home.social

#edge — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #edge, aggregated by home.social.

  1. Microslop's Edge Copilot update uses AI to pull information from across your tabs

    The new "features" include AI podcasts, summaries, and quizzes based on what you’re browsing.

    theverge.com/tech/930188/micro

    #Microsoft #Microslop #Edge #AI #Copilot #AIslop #privacy #surveillance #enshittification #technology

  2. The Verge: Microsoft’s Edge Copilot update uses AI to pull information from across your tabs. “Microsoft Edge is adding a new feature that will allow its Copilot AI chatbot to gather information from all of your open tabs. When you start a conversation with Copilot, you can ask the chatbot questions about what’s in your tabs, compare the products you’re looking at, summarize your open […]

    https://rbfirehose.com/2026/05/14/the-verge-microsofts-edge-copilot-update-uses-ai-to-pull-information-from-across-your-tabs/
  3. Microsoft streicht den Copilot-Modus in Edge. Die KI-Funktionen werden nun direkt in die Browser-Oberfläche integriert. Datenschutz bleibt ein Thema. #Microsoft #Edge winfuture.de/news,158691.html?

  4. Thus Spoke…The Gentlemen

    On May 4th, 2026, The Gentlemen RaaS administrator acknowledged that an internal backend database called Rocket had been leaked, exposing nine accounts including zeta88, the program's effective administrator. The leak revealed internal discussions detailing initial access methods through Fortinet and Cisco edge appliances, NTLM relay, and credential logs, along with the group's role divisions and toolsets. Evidence shows evaluation of CVEs including CVE-2024-55591, CVE-2025-32433, and CVE-2025-33073. Leaked ransom negotiations showed a successful payment of 190,000 USD. The group reused stolen data from a UK software consultancy to attack a Turkish company, employing dual-pressure tactics during negotiations. Analysis of ransomware samples identified eight distinct affiliate TOX IDs, indicating the administrator actively participates in infections alongside managing the RaaS program.

    Pulse ID: 6a04aad1cd2da41f0087f85d
    Pulse Link: otx.alienvault.com/pulse/6a04a
    Pulse Author: AlienVault
    Created: 2026-05-13 16:46:09

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Cisco #CyberSecurity #Edge #ICS #InfoSec #LUA #OTX #OpenThreatExchange #RAT #RaaS #RansomWare #Turkish #UK #bot #AlienVault

  5. Thus Spoke…The Gentlemen

    On May 4th, 2026, The Gentlemen RaaS administrator acknowledged that an internal backend database called Rocket had been leaked, exposing nine accounts including zeta88, the program's effective administrator. The leak revealed internal discussions detailing initial access methods through Fortinet and Cisco edge appliances, NTLM relay, and credential logs, along with the group's role divisions and toolsets. Evidence shows evaluation of CVEs including CVE-2024-55591, CVE-2025-32433, and CVE-2025-33073. Leaked ransom negotiations showed a successful payment of 190,000 USD. The group reused stolen data from a UK software consultancy to attack a Turkish company, employing dual-pressure tactics during negotiations. Analysis of ransomware samples identified eight distinct affiliate TOX IDs, indicating the administrator actively participates in infections alongside managing the RaaS program.

    Pulse ID: 6a04aad1cd2da41f0087f85d
    Pulse Link: otx.alienvault.com/pulse/6a04a
    Pulse Author: AlienVault
    Created: 2026-05-13 16:46:09

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Cisco #CyberSecurity #Edge #ICS #InfoSec #LUA #OTX #OpenThreatExchange #RAT #RaaS #RansomWare #Turkish #UK #bot #AlienVault

  6. Thus Spoke…The Gentlemen

    On May 4th, 2026, The Gentlemen RaaS administrator acknowledged that an internal backend database called Rocket had been leaked, exposing nine accounts including zeta88, the program's effective administrator. The leak revealed internal discussions detailing initial access methods through Fortinet and Cisco edge appliances, NTLM relay, and credential logs, along with the group's role divisions and toolsets. Evidence shows evaluation of CVEs including CVE-2024-55591, CVE-2025-32433, and CVE-2025-33073. Leaked ransom negotiations showed a successful payment of 190,000 USD. The group reused stolen data from a UK software consultancy to attack a Turkish company, employing dual-pressure tactics during negotiations. Analysis of ransomware samples identified eight distinct affiliate TOX IDs, indicating the administrator actively participates in infections alongside managing the RaaS program.

