Normal view
-
ZDNet | security RSS
- 5 gadgets I'm buying this spring to grow my green thumb (and they're still discounted)
-
/r/netsec - Information Security News & Discussion
- Exploiting AQL Injection Vulnerabilities in ArangoDB
Exploiting AQL Injection Vulnerabilities in ArangoDB
-
ZDNet | security RSS
- This DeWalt cordless power tool set is nearly 50% off on Amazon - and I can vouch for it
This DeWalt cordless power tool set is nearly 50% off on Amazon - and I can vouch for it
China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks
-
ZDNet | security RSS
- The most popular Amazon Spring Sale deals may surprise you - and there's still time to shop
The most popular Amazon Spring Sale deals may surprise you - and there's still time to shop
Best Amazon Spring Sale robot vacuum deals 2026 - last call for savings
-
/r/netsec - Information Security News & Discussion
- The Age-Gated Internet: Child Safety, Identity Infrastructure, and the Not So Quiet Re-Architecting of the Web
The Age-Gated Internet: Child Safety, Identity Infrastructure, and the Not So Quiet Re-Architecting of the Web
In enterprise environments, identity effectively became the control plane once network perimeters broke down (e.g. zero trust, et cetera).
Iβm seeing a similar pattern emerging on the public internet via age verification and safety regulation, but with identity moving closer to the access layer itself.
Not just: βAre you over 18?β
But: identity assertions are becoming part of how access is granted at the OS/device/app store level.
From a security perspective, this seems to introduce some new attack surfaces:
- high-value identity tokens at the OS/device level
- new trust boundaries between apps, OS, and third-party verifiers
- incentives to target device compromise or token reuse rather than account-level bypass
- potential centralisation of identity providers as enforcement points
Questions Iβm trying to think through:
- Does this effectively make identity providers the new perimeter/control plane?
- How would you model this system (closer to DRM, identity federation, or something else?)
- What are the likely failure modes if this layer becomes centralised?
- Are decentralised / on-device credentials actually viable from a security standpoint, or do they just shift the attack surface?
Curious how people here would threat model this or where the obvious breakpoints are.
[link] [comments]
What I Learned from a $2,000 Pen Test
A $20 Billion Crypto Scam Market Faces a New Government Crackdown
This smart desktop charger is a WFH staple for me - and 40% off right now
Why YouTube with ads just isn't worth it for me anymore - even if it's free
Using a VPN May Subject You to NSA Spying
Claude Extension Flaw Enabled Zero-Click XSS Prompt Injection via Any Website
-
/r/netsec - Information Security News & Discussion
- Making NTLM-Relaying Relevant Again by Attacking Web Servers with WebRelayX
Making NTLM-Relaying Relevant Again by Attacking Web Servers with WebRelayX
NTLM-Relaying has been proclaimed dead a number of times, signing requirements for SMB and LDAP make it nearly impossible to use captured NTLM authentications anymore. However, it is still possible to relay to many webservers that do not enforce Extended Protection for Authentication (not just ADCS / ESC8).
[link] [comments]
Masters of Imitation: How Hackers and Art Forgers Perfect the Art of Deception
Brit lawmaker targeted by AI deepfake fails to get answers from US Big Tech
Appearing before Parliament, Meta, Google and X struggle to explain how fake political video circulated for so long
A member of the UK Parliament's lower house who was the victim of a deepfake AI campaign this week had a rare chance to confront the Big Tech executives who helped spread it. Their answers disappointed.β¦
-
The Hacker News
- ThreatsDay Bulletin: PQC Push, AI Vuln Hunting, Pirated Traps, Phishing Kits & 20 More Stories
ThreatsDay Bulletin: PQC Push, AI Vuln Hunting, Pirated Traps, Phishing Kits & 20 More Stories
[Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks
Coruna iOS Kit Reuses 2023 Triangulation Exploit Code in Recent Mass Attacks
-
ZDNet | security RSS
- I found the 3 best last minute tech deals under $100 during Amazon's Spring Sale