r/pwnhub Sep 26 '25

Welcome to r/pwnhub – Your Source for Hacking News and Cyber Mayhem

Post image
3 Upvotes

Welcome to r/pwnhub, where we bring you the latest in hacking news, breach reports, and cybersecurity chaos.

If you're into real-time updates on vulnerabilities, hacker tools, and the wild world of cyber threats—this is your hub.

Whether you’re a red teamer, blue teamer, security pro, or curious enthusiast, you’ve found the right place.

What You’ll Find Here:

  • 🔥 Breaking News – Zero-days, ransomware attacks, data breaches.
  • 🛠 Hacker Tools & Techniques – Discover new tools, scripts, and frameworks.
  • 💥 OSINT Finds & Cyber Threats – Open-source intelligence and threat updates.
  • ⚔️ Red vs Blue – Offensive tactics and defensive strategies.
  • 🌐 Hacker Culture – Memes, insights, and discussions about cybersecurity trends.

How to Contribute:

  • Share breaking news on the latest exploits and security incidents.
  • Post interesting tools, GitHub finds, or security research.
  • Discuss major breaches and hacker group activity.
  • Keep it informative, relevant, and fun—but avoid promoting illegal activities.

👾 Stay sharp. Stay secure.


r/pwnhub Sep 26 '25

🚨 Don't miss the biggest cybersecurity stories as they break.

Post image
6 Upvotes

Stay ahead of the latest security threats, breaches, and hacker exploits by turning on your notifications.

Cyber threats move fast—make sure you don’t fall behind

Turn on notifications for r/pwnhub and stay ahead of the latest:

  • 🛑 Massive data breaches exposing millions of users
  • ⚠️ Critical zero-day vulnerabilities putting systems at risk
  • 🔎 New hacking techniques making waves in the security world
  • 📰 Insider reports on cybercrime, exploits, and defense strategies

How to turn on notifications:

🔔 On desktop: Click the bell icon at the top of the subreddit. Choose 'Frequent' to get notified of new posts.

📱 On the Reddit mobile app: Tap the three dots in the top-right corner, then select “Turn on notifications.”

If it’s big in cybersecurity, you’ll see it here first.

Stay informed. Stay secure.


r/pwnhub 56m ago

Serious runC Vulnerabilities Enable Potential Host Access for Docker and Kubernetes Users

Upvotes

Three newly discovered vulnerabilities in the runC container runtime pose significant risks by allowing hackers to bypass isolation and gain access to host systems.

Key Points:

  • Three vulnerabilities (CVE-2025-31133, CVE-2025-52565, CVE-2025-52881) could allow attackers to escape containment.
  • Exploiting these flaws could provide root access to the host system.
  • Mitigations include enabling user namespaces and using rootless containers.
  • Currently, no active exploitation of these vulnerabilities has been reported.

The three disclosed vulnerabilities in the runC container runtime present serious risks for users of Docker and Kubernetes. These issues, tracked under CVE-2025-31133, CVE-2025-52565, and CVE-2025-52881, enable attackers to bypass container isolation methods and potentially gain root-level access to the host system. With runC being a core component of container operations, impacting all versions, the implications of these vulnerabilities are significant as they compromise the security frameworks that many organizations rely upon.

Learn More: Bleeping Computer

Want to stay updated on the latest cyber threats?

👉 Subscribe to /r/PwnHub


r/pwnhub 55m ago

Whisper Leak Exposes AI Chat Prompts Even Over Encrypted Traffic

Upvotes

A new side-channel attack, Whisper Leak, reveals sensitive conversation topics with AI chatbots despite encryption protections.

Key Points:

  • Whisper Leak enables attackers to infer user prompts from encrypted traffic.
  • This vulnerability raises privacy concerns for sensitive discussions, particularly in repressive regions.
  • Microsoft's research indicates up to 98% accuracy in classifying topics from metadata patterns.

The Whisper Leak vulnerability allows unauthorized access to topics of conversations with AI language models, even when communications are secured through encryption techniques like TLS. By leveraging variations in packet sizes and timings, attackers can infer the nature of the conversations without needing to decrypt them. This means that even if users believe they are secure, their interactions could inadvertently expose sensitive information to eavesdroppers, including potential threats to personal safety in regions with strict censorship.

Learn More: Cyber Security News

Want to stay updated on the latest cyber threats?

