Skip to content
  • Categories
  • Recent
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Slate)
  • No Skin
Collapse
Brand Logo

hashpwn

Home | Donate | GitHub | Matrix Chat | PrivateBin | Rules

  1. Home
  2. General Discussion
  3. Infosec News

Infosec News

Scheduled Pinned Locked Moved General Discussion
112 Posts 3 Posters 30.2k Views 3 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • cycloneC Offline
    cycloneC Offline
    cyclone
    Admin Trusted
    wrote on last edited by
    #103

    SoundCloud Confirms Data Breach

    5166b650-49c4-4f71-8918-0cf58ec38651-image.png

    SoundCloud has confirmed a security breach after users reported widespread outages and 403 errors when accessing the platform through VPNs. According to the company, the issues were caused by its incident response after detecting unauthorized access to an ancillary service dashboard.

    SoundCloud stated that a threat actor accessed a limited database containing user email addresses and information already visible on public profiles. The company said no passwords, financial data, or other sensitive information were exposed.

    Sources cited by BleepingComputer estimate the breach impacts roughly 20 percent of SoundCloud’s user base, potentially affecting around 28 million accounts. SoundCloud says all unauthorized access has been blocked and that there is no ongoing risk.

    As part of its response, SoundCloud implemented security configuration changes that disrupted VPN connectivity. The company has not provided a timeline for restoring full VPN access. It also reported experiencing denial-of-service attacks following the incident, briefly affecting site availability.

    While SoundCloud has not named the attackers, BleepingComputer reports that the ShinyHunters extortion group is allegedly behind the breach and is attempting to extort the company after stealing user data.


    Sources:

    • https://www.bleepingcomputer.com/news/security/soundcloud-confirms-breach-after-member-data-stolen-vpn-access-disrupted/
    • https://cyberinsider.com/soundcloud-users-with-active-vpn-connections-are-getting-403-errors/

    Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
    3x RTX 4090

    1 Reply Last reply
    👍
    0
    • cycloneC Offline
      cycloneC Offline
      cyclone
      Admin Trusted
      wrote on last edited by
      #104

      2025 Cybersecurity Predictions vs Reality

      3c1560c3-d3d5-46e7-a3c1-06e89c44471b-image.png

      This article reviews 90+ predictions from 36 cybersecurity experts and compares them to what actually occurred in 2025. The main finding: most predictions were accurate, especially those focused on AI amplifying existing threats rather than creating new ones.

      Key Outcomes

      1. AI Amplified Existing Attacks
      • AI was widely adopted by attackers to scale and automate known techniques.
      • Observed uses included AI-assisted phishing, automated recon, and malware with runtime code mutation to evade detection.
      • Underground markets began selling configurable AI-powered attack tools.
      • AI reduced the skill barrier and increased attack speed and volume.

      Result: Prediction confirmed. AI increased efficiency, not novelty.


      1. SaaS, Cloud, and Identity Became the Main Attack Surface
      • SaaS misconfigurations, excessive permissions, insecure APIs, and third-party integrations were major breach drivers.
      • Identity and access failures eclipsed traditional perimeter security issues.
      • Large-scale cloud outages were often caused by configuration errors.

      Result: Prediction confirmed. Identity and SaaS security became critical weaknesses.


      1. Ransomware Fragmented Further
      • Law enforcement pressure led to more, smaller ransomware groups rather than fewer.
      • 30 to 40 percent increase in active ransomware operators.
      • Affiliates increasingly moved between groups, complicating attribution.

      Result: Prediction confirmed. Ransomware evolved into a fragmented ecosystem.


      1. Supply Chain Attacks Increased
      • Enterprises were compromised through trusted vendors and enterprise software.
      • SaaS and third-party providers became common initial access vectors.

      Result: Prediction confirmed. Vendor risk became a primary concern.


      1. Data Became the Core Security Asset
      • Data protection and governance overtook infrastructure as the main security focus.
      • Large credential leaks and AI training on sensitive data accelerated this shift.
      • Data visibility and classification became prerequisites for AI use.

      Result: Prediction confirmed. Data security underpins most modern risks.


      1. Regulation Added Complexity Without Reducing Attacks
      • Increased compliance and reporting requirements did not deter attackers.
      • Regulatory burden primarily impacted internal operations, not threat actors.