    Pulse ID: 6a04aad1cd2da41f0087f85d
    Pulse Link: otx.alienvault.com/pulse/6a04a
    Pulse Author: AlienVault
    Created: 2026-05-13 16:46:09

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Cisco #CyberSecurity #Edge #ICS #InfoSec #LUA #OTX #OpenThreatExchange #RAT #RaaS #RansomWare #Turkish #UK #bot #AlienVault

  7. Thus Spoke…The Gentlemen

    On May 4th, 2026, The Gentlemen RaaS administrator acknowledged that an internal backend database called Rocket had been leaked, exposing nine accounts including zeta88, the program's effective administrator. The leak revealed internal discussions detailing initial access methods through Fortinet and Cisco edge appliances, NTLM relay, and credential logs, along with the group's role divisions and toolsets. Evidence shows evaluation of CVEs including CVE-2024-55591, CVE-2025-32433, and CVE-2025-33073. Leaked ransom negotiations showed a successful payment of 190,000 USD. The group reused stolen data from a UK software consultancy to attack a Turkish company, employing dual-pressure tactics during negotiations. Analysis of ransomware samples identified eight distinct affiliate TOX IDs, indicating the administrator actively participates in infections alongside managing the RaaS program.

    Pulse ID: 6a04aad1cd2da41f0087f85d
    Pulse Link: otx.alienvault.com/pulse/6a04a
    Pulse Author: AlienVault
    Created: 2026-05-13 16:46:09

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Cisco #CyberSecurity #Edge #ICS #InfoSec #LUA #OTX #OpenThreatExchange #RAT #RaaS #RansomWare #Turkish #UK #bot #AlienVault

  8. Thus Spoke…The Gentlemen

    On May 4th, 2026, The Gentlemen RaaS administrator acknowledged that an internal backend database called Rocket had been leaked, exposing nine accounts including zeta88, the program's effective administrator. The leak revealed internal discussions detailing initial access methods through Fortinet and Cisco edge appliances, NTLM relay, and credential logs, along with the group's role divisions and toolsets. Evidence shows evaluation of CVEs including CVE-2024-55591, CVE-2025-32433, and CVE-2025-33073. Leaked ransom negotiations showed a successful payment of 190,000 USD. The group reused stolen data from a UK software consultancy to attack a Turkish company, employing dual-pressure tactics during negotiations. Analysis of ransomware samples identified eight distinct affiliate TOX IDs, indicating the administrator actively participates in infections alongside managing the RaaS program.

    Pulse ID: 6a04aad1cd2da41f0087f85d
    Pulse Link: otx.alienvault.com/pulse/6a04a
    Pulse Author: AlienVault
    Created: 2026-05-13 16:46:09

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Cisco #CyberSecurity #Edge #ICS #InfoSec #LUA #OTX #OpenThreatExchange #RAT #RaaS #RansomWare #Turkish #UK #bot #AlienVault

  9. Czy wtyczki do pobierania TikToków powinny zbierać tyle danych? Kampania 12 złośliwych rozszerzeń Chrome i Edge

    Badacze bezpieczeństwa z LayerX ujawnili kampanię obejmującą co najmniej 12 rozszerzeń do przeglądarek Chrome i Edge, które pod pozorem narzędzi do pobierania nagrań wideo z TikToka, zbierają dane o urządzeniach użytkowników. Dodatkowo dynamicznie pobierają konfigurację, dzięki czemu potencjalnie możliwe jest wprowadzanie zmian w działaniu wtyczki bez konieczności publikowania nowych wersji....