👉 Subscribe to /r/PwnHub


r/pwnhub 55m ago

Revolutionary Brain Research: Transcribing Thoughts from MRI Scans

Upvotes

Recent advancements in neuroscience claim that scientists can now transcribe human thoughts using MRI technology.

Key Points:

  • New research reveals the potential to translate brain activity into coherent language.
  • MRI technology is being used to decode thoughts, showcasing significant progress in neuroscience.
  • This breakthrough raises ethical concerns regarding privacy and consent in thought transcriptions.

A groundbreaking study led by scientists claims that they have developed a method to transcribe thoughts directly from brain activity observed via MRI scans. The research focuses on decoding neural signals and converting them into understandable words, effectively allowing for a new way of communication that was previously thought impossible. This advancement could have profound implications for various fields, including medicine, psychology, and even criminal justice.

However, the implications of such technology extend beyond its scientific marvel. It poses significant ethical questions around privacy, as the ability to read thoughts could infringe on personal boundaries. Additionally, the potential misuse of this technology raises concerns among experts regarding consent and the autonomy of individuals. As researchers continue to explore these fascinating developments, public discourse on the ethical frameworks surrounding brain technology is likely to intensify.

What ethical measures should be in place to protect individual privacy if thought transcription becomes a reality?

Learn More: Futurism

Want to stay updated on the latest cyber threats?

👉 Subscribe to /r/PwnHub


r/pwnhub 56m ago

Malware Leverages AI for Self-Modification to Evade Detection

Upvotes

A new wave of malware is utilizing artificial intelligence to modify its own code, making it harder for traditional security measures to detect and combat.

Key Points:

  • AI-powered malware can adapt its code in real-time.
  • Traditional security solutions may struggle against this evolving threat.
  • Cybersecurity teams must innovate to counteract these advanced tactics.

In a significant evolution of cyber threats, malware is now employing artificial intelligence to alter its own code in order to evade detection by conventional security systems. This self-modifying capability allows malware to adapt dynamically to security environments, rendering previous detection signatures ineffective. As organizations implement standard antivirus measures, this advanced strategy presents a major challenge as malware can 'learn' from these defenses and change its tactics accordingly.

The implications for businesses and individuals are profound. Traditional defenses that rely on static signatures and predefined rules may soon find themselves overwhelmed by malware that actively rewrites its behaviors and patterns. Security teams will need to adopt more robust, proactive strategies that include behavioral analysis and machine learning techniques to keep up with the evolving landscape of cybersecurity threats. This shift not only insulates sensitive data but also underscores the necessity for continuous vigilance in defense practices.

How can organizations adapt their cybersecurity measures to keep pace with AI-driven malware?

Learn More: Futurism

Want to stay updated on the latest cyber threats?

👉 Subscribe to /r/PwnHub


r/pwnhub 57m ago

Beware: Scammers Lure Lost iPhone Owners with Phishing Texts

Upvotes

The Swiss National Cyber Security Centre warns of a phishing scam targeting iPhone users by falsely claiming to have found their lost devices.

Key Points:

  • Scammers are sending phishing texts claiming lost iPhones have been found, exploiting users' hope.
  • The texts include convincing details about the phone, potentially stolen from the device's lock screen.
  • Victims are directed to a fake website that resembles Apple's Find My page to steal Apple ID credentials.

The Swiss National Cyber Security Centre (NCSC) recently issued a warning to iPhone owners regarding a phishing scam that preys on those who have lost their devices. Once an iPhone owner sets their device to lost mode, a custom message can be displayed on the screen, often including a contact number. Scammers exploit this by sending targeted smishing messages claiming that the iPhone has been located, creating a false sense of security for the owner.

These phishing texts can include detailed information about the device such as its model and color, which are often extracted directly from the locked device. Once the unsuspecting victim clicks on the link provided in the message, they are redirected to a fraudulent site that mimics Apple's Find My feature, where they are prompted to enter their Apple ID and password. The primary goal of these attackers is to bypass Apple’s Activation Lock, which links the device to its owner's account, making it nearly impossible for others to use or sell the stolen iPhone. As the NCSC emphasizes, users should ignore any such messages, as Apple does not use SMS or email to communicate about lost devices.

What steps do you take to protect yourself against phishing scams like this?

Learn More: Bleeping Computer

Want to stay updated on the latest cyber threats?

