Network Security

Related News

Mandiant releases quick credential cracker, to hasten the death of a bad protocol

  • Brandon Vigliarolo
  • Published date: 2026-01-18 23:57:05

PLUS: Navy spy sent to brig for 200 months in brig; Black Axe busted again; Bill aims to crimp ICE apps; and more Infosec In Brief PLUS: Google’s security outfit Mandiant last week released tools that can crack credentials in 12 hours, in the hope that doing …

Infosec In Brief PLUS: Googles security outfit Mandiant last week released tools that can crack credentials in 12 hours, in the hope that doing so will accelerate the death of an ancient Microsoft se… [+4170 chars]

Hacktivists hijacked Iran ’s state TV to air anti-regime messages and an appeal to protest from Reza Pahlavi

  • Pierluigi Paganini
  • Published date: 2026-01-18 22:49:37

Activists hacked Iran ’s Badr satellite, briefly broadcasting Reza Pahlavi’s anti-regime protest messages on state TV channels. Anti-regime activists briefly took control of Iran ’s Badr satellite, hijacking state TV to broadcast Crown Prince Reza Pahlavi’s c…

Hacktivists hijacked Iran s state TV to air anti-regime messages and an appeal to protest from Reza Pahlavi Anti-regime activists briefly took control of Iran s Badr satellite, hijacking state TV to… [+2214 chars]

DEMOCRATS IN FULL PANIC MODE!

  • X
  • Published date: 2026-01-18 20:27:11

DEMOCRATS IN FULL PANIC MODE! New DEVASTATING poll drops: Americans TRUST Republicans MORE than Dems on: • Economy & Inflation: +6 points • Tariffs: +2 points • Immigration: +11 points • Border Security: +28 POINTS

Skip to comments. DEMOCRATS IN FULL PANIC MODE! X ^ | 01/18/2026 | Gunther Eagleman Posted on 01/18/2026 12:27:11 PM PST by SmokingJoe DEMOCRATS IN FULL PANIC MODE! New DEVASTATING poll dro… [+7354 chars]

GootLoader uses malformed ZIP files to bypass security controls

  • Pierluigi Paganini
  • Published date: 2026-01-18 18:22:16

GootLoader malware uses malformed ZIP files made of hundreds of concatenated archives to evade detection. GootLoader is used by ransomware actors for initial access, then handed off to others. Built to evade detection, it accounted for 11% of bypassing malwar…

GootLoader uses malformed ZIP files to bypass security controls GootLoader is used by ransomware actors for initial access, then handed off to others. Built to evade detection, it accounted for 11% … [+4491 chars]

Crypto User Loses $282M In Social Engineering Attack — Details

  • Opeyemi Sule
  • Published date: 2026-01-18 18:00:44

2026 got off to a disastrous start for one crypto user, who fell victim to one of the largest social engineering attacks in digital asset history, losing over $282 million in Bitcoin and Litecoin. How Crypto User Fell Victim To $282M Theft  According to promi…

2026 got off to a disastrous start for one crypto user, who fell victim to one of the largest social engineering attacks in digital asset history, losing over $282 million in Bitcoin and Litecoin. H… [+2845 chars]

This Week in History: From poisoned Russians to life on Mars?

  • Tizane Navea-Rogers
  • Published date: 2026-01-18 17:30:07

Explore how major events between were captured on The Independent’s front pages

Your support helps us to tell the story From reproductive rights to climate change to Big Tech, The Independent is on the ground when the story is developing. Whether it's investigating the financia… [+5819 chars]

Speed Read: A Supercharged Suzuki Flat Tracker and More

This week's edition of Speed Read kicks off with a stonking supercharged Suzuki GSX-R / GSX 1100 hybrid from Finland, built for flat track racing of all things. We shift gears to profile a svelte Honda CB750 café racer from an award-winning Japanese workshop,…

This week's edition of Speed Read kicks off with a stonking supercharged Suzuki GSX-R / GSX 1100 hybrid from Finland, built for flat track racing of all things. We shift gears to profile a svelte Hon… [+7049 chars]

Pat Coogan Sets the Record Straight for Curt Cignetti After Indiana LB’s Message on Cheating Accusations

  • Insiya Johar
  • Published date: 2026-01-18 15:15:20

Three years ago, the Indiana Hoosiers made NCAA history as the first program to clock 700 losses. Today, that very underdog is winning millions of hearts, pulling off the best Cinderella story college football has ever seen.

