home.social

Search

1000 results for “analyst42”

  1. @analyst42 @chrisbeeley I used for a public site and for internal things I just can't share, like connection strings. It's surprising how often I get to share the links to public posts compared to internal links.

  2. And here's day 2 of the in-person conference... youtu.be/GS8CThaMZXM

    So in total that's 5 days of community-sourced talks, organised largely by people who's day job is very much doing something else, all for the benefit of analytics, analysts, and decision-makers.

    Thank you to everyone who was involved in putting this amazing event on, making it possible for the rest of us to start catching up and turbocharging our work!

  3. Funnel Builder Flaw Exploited for WooCommerce Checkout Skimming

    A critical vulnerability in the Funnel Builder plugin for WordPress is being actively exploited, allowing attackers to inject malicious JavaScript into WooCommerce checkout pages and skim sensitive customer info. Over 40,000 online stores using the plugin may be at risk.

    osintsights.com/funnel-builder

    #Woocommerce #FunnelBuilder #Wordpress #CheckoutSkimming #GoogleTagManager

  4. Funnel Builder Flaw Exploited for WooCommerce Checkout Skimming

    A critical vulnerability in the Funnel Builder plugin for WordPress is being actively exploited, allowing attackers to inject malicious JavaScript into WooCommerce checkout pages and skim sensitive customer info. Over 40,000 online stores using the plugin may be at risk.

    osintsights.com/funnel-builder

    #Woocommerce #FunnelBuilder #Wordpress #CheckoutSkimming #GoogleTagManager

  5. Cisco SD-WAN Zero-Day Exploited for Admin Access

    A critical zero-day vulnerability, CVE-2026-20182, has been exploited in Cisco SD-WAN, allowing hackers to gain unrestricted administrative control with a severity score of 10 on the CVSS scale. This flaw enables unauthenticated attackers to manipulate network configurations and take control of Cisco Catalyst SD-WAN Controller with ease.

    osintsights.com/cisco-sd-wan-z

    #Cisco #Sdwan #ZeroDay #Cve202620182 #Vdaemon

  6. Coalition Bolsters Forces to Reopen Strait of Hormuz

    A powerful coalition of over 40 nations is joining forces to safeguard the Strait of Hormuz, with a defensive mission aimed at protecting merchant vessels and clearing mines once a lasting ceasefire is achieved. Led by France and the UK, this multinational effort seeks to restore vital shipping lanes and stabilize the region.

    osintsights.com/coalition-bols

    #StraitOfHormuz #MultinationalMilitaryMission #France #UnitedKingdom #MiddleEast

  7. Trump Reveals US, China Discussed Cyberattacks, Espionage

    President Donald Trump revealed that he and Chinese President Xi Jinping had a candid conversation about cyberattacks and espionage, with Trump bluntly stating that the US spies on China just as China spies on the US. Trump hinted at a cat-and-mouse game between the two nations, saying the US does things to China that it doesn't know…

    osintsights.com/trump-reveals-

    #UschinaRelations #CyberEspionage #NationState #Geopolitics #EmergingThreats

  8. Argentina Retires A-4 Fightinghawks Amid F-16 Integration

    The Fuerza Aérea Argentina has bid farewell to its A-4AR/OA-4AR Fightinghawks at Villa Reynolds Air Base, marking the end of a six-decade era as it prioritizes operational efficiency and economic sustainability with the integration of F-16s. The retirement comes as maintenance costs for the aging jets became unsustainable.

    osintsights.com/argentina-reti

    #F16Integration #Argentina #FuerzaAéreaArgentina #A4arFightinghawk #MilitaryAviation

  9. Cisco Zero-Day Exploited in Ongoing Attacks by Persistent Threat Group

    A newly discovered Cisco zero-day vulnerability, CVE-2026-20182, is being exploited in ongoing attacks, allowing threat actors to gain the highest administrative access to a network controller, essentially handing them a master key to wreak havoc. This max-severity flaw has sparked a race against time for Cisco customers and national cyber…

    osintsights.com/cisco-zero-day

    #ZeroDay #Cisco #Cve202620182 #AuthenticationBypass #Sdwan

  10. Pentagon Halts Poland Troop Deployment Amid European Tensions

    The Pentagon has abruptly halted the deployment of an armored brigade to Poland, a sudden decision that comes amid rising tensions in Eastern Europe. Just days before the scheduled deployment, the Army was informed of the change, with roughly 4,000 troops affected.