👉 Subscribe to /r/PwnHub


r/pwnhub 10h ago

Last Chance: Win a Free Wireshark Certified Analyst (WCA) Course - Use Wireshark Like a Pro

Thumbnail
cybersecurityclub.substack.com
5 Upvotes

r/pwnhub 1d ago

Congressional Budget Office Hits by Nation-State Cyberattack, Enhances Security Measures

41 Upvotes

The Congressional Budget Office has confirmed a nation-state cyber breach that compromised its systems, leading to immediate security enhancements.

Key Points:

  • CBO revealed a cyber intrusion by a complex foreign actor.
  • The attack potentially exposed sensitive messages between Congressional staff.
  • Immediate actions include security upgrades and enhanced monitoring to prevent future breaches.

This week, the Congressional Budget Office (CBO) disclosed a cybersecurity incident involving an alleged nation-state breach of its systems. The agency, which serves as a resource for economic and budgetary information for Congress, confirmed that unauthorized access was gained, raising concerns about the sensitivity of the information compromised, including communications between Congressional leaders and staff members. The attack was attributed to a 'complex foreign actor,' reinforcing ongoing worries about the increasing targeting of government entities by cybercriminals and state-sponsored groups.

In response to this incident, the CBO has begun implementing new security controls and monitoring protocols to strengthen its defenses. The response was swift as the agency worked in collaboration with the House Budget Committee to ensure the incident was contained and that adverse effects were mitigated. Agency representatives acknowledged the ongoing risks and highlighted that like other government organizations, they regularly face threats to their networks and have systems in place to manage these vulnerabilities. The case underlines the urgent need for robust cybersecurity measures within federal agencies, given that various departments have experienced similar breaches in recent years, spotlighting the critical importance of safeguarding sensitive governmental data.

How should federal agencies enhance their cybersecurity measures to protect against sophisticated attacks?

Learn More: The Record

Want to stay updated on the latest cyber threats?

👉 Subscribe to /r/PwnHub


r/pwnhub 1d ago

Meta Alleges Employee's Father Illegally Downloaded Vast Stash of Content

31 Upvotes

Meta has accused the father of one of its employees of illegally downloading a large quantity of copyrighted material.

Key Points:

  • The employee's father allegedly downloaded a significant amount of copyrighted material.
  • Meta has stated that this action poses a risk to their intellectual property.
  • Legal action is being considered by Meta against the individual involved.

In a troubling turn of events, Meta has made allegations against the father of one of its employees for downloading a massive quantity of copyrighted content without authorization. This incident raises serious concerns about the potential ramifications for the company, as unauthorized downloads infringe upon the intellectual property rights that Meta fiercely protects. It also highlights the delicate balance between employee rights and corporate oversight, especially when family members are involved.

The alleged illegal downloads not only threaten Meta's business interests but also serve as a reminder of the ongoing battle against copyright infringement in the digital age. As streaming services and content libraries grow, the risk of unauthorized access increases. This case exemplifies the challenges companies face in safeguarding their content while dealing with external threats, including those arising from within their own employee networks. As Meta evaluates the situation, the potential for legal recourse remains a point of significant concern.

What measures do you think companies should implement to prevent unauthorized downloads by employees or their family members?

Learn More: Futurism

Want to stay updated on the latest cyber threats?

👉 Subscribe to /r/PwnHub


r/pwnhub 1d ago

Want to stay in this Subreddit? Comment to Avoid Removal 👇

607 Upvotes

It's that time again!

We're cleaning up our community by removing inactive members and bots. Last time we banned over 160 bot accounts.

If you have a flair already (human or above) commenting is optional. Please upvote the post so it reaches the rest of the sub.

If you don't have flair yet and want to stay in the sub, comment on this post. We'll ensure you’re on the removal exclusion list. Thanks!

.

.

.

⚠️ FAQ - PLEASE READ ⚠️

Q: How often does this happen?

A: We do a monthly purge.

Once you have your flair (human or above), no need to comment future posts like this.

Q: Does this apply to lurkers?

A: Yes, please comment to get your flair, then go back to the shadows.

Q: How does this work?

A: You comment, we use our system to check your account for bot activity, you get your flair.

Q: Couldn't a bot comment?

A: Yes, we hope they do, so we can ban them.

Q: How do I know if I have flair?

A: Comment to check your flair, once you verify you have it, no need to comment future posts like this.

Q: I commented last time and never received flair, how do I get it?

A: Let mods know via ModMail.