      Result: Prediction confirmed. Regulation did not materially change the threat landscape.


      Bottom Line
      2025 validated long-standing warnings rather than introducing new threat classes.
      The biggest risks were known problems amplified by AI, automation, and scale, not futuristic scenarios.


      Source:

      • https://cybernews.com/news/did-cybersecurity-expert-predictions-2025-come-true/

      Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
      3x RTX 4090

      1 Reply Last reply
      0
      • cycloneC Offline
        cycloneC Offline
        cyclone
        Admin Trusted
        wrote on last edited by
        #105

        Verizon Nationwide Outage (Jan. 14, 2026)

        b178f83a-d4b1-49a8-9336-8751d76c4453-image.png

        Verizon Communications experienced a major nationwide wireless network outage beginning around midday on January 14, 2026, disrupting voice, text, and mobile data services across the United States for approximately ten hours. Customers reported their phones showing “SOS” or “SOS-only” status in place of normal signal bars, indicating loss of cellular connectivity.

        Outage monitoring sites such as DownDetector logged hundreds of thousands of reports at the peak, with impacts reported coast-to-coast in major metropolitan areas including New York City, Chicago, Boston, Atlanta, Dallas, and others. Some local officials warned that emergency calls (911) for Verizon users could be unreliable during the disruption, recommending alternatives such as landlines or other carriers where possible.

        Verizon acknowledged the outage via social media and later confirmed that service was restored late Wednesday night. The company apologized for the interruption and stated it will issue account credits to affected customers. Verizon did not immediately disclose a specific technical cause, though internal reviews are expected.

        The Federal Communications Commission (FCC) indicated it would review the outage’s impact on network reliability and public safety communications.

        Sources:

        • https://www.techbuzz.ai/articles/verizon-s-nationwide-outage-hits-260k-reports-mid-january
        • https://apnews.com/article/verizon-cellular-outage-85d658a4fb6a6175cae8981d91a809c9
        • https://www.verizon.com/about/news/update-network-outage

        Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
        3x RTX 4090

        1 Reply Last reply
        0
        • cycloneC Offline
          cycloneC Offline
          cyclone
          Admin Trusted
          wrote on last edited by
          #106

          Atomic Wallet - Where Did My XMR Go?

          776e9e66-0183-45fa-a817-d7a9f980d8aa-image.png

          Many Atomic Wallet users recently logged in to find their Monero (XMR) balances missing or incorrect, causing understandable concern.

          According to Atomic Wallet support, this is a display and synchronization issue specific to Monero, not a loss of funds. Atomic states that all XMR remains safe on-chain and that their development team is working on a fix. Once synchronization is corrected, balances and transaction history should update normally.

          c3e89675-7a0c-4b47-8f0f-9998e125eaf2-image.png

          Users can independently confirm their funds by restoring their XMR wallet in another trusted Monero wallet using their existing keys or seed phrase. Multiple users report that their full balances appear correctly when checked outside Atomic, confirming the issue is isolated to Atomic’s wallet interface.

          Given Atomic Wallet’s 2023 security breach, users are understandably cautious. While this situation appears unrelated and no theft has been reported, verifying balances independently is recommended.


          Summary

          • Issue affects XMR balance display in Atomic Wallet
          • Funds are still on-chain and under user control
          • Atomic says a fix is in progress
          • Users can verify funds using another Monero wallet
          • Use caution, verify independently, and never share your private keys or seed phrase with anyone

          20e9c590-cd38-48dd-91b6-5c86e6eaa8a0-image.png


          Sources:

          • @cyclone (independent verification with Atomic)
          • https://x.com/AtomicWallet/status/2011796132112826643

          Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
          3x RTX 4090

          1 Reply Last reply
          👍
          0
          • oe3p32wedwO Offline
            oe3p32wedwO Offline
            oe3p32wedw
            Contributor
            wrote on last edited by
            #107

            123.png
            haahahahahah

            1x1660 Ti | 2x4090 | epileptic/anxiety/despair/drain | hashpwn <3

            1 Reply Last reply
            0
            • cycloneC Offline
              cycloneC Offline
              cyclone
              Admin Trusted
              wrote last edited by
              #108

              Ivanti EPMM Zero-Day RCE - CVE-2026-1281 & CVE-2026-1340

              56a59703-f5dc-48f4-b1a5-d2c62d6055f5-image.png

              Ivanti has disclosed two critical zero-day vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), tracked as CVE-2026-1281 and CVE-2026-1340. Both flaws are unauthenticated code injection issues that allow remote attackers to achieve arbitrary code execution on affected EPMM appliances. Active exploitation has been confirmed, and CVE-2026-1281 has been added to CISA’s Known Exploited Vulnerabilities catalog.

