snabelen.no er en av mange uavhengige Mastodon-servere du kan bruke for å delta i det desentraliserte sosiale nettet.
Ein norsk heimstad for den desentraliserte mikroblogge-plattformen.

Administrert av:

Serverstatistikk:

359
aktive brukere

#hacking

91 innlegg71 deltakere5 innlegg i dag
securityaffairs<p>Critical Triofox bug exploited to run malicious payloads via AV configuration<br><a href="https://securityaffairs.com/184439/hacking/critical-triofox-bug-exploited-to-run-malicious-payloads-via-av-configuration.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/184439/hac</span><span class="invisible">king/critical-triofox-bug-exploited-to-run-malicious-payloads-via-av-configuration.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a></p>
The Japan Times<p>As Japan gears up for its busiest beer-drinking season, the country’s largest brewer is struggling to stay on tap — with its systems still crippled more than a month after a cyberattack disrupted its supply chain. <a href="https://www.japantimes.co.jp/business/2025/11/11/companies/asahi-cyberattack-struggle/?utm_medium=Social&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">japantimes.co.jp/business/2025</span><span class="invisible">/11/11/companies/asahi-cyberattack-struggle/?utm_medium=Social&amp;utm_source=mastodon</span></a> <a href="https://mastodon.social/tags/business" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>business</span></a> <a href="https://mastodon.social/tags/companies" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>companies</span></a> <a href="https://mastodon.social/tags/asahi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>asahi</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.social/tags/alcohol" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>alcohol</span></a> <a href="https://mastodon.social/tags/beer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>beer</span></a> <a href="https://mastodon.social/tags/askul" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>askul</span></a></p>
Hackaday<p>The Sanskrit Square Root Algorithm</p><p>Years ago, no math education was complete without understanding how to compute a square root. Today, you are probably just reaching for a calculator, or if you are writing a …read more<br><a href="https://masto.ai/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://masto.ai/tags/projects" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>projects</span></a><br><a href="https://hackaday.com/2025/11/10/the-sanskrit-square-root-algorithm/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/11/10/the-sa</span><span class="invisible">nskrit-square-root-algorithm/</span></a></p>
Packet-lost soul<p>Hello <a href="https://hispagatos.space/tags/hackers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackers</span></a>! I’ve added a new menu option to a privacy-friendly form to gauge interest in <a href="https://hispagatos.space/tags/hacker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacker</span></a> mentoring. This isn’t an academy; it’s a mentoring platform with some learning features focused on 1-on-1 guidance for people studying <a href="https://hispagatos.space/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> or <a href="https://hispagatos.space/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> at any level. The goal is to go beyond technical skills—exploring the culture and history of hacker culture while providing hands-on mentoring and support. <a href="https://learn2hack.today" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">learn2hack.today</span><span class="invisible"></span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/GlassWorm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GlassWorm</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> has resurfaced on the Open VSX registry<br><a href="https://securityaffairs.com/184427/malware/glassworm-malware-has-resurfaced-on-the-open-vsx-registry.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/184427/mal</span><span class="invisible">ware/glassworm-malware-has-resurfaced-on-the-open-vsx-registry.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a></p>
Lenin alevski 🕵️💻<p>Why is server management for LLMs so challenging? 🤔🛠️ </p><p>MCP Guardian simplifies the process by letting you manage, proxy, and secure MCP servers in real time. From approving tool calls to automated safety checks (coming soon), it’s designed to keep your AI's activity in check. Built with Rust and TypeScript, it's efficient and robust. </p><p><a href="https://infosec.exchange/tags/LLM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LLM</span></a> <a href="https://infosec.exchange/tags/ServerManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ServerManagement</span></a> <a href="https://infosec.exchange/tags/RustLang" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RustLang</span></a></p><p>🔗 Project link on <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GitHub</span></a> 👉 <a href="https://github.com/eqtylab/mcp-guardian" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/eqtylab/mcp-guardian</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Software" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Software</span></a> <a href="https://infosec.exchange/tags/Technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Technology</span></a> <a href="https://infosec.exchange/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/Cybersecuritycareer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecuritycareer</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/purpleteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>purpleteam</span></a> <a href="https://infosec.exchange/tags/tips" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tips</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloudsecurity</span></a></p><p>— ✨<br>🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️</p>
