MongoDB have a blog out about #MongoBleed
Notably:
- Internal find at MongoDB
- they notified customers of the issue and patch availability on December 23rd
- A security vendor published technical details on December 24th, Christmas Eve
- Somebody at Elastic, a direct competitor, published an exploit with full secret extraction feature on December 25th, Christmas Day
That was an impossible situation for orgs - the security industry poured fire on them and set their own customers on fire.
Digital Safety in a Dangerous World is officially published now!
I poured my heart into this book. Thank you, everyone.
https://www.kickstarter.com/projects/kimcrawley/digital-safety-in-a-dangerous-world/posts/4576687
A lawyer was explaining to court why he used AI when he was then caught using AI in that explanation of why he was using AI (earlier)
Okay that is legitimately sick:
LinkPro modifies the /etc/ld.so.preload configuration file to specify the path of the libld.so shared library that it embeds, with the goal of hiding various artifacts that could reveal the backdoor's presence.
Once libld.so is loaded at the execution of a program, for example /usr/bin/ls, it hooks (before glibc) several libc functions to modify results that could reveal the presence of LinkPro. Here is the observed behavior for the hooked functions:
Modifying LD_PRELOAD is a well-known TTP (T1574.006). However, most detections will be about the environment variable, not the .so files themselves being mutated. Of course, this all requires root to accomplish, but this kind of stealthy persistence is exactly what basic detection tools will miss.
Shadowrun Anarchy 2.0 Offers A Leaner, Meaner Classic Cyberpunk RPG
https://www.forbes.com/sites/robwieland/2025/08/27/shadowrun-anarchy-20-offers-a-leaner-meaner-classic-cyberpunk-rpg/?utm_source=flipboard&utm_medium=activitypub
Posted into Innovation @innovation-forbes
Ashley Rindsberg and Fox News are furious at Wikipedia editors for “attacking” Charlie Kirk by... listing the viewpoints he prominently and publicly advocated
BTW #3 is probably worth paying attention to here: 3. Safety Considerations
Due to the highly sensitive nature of these leaked materials, we strongly advise anyone who chooses to download and analyze them to take proper operational security precautions. It may be possible that these files may contain potentially risky content and accessing them in an insecure environment could expose you to surveillance or malware.
Please consider analyzing these files only in an isolated (virtual) machine without internet access.
The Great Firewall of China has apparently experienced a great data spill. > 500gb of source code, work logs and internal communication records were leaked. Some light reading for the weekend /s
The Great Firewall of China (GFW) experienced the largest leak of internal documents in its history on Thursday September 11, 2025. Over 500 GB of source code, work logs, and internal communication records were leaked, revealing details of the GFW's research, development, and operations.