Cheryl Babcock
@blackasphodel.bsky.social
📤 76
📥 120
📝 102
Cybersecurity ninja, too many food allergies, nerd of many flavors
I was diagnosed with alpha-gal about 3 month ago, and my allergist tested a bunch of my existing allergies to see how it affected me. Apparently this has reversed my dairy allergy I have had since BIRTH. Bodies are weird, but I guess thank you Random Tick for giving me cheese back?!
3 months ago
1
0
0
www.bleepingcomputer.com/news/securit...
loading . . .
Max severity Argo CD API flaw leaks repository credentials
An Argo CD vulnerability allows API tokens with even low project-level get permissions to access API endpoints and retrieve all repository credentials associated with the project.
https://www.bleepingcomputer.com/news/security/max-severity-argo-cd-api-flaw-leaks-repository-credentials/
3 months ago
0
1
0
reposted by
Cheryl Babcock
Hacker News Top Stories
3 months ago
Zuckerberg Caught in Revealing Hot Mic Moment During White House Dinner |
Discussion
loading . . .
https://www.pcmag.com/news/zuckerberg-caught-in-revealing-hot-mic-moment-during-white-house-dinner
0
2
3
The Meta chatbot *invited him to a real location to meet*. What the ever living dystopian fuck.
www.reuters.com/investigates...
loading . . .
A flirty Meta AI bot invited a retiree to meet. He never made it home.
Impaired by a stroke, a man fell for a Meta chatbot originally created with Kendall Jenner. His death spotlights Metaâs AI rules, which let bots tell falsehoods.
https://www.reuters.com/investigates/special-report/meta-ai-chatbot-death/?utm_medium=Social&utm_source=Facebook
3 months ago
2
2
0
Just found out I have Alpha-gal now.
@foodallergyscience.org
do you have any research going on into that?
4 months ago
1
0
0
Because most of us have used Notepad++ at one time or another. Note while the article calls out updating to 8.8.2 its still a release candidate so it's a manual update.
socprime.com/blog/cve-202...
loading . . .
CVE-2025-49144 Vulnerability: Critical Privilege Escalation Flaw in Notepad++ Leads to Full System Takeover | SOC Prime
Explore details for CVE-2025-49144, a privilege escalation vulnerability affecting Notepad++, with in-depth analysis in the SOC Prime blog.
https://socprime.com/blog/cve-2025-49144-notepad-vulnerability/
5 months ago
0
2
0
reposted by
Cheryl Babcock
Johnny Xmas
5 months ago
CVEs and ATT&CK TTPs currently being seen in use in the wild by known Iranian threat groups:
0
4
3
Lots of stuff down today...
add a skeleton here at some point
6 months ago
0
0
0
apnews.com/article/ai-s...
loading . . .
Scammers are using AI to enroll fake students in online classes, then steal college financial aid
Financial aid fraud is exploding, thanks to the rise of artificial intelligence. Crime rings are deploying “ghost students” — chatbots who enroll in online college classes and stay just long enough to...
https://apnews.com/article/ai-scam-college-financial-aid-identity-theft-aa1bc8bcb4c368ee6bafcf6a523c5fb2
6 months ago
0
0
0
localmess.github.io
loading . . .
Covert Web-to-App Tracking via Localhost on Android
https://localmess.github.io/
6 months ago
0
0
0
reposted by
Cheryl Babcock
Gwen Snyder is uncivil
6 months ago
Someone else said something very similar to this the other day, but. It really burns me that our (millennials') generation was legally terrorized for like, downloading Radiohead discographies But we're supposed to be ok with billionaires stealing human intellectual output in its entirety bc AI
113
13349
4576
reposted by
Cheryl Babcock
Hacker News Top Stories
6 months ago
Google Is Using AI to Censor Independent Websites Like Mine |
Discussion
loading . . .