    #WBiegu #Chrome #Edge #Tiktok #Wtyczki

    sekurak.pl/czy-wtyczki-do-pobi

  10. Red Hat Device Edge now available to run on NVIDIA Jetson Orin #redhat #edge twp.ai/E5BpHY

  11. Red Hat Device Edge now available to run on NVIDIA Jetson Orin #redhat #edge twp.ai/E5BpHY

  12. Red Hat Device Edge now available to run on NVIDIA Jetson Orin #redhat #edge twp.ai/E5BpHY

  13. Modern Dresser Market in Germany | Report – IndexBox

    Germany Modern Dresser Market 2026 Analysis and Forecast to 2035 Executive Summary Key Findings Germany’s modern dres…
    #Germany #DE #Europe #EU #Europa #Bedroomaestheticanchorpiece #Bedroomclothingstorage #Bedroomorganization #CAD/CAMfordesignandcutting #CNCMachining #consumergoodsmarketreport #E-commerceconfigurators&ARroomvisualization #Edge-bandingtechnology #forecast #marketanalysis #moderndresser
    europesays.com/germany/12871/

  14. Interesting initiative from mobile operators in Europe for a federated edge cloud.
    alertify.eu/european-edge-cont
    #eu #cloud #edge #mobile

  15. #edge : the thin cutting side of the blade of an instrument

    - French: fil

    - German: die Kante

    - Italian: canto

    - Portuguese: borda

    - Spanish: filo

    ------------

    A daily challenge to chain words together @ wordwallgame.com

  16. Needle: Inside a Modular Crypto-Stealing C2 That Left Its Keys in the Malware

    A modular Malware-as-a-Service crypto-stealing platform called Needle has been discovered actively targeting cryptocurrency wallets through two main attack vectors: a browser extension spoofer targeting MetaMask, Phantom, and Trust Wallet, and a Rust-based desktop agent impersonating Exodus, Trezor, and Ledger applications. The campaign compromised 1,932 victims, including 111 browser extension users and 1,821 desktop sessions. The Rust agent embedded its C2 API key without protection, enabling complete enumeration of victims and withdrawal configurations across six blockchains. The operator's EVM hot wallet moved approximately $148 in ETH to cold storage. The panel's React SPA performed authentication entirely client-side, and the same credential used by infected machines could potentially redirect future auto-withdrawals. Infrastructure is hosted on ASN 202412, a known bulletproof hosting provider in Amsterdam.

    Pulse ID: 6a0198399994be750fe044cd
    Pulse Link: otx.alienvault.com/pulse/6a019
    Pulse Author: AlienVault
    Created: 2026-05-11 08:50:01

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #BlockChain #Browser #CyberSecurity #Edge #InfoSec #Mac #Malware #MalwareAsAService #OTX #OpenThreatExchange #RAT #Rust #bot #cryptocurrency #AlienVault

  17. I continue working on my #QualityAssurance portfolio project and next step is a combo of manual and automated #a11y testing

    So I updated the four major browsers and spent 15 minutes just to disable all #ai features in #chrome and #edge, while #firefox allows me to do it with one “kill switch”

    How are you kicking off your week 🫠

  18. Researchers found Microsoft Edge loads every saved password into plaintext memory at launch, increasing exposure after session compromise 🔐
    Unlike other Chromium browsers, Edge keeps credentials readable in RAM, raising scraping risks on shared and admin-access systems 🛡️

    🔗 proton.me/business/blog/micros

    #TechNews #Browser #MicrosoftEdge #Microsoft #Edge #Cybersecurity #PasswordManager #Privacy #FOSS #OpenSource #Security #Encryption #Windows #Passwords #DataProtection #Infosec

  19. RE: mastodon.social/@ReginaMuehlic

    The (Microsofts) Edge Password Manager unencrypts all saved passwords into the memory directly when the browser starts. The passwords are there in plain text, even before you have even visited the associated websites.

