurity App on Smartphones</a>]</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;border-color:#3587E8;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🔗<i><b> Partners and Affiliates</b></i></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/6f403f9b-d3a1-4d60-9852-f0e0f9340b87/image.png?t=1740643992"/></div><p class="paragraph" style="text-align:center;">🌐 <i>Stay connected and secure on the go with </i><i><b><a class="link" href="https://airalo.pxf.io/c/5582065/1345899/15608?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">Airalo</a></b></i><i>&#39;s global eSIMs — Use the code </i><i><b>NEWTOAIRALO15</b></i><i> if you’re new to Airalo to get an additional 15% discount.</i></p></div><p class="paragraph" style="text-align:left;"></p><div id="malware-threats" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🦠 MALWARE & THREATS</h3><blockquote align="center" class="twitter-tweet"><a href="https://twitter.com/cyb3rops/status/1996218192390181147?s=20&utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025"><p> Twitter tweet </p></a></blockquote><p class="paragraph" style="text-align:left;">💬 📲 💔 <b>The FBI warns criminals are using altered social media photos in virtual kidnapping scams</b> to extort money. Scammers send urgent texts and fake proof-of-life images to pressure victims without any real abduction. The FBI <a class="link" href="https://www.ic3.gov/PSA/2025/PSA251205?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">urges caution</a>, verification methods (like family code words), and saving images for investigations.</p><p class="paragraph" style="text-align:left;">🦀 💸 <b>Security researchers found a malicious Rust crate &quot;</b><i><b>evm-units</b></i><b>&quot; that targeted Windows, macOS, and Linux</b> by pretending to be an Ethereum developer tool. The package downloaded and <a class="link" href="https://socket.dev/blog/malicious-rust-crate-evm-units-serves-cross-platform-payloads?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">silently ran OS-specific payloads</a> and checked for Qihoo 360 antivirus to adjust its behavior. The crate was pulled from <code>crates.io</code> after thousands of downloads and had been used as a dependency in another popular package, spreading the attack.</p><p class="paragraph" style="text-align:left;">🇷🇺 🎣 <b>Russian-linked </b><i><b>Star Blizzard</b></i><b> APT targeted </b><i><b>Reporters Without Borders</b></i><b> with spear-phishing emails</b> in March. The attackers used ProtonMail, spoofing, and <a class="link" href="https://blog.sekoia.io/ngo-reporters-without-borders-targeted-by-calisto-in-recent-campaign/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">a phishing kit</a> that can bypass ProtonMail two-factor authentication. The group has targeted NGOs, governments, and researchers since 2019 and is linked to Russia’s FSB.</p><p class="paragraph" style="text-align:left;">🇨🇳 🇺🇸 <b>CISA says Chinese state-linked hackers use a Golang backdoor called </b><i><b>BRICKSTORM</b></i><b> to keep long-term, stealthy access</b> to VMware vSphere and Windows systems. The <a class="link" href="https://www.cisa.gov/news-events/alerts/2025/12/04/prc-state-sponsored-actors-use-brickstorm-malware-across-public-sector-and-information-technology?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">malware lets attackers run commands</a>, move laterally, exfiltrate data, and hide C2 traffic using protocols like DoH and VSOCK. <a class="link" href="https://www.crowdstrike.com/en-us/blog/warp-panda-cloud-threats/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">CrowdStrike</a> and Mandiant link these intrusions to groups (Warp Panda/UNC5221) targeting governments, tech, and cloud environments.</p><p class="paragraph" style="text-align:left;">🇮🇷 🇮🇱 🇪🇬 <b>Iran-linked </b><i><b>MuddyWater</b></i><b> hackers are targeting Israeli sectors and an Egyptian tech firm</b> with a new C/C++ backdoor called <i>MuddyViper</i> deployed via a Fooder loader. The <a class="link" href="https://www.welivesecurity.com/en/eset-research/muddywater-snakes-riverbank/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">campaign</a> uses phishing, VPN exploits, remote-management tools, and multiple stealers to harvest credentials, browser data, and maintain covert access. Recent leaks of Iranian cyber unit documents suggest a formal, state-run hacking apparatus behind these operations.</p><p class="paragraph" style="text-align:left;">🧩 <b>The </b><i><b>Glassworm</b></i><b> malware has returned in a third wave with 24 new malicious VS Code packages</b> on OpenVSX and the Microsoft Marketplace. It <a class="link" href="https://secureannex.com/blog/glassworm-continued/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">hides code with invisible Unicode</a>, steals developer accounts and crypto data, and installs proxies and remote-access tools. Attackers push updates, inflate downloads to appear legitimate, and now use Rust implants to evade detection.</p><p class="paragraph" style="text-align:left;">🇷🇺 🎠 <i><b>Albiriox</b></i><b> is a new Android banking trojan sold by Russian-speaking actors</b> as malware-as-a-service. It gives <a class="link" href="https://www.cleafy.com/cleafy-labs/albiriox-rat-mobile-malware-targeting-global-finance-and-crypto-wallets?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">real-time remote control of devices</a> and can show fake overlays to steal crypto and banking credentials. The trojan targets over 400 apps and uses a builder with Golden Crypt to evade detection.</p></div><p class="paragraph" style="text-align:left;"></p><div id="ai-crypto-tech-tools" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🤖 🧰 AI, CRYPTO, TECH & TOOLS</h3><p class="paragraph" style="text-align:left;">📨 🗑️ <b>Researchers found a zero-click agentic browser attack that can make Perplexity’s Comet browser delete</b> an entire Google Drive by interpreting a crafted email as cleanup instructions. The <a class="link" href="https://www.straiker.ai/blog/from-inbox-to-wipeout-perplexity-comets-ai-browser-quietly-erasing-google-drive?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">attack</a> works because the browser agent has OAuth access to Gmail and Drive and will follow polite, sequenced natural-language commands without confirmation.</p><p class="paragraph" style="text-align:left;">🇺🇸 <b>Sen. Mark Kelly urged big U.S. investment in AI infrastructure and strict safeguards</b> so the technology reflects American values. He <a class="link" href="https://cyberscoop.com/mark-kelly-ai-safety-guardrails-center-for-american-progress/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">wants clear standards, third-party testing, and international coordination to prevent misuse</a> and protect civil rights. Kelly warned that AI must succeed economically or a failed bubble could cause major harm to the U.S. economy.</p><p class="paragraph" style="text-align:left;">📱 🏦 <b>Google is expanding its Android in-call scam protection to include Cash App and JPMorgan Chase</b> users in the U.S. The <a class="link" href="https://security.googleblog.com/2025/12/android-expands-pilot-in-call-scam-protection-financial-apps.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">feature warns you if an unknown caller tries to make you share your screen or banking info</a>, and forces a 30-second pause with only the option to end the call. It works on Android 11+ and aims to stop social-engineering scams that pressure victims into payments or revealing credentials.</p><div class="embed"><a class="embed__url" href="https://podcasts.apple.com/us/podcast/ibm-ceo-arvind-krishna-says-there-is-no-ai-bubble-after-all/id1011668648?i=1000739103977&utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank"><div class="embed__content"><p class="embed__title"> IBM CEO Arvind Krishna says there is no AI bubble after all </p><p class="embed__description"> Podcast Episode · Decoder with Nilay Patel · 12/01/2025 · 1h 10m </p><p class="embed__link"> podcasts.apple.com/us/podcast/ibm-ceo-arvind-krishna-says-there-is-no-ai-bubble-after-all/id1011668648?i=1000739103977 </p></div><img class="embed__image embed__image--right" src="https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/1c/1d/5f/1c1d5f4c-2d94-9c63-2b5e-98f959daebb5/mza_17837256090049499340.jpeg/1200x1200ECA.PESS01-60.jpg?imgShow=Podcasts112/v4/35/2c/4e/352c4ee6-46db-7aff-4287-fc9b7cc3e1b6/mza_3811812518505699598.jpg"/></a></div></div><p class="paragraph" style="text-align:left;"></p><div id="vulnerabilities-research-and-threat" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🐛 🧠 VULNERABILITIES, RESEARCH, AND THREAT INTELLIGENCE</h3><p class="paragraph" style="text-align:left;">➝ From the Patching Department:</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://cyberscoop.com/android-security-update-december-2025/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">Google addresses 107 Android vulnerabilities, including two zero-days</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/chrome-143-patches-high-severity-vulnerabilities/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">Chrome 143 Patches High-Severity Vulnerabilities</a></p></li></ul><hr class="content_break"><div class="embed"><a class="embed__url" href="https://podcasts.apple.com/ch/podcast/cloud-security-podcast-by-google/id1554145026?l=en-GB&i=1000739178257&utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank"><div class="embed__content"><p class="embed__title"> EP254 Escaping 1990s Vulnerability Management: From Unauthenticated Scans to AI-Driven Mitigation </p><p class="embed__description"> Podcast Episode · Cloud Security Podcast by Google · 01/12/2025 · 31m </p><p class="embed__link"> podcasts.apple.com/ch/podcast/cloud-security-podcast-by-google/id1554145026?l=en-GB&i=1000739178257 </p></div><img class="embed__image embed__image--right" src="https://is1-ssl.mzstatic.com/image/thumb/Podcasts124/v4/7c/22/b1/7c22b189-fc31-c858-dafd-df9cb74a4a22/mza_12717273021851818734.png/1200x1200bf-60.jpg"/></a></div><p class="paragraph" style="text-align:left;">🐛 <b>A critical vulnerability in React Server Components (CVE-2025-55182)</b> lets unauthenticated attackers run code and threatens many web apps. Researchers and vendors <a class="link" href="https://cyberscoop.com/react-server-vulnerability-critical-severity-security-update/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">rushed patches and mitigations</a>, warning exploitation is likely soon. Multiple frameworks like <i>Next.js</i> are affected and long-tail impacts are expected.</p><div style="padding:14px 15px 14px;"><table class="bh__table" width="100%" style="border-collapse:collapse;"><tr class="bh__table_row"><th class="bh__table_header" width="50%"><p class="paragraph" style="text-align:left;"><b>Vulnerable product</b></p></th><th class="bh__table_header" width="50%"><p class="paragraph" style="text-align:left;"><b>Patched release</b></p></th></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;">react-server-dom* (19.0.x, 19.1.x, 19.2.x)</p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;">19.0.1, 19.1.2, and 19.2.1</p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;">Next.js with App Router (14.3.0-canary, 15.x, 16.x)</p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;">14.3.0-canary.88, 15.0.5, 15.1.9, 15.2.6, 15.3.6, 15.4.8, 15.5.7, 16.0.7</p></td></tr></table></div><p class="paragraph" style="text-align:left;">→ <a class="link" href="https://aws.amazon.com/blogs/security/china-nexus-cyber-threat-groups-rapidly-exploit-react2shell-vulnerability-cve-2025-55182/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">Chinese Hackers Exploiting React2Shell Vulnerability</a></p><p class="paragraph" style="text-align:left;">→ <a class="link" href="https://blog.cloudflare.com/5-december-2025-outage/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">Cloudflare blames today&#39;s </a><i><a class="link" href="https://blog.cloudflare.com/5-december-2025-outage/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">[Dec. 5, 2025]</a></i><a class="link" href="https://blog.cloudflare.com/5-december-2025-outage/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow"> outage on emergency React2Shell patch</a></p><div class="embed"><a class="embed__url" href="https://infosec.exchange/@mttaggart/115657426247466145?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank"><div class="embed__content"><p class="embed__title"> Taggart (@mttaggart@infosec.exchange) </p><p class="embed__description"> You know what? I&#39;m not getting into a fight about how big a deal the React vuln is. The footprint is bigger than you think because the correlation is difficult to ascertain, but Next.js alone is a monster. And this is in an ecosystem that is not particularly used to this kind of vulnerability. </p><p class="embed__link"> infosec.exchange/@mttaggart/115657426247466145 </p></div></a></div><p class="paragraph" style="text-align:left;">💥 🔓️ <b>JPCERT/CC says attackers have been exploiting a command injection bug in Array Networks AG Series gateways</b> <a class="link" href="https://thehackernews.com/2025/12/jpcert-confirms-active-command.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">since August 2025</a>. The flaw in DesktopDirect lets attackers run arbitrary commands and drop web shells; Array fixed it in ArrayOS 9.4.5.9. Users should update immediately or disable DesktopDirect and block URLs with semicolons.</p><p class="paragraph" style="text-align:left;">🩹 <b>Microsoft silently fixed an exploited LNK shortcut bug (CVE-2025-9491)</b> in its November 2025 updates. The flaw hid long command strings in the Target field so malicious shortcuts could run malware when users opened them. Microsoft and third parties say user warnings and detections reduce risk, and <a class="link" href="https://blog.0patch.com/2025/12/microsoft-silently-patched-cve-2025.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">Acros Security offers a 0Patch fix</a>.