Pulse of Truth

1293 readers
47 users here now

Cyber Security news and links to cyber security stories that could make you go hmmm. The content is exactly as it is consumed through RSS feeds and wont be edited (except for the occasional encoding errors).

This community is automagically fed by an instance of Dittybopper.

founded 2 years ago
MODERATORS
26
 
 

Official was connected to FBI probe of cartel kingpin Joaquín “El Chapo” Guzmán.

27
 
 

Manila-based call centre targeted in vishing attack; names, contact details and frequent flyer numbers stolen.

28
 
 

A likely China-nexus threat actor has been exploiting unpatched Ivanti vulnerabilities to gain initial access to victim networks and then patching the systems to block others from breaking in to the same network.

29
 
 

The International Criminal Court contained a “sophisticated and targeted” cybersecurity incident that it first identified last week, the organization said in a statement Monday.

30
 
 

An information-sharing system used by EU border forces to flag illegal immigrants and suspected criminals in real time was rife with software and security vulnerabilities, according to emails and confidential audit reports obtained by Bloomberg News and investigative newsroom Lighthouse Reports.

31
 
 

The Berlin Commissioner for Data Protection has formally requested Google and Apple to remove the DeepSeek AI application from the application stores due to GDPR violations. [...]

32
 
 

Comments

33
 
 

Supply chain risks remain top-of-mind for the vast majority of CISOs and cybersecurity leaders, according to SecurityScorecard. Their findings reveal that the way most organizations manage supply chain cyber risk isn’t keeping pace with expanding threats. The expanding web of vendors increases supply chain cyber risks Third-party involvement in breaches has doubled, rising from 15% to nearly 30%, according to the 2025 Verizon DBIR. A small group of third-party providers supports much of the world’s … More → The post Third-party breaches double, creating ripple effects across industries appeared first on Help Net Security.

34
 
 

Vulnerabilities affecting a Bluetooth chipset present in more than two dozen audio devices from ten vendors can be exploited for eavesdropping or stealing sensitive information. [...]

35
 
 

Watch out for supply chain hacks especially interview  The ceasefire between Iran and Israel may prevent the two countries from firing missiles at each other, but it won't carry any weight in cyberspace, according to former NATO hacker Candan Bolukbas.…

36
 
 

'Face/Off' would definitely be illegal under this, right?

37
 
 

Comments

38
 
 

Laura Onita / Financial Times: UK retailers are building an arsenal of anti-theft tech powered by AI, computer vision, and facial recognition, as organized crime fuels a shoplifting epidemic  —  Companies are building up an arsenal of antitheft technology as organised crime fuels an epidemic of petty larceny In May and June …

39
 
 

Comments

40
 
 

It’s been nearly a year since a faulty CrowdStrike update took down 8.5 million Windows-based machines around the world, and Microsoft wants to ensure such a problem never happens again. After holding a summit with security vendors last year, Microsoft is poised to release a private preview of Windows changes that will move antivirus (AV) […]

41
 
 

Nothing confirmed but authority is operating under the assumption that data has been stolen A cyberattack on Glasgow City Council is causing massive disruption with a slew of its digital services unavailable.…

42
 
 

"Our management thought it was a bluff..."

43
 
 

Attackers are more inclined to “log in rather than break in,” using stolen credentials, legitimate tools, and native access to stealthily blend into their target’s environment, according to Bitdefender’s 2025 Cybersecurity Assessment Report. Attack surface reduction is a top priority 68% of security leaders are focusing on reducing the number of tools and applications running in their environments. Why? Because every unused admin account, unnecessary app, or extra permission is a potential doorway for attackers, … More → The post After a hack many firms still say nothing, and that’s a problem appeared first on Help Net Security.

44
 
 

A Kansas City man has pleaded guilty to hacking multiple organizations to advertise his cybersecurity services, the U.S. Department of Justice announced on Wednesday. [...]

45
 
 

New South Wales police in Australia have arrested a 27-year-old former Western Sydney University (WSU) student for allegedly hacking into the University's systems on multiple occasions, starting with a scheme to obtain cheaper parking. [...]

46
 
 

Czech researcher lays out a business case for reducing reliance on Redmond Comment  A sharply argued blog post warns that heavy reliance on Microsoft poses serious strategic risks for organizations – a viewpoint unlikely to win favor with Redmond or its millions of corporate customers.…

47
 
 

Pro tip: Don't use your personal email account on BreachForums The notorious data thief known as IntelBroker allegedly broke into computer systems belonging to more than 40 victims worldwide and stole their data, costing them at least $25 million in damages, according to newly unsealed court documents that also name IntelBroker as 25-year-old British national Kai West.…

48
 
 

Cybersecurity researchers are calling attention to a series of cyber attacks targeting financial organizations across Africa since at least July 2023 using a mix of open-source and publicly available tools to maintain access. Palo Alto Networks Unit 42 is tracking the activity under the moniker CL-CRI-1014, where "CL" refers to "cluster" and "CRI" stands for "criminal motivation." It's suspected

49
 
 

WhatsApp can now call on Meta AI to summarize your personal chats. As shown in a GIF, you can access it by tapping the button to unfurl all of your unread messages in a chat. But instead of showing your messages, WhatsApp uses Meta AI to generate a bulleted summary of what you missed. The […]

50
 
 

A slew of vulnerabilities, including a critical CVSS 9.8 that enables an attacker to generate the default admin password, affect hundreds of printer, scanner, and label-maker models made by manufacturer Brother.

view more: ‹ prev next ›