    Mastodon translate of below.

    #privacy #plannedIncompetence #microsoft #windows #edge

  20. ZDNet: Why Edge stores your passwords in plaintext, according to Microsoft. “A security researcher found that Edge stores your plaintext passwords in memory when you use the browser to manage them. In a social media post, researcher Tom Jøran Sønstebyseter Rønning explained how the process works and posted a video showing it in action.”

    https://rbfirehose.com/2026/05/07/zdnet-why-edge-stores-your-passwords-in-plaintext-according-to-microsoft/
  21. Microsoft Edge keeps all saved passwords in cleartext in RAM for the entire session, making memory scraping easier for attackers 🖥️
    The behavior is “by design,” unlike Chrome, and highlights the risks of storing credentials in browsers instead of using password managers 🔑

    🔗 cybernews.com/security/microso

    #TechNews #Microsoft #MicrosoftEdge #Edge #Google #Chrome #Browser #Password #CyberSecurity #FOSS #Privacy #Encryption #DigitalSafety #MFA #PasswordManager #Passkeys #Software #InfoSec #Security #RAM

  22. FakeWallet crypto stealer spreading in the App Store

    In March 2026, over twenty phishing applications were discovered in the Apple App Store masquerading as popular cryptocurrency wallets. These malicious apps redirect users to browser pages distributing trojanized versions of legitimate wallets engineered to steal recovery phrases and private keys. The campaign has been active since at least fall 2025, targeting major wallets including MetaMask, Ledger, Trust Wallet, Coinbase, TokenPocket, imToken, and Bitpie. The infected apps use iOS provisioning profiles for installation and employ library injection techniques to hijack legitimate code. The threat primarily targets users in China where official crypto wallet apps are regionally restricted. Some infected apps also contained SparkKitty modules, suggesting possible links between threat actors. The malware exfiltrates stolen credentials using RSA encryption to command-and-control servers.

    Pulse ID: 69e64149d8dcee0acea28f7f
    Pulse Link: otx.alienvault.com/pulse/69e64
    Pulse Author: AlienVault
    Created: 2026-04-20 15:07:53

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Browser #China #CyberSecurity #Edge #Encryption #InfoSec #Malware #OTX #OpenThreatExchange #Phishing #PoC #RAT #Rust #Trojan #bot #cryptocurrency #iOS #AlienVault

  23. FakeWallet crypto stealer spreading in the App Store

    In March 2026, over twenty phishing applications were discovered in the Apple App Store masquerading as popular cryptocurrency wallets. These malicious apps redirect users to browser pages that distribute trojanized versions of legitimate wallets designed to steal recovery phrases and private keys. The campaign primarily targets users in China, exploiting regional restrictions that prevent official crypto wallet apps from being available in the Chinese App Store. Attackers use typosquatting and fake promotional materials to deceive users. The infected applications leverage iOS enterprise provisioning profiles for distribution and employ various techniques including malicious library injection and source code modification. The campaign has been active since at least fall 2025 and targets major wallets including MetaMask, Ledger, Trust Wallet, Coinbase, TokenPocket, imToken, and Bitpie. Some infected apps also contained SparkKitty modules, suggesting potential links between threat actors.

    Pulse ID: 69e5ff33953b2bfaa5b6c105
    Pulse Link: otx.alienvault.com/pulse/69e5f
    Pulse Author: AlienVault
    Created: 2026-04-20 10:25:55

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Browser #China #Chinese #CyberSecurity #Edge #InfoSec #OTX #OpenThreatExchange #Phishing #PoC #RCE #Rust #Trojan #TypoSquatting #bot #cryptocurrency #iOS #AlienVault