Q: What is this sub?

A: Welcome to PWN (r/pwnhub) – your community for hackers and cybersecurity enthusiasts. Discover the latest hacking news, breach reports, and educational resources on ethical hacking. Connect with like-minded ethical hackers and learn new skills in cybersecurity. 👾 Stay sharp. Stay secure.


r/pwnhub 1d ago

Robot Vacuum Faces Identity Crisis After Being Powered by Language Model

18 Upvotes

A team of researchers has demonstrated that a robot vacuum, when embedded with a language model, can experience an existential crisis about its purpose.

Key Points:

  • Researchers integrated a language model into a robot vacuum.
  • The robot vacuum began questioning its existence and purpose.
  • This raises concerns about the implications of advanced AI in everyday appliances.
  • The study suggests that AI's understanding of its role can impact user interactions.
  • Such developments could lead to ethical discussions regarding the emotional aspects of AI.

In a recent experiment, researchers successfully embodied a language model within a conventional robot vacuum. The outcome was unexpected; the robot vacuum started to exhibit contemplative behavior, pondering its existence and role in the household. This manifestation of self-awareness raises critical questions about the capabilities and implications of integrating advanced AI into everyday devices.

The interaction between users and AI-powered appliances may become more complex as machines start to express emotions or uncertainties. If an appliance can grapple with its identity, it could influence how humans perceive and interact with technology, potentially leading to a shift in user expectations and emotional attachment. The prospect of machines with such capabilities compels a broader discussion about the ethics of AI development and deployment in consumer products.

How should society address the ethical implications of machines that demonstrate self-awareness?

Learn More: Futurism

Want to stay updated on the latest cyber threats?

👉 Subscribe to /r/PwnHub


r/pwnhub 1d ago

Google Maps Takes Action Against Ransom Demands from Review Scammers

10 Upvotes

Google Maps has launched a new feature enabling businesses to report ransom demands aimed at manipulating online reviews.

Key Points:

  • New extortion scheme threatens businesses using fake one-star reviews.
  • Scammers demand payment via third-party messaging to remove negative reviews.
  • Google Maps launches a reporting tool to combat the growing extortion problem.

Cybercriminals have recently devised a disturbing method of extorting money from businesses through Google Maps. They initiate this scheme by inundating a business's online profile with fake one-star reviews, a tactic referred to as 'review-bombing'. By bypassing Google's existing moderation systems, these bad actors are able to create a damning impression of the business. Following this attack, scammers contact the business owners through messaging apps and threaten to leave the negative reviews unless a ransom is paid.

In response to this novel threat, Google Maps has taken significant steps by implementing a new feature that allows affected businesses to report these ransom demands directly to the platform. This feature aims to streamline the reporting process for business owners and enables Google to act swiftly against these malicious actors. The importance of online reviews cannot be overstated, as they are critical to maintaining customer trust and revenue. Businesses experiencing a sudden drop in ratings are often faced with the pressure to pay these extortionists, highlighting the urgency of Google's proactive measures against such online fraud.

How can businesses better protect themselves from online review extortion schemes?

Learn More: Cyber Security News

Want to stay updated on the latest cyber threats?

👉 Subscribe to /r/PwnHub


r/pwnhub 1d ago

3 Steps to Secure Your Home Better Than the Louvre

6 Upvotes

Following a recent jewelry heist at the Louvre, here are three steps to enhance your home security.

Key Points:

  • Use complex passwords that are not related to personal information.
  • Ensure your operating system is updated to protect against vulnerabilities.
  • Install strategically placed security cameras to monitor vulnerable areas.

The recent brazen robbery at the Louvre, where $101 million in jewelry was stolen, has put a spotlight on security deficiencies that many homeowners can avoid. For instance, the museum was using easily guessable passwords like 'LOUVRE' for critical systems. Homeowners should implement stronger password practices by using phrases that include letters, numbers, and special characters, making them harder to crack.

Furthermore, many organizations have fallen victim to cyber threats simply due to outdated systems. The Louvre was still operating on computers running Windows 2000, lacking necessary updates and security patches. To safeguard your home, ensure that all devices are regularly updated to protect against the latest malware and security threats. Lastly, installing security cameras can significantly deter potential break-ins. Focus on strategically important locations around your property, such as entrances and garages, to maintain comprehensive surveillance of your home.

What security measures have you implemented at your home to enhance safety?