Three years ago, the Indiana Hoosiers made NCAA history as the first program to clock 700 losses. Today, that very underdog is winning millions of hearts, pulling off the best Cinderella story colleg… [+1863 chars]

Ethereum staking crosses 46% of supply – Why this matters for ETH

  • Muriuki Lazaro
  • Published date: 2026-01-18 15:00:52

ETH staking absorbs 46.6% of supply, reducing sell pressure as validator exits define volatility risk.

As a result, deposits climbed gradually, with brief accelerations during strong price phases rather than abrupt surges. Source: Santiment/X This level of staking removes nearly half of Ethereum [ET… [+1632 chars]

How a hacking campaign targeted high-profile Gmail and WhatsApp users across the Middle East

  • Dissent
  • Published date: 2026-01-18 14:03:31

Zack Whittaker reports: On Tuesday, U.K.-based Iranian activist Nariman Gharib tweeted redacted screenshots of a phishing link sent to him via a WhatsApp message. “Do not click on suspicious links,” Gharib warned. The activist, who is following the digital si…

On Tuesday, U.K.-based Iranian activist Nariman Gharib tweeted redacted screenshots of a phishing link sent to him via a WhatsApp message. Do not click on suspicious links, Gharib warned. The activi… [+694 chars]

Fear that quantum computing is on the cusp of cracking cryptocurrency's encryption spurs a global investment firm to remove Bitcoin from recommendations

Jefferies Global Head of Equity Strategy Christopher Wood said that quantum computing could break Bitcoin sooner rather than later, and that the debate between crypto developers and quantum computing will only be a "long-term positive for gold."

Senior financial strategist Christopher Wood said in the latest issue of the GREED & Fear newsletter that he’s removing the 10% Bitcoin allocation from his recommended portfolio. He justified thi… [+3072 chars]

Prince Harry's final battle with U.K. press could lead to reconciliation for estranged royal

  • Mahalia Dobson
  • Published date: 2026-01-18 12:00:00

LONDON — It has been a familiar sight over the past decade: Prince Harry on the steps of a British courthouse for the latest round of his battle with a tabloid newspaper

LONDON It has been a familiar sight over the past decade: Prince Harry on the steps of a British courthouse for the latest round of his battle with a tabloid newspaper. But if, as expected, he arriv… [+6373 chars]

Hacking Tata Motors

  • Anonymous Coward
  • Published date: 2026-01-18 10:31:03

Hacking India’s largest automaker: Tata Motors Key Points / Summary * 2 exposed AWS keys on public-facing websites revealed 70+ TB of sensitive information and infrastructure across hundreds of buckets. * Pointless AWS key encryption easily defeated. …

Hacking India’s largest automaker: Tata MotorsKey Points / Summary * 2 exposed AWS keys on public-facing websites revealed 70+ TB of sensitive information and infrastructure across hundreds of bucke… [+313 chars]

Want To Slow Down Aging? Focus On These 11 Longevity Biomarkers

  • https://www.facebook.com/NutritionFacts.Org
  • Published date: 2026-01-18 10:22:00

When combined, they can help predict your longevity and health span.

A landmark paper cited more than 7,000 times in the biomedical literature, "The Hallmarks of Aging1 " identified common denominators of the aging process. In my forthcoming book How Not to Age, I di… [+6750 chars]

I oversee a lab where engineers try to destroy my life’s work. It’s the only way to prepare for quantum threats

  • Bernard Vian
  • Published date: 2026-01-18 10:00:00

I'm a 30-year semiconductor veteran who helped put secure chips into credit cards and bring contactless payments into everyday use.

The first time I handed over my credit card to a security lab, it came back to me broken. Not physically damaged, but compromised. In less than 10 minutes, the engineers had discovered my PIN. This h… [+6484 chars]

Industry Expert Predicts Complete Bitcoin Collapse – Here’s The Timeframe

  • Scott Matherson
  • Published date: 2026-01-18 02:30:36

Justin Bons, the founder and CIO of CyberCapital, has laid out a blunt and unsettling view of where Bitcoin could be headed over the next decade. In a detailed note shared on X, Bons noted that Bitcoin is moving toward total collapse within the next seven to …

Justin Bons, the founder and CIO of CyberCapital, has laid out a blunt and unsettling view of where Bitcoin could be headed over the next decade. In a detailed note shared on X, Bons noted that Bitco… [+3226 chars]

Harry's war with the press is back in court. But this time it's different

  • None
  • Published date: 2026-01-18 02:22:46

This is the Duke of Sussex's third major court battle accusing newspaper groups of unlawful behaviour.

