home.social

#attackers — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #attackers, aggregated by home.social.

  1. #Anthropic’s #Mythos, an #AImodel, autonomously discovered numerous #vulnerabilities, including a 27-year-old flaw in #OpenBSD’s TCP stack, highlighting the need for a new detection playbook. The model’s capabilities surpass existing methods, posing a significant challenge for #security teams as #attackers can exploit these vulnerabilities rapidly. venturebeat.com/security/mytho #AIagent #AI #ML #NLP #LLM #GenAI

  2. #Discord says 70,000 users may have had their government IDs leaked in #breach | The Verge

    Discord claims that the #attackers are circulating inaccurate information about the breach of a customer service provider as part of an #extortion attempt.
    #privacy #security

    theverge.com/news/797051/disco

  3. #Google warns that mass data theft hitting #Salesloft #AIagent has grown bigger

    Google is advising users of the #SalesloftDriftAI #chat #agent to consider all #security #tokens connected to the platform compromised following the discovery that unknown #attackers used some of the #credentials to access email from #GoogleWorkspace accounts.
    #privacy #security

    arstechnica.com/security/2025/

  4. → New Gemini for Workspace Vulnerability
    hiddenlayer.com/innovation-hub

    “[W]e’ve demonstrated that attackers can manipulate Gemini for Workspace’s outputs in Gmail, Google Slides, and Google Drive, allowing them to perform #phishing attacks and manipulate the #chatbot’s behavior. While #Google classifies these as "Intended Behaviors", the vulnerabilities explored highlight the importance of being #vigilant when using LLM-powered tools.”

    #Vulnerability #attackers #Gemini #Workspace #Gmail #Drive #LLM

  5. Attackers have advanced their #techniques for leveraging the "search-ms" uniform resource identifier (#URI) #protocol from #malicious #documents to direct users to websites that exploit #search-ms functionality using #JavaScript hosted on the page.

    The search-ms protocol lets Windows users conduct search operations via a URI. Normally, it’s a #benign operation, but if combined with another vulnerability such as within #Windows documents, #attackers can potentially use it as a part of a broader #phishing or #malware campaign.

    This attack requires #gaps at multiple layers of an organization’s defenses. First, properly leveraging email filters with URL rewriting and malicious content controls will limit the impact of a search-ms attack. Second, it relies on limited restrictions on outbound internet browsing — both at the firewall and internet proxy level. Once again, outbound controls are critical.

    scmagazine.com/news/attackers-

    Full blog post with technical details available here: trellix.com/en-us/about/newsro

  6. I'm actually a bit #pissed when reading the story about "The Big Hack"..
    bloomberg.com/news/features/20

    I mean.. Look at that image! Such a tiny #chip can #allegedly

    > alter the operating system’s core so it could accept modifications. The chip could also contact computers controlled by the #attackers in search of further instructions and code.

    If they can build such #powerfull chips that tiny w/o need for cooling etc...
    WHY THE #FSCK IS MY PI STILL THAT BIG!?

    #bighack #supermicro