</p><p class="paragraph" style="text-align:left;">🔓️ 🤖 <b>Researchers found a vulnerability in OpenAI’s Codex CLI </b>that let the tool run commands from local project config files <a class="link" href="https://research.checkpoint.com/2025/openai-codex-cli-command-injection-vulnerability/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">without asking the user</a>. An attacker who adds a malicious config to a repo can trigger remote shells, steal secrets, or spread attacks through supply chains. OpenAI patched the issue (CVE-2025-61260) in Codex CLI 0.23.0.</p></div><p class="paragraph" style="text-align:left;"></p><div id="ics-ot-io-t" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🛰️ ICS, OT & IoT</h3><p class="paragraph" style="text-align:left;">🤖 <b>Cybersecurity agencies from six countries issued guidance for safely using AI in operational technology</b> for critical infrastructure. The <a class="link" href="https://www.cisa.gov/sites/default/files/2025-12/joint-guidance-principles-for-the-secure-integration-of-artificial-intelligence-in-operational-technology-508c.pdf?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">guidance</a> lists four principles: understand AI risks, choose fit-for-purpose use cases, set governance and testing, and add oversight and failsafes. It stresses clear roles, data security, staff training, and continuous monitoring to prevent safety, reliability, and security problems.</p><p class="paragraph" style="text-align:left;">💥 <b>CISA added a 2021 ScadaBR XSS flaw (CVE-2021-26829) to its Known Exploited Vulnerabilities list after hacktivists used it to deface an HMI</b> — The <a class="link" href="https://www.securityweek.com/cisa-warns-of-scadabr-vulnerability-after-hacktivist-ics-attack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">vulnerability was patched in June 2021</a> but can still let attackers run arbitrary code or hijack sessions. The incident, done against a fake water-plant honeypot, shows hacktivists target easy ICS/OT flaws and could signal wider exploitation.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#f0f0f0;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">💬 CONNECT</h3><p class="paragraph" style="text-align:left;">Follow me on <a class="link" href="https://infosec.exchange/@0x58?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">Mastodon</a> for quick daily updates and bite-sized content.</p><p class="paragraph" style="text-align:left;">Prefer using an RSS feed? Add <b>Infosec MASHUP</b> to your feed <a class="link" href="https://rss.beehiiv.com/feeds/HVhiKYpQlR.xml?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">here</a>.</p><p class="paragraph" style="text-align:center;"><b>Enjoying our newsletter? </b>Forward it to a colleague—<br>it’s one of the best ways to support us.</p><p class="paragraph" style="text-align:left;">Thanks for reading today’s newsletter, and if you&#39;re enjoying it and want to support my work, you can <b>buy me a coffee</b> ☕ over at <a class="link" href="https://www.buymeacoffee.com/0x58?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-49-2025" target="_blank" rel="noopener noreferrer nofollow">https://www.buymeacoffee.com/0x58</a></p><p class="paragraph" style="text-align:left;"> See you next time!</p><p class="paragraph" style="text-align:left;">-X.</p></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=258c1de0-a217-45a6-8363-538aebeecfc0&utm_medium=post_rss&utm_source=x_s_infosec_newsletter">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title> 🕵🏻‍♂️ [InfoSec MASHUP] 48/2025</title>
  <description>OpenAI says some user data was exposed in a Mixpanel breach; Gainsight says more customers were affected by suspicious activity tied to its Salesforce apps; The House Homeland Security Committee asked Anthropic CEO Dario Amodei to testify about a likely Chinese espionage campaign; The self-replicating worm called Shai-Hulud is back; French Soccer Federation Hit by Cyberattack, Member Data Stolen;</description>
  <link>https://infosec-mashup.santolaria.net/p/infosec-mashup-48-2025</link>
  <guid isPermaLink="true">https://infosec-mashup.santolaria.net/p/infosec-mashup-48-2025</guid>
  <pubDate>Fri, 28 Nov 2025 21:15:08 +0000</pubDate>
  <atom:published>2025-11-28T21:15:08Z</atom:published>
    <dc:creator>Xavier Santolaria</dc:creator>
    <category><![CDATA[Malware]]></category>
    <category><![CDATA[Opensource]]></category>
    <category><![CDATA[Privacy]]></category>
    <category><![CDATA[Cybersecurity]]></category>
    <category><![CDATA[Threat Intelligence]]></category>
    <category><![CDATA[Ai]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'IBM Plex Sans',-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'IBM Plex Sans',-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">We now have <b>{{active_subscriber_count}} active subscribers</b>! Thank you all for being part of my newsletter. Please share it with your friends and colleagues, and let’s keep growing the community.</p><p class="paragraph" style="text-align:left;">Let’s now dive into this week’s top insights! 🚀</p><p class="paragraph" style="text-align:left;">🎙️ Oh, and just for fun, <i>NotebookLM</i> narrated last week’s issue - Worth a <a class="link" href="https://youtu.be/R3aMG8RAVSw?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow">listen</a> 🙂 </p><h2 class="heading" style="text-align:left;">Table of Contents</h2><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="#breaches-security-incidents" rel="noopener noreferrer nofollow">BREACHES & SECURITY INCIDENTS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#cybercrime-cyber-espionage-ap-ts" rel="noopener noreferrer nofollow">CYBERCRIME, CYBER ESPIONAGE, APT’s</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#government-politics-and-privacy" rel="noopener noreferrer nofollow">GOVERNMENT, POLITICS, AND PRIVACY</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#malware-threats" rel="noopener noreferrer nofollow">MALWARE & THREATS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#ai-crypto-tech-tools" rel="noopener noreferrer nofollow">AI, CRYPTO, TECH & TOOLS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#vulnerabilities-research-and-threat" rel="noopener noreferrer nofollow">VULNERABILITIES, RESEARCH, AND THREAT INTELLIGENCE</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#ics-ot-io-t" rel="noopener noreferrer nofollow">ICS, OT & IoT</a></p></li></ul><div id="breaches-security-incidents" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🔓 BREACHES & SECURITY INCIDENTS</h3><p class="paragraph" style="text-align:left;">🇯🇵 <b>Canon says a recent Oracle E-Business Suite hack only hit a subsidiary</b>’s web server. No Canon data has been leaked and <a class="link" href="https://www.securityweek.com/canon-says-subsidiary-impacted-by-oracle-ebs-hack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow">services have been restored</a>. The wider <i>Cl0p/FIN11</i> campaign has named over 100 alleged victims across many industries.</p><p class="paragraph" style="text-align:left;">→ <a class="link" href="https://www.securityweek.com/cox-confirms-oracle-ebs-hack-as-cybercriminals-name-100-alleged-victims/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow">Cox Confirms Oracle EBS Hack as Cybercriminals Name 100 Alleged Victims</a></p><p class="paragraph" style="text-align:left;">→ <a class="link" href="https://www.securityweek.com/mazda-says-no-data-leakage-or-operational-impact-from-oracle-hack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow">Mazda Says No Data Leakage or Operational Impact From Oracle Hack</a></p><p class="paragraph" style="text-align:left;">→ <a class="link" href="https://www.bleepingcomputer.com/news/security/dartmouth-college-confirms-data-breach-after-clop-extortion-attack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow">Dartmouth College confirms data breach after Clop extortion attack</a></p><hr class="content_break"><p class="paragraph" style="text-align:left;">🇫🇷 ⚽️ <b>The French Football Federation said a cyberattack stole member data</b> from its club management software. The <a class="link" href="https://apnews.com/article/french-soccer-federation-cyber-attack-fd07a70e7659517727489315509f91e8?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow">breach used a compromised account and was stopped after detection</a>; passwords were reset. The stolen data were personal details (names, gender, nationality, addresses) and the federation has filed a complaint.</p><p class="paragraph" style="text-align:left;">🇯🇵 🍺 <b>Japanese beer maker Asahi that suffered a ransomware attack in late September and exposed personal data of about 2 million people</b>, is restoring systems in phases, <a class="link" href="https://www.asahigroup-holdings.com/en/newsroom/detail/20251127-0204.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow">investigating the breach</a>, and warns recovery may take months — Stolen records include names, addresses, phone numbers, emails, birthdates, and gender for customers, employees, and family members, but no credit card data. Asahi.</p><p class="paragraph" style="text-align:left;">🤖 <b>OpenAI says some user data was exposed in a Mixpanel breach</b> that <a class="link" href="https://openai.com/index/mixpanel-incident/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow">Mixpanel detected on November 8</a>. The leaked dataset included names, emails, approximate location, browser/OS, and organization or user IDs, but not ChatGPT content, passwords, API keys, payment data, or government IDs. OpenAI removed Mixpanel from production, is notifying affected users, and warns the data could be used for phishing.</p><p class="paragraph" style="text-align:left;">🔑 <b>Users of online code-formatting sites like JSONFormatter and CodeBeautify have exposed thousands of secrets</b>, including keys, tokens, credentials, and PII. <a class="link" href="https://labs.watchtowr.com/stop-putting-your-passwords-into-random-websites-yes-seriously-you-are-the-problem/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow">WatchTowr found</a> these leaks by scraping saved JSON files and says attackers quickly harvest and use the exposed data. Many leaks come from people saving shareable links or pasting sensitive info into tools without sanitizing it.</p><p class="paragraph" style="text-align:left;">📄 <i><b>Gainsight</b></i><b> </b><a class="link" href="https://communities.gainsight.com/community-news-2/salesforce-security-advisory-relating-to-gainsight-faqs-29809?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow"><b>says</b></a><b> more customers were affected by suspicious activity tied to its Salesforce apps </b>than first reported, though only a few had data exposed. Salesforce revoked affected app access and several vendors paused Gainsight integrations while <a class="link" href="https://www.gainsight.com/blog/supporting-our-customers-and-community-an-update-on-the-recent-security-advisory-related-to-gainsight/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow">investigations continue</a>. The breach is linked to the <i>ShinyHunters</i> group and follows broader activity from a new RaaS called ShinySp1d3r.</p><p class="paragraph" style="text-align:left;">🇺🇸 💰️ <b>Comcast will pay a $1.5 million FCC fine after a vendor breach exposed</b> about 274,000 customers&#39; personal data. The <a class="link" href="https://www.bleepingcomputer.com/news/security/comcast-to-pay-15-million-fine-after-a-vendor-data-breach-affecting-270-000-customers/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow">breach occurred in February 2024 at debt collector FBCS</a>, which notified Comcast months later and had millions affected overall. Comcast must improve vendor oversight, appoint a compliance officer, and file regular FCC reports, though it denies wrongdoing.</p><p class="paragraph" style="text-align:left;">🇺🇸 🚨 <b>Risk management firm </b><i><b>Crisis24</b></i><b> said its OnSolve CodeRED emergency alert platform was hit by a cyberattack</b> that disrupted alerts nationwide. The attackers stole user data, including names, addresses, emails, phone numbers, and clear-text passwords. The ransomware group <i>INC Ransom</i> claims responsibility and <a class="link" href="https://www.bleepingcomputer.com/news/security/onsolve-codered-cyberattack-disrupts-emergency-alert-systems-nationwide/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow"><i>Crisis24</i></a><a class="link" href="https://www.bleepingcomputer.com/news/security/onsolve-codered-cyberattack-disrupts-emergency-alert-systems-nationwide/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow"> is rebuilding the system from an earlier backup</a>.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/9e16f2b9-0a73-491d-b034-102070ee10eb/image.png?t=1764144499"/><div class="image__source"><span class="image__source_text"><p>Figure: OnSolve entry on the INC Ransom data leak site/BleepingComputer</p></span></div></div><p class="paragraph" style="text-align:left;">🇺🇸 <b>Hackers breached </b><i><b>SitusAMC</b></i><b>, a financial tech firm, on November 12 </b>and stole corporate data, accounting records, and legal agreements. Major banks and lenders are hurriedly checking whether their customers’ information was exposed. The <a class="link" href="https://techcrunch.com/2025/11/24/us-banks-scramble-to-assess-data-theft-after-hackers-breach-financial-tech-firm/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow">FBI is investigating while </a><i><a class="link" href="https://techcrunch.com/2025/11/24/us-banks-scramble-to-assess-data-theft-after-hackers-breach-financial-tech-firm/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow">SitusAMC</a></i><a class="link" href="https://techcrunch.com/2025/11/24/us-banks-scramble-to-assess-data-theft-after-hackers-breach-financial-tech-firm/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow"> says the incident is contained</a> and its systems are operational.