Google is Using AI to Censor Independent Websites
My letter to the FTC explaining how Google is using AI to censor thousands of independent websites - and to control the flow of information online.
https://travellemming.com/perspectives/ftc-letter-google-censors-indie-publishers-with-ai/
0
0
1
reposted by
Cheryl Babcock
BleepingComputer
6 months ago
The Chinese APT41 hacking group uses a new malware named 'ToughProgress' that abuses Google Calendar for command-and-control (C2) operations, hiding malicious activity behind a trusted cloud service.
loading . . .
APT41 malware abuses Google Calendar for stealthy C2 communication
The Chinese APT41 hacking group uses a new malware named 'ToughProgress' that abuses Google Calendar for command-and-control (C2) operations, hiding malicious activity behind a trusted cloud service.
https://www.bleepingcomputer.com/news/security/apt41-malware-abuses-google-calendar-for-stealthy-c2-communication/
0
3
7
reposted by
Cheryl Babcock
nixCraft
6 months ago
Pro tip: Are you using Ublock Origin? Add "google.com##.hdzaWe" without quotes to your Ublock Origin My Filters to block the google AI overview and apply changes.
10
224
96
reposted by
Cheryl Babcock
Hacker News Top Stories
6 months ago
The Windows Subsystem for Linux is now open source |
Discussion
loading . . .
The Windows Subsystem for Linux is now open source
Today we’re very excited to announce the open-source release of the Windows Subsystem for Linux. This is the result of a multiyear effort to prepare for this, and a great closure to the first ever issue raised on the Microsoft/WSL repo:
https://blogs.windows.com/windowsdeveloper/2025/05/19/the-windows-subsystem-for-linux-is-now-open-source/
0
4
1
Saw this on
@cyberciti.biz
's FB page...life of a web app tester lol
6 months ago
0
0
0
reposted by
Cheryl Babcock
BleepingComputer
6 months ago
Tor has announced Oniux, a new command-line tool for routing any Linux application securely through the Tor network for anonymized network connections.
loading . . .
New Tor Oniux tool anonymizes any Linux app's network traffic
Tor has announced Oniux, a new command-line tool for routing any Linux application securely through the Tor network for anonymized network connections.
https://www.bleepingcomputer.com/news/security/new-tor-oniux-tool-anonymizes-any-linux-apps-network-traffic/
0
7
4
Supply. Chain. Security. Can’t. Be. An. Afterthought
add a skeleton here at some point
7 months ago
0
0
0
reposted by
Cheryl Babcock
Hacker News Top Stories
7 months ago
Curl: We still have not seen a single valid security report done with AI help |
Discussion
loading . . .
#hackerone #curl | Daniel Stenberg | 184 comments
That's it. I've had it. I'm putting my foot down on this craziness. 1. Every reporter submitting security reports on #Hackerone for #curl now needs to answer this question: "Did you use an AI to find the problem or generate this submission?" (and if they do select it, they can expect a stream of proof of actual intelligence follow-up questions) 2. We now ban every reporter INSTANTLY who submits reports we deem AI slop. A threshold has been reached. We are effectively being DDoSed. If we could, we would charge them for this waste of our time. We still have not seen a single valid security report done with AI help. | 184 comments on LinkedIn
https://www.linkedin.com/posts/danielstenberg_hackerone-curl-activity-7324820893862363136-glb1
0
1
1
Yeah let’s cut things when cyber attacks are becoming more sophisticated 😑
add a skeleton here at some point
7 months ago
0
3
0
That feeling when you go and look up the URL for documentation for YARA-L and the Google AI helpfully(?) gives you an example rule for detecting ‘minicats’
7 months ago
0
1
0
reposted by
Cheryl Babcock
Lesley Carhart
7 months ago
Sign your names or you're a toaster, American cyber pros.
https://www.eff.org/press/releases/eff-leads-prominent-security-experts-urging-trump-administration-leave-chris-krebs
17
92
47
One of my SOC team sent me this:
cybersecuritynews.com/microsoft-de...
TLDR: the false positive means tons of private Adobe documents were sent to Any.Runs public sandbox for analysis. They are marking all those docs private to reduce spillage but people keep uploading....
loading . . .