    osintsights.com/pentagon-halts

    #NationalSecurity #Geopolitics #EasternEurope #Poland #Pentagon

  11. Southeast Asia Bolsters Counter-Drone Capabilities

    Southeast Asian countries are rapidly adapting to the evolving drone threat landscape, with nations like Malaysia and Singapore leading the charge by developing cutting-edge counter-drone capabilities and integrating drone operations into their military training. From interceptor drones to revamped military doctrines, the region is…

    osintsights.com/southeast-asia

    #CounterDrone #SoutheastAsia #EmergingThreats #UnmannedSystems #NationState

  12. Pentagon Draws Congressional Fire Over Canceled Europe Deployment

    Congressional leaders are breathing down the Pentagon's neck after a surprise deployment cancellation left lawmakers fuming, with the House Armed Services Committee chair vowing to ensure the department sticks to its statutory commitments. The canceled deployment involved the 2nd Armored Brigade Combat Team, 1st Cavalry…

    osintsights.com/pentagon-draws

    #NationalSecurity #Pentagon #CongressionalOversight #Europe #DefensePolicy

  13. Zero-Knowledge Proofs Evolve to Bypass Age-Verification Checks

    As the digital landscape continues to shift, it's only a matter of time before you'll have to face the music - and the cameras - when it comes to age verification checks. But what's really behind these on-camera checks: protecting kids or creating a way for governments to control access to online platforms?

    osintsights.com/zero-knowledge

    #AgeVerification #ZeroknowledgeProofs #Deanonymization #OnlinePrivacy #DigitalRights

  14. Iran Targets US Gas Stations with Tank Reader Hacks

    US gas stations have been targeted by Iranian hackers, who manipulated fuel level readings at vulnerable sites, sparking concerns of a potentially catastrophic cyber attack. The breach highlights the alarming threat of kinetic cyber attacks, with experts warning of the devastating consequences.

    osintsights.com/iran-targets-u

    #Iran #EmergingThreats #NationState #CyberAttacks #SupplyChain

  15. Iran Targets US Gas Stations with Tank Reader Hacks

    US gas stations have been targeted by Iranian hackers, who manipulated fuel level readings at vulnerable sites, sparking concerns of a potentially catastrophic cyber attack. The breach highlights the alarming threat of kinetic cyber attacks, with experts warning of the devastating consequences.

    osintsights.com/iran-targets-u

    #Iran #EmergingThreats #NationState #CyberAttacks #SupplyChain

  16. ShinyHunters Fuel Surge in Data Leaks

    Meet the ShinyHunters, a notorious group behind a surge in public data leaks, who team up with The Com to scam victims out of cloud system access and then hold their data for ransom. This duo's alarming tactic has resulted in a steady stream of sensitive information being dumped into the public domain.

    osintsights.com/shinyhunters-f

    #Shinyhunters #DataLeaks #Extortion #SocialEngineering #CloudSecurity

  17. Ransomware Gangs Test Trust with Data Deletion Promises

    Can you ever trust a ransomware gang's promise to delete stolen data? The recent Instructure breach has brought this question to the forefront, leaving victims wondering if paying up is worth the risk of broken promises.

    osintsights.com/ransomware-gan

    #Ransomware #DataDeletion #EmergingThreats #Extortion #NationState

  18. Funnel Builder Plugin Exploited to Inject Credit Card Skimmers

    A vulnerability in the popular Funnel Builder plugin, used on over 40,000 websites, has been exploited to inject credit card skimmers into WooCommerce checkout pages, putting sensitive payment data at risk. This flaw allows attackers to sneak malicious code into checkout pages, harvesting valuable information from unsuspecting…

    osintsights.com/funnel-builder

    #Wordpress #FunnelBuilderPlugin #CreditCardSkimmers #Woocommerce #SupplyChain

  19. Funnel Builder Plugin Exploited to Inject Credit Card Skimmers

    A vulnerability in the popular Funnel Builder plugin, used on over 40,000 websites, has been exploited to inject credit card skimmers into WooCommerce checkout pages, putting sensitive payment data at risk. This flaw allows attackers to sneak malicious code into checkout pages, harvesting valuable information from unsuspecting…

    osintsights.com/funnel-builder

    #Wordpress #FunnelBuilderPlugin #CreditCardSkimmers #Woocommerce #SupplyChain

  20. Hackers Disrupt Microsoft Exchange, Windows 11 at Pwn2Own Contest

    Security researchers just scored big at Pwn2Own Berlin 2026, raking in $385,750 for exploiting 15 zero-day vulnerabilities in top tech targets like Microsoft Exchange and Windows 11. The contest, running from May 14-16, offers up to $1 million in prizes for hacking the latest enterprise technologies.

