Most Read This Week

Oracle Hack: From ‘Deny-Deny-Deny’ to ‘Oops-Oops-Oops’
Richi Jennings | | CVE-2021-35587, Larry Ellison, OCI, Oracle, Oracle Access Manager, Oracle Classic, Oracle cloud, Oracle Cloud Classic, Oracle Cloud infrastructure, Oracle Fusion Cloud, rose87168, SB Blogwatch
Classic “wordplay:” Larry’s PR angels desperately dance on the head of a pin ...
Security Boulevard

App Stores OK’ed VPNs Run by China PLA
Richi Jennings | | 360 Security Technology, App Store, App Stores, Apple, CCP, china, china espionage, China-nexus cyber espionage, Chinese, Chinese Communists, Chinese cyber espionage, chinese government, free vpn app, google, Google Play Store, Peoples Republic of China, Privacy, Qihoo 360, SB Blogwatch, Signal Secure VPN, Snap VPN, Tech Transparency Project, Thunder VPN, TikTok, TikTok Ban, Turbo VPN, VPN, VPN Proxy Master
Bad Apple: Chinese firm banned by the U.S. is the shady entity behind a clutch of free VPN apps—with over a million downloads ...
Security Boulevard

Spit Happens: 23andMe is Bankrupt — Secure Your DNA Data NOW Already
Double hell-ix: Personal genomics firm tells customers your data is safe—but few will trust the loss-making biotech pioneer ...
Security Boulevard

Microsoft Won’t Fix This Bad Zero Day (Despite Wide Abuse)
Richi Jennings | | .lnk, APT37, APT43, BitterAPT, china espionage, CWE-451, Cybersecurity zero-day flaw, Earth Anansi, Earth Imp, Earth Kumiho, Earth Manticore, Evil Corp., InkySquid, Iranian hackers, kimsuky, Kimsuky hacking group, Konni, LNK file malware, LNKFiles, malicious LNK files, Microsoft, Microsoft Windows Zero Day, North Korean cyber espionage, russia hacker, SB Blogwatch, ScarCruft, Windows, ZDI-CAN-25373, Zero Day Attacks, zero day exploit attack, Zero Day Initiative, Zero Day Initiative (ZDI), zero-day, zero-day attack, Zero-Day Bug
Satya says NO: Redmond blames Windows users, rather than solve 30-year-old bug—exploited since 2017 ...
Security Boulevard

No, Elon — X DDoS was NOT by Ukraine
Richi Jennings | | Cloudflare DDoS Protection, cyber attacks during ukraine war, cyber attacks russia, Dark Storm Team, ddos, DDoS attack, Denial of Service, Denial of Service (DoS) attacks, denial of service attacks, denial of service vulnerability, distributed denial of service, Distributed denial of service (DDoS) attacks, distributed denial of service attack, Elon Musk, elon musk twitter, hacktivism ukraine cyber-attacks, Russia, Russia-Ukraine, russia-ukraine conflict, Russia's War on Ukraine, SB Blogwatch, social media, Social Media Attack, social media attacks, social media cyber attacks, Social Media Cybercrime, Social Media Exploits, Ukraine, ukraine conflict, Ukraine Cyber War, Ukraine-Russia War, Ukraine/European Security, X
X marks the botnet: Outage outrage was a Ukrainian cyberattack, implies our favorite African billionaire comedy villain ...
Security Boulevard

‘Ban These Chinese Routers NOW,’ Cries House Committee
Richi Jennings | | Attacking Routers, china, China-linked Hackers, Chinese, Chinese Communists, Chinese devices, chinese government, Chinese hardware, Chinese state-sponsored cyberattacks, Commerce Department, Congress, Consumer IoT, flawed routers, House of Representatives, Internet of things, Internet of Things (IoT), Internet of Things cyber security, internetof things, internetofthings, internte-of-things, iot, Jeff Barney, John Moolenaar, OpenWrt, Peoples Republic of China, Raja Krishnamoorthi, Rob Joyce, router compromise, router exploit, router firmware security flaw, router hacking, router hijacking, router security, router vulnerabilities, SB Blogwatch, SOHO, SOHO and IoT device vulnerabilities, TP-LINK, U.S. Commerce Department, US Congress
Sino stoppage scheme: TP-Link in crosshairs, along with other brands ...
Security Boulevard

Apple vs. UK — ADP E2EE Back Door Faceoff
Richi Jennings | | #nobackdoors, ADP, Apple, Apple Data Security, Apple iCloud, back door, backdoor, backdoors, Child Abuse, child exploitation, child porn, child pornography, child sexual exploitation, cloud access, Compliance, CSAM, CSEM, E2EE, encryption, end-to-end encryption, five eyes, Five Eyes alliance, Five Eyes Intelligence Alliance, Government & Regulatory News, government access, Investigatory Powers Act, Privacy, SB Blogwatch, uk, UK Investigatory Powers Act, Won’t somebody think of the children?
Won’t Tim Think of the Children? End-to-end encryption battle continues ...
Security Boulevard

Apple Lets Stalkers Find YOU — ‘nRootTag’ Team Breaks AirTag Crypto
Richi Jennings | | AirTag, AirTags, Apple, Apple AirTag, apple bug, apple hack, apple hacker, Apple iCloud, BLE, bluetooth, Bluetooth low energy, Bluetooth Protocol, bluetooth security, Bluetooth vulnerability, Find My iPhone, ICloud, icloud hack, nRootTag, OpenHayStack, SB Blogwatch
Dumb Design + Crud Code = Privacy Panic: It’s been SEVEN MONTHS, but Tim’s crew is yet to fix the bugs ...
Security Boulevard

Rust vs. C — Linux’s Uncivil War
Richi Jennings | | Christoph Hellwig, Greg Kroah-Hartman, Hector Martin, Linus Torvalds, Linux, memory exploit, memory safe, memory safe language, rust, Rust adoption, Rust Programming Language, SB Blogwatch
Kernel Panic in the Rust Belt. Memory safety: GOOD. Cheese motion: BAD ...
Security Boulevard

PAN-PAN-PAN-OS: Palo Alto Firewalls Under Attack (Again)
Richi Jennings | | attack chain, Attack Chains, authentication bypass, Authentication bypass flaw, CVE-2024-9474, CVE-2025-0108, CVE-2025-0111, firewall, Firewall Exploit, firewall security, Palo Alto Networks, Palo Alto Networks PAN-OS, PAN-OS, PAN-OS Vulnerability, php, SB Blogwatch
Time to Declare an Emergency? Scrotes chain three flaws to take full control—seems pretty easy ...
Security Boulevard