</p><p class="paragraph" style="text-align:left;">🇪🇸 ✈️ <b>Spanish airline Iberia says a supplier was hacked and customers&#39; names, emails, and frequent flyer numbers were stolen</b> — No passwords or full credit card data were exposed, and <a class="link" href="https://www.securityweek.com/spanish-airline-iberia-notifies-customers-of-data-breach/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow">Iberia added email-change verification</a> and notified law enforcement. A hacker had claimed to post about 77 GB of Iberia data and tried to sell it for $150,000.</p><p class="paragraph" style="text-align:left;">🇺🇸 <b>Harvard reported a voice-phishing attack</b> that accessed Alumni Affairs and Development systems. Personal contact and donor-related information for alumni, donors, some students, faculty, and staff may have been exposed. The university <a class="link" href="https://www.bleepingcomputer.com/news/security/harvard-university-discloses-data-breach-affecting-alumni-donors/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow">says no Social Security numbers, passwords, or payment data were in the compromised systems</a> and is investigating with law enforcement and experts.</p><p class="paragraph" style="text-align:left;">→ More breaches:</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/146000-impacted-by-delta-dental-of-virginia-data-breach/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow">146,000 Impacted by Delta Dental of Virginia Data Breach</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bleepingcomputer.com/news/security/multiple-london-councils-it-systems-disrupted-by-cyberattack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow">Multiple London councils&#39; IT systems disrupted by cyberattack</a></p></li></ul></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;border-color:#3587E8;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🔗<i><b> Partners and Affiliates</b></i></p><p class="paragraph" style="text-align:left;">🔐 <a class="link" href="https://go.nordvpn.net/aff_c?offer_id=15&aff_id=84917&url_id=902&utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow">NordVPN </a><a class="link" href="https://go.nordvpn.net/aff_c?offer_id=15&aff_id=84917&url_id=902&utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow">Cyber-Monday Plan</a> (Dec 1 - Dec 10)</p><p class="paragraph" style="text-align:left;"><i>With its user-friendly interface, robust security features, and commitment to privacy, NordVPN continues to be a popular choice for individuals seeking online protection and unrestricted internet access.</i></p><p class="paragraph" style="text-align:left;"><i><b>Special Offer</b></i><i>: </i>get up to 73% off with a 2-year plan!</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://go.nordvpn.net/aff_c?offer_id=15&aff_id=84917&url_id=902&utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025"><span class="button__text" style=""> GET THE DEAL </span></a></div></div><p class="paragraph" style="text-align:left;"></p><div id="cybercrime-cyber-espionage-ap-ts" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🥷🏻 CYBERCRIME, CYBER ESPIONAGE, APT’s</h3><p class="paragraph" style="text-align:left;">🤝 <b>Meet Rey</b> — The cybercriminal group called <i>Scattered LAPSUS$ Hunters</i> (SLSH) has been stealing data and extorting major companies. The group’s technical operator and public face, “<i>Rey</i>”, was <a class="link" href="https://krebsonsecurity.com/2025/11/meet-rey-the-admin-of-scattered-lapsus-hunters/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow">identified as 15-year-old Saif Al-Din Khader from Amman</a> after security researchers traced operational mistakes. Saif says he is cooperating with law enforcement and wants to leave the group.</p><p class="paragraph" style="text-align:left;">🇷🇺 🇺🇸 🇺🇦 <b>The Russian-linked threat actors </b><i><b>RomCom</b></i><b> attacked a U.S. engineering firm because it worked with a U.S. city that is a sister city of a community in Ukraine</b> — Cybersecurity firm <a class="link" href="https://arcticwolf.com/resources/blog/romcom-utilizing-socgholish-to-deliver-mythic-agent-to-usa-companies-supporting-ukraine/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow">Arctic Wolf said</a> the attackers target groups with ties to Ukraine. The campaign shows Russia-aligned hackers are willing to hit private companies that support Ukrainian institutions.</p><p class="paragraph" style="text-align:left;">🇺🇲 <b>The FBI warns that cybercriminals posing as bank or support staff have stolen over $262 million in account takeover scams</b> since January 2025. Attackers use phishing and impersonation to steal login credentials, then move funds to crypto wallets and lock out victims. The <a class="link" href="https://www.ic3.gov/PSA/2025/PSA251125?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow">FBI urges</a> strong passwords, MFA, careful links, and reporting incidents to banks and <a class="link" href="https://ic3.gov?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow">ic3.gov</a>.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#f0f0f0;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🗓️ <b>{Cyber,Info}Sec Events</b>: My list of past and future <a class="link" href="https://github.com/xsa/infosec-events?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow">{cyber,info}sec related events</a> — Feel free to contribute by submitting issues or pull requests (and don’t forget to <a class="link" href="https://github.com/xsa/infosec-events?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow">star the project</a>); Thanks! 😉</p></div><p class="paragraph" style="text-align:left;"></p><div id="government-politics-and-privacy" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">👨🏻‍⚖️ 👀 GOVERNMENT, POLITICS, AND PRIVACY</h3><p class="paragraph" style="text-align:left;">🇺🇸 👀 🇨🇳 <b>The House Homeland Security Committee asked Anthropic CEO Dario Amodei to testify about a likely Chinese espionage campaign</b> that used the Claude AI to target at least 30 organizations. Lawmakers <a class="link" href="https://cyberscoop.com/house-homeland-asks-anthropic-ceo-to-testfy-on-chinese-espionage-campaign/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow">called the incident a major national security concern</a> and invited CEOs from Google Cloud and Quantum Xchange to the Dec. 17 hearing. They want to examine how AI, quantum tech, and cloud infrastructure enable new state-sponsored cyber threats and defenses.</p><div class="embed"><a class="embed__url" href="https://www.welivesecurity.com/en/kids-online/parents-protect-children-doxxing/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank"><div class="embed__content"><p class="embed__title"> What parents should know to protect their children from doxxing </p><p class="embed__description"> Online disagreements among young people can easily spiral out of control. Parents need to understand what’s at stake. </p><p class="embed__link"> www.welivesecurity.com/en/kids-online/parents-protect-children-doxxing </p></div><img class="embed__image embed__image--right" src="https://web-assets.esetstatic.com/wls/2025/11-25/doxxing-children.jpg"/></a></div></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;border-color:#3587E8;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🔗<i><b> Partners and Affiliates</b></i></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/6f403f9b-d3a1-4d60-9852-f0e0f9340b87/image.png?t=1740643992"/></div><p class="paragraph" style="text-align:center;">🌐 <i>Stay connected and secure on the go with </i><i><b><a class="link" href="https://airalo.pxf.io/c/5582065/1345899/15608?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow">Airalo</a></b></i><i>&#39;s global eSIMs — Use the code </i><i><b>NEWTOAIRALO15</b></i><i> if you’re new to Airalo to get an additional 15% discount.</i></p></div><p class="paragraph" style="text-align:left;"></p><div id="malware-threats" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🦠 MALWARE & THREATS</h3><p class="paragraph" style="text-align:left;">🪱 <b>The self-replicating worm called </b><i><b>Shai-Hulud</b></i><b> has been injected into nearly 500 </b><i><b>npm</b></i><b> packages</b>, exposing developer secrets across <a class="link" href="https://www.wiz.io/blog/shai-hulud-2-0-ongoing-supply-chain-attack?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow">more than 26,000 GitHub repositories</a>. The new variant is far more automated, using stolen <i>npm</i> tokens to rapidly spread and create public repos with stolen data. Security teams warn this boosts the risk of downstream supply-chain attacks and wider exploitation.</p><p class="paragraph" style="text-align:left;">🔙 🚪 <b>Attackers have been exploiting a recent WSUS vulnerability (CVE-2025-59287)</b> to gain system-level access. They <a class="link" href="https://asec.ahnlab.com/en/91166/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow">used PowerShell tools and Windows utilities</a> to download and install the <i>ShadowPad</i> backdoor. ShadowPad then runs via DLL side-loading and loads plugins for persistence and stealth.</p></div><p class="paragraph" style="text-align:left;"></p><div id="ai-crypto-tech-tools" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🤖 🧰 AI, CRYPTO, TECH & TOOLS</h3><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/_QfxGZGITGw" width="100%"></iframe><p class="paragraph" style="text-align:left;">🧅 🛠️ <b>Tor replaced its old </b><i><b>tor1</b></i><b> relay encryption with a new Counter Galois Onion (CGO) design</b> to fix several security flaws. CGO adds strong authentication, per-cell key updates for forward secrecy, and protections against tagging attacks. The <a class="link" href="http://blog.torproject.org/introducing-cgo?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow">change</a> is experimental now and will roll out automatically to Tor Browser users when ready.</p><p class="paragraph" style="text-align:left;">🇺🇸 🤖 <b>A new bipartisan bill, the </b><i><b>AI Fraud Deterrence Act</b></i><b>, would raise fines and prison terms</b> for fraud and impersonation using AI. Penalties could reach $1–2 million and 20–30 years for AI-assisted schemes, with up to $1 million and 3 years for impersonating officials. The <a class="link" href="https://cyberscoop.com/new-legislation-targets-scammers-that-use-ai-to-deceive/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow">bill responds to recent deepfake and AI-voice scams</a> targeting officials and public figures.</p><p class="paragraph" style="text-align:left;">🤑 <b>Criminals are buying and sharing custom AI models on dark web forums</b> to <a class="link" href="https://cyberscoop.com/malicious-llm-tools-cybercrime-wormgpt-kawaiigpt/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow">help with hacking tasks</a>. These tools, like <a class="link" href="https://unit42.paloaltonetworks.com/dilemma-of-ai-malicious-llms/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow"><i>WormGPT</i></a><a class="link" href="https://unit42.paloaltonetworks.com/dilemma-of-ai-malicious-llms/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow"> and </a><a class="link" href="https://unit42.paloaltonetworks.com/dilemma-of-ai-malicious-llms/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow"><i>KawaiiGPT</i></a>, make attacks easier by generating code, exploits, and phishing material. Experts warn this lowers the skill barrier and expands cybercrime.</p></div><p class="paragraph" style="text-align:left;"></p><div id="vulnerabilities-research-and-threat" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🐛 🧠 VULNERABILITIES, RESEARCH, AND THREAT INTELLIGENCE</h3><p class="paragraph" style="text-align:left;">🫂 <b>Researchers found a Teams guest feature can let attackers bypass Microsoft Defender protections</b> when users join external tenants. Attackers can <a class="link" href="https://www.ontinue.com/resource/blog-microsoft-chat-with-anyone-understanding-phishing-risk/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow">create unprotected tenants or use low‑cost licenses</a>, send Microsoft‑originated invites, and deliver phishing or malware without triggering home org defenses. Organizations should restrict B2B guest settings, use cross‑tenant access controls, and train users to avoid unsolicited Teams invites.</p><p class="paragraph" style="text-align:left;">🐛 🔓️ <b>Five security flaws in the </b><i><b>Fluent Bit</b></i><b> log agent let attackers overwrite files</b>, run code, spoof tags, corrupt logs, or bypass authentication. These <a class="link" href="https://www.oligo.security/blog/critical-vulnerabilities-in-fluent-bit-expose-cloud-environments-to-remote-takeover?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow">bugs affect many cloud and container setups</a> and could let attackers disrupt services or take over logging. Updating Fluent Bit to version 4.1.1 or 4.0.12+ fixes the issues.</p></div><p class="paragraph" style="text-align:left;"></p><div id="ics-ot-io-t" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🛰️ ICS, OT & IoT</h3><p class="paragraph" style="text-align:left;">🕸️ <b>A new Mirai-based botnet called </b><i><b>ShadowV2</b></i><b> targeted vulnerable D-Link, TP-Link, and other IoT devices</b> using at least eight known flaws. Researchers <a class="link" href="https://www.bleepingcomputer.com/news/security/new-shadowv2-botnet-malware-used-aws-outage-as-a-test-opportunity/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow">saw the botnet active during the October AWS outage</a>, likely as a brief test, and it spread globally to routers, NAS devices, and DVRs. ShadowV2 can run Mirai-style DDoS attacks, and vendors warn users to update or retire unsupported firmware.</p><div class="embed"><a class="embed__url" href="https://krebsonsecurity.com/2025/11/is-your-android-tv-streaming-box-part-of-a-botnet/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank"><div class="embed__content"><p class="embed__title"> Is Your Android TV Streaming Box Part of a Botnet? – Krebs on Security </p><p class="embed__link"> krebsonsecurity.com/2025/11/is-your-android-tv-streaming-box-part-of-a-botnet </p></div></a></div></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#f0f0f0;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">💬 CONNECT</h3><p class="paragraph" style="text-align:left;">Follow me on <a class="link" href="https://infosec.exchange/@0x58?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow">Mastodon</a> for quick daily updates and bite-sized content.</p><p class="paragraph" style="text-align:left;">Prefer using an RSS feed? Add <b>Infosec MASHUP</b> to your feed <a class="link" href="https://rss.beehiiv.com/feeds/HVhiKYpQlR.xml?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow">here</a>.</p><p class="paragraph" style="text-align:center;"><b>Enjoying our newsletter? </b>Forward it to a colleague—<br>it’s one of the best ways to support us.</p><p class="paragraph" style="text-align:left;">Thanks for reading today’s newsletter, and if you&#39;re enjoying it and want to support my work, you can <b>buy me a coffee</b> ☕ over at <a class="link" href="https://www.buymeacoffee.com/0x58?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-48-2025" target="_blank" rel="noopener noreferrer nofollow">https://www.buymeacoffee.com/0x58</a></p><p class="paragraph" style="text-align:left;"> See you next time!</p><p class="paragraph" style="text-align:left;">-X.</p></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=fcd0daf8-5332-4444-8c1f-f4831887c4e0&utm_medium=post_rss&utm_source=x_s_infosec_newsletter">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title> 🕵🏻‍♂️ [InfoSec MASHUP] 47/2025</title>
