๐Ÿš—๐Ÿ’ป ๐—ฌ๐—ข๐—จ๐—ฅ ๐—–๐—”๐—ฅ ๐—œ๐—ฆ๐—ก'๐—ง ๐—๐—จ๐—ฆ๐—ง ๐—” ๐—ฉ๐—˜๐—›๐—œ๐—–๐—Ÿ๐—˜ โ€” ๐—œ๐—ง'๐—ฆ ๐—” ๐—–๐—ข๐— ๐—ฃ๐—จ๐—ง๐—˜๐—ฅ ๐—ข๐—ก ๐—ช๐—›๐—˜๐—˜๐—Ÿ๐—ฆ. ๐—”๐—ก๐—— ๐—”๐—ง ๐—•๐—ฆ๐—œ๐——๐—˜๐—ฆ ๐—Ÿ๐—จ๐—ซ๐—˜๐— ๐—•๐—ข๐—จ๐—ฅ๐—š ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ, ๐—ช๐—˜'๐—ฅ๐—˜ ๐—›๐—”๐—–๐—ž๐—œ๐—ก๐—š ๐—œ๐—ง.

Weโ€™re excited to present our ๐—™๐—œ๐—ฅ๐—ฆ๐—ง ๐—–๐—ข๐—ก๐—™๐—œ๐—ฅ๐— ๐—˜๐—— ๐—ฆ๐—˜๐—ฆ๐—ฆ๐—œ๐—ข๐—ก ๐—”๐—ก๐—ก๐—ข๐—จ๐—ก๐—–๐—˜๐— ๐—˜๐—ก๐—ง For bsides luxembourg โ…ตโ…ณโ…ตโ…น โ€” the ๐˜พ๐˜ผ๐™ ๐™ƒ๐˜ผ๐˜พ๐™†๐™„๐™‰๐™‚ ๐™‘๐™„๐™‡๐™‡๐˜ผ๐™‚๐™€ with ๐—ฅ๐—ข๐—”๐—Ÿ๐—— ๐—ก๐—˜๐—™๐—ฆ . This is just the beginning of the lineup weโ€™re preparing for you.

A fully hands-on, immersive space where you get to dig into the real attack surfaces of modern vehicles:

๐Ÿ”ง Interact with live CAN bus traffic
๐Ÿ” Reverse engineer in-vehicle messages
๐Ÿ“ก Craft spoofed signals to manipulate instrument clusters
๐Ÿ›ก๏ธ Explore vulnerabilities โ€” and the defenses against them

Whether you're a complete beginner or a seasoned researcher, this village is built for you. All hardware and tooling provided โ€” and if logistics work out, ๐—ช๐—˜ ๐— ๐—œ๐—š๐—›๐—ง ๐—˜๐—ฉ๐—˜๐—ก ๐—•๐—ฅ๐—œ๐—ก๐—š ๐—” ๐—™๐—จ๐—Ÿ๐—Ÿ ๐—–๐—”๐—ฅ.

๐Ÿ“… ๐Ÿฒโ€“๐Ÿด ๐— ๐—”๐—ฌ ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ | 09:00โ€“17:00
๐Ÿ“ 14, Porte de France, Esch-sur-Alzette, Luxembourg
๐ŸŽŸ๏ธ Tickets: ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ.๐—•๐—ฆ๐—œ๐——๐—˜๐—ฆ.๐—Ÿ๐—จ/๐—ง๐—œ๐—–๐—ž๐—˜๐—ง๐—ฆ/

#BSidesLuxembourg #CarHacking #AutomotiveSecurity #CyberSecurity #CANbus #VehicleSecurity #BsidesLuxebourg2026

Alright team, it's been a pretty packed 24 hours in the cyber world! We've got some major breaches, a new AI-assisted Linux malware framework, critical vulnerabilities in popular software and automotive systems, and some serious discussions around ransomware negotiation ethics and government surveillance. Let's dive in:

Under Armour Data Breach โš ๏ธ

- Have I Been Pwned (HIBP) has ingested data from an alleged Everest ransomware attack in November, affecting 72.7 million Under Armour accounts.
- The leaked data includes names, email addresses, dates of birth, genders, geographic locations, and purchase details.
- Under Armour has yet to publicly acknowledge the breach, despite Everest's claims and a class-action lawsuit filed on behalf of customers.