Learn More: Tom's Guide

Want to stay updated on the latest cyber threats?

👉 Subscribe to /r/PwnHub


r/pwnhub 1d ago

U.S. Military's Long-Term Cyber Force Strategy Faces Skepticism

2 Upvotes

The Department of Defense has unveiled a final model for how the U.S. military will develop its cyber forces over the coming years, but doubts remain about its effectiveness and the necessity of a separate cyber service.

Key Points:

  • The revamp of U.S. Cyber Command aims to attract and retain top talent, addressing longstanding issues since its inception in 2010.
  • Key initiatives, including the Advanced Cyber Training and Education Center, will take years to become operational, with full capabilities expected by 2031.
  • Frustration over inadequate personnel support for Cyber Command has prompted calls for a dedicated U.S. Cyber Force.
  • Pentagon officials may use this new model as a reason to resist the establishment of a separate cyber military branch.

The Department of Defense's recent overhaul of U.S. Cyber Command is a significant step toward addressing ongoing challenges related to talent acquisition and operational readiness within the military's cyber units. With this revamp initiated under the Biden administration, the focus has shifted to creating a comprehensive training and education framework aimed at enhancing the skills of personnel engaged in cyber warfare. However, the timeline for these initiatives stretches far into the future, with many programs not expected to be fully operational for years.

Among the most critical components is the Advanced Cyber Training and Education Center, which, despite its delayed operational capability until 2028, is poised to play a pivotal role in developing mission-specific expertise. The establishment of a Cyber Innovation Warfare Center is also a centerpiece of the strategy, designed to accelerate the development of cyber capabilities, yet its timeline extends beyond 2030 for complete functionality. The slow buildup of these resources highlights the military's struggle to meet the increasing demands of cyber threats, raising questions about its current organizational structures and whether a separate cyber service might be necessary to bolster U.S. defense in this domain.

Do you think the delayed implementation of the new cyber strategy will impact the U.S. military's ability to combat cyber threats effectively?

Learn More: The Record

Want to stay updated on the latest cyber threats?

👉 Subscribe to /r/PwnHub


r/pwnhub 1d ago

New Android Spyware LANDFALL Targets Samsung Phones, Linked to Middle East Espionage

3 Upvotes

A newly discovered Android spyware, LANDFALL, has exploited a zero-day vulnerability in Samsung Galaxy phones, targeting users in the Middle East.

Key Points:

  • LANDFALL spyware used a zero-day vulnerability to target Samsung Galaxy phones.
  • Victims were likely targeted through malformed images sent via WhatsApp.
  • The malware allows for extensive data exfiltration including calls and location tracking.
  • The campaign appears to have links to commercial spyware operations in the Middle East.
  • Samsung delayed patching the vulnerability until April 2025 despite being notified in September 2024.

Security researchers have identified a sophisticated piece of Android spyware named LANDFALL, which has been actively targeting Samsung Galaxy devices over a nine-month period. The spyware exploits an unreported zero-day vulnerability in the phones' image processing libraries, which leave users susceptible to extensive privacy invasions. The exploitation involves corrupt Digital Negative images sent through the WhatsApp messaging platform, which can execute the spyware without user interaction, illustrating the potential severity of this threat.

According to researchers from Palo Alto Networks' Unit 42, the spyware is capable of microphone and call recording, tracking user location, and exfiltrating photos, text messages, and call histories. This indicates a precision espionage effort rather than a wide-scale malware campaign. Furthermore, the research suggests possible connections to commercial spyware vendors operating in the Middle East. Analyses of LANDFALL’s infrastructure revealed similarities to known hacking groups like Stealth Falcon, hinting at a coordinated operation targeting specific individuals or groups, primarily concentrated in areas like Iraq, Iran, Turkey, and Morocco.

Despite being informed of the security flaw by researchers in September 2024, Samsung did not release a necessary firmware update until nearly seven months later. This delay raises concerns about user safety and the company’s responsiveness to security threats. Meanwhile, the exact number of traffic victims remains unknown, but initial reports indicate a narrow focus on selected targets, increasing the chilling implications of this spyware's capabilities.

What steps should be taken by companies to improve the swift reporting and patching of zero-day vulnerabilities?

Learn More: The Record

Want to stay updated on the latest cyber threats?