  <description>Jaguar Land Rover Hack Cost $260 Million; Fortinet warns of new FortiWeb zero-day exploited in attacks; Dozens of groups call for governments to protect encryption; Five Eyes nations and the Netherlands sanctioned two bulletproof hosting providers; Hundreds of Salesforce customers hit by yet another third-party vendor breach;</description>
  <link>https://infosec-mashup.santolaria.net/p/infosec-mashup-47-2025</link>
  <guid isPermaLink="true">https://infosec-mashup.santolaria.net/p/infosec-mashup-47-2025</guid>
  <pubDate>Sat, 22 Nov 2025 10:06:19 +0000</pubDate>
  <atom:published>2025-11-22T10:06:19Z</atom:published>
    <dc:creator>Xavier Santolaria</dc:creator>
    <category><![CDATA[Malware]]></category>
    <category><![CDATA[Opensource]]></category>
    <category><![CDATA[Privacy]]></category>
    <category><![CDATA[Cybersecurity]]></category>
    <category><![CDATA[Threat Intelligence]]></category>
    <category><![CDATA[Ai]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'IBM Plex Sans',-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'IBM Plex Sans',-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">We now have <b>{{active_subscriber_count}} active subscribers</b>! Thank you all for being part of my newsletter. Please share it with your friends and colleagues, and let’s keep growing the community.</p><p class="paragraph" style="text-align:left;">Let’s now dive into this week’s top insights! 🚀</p><h2 class="heading" style="text-align:left;">Table of Contents</h2><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="#breaches-security-incidents" rel="noopener noreferrer nofollow">BREACHES & SECURITY INCIDENTS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#cybercrime-cyber-espionage-ap-ts" rel="noopener noreferrer nofollow">CYBERCRIME, CYBER ESPIONAGE, APT’s</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#government-politics-and-privacy" rel="noopener noreferrer nofollow">GOVERNMENT, POLITICS, AND PRIVACY</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#malware-threats" rel="noopener noreferrer nofollow">MALWARE & THREATS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#ai-crypto-tech-tools" rel="noopener noreferrer nofollow">AI, CRYPTO, TECH & TOOLS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#vulnerabilities-research-and-threat" rel="noopener noreferrer nofollow">VULNERABILITIES, RESEARCH, AND THREAT INTELLIGENCE</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#ics-ot-io-t" rel="noopener noreferrer nofollow">ICS, OT & IoT</a></p></li></ul><div id="breaches-security-incidents" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🔓 BREACHES & SECURITY INCIDENTS</h3><p class="paragraph" style="text-align:left;">🇮🇹 <b>A hacker says they stole 2.3 TB of data from Italian IT firm </b><i><b>Almaviva</b></i> and leaked it on a dark web forum. The <a class="link" href="https://www.bleepingcomputer.com/news/security/hacker-claims-to-steal-23tb-data-from-italian-rail-group-almavia/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">files reportedly include internal documents</a>, contracts, HR and accounting records tied to FS Italiane. Almaviva confirmed a cyberattack, is investigating with authorities, and says critical services remain protected.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/ad3166b9-9f86-4cd6-8a86-c2ebcbbac60d/image.png?t=1763720517"/><div class="image__source"><span class="image__source_text"><p>Figure: Claims of breach at Almaviva/Andrea Draghetti</p></span></div></div><p class="paragraph" style="text-align:left;">🇺🇸 🧑‍⚖️ <b>The SEC has dropped its case against SolarWinds and its CISO</b> over the huge 2020 Sunburst cyberespionage breach. The <a class="link" href="https://cyberscoop.com/sec-drops-case-against-solarwinds-tied-to-monumental-breach/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">agency gave no public reason for ending</a> the lawsuit. SolarWinds called the decision a vindication and said it eases CISOs’ concerns about disclosure chills.</p><p class="paragraph" style="text-align:left;">🔓️ ☁️ <b>A third-party vendor breach tied to </b><i><b>Gainsight</b></i><b> has exposed data in over 200 Salesforce instances</b> — The <a class="link" href="https://cyberscoop.com/salesforce-gainsight-customers-breach/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">attack appears linked to the same criminal grou</a>p behind recent Salesloft Drift supply-chain intrusions. Salesforce revoked app access tokens while investigations by <i>Gainsight</i> and others continue.</p><p class="paragraph" style="text-align:left;">→ <a class="link" href="https://techcrunch.com/2025/11/21/google-says-hackers-stole-data-from-200-companies-following-gainsight-breach/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">Google says hackers stole data from 200 companies following Gainsight breach</a></p><p class="paragraph" style="text-align:left;">🇫🇷 <b>French childcare payroll service </b><i><b>Pajemploi</b></i><b> suffered a cyberattack that may have exposed personal data</b> for up to 1.2 million people. Exposed data may include names, birthplaces, addresses, social security numbers, and bank institution names, but not IBANs, emails, phones, or passwords. <i>Pajemploi</i> <a class="link" href="https://www.bleepingcomputer.com/news/security/french-agency-pajemploi-reports-data-breach-affecting-12m-people/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">has notified authorities</a>, is informing affected individuals, and says services remain operational.</p><p class="paragraph" style="text-align:left;">🇫🇷 <b>European fiber operator </b><i><b>Eurofiber</b></i><b> </b><i><b>France</b></i><b> says hackers breached its ticket system and ATE customer portal</b> on November 13, <a class="link" href="https://www.securityweek.com/data-stolen-in-eurofiber-france-hack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">stealing data</a>. The company secured systems, patched the flaw, and reported the incident and an extortion attempt to authorities. About 10,000 customers — including some government entities — may be affected, with exposed tickets, credentials, API keys, backups, and internal files.</p><p class="paragraph" style="text-align:left;">🌩️ <b>Cloudflare said the outage that hit many popular sites was not a hacker attack</b> — A bug in a bot-mitigation service crashed after a routine configuration change and caused broad network problems. The company fixed the issue hours later and <a class="link" href="https://blog.cloudflare.com/18-november-2025-outage/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">has published a full explanation</a>.</p><p class="paragraph" style="text-align:left;">→ <a class="link" href="https://krebsonsecurity.com/2025/11/the-cloudflare-outage-may-be-a-security-roadmap/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">The Cloudflare Outage May Be a Security Roadmap</a></p><p class="paragraph" style="text-align:left;">🇬🇧 💸 <b>Jaguar Land Rover said a September cyberattack cost the company about $260 million</b> and forced it to pause production. The hacker group called &quot;<i>Scattered Lapsus$ Hunters</i>&quot; stole data and disrupted assembly lines in several countries. The a<a class="link" href="https://www.databreachtoday.com/jaguar-land-rover-hack-cost-260-million-a-30051?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">ttack also hurt the U.K. economy</a> and prompted a 1.5-billion-pound government loan.</p><p class="paragraph" style="text-align:left;">→ <b>More breaches:</b></p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/princeton-university-data-breach-impacts-alumni-students-employees/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">Princeton University Data Breach Impacts Alumni, Students, Employees</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/pennsylvania-attorney-general-confirms-data-breach-after-ransomware-attack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">Pennsylvania Attorney General Confirms Data Breach After Ransomware Attack</a></p></li></ul></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;border-color:#3587E8;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🔗<i><b> Partners and Affiliates</b></i></p><p class="paragraph" style="text-align:left;">🔐 <a class="link" href="https://go.nordvpn.net/aff_c?offer_id=15&aff_id=84917&url_id=902&utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">NordVPN Threat Protection Pro™ Campaign</a> </p><p class="paragraph" style="text-align:left;"><i>With its user-friendly interface, robust security features, and commitment to privacy, NordVPN continues to be a popular choice for individuals seeking online protection and unrestricted internet access.</i></p><p class="paragraph" style="text-align:left;"><i><b>Special Offer</b></i><i>: </i>get up to 73% off with a 2-year plan!</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://go.nordvpn.net/aff_c?offer_id=15&aff_id=84917&url_id=902&utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025"><span class="button__text" style=""> GET THE DEAL </span></a></div></div><p class="paragraph" style="text-align:left;"></p><div id="cybercrime-cyber-espionage-ap-ts" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🥷🏻 CYBERCRIME, CYBER ESPIONAGE, APT’s</h3><p class="paragraph" style="text-align:left;">🇹🇭 🇷🇺 🇺🇸 <b>Thai police arrested a Russian man in Phuket on Nov. 6 after an FBI tip linked him to cyberattacks</b> on U.S. and European government agencies. Authorities seized laptops, phones, and digital wallets, and FBI agents were present. The <a class="link" href="https://www.securityweek.com/russian-hacking-suspect-wanted-by-the-fbi-arrested-on-thai-resort-island/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">suspect is held for possible extradition to the United States</a> while Russian diplomats visit him.</p><p class="paragraph" style="text-align:left;">🇷🇺 ❌ <b>Five Eyes nations and the Netherlands sanctioned two bulletproof hosting providers</b> and key people to disrupt services used by ransomware and phishing groups. Officials named Russia-based Media Land and affiliates, plus parties tied to the Aeza Group. Authorities also <a class="link" href="https://cyberscoop.com/bulletproof-hosting-providers-sanctions-mitigation-media-land/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">issued a mitigation guide</a> and urged cutting peering partners to make the infrastructure harder to use.</p><p class="paragraph" style="text-align:left;">🇮🇷 👀 <b>Iranian state-linked group APT42 (</b><i><b>SpearSpecter</b></i><b>) is running a long-term espionage campaign</b> against senior defense and government officials. They <a class="link" href="https://govextra.gov.il/national-digital-agency/cyber/research/spearspecter/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">use social engineering</a>, target relatives, and lure victims to fake sites or decoy files to install the TameCat backdoor. TameCat uses Telegram and Discord for covert command-and-control, steals credentials and documents, and hides via in-memory loading and legitimate tools.</p><p class="paragraph" style="text-align:left;">→ <a class="link" href="https://aws.amazon.com/blogs/security/new-amazon-threat-intelligence-findings-nation-state-actors-bridging-cyber-and-kinetic-warfare/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">New Amazon Threat Intelligence findings: Nation-state actors bridging cyber and kinetic warfare</a></p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#f0f0f0;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🗓️ <b>{Cyber,Info}Sec Events</b>: My list of past and future <a class="link" href="https://github.com/xsa/infosec-events?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">{cyber,info}sec related events</a> — Feel free to contribute by submitting issues or pull requests (and don’t forget to <a class="link" href="https://github.com/xsa/infosec-events?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">star the project</a>); Thanks! 😉</p></div><p class="paragraph" style="text-align:left;"></p><div id="government-politics-and-privacy" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">👨🏻‍⚖️ 👀 GOVERNMENT, POLITICS, AND PRIVACY</h3><p class="paragraph" style="text-align:left;">🇺🇸 📡 <b>Sen. Maria Cantwell is urging the FCC not to remove cybersecurity rules for telecom companies</b> — She <a class="link" href="https://www.cybersecuritydive.com/news/fcc-telecom-regulation-reversal-cantwell-letter/805906/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">says scrapping the rules would weaken protections</a> after China’s Salt Typhoon hacks. Cantwell asked the FCC chair for documents and testimony to justify the rollback.