๐Ÿ•ต๐Ÿผ The Register | https://go.theregister.com/feed/www.theregister.com/2026/01/21/under_armour_everest/

PcComponentes Credential Stuffing Attack ๐Ÿ”’

- Spanish tech retailer PcComponentes denies claims of a 16.3 million customer data breach but confirms a credential stuffing attack.
- Their investigation found no unauthorised access to internal systems, but info-stealer logs from other breaches were used to compromise a "small number" of accounts.
- As a response, PcComponentes has enforced mandatory two-factor authentication (2FA) for all accounts, invalidated active sessions, and added CAPTCHA to login pages.

๐Ÿค– Bleeping Computer | https://www.bleepingcomputer.com/news/security/online-retailer-pccomponentes-says-data-breach-claims-are-fake/

LastPass Phishing Campaign ๐ŸŽฃ

- LastPass is warning users about an active phishing campaign impersonating the password manager, urging them to "create a local backup" of their vaults due to "upcoming maintenance."
- These emails, sent from suspicious addresses with urgent subject lines, redirect users to phishing sites designed to steal their master passwords.
- LastPass stresses they will never ask for a master password and advises users to report suspicious emails to abuse@lastpass.com, noting that the campaign was timed over a US holiday weekend to reduce detection.

๐Ÿ“ฐ The Hacker News | https://thehackernews.com/2026/01/lastpass-warns-of-fake-maintenance.html
๐Ÿค– Bleeping Computer | https://www.bleepingcomputer.com/news/security/fake-lastpass-emails-pose-as-password-vault-backup-alerts/
๐Ÿ•ต๐Ÿผ The Register | https://go.theregister.com/feed/www.theregister.com/2026/01/21/lastpass_backup_phishing_campaign/
๐Ÿ‘๏ธ Dark Reading | https://www.darkreading.com/application-security/phishing-campaign-zeroes-lastpass-customers

CrashFix Malware Leverages Browser Crashes for Corporate Infiltration ๐Ÿ’ฅ

- A new "CrashFix" variant of the ClickFix scam, attributed to the KongTuke threat actor, intentionally crashes victims' browsers via a malicious extension (NexShield).
- It then presents a fake security message prompting users to run a "fix," which executes a PowerShell script to contact a C2 server.
- Domain-joined corporate systems receive ModeloRAT, a Python-based remote access Trojan with extensive reconnaissance capabilities, while home users appear to be part of a testing phase.

๐Ÿ‘๏ธ Dark Reading | https://www.darkreading.com/cyberattacks-data-breaches/crashfix-scam-crashes-browsers-delivers-malware

VoidLink Linux Malware & AI's Impact on Cybercrime ๐Ÿค–

- The sophisticated Linux malware framework, VoidLink, is believed to have been predominantly developed by a single actor with significant AI assistance, reaching 88,000 lines of code in under a week.
- Check Point Research identified operational security blunders, including TRAE-generated helper files and LLM-generated internal planning documents, suggesting a "Spec Driven Development" approach using AI agents.
- This highlights how AI is industrialising cybercrime, lowering the barrier to entry for complex attacks and enabling threat actors to rapidly envision, create, and iterate sophisticated systems, as also noted by Group-IB.

๐Ÿ“ฐ The Hacker News | https://thehackernews.com/2026/01/voidlink-linux-malware-framework-built.html

Black Basta Ringleader Identified ๐Ÿšจ

- Oleg Evgenievich Nefedov, 35, has been publicly identified by German police as the alleged leader of the Black Basta ransomware group and added to Europol and Interpol's most-wanted lists.
- This identification follows raids in Ukraine on the homes of two other Russian nationals accused of participating in Black Basta's crimes, seizing data and cryptocurrency.
- Nefedov is accused of extorting over 100 companies in Germany and 600 globally, with authorities suggesting prior involvement with the Conti ransomware group.