    osintsights.com/hackers-disrup

    #Pwn2ownContest #ZeroDay #MicrosoftExchange #Windows11 #EnterpriseApplications

  21. Node-ipc Package Infected with Credential-Stealing Malware

    A malicious update to the widely-used node-ipc library has infected thousands of projects with credential-stealing malware, posing a significant supply-chain risk for developer environments and CI systems. With over 690,000 weekly downloads, this single compromised library could be exfiltrating sensitive data from countless unsuspecting users.

    osintsights.com/node-ipc-packa

    #SupplyChain #CredentialStealing #Malware #Nodeipc #Npm

  22. Microsoft Alters Edge to Mitigate Password Exposure Risk

    Microsoft is taking a major step to boost password security in its Edge browser, rolling out a defense-in-depth change to mitigate the risk of password exposure. This update will be applied across all supported Edge versions, prioritizing a swift rollout to protect users.

    osintsights.com/microsoft-alte

    #BrowserSecurity #PasswordExposure #MicrosoftEdge #Defenseindepth #Proofofconcept

  23. REMUS Infostealer Targets Session Theft, Password Managers

    Meet REMUS Infostealer, a rapidly evolving threat that's been making waves in the underground scene since February 2026, with its operators boasting a staggering 90% callback rate thanks to top-notch crypting and a dedicated server. This infostealer has quickly become a commercialized and professionalized menace, with a flurry of updates,…

    osintsights.com/remus-infostea

    #Infostealer #Remus #SessionTheft #PasswordManagers #MalwareOperations

  24. AI-Powered Phishing Scams Evade Detection in Workplace

    Phishing scams are getting sneakier, with 72% of people saying AI-powered attempts are more convincing than ever - and 57% believe AI makes them harder to spot because they seem more professional. As a result, employees are struggling to tell the difference between genuine workplace messages and fraudulent ones.

    osintsights.com/ai-powered-phi

    #AipoweredPhishing #PhishingScams #WorkplaceSecurity #EmergingThreats #AigeneratedContent

  25. Autonomous AI Exposes Governance Gaps in Enterprise Security

    As autonomous AI revolutionizes enterprise security, it's also revealing alarming governance gaps that can leave organizations in highly regulated environments exposed to unprecedented risks. The rapid adoption of autonomous AI is creating a trust gap, where innovation outpaces control, and novel risks to visibility, control, and…

    osintsights.com/autonomous-ai-

    #AutonomousAi #EnterpriseSecurity #Governance #Compliance #RegulatoryPosture

  26. TanStack Supply Chain Attack Targets OpenAI, Forces macOS Updates

    OpenAI sprang into action after detecting a sneaky supply chain attack targeting TanStack, quickly investigating and containing the threat to protect its systems. The attack impacted just two employee devices, with limited internal code repositories and credential material compromised.

    osintsights.com/tanstack-suppl

    #SupplyChain #Tanstack #Openai #Macos #EmergingThreats

  27. Bitdefender Exposes Hidden Attack Surface in Trusted Tools

    Did you know that 84% of high-severity incidents involve the abuse of trusted tools, making them nearly invisible to traditional security measures? This shocking statistic highlights the alarming ease with which attackers can hide in plain sight, using legitimate tools against you.

    osintsights.com/bitdefender-ex

    #LegitimateToolAbuse #Livingofftheland #Windows11 #Overentitlement #MalwareOperations

  28. Wireless Vulnerabilities Skyrocket, Outpacing Traditional Threats

    The number of wireless vulnerabilities has skyrocketed, with a staggering 937 new threats discovered in 2025 alone - that's 2.5 new vulnerabilities every day. This represents a 60% increase since the start of 2024, and a growth rate that's 20 times faster than traditional threats over the last 15 years.

    osintsights.com/wireless-vulne

    #WirelessVulnerabilities #EmergingThreats #Cve #ZeroDay #SupplyChain

  29. Microsoft Introduces Automated Windows Driver Rollback Feature

    Microsoft's new Cloud-Initiated Driver Recovery feature lets them swiftly roll back faulty Windows drivers, so you don't have to - no more manual uninstalls or waiting for an updated driver from the hardware partner. This means your device can quickly get back on track with a reliable driver.

    osintsights.com/microsoft-intr

    #WindowsUpdate #CloudinitiatedDriverRecovery #Microsoft #AutomatedDriverRollback #WindowsDriverManagement

  30. Microsoft Warns of Severe Zero-Day Flaw in On-Prem Exchange Servers

    Microsoft just sounded the alarm on a severe zero-day flaw in on-prem Exchange servers, warning that a high-severity vulnerability could let attackers send malicious code to victims via specially crafted emails. This flaw, tracked as CVE-2026-42897, has already been automatically mitigated if the EM Service is enabled,…

    osintsights.com/microsoft-warn

    #ZeroDay #ExchangeServerVulnerability #Cve202642897 #CrosssiteScripting #Microsoft