Baltic Nations Bolster Cyber Defenses Ahead of Russian Power Grid Separation
Lithuania, Latvia, and Estonia are strengthening cybersecurity measures as they prepare to disconnect from the Soviet-era BRELL power network shared with Russia. The Baltic states anticipate potential retaliation from Moscow while transitioning to the EU electricity system on February 9.
Hijacked AWS Storage Buckets Expose Major Organizations to Supply Chain Attacks
Security researchers discovered 150 abandoned AWS S3 storage buckets previously used by major organizations that could be easily re-registered and hijacked. The vulnerability allowed researchers to gain control over storage locations still receiving millions of requests from government agencies and corporations.
Okta Bcrypt Vulnerability Exposes Critical API Design Flaws
A security incident at Okta revealed how Bcrypt's 72-character input limitation could be exploited to bypass authentication in certain conditions. The case highlights crucial lessons for modern API design, emphasizing explicit input validation over silent modifications.
Cybercriminals Target Organizations with Sophisticated ADFS Phishing Scheme
Security researchers have uncovered a sophisticated phishing campaign targeting organizations using Microsoft ADFS, with attackers creating convincing fake login portals to steal credentials and bypass MFA. The scam has affected over 150 organizations across education, healthcare, government and technology sectors, primarily in the US, Canada, Australia and Europe.
Security Experts Alarmed as DOGE Gains Unprecedented Access to Federal Systems
Cybersecurity professionals raise red flags over security breaches as Elon Musk's Department of Government Efficiency obtains access to sensitive Treasury and OPM systems. Growing concerns emerge about data exposure and employee safety as protests mount against controversial security protocol violations.
Hidden Threat: Security Expert Exposes Dangerous Vulnerability in Modified USB Cables
Cybersecurity researcher Mike Grover demonstrates how a seemingly innocent charging cable can be weaponized to remotely access and control computers from up to 300 feet away. The modified cable can capture keystrokes, implant malware, and execute malicious commands without detection.
Major Data Breach: Costa Rican Telecom Exposes 600,000 Citizens' Data in Unsecured Cloud Storage
A private telecommunications company in Costa Rica has left approximately 600,000 records containing citizens' sensitive personal data exposed through an unsecured Google Storage system. Despite multiple warnings, the company remains unresponsive while the data continues to be accessible, raising serious privacy concerns.
Young Tech Prodigies Gain Unprecedented Access to Federal IT Systems Through Musk's DOGE Initiative
A group of six engineers in their early 20s have obtained extensive access to sensitive government IT systems through Elon Musk's Department of Government Efficiency program. The controversial appointments have raised serious concerns about security protocols and proper oversight of federal operations.
Racist Mass Text Campaign Exposes SMS Security Vulnerabilities After Election
A coordinated wave of racist text messages targeting minority communities managed to bypass some SMS security measures following Trump's victory claim. The incident, which particularly affected college campuses, has prompted investigations and raised concerns about messaging infrastructure vulnerabilities.
Treasury Payment Systems Access Sparks National Security Concerns Over Musk Team's Request
A controversy has emerged as Elon Musk's associates seek access to critical U.S. Treasury payment systems, raising major security and stability concerns. Senator Ron Wyden has warned about risks to infrastructure handling trillions in federal payments, citing Musk's China ties and clearance issues.