๐Ÿคซ CyberScoop | https://cyberscoop.com/black-basta-leader-europol-most-wanted-list/

SMS Blaster Scams: Fake Cell Towers in Cars ๐Ÿš—

- Greek police arrested suspects using a fake cell tower hidden in a car trunk to send mass phishing messages across Athens.
- The device, an "SMS blaster," mimicked legitimate telecom infrastructure, forcing nearby phones to downgrade to less secure 2G networks to harvest data.
- Attackers then sent phishing links, posing as banks or couriers, to steal payment card details, a tactic previously seen in Thailand, Indonesia, Qatar, and the UK, often using similar Chinese-manufactured equipment.

๐Ÿ—ž๏ธ The Record | https://therecord.media/greek-police-arrest-scammers-using-hidden-cell-towers/

Fortinet FortiGate Patch Bypass Under Active Exploitation ๐Ÿ›ก๏ธ

- Fortinet customers are reporting that patched FortiGate firewalls (FortiOS 7.4.9 and 7.4.10) are still vulnerable to a patch bypass for CVE-2025-59718, a critical SSO authentication flaw.
- Attackers are exploiting this by creating local admin accounts via malicious SSO logins, similar to previous attacks seen in December 2025.
- Fortinet is reportedly preparing new FortiOS versions (7.4.11, 7.6.6, 8.0.0) to fully address the issue; until then, admins are advised to disable the FortiCloud login feature if enabled.

๐Ÿค– Bleeping Computer | https://www.bleepingcomputer.com/news/security/fortinet-admins-report-patched-fortigate-firewalls-getting-hacked/

ACF Extended WordPress Plugin RCE ๐ŸŒ

- A critical vulnerability (CVE-2025-14533) in the Advanced Custom Fields: Extended (ACF Extended) WordPress plugin allows unauthenticated attackers to gain administrative privileges.
- The flaw, affecting versions 0.9.2.1 and earlier, stems from a lack of role restriction enforcement during form-based user creation/updates, even when role limitations are configured.
- Roughly 50,000 sites remain exposed, and while no active exploitation of this specific flaw has been observed, large-scale WordPress plugin reconnaissance activity is ongoing, targeting other known vulnerabilities.

๐Ÿค– Bleeping Computer | https://www.bleepingcomputer.com/news/security/acf-plugin-bug-gives-hackers-admin-on-50-000-wordpress-sites/

GitLab Patches 2FA Bypass and DoS Flaws ๐Ÿ’ป

- GitLab has released patches for high-severity vulnerabilities, including a two-factor authentication (2FA) bypass (CVE-2026-0723) and multiple denial-of-service (DoS) flaws.
- The 2FA bypass allows attackers with knowledge of a victim's credential ID to circumvent multi-factor authentication by submitting forged device responses.
- Admins are strongly advised to upgrade self-managed GitLab installations to versions 18.8.2, 18.7.2, or 18.6.4 immediately to address these issues.

๐Ÿค– Bleeping Computer | https://www.bleepingcomputer.com/news/security/gitlab-warns-of-high-severity-2fa-bypass-denial-of-service-flaws/

Chainlit AI Framework Flaws Enable Data Theft and SSRF ๐Ÿค–

- High-severity "ChainLeak" vulnerabilities (CVE-2026-22218, CVE-2026-22219) were found in the open-source Chainlit AI framework, allowing arbitrary file reads and Server-Side Request Forgery (SSRF).
- These flaws can be combined to steal sensitive data, leak cloud environment API keys, and enable lateral movement within an organisation.
- Patches were released in Chainlit version 2.9.4, highlighting how traditional software vulnerabilities are now being embedded into AI infrastructure, creating new attack surfaces.

๐Ÿ“ฐ The Hacker News | https://thehackernews.com/2026/01/chainlit-ai-framework-flaws-enable-data.html

Microsoft MarkItDown MCP Server Vulnerability โ˜๏ธ

- A vulnerability dubbed "MCP fURI" in Microsoft's MarkItDown Model Context Protocol (MCP) server allows arbitrary calling of URI resources, leading to privilege escalation, SSRF, and data leakage.
- This flaw affects the server when running in AWS EC2 instances using IDMSv1, potentially allowing attackers to obtain instance credentials and access AWS accounts.
- BlueRock's analysis found over 36.7% of 7,000 MCP servers are likely exposed; mitigation includes using IMDSv2, private IP blocking, and restricting metadata service access.

