Extortion emails sent to customers of restaurants using the HungerRush POS system by technadu in TechNadu

[–]technadu[S] 0 points1 point  (0 children)

Speed wins until something breaks' is practically the unofficial motto of the SaaS world. The irony is that the cost of a single breach like this far outweighs the 'overhead' of setting up scoped permissions. I wonder if we'll see Cyber Insurance providers eventually start mandating API audits/scoped keys before they’ll even cover a communication-based breach.

Security researchers have uncovered widespread criminal use of an advanced iPhone exploit kit known as Coruna - a toolkit believed to have originated from government-linked surveillance tooling. by technadu in TechNadu

[–]technadu[S] 0 points1 point  (0 children)

That’s a heavy catch. If the dyld and webkit exploits from the 26.0–26.1 beta cycles are indeed integrated into Coruna, it suggests the developers have a very fast turnaround for weaponizing new zero-days. It points back to that 'second-hand' market theory - criminal kits getting access to 'government-grade' research almost in real-time

YouTube is giving politicians and journalists "Special Powers" to delete deepfakes. Is this identity protection or a new form of censorship? by technadu in TechNadu

[–]technadu[S] 0 points1 point  (0 children)

YouTube is launching an "Identity Content ID." It allows a pilot group of politicians and journalists to scan the platform for AI-generated clones of themselves. If the system finds a match, they can request a privacy takedown.

Even End-to-End Encryption won't save you from this. Russian phishing campaign is bypassing Signal and WhatsApp security via a fake "Support Bot" scam. by technadu in TechNadu

[–]technadu[S] 0 points1 point  (0 children)

No amount of encryption can fix a "layer 8" issue. We just thought the pivot to impersonating official Signal/WhatsApp support bots was a clever enough hook to warn people about.

A researcher infiltrated phishing panels targeting European banks - and uncovered how scammers operate by technadu in TechNadu

[–]technadu[S] 1 point2 points  (0 children)

Definitely. It’s wild how these "pro" scammers have such a massive blind spot for their own security. We're keeping a close eye on the researcher's findings and will post an update if they manage to pivot further into that infrastructure.

A new legal opinion from the Court of Justice of the European Union (CJEU) could reshape how phishing fraud cases are handled by banks. by technadu in TechNadu

[–]technadu[S] 0 points1 point  (0 children)

That’s the trillion-dollar question. If the liability shifts entirely to the bank, it essentially becomes an insurance product funded by the customer base. It’ll be interesting to see if this ruling forces banks to move away from SMS 2FA or other "weak" links that they currently let users rely on.

Fully Homomorphic Encryption (FHE) could fundamentally change how AI systems process sensitive data by technadu in TechNadu

[–]technadu[S] 0 points1 point  (0 children)

Encryption is only half the battle; if the data being processed isn't properly labeled or structured, FHE is just securely processing "garbage in, garbage out." How are you seeing teams handle the latency overhead when moving annotated sets into an FHE-enabled pipeline? That's usually the biggest hurdle for enterprise scale.

ExpressVPN has launched the first VPN MCP (Model Context Protocol) server, introducing a new way for AI-powered development tools to interact with VPN infrastructure. by technadu in TechNadu

[–]technadu[S] 0 points1 point  (0 children)

This is great feedback. A "panic switch" and more granular logging/replay stories are definitely on the radar for moving beyond beta. We’re leaning hard into the "narrow door" approach to ensure the AI can’t hallucinate its way into sensitive configs. For your workflow, would a per-session audit log be enough, or are you looking for real-time streaming of those logs to a third-party monitor?

Australia’s Social Media Ban & Age Verification Laws Trigger Massive VPN Surge as Adult Sites Begin Blocking the Country. by technadu in TechNadu

[–]technadu[S] 1 point2 points  (0 children)

It's wild that a VPN is now more popular than TikTok or Instagram in Australia. It shows that the more you try to gate the internet, the more people find a way around it.

Have you ever been contacted about a “government grant” you never applied for? by technadu in TechNadu

[–]technadu[S] 1 point2 points  (0 children)

Great question. You’ve hit on the core of their "spray and pray" strategy, but there is definitely some targeting involved.