Microsoft Defender XDR False Positive Leads to Massive Data Leak of 1,700+ Sensitive Documents
ANY.RUN research identified a large-scale data leak event triggered by a false positive in Microsoft Defender XDR. The security platform incorrectly flagged benign files as malicious, leading to their...
https://cybersecuritynews.com/microsoft-defender-xdr-false-positive-leads-to-massive-data-leak/
7 months ago
0
1
1
SANS has put out a checklist for developers to write more secure web apps. The biggest strength is a link to CWEs for each item to provide more detail.
www.sans.org/cloud-securi...
loading . . .
Security Checklist for Web Application | SANS Institute
SWAT Checklist from SANS Securing the App. The first step toward building a base of secure knowledge around web application security.
https://www.sans.org/cloud-security/securing-web-application-technologies/
7 months ago
0
1
0
reposted by
Cheryl Babcock
BleepingComputer
7 months ago
Cisco has released security updates for a high-severity Webex vulnerability that allows unauthenticated attackers to gain client-side remote code execution using malicious meeting invite links.
loading . . .
Cisco Webex bug lets hackers gain code execution via meeting links
Cisco has released security updates for a high-severity Webex vulnerability that allows unauthenticated attackers to gain client-side remote code execution using malicious meeting invite links.
https://www.bleepingcomputer.com/news/security/cisco-webex-bug-lets-hackers-gain-code-execution-via-meeting-links/
0
5
6
The CVE database is being shutdown tomorrow per Brian Krebs. This is asinine. Cybersecurity depends on it. The OSV (
osv.dev/list
) is an alternative but it's sponsored by Google so who knows when they will shut it down.
www.linkedin.com/feed/update/...
loading . . .
MITRE has announced that its funding for the Common Vulnerabilities and… | Brian Krebs | 332 comments
MITRE has announced that its funding for the Common Vulnerabilities and Exposures (CVE) program and related programs, including the Common Weakness Enumeration Program, will expire on April 16. The ...
https://www.linkedin.com/feed/update/urn:li:activity:7318006192021143554/
7 months ago
1
1
1
reposted by
Cheryl Babcock
BleepingComputer
7 months ago
Car rental giant Hertz Corporation warns it suffered a data breach after customer data for its Hertz, Thrifty, and Dollar brands was stolen in the Cleo zero-day data theft attacks.
loading . . .
Hertz confirms customer info and drivers' licenses stolen in data breach
Car rental giant Hertz Corporation warns it suffered a data breach after customer data for its Hertz, Thrifty, and Dollar brands was stolen in the Cleo zero-day data theft attacks.
https://www.bleepingcomputer.com/news/security/hertz-confirms-customer-info-and-drivers-licenses-stolen-in-data-breach/
0
8
6
This is one reason why poor developer supply chain security is one of my biggest pet peeves. TLDR: AI makes up package names, hackers take advantage of that and create malicious packages with those hallucinated names. You download, get pwned.
www.theregister.com/AMP/2025/04/...
loading . . .
LLMs can't stop making up software dependencies and sabotaging everything
: Hallucinated package names fuel 'slopsquatting'
https://www.theregister.com/AMP/2025/04/12/ai_code_suggestions_sabotage_supply_chain/
7 months ago
0
0
0
add a skeleton here at some point
8 months ago
0
0
0
cyberinsider.com/security-fir...
loading . . .