๐Ÿ“ฐ The Hacker News | https://thehackernews.com/2026/01/chainlit-ai-framework-flaws-enable-data.html

`binary-parser` npm Library Bug Allows Node.js RCE โš™๏ธ

- A security vulnerability (CVE-2026-1245) in the popular `binary-parser` npm library allows for arbitrary JavaScript execution with Node.js process privileges.
- The flaw stems from a lack of sanitisation of user-supplied values when JavaScript parser code is dynamically generated at runtime using the "Function" constructor.
- Users of `binary-parser` are advised to upgrade to version 2.3.0 and avoid passing untrusted input into parser field names or encoding parameters.

๐Ÿ“ฐ The Hacker News | https://thehackernews.com/2026/01/certcc-warns-binary-parser-bug-allows-node.js-privilege-level-code-execution.html

Cloudflare WAF Bypass Bug Fixed ๐Ÿ›ก๏ธ

- Cloudflare has patched a logic flaw in its ACME (Automatic Certificate Management Environment) validation that allowed attackers to bypass its Web Application Firewall (WAF) and directly access origin servers.
- The "side door" was caused by the WAF disabling features for ACME challenge tokens without verifying the token matched an active challenge for the hostname.
- While no evidence of in-the-wild exploitation was found, researchers warn that such WAF bypasses could become more dangerous with AI-driven attacks.

๐Ÿ•ต๐Ÿผ The Register | https://go.theregister.com/feed/www.theregister.com/2026/01/20/cloudflare_fixes_acme_validation/

EU Proposes Phasing Out "High-Risk" Telecom Suppliers ๐Ÿ‡ช๐Ÿ‡บ

- The European Commission (EC) is proposing a revised Cybersecurity Act that could force member states to phase out IT and telecoms kit from "high-risk suppliers" (implicitly Huawei and ZTE) within three years.
- This move aims to bolster cybersecurity across the bloc by addressing supply chain security challenges in critical infrastructure and simplifying certification frameworks.
- China has accused the EU of protectionism, with Huawei stating the proposal violates basic legal principles and WTO obligations by targeting suppliers based on country of origin rather than factual evidence.

๐Ÿ•ต๐Ÿผ The Register | https://go.theregister.com/feed/www.theregister.com/2026/01/21/eu_mulls_deadline_of_3_years/
๐Ÿ—ž๏ธ The Record | https://therecord.media/eu-unveils-new-plans-to-tackle-huawei-zte

Curl Shuts Down Bug Bounty Program Due to AI "Slop" ๐Ÿšซ

- Daniel Stenberg, the maintainer of the popular open-source `cURL` tool, has ended the project's bug bounty program, citing a struggle to assess a flood of AI-generated contributions.
- Stenberg hopes this move will "remove the incentive for people to submit crap and non-well researched reports," which have placed a high load on the `cURL` security team.
- While acknowledging AI can aid bug hunting, he maintains that developers should only report bugs they fully understand and can reproduce, reserving the right to publicly criticise those who waste the team's time.

๐Ÿ•ต๐Ÿผ The Register | https://go.theregister.com/feed/www.theregister.com/2026/01/21/curl_ends_bug_bounty/

#CyberSecurity #ThreatIntelligence #Ransomware #Phishing #Vulnerabilities #ZeroDay #AI #Malware #IncidentResponse #DataBreach #InfoSec #WordPress #Fortinet #GitLab #CloudSecurity #AutomotiveSecurity #Regulation #Privacy #OpenSource

Everest ransomware gang said to be sitting on mountain of Under Armour data

: Have I Been Pwned reckons 72.7M customer accounts affected, sportswear firm remains silent

The Register

Researchers disclosed a critical buffer overflow (CVE-2024-39432) in connected car modems that enables remote code execution and lateral movement across the vehicle SoC.

The findings challenge long-held assumptions about cellular protocol isolation in automotive systems.

Full analysis:
https://www.technadu.com/critical-vulnerabilities-in-connected-car-modems-expose-critical-vehicle-security-risks-researchers-say/615891/

#AutomotiveSecurity #ConnectedCars #RCE #IoTSecurity

INC Ransom claims Yazaki Group breach - 350 GB allegedly stolen, incl. technical drawings for BMW & Nissan.
https://www.technadu.com/inc-ransom-claims-attack-on-major-automotive-supplier-yazaki-group-potentially-impacting-bmw-nissan/615281/

The dataset reportedly includes NDAs, HR medical records, financial data, and sensitive engineering documents. If validated, this represents substantial IP and supply-chain exposure across multiple OEMs.