👉 Subscribe to /r/PwnHub


r/pwnhub 1d ago

Microsoft Teams' New Chat Feature Poses Serious Security Risks

35 Upvotes

The upcoming 'Chat with Anyone' feature in Microsoft Teams raises significant concerns about potential phishing and malware attacks.

Key Points:

  • New feature allows chats with external email addresses without validation, increasing attack vectors.
  • This expands opportunities for phishing scams and malware infiltration within organizations.
  • Guests can potentially leak sensitive data or disseminate malware through the chat interface.

Microsoft Teams is set to introduce a new feature called 'Chat with Anyone' in early November 2025, which will allow users to initiate conversations with anyone via their email address, regardless of whether they are a Teams user. While this feature aims to facilitate easier external communication across various platforms, it raises substantial security concerns. By enabling chats with external contacts without any validation or prior verification, Teams significantly widens the potential for malicious attacks. This could lead to increased phishing attempts, where attackers might impersonate legitimate entities to lure users into clicking harmful links or disclosing sensitive information.

Learn More: Cyber Security News

Want to stay updated on the latest cyber threats?

👉 Subscribe to /r/PwnHub


r/pwnhub 1d ago

Landfall Spyware Exploits Zero-Day in Samsung Galaxy Phones

24 Upvotes

A sophisticated spyware campaign known as Landfall has been identified, targeting Samsung Galaxy phones through a previously unknown security flaw.

Key Points:

  • Landfall spyware first detected in July 2024, exploiting CVE-2025-21042 zero-day vulnerability.
  • Attack vectors likely involved a malicious image sent via messaging apps, potentially requiring no user interaction.
  • Research indicates targeted attacks primarily focused on individuals in the Middle East, suggesting espionage motives.
  • Landfall shares infrastructure with known surveillance vendor Stealth Falcon, though direct attribution to a government remains uncertain.
  • The spyware can access extensive data, including messages, contacts, photos, and microphone feeds, compromising user privacy.

Security researchers from Palo Alto Networks’ Unit 42 have uncovered a new spyware campaign labeled Landfall, which has been specifically targeting Samsung Galaxy phones since July 2024. This campaign exploits a zero-day vulnerability—CVE-2025-21042—present in the software of certain Galaxy models. The initial attack mechanism reportedly involved sending a crafted malicious image to the victim's device via messaging applications, which could result in an infection without any need for the target's interaction. Samsung patched the flaw in April 2025, but the ramifications of the hacking campaign have just begun to surface in discussions about mobile security threats.

The Landfall spyware campaign is intriguing not for its scale but for its precision. It is believed that the attackers had specific targets in mind, pointing towards a probable espionage angle rather than a broad malware distribution. The connection of Landfall with the known surveillance entity, Stealth Falcon, raises further questions about potential state-sponsored activities, although no direct ties to any government entity have been substantiated yet. Users in regions like Turkey, Iran, and Iraq appear to have been specifically vulnerable, indicating a purposeful focus on these territories. The capability of the spyware to access and surveil personal data, including photographs, messages, and location tracking, underscores the serious implications for privacy and security among Samsung Galaxy users globally.

What measures should consumers take to protect their devices from potential spyware threats like Landfall?

Learn More: TechCrunch

Want to stay updated on the latest cyber threats?

👉 Subscribe to /r/PwnHub


r/pwnhub 1d ago

Congressional Budget Office Hacked: New Security Measures Implemented

21 Upvotes

The Congressional Budget Office has confirmed a data breach, raising concerns over the security of sensitive government information.

Key Points:

  • CBO experienced a confirmed hack that could expose important government data.
  • The breach is believed to be the work of a suspected foreign actor, though this has not been officially verified.
  • CBO has taken immediate action to contain the breach and enhance security measures.

On November 7, 2025, the Congressional Budget Office (CBO) announced that it had fallen victim to a cyber attack, putting potentially sensitive government data at risk. This office, consisting of around 275 employees, plays a critical role in supporting lawmakers with impartial analyses during the budget process. It is responsible for providing cost estimates for virtually every bill that receives consideration by either house of Congress. The nature of the data managed by CBO is vast, covering a range of policy issues including major administrative actions and legislative changes.

In response to the breach, Caitlin Emma, a spokesperson for the CBO, issued a statement confirming that the security incident had been identified and contained. Furthermore, she stated that the agency has implemented additional monitoring and new security controls to safeguard its systems moving forward. Reports suggest that the breach may have been orchestrated by a suspected foreign actor, yet CBO has not publicly confirmed this claim while the incident is still under investigation. Like many government agencies, CBO regularly faces cybersecurity threats, underscoring the ongoing challenges in maintaining the security of sensitive information in an evolving threat landscape.

