Microsoft rebuilt Windows Recall from scratch. A researcher broke it again in a few weeks. Microsoft's response: that's not a vulnerability.
https://blog.ppb1701.com/the-zombie-that-wont-stay-dead
#microsoft #windows #security #recall #ai #copilot #userhostile #bigtech #blog #infosec
RE: https://flipboard.social/@TechDesk/116415287153075804
How can a federated network be down?
Oh wait 😆
@stux https://media4.giphy.com/media/v1.Y2lkPTc5MGI3NjExbWNhOWVsNGJwaDZjamE2ZTQya2RjcXZ3MmpvNmZtd2M2dW1odWw3bCZlcD12MV9pbnRlcm5hbF9naWZfYnlfaWQmY3Q9Zw/Py4loHkx4eo1O/giphy.gif
New. There's more, but this is getting too long.
Zscaler: Payouts King Takes Aim at the Ransomware Throne https://www.zscaler.com/blogs/security-research/payouts-king-takes-aim-ransomware-throne
Picus: CVE-2026-21643: Critical SQL Injection in Fortinet FortiClient EMS Exploited in the Wild https://www.picussecurity.com/resource/blog/cve-2026-21643-critical-sql-injection-in-fortinet-forticlient-ems-exploited-in-the-wild
Microsoft: Dissecting Sapphire Sleet’s macOS intrusion from lure to compromise https://www.microsoft.com/en-us/security/blog/2026/04/16/dissecting-sapphire-sleets-macos-intrusion-from-lure-to-compromise/
Sohos: QEMU abused to evade detection and enable ransomware delivery https://www.sophos.com/en-us/blog/qemu-abused-to-evade-detection-and-enable-ransomware-delivery @SophosXOps
Sekoia: From APT28 to RePythonNET: automating .NET malware analysis https://blog.sekoia.io/apt28-to-repythonnet-automating-net-malware-analysis/ @sekoia_io
Proopoint: Beyond the breach: inside a cargo theft actor’s post-compromise playbook https://www.proofpoint.com/us/blog/threat-insight/beyond-breach-inside-cargo-theft-actors-post-compromise-playbook
Group-IB: W3LL Unmasked https://www.group-ib.com/blog/w3ll-phishing-ecosystem-takedown/
Posted yesterday:
Halcyon: 44% and Rising: What the Automotive Industry's Ransomware Problem Tells Us About Where Attacks Are Heading https://www.halcyon.ai/blog/44-percent-and-rising-automotive-ransomware #infosec #threatresearch #ransomware #threatintel #threatintelligence #Python #Fortinet #SQL #Apple #macOS #Microsoft #cybercrime
32 years ago I started working on my first browser, Opera. I left Opera in 2011, but two years later I co-founded Vivaldi. Thus I have been making browsers now for 32 years, with a short break there between 2011 and 2013.
I have always felt that this work is important and no less today than before as more and more of you see the importance of alternatives to Big Tech.
Vivaldi is a European company with headquarters in Norway, servers in Iceland and team in Norway, Iceland, across Europe, Japan and a couple in the US.
We try our best to adapt to your needs. We build powerful browsers, with a lot of flexibility.
I welcome you to try us out and share with your friends!
#Windows #Macos #Linux #Android #iOS #TEchnology #EU #Europa #Norway #Iceland #Browser #Vivaldi #BigTech
Don't count on any privacy with this. Your pictures say a lot more about you than you know.
Endgadget: Gemini can now draw on your Google data to personalize the images it generates https://www.engadget.com/ai/gemini-can-now-draw-on-your-google-data-to-personalize-the-images-it-generates-160000269.html @Engadget #Google #Gemini #privacy
Hacking the EU Age Verification app in under 2 minutes.
During setup, the app asks you to create a PIN. After entry, the app encrypts it and saves it in the shared_prefs directory.
- It shouldn’t be encrypted at all - that’s a really poor design.
- It’s not cryptographically tied to the vault which contains the identity data.
So, an attacker can simply remove the PinEnc/PinIV values from the shared_prefs file and restart the app.
After choosing a different PIN, the app presents credentials created under the old profile and let’s the attacker present them as valid.
Other issues:
- Rate limiting is an incrementing number in the same config file. Just reset it to 0 and keep trying.
- “UseBiometricAuth” is a boolean, also in the same file. Set it to false and it just skips that step.
Seriously von der leyen - this product will be the catalyst for an enormous breach at some point. It’s just a matter of time. . Von Der Leyen “The European Age Verification app is technically ready. It respects the highest privacy standards in the world. It’s open-source, so anyone can check the code…”
I did. It didn’t take long to find what looks like a serious privacy issue.
The app goes to great lengths to protect the AV data AFTER collection (is_over_18: true is AES-GCM’d); it does so pretty well.
But, the source image used to collect that data is written to disk without encryption and not deleted correctly.
For NFC biometric data: It pulls DG2 and writes a lossless PNG to the filesystem. It’s only deleted on success. If it fails for any reason (user clicks back, scan fails & retries, app crashes etc), the full biometric image remains on the device in cache. This is protected with CE keys at the Android level, but the app makes no attempt to encrypt/protect them.
For selfie pictures: Different scenario. These images are written to external storage in lossless PNG format, but they’re never deleted. Not a cache… long-term storage. These are protected with DE keys at the Android level, but again, the app makes no attempt to encrypt/protect them.
This is akin to taking a picture of your passport/government ID using the camera app and keeping it just in case. You can encrypt data taken from it until you’re blue in the face… leaving the original image on disk is crazy & unnecessary.
From a GDPR standpoint: Biometric data collected is special category data. If there’s no lawful basis to retain it after processing, that’s potentially a material breach.
Source: Paul Moore(Security Consultant) X/Twitter, 2.