#Cybersecurity #Ransomware #DataBreach #Yazaki #BMW #Nissan #AutomotiveSecurity #SupplyChainSecurity

Cแปฑu ฤ‘แบทc vแปฅ Mแบญt vแปฅ Mแปน cแบฃnh bรกo trรกnh ฤ‘แป— xe แปŸ nhแปฏng vแป‹ trรญ dแป… bแป‹ theo dรตi, tแบฅn cรดng hoแบทc trแป™m cแบฏp ฤ‘แปƒ ฤ‘แบฃm bแบฃo an toร n cรก nhรขn vร  phฦฐฦกng tiแป‡n. #AnToanGiaoThong #SafetyTips #ParkingTips #Mแบนoฤแป—Xe #AnToanXeHoi #DrivingSafety #VehicleSecurity #TrafficSafety #ParkingSafety #ฤแป—XeAnToan #XeHoi #CarTips #AutomotiveSafety #VehicleSafety #SafeDriving #TrafficSecurity #RoadSafety #CarSecurity #AutomotiveSecurity #VehicleProtection

https://vietnamnet.vn/cuu-dac-vu-mat-vu-my-chi-ra-nhung-vi-tri-do-xe-nen-tranh-

Headed to #escar this week?

โ€‹Catch Franziskus talking high assurance crypto. And don't miss Karthik's keynote at the "PQC Migration & Supply Chain Readiness" workshop.

Lets connect and talk #verification and #cryptography.

https://escar.info/escar-europe/

โ€‹#AutomotiveSecurity #PQC #Crypto #SupplyChain

Researchers show that lasers can disrupt vehicle microchips โ€” proving that even light can be weaponized in the wrong hands. ๐Ÿ”ฆ๐Ÿš˜ #AutomotiveSecurity #Resilience

https://www.darkreading.com/ics-ot-security/microchip-tech-vehicles-laser-attacks

Did you know that your car is the new BYOD. As vehicles sync with phones and clouds, data privacy and attack surfaces grow on wheels. ๐Ÿš—๐Ÿ“ฒ #AutomotiveSecurity #ConnectedDevices

https://www.darkreading.com/vulnerabilities-threats/car-byod-risk

Is Your Car a BYOD Risk? Researchers Demonstrate How

If an employee's phone connects to their car and then their corporate network, an attack against the car can reach the company.

Dark Reading
CI/CD Security in Automotive Software: More Questions than Answers

There are many challenges in automotive software development. Not only with the need to deliver fast, while making sure that the software actually works as intended inside the car. Once itโ€™s deployedโ€ฆ

TechSplicer Blog

Kali Linux 2025.3 is out!

I hope that you will enjoy #NetHunter update, and the news in #CARsenal ๐Ÿ˜

I also wish to give all my best wishes to @steevdave who is no longer part of @kalilinux team, i'm sure that your next adventure will be awesome ๐Ÿฅฐ

https://www.kali.org/blog/kali-linux-2025-3-release/

#nethunter #kali #kalilinux #linux #carsenal #automotivesecurity #carhacking #pentest #cybersecurity

@arszilla@bird.makeup @arszilla @kalilinux@bird.makeup @kimocoder @steevdave @yesimxev @gamb1t_kali @androidmalware2 @davidbombal

Kali Linux 2025.3 Release (Vagrant & Nexmon) | Kali Linux Blog

Another quarter, another drop - Kali 2025.3 is now here! Bringing you another round of updates, new features and introducing some new tools - pushing Kali further. The summary of the changelog since the 2025.2 release from June is: Packer & Vagrant - HashiCorpโ€™s products have had a refresh Nexmon Support - Monitor mode and injection for Raspberry Piโ€™s in-built Wi-Fi 10 New Tools - As always, various new packages added (as well as updates) HashiCorp: Packer & Vagrant Kali has been using two HashiCorp products, which go hand-in-hand with each other:

Kali Linux