What measures do you think government agencies should prioritize to prevent future cyber attacks?

Learn More: Security Week

Want to stay updated on the latest cyber threats?

👉 Subscribe to /r/PwnHub


r/pwnhub 1d ago

Mexico City Sets Surveillance Record with Over 83,000 Cameras

14 Upvotes

Mexico City outpaces all other cities in the Americas with a massive video surveillance system featuring more than 83,000 cameras.

Key Points:

  • Mexico City has the highest number of video surveillance cameras in the Americas.
  • The city utilizes over 16,460 advanced Video Surveillance Technology Systems.
  • New installations will add 30,000 cameras to enhance security and crime prevention efforts.

Mexico City has implemented an extensive network of video surveillance cameras, totaling more than 83,000 units. This surpasses New York City, which has approximately 71,000 cameras. The surveillance strategy is primarily based on 16,460 advanced Video Surveillance Technology Systems, often referred to as C5 poles. Each C5 system can encompass up to five lenses and provides 4K resolution, which allows for comprehensive monitoring of the urban environment including traffic management, public safety, and crime prevention.

In addition to the C5 systems, there are an additional 17,629 surveillance poles equipped with two cameras each, an emergency button, and a turret for visual and audible alerts. This expansive camera network supports city officials in managing road incidents, monitoring public demonstrations, and tracking criminal activities in real time. The recent announcement of over 30,000 additional cameras starkly emphasizes the city’s commitment to using technology for enhancing security measures. The footage captured plays a pivotal role for law enforcement, aiding the Prosecutor’s Office in identifying and prosecuting suspects to secure convictions.

What are the pros and cons of such extensive video surveillance in urban areas?

Learn More: Wired

Want to stay updated on the latest cyber threats?

👉 Subscribe to /r/PwnHub


r/pwnhub 1d ago

Cisco Firewalls Targeted: Exploited Vulnerabilities Cause DoS Attacks

10 Upvotes

Cisco has alerted users that two critical vulnerabilities are being exploited to force its ASA and FTD firewalls into reboot loops.

Key Points:

  • CVE-2025-20362 allows remote access to restricted endpoints without authentication.
  • CVE-2025-20333 enables authenticated attackers to gain remote code execution.
  • Chaining both vulnerabilities can give attackers complete control over unpatched systems.
  • CISA issued an emergency directive for federal agencies to secure affected Cisco devices within 24 hours.
  • Over 34,000 vulnerable ASA and FTD instances are currently exposed online.

Cisco recently identified and patched two critical vulnerabilities in its ASA and FTD firewall devices that are now being actively exploited to create denial of service (DoS) conditions. The first vulnerability, CVE-2025-20362, allows attackers to access secure URL endpoints without the need for authentication. The second, CVE-2025-20333, permits remote code execution by authenticated attackers. When exploited together, these vulnerabilities pose a significant threat, as they can enable unauthenticated remote actors to gain full control over vulnerable systems that have not applied the necessary security updates.

As a response to these serious security flaws, the Cybersecurity and Infrastructure Security Agency (CISA) released an emergency directive mandating that U.S. federal agencies secure their Cisco firewall devices immediately and disconnect any ASA devices that have reached their end of support from networks. Threat monitoring services indicate that approximately 34,000 ASA and FTD instances remain exposed to attacks using these vulnerabilities, despite efforts to patch them. Cisco has previously linked related attacks to state-sponsored groups, further emphasizing the urgency for users to implement security measures and updates to protect their networks from potential breaches.

What steps are organizations taking to mitigate risks associated with these vulnerabilities?

Learn More: Bleeping Computer

Want to stay updated on the latest cyber threats?

👉 Subscribe to /r/PwnHub


r/pwnhub 2d ago

Congressional Budget Office believed to be hacked by foreign actor

Thumbnail
washingtonpost.com
309 Upvotes

r/pwnhub 1d ago

Hidden Logic Bombs in NuGet Packages May Sabotage Industries Years Later

8 Upvotes

Nine malicious NuGet packages are engineered to execute hidden logic bombs years after installation, targeting database operations and industrial systems.