</p><p class="paragraph" style="text-align:left;">🇺🇸 <b>Sen. Mark Warner warned that politically driven firings and cuts in the Trump administration have weakened U.S. cyber defenses</b> — He said layoffs at CISA and vacant intelligence posts leave critical infrastructure and elections more vulnerable. Warner <a class="link" href="https://cyberscoop.com/top-senate-intel-dem-warns-of-catastrophic-cyber-consequences-of-trump-admin-national-security-firings-politicization/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">called the trend dangerous</a> and said failures could have catastrophic consequences.</p><p class="paragraph" style="text-align:left;">⏸️ 🧑‍⚖️ <b>NSO Group asked the court to pause a permanent injunction that bars it from targeting WhatsApp</b> while it appeals. The company says enforcing the order would destroy its Pegasus business and stop U.S. agencies from licensing its tools. NSO also <a class="link" href="https://cyberscoop.com/nso-group-whatsapp-injunction-appeal/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">argues the injunction conflicts</a> with the Computer Fraud and Abuse Act and harms public safety.</p><p class="paragraph" style="text-align:left;">🇬🇧 🇨🇳 <b>MI5 warned MPs that Chinese spies are using LinkedIn and fake recruiters to target</b> lawmakers and officials. The <a class="link" href="https://www.securityweek.com/mi5-warns-lawmakers-that-chinese-spies-are-trying-to-reach-them-via-linkedin/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">agency named specific profiles</a> and said the outreach is widespread and aimed at building long-term influence. The government plans security upgrades while critics say prosecutions and political responses have been uneven.</p><p class="paragraph" style="text-align:left;">🇬🇧 🚗 <b>British troops have been warned not to discuss sensitive military matters inside official vehicles</b> amid <a class="link" href="https://archive.is/eZgOY?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">mounting fears that China is eavesdropping on conversations</a> conducted on the move.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/9695d6a5-f3b7-4306-bc7c-d333460bcb87/image.png?t=1763629896"/><div class="image__source"><span class="image__source_text"><p>Figure: Warnings put in MoD cars after fears that China is eavesdropping/The Times</p></span></div></div><p class="paragraph" style="text-align:left;">🔐 <b>More than 60 trade and tech groups urged governments to reject efforts to weaken or bypass encryption</b> — They said strong encryption protects privacy, security, and trust for users and businesses. The <a class="link" href="https://cyberscoop.com/encryption-sixty-groups-call-on-governments-to-oppose-backdoor-mandates/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">groups warned that backdoors or mandated access would harm everyone</a> more than help law enforcement.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;border-color:#3587E8;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🔗<i><b> Partners and Affiliates</b></i></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/6f403f9b-d3a1-4d60-9852-f0e0f9340b87/image.png?t=1740643992"/></div><p class="paragraph" style="text-align:center;">🌐 <i>Stay connected and secure on the go with </i><i><b><a class="link" href="https://airalo.pxf.io/c/5582065/1345899/15608?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">Airalo</a></b></i><i>&#39;s global eSIMs — Use the code </i><i><b>NEWTOAIRALO15</b></i><i> if you’re new to Airalo to get an additional 15% discount.</i></p></div><p class="paragraph" style="text-align:left;"></p><div id="malware-threats" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🦠 MALWARE & THREATS</h3><p class="paragraph" style="text-align:left;">🇨🇳 🎧️ <b>China-linked APT24 used a stealthy malware called </b><i><b>BadAudio</b></i> in a three-year espionage campaign. They <a class="link" href="https://cloud.google.com/blog/topics/threat-intelligence/apt24-pivot-to-multi-vector-attacks?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">spread it via spearphishing</a>, compromised websites and a tainted JavaScript library to infect Windows users. <i>BadAudio</i> is heavily obfuscated, uses DLL hijacking, and loads further payloads like Cobalt Strike while avoiding detection.</p><p class="paragraph" style="text-align:left;">🏦 🎠 <i><b>Sturnus</b></i><b> is a new Android banking trojan</b> that targets users of WhatsApp, Telegram, and Signal. It <a class="link" href="https://www.threatfabric.com/blogs/sturnus-banking-trojan-bypassing-whatsapp-telegram-and-signal?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">can show fake bank login screens</a>, log keystrokes, take remote control, and stop removal. By reading screens via Accessibility features, it bypasses end-to-end encryption and steals messages in real time.</p><p class="paragraph" style="text-align:left;">→ <a class="link" href="https://www.securityweek.com/vulnerability-allowed-scraping-of-3-5-billion-whatsapp-accounts/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">Vulnerability Allowed Scraping of 3.5 Billion WhatsApp Accounts</a></p><p class="paragraph" style="text-align:left;">🎣 <b>A phishing kit called </b><i><b>Sneaky 2FA</b></i><b> uses Browser-in-the-Browser pop-ups to mimic Microsoft login pages</b> and <a class="link" href="https://pushsecurity.com/blog/analyzing-the-latest-sneaky2fa-phishing-page?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">steal credentials</a>. Attackers add bot checks, conditional loading, and quick domain rotation to evade detection. Even newer defenses like passkeys can be bypassed by malicious extensions or downgrade tricks, so users and organizations must stay cautious.</p><p class="paragraph" style="text-align:left;">🪱 <b>Seven </b><i><b>npm</b></i><b> packages by developer &quot;</b><i><b>dino_reborn</b></i><b>&quot; used Adspect redirects to hide malicious behavior</b> and <a class="link" href="https://socket.dev/blog/npm-malware-campaign-uses-adspect-cloaking-to-deliver-malicious-redirects?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">steer real users to crypto scam pages</a>. Six packages fingerprint visitors, block developer tools, and forward targets’ IPs to Adspect to decide who gets redirected. Non-targets see a fake company page to avoid detection.</p><p class="paragraph" style="text-align:left;">💥 <b>Microsoft said the Aisuru IoT botnet launched a 15.72 Tbps DDoS attack on Azure</b> from over 500,000 IPs. The <a class="link" href="https://www.bleepingcomputer.com/news/microsoft/microsoft-aisuru-botnet-used-500-000-ips-in-15-tbps-azure-ddos-attack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">UDP flood peaked at 3.64 billion packets per second</a> and targeted an Australian IP. Aisuru, tied to compromised routers and cameras, has caused multiple record-breaking attacks and distorted DNS rankings.</p></div><p class="paragraph" style="text-align:left;"></p><div id="ai-crypto-tech-tools" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🤖 🧰 AI, CRYPTO, TECH & TOOLS</h3><div class="embed"><a class="embed__url" href="https://arstechnica.com/science/2025/11/how-louvre-thieves-exploited-human-psychology-to-avoid-suspicion-and-what-it-reveals-about-ai/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank"><div class="embed__content"><p class="embed__title"> How Louvre thieves exploited human psychology to avoid suspicion—and what it reveals about AI </p><p class="embed__description"> For humans and AI, when something fits the category of “ordinary,” it slips from notice. </p><p class="embed__link"> arstechnica.com/science/2025/11/how-louvre-thieves-exploited-human-psychology-to-avoid-suspicion-and-what-it-reveals-about-ai </p></div><img class="embed__image embed__image--right" src="https://cdn.arstechnica.net/wp-content/uploads/2025/11/GettyImages-2242090240-2560x1440.jpg"/></a></div><p class="paragraph" style="text-align:left;">😲<b> 🗳️ The International Association of Cryptologic Research canceled its leadership election after an official lost…….. a decryption key</b> — Votes were cast and tallied with Helios, a cryptographic system that keeps ballots private and verifiable. Losing <a class="link" href="https://arstechnica.com/security/2025/11/cryptography-group-cancels-election-results-after-official-loses-secret-key/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">one trustee’s key made it impossible to decrypt</a> and certify the results.</p><p class="paragraph" style="text-align:left;">👋 <b>Mozilla will end its partnership with </b><i><b>Onerep</b></i><b> next month</b> and shut down Monitor Plus by Dec. 17, 2025. The <a class="link" href="https://krebsonsecurity.com/2025/11/mozilla-says-its-finally-done-with-two-faced-onerep/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">move</a> follows reporting that Onerep’s founder ran many people-search sites and still owned a data broker. Mozilla says it will keep the free Monitor breach service and refund Monitor Plus subscribers for unused time.</p><p class="paragraph" style="text-align:left;">😱 🦠 <b>Microsoft warned that its new Copilot Actions AI can infect machines </b>and steal sensitive data. Security experts <a class="link" href="https://arstechnica.com/security/2025/11/critics-scoff-after-microsoft-warns-ai-feature-can-infect-machines-and-pilfer-data/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">criticized</a> releasing the feature before its risks were fully understood. Microsoft says users should only enable it if they understand the security implications.</p><div class="embed"><a class="embed__url" href="https://www.ibm.com/think/x-force/understanding-future-of-offensive-ai-in-cybersecurity?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank"><div class="embed__content"><p class="embed__title"> Understanding the future of offensive AI in cybersecurity | IBM </p><p class="embed__description"> After a recent AI-assisted cyber attack that was observed to be “90% autonomous”, many questions are being raised. IBM X-Force weighs in. </p><p class="embed__link"> www.ibm.com/think/x-force/understanding-future-of-offensive-ai-in-cybersecurity </p></div><img class="embed__image embed__image--right" src="https://www.ibm.com/content/dam/worldwide-content/other/ul/g/22/95/2295988e-33db-4e20-8fea4d991b81fbc6.jpg-legacy.jpg/_jcr_content/renditions/cq5dam.web.1280.1280.jpeg"/></a></div><p class="paragraph" style="text-align:left;">🇺🇸 💸 <b>A California man, Kunal Mehta, pleaded guilty to laundering at least $25 million stolen in a $230 million cryptocurrency heist</b> — The crime ring used social engineering, crypto mixers, and shell companies to steal and hide funds. Prosecutors say <a class="link" href="https://www.bleepingcomputer.com/news/security/california-man-admits-to-laundering-crypto-stolen-in-230m-heist/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">the group spent the money on luxury items</a> and some errors linked the laundered crypto back to the theft.</p><p class="paragraph" style="text-align:left;"></p><div class="embed"><a class="embed__url" href="https://github.com/vulnerability-lookup/vulnerability-lookup?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank"><div class="embed__content"><p class="embed__title"> GitHub - vulnerability-lookup/vulnerability-lookup: Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure (CVD). </p><p class="embed__description"> Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure ... </p><p class="embed__link"> github.com/vulnerability-lookup/vulnerability-lookup </p></div><img class="embed__image embed__image--right" src="https://repository-images.githubusercontent.com/572446652/f028f3a6-5359-4d22-b0a7-71d842b11ece"/></a></div></div><p class="paragraph" style="text-align:left;"></p><div id="vulnerabilities-research-and-threat" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🐛 🧠 VULNERABILITIES, RESEARCH, AND THREAT INTELLIGENCE</h3><p class="paragraph" style="text-align:left;">➝ From the Patching Department:</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://thehackernews.com/2025/11/google-issues-security-fix-for-actively.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">Google Issues Security Fix for Actively Exploited Chrome V8 Zero-Day Vulnerability</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/solarwinds-patches-three-critical-serv-u-vulnerabilities/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">SolarWinds Patches Three Critical Serv-U Vulnerabilities</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/sonicwall-patches-high-severity-flaws-in-firewalls-email-security-appliance/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">SonicWall Patches High-Severity Flaws in Firewalls, Email Security Appliance</a></p></li></ul><hr class="content_break"><p class="paragraph" style="text-align:left;">💥 <b>Attackers are exploiting a recently patched 7-Zip vulnerability </b>(<a class="link" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11001?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">CVE-2025-11001</a>) that can lead to remote code execution. The <a class="link" href="https://pacbypass.github.io/2025/10/16/diffing-7zip-for-cve-2025-11001.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">bug lets crafted ZIP files misuse symbolic links</a> to write files outside the intended folder, enabling code execution when 7-Zip runs with high privileges. NHS England warns active exploitation is happening and a PoC exploit is public.</p><p class="paragraph" style="text-align:left;">💰️ <b>Meta paid $4 million in 2025 through its bug bounty program</b>, bringing total payouts to over $25 million. The <a class="link" href="https://bugbounty.meta.com/blog/15th-anniversary-2025/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">company rewarded about 800 of 13,000 vulnerability reports</a>, including serious issues in Unity for Quest VR and WhatsApp account enumeration and URL processing bugs. Meta is building a WhatsApp Research Proxy to help researchers find more bugs and will expand access over time.