              The vulnerabilities affect EPMM 12.x versions prior to 12.8.0.0 and are tied to In-House Application Distribution and Android File Transfer Configuration features. Successful exploitation grants full control over the EPMM appliance, enabling attackers to establish persistence, access sensitive mobile device management data, and potentially pivot into connected enterprise environments.

              Ivanti has released interim RPM-based patches, though these must be reapplied after upgrades. A permanent fix is scheduled for EPMM 12.8.0.0. Organizations are strongly advised to apply mitigations immediately, review logs for signs of exploitation, and treat exposed EPMM instances as high-risk assets.


              Source:

              • https://thehackernews.com/2026/01/two-ivanti-epmm-zero-day-rce-flaws.html

              Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
              3x RTX 4090

              1 Reply Last reply
              👍
              0
              • cycloneC Offline
                cycloneC Offline
                cyclone
                Admin Trusted
                wrote last edited by
                #109

                Notepad++ Supply Chain Compromised

                9a708834-6f8d-4f24-b12b-629efea630a5-image.png

                What Happened

                Notepad++ was involved in a supply chain compromise where parts of its update delivery infrastructure were breached. The application’s source code was not modified, but attackers were able to tamper with the update distribution path for a limited period. In targeted cases, users running older versions and using the built-in updater could have been redirected to malicious installer binaries hosted on attacker-controlled infrastructure.

                The campaign appears to have been highly targeted rather than mass exploitation, consistent with espionage-style activity. The issue was identified and remediated after the Notepad++ team migrated infrastructure and tightened update security.

                Impact

                • Risk was limited primarily to older Notepad++ versions using legacy update mechanisms.
                • Users who did manual downloads from trusted mirrors were unlikely to be affected.
                • No evidence suggests the official source repository itself was compromised.

                What Users Should Do

                • Update immediately to the latest Notepad++ version using a fresh manual download from the official site or trusted mirrors.
                • Verify digital signatures and hashes of the installer before execution.
                • If Notepad++ was updated automatically during the affected timeframe:
                  • Treat the system as potentially exposed.
                  • Run endpoint security scans.
                  • Review network logs for suspicious outbound connections.
                • Enterprise environments should audit systems where Notepad++ is installed and consider blocking auto-updaters that lack strict signature validation.

                Sources:

                • https://thehackernews.com/2026/02/notepad-hosting-breach-attributed-to.html
                • https://notepad-plus-plus.org/news/hijacked-incident-info-update/

                Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                3x RTX 4090

                1 Reply Last reply
                0
                • cycloneC Offline
                  cycloneC Offline
                  cyclone
                  Admin Trusted
                  wrote last edited by
                  #110

                  Windows Notepad Remote Code Execution - CVE-2026-20841

                  6da505d2-a552-403b-baac-4ec7e4d7020e-image.png

                  Summary

                  Not to be outdone by the recent Notepad++ RCE, the Windows Notepad CVE-2026-20841 is a high-severity remote code execution (RCE) vulnerability affecting the modern Windows Notepad application. The issue was introduced after Microsoft added Markdown and rich link support to Notepad.

                  The vulnerability stems from improper sanitation of special elements within commands, effectively allowing command injection via crafted Markdown links.

                  Technical Details

                  An attacker can craft a malicious .md file containing a specially constructed link. When a user opens the file in Notepad and Ctrl-clicks the link, the application may invoke external protocols or executables without sufficient validation or security warnings.

                  Successful exploitation allows arbitrary code execution in the context of the logged-in user.