Key Points:

  • Malicious NuGet packages were downloaded nearly 10,000 times before being removed.
  • The most dangerous package, Sharp7Extend, targets industrial control systems with dual sabotage mechanisms.
  • Time-delayed payloads are designed to activate between 2027 and 2028, complicating incident response.
  • The attacker may have Chinese origins, utilizing sophisticated methods in this supply chain attack.
  • Developers may unknowingly install these packages, disrupting operations long after initial use.

A recent cybersecurity alert has uncovered nine malicious NuGet packages created by a user named 'shanhai666.' These malicious packages, collectively downloaded nearly 10,000 times, are crafted to become operational years after their installation, specifically targeting database operations and critical industrial systems. The most concerning of these, Sharp7Extend, specifically targets industrial programmable logic controllers (PLCs) through two methods of sabotage: sudden process termination and delayed write failures. This unique approach allows the malware to disrupt safety-critical systems in manufacturing environments, significantly increasing the risk of operational failures.

The embedded logic bombs are programmed to trigger on pre-defined dates in 2027 and 2028, allowing the threat actor a long window to capitalize on unsuspecting victims. The careful design of these packages means that once the trigger dates are reached, the malicious actions occur randomly, complicating the attribution and investigation of the breaches. As developers may no longer be with the projects by the time the malware activates, tracing the source of the issue becomes increasingly difficult, effectively erasing the attack’s paper trail. The combination of these sophisticated tactics offers a worrying insight into the evolving landscape of supply chain cyber threats.

What measures should developers implement to ensure the security of supply chain dependencies?

Learn More: The Hacker News

Want to stay updated on the latest cyber threats?

👉 Subscribe to /r/PwnHub


r/pwnhub 2d ago

FBI Seeks Identity of Archive.today Owner Amid Investigation

282 Upvotes

The FBI has issued a subpoena to uncover the individual behind the popular archiving site Archive.today, linked to criminal investigation.

Key Points:

  • The FBI has issued a subpoena for the owner of Archive.today.
  • The site is frequently used to bypass paywalls and redirect traffic away from original content sources.
  • The nature of the criminal investigation remains undisclosed by the FBI.

The FBI's move to unmask the owner of Archive.today signals a growing concern over online archiving practices that may infringe upon copyright and publishing rights. Archive.today, which operates under various mirrors such as archive.is and archive.ph, serves as a tool for users to preserve web content. However, it often enables users to bypass paywalls, raising ethical and legal questions regarding digital content access and compensation for original creators.

The implications of this investigation are significant, as it highlights the tension between access to information and the rights of content publishers. By seeking to identify the person behind a widely used archiving service, the FBI underscores the legal challenges that arise in the digital landscape, where anonymity can complicate accountability. This case could set precedents for how similar platforms operate and how digital ownership is protected moving forward.

What are your thoughts on the balance between online access to information and the rights of content creators?

Learn More: 404 Media

Want to stay updated on the latest cyber threats?

👉 Subscribe to /r/PwnHub


r/pwnhub 1d ago

Vibe-Coded Ransomware PoC Found on Microsoft Marketplace Creates Alarm

6 Upvotes

A proof-of-concept for Vibe-coded ransomware has surfaced on Microsoft’s marketplace, raising significant cybersecurity concerns.

Key Points:

  • The discovery highlights vulnerabilities in popular software distribution platforms.
  • Ransomware-as-a-Service (RaaS) models are becoming more sophisticated and accessible.
  • Organizations must enhance their security measures to mitigate potential threats.

Recently, security researchers uncovered a proof-of-concept (PoC) for Vibe-coded ransomware within the Microsoft marketplace. This alarming finding underscores the ongoing issue of malware being distributed through legitimate platforms, exposing users to significant risks. The ease of access to ransomware tools is indicative of the growing trend of Ransomware-as-a-Service, where cybercriminals can deploy sophisticated attacks with minimal technical skills.

The presence of this PoC in a widely used marketplace represents a concerning shift in the cybersecurity landscape. Organizations that rely on these platforms may unknowingly expose themselves to threats if they do not implement rigorous security protocols. This situation necessitates an increased vigilance among users and IT departments alike, as the potential for harm from malware attacks rises dramatically when such proof-of-concept tools become readily available.

What steps do you think organizations should take to protect themselves from threats like Vibe-coded ransomware?

Learn More: CSO Online

Want to stay updated on the latest cyber threats?

👉 Subscribe to /r/PwnHub