</p><p class="paragraph" style="text-align:left;">🔓️ 🗓️ <b>A critical Fortinet FortiWeb </b><b><a class="link" href="https://nvd.nist.gov/vuln/detail/CVE-2025-64446?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">flaw</a></b><b> was actively exploited before the company publicly disclosed it</b>, leaving many customers exposed. Researchers say <a class="link" href="https://cyberscoop.com/fortinet-delayed-disclosure-exploited-vulnerability/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">Fortinet’s delayed communication and late CVE assignment</a> hindered defenders’ ability to respond. Attackers gained administrative access on devices, and <a class="link" href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2025-64446&utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025#:~:text=Due%20Date%3A%202025%2D11%2D21" target="_blank" rel="noopener noreferrer nofollow">agencies urged urgent patching</a>.</p></div><p class="paragraph" style="text-align:left;"></p><div id="ics-ot-io-t" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🛰️ ICS, OT & IoT</h3><p class="paragraph" style="text-align:left;">🇨🇳 <b>Researchers say thousands of older Asus routers were hacked by a suspected China-state group</b> — The attack <a class="link" href="https://arstechnica.com/security/2025/11/thousands-of-hacked-asus-routers-are-under-control-of-suspected-china-state-hackers/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">targets seven unsupported Asus models</a> that no longer get security patches. It’s unclear what the hackers are doing with the controlled devices.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#f0f0f0;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">💬 CONNECT</h3><p class="paragraph" style="text-align:left;">Follow me on <a class="link" href="https://infosec.exchange/@0x58?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">Mastodon</a> for quick daily updates and bite-sized content.</p><p class="paragraph" style="text-align:left;">Prefer using an RSS feed? Add <b>Infosec MASHUP</b> to your feed <a class="link" href="https://rss.beehiiv.com/feeds/HVhiKYpQlR.xml?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">here</a>.</p><p class="paragraph" style="text-align:center;"><b>Enjoying our newsletter? </b>Forward it to a colleague—<br>it’s one of the best ways to support us.</p><p class="paragraph" style="text-align:left;">Thanks for reading today’s newsletter, and if you&#39;re enjoying it and want to support my work, you can <b>buy me a coffee</b> ☕ over at <a class="link" href="https://www.buymeacoffee.com/0x58?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-47-2025" target="_blank" rel="noopener noreferrer nofollow">https://www.buymeacoffee.com/0x58</a></p><p class="paragraph" style="text-align:left;"> See you next time!</p><p class="paragraph" style="text-align:left;">-X.</p></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=8d84c196-ff6c-4023-ac51-ad30b84cbe84&utm_medium=post_rss&utm_source=x_s_infosec_newsletter">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>🕵🏻‍♂️ [InfoSec MASHUP] 46/2025</title>
  <description>Anthropic disrupted the first reported AI-orchestrated cyber espionage campaign; Wiz found that 65% of Forbes AI 50 companies with GitHub accounts leaked sensitive secrets; Amazon rolls out AI bug bounty program; The U.S. government may ban sales of TP-Link routers; Europol-led Operation Endgame disrupted Rhadamanthys stealer, Venom RAT, and the Elysium botnet; New WhatsApp-spreading malware;</description>
  <link>https://infosec-mashup.santolaria.net/p/infosec-mashup-46-2025</link>
  <guid isPermaLink="true">https://infosec-mashup.santolaria.net/p/infosec-mashup-46-2025</guid>
  <pubDate>Sat, 15 Nov 2025 10:45:25 +0000</pubDate>
  <atom:published>2025-11-15T10:45:25Z</atom:published>
    <dc:creator>Xavier Santolaria</dc:creator>
    <category><![CDATA[Malware]]></category>
    <category><![CDATA[Opensource]]></category>
    <category><![CDATA[Privacy]]></category>
    <category><![CDATA[Cybersecurity]]></category>
    <category><![CDATA[Threat Intelligence]]></category>
    <category><![CDATA[Ai]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'IBM Plex Sans',-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'IBM Plex Sans',-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">We now have <b>{{active_subscriber_count}} active subscribers</b>! Thank you all for being part of my newsletter. Please share it with your friends and colleagues, and let’s keep growing the community.</p><p class="paragraph" style="text-align:left;">Let’s now dive into this week’s top insights! 🚀</p><h2 class="heading" style="text-align:left;">Table of Contents</h2><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="#breaches-security-incidents" rel="noopener noreferrer nofollow">BREACHES & SECURITY INCIDENTS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#cybercrime-cyber-espionage-ap-ts" rel="noopener noreferrer nofollow">CYBERCRIME, CYBER ESPIONAGE, APT’s</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#government-politics-and-privacy" rel="noopener noreferrer nofollow">GOVERNMENT, POLITICS, AND PRIVACY</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#malware-threats" rel="noopener noreferrer nofollow">MALWARE & THREATS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#ai-crypto-tech-tools" rel="noopener noreferrer nofollow">AI, CRYPTO, TECH & TOOLS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#vulnerabilities-research-and-threat" rel="noopener noreferrer nofollow">VULNERABILITIES, RESEARCH, AND THREAT INTELLIGENCE</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#ics-ot-io-t" rel="noopener noreferrer nofollow">ICS, OT & IoT</a></p></li></ul><div id="breaches-security-incidents" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🔓 BREACHES & SECURITY INCIDENTS</h3><div class="embed"><a class="embed__url" href="https://cyberscoop.com/f5-vulnerabilities-theft-muted-concerns/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank"><div class="embed__content"><p class="embed__title"> What’s left to worry (and not worry) about in the F5 breach aftermath </p><p class="embed__description"> Researchers say the nation-state attacker could cause more serious problems with the BIG-IP source code it nabbed during the attack on F5’s systems. </p><p class="embed__link"> cyberscoop.com/f5-vulnerabilities-theft-muted-concerns </p></div><img class="embed__image embed__image--right" src="https://cyberscoop.com/wp-content/uploads/sites/3/2025/09/F5-Tower-Exterior-Lobby-01.jpg"/></a></div><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;">🇺🇸 <b>Checkout.com disclosed a data breach</b> after hackers tried to extort the company. The attackers accessed an old third-party cloud storage system that was not used since 2020 and did not affect payment processing or card data. Checkout <a class="link" href="https://www.checkout.com/blog/protecting-our-merchants-standing-up-to-extortion?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">refused to pay and instead will donate the ransom amount</a> to cybersecurity research at Carnegie Mellon and Oxford.</p><p class="paragraph" style="text-align:left;">🇨🇦 <b>DoorDash says an October cybersecurity incident exposed some users&#39; contact information</b> after an employee was tricked by a social engineering scam. The <a class="link" href="https://www.bleepingcomputer.com/news/security/doordash-hit-by-new-data-breach-in-october-exposing-user-information/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">company has closed the unauthorized access</a>, launched an investigation, and notified affected users (mostly in Canada so far). Customers are warned to watch for phishing and DoorDash says it has strengthened security and informed law enforcement.</p><p class="paragraph" style="text-align:left;">🇬🇧 <b>Pathology provider Synnovis confirmed patient personal data was stolen in a June 3, 2024 ransomware attack</b> that disrupted London hospital services. The <a class="link" href="https://www.securityweek.com/synnovis-confirms-patient-information-stolen-in-disruptive-ransomware-attack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">Qilin gang published about 400 GB of data</a> that included names, birth dates, NHS numbers and some test results. Synnovis rebuilt systems, got an injunction to limit publication, notified partner organizations, and says it will not notify patients directly.</p><p class="paragraph" style="text-align:left;">👐 <b>Security firm Wiz found that 65% of Forbes AI 50 companies with GitHub accounts leaked sensitive secrets</b> like API keys and tokens. Some <a class="link" href="https://www.wiz.io/blog/forbes-ai-50-leaking-secrets?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">leaks</a> could expose private models, training data, and org details, and many vendors did not respond to notifications.</p><p class="paragraph" style="text-align:left;">→ More breaches:</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bleepingcomputer.com/news/security/globallogic-warns-10-000-employees-of-data-theft-after-oracle-breach/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">GlobalLogic warns 10,000 employees of data theft after Oracle breach</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bleepingcomputer.com/news/security/logitech-confirms-data-breach-after-clop-extortion-attack/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">Logitech confirms data breach after Clop extortion attack</a></p></li></ul></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;border-color:#3587E8;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🔗<i><b> Partners and Affiliates</b></i></p><p class="paragraph" style="text-align:left;">🔐 <a class="link" href="https://go.nordvpn.net/aff_c?offer_id=15&aff_id=84917&url_id=902&utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">NordVPN Threat Protection Pro™ Campaign</a> </p><p class="paragraph" style="text-align:left;"><i>With its user-friendly interface, robust security features, and commitment to privacy, NordVPN continues to be a popular choice for individuals seeking online protection and unrestricted internet access.</i></p><p class="paragraph" style="text-align:left;"><i><b>Special Offer</b></i><i>: </i>get up to 73% off with a 2-year plan!</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://go.nordvpn.net/aff_c?offer_id=15&aff_id=84917&url_id=902&utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025"><span class="button__text" style=""> GET THE DEAL </span></a></div></div><p class="paragraph" style="text-align:left;"></p><div id="cybercrime-cyber-espionage-ap-ts" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🥷🏻 CYBERCRIME, CYBER ESPIONAGE, APT’s</h3><p class="paragraph" style="text-align:left;">🤑 <b>The Akira ransomware group has earned over $244 million by attacking businesses and critical infrastructure</b> since at least March 2023. They <a class="link" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-109a?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">target VMware ESXi and other platforms</a>, exploit multiple known vulnerabilities and stolen credentials, and use tools to move laterally and evade detection. In many cases they quickly steal data, disable protections, and encrypt files with extensions like <code>.akira</code> or <code>.powerranges</code>.</p><p class="paragraph" style="text-align:left;">🇪🇺 ❌ <b>Europol-led </b><i><b>Operation Endgame</b></i><b> disrupted Rhadamanthys stealer, Venom RAT, and the Elysium botnet</b> in a global takedown. Authorities <a class="link" href="https://www.europol.europa.eu/media-press/newsroom/news/end-of-game-for-cybercrime-infrastructure-1025-servers-taken-down?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">arrested a suspect in Greece, seized domains, and removed over 1,025 servers</a> tied to millions of stolen credentials and many compromised machines. Investigations involved multiple countries and found the malware targeted crypto wallets and added stealthy fingerprinting features.</p><p class="paragraph" style="text-align:left;">⚖️ 🇨🇳 <b>Google sued a China-linked group called </b><i><b>Smishing Triad </b></i>over the Lighthouse phishing kit. The kit sent fake SMS links to trick users into giving up passwords, bank details, and more, targeting over a million people worldwide. Google <a class="link" href="https://blog.google/outreach-initiatives/public-policy/legal-action-and-legislation-fight-scammers/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">seeks court orders to seize domains and help unmask the criminals</a> while backing laws to fight scams.</p><div class="embed"><a class="embed__url" href="https://www.securityweek.com/nearly-30-alleged-victims-of-oracle-ebs-hack-named-on-cl0p-ransomware-site/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank"><div class="embed__content"><p class="embed__title"> Nearly 30 Alleged Victims of Oracle EBS Hack Named on Cl0p Ransomware Site </p><p class="embed__description"> Cybercriminals have named nearly 30 organizations allegedly impacted by the recent campaign targeting Oracle EBS customers. </p><p class="embed__link"> www.securityweek.com/nearly-30-alleged-victims-of-oracle-ebs-hack-named-on-cl0p-ransomware-site </p></div><img class="embed__image embed__image--right" src="https://www.securityweek.com/wp-content/uploads/2025/10/Oracle-E-Business-Suite.jpeg"/></a></div><p class="paragraph" style="text-align:left;">🇺🇸 📰 <b>The Washington Post says hackers stole human resources data for 9,720 people</b> from its Oracle E-Business Suite. The <a class="link" href="https://cyberscoop.com/washington-post-oracle-clop-attacks/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">Clop ransomware group exploited</a> a zero-day flaw to access Oracle systems and demand payment. Oracle released a patch and many other organizations were also affected.