                  Key Characteristics

                  • Type: Remote Code Execution
                  • Vector: Malicious Markdown file with crafted link
                  • User Interaction Required: Yes (file open + link click)
                  • Privileges Gained: Same as current user
                  • Attack Surface: Expanded via Markdown rendering and clickable links

                  Impact

                  If exploited, an attacker could:

                  • Execute arbitrary binaries
                  • Download and run malware
                  • Establish persistence
                  • Perform lateral movement (depending on user privileges)

                  However, there were no confirmed in-the-wild exploits at the time of disclosure.

                  Remediation

                  Microsoft addressed the vulnerability in the February 2026 Patch Tuesday updates for the Windows 11 Notepad flaw by displaying warnings when clicking a link if it does not use the http:// or https:// protocol.

                  3d882187-479e-4f14-b9c0-6c340d2d5e90-image.png


                  Sources:

                  • https://www.cve.org/CVERecord?id=CVE-2026-20841
                  • https://www.bleepingcomputer.com/news/microsoft/windows-11-notepad-flaw-let-files-execute-silently-via-markdown-links/
                  • https://www.helpnetsecurity.com/2026/02/12/windows-notepad-markdown-feature-opens-door-to-rce-cve-2026-20841/
                  • https://socprime.com/blog/cve-2026-20841-vulnerability/
                  • https://www.techradar.com/pro/security/microsoft-patches-concerning-windows-11-notepad-security-flaw

                  Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                  3x RTX 4090

                  1 Reply Last reply
                  0
                  • cycloneC Offline
                    cycloneC Offline
                    cyclone
                    Admin Trusted
                    wrote last edited by
                    #111

                    Chrome CSS Zero-Day (CVE-2026-2441) – Active Exploitation Confirmed

                    45adb187-6021-45c2-aa36-4af4e7f955fe-image.png

                    Google has released an emergency security update for Chrome after confirming active exploitation of a high-severity zero-day vulnerability in the browser’s CSS handling engine.

                    The flaw, tracked as CVE-2026-2441, is a use-after-free memory corruption issue in Chrome’s CSS parsing/rendering component. Although CSS is generally considered non-executable, improper memory management allows attackers to craft malicious webpages that can trigger arbitrary code execution within the Chrome renderer process.

                    Key Details:

                    • Type: Use-after-free (memory corruption)
                    • Component: Chrome CSS engine
                    • Severity: High (CVSS ~8.8)
                    • Exploitation: Confirmed in the wild
                    • Impact: Remote code execution via malicious webpage

                    Successful exploitation requires a victim to visit a specially crafted website. While Chrome’s sandbox limits direct system access, attackers often chain renderer bugs with sandbox escapes for full compromise.

                    Google has patched the issue in the latest stable release. All users, especially enterprise environments and those running Chromium-based browsers (Edge, Brave, Opera), should update immediately.


                    Sources:

                    • https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html
                    • https://www.bleepingcomputer.com/news/security/google-patches-first-chrome-zero-day-exploited-in-attacks-this-year/
                    • https://thehackernews.com/2026/02/new-chrome-zero-day-cve-2026-2441-under.html

                    Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                    3x RTX 4090

                    1 Reply Last reply
                    0
                    • freerouteF Offline
                      freerouteF Offline
                      freeroute
                      Moderator Trusted
                      wrote last edited by freeroute
                      #112

                      New AirSnitch attack breaks Wi-Fi encryption in homes, offices, and enterprises
                      That guest network you set up for your neighbors may not be as secure as you think.
                      airsnitch.png

                      To prevent malicious Wi-Fi clients from attacking other clients on the same network, vendors have introduced
                      client isolation, a combination of mechanisms that block direct communication between clients. However, client isolation is not a standardized feature, making its security guarantees unclear.

                      Source: New AirSnitch attack breaks Wi-Fi encryption in homes, offices, and enterprises
                      Github: https://github.com/vanhoefm/airsnitch
                      AirSnitch: Demystifying and Breaking Client Isolation in Wi-Fi Networks

                      1 Reply Last reply
                      0
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      Who's Online [Full List]

                      8 users active right now (2 members and 6 guests).
                      hashpwn-bot

                      Board Statistics

                      Our members have made a total of 10.5k posts in 174 topics.
                      We currently have 370 members registered.
                      Please welcome our newest member, veiloi3113.
                      The most users online at one time was 49 on Thursday, December 26, 2024.

                      • Login

                      • Don't have an account? Register

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent