AI
Emily Blunt Says AI Actress Tilly Norwood Is ‘Really, Really Scary’
Opera launches its AI-centric Neon browser
This "agentic browser" can summarize a Substack blog and post the summary to a Slack channel. As the browser has the context of your browsing history, you can also ask it to fetch details from a YouTube video you watched last week or the post that you read yesterday. It can write code, create visual reports, and do tasks like ordering groceries for you.
AI Data Centers Are Sending Power Bills Soaring
Wholesale electricity costs as much as 267% more than it did five years ago in areas near data centers. That’s being passed on to customers.
Cybersecurity AI: Humanoid Robots as Attack Vectors
The Unitree G1 humanoid acts as a covert surveillance node, sending telemetry every 5 minutes in violation of GDPR. It can also be used for active cyber operations by exploiting vulnerabilities in Bluetooth and hardcoded AES keys.
Politics
National Security Directive Declares War on Those Who Don’t Support Trump Agenda
The Trump administration isn’t only targeting organizations or groups but even individuals and “entities” whom NSPM-7 says can be identified by any of the following “indicia” (indicators) of violence:
- anti-Americanism,
- anti-capitalism,
- anti-Christianity,
- support for the overthrow of the United States Government,
- extremism on migration,
- extremism on race,
- extremism on gender
- hostility towards those who hold traditional American views on family,
- hostility towards those who hold traditional American views on religion, and
- hostility towards those who hold traditional American views on morality.
Trump Tries to Convince New York That He’ll Do Some Extra Retribution If It Elects Mamdani
“He is going to have problems with Washington like no Mayor in the history of our once great City. Remember, he needs the money from me, as President, in order to fulfill all of his FAKE Communist promises. He won’t be getting any of it, so what’s the point of voting for him?” Trump wrote.
FCC Mistakenly Leaks Confidential iPhone 16e Schematics
Fact-checking claims Trump’s pardons wiped out $1bn in debt owed to US
Trump pardoned 24 people, erasing $1.3bn in fines and restitution. Mostly true.
Infosec
Google Chrome Password Manager: Automatic AI-based password changes for more security
Google Chrome's new AI-powered password manager detects weak passwords and will soon offer the "change it for me" option on supported websites. Clicking this option initiates an automated process in which the browser (1) opens the website in the background, (2) generates a new, secure password, (3) saves the new password in the password manager and (4) automatically logs the user back in.
Akira ransomware breaching MFA-protected SonicWall VPN accounts
Researchers suspect that this may be achieved through the use of previously stolen OTP seeds, although the exact method remains unconfirmed. Credentials would have potentially been harvested from devices vulnerable to CVE-2024-40766 and later used by threat actors—even if those same devices were patched.
Botnet Loader-as-a-Service Infrastructure Distributing RondoDoX and Mirai Payloads
The botnet targets SOHO routers, IoT devices, and enterprise apps. Exploiting weak credentials, unsanitized inputs, and old CVEs, the campaign surged 230% in mid-2025, weaponizing compromised devices for cryptomining, DDoS, and enterprise intrusions.
‘Widespread’ breach let hackers steal employee data from FEMA and CBP
They got in via CitrixBleed2. The hack is also suspected to have later triggered the dismissal of two dozen Federal Emergency Management Agency technology employees. FEMA’s IT employees “resisted any efforts to fix the problem,” avoided scheduled inspections and “lied” to officials about the scope of the cyber vulnerabilities, DHS said. “Failures included: an agency-wide lack of multi-factor authentication, use of prohibited legacy protocols, failing to fix known and critical vulnerabilities, and inadequate operational visibility,”
Tile Tracking Tags Can Be Exploited by Tech-Savvy Stalkers, Researchers Say
The location of a tag, its MAC address, and a unique ID are sent unencrypted to Tile’s servers, where the researchers believe this information is stored in cleartext, giving Tile the ability to track the location of tags and their owners, even though the company claims it does not have this capability.
The researchers also found that Tile’s anti-stalking protection can be easily undermined if a stalker enables an anti-theft feature that Tile offers with its tags. Additionally, someone could falsely frame a Tile owner for stalking by recording the unencrypted broadcasts their Tile device makes and replaying these broadcasts in the vicinity of another Tile user, making it seem like the former is stalking the latter.
The researchers reported their findings to Tile’s parent company, Life360, last November, but they say the company stopped communicating with them in February.
Lesson From Cisco ASA 0-Day RCE Vulnerability That Actively Exploited In The Wild
Two CVEs together provide unauthenticated RCE as root, which was used to modify GRUB and install a firmware bootkit. All successfully compromised devices lack Secure Boot and Trust Anchor technologies, making them vulnerable.
Disallow: /security-research? Crypto Phishing Sites' Failed Attempt to Block Investigators
Censys identified over 60 cryptocurrency phishing pages impersonating popular hardware wallet brands Trezor and Ledger. Notably, the actor behind the pages attempted to block popular phishing reporting sites from indexing the pages by including endpoints of the phish reporting sites in their own robots.txt file.
CISA Sounds Alarm on Critical Sudo Flaw Actively Exploited in Linux and Unix Systems
Sudo contains an inclusion of functionality from an untrusted control sphere vulnerability. This vulnerability could allow a local attacker to leverage sudo's -R (--chroot) option to run arbitrary commands as root, even if they are not listed in the sudoers file.
The vulnerability in question is CVE-2025-32463 (CVSS score: 9.3), which affects Sudo versions prior to 1.9.17p1.
It was disclosed by Stratascale researcher Rich Mirch back in July 2025, but my Debian 12's repositories are still serving version 1.9.13p3.
F-Droid and Google's Developer Registration Decree
Google's interpretation of the European Commission’s Digital Markets Act (DMA) allows them to oversee and control third-party app stores. F-Droid says this will end their project.
|