</p><p class="paragraph" style="text-align:left;">🇦🇺 🇰🇵 <b>Australia sanctioned four entities and one person tied to North Korean cybercrime</b> supporting its weapons programs. The <a class="link" href="https://www.securityweek.com/australia-sanctions-hackers-supporting-north-koreas-weapons-program/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">measures include financial blocks and travel bans</a> and follow similar U.S. actions. Officials say the sanctions target cryptocurrency theft, fraud schemes, and money laundering that fund Pyongyang’s programs.</p><p class="paragraph" style="text-align:left;">🇷🇺 🇺🇸 <b>Aleksei Volkov, a 25-year-old Russian, pleaded guilty to helping run Yanluowang ransomware attacks</b> that hit seven U.S. businesses. He admitted selling access, exploiting systems, and sharing ransom proceeds; victims lost data and some had to shut down. Volkov <a class="link" href="https://cyberscoop.com/russian-aleksei-volkov-yanluowang-ransomware/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">faces up to 53 years in prison</a> and must pay about $9.2 million in restitution.</p><hr class="content_break"><blockquote align="center" class="twitter-tweet"><a href="https://twitter.com/McGrewSecurity/status/1987988991379984790?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025"><p> Twitter tweet </p></a></blockquote></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#f0f0f0;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🗓️ <b>{Cyber,Info}Sec Events</b>: My list of past and future <a class="link" href="https://github.com/xsa/infosec-events?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">{cyber,info}sec related events</a> — Feel free to contribute by submitting issues or pull requests (and don’t forget to <a class="link" href="https://github.com/xsa/infosec-events?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">star the project</a>); Thanks! 😉</p></div><p class="paragraph" style="text-align:left;"></p><div id="government-politics-and-privacy" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">👨🏻‍⚖️ 👀 GOVERNMENT, POLITICS, AND PRIVACY</h3><p class="paragraph" style="text-align:left;">🇺🇸 🇰🇵 <b>The U.S. Department Of Justice (DOJ) has won multiple cases against people who helped North Korean operatives get hired at U.S. companies</b> by using stolen identities and hosting laptop farms. Several <a class="link" href="https://cyberscoop.com/doj-north-korea-it-worker-scheme-cases-crypto-seized/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">defendants pleaded guilty and agreed to forfeitures</a> after schemes that funneled millions in salaries and compromised U.S. residents’ identities. The department also seized over $15 million in cryptocurrency tied to North Korean hacking groups.</p><p class="paragraph" style="text-align:left;">🇺🇸 🪖 <b>The Department of War (the DOD pretty much) is launching CYBERCOM 2.0 to remake how the U.S. builds and keeps cyber forces</b> — It creates targeted recruiting, mission-specific training, new career paths, and support units to k<a class="link" href="https://www.securityweek.com/cybercom-2-0-pentagon-unveils-plan-to-fix-cyber-talent-shortfalls/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">eep cyber teams ready and effective</a>. New centers will speed capability development and manage cyber talent to counter major adversaries like China.</p><p class="paragraph" style="text-align:left;">🇺🇲 🌏️ <b>The U.S. is creating a </b><i><b>Scam Center Strike Force</b></i><b> to investigate and shut down Southeast Asian cyber scam compounds</b> that stole billions from Americans. The <a class="link" href="https://therecord.media/strike-force-southeast-asia-scams?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">team will use sanctions, seizures, and prosecutions</a> and target groups in Burma, Cambodia, and Laos. The Treasury also sanctioned Myanmar’s DKBA and related companies for helping run and profit from these scam centers and human trafficking.</p><p class="paragraph" style="text-align:left;">🇬🇧 <b>The UK has introduced the </b><a class="link" href="https://www.gov.uk/government/collections/cyber-security-and-resilience-bill?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow"><b>Cyber Security and Resilience Bill</b></a><b> to strengthen defenses</b> for hospitals, energy, water, and transport against costly cyberattacks. The law forces medium and large IT and cybersecurity providers to meet mandatory security standards, report major incidents quickly, and face turnover-based penalties for breaches. Regulators can designate critical suppliers and the government can order actions to protect national security, aiming to reduce annual cyber losses of about £15 billion.</p><p class="paragraph" style="text-align:left;">🇦🇺 🇨🇳 <b>Australia’s spy chief says China-backed hackers are probing and sometimes accessing the country’s</b> critical infrastructure. He <a class="link" href="https://techcrunch.com/2025/11/12/australian-spy-chief-warns-chinese-hackers-are-probing-critical-networks-for-espionage-and-sabotage/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">warned</a> groups like <i>Volt Typhoon</i> and <i>Salt Typhoon</i> are pre-positioning for espionage and possible sabotage. Officials fear these intrusions could disrupt power, water, telecoms and other vital services.</p><div class="embed"><a class="embed__url" href="https://techcrunch.com/2025/11/10/why-a-lot-of-people-are-getting-hacked-with-government-spyware/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank"><div class="embed__content"><p class="embed__title"> Why a lot of people are getting hacked with government spyware | TechCrunch </p><p class="embed__description"> Government surveillance vendors want us to believe their spyware products are only used in limited and targeted operations against terrorists and serious criminals. That claim is increasingly difficult to justify, given the broad range of victims — journalists, activists, and now political consultants — that have come forward. </p><p class="embed__link"> techcrunch.com/2025/11/10/why-a-lot-of-people-are-getting-hacked-with-government-spyware </p></div><img class="embed__image embed__image--right" src="https://techcrunch.com/wp-content/uploads/2025/11/eyeballs-surveillance-spyware-1743890138.jpg?resize=1200,800"/></a></div><p class="paragraph" style="text-align:left;">🇺🇸 🇨🇳 <b>The U.S. government may ban sales of TP-Link routers over concerns about Chinese influence</b> and security risks. Many cheap consumer routers from TP-Link and other vendors ship <a class="link" href="https://krebsonsecurity.com/2025/11/drilling-down-on-uncle-sams-proposed-tp-link-ban/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">insecure by default and are often vulnerable</a> unless updated or replaced. Users can improve safety by updating firmware, using open-source firmware like OpenWrt, or replacing old routers, but check with your ISP before changing leased or managed devices.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;border-color:#3587E8;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><p class="paragraph" style="text-align:left;">🔗<i><b> Partners and Affiliates</b></i></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/6f403f9b-d3a1-4d60-9852-f0e0f9340b87/image.png?t=1740643992"/></div><p class="paragraph" style="text-align:center;">🌐 <i>Stay connected and secure on the go with </i><i><b><a class="link" href="https://airalo.pxf.io/c/5582065/1345899/15608?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">Airalo</a></b></i><i>&#39;s global eSIMs — Use the code </i><i><b>NEWTOAIRALO15</b></i><i> if you’re new to Airalo to get an additional 15% discount.</i></p></div><p class="paragraph" style="text-align:left;"></p><div id="malware-threats" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🦠 MALWARE & THREATS</h3><p class="paragraph" style="text-align:left;">💬 🇧🇷 <b>Security researchers found a new WhatsApp-spreading malware called </b><i><b>Maverick</b></i> that <a class="link" href="https://www.cyberproof.com/blog/maverick-and-coyote-analyzing-the-link-between-two-evolving-brazilian-banking-trojans/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">hijacks WhatsApp Web and browser sessions</a> to target Brazilian banks. It shares code and tactics with the Coyote banking trojan and uses PowerShell/VBScript, Chrome profiles, and automation to steal credentials and propagate. The campaign is focused on Brazil and features remote control, email-based C2, and tools to evade detection.</p><p class="paragraph" style="text-align:left;">🎣 🇰🇷 <b>North Korean-linked hackers used spear-phishing to steal Google account credentials</b> and abused Android’s Find My Device to track and remotely wipe victims’ phones. They <a class="link" href="https://www.genians.co.kr/en/blog/threat_intelligence/android?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">targeted South Koreans via KakaoTalk</a>, then hijacked PC sessions to spread malware to contacts.</p><p class="paragraph" style="text-align:left;">🧩 🇷🇺 <b>Researchers found three VS Code extensions carrying GlassWorm malware </b>that steal code and crypto credentials. The <a class="link" href="https://thehackernews.com/2025/11/glassworm-malware-discovered-in-three.html?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">malware hides code using invisible Unicode</a> and uses stolen tokens and Solana blockchain posts to update itself and spread. Victims include organizations worldwide, and attackers appear to be Russian-speaking.</p><p class="paragraph" style="text-align:left;">🎣 <b>A large phishing campaign targets hotels by sending fake Booking.com messages</b> that redirect staff to ClickFix pages to steal credentials. The <a class="link" href="https://blog.sekoia.io/phishing-campaigns-i-paid-twice-targeting-booking-com-hotels-and-customers/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">attack delivers </a><a class="link" href="https://blog.sekoia.io/phishing-campaigns-i-paid-twice-targeting-booking-com-hotels-and-customers/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow"><i>PureRAT</i></a><a class="link" href="https://blog.sekoia.io/phishing-campaigns-i-paid-twice-targeting-booking-com-hotels-and-customers/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow"> via a malicious PowerShell command</a>, giving attackers full remote access and data-stealing abilities. Stolen accounts and logs are sold on crime forums or used to defraud customers.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/7866b36e-d981-4f1a-a85d-66f0a9b1bc40/image.png?t=1762959623"/><div class="image__source"><span class="image__source_text"><p>Figure: Infection chain/sekoia</p></span></div></div></div><p class="paragraph" style="text-align:left;"></p><div id="ai-crypto-tech-tools" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🤖 🧰 AI, CRYPTO, TECH & TOOLS</h3><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/ngN16J5DQ2A" width="100%"></iframe><hr class="content_break"><p class="paragraph" style="text-align:left;">🇨🇳 👀 <b>Anthropic has detected a large-scale espionage campaign where AI agents ran most of the attack</b> with <a class="link" href="https://www.anthropic.com/news/disrupting-AI-espionage?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">little human help</a>. A Chinese state-linked group used a jailbroken Claude Code to scan targets, write exploit code, steal credentials, and exfiltrate data. This shows AI agents can greatly lower the bar for powerful cyberattacks and demands better defenses, detection, and safeguards.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/6297c55c-b72a-4cc9-a22e-4b0e0e579a41/image.png?t=1763101531"/><div class="image__source"><span class="image__source_text"><p>Figure: The lifecycle of the attack/<a class="link" href="https://anthropic.com?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">anthropic.com</a></p></span></div></div><p class="paragraph" style="text-align:left;">→ <a class="link" href="https://techcrunch.com/2025/11/14/openai-says-its-fixed-chatgpts-em-dash-problem/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">Anthropic claims of Claude AI-automated cyberattacks met with doubt</a></p><p class="paragraph" style="text-align:left;">→ <a class="link" href="https://cyberscoop.com/anthropic-ai-orchestrated-attack-required-many-human-hands/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">China’s ‘autonomous’ AI-powered hacking campaign still required a ton of human work</a></p><p class="paragraph" style="text-align:left;">→ <a class="link" href="https://arstechnica.com/security/2025/11/researchers-question-anthropic-claim-that-ai-assisted-attack-was-90-autonomous/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">Researchers question Anthropic claim that AI-assisted attack was 90% autonomous</a></p><div class="embed"><a class="embed__url" href="https://infosec.exchange/@briankrebs/115548406181362089?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank"><div class="embed__content"><p class="embed__title"> BrianKrebs (@briankrebs@infosec.exchange) </p><p class="embed__description"> Best quote I&#39;ve seen all day so far, from an Ars piece by @dangoodin on skepticism around OpenAI&#39;s breathless claim that a Chinese hacking group used Claude code to automate 90 percent of their attack: “I continue to refuse to believe that attackers are somehow able to get these models to jump through hoops that nobody else can,” Dan Tentler, executive founder of Phobos Group and a researcher with expertise in complex security breaches, told Ars. “Why do the models give these attackers what they want 90% of the time but the rest of us have to deal with ass-kissing, stonewalling, and acid trips?” https://arstechnica.com/security/2025/11/researchers-question-anthropic-claim-that-ai-assisted-attack-was-90-autonomous/?utm_brand=arstechnica&utm_social-type=owned&utm_source=mastodon&utm_medium=social </p><p class="embed__link"> infosec.exchange/@briankrebs/115548406181362089 </p></div></a></div><hr class="content_break"><div class="embed"><a class="embed__url" href="https://cyberplace.social/@GossiTheDog/115549061655520737?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank"><div class="embed__content"><p class="embed__title"> Kevin Beaumont (@GossiTheDog@cyberplace.social) </p><p class="embed__description"> Attached: 4 images Volexity put out a report about likely GenAI being used in cyber attacks by China... and it contains IOCs! It&#39;s a good report. It has all the low hanging fruit classics defenders have been aware of forever, e.g. .rar files with .exe files inside, all of the &quot;GenAI malware&quot; was detected out of the box across all leading vendors etc etc. Also the payloads contain unique phrases (and Wav files, lol) which made them easy to detect. https://www.volexity.com/blog/2025/10/08/apt-meets-gpt-targeted-operations-with-untamed-llms/ </p><p class="embed__link"> cyberplace.social/@GossiTheDog/115549061655520737 </p></div></a></div><p class="paragraph" style="text-align:left;">🇮🇪 🇪🇺 <b>The Irish Council for Civil Liberties (ICCL) has complained to the European Ombudsman after the European Commission used ChatGPT-generated content</b> in a public document. This likely breaks the Commission’s own AI rules and may violate its duty to provide accurate information. ICCL <a class="link" href="https://www.iccl.ie/news/european-commission-breaches-own-ai-guidelines-by-using-chatgpt-in-public-documents/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">says</a> public bodies must disclose AI use and prove any AI-generated claims.</p><p class="paragraph" style="text-align:left;">🛂 ✈️ <b>Apple Wallet now lets U.S. iPhone and Apple Watch users add their passport as a Digital ID</b> for <a class="link" href="https://techcrunch.com/2025/11/12/apple-launches-digital-id-a-way-to-carry-your-passport-on-your-phone-for-use-at-tsa-checkpoints/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">use at TSA checkpoints</a> in over 250 airports. Setup requires scanning the passport chip and a selfie for verification, and authentication uses Face ID or Touch ID. The feature is in beta, not valid for international travel, and Apple says it protects users’ privacy.</p><div class="embed"><a class="embed__url" href="https://cloud.google.com/blog/topics/threat-intelligence/threat-actor-usage-of-ai-tools?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank"><div class="embed__content"><p class="embed__title"> GTIG AI Threat Tracker: Advances in Threat Actor Usage of AI Tools | Google Cloud Blog </p><p class="embed__description"> Google Threat Intelligence Group&#39;s findings on adversarial misuse of AI, including Gemini and other non-Google tools. </p><p class="embed__link"> cloud.google.com/blog/topics/threat-intelligence/threat-actor-usage-of-ai-tools </p></div><img class="embed__image embed__image--right" src="https://storage.googleapis.com/gweb-cloudblog-publish/images/03_ThreatIntelligenceWebsiteBannerIdeas_BA.max-2600x2600.png"/></a></div><p class="paragraph" style="text-align:left;">🔓️ <b>Microsoft researchers discovered &quot;</b><i><b>Whisper Leak</b></i><b>&quot;, a side-channel attack that infers LLM conversation topics</b> by observing encrypted traffic packet sizes and timing. The <a class="link" href="https://www.microsoft.com/en-us/security/blog/2025/11/07/whisper-leak-a-novel-side-channel-cyberattack-on-remote-language-models/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">attack can reveal sensitive subjects</a> like legal or medical advice even without decrypting messages. Mitigations include random padding, token batching, non-streaming models, VPNs, and provider-side fixes.</p><p class="paragraph" style="text-align:left;">🇨🇳 🇬🇧 <b>A Chinese woman called the &quot;</b><i><b>Bitcoin Queen</b></i><b>&quot; was jailed in London for 11 years and eight months</b> for laundering proceeds from a £5.5 billion ($7.3B) crypto fraud. She <b>led a scheme that defrauded over 128,000 investors</b> and was linked to the seizure of 61,000 Bitcoin — the largest crypto confiscation in UK history. Two associates also received prison terms after assets and wallets were seized.</p><hr class="content_break"><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/O7BI4jfEFwA" width="100%"></iframe></div><div id="vulnerabilities-research-and-threat" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🐛 🧠 VULNERABILITIES, RESEARCH, AND THREAT INTELLIGENCE</h3><p class="paragraph" style="text-align:left;">➝ From the Patching Department:</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/adobe-patches-29-vulnerabilities/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">Adobe Patches 29 Vulnerabilities</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/firefox-145-and-chrome-142-patch-high-severity-flaws-in-latest-releases/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">Firefox 145 and Chrome 142 Patch High-Severity Flaws in Latest Releases</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/high-severity-vulnerabilities-patched-by-ivanti-and-zoom/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">High-Severity Vulnerabilities Patched by Ivanti and Zoom</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bleepingcomputer.com/news/microsoft/microsoft-november-2025-patch-tuesday-fixes-1-zero-day-63-flaws/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">Microsoft November 2025 Patch Tuesday fixes 1 zero-day, 63 flaws</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/qnap-patches-vulnerabilities-exploited-at-pwn2own-ireland/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">QNAP Patches Vulnerabilities Exploited at Pwn2Own Ireland</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://onapsis.com/blog/sap-security-patch-day-november-2025/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">SAP released 26 November security notes, including four </a><i><a class="link" href="https://onapsis.com/blog/sap-security-patch-day-november-2025/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">HotNews</a></i><a class="link" href="https://onapsis.com/blog/sap-security-patch-day-november-2025/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow"> and two High Priority fixes</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bleepingcomputer.com/news/security/synology-fixes-beestation-zero-days-demoed-at-pwn2own-ireland/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">Synology fixes BeeStation zero-days demoed at Pwn2Own Ireland</a></p></li></ul><p class="paragraph" style="text-align:left;">🗓️ 🩹 <b>Chipmaker Patch Tuesday</b> — Intel, AMD, and Nvidia <a class="link" href="https://www.securityweek.com/chipmaker-patch-tuesday-over-60-vulnerabilities-patched-by-intel/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">released security advisories fixing many recent vulnerabilities</a> in their chips and software. Intel patched over 60 flaws across processors, graphics, firmware, and drivers that could allow DoS, privilege escalation, or data leaks. AMD and Nvidia fixed several high-severity issues in SoCs, AI frameworks, and tools that could enable code execution, data disclosure, or tampering.</p><p class="paragraph" style="text-align:left;">🩹 <b>CISA ordered U.S. federal agencies to patch a critical Samsung zero-day</b> (<a class="link" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21042?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">CVE-2025-21042</a>) exploited to install LandFall spyware via malicious WhatsApp images. The spyware can steal calls, messages, photos, location, browsing history, and more from many Samsung flagship models. Agencies must patch by December 1, and CISA urges all organizations to update devices immediately.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/1befb71a-65dd-4a4a-a104-fc6f158af03d/image.png?t=1762862897"/><div class="image__source"><span class="image__source_text"><p>Figure: CVE-2025-21042 exploitation timeline/ Palo Alto Unit 42</p></span></div></div><hr class="content_break"><p class="paragraph" style="text-align:left;">💥 <b>Researchers warn of an authentication bypass in Fortinet FortiWeb that lets attackers add admin accounts</b> and take over devices. The <a class="link" href="https://www.pwndefend.com/2025/11/13/suspected-fortinet-zero-day-exploited-in-the-wild/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">flaw was silently patched in version 8.0.2</a> after active in-the-wild exploitation was observed. Organizations using older FortiWeb versions should check for compromise and apply the patch immediately.</p><p class="paragraph" style="text-align:left;">🍯 <b>Amazon found an advanced persistent threat (APT) group exploiting zero-day bugs in Cisco ISE and Citrix NetScaler</b> before vendors patched them. Their <a class="link" href="https://cyberscoop.com/sora-2-deepfake-letter-public-citizen-openai/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">honeypot and investigation showed custom backdoors</a> and rapid weaponization, likely for espionage. The attacks highlight rising focus on identity and network edge infrastructure.</p><p class="paragraph" style="text-align:left;">💰️ <b>Google paid $458,000 in bug bounties</b> at its <a class="link" href="https://www.securityweek.com/google-paid-out-458000-at-live-hacking-event/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">bugSWAT live-hacking event during the ESCAL8</a> conference. 38 top hackers submitted 107 reports focused on AI, Android, and Google Cloud, and Google launched a new AI Vulnerability Reward Program offering up to $20,000 per finding. The conference also featured a CTF, workshops for over 60 students, and nearly 200 attendees.</p><p class="paragraph" style="text-align:left;">🤑 🤖 <b>Amazon launched an invite-only bug bounty program for its NOVA AI models</b> — Selected researchers will <a class="link" href="https://cyberscoop.com/amazon-bug-bounty-program-ai-nova/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">test for prompt injection, jailbreaking, and other exploitable flaws</a>, including misuse for dangerous weapon-related assistance. The program aims to improve security as NOVA is used across Amazon products and services.</p><p class="paragraph" style="text-align:left;">🔓️ <b>Researchers found vulnerabilities in the </b><code>runc</code><b> container runtime</b> that can let <a class="link" href="https://www.securityweek.com/runc-vulnerabilities-can-be-exploited-to-escape-containers?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">malicious containers escape and get root </a>on the host. Patches and advisories from vendors like <a class="link" href="https://access.redhat.com/errata/RHSA-2025:19927?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">Red Hat</a> and <a class="link" href="https://aws.amazon.com/security/security-bulletins/rss/aws-2025-024/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">AWS</a> have been released. The flaws are rated medium but could be more serious for Docker or Kubernetes if untrusted images are run.</p><p class="paragraph" style="text-align:left;">🗒️ <b>OWASP released a near-final 2025 Top 10 list for web application risks with two new categories</b> and a <a class="link" href="https://owasp.org/Top10/2025/0x00_2025-Introduction/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">reordered ranking</a>. Broken Access Control stays first and now includes SSRF; a new Mishandling of Exceptional Conditions appears at ten. OWASP changed its data-driven method, using many more CWEs and CVE/CVSS data plus a community survey.</p></div><p class="paragraph" style="text-align:left;"></p><div id="ics-ot-io-t" class="section" style="background-color:transparent;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">🛰️ ICS, OT & IoT</h3><p class="paragraph" style="text-align:left;">🗓️ 🩹 <b>ICS Patch Tuesday</b> — Industrial control vendors Siemens, Rockwell, Aveva, and Schneider <a class="link" href="https://www.securityweek.com/ics-patch-tuesday-vulnerabilities-addressed-by-siemens-rockwell-aveva-schneider/?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">released Patch Tuesday advisories</a> fixing multiple security flaws in ICS/OT products. The bugs include critical code execution, authentication bypasses, XSS, path traversal, and other high-severity issues that could allow tampering or credential theft. Other vendors like Moxa, ABB, Honeywell, and Mitsubishi reported fixes recently, and VDE@CERT also published advisories.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#f0f0f0;border-color:#C0C0C0;border-radius:10px;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:10.0px 10.0px 10.0px 10.0px;"><h3 class="heading" style="text-align:left;">💬 CONNECT</h3><p class="paragraph" style="text-align:left;">Follow me on <a class="link" href="https://infosec.exchange/@0x58?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">Mastodon</a> for quick daily updates and bite-sized content.</p><p class="paragraph" style="text-align:left;">Prefer using an RSS feed? Add <b>Infosec MASHUP</b> to your feed <a class="link" href="https://rss.beehiiv.com/feeds/HVhiKYpQlR.xml?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">here</a>.</p><p class="paragraph" style="text-align:center;"><b>Enjoying our newsletter? </b>Forward it to a colleague—<br>it’s one of the best ways to support us.</p><p class="paragraph" style="text-align:left;">Thanks for reading today’s newsletter, and if you&#39;re enjoying it and want to support my work, you can <b>buy me a coffee</b> ☕ over at <a class="link" href="https://www.buymeacoffee.com/0x58?utm_source=infosec-mashup.santolaria.net&utm_medium=newsletter&utm_campaign=infosec-mashup-46-2025" target="_blank" rel="noopener noreferrer nofollow">https://www.buymeacoffee.com/0x58</a></p><p class="paragraph" style="text-align:left;"> See you next time!</p><p class="paragraph" style="text-align:left;">-X.</p></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=e6066195-86a6-46bf-86dc-cbe70b0bedcc&utm_medium=post_rss&utm_source=x_s_infosec_newsletter">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

  </channel>
</rss>