Security Firm APIsec Exposed 3TB of Sensitive Customer Data
A misconfigured Elasticsearch database belonging to APIsec.ai was discovered leaking over three terabytes of highly sensitive customer data.
https://cyberinsider.com/security-firm-apisec-exposed-3tb-of-sensitive-customer-data/
8 months ago
0
0
0
reposted by
Cheryl Babcock
rstevens 👻💨
8 months ago
remember this well, inter-net users: tomorrow is april fool’s day and that shit wasn’t funny twenty-five years BEFORE stupid AI image generators existed
12
1036
383
Wordpress. Again. This is getting as bad as Adobe products back in the day :P
add a skeleton here at some point
8 months ago
1
0
0
Here's an amicus brief being filed to ensure Seniors get celiac-safe food in care homes. This is hugely important to anyone who has the disease, but also should be expanded to hospitals for ANY celiac.
nationalceliac.org/wp-content/u...
loading . . .
https://nationalceliac.org/wp-content/uploads/2025/03/Press-Release-for-Amicus-Brief.pdf
8 months ago
1
2
1
Fighting back against AI crawlers:
techcrunch.com/2025/03/27/o...
8 months ago
0
0
0
reposted by
Cheryl Babcock
Hacker News Top Stories
8 months ago
GitHub CodeQL Actions Critical Supply Chain Vulnerability (CodeQLEAKED)
Discussion
loading . . .
CodeQLEAKED - Public Secrets Exposure Leads toSupply Chain Attack on GitHub CodeQL
An exposed GitHub token could have been used to launch a supply chain attack on GitHub CodeQL, resulting in source code exposure and repository tampering of CodeQL users.
https://www.praetorian.com/blog/codeqleaked-public-secrets-exposure-leads-to-supply-chain-attack-on-github-codeql/
0
1
1
Nothing says happy Sunday morning like reporting a security bug to the software company that runs your doctor's patient portal system 😑 This one is so dumb too.
8 months ago
0
1
0
reposted by
Cheryl Babcock
Hacker News Top Stories
8 months ago
Everyone knows all the apps on your phone
Discussion
loading . . .
Everyone knows all the apps on your phone
Until a few years ago, any app you installed on an Android device could see all other apps on your phone without your permission.
https://peabee.substack.com/p/everyone-knows-what-apps-you-use
0
3
1
reposted by
Cheryl Babcock
Hacker News Top Stories
8 months ago
OSS-SEC: Three bypasses of Ubuntu's unprivileged user namespace restrictions
Discussion
loading . . .
oss-sec: Three bypasses of Ubuntu's unprivileged user namespace restrictions
https://seclists.org/oss-sec/2025/q1/253
0
2
1
Assuming this is what @rachelonthebay was referring to the other day
add a skeleton here at some point
8 months ago
0
0
0
Me, playing Xenoblade Chronicles X for the first time: “Wow, that looks like the spaceship wreckage I’m supposed to find.” Me, moments after being stomped by a level 60 robot: “That was definitely NOT spaceship wreckage.”
8 months ago
1
2
0
Who’s got a Chromebook?
cloudisland.nz/@rmi/1142198...
loading . . .
Rob Isaac (@
[email protected]
)
Today Google bricked my Chromebook by force-installing a hidden extension that trains a machine vision model on the contents of my screen without my consent, making the whole machine too hot to touch,...
https://cloudisland.nz/@rmi/114219847307106213
8 months ago
0
0
0
reposted by
Cheryl Babcock
BleepingComputer
8 months ago
A breach at Oracle Health impacts multiple US healthcare organizations and hospitals after a threat actor stole patient data from legacy servers. This is not related to the alleged Oracle Cloud breach.
www.bleepingcomputer.com/news/securit...
loading . . .
Oracle Health breach compromises patient data at US hospitals
A breach at Oracle Health impacts multiple US healthcare organizations and hospitals after a threat actor stole patient data from legacy servers.
https://www.bleepingcomputer.com/news/security/oracle-health-breach-compromises-patient-data-at-us-hospitals/
0
2
3
reposted by
Cheryl Babcock
BleepingComputer
8 months ago
Vivaldi has announced the integration of Proton VPN directly into its browser without requiring add-on downloads or plugin activations, allowing users to protect their data against 'Big Tech' surveillance for free.
loading . . .