It might feel as though we're back in familiar territory - the Duke of Sussex about to make claims in a London court alleging that newspapers used unlawful methods to gather information. But in many… [+8260 chars]

NDSS 2025 – Compiled Models, Built-In Exploits

  • None
  • Published date: 2026-01-18 00:00:00

None

<p>Session 9B: DNN Attack Surfaces </p><p></p><center data-preserve-html-node="true"><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen="" src="https://www.youtube-nocookie.com/embed/Dg4jzCVpu5Y?si=u4Ei961fMNom1yIz" width="560" frameborder="0" data-preserve-html-node="true" title="YouTube video player" height="315"></iframe> <p></p><center data-preserve-html-node="true">Authors, Creators &amp; Presenters: Yanzuo Chen (The Hong Kong University of Science and Technology), Zhibo Liu (The Hong Kong University of Science and Technology), Yuanyuan Yuan (The Hong Kong University of Science and Technology), Sihang Hu (Huawei Technologies), Tianxiang Li (Huawei Technologies), Shuai Wang (The Hong Kong University of Science and Technology) <p></p><center data-preserve-html-node="true">PAPER<br> <center data-preserve-html-node="true">Compiled Models, Built-In Exploits: Uncovering Pervasive Bit-Flip Attack Surfaces in DNN Executables <p></p><center data-preserve-html-node="true">Recent research has shown that bit-flip attacks (BFAs) can manipulate deep neural networks (DNNs) via DRAM Rowhammer exploitations. For high-level DNN models running on deep learning (DL) frameworks like PyTorch, extensive BFAs have been conducted to flip bits in model weights and shown effective. Defenses have also been proposed to guard model weights. Nevertheless, DNNs are increasingly compiled into DNN executables by DL compilers to leverage hardware primitives. These executables manifest new and distinct computation paradigms; we find existing research failing to accurately capture and expose the attack surface of BFAs on DNN executables. To this end, we launch the first systematic study of BFAs on DNN executables and reveal new attack surfaces neglected or underestimated in previous work. Specifically, prior BFAs in DL frameworks are limited to attacking model weights and assume a strong whitebox attacker with full knowledge of victim model weights, which is unrealistic as weights are often confidential. In contrast, we find that BFAs on DNN executables can achieve high effectiveness by exploiting the model structure (usually stored in the executable code), which only requires knowing the (often public) model structure. Importantly, such structure-based BFAs are pervasive, transferable, and more severe (e.g., single-bit flips lead to successful attacks) in DNN executables; they also slip past existing defenses. To realistically demonstrate the new attack surfaces, we assume a weak and more realistic attacker with no knowledge of victim model weights. We design an automated tool to identify vulnerable bits in victim executables with high confidence (70% compared to the baseline 2%). Launching this tool on DDR4 DRAM, we show that only 1.4 flips on average are needed to fully downgrade the accuracy of victim executables, including quantized models which could require 23× more flips previously, to random guesses. We comprehensively evaluate 16 DNN executables, covering three large-scale DNN models trained on three commonly-used datasets compiled by the two most popular DL compilers. Our finding calls for incorporating security mechanisms in future DNN compilation toolchains. <p></p><center data-preserve-html-node="true">ABOUT NDSS<br> <center data-preserve-html-node="true">The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies. <hr> <p>Our thanks to the <a href="https://www.ndss-symposium.org/">Network and Distributed System Security (NDSS) Symposium</a> for publishing their Creators, Authors and Presenter’s superb <a href="https://www.youtube.com/@NDSSSymposium">NDSS Symposium 2025 Conference</a> content on the <a href="https://www.ndss-symposium.org/">Organizations’</a> <a href="https://youtube.com/@ndsssymposium?si=lLtn9sVVEwmZ8J9h3">YouTube Channel</a>. </p> <p></p></center></center></center></center></center></center></center><p><a href="https://www.infosecurity.us/blog/2026/1/18/ndss-2025-compiled-models-built-in-exploits">Permalink</a></p><p> </p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/01/ndss-2025-compiled-models-built-in-exploits/" data-a2a-title="NDSS 2025 – Compiled Models, Built-In Exploits"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fndss-2025-compiled-models-built-in-exploits%2F&amp;linkname=NDSS%202025%20%E2%80%93%20Compiled%20Models%2C%20Built-In%20Exploits" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fndss-2025-compiled-models-built-in-exploits%2F&amp;linkname=NDSS%202025%20%E2%80%93%20Compiled%20Models%2C%20Built-In%20Exploits" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fndss-2025-compiled-models-built-in-exploits%2F&amp;linkname=NDSS%202025%20%E2%80%93%20Compiled%20Models%2C%20Built-In%20Exploits" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fndss-2025-compiled-models-built-in-exploits%2F&amp;linkname=NDSS%202025%20%E2%80%93%20Compiled%20Models%2C%20Built-In%20Exploits" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fndss-2025-compiled-models-built-in-exploits%2F&amp;linkname=NDSS%202025%20%E2%80%93%20Compiled%20Models%2C%20Built-In%20Exploits" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.infosecurity.us/">Infosecurity.US</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Marc Handelman">Marc Handelman</a>. Read the original post at: <a href="https://www.youtube-nocookie.com/embed/Dg4jzCVpu5Y?si=u4Ei961fMNom1yIz">https://www.youtube-nocookie.com/embed/Dg4jzCVpu5Y?si=u4Ei961fMNom1yIz</a> </p>

