Security Affairs newsletter Round 575 by Pierluigi Paganini – INTERNATIONAL EDITION


A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email box.

Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press.

Two US cybersecurity experts sentenced in ransomware case, third awaits July ruling
Trellix discloses the breach of a code repository
New Deep#Door RAT uses stealth and persistence to target Windows
Digital attacks drive a new wave of cargo theft, FBI says
Carding service Jerry’s Store leak exposes 345,000 stolen payment cards
Anthropic launches Claude Security to counter rapid AI-Powered exploits
SonicWall patches three SonicOS flaws in Gen 6, 7 and 8 firewalls. Patch them now
Copy Fail: New Linux bug enables Root via page‑cache corruption
Agent’s claims on WhatsApp access spark security concerns
Meta accused of violating DSA by failing to safeguard minors
Large-scale Roblox hacking operation shut down by Ukrainian authorities
CVE-2026-42208: LiteLLM bug exploited 36 hours after its disclosure
Internet censorship index reveals Russia’s lead and widespread content blocking
All supported cPanel versions hit by critical auth bug, now patched
U.S. CISA adds Microsoft Windows Shell and ConnectWise ScreenConnect flaws to its Known Exploited Vulnerabilities catalog
ShinyHunters exploit Anodot incident to target Vimeo
CVE-2026-3854 GitHub flaw enables remote code execution
Signal Phishing Campaign Targets German Officials in Suspected Russian Operation
Microsoft fixes Entra ID flaw enabling privilege escalation
New Android spyware Morpheus linked to Italian surveillance firm
NCSC launches SilentGlass, a plug-in device to secure HDMI and DisplayPort links
Medtronic discloses security incident after ShinyHunters claimed theft of 9M+ records
Chinese spy posed as researcher in spear-phishing campaign targeting NASA to steal defense software
LINKEDIN BROWSERGATE
Firefox bug CVE-2026-6770 enabled cross-site tracking and Tor fingerprinting
Fast16: Pre-Stuxnet malware that targeted precision engineering software
Italy moves to extradite Chinese national to the U.S. over hacking charges
U.S. utility giant Itron discloses a security breach
Critical CrowdStrike LogScale bug could have allowed file access, but no exploitation was observed
GopherWhisper: new China-linked APT targets Mongolia with Go-based malware
Trigona ransomware adopts custom tool to steal data and evade detection

International Press – Newsletter

Cybercrime

Hold the Phone! International Revenue Share Fraud Driven by Fake CAPTCHAs  

Video site Vimeo blames security incident on Anodot breach

A hacker group was detained in Lviv Oblast, which hacked game accounts and received almost UAH 10 million in profit from their sale in Russia 

Scammers vibecode server to verify stolen credit cards, leak details of 345K cards  

Cyber-Enabled Strategic Cargo Theft Surging  

Anti-DDoS Firm Heaped Attacks on Brazilian ISPs  

Two Americans Who Attacked Multiple U.S. Victims Using ALPHV BlackCat Ransomware Sentenced to Prison  

AI Fuels ‘Industrial’ Cybercrime as Time-to-Exploit Shrinks to Hours  

Malware

73 Open VSX Sleeper Extensions Linked to GlassWorm Show New Malware Activations  

LofyStealer: Malware targeting Minecraft players  

Deep#Door Stealer: Stealthy Python Backdoor and Credential Stealer Leveraging Tunneling, Multi-Layer Persistence, and In-Memory Surveillance Capabilities

Poisoning the well: AI supply chain attacks on Hugging Face and OpenClaw  

8.3M Downloads Compromised: Lightning & Intercom-Client Infected in Latest Shai-Hulud Attack

Hacking

We found a stable Firefox identifier linking all your private Tor identities  

Agent ID Administrator scope overreach: Service Principal takeover in Entra ID 

Securing GitHub: Wiz Research uncovers Remote Code Execution in GitHub.com and GitHub Enterprise Server (CVE-2026-3854)

CVE-2026-42208: Targeted SQL injection against LiteLLM’s authentication path discovered 36 hours following vulnerability disclosure  

Copy Fail: 732 Bytes to Root on Every Major Linux Distribution  

Inspektor Gadget Security Audit

Living off the orchard: understanding LOOBins and native macOS attack techniques      

Claude Security is now in public beta  

Intelligence and Information Warfare

fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet 

NASA Investigators Expose a Chinese National Phishing for Defense Software  

Italy to extradite suspected Chinese hacker wanted by US authorities, says source  