Redhotcyber<p>Malware come Bombe ad orologeria! La minaccia per i PLC Siemens S7 parte dal 2027</p><p>📌 Link all'articolo : <a href="https://www.redhotcyber.com/post/malware-come-bombe-ad-orologeria-la-minaccia-per-i-plc-siemens-s7-parte-dal-2027/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/malware-c</span><span class="invisible">ome-bombe-ad-orologeria-la-minaccia-per-i-plc-siemens-s7-parte-dal-2027/</span></a></p><p>I <a href="https://mastodon.bida.im/tags/ricercatori" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ricercatori</span></a> hanno scoperto diverse librerie nel registro pubblico NuGet contenenti codice che si attiverà nel 2027 e nel 2028. I pacchetti infetti prendono di mira tre noti motori di <a href="https://mastodon.bida.im/tags/archiviazione" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>archiviazione</span></a> <a href="https://mastodon.bida.im/tags/dati" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dati</span></a> .NET (Microsoft <a href="https://mastodon.bida.im/tags/SQL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SQL</span></a> <a href="https://mastodon.bida.im/tags/Server" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Server</span></a>, PostgreSQL e <a href="https://mastodon.bida.im/tags/SQLite" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SQLite</span></a>) e un componente è specificamente mascherato da <a href="https://mastodon.bida.im/tags/libreria" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>libreria</span></a> per funzionare con i controller Siemens S7. </p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://mastodon.bida.im/tags/nuget" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nuget</span></a> <a href="https://mastodon.bida.im/tags/dotnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dotnet</span></a> <a href="https://mastodon.bida.im/tags/siemens" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>siemens</span></a> <a href="https://mastodon.bida.im/tags/codiceDannoso" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>codiceDannoso</span></a> <a href="https://mastodon.bida.im/tags/database" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>database</span></a> <a href="https://mastodon.bida.im/tags/componenti" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>componenti</span></a> <a href="https://mastodon.bida.im/tags/sicurezzaInformatica" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sicurezzaInformatica</span></a> <a href="https://mastodon.bida.im/tags/minacceInformatiche" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>minacceInformatiche</span></a> <a href="https://mastodon.bida.im/tags/vulnerabilita" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilita</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/Denmark" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Denmark</span></a> and <a href="https://infosec.exchange/tags/Norway" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Norway</span></a> investigate <a href="https://infosec.exchange/tags/Yutong" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Yutong</span></a> bus security flaw amid rising tech fears<br><a href="https://securityaffairs.com/184411/security/denmark-and-norway-investigate-yutong-bus-security-flaw.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/184411/sec</span><span class="invisible">urity/denmark-and-norway-investigate-yutong-bus-security-flaw.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/China" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>China</span></a></p>
gtbarry<p>The Government Shutdown Is a Ticking Cybersecurity Time Bomb</p><p>experts warn that gaps in foundational activities during the shutdown—things like system patching, activity monitoring, and device management—could have real effects on federal defenses, both now and for years to come.</p><p><a href="https://mastodon.social/tags/government" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>government</span></a> <a href="https://mastodon.social/tags/shutdown" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shutdown</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/hackers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackers</span></a> <a href="https://mastodon.social/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a></p><p><a href="https://www.wired.com/story/the-government-shutdown-is-a-ticking-cybersecurity-time-bomb/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wired.com/story/the-government</span><span class="invisible">-shutdown-is-a-ticking-cybersecurity-time-bomb/</span></a></p>
securityaffairs<p>Agentic AI in Cybersecurity: Beyond Triage to Strategic Threat Hunting<br><a href="https://securityaffairs.com/184413/uncategorized/agentic-ai-in-cybersecurity-beyond-triage-to-strategic-threat-hunting.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/184413/unc</span><span class="invisible">ategorized/agentic-ai-in-cybersecurity-beyond-triage-to-strategic-threat-hunting.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/ai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ai</span></a></p>
heise online<p>Untersuchung: Elektrobusse in Großbritannien aus China abschaltbar?</p><p>Behörden in Großbritannien prüfen, ob chinesische Elektrobusse per Fernzugriff deaktiviert werden können. Die Möglichkeit war in Norwegen entdeckt worden.</p><p><a href="https://www.heise.de/news/Untersuchung-Elektrobusse-in-Grossbritannien-aus-China-abschaltbar-11072255.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Untersuchung-Ele</span><span class="invisible">ktrobusse-in-Grossbritannien-aus-China-abschaltbar-11072255.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.heise.de/tags/Hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hacking</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Wirtschaft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wirtschaft</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
Adrian Morales<p>I'm pretty sure you're average North Korean thinks their country is peaceful and nice... When in fact it's a failed totalitarian state that isn't capable of producing anything, so under the direct orders of its Supreme Leader and Criminal, Kim Jong-un, it resorts to hacking and stealing crypto assets. </p><p>But it doesn't stop there, does it? All that crypto needs to be converted into fiat, you know, actual money that you can use in the actual world. Despite naming itself the Turtle Kingdom, North Korea is constantly in touch with foreign entities that process these stolen digital valuables. </p><p>I find it strange that no agency whatsoever is working to put a stop to this, and if indeed there is one, they're not doing a very good job.</p><p><a href="https://ieji.de/tags/NorthKorea" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NorthKorea</span></a> <a href="https://ieji.de/tags/RogueNation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RogueNation</span></a> <a href="https://ieji.de/tags/Monday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Monday</span></a> <a href="https://ieji.de/tags/Crypto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Crypto</span></a> <a href="https://ieji.de/tags/Industry" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Industry</span></a> <a href="https://ieji.de/tags/Blockchain" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Blockchain</span></a> <a href="https://ieji.de/tags/DigitalAssets" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalAssets</span></a> <a href="https://ieji.de/tags/Hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hacking</span></a> <a href="https://ieji.de/tags/DarkWeb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DarkWeb</span></a> <a href="https://ieji.de/tags/BlackMarket" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlackMarket</span></a></p>