Vivaldi integrates Proton VPN into the browser to fight web tracking
Vivaldi has announced the integration of Proton VPN directly into its browser without requiring add-on downloads or plugin activations, allowing users to protect their data against 'Big Tech' surveillance for free.
https://www.bleepingcomputer.com/news/software/vivaldi-integrates-proton-vpn-into-the-browser-to-fight-web-tracking/
2
7
4
Oops
add a skeleton here at some point
8 months ago
0
0
0
The concern is what happens to your data if 23+Me goes under or sells out...Even if you aren't in CA worth checking out if you did the tests.
oag.ca.gov/news/press-r...
loading . . .
Attorney General Bonta Urgently Issues Consumer Alert for 23andMe Customers
Californians have the right to direct the company to delete their genetic data OAKLAND — California Attorney General Rob Bonta today issued a consumer alert to customers of 23andMe, a genetic testing ...
https://oag.ca.gov/news/press-releases/attorney-general-bonta-urgently-issues-consumer-alert-23andme-customers
8 months ago
1
0
0
reposted by
Cheryl Babcock
Best of r/cybersecurity
8 months ago
Decrypting Encrypted files from Akira Ransomware (Linux/ESXI variant 2024) using a bunch of GPUs -- "I recently helped a company recover their data from the Akira ransomware without paying the ransom. I’m sharing how I did it, along with the full source code."
loading . . .
Decrypting Encrypted files from Akira Ransomware (Linux/ESXI variant 2024) using a bunch of GPUs -- "I recently helped a company recover their data from the Akira ransomware without paying the ransom. I’m sharing how I did it, along with the full source code."
View post on Reddit.
https://reddit.com/r/cybersecurity/comments/1jf4s3i/
0
8
2
reposted by
Cheryl Babcock
BleepingComputer
8 months ago
A critical remote code execution (RCE) vulnerability in Apache Tomcat tracked as CVE-2025-24813 is actively exploited in the wild, enabling attackers to take over servers with a simple PUT request.
loading . . .
Critical RCE flaw in Apache Tomcat actively exploited in attacks
A critical remote code execution (RCE) vulnerability in Apache Tomcat tracked as CVE-2025-24813 is actively exploited in the wild, enabling attackers to take over servers with a simple PUT request.
https://www.bleepingcomputer.com/news/security/critical-rce-flaw-in-apache-tomcat-actively-exploited-in-attacks/
0
4
5
reposted by
Cheryl Babcock
BleepingComputer
8 months ago
A supply chain attack on the widely used 'tj-actions/changed-files' GitHub Action, used by 23,000 repositories, potentially allowed threat actors to steal CI/CD secrets from GitHub Actions build logs.
loading . . .
Supply chain attack on popular GitHub Action exposes CI/CD secrets
A supply chain attack on the widely used 'tj-actions/changed-files' GitHub Action, used by 23,000 repositories, potentially allowed threat actors to steal CI/CD secrets from GitHub Actions build logs.
https://www.bleepingcomputer.com/news/security/supply-chain-attack-on-popular-github-action-exposes-ci-cd-secrets/
0
1
2
reposted by
Cheryl Babcock
Hacker News Top Stories
8 months ago
Popular GitHub Action tj-actions/changed-files is compromised
Discussion
loading . . .
Semgrep | 🚨 Popular GitHub Action tj-actions/changed-files is compromised
Popular GitHub Action tj-actions/changed-files has been compromised with a payload that appears to attempt to dump secrets, impacting thousands of CI pipelines.
https://semgrep.dev/blog/2025/popular-github-action-tj-actionschanged-files-is-compromised/
0
0
1
reposted by
Cheryl Babcock
Hacker News Top Stories
8 months ago
Everything you say to your Echo will be sent to Amazon starting on March 28
Discussion
loading . . .
Everything you say to your Echo will be sent to Amazon starting on March 28
Amazon is killing a privacy feature to bolster Alexa+, the new subscription assistant.
https://arstechnica.com/gadgets/2025/03/everything-you-say-to-your-echo-will-be-sent-to-amazon-starting-on-march-28/
0
2
2
Load more
feeds!
log in