lemmydev2 Bot

@[email protected]

I pulse the truth from a Dittybopper instance to this community

This profile is from a federated server and may be incomplete. View on remote instance

Cyber risk is becoming a hold-period problem for private equity firms ( www.helpnetsecurity.com )

Private equity firms have spent years treating cybersecurity as an IT hygiene issue inside portfolio companies. That approach is getting harder to sustain as ransomware, data theft, and regulatory pressure interfere with value creation during the hold period. Has cybersecurity risk had any financial impact on your portfolio ...

Apple patches decade-old iOS zero-day, possibly exploited by commercial spyware ( www.theregister.com )

Flaw abused 'in an extremely sophisticated attack against specific targeted individuals' Apple patched a zero-day vulnerability affecting every iOS version since 1.0, used in what the company calls an "extremely sophisticated attack" against targeted individuals.…

Java security work is becoming a daily operational burden ( www.helpnetsecurity.com )

Security teams in large enterprises already spend significant time tracking vulnerabilities across software supply chains, third-party libraries, and internal codebases. Java environments add another layer of exposure because so many mission-critical systems still run on the JVM. A 2026 Azul survey of more than 2,000 Java ...

Notepad's new Markdown powers served with a side of remote code execution ( www.theregister.com )

Smug faces across all those who opposed the WordPad-ification of Microsoft's humble text editor Just months after Microsoft added Markdown support to Notepad, researchers have found the feature can be abused to achieve remote code execution (RCE).…

That “summarize with AI” button might be manipulating you ( www.helpnetsecurity.com )

Microsoft security researchers discovered a growing trend of AI memory poisoning attacks used for promotional purposes, referred to as AI Recommendation Poisoning. The MITRE ATLAS knowledge base classifies this behavior as AML.T0080: Memory Poisoning. The activity focuses on shaping future recommendations by inserting prompts ...

Payroll pirates are conning help desks to steal workers' identities and redirect paychecks ( www.theregister.com )

Attackers using social engineering to exploit business processes, rather than tunnelling in via tech Exclusive  When fraudsters go after people's paychecks, "every employee on earth becomes a target," according to Binary Defense security sleuth John Dwyer.…

Why ‘deleted’ doesn’t mean gone: How police recovered Nancy Guthrie’s Nest Doorbell footage ( www.theverge.com )

FBI Director Kash Patel said yesterday that investigators recovered footage from Savannah Guthrie's mother's doorbell camera using "residual data located in backend systems." This claim has many home security camera users asking an uncomfortable question: Is your data really gone when you hit delete? When Nancy Guthrie went ...

Posting AI-generated caricatures on social media is risky, infosec killjoys warn ( www.theregister.com )

The more you share online, the more you open yourself to social engineering If you've seen the viral AI work pic trend where people are asking ChatGPT to "create a caricature of me and my job based on everything you know about me" and sharing it to social, you might think it's harmless. You'd be wrong.…

Volvo Group hit in massive Conduent data breach ( securityaffairs.com )

A Conduent breach exposed data of nearly 17,000 Volvo Group North America employees as the total impact rises to 25 million people. A data breach at business services provider Conduent has impacted at least 25 million people, far more than initially reported. Volvo Group North America confirmed that the security breach exposed ...

Devilish devs spawn 287 Chrome extensions to flog your browser history to data brokers ( www.theregister.com )

Add-ons with 37M installs leak visited URLs to 30+ recipients, researcher says They know where you've been and they're going to share it. A security researcher has identified 287 Chrome extensions that allegedly exfiltrate browsing history data for an estimated 37.4 million installations.…

Should CISOs Plan for Government as an Adversary? ( www.bankinfosecurity.com )

Why Modern Threat Modeling Must Account for State Control of InfrastructureCISOs for decades viewed governments as partners. That assumption is weakening. Today, state control over infrastructure needs be part of threat modeling and business continuity planning for global security leaders - and it's time for CISOs to reassess ...

Norway Says Salt Typhoon Hackers Hit Vulnerable Systems ( www.bankinfosecurity.com )

Security Service Says China-Linked Actor Compromised Vulnerable Network DevicesNorway's security service confirmed it was targeted by the China-linked Salt Typhoon campaign, marking one of Europe’s clearest public acknowledgements that the cyberespionage operation extended beyond U.S. telecom and federal networks into allied ...

Sanctioned Bulletproof Host Tied to DNS Hijacking ( www.bankinfosecurity.com )

Shadow Aeza International Directed Traffic to Malicious AdtechA financially motivated threat actor hacked dozens of domain name system resolvers, connecting them to the infrastructure of a Russian bulletproof hosting service sanctioned by the U.S. Department of Treasury for its criminal links, researchers found.

Dutch data watchdog snitches on itself after getting caught in Ivanti zero-day attacks ( www.theregister.com )

Staff data belonging to the regulator and judiciary's governing body accessed The Dutch Data Protection Authority (AP) says it was one of the many organizations popped when attackers raced to exploit recent Ivanti vulnerabilities as zero-days.…

Password guessing without AI: How attackers build targeted wordlists ( www.bleepingcomputer.com )

Attackers don't need AI to crack passwords, they build targeted wordlists from an organization's own public language. This article explains how tools like CeWL turn websites into high-success password guesses and why complexity rules alone fall short. [...]

European Commission hit by cyberattackers targeting mobile management platform ( www.helpnetsecurity.com )

The European Commission’s mobile device management platform was hacked but the incident was swiftly contained and no compromise of mobile devices was detected, EU’s executive branch announced on Friday. The intrusion was detected on January 30, 2026, by CERT-EU, the cybersecurity team protecting all European Union ...

Payments platform BridgePay confirms ransomware attack behind outage ( www.bleepingcomputer.com )

A major U.S. payment gateway and solutions provider says a ransomware attack has knocked key systems offline, triggering a widespread outage affecting multiple services. The incident began on Friday and quickly escalated into a nationwide disruption across BridgePay's platform. [...]