securityaffairs<p>Nine <a href="https://infosec.exchange/tags/NuGet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NuGet</span></a> packages disrupt DBs and industrial systems with time-delayed payloads<br><a href="https://securityaffairs.com/184383/malware/nine-nuget-packages-disrupt-dbs-and-industrial-systems-with-time-delayed-payloads.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/184383/mal</span><span class="invisible">ware/nine-nuget-packages-disrupt-dbs-and-industrial-systems-with-time-delayed-payloads.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/QNAP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>QNAP</span></a> fixed multiple zero-days in its software demonstrated at <a href="https://infosec.exchange/tags/Pwn2Own" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pwn2Own</span></a> 2025<br><a href="https://securityaffairs.com/184396/hacking/qnap-fixed-multiple-zero-days-in-its-software-demonstrated-at-pwn2own-2025.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/184396/hac</span><span class="invisible">king/qnap-fixed-multiple-zero-days-in-its-software-demonstrated-at-pwn2own-2025.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a></p>
Pelican Dock Music<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@briankrebs" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>briankrebs</span></a></span> </p><p>I don't mean to pester you but I got this weird op on my Samsung galaxy with no warning... like a brute force deal. phone locked up then normalized ...took pic with old phone cam. Does anyone wtf this is?</p><p><a href="https://mastodon.social/tags/samsung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>samsung</span></a> <a href="https://mastodon.social/tags/tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech</span></a> <a href="https://mastodon.social/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://mastodon.social/tags/computer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>computer</span></a> <a href="https://mastodon.social/tags/virus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>virus</span></a> <a href="https://mastodon.social/tags/software" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>software</span></a><br><a href="https://mastodon.social/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://mastodon.social/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a></p>
BadDecisions<p><strong>Secret Kill Switch on Chinese Buses</strong></p> Test results showed that the Chinese bus maker had access to the vehicles' control systems for software updates and diagnostics. A leading Norwegian public transport operator has said it will introduce stricter security requirements and step up anti-hacking measures after a test on new Chinese-made electric buses showed the manufacturer could remotely turn them off. Transport operator Ruter said test results published last week showed that Chinese bus maker Yutong Group had access to their […] <p><a href="https://activitypub.writeworks.uk/2025/11/secret-kill-switch-on-chinese-buses/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">activitypub.writeworks.uk/2025</span><span class="invisible">/11/secret-kill-switch-on-chinese-buses/</span></a></p>
Neil Brown<p># Repair, Reuse and Recycle</p><p>This blogpost from <span class="h-card" translate="no"><a href="https://mapstodon.space/@ianturton" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>ianturton</span></a></span> covers a nice hack for old laptops with working screens: spare external monitors!</p><p><a href="https://blog.ianturton.com/cheap/2025/11/09/spare-monitor.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.ianturton.com/cheap/2025/</span><span class="invisible">11/09/spare-monitor.html</span></a></p><p><a href="https://mastodon.neilzone.co.uk/tags/RightToRepair" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RightToRepair</span></a> <a href="https://mastodon.neilzone.co.uk/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> chat <a href="https://infosec.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> at risk: Microsoft details <a href="https://infosec.exchange/tags/Whisper" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Whisper</span></a> <a href="https://infosec.exchange/tags/Leak" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Leak</span></a> side-channel attack<br><a href="https://securityaffairs.com/184372/hacking/ai-chat-privacy-at-risk-microsoft-details-whisper-leak-side-channel-attack.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/184372/hac</span><span class="invisible">king/ai-chat-privacy-at-risk-microsoft-details-whisper-leak-side-channel-attack.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a></p>
securityaffairs<p>SECURITY AFFAIRS <a href="https://infosec.exchange/tags/MALWARE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MALWARE</span></a> NEWSLETTER ROUND 70<br><a href="https://securityaffairs.com/184367/malware/security-affairs-malware-newsletter-round-70.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/184367/mal</span><span class="invisible">ware/security-affairs-malware-newsletter-round-70.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a></p>
securityaffairs<p>Security Affairs <a href="https://infosec.exchange/tags/newsletter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>newsletter</span></a> Round 549 by Pierluigi Paganini – INTERNATIONAL EDITION<br><a href="https://securityaffairs.com/184362/security/security-affairs-newsletter-round-549-by-pierluigi-paganini-international-edition.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/184362/sec</span><span class="invisible">urity/security-affairs-newsletter-round-549-by-pierluigi-paganini-international-edition.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a></p>