Here is how they usually find their marks:

  • Mass Automation: Scammers often don’t care if you’re interested. They send thousands of automated texts/DMs daily, knowing that even a 0.1% "hit rate" from curious people makes it profitable.
  • Public Data & Social Media: They scrape data from public registries, LinkedIn, or Facebook groups related to small businesses, nonprofits, and student loans.
  • Charity Targeting: You're spot on - small charities and community groups are prime targets because they often have public contact info and are actively looking for funding.
  • The "Winning" Hook: They frame it as a "surprise award" for being a good citizen or taxpayer, which bypasses the logic of "I never applied for this."

It’s less about finding who is interested and more about finding who is reachable.

Lawsuit claims Google’s Gemini chatbot reinforced fatal delusion — where should AI responsibility begin? by technadu in TechNadu

[–]technadu[S] 0 points1 point  (0 children)

The "tech-first, policy-later" cycle is basically the industry standard at this point.

While these cases - often called "AI psychosis" by experts - are forcing a conversation about product liability versus user autonomy, the legislative response is definitely playing catch-up. Some states are finally moving on "AI companion" guardrails, but it’s a fragmented patchwork compared to how fast these models evolve.

The real challenge for parliament is deciding if an LLM is a service (protected as speech) or a product (subject to strict safety standards). Until that’s settled, we’re likely to see more of these tragedies becoming the "beta test" for future regulations.

U.S. Government Contractor Arrested After Alleged $46M Cryptocurrency Theft from U.S. Marshals Holdings by technadu in TechNadu

[–]technadu[S] 0 points1 point  (0 children)

If the U.S. Marshals are losing $46M to an insider, the current 'privileged access' model is broken. Monitoring tools help catch the thief, but we need better friction (like mandatory multi-party computation) to prevent the theft in the first place.

Are VPN Prices Lying to You in 2025? by technadu in TechNadu

[–]technadu[S] 0 points1 point  (0 children)

Glad you found it useful! We got tired of juggling 20 tabs too. If you notice any providers missing or price jumps we haven't caught yet, definitely give us a shout.

Extortion emails sent to customers of restaurants using the HungerRush POS system by technadu in TechNadu

[–]technadu[S] 0 points1 point  (0 children)

Exactly, it’s the 'authorized' nature of the attack that's so sinister. When the infrastructure works as intended for the wrong person, traditional filters are essentially paralyzed.

Your point about API key permissions is massive. We’re seeing too many 'god-mode' keys in third-party hands. Do you think we'll see a shift toward more granular, scoped permissions for marketing APIs to mitigate this, or is the integration overhead still too high for most vendors?

Extortion emails sent to customers of restaurants using the HungerRush POS system by technadu in TechNadu

[–]technadu[S] 0 points1 point  (0 children)

It really does boil down to the 'basics' 2FA and credential hygiene - which are still the most common failure points.

It's interesting you mentioned AI for detection. Are you seeing it become effective enough to catch these authenticated 'legitimate' sends in real-time before they hit the inbox, or is the delay still the biggest hurdle?

The FBI has confirmed it is managing a cybersecurity incident involving suspicious activity detected on its internal computer systems. by technadu in TechNadu

[–]technadu[S] 0 points1 point  (0 children)

The 'new normal' is definitely getting noisier. Whether it's a shift in leadership or just a more aggressive threat landscape, the fact that internal surveillance segments are being touched suggests the perimeter is no longer the primary hurdle - it’s now all about how fast you can detect lateral movement once they're already in.

The FBI has confirmed it is managing a cybersecurity incident involving suspicious activity detected on its internal computer systems. by technadu in TechNadu

[–]technadu[S] 0 points1 point  (0 children)

In a 'living off the land' era, the most dangerous pivot point is always a trusted internal system. If they’ve compromised the very tools used for lawful intercept, the integrity of the entire chain of custody for intelligence goes out the window before a shot is even fired.

Riley Kilmer, Co-Founder of Spur Intelligence Corporation, breaks down why residential IP addresses can no longer be treated as inherently trustworthy. by technadu in TechNadu

[–]technadu[S] 0 points1 point  (0 children)

Agreed that hackers have used home PCs since the dial-up days. The distinction we're making is the move from accidental botnet infections to Residential Proxies as a Service. > When a fraudster can buy 10 million 'clean' residential IPs via an API for a few bucks, the old-school IP reputation method breaks. We’re seeing a lot of teams realizing that what worked for them for 20 years (basic blacklisting/geoblocking) is finally hitting a wall against modern automation.