Compiling Scheme to WebAssembly

  • Eli Bendersky
  • Published date: 2026-01-17 22:37:00

One of my oldest open-source projects - Bob - has celebrated 15 a couple of months ago. Bob is a suite of implementations of the Scheme programming language in Python, including an interpreter, a compiler and a VM. Back then I was doing some hacking on CPytho…

One of my oldest open-source projects - Bob - has celebrated 15 a couple of months ago. Bob is a suite of implementations of the Scheme programming language in Python, including an interpreter, a com… [+6973 chars]

Show HN: School/ಶಾಲೆ – Agentic Voice Tutor for Students

  • gaganyatri
  • Published date: 2026-01-17 22:28:52

Do you think you can teach ?Agentic Tutor for students with a text/voice interactions.Try the demo at : https://school.dwani.aibuilt school - ಶಾಲೆ at Agent Olympics Hackathon.24 hours of non stop experiments alongside at Agent Olympics HackathonBuilt with dwa…

Do you think you can teach ?Agentic Tutor for students with a text/voice interactions. Try the demo at : https://school.dwani.ai built school - at Agent Olympics Hackathon. 24 hours of non stop ex… [+237 chars]

interpolars added to PyPI

Interpolation plugin for Polars

interpolars interpolars is a small Polars plugin that does N-dimensional linear interpolation from a source grid (your DataFrame) onto an explicit target DataFrame. It supports: <ul><li>1D/2D/3D/… [+4939 chars]

Ukraine–Germany operation targets Black Basta, Russian leader wanted

  • Pierluigi Paganini
  • Published date: 2026-01-17 18:11:08

Police in Ukraine and Germany identified Black Basta suspects and issued an international wanted notice for the group’s alleged Russian leader. Ukrainian and German police raided homes linked to alleged Black Basta ransomware members, identifying two Ukrainia…

UkraineGermany operation targets Black Basta, Russian leader wanted Ukrainian and German police raided homes linked to alleged Black Basta ransomware members, identifying two Ukrainian suspects. Law… [+3040 chars]

Re: ISP Operators AISURU/Kimwolf botnet

  • None
  • Published date: 2026-01-17 18:09:47

Posted by Tom Beecher via NANOG on Jan 17Mike- Should we hold the consumers responsible for their lack of tech knowhow So your position here is : Since corporate security folks can't catch everything, end users shouldn't be held responsible for doing anythi…

nanog mailing list archives From: Tom Beecher via NANOG &lt;nanog () lists nanog org&gt;Date: Sat, 17 Jan 2026 13:09:02 -0500 Mike- Should we hold the consumers responsible for their lack of tech… [+5158 chars]