An alarm clock you can’t ignore: How CapFix attacks Russian organizations  

Germany suspects Russia is behind Signal phishing that targeted top officials  

A conflict of attrition: Iran’s bet on asymmetric warfare     

Inside Shadow-Earth-053: A China-Aligned Cyberespionage Campaign Against Government and Defense Sectors in Asia  

Cybersecurity

Palantir employees are talking about company’s “descent into fascism”

World-first NCSC-engineered device secures vulnerable display links 

‘It’s a real shock’: quantum-computing breakthroughs pose imminent risks to cybersecurity  

The Global Internet Censorship Index 2026  

Commission preliminarily finds Meta in breach of Digital Services Act for failing to prevent minors under 13 from using Instagram and Facebook

Tennessee becomes second state to ban cryptocurrency ATMs over scam concerns      

A federal agent said WhatsApp’s encryption

Trellix Confirms Source Code Breach With Unauthorized Repository Access

Evolving the Android & Chrome VRPs for the AI Era  

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, newsletter)





Source link

Leave a Reply

Subscribe to Our Newsletter

Get our latest articles delivered straight to your inbox. No spam, we promise.

Recent Reviews


If you’ve bought a new Raspberry Pi, or just got your hands on an older model that someone else didn’t want, there are many ways to put that little computer to good use, and here are six of them.

Retro gaming galore

Recalbox running on a Raspberry Pi 500+. Credit: Tim Brookes / How-To Geek

One of the most popular uses for Raspberry Pi computers is as a retro gaming emulation system. Which systems can be emulated depends on which specific model of Pi you have, but even the oldest ones can do a great job with retro 8-bit and 16-bit titles, or MAME arcade titles. In fact, building your own arcade cabinet with a Pi at its heart is a common project, and you’ll find lots of instructional guides on the web to that effect.

8bitdo arcade stick for Nintendo Switch.

8/10

Number of Colors

1

Control Types

Arcade Stick


Build your own NAS

A Raspberry Pi configured as a NAS. Credit: Raspberry Pi Foundation

A NAS or Network-Attached Storage device is effectively a local file server that lets you store and access data on your local network using hard drives. You can go out and buy a NAS or you can follow the official Raspberry Pi NAS tutorial and turn your old USB hard drives into a NAS using stuff you already have, or can get for just a few dollars.

Everyone loves local streaming tools like Plex or Jellyfin, but not everyone wants to dedicate an expensive computer to act as the streaming server. Well, as long as your requirements aren’t too fancy, you can use a Raspberry Pi as a Plex server.

Just don’t expect it to handle heavy-duty transcoding. The good news is that most of your client devices can probably play back videos without the need for transcoding.

Turn your Pi into a home automation hub

The Home Assistant Green smart home hub surrounded by smart home devices. Credit: home-assistant.io

Home automation hub devices can cost hundreds of dollars, but if you have an old Raspberry Pi, you can run your smart home off it. The most common and effective solution is an open-source app called Home Assistant.

Raspberry Pi logo above a photo of Raspberry Pi boards.


I Run My Smart Home Off a Raspberry Pi, Here’s How It Works

Make your home smarter on a budget with a Raspberry Pi.

Build a weather station

If you’re interested in the weather, want to contribute to weather data, or are just sick of getting rained on when you least expect it, you have the option of getting a weather station kit for your Raspberry Pi or using something like the Raspberry Pi Sense HAT, which can detect pressure, humidity, and temperature, but not wind speed. However, there are also generic wind and rain sensors you can buy, and, of course, don’t forget an outdoor project enclosure.

There are a few guides on the web, but this weather station guide for Raspberry Pi is a good place to get some ideas.

Create a home web server

Another fun project to do is hosting your own little web server using a Raspberry Pi. You can make a website that only works on your home LAN, or even host something that people from outside your home network can access. Using open source software to host your own web resources is highly educational, and it can also be a way to do something genuinely useful without having to rely on a cloud service somewhere on the internet.

Imagine having your own little bulletin board at home, or hosting content like ebooks, music, or audiobooks?


Infinite possibilities

Despite lacking in the raw power department, all Raspberry Pi devices are little miracles—single board computers that can (in principle) do anything their bigger cousins can. Just more slowly. So if you have a few old Raspberry Pis hanging around, don’t be too quick to retire them yet.



Source link