Bypassing EU Age Verification using their own infrastructure.I’ve ported the Android app logic to a Chrome extension - stripping out the pesky step of handing over biometric data which they can leak… and pass verification instantly.
Step 1: Install the extension Step 2: Register an identity (just once) Step 3: Continue using the web as normal
The extension detects the QR code, generates a cryptographically identical payload and tells the verifier I’m over 18, which it “fully trusts”.
This isn’t a bug… it’s a fundamental design flaw they can’t solve without irrevocably tying a key to you personally; which then allows tracking/monitoring.
Of course, I could skip the enrolment process entirely and hard-code the credentials into the extension… and the verifier would never know.
The research was published yesterday:
Manifold: Two Git Commands Fooled Claude Into Merging Malicious Code https://www.manifold.security/blog/spoofed-git-identity-ai-code-reviewer @axsharma
"Forged metadata made AI reviewer treat hostile changes as though they came from known maintainer."
The Register: Git identity spoof fools Claude into giving bad code the nod https://www.theregister.com/2026/04/16/git_identity_spoof_claude/ @theregister @carlypage #Anthropic #Claude #GitHub
Faster-Than-Light Travel: What's Actually Possible in 2026
Big Tech preaches privacy. Meanwhile the signal that says 'do not track' arrives at their servers and they issue a two-year cookie in response.
https://blog.ppb1701.com/read-receipt
#gpc #privacy #ccpa #cookies #google #meta #microsoft #userhostile #bigtech #blog
@jcrabapple mornin'
Big Tech preaches privacy. Meanwhile the signal that says 'do not track' arrives at their servers and they issue a two-year cookie in response.
https://blog.ppb1701.com/read-receipt
#gpc #privacy #ccpa #cookies #google #meta #microsoft #userhostile #bigtech #blog
PC Gamaer: Apple rubberstamps an open source driver to allow Nvidia GPUs to run on Macs, though gaming isn't on the table just yet https://www.pcgamer.com/hardware/graphics-cards/apple-rubberstamps-an-open-source-driver-to-allow-nvidia-gpus-to-run-on-macs-though-gaming-isnt-on-the-table-just-yet/ #Apple #Nvidia #opensource
It's like a bad dream that keeps coming back.
"My research shows that the vault is real, but the trust boundary ends too early.”
"The fundamental problem isn’t the crypto, the enclave, the authentication, or the PPL. It’s sending decrypted content to an unprotected process for rendering."
PC Gamer: Cybersecurity experts raise the alarm over Windows Recall again: 'The vault door is titanium. The wall next to it is drywall' https://www.pcgamer.com/software/security/cybersecurity-experts-raise-the-alarm-over-windows-recall-again-the-vault-door-is-titanium-the-wall-next-to-it-is-drywall/ #Microsoft #Windows #Recall #infosec
PC Gamer: 'In 10 years of tracking retail CPU sales, I have never seen such a steep decline,' says one tech channel after staring at the grim figures https://www.pcgamer.com/hardware/processors/in-10-years-of-tracking-retail-cpu-sales-i-have-never-seen-such-a-steep-decline-says-one-tech-channel-after-staring-at-the-grim-figures/ #AMD #Intel
A jury finds that Live Nation and Ticketmaster illegally maintained monopoly power in the ticketing market, in a case brought by state AGs after the DOJ settled (NBC News)
https://www.nbcnews.com/business/consumer/livenation-illegally-monopolized-ticketing-market-jury-antitrust-trial-rcna273714
http://www.techmeme.com/260415/p39#a260415p39
Dell has three high-severity advisories today:
- CVE-2026-23772: Security Update for Dell Storage Manager - Replay Manager for Microsoft Servers Vulnerabilities https://www.dell.com/support/kbdoc/en-us/000453020/dsa-2026-058-security-update-for-dell-storage-manager-replay-manager-for-microsoft-servers-vulnerabilities
- Several CVEs: Security Update for Dell Connectrix B-Series SANnav Vulnerabilities https://www.dell.com/support/kbdoc/en-us/000453015/dsa-2026-171-security-update-for-dell-connectrix-b-series-sannav-vulnerabilities
- Several CVEs: Security Update for Dell Secure Connect Gateway Policy Manager Multiple Third-Party Component Vulnerabilities https://www.dell.com/support/kbdoc/en-us/000441138/dsa-2026-120-security-update-for-dell-secure-connect-gateway-policy-manager-multiple-third-party-component-vulnerabilities #Dell #infosec #vulnerability
🔴 #HumpdayQandA and Live Coding! in 30 minutes at 5pm BST / 6pm CEST / 9am PDT today! Answering your #Flutter and #Dart questions with @simon, Randal, Danielle, John and Matthew Jones (Makerinator)
New.
Pluto Security: MCPwn: A CVSS 9.8 One-Line MCP Bug That Hands Over Your Nginx to Anyone on the Network – Actively Exploited in the Wild https://pluto.security/blog/mcp-bug-nginx-security-vulnerability-cvss-9-8/
More:
Security Week: Exploited Vulnerability Exposes Nginx Servers to Hacking https://www.securityweek.com/exploited-vulnerability-exposes-nginx-servers-to-hacking/ @SecurityWeek #infosec #vulnerability
OX Security: Anthropic's "By Design" Failure at the Heart of the AI Ecosystem https://20204725.hs-sites.com/the-mother-of-all-ai-supply-chains
More:
Security Week: Report: ‘By Design’ Flaw in MCP Could Enable Widespread AI Supply Chain Attacks https://www.securityweek.com/by-design-flaw-in-mcp-could-enable-widespread-ai-supply-chain-attacks/ @SecurityWeek #Anthropic #vulnerability #infosec #LLM #threatresearch