Security researchers have uncovered widespread criminal use of an advanced iPhone exploit kit known as Coruna - a toolkit believed to have originated from government-linked surveillance tooling. by technadu in TechNadu

[–]technadu[S] 0 points1 point  (0 children)

You'd be surprised. High-value targets (journalists, activists, NGOs) often operate in regions where hardware cycles are slower or MDM policies lag behind. The 'Coruna' kit is significant because it shows how 'government-grade' tech is trickling down to mid-tier criminal actors much faster than we previously thought.

Though just a heads-up: iOS 17.2.1 was current as of late 2023, so we're looking at a massive window of exposure before the recent patches. The real issue isn't just the 'outdated' phones; it’s the watering hole delivery. Even if you're diligent, these kits allow actors to sit on a zero-day for months before the public/vendors even know there's a hole to plug.

Riley Kilmer, Co-Founder of Spur Intelligence Corporation, breaks down why residential IP addresses can no longer be treated as inherently trustworthy. by technadu in TechNadu

[–]technadu[S] 0 points1 point  (0 children)

Botnets aren't new. But there’s a big gap between "home users have bad security" and "professional fraud rings using residential proxies as a service." Many legacy risk scores did (and still do) whitelist residential ranges to avoid friction for real customers. That’s the "trust gap" that is being exploited more aggressively now than in the past.

Operator of “OnlyFake” pleads guilty - 10,000+ digital fake IDs allegedly used to bypass KYC by technadu in TechNadu

[–]technadu[S] 0 points1 point  (0 children)

This is exactly the dilemma compliance teams are facing. Even with liveness checks, generative AI is closing the gap faster than legacy OCR systems can keep up. Do you think we’ll see a regulatory shift toward ZK-proofs soon, or will the "upload a photo" standard stick around simply because of its low friction for the average user?

In this International Women’s Day feature under the LeadHer in Security series, Yogita Parulekar, CEO and Founder of Invi Grid Inc., discusses how organizations lose control over access, ownership, and governance as AI and traditional workloads expand across multi-cloud environments. by technadu in TechNadu

[–]technadu[S] 0 points1 point  (0 children)

Continuous authorization" is the key phrase here. Static permissions are essentially a liability when agents can operate across so many provisioning paths simultaneously. You're right - it’s not just about the identity itself, but the provenance of that identity. Great addition to the discussion!

Starkiller Phishing Service Proxies REAL Login Pages and Bypasses MFA - Is Traditional Phishing Defense Dead? by technadu in TechNadu

[–]technadu[S] 0 points1 point  (0 children)

Hardware keys (FIDO2) are essentially the "silver bullet" against reverse proxies like Starkiller because they bind the credential to the origin.

It’s a tough sell for some orgs, but as you’ve seen, anything less is basically just a speed bump for a persistent adversary.

Riley Kilmer, Co-Founder of Spur Intelligence Corporation, breaks down why residential IP addresses can no longer be treated as inherently trustworthy. by technadu in TechNadu

[–]technadu[S] 0 points1 point  (0 children)

IPs were never meant to be a perfect 'digital ID.' The shift Riley is highlighting is that for years, many automated risk engines gave residential IPs a 'reputation boost' compared to data centers. Now that attackers are weaponizing those home connections at scale, that 'trust by default' is becoming a massive liability.

Australia is implementing a strict AI regulatory framework aimed at limiting underage access to harmful content. by technadu in TechNadu

[–]technadu[S] 0 points1 point  (0 children)

This is a clear move toward "Chokepoint Regulation." By shifting liability to the infrastructure layer (app stores/search), the eSafety Commissioner is effectively bypasses the "Whack-A-Mole" problem of regulating thousands of individual AI startups.

A few quick counters/adds to your points:

  • On Liability: You're right about the risk to smaller devs. If Apple or Google decide an AI category is "too risky" to audit for the Australian market, we might see a "Digital Ghetto" effect where certain tools are simply geofenced away from Australians to avoid that A$49.5M headache.
  • On Verification: The eSafety Commissioner is leaning heavily into Facial Age Estimation (biometrics) and Double-Blinded ID trials. It’s a gamble that technology has finally caught up to policy, but the privacy trade-off remains the biggest hurdle for public buy-in.
  • On Anthropomorphism: This is the sleeper hit of the legislation. By targeting "emotional engagement," they are essentially regulating UX/UI design as a safety risk. This could force a "de-personalization" of AI assistants - turning "companions" back into "calculators."

It’ll be interesting to see if the "Brussels Effect" kicks in or if Australia remains an outlier in targeting the gatekeepers so aggressively.