Security firm Cybereason has open-sourced owLSM, an EDR-like agent for Linux, an eBPF LSM agent to run Sigma rules
Security firm Cybereason has open-sourced owLSM, an EDR-like agent for Linux, an eBPF LSM agent to run Sigma rules
The White House app ships with a sanctioned Chinese tracking SDK,
the FBI app serves ads,
and FEMA wants 28 permissions to show you weather alerts.
https://www.sambent.com/the-white-house-app-has-huawei-spyware-and-an-ice-tip-line
RE: https://infosec.exchange/@patrickcmiller/116307323864759774
"What we're seeing is that the attackers basically don't need to create malware anymore [...]". "They can just use config files."
🗓️ Exactly one month ago on Saturday morning, 28 February, #Iran was plunged into digital darkness as authorities cut off access to the global internet.
After four full weeks, 672 hours, the blackout remains in effect, violating Iranians' right to communicate and stay informed.
Estonia's intel chief: Ukraine's strikes on Russia's Baltic ports halted exports through a route carrying 40–50% of Russian petroleum products
"Ukraine chose the moment very well… At least temporarily, Russia's revenue from oil exports will decrease — and with it, the funding for its war."
https://euromaidanpress.com/2026/03/27/estonian-intelligence-ukraines-port-strikes-halt-route-carrying-40-50-of-russias-oil-exports/
I may regret this. You may regret this.
I've just put out a Linux forensics scenario for you all to play around with. There's a contest. You r submissions are due by 2026-04-15 23:59 UTC.
"Real time identification of phishing attacks through machine learning enhanced browser extensions"
https://www.nature.com/articles/s41598-026-35655-7?utm_source=chatgpt.com

Phishing attack continues to rank among the deadliest online threats. They create phony websites in an attempt to obtain personal data. This study offers a framework for a browser extension that uses machine learning to examine URLs and visual components in Google Chrome in order to identify phishing websites in real-time. Using support vector machine (SVM), decision tree (DT), and random forest (RF) algorithms, the suggested system gathers and examines data from websites, extracts hybrid elements including lexical, structural, and visual layout parameters, and arranges them. The best traits that can distinguish between items are found using the grey wolf optimizer (GWO). This reduces computer power consumption and facilitates finding items. GWO enhanced the random forest model, which performed well on benchmark datasets such as the Berkeley ML Archives and PhishTank. On the MCC test, it received a score of 0.96 and had an accuracy rate of 98.7%.This method is used by the Chrome extension to assess URLs for visual similarity in real time and display warnings to users that change according to their actions.The proposed system is better than current anti-phishing solutions because it works better in real time, has a lower false-positive rate, and can handle obfuscated URLs. This project makes a useful, user-centered defense system that can protect against phishing attacks that change over time by using smart security at the browser level.