news
Security Leftovers
-
APNIC ☛ [Podcast] What’s going on in bad traffic in 2025
Adli Wahid explores the APNIC honeypot network and explains how Members can access honeynet traffic data via DASH.
-
Cyble Inc ☛ Critical Linux UDisks Daemon Vulnerability (CVE-2025-8067) Exposes Privileged Data to Local Attackers
A newly disclosed security flaw in the Linux UDisks daemon has been reported. Tracked as CVE-2025-8067, the out-of-bounds read vulnerability allows local, unprivileged users to access files and data owned by privileged accounts, a serious breach with potentially far-reaching implications.
Red Hat officially disclosed the vulnerability on August 28, 2025, classifying it as Important in severity and assigning it a preliminary CVSS v3.1 base score of 8.5 out of 10.
-
Pen Test Partners ☛ Start hacking Bluetooth Low Energy today! (part 3)
TL;DR Introduction If you haven’t read the previous posts, I would recommend them as a primer to the devices, BLE and what we’re doing.
In part one, we made a low-cost key finder beep by capturing and replaying BLE traffic, covering GATT, handles, and characteristics.
-
Security Week ☛ Wytec Expects Significant Financial Loss Following Website Hack
Wytec’s website was defaced twice by unknown threat actors more than a week ago and it has yet to be brought back online.
-
Federal News Network ☛ House Homeland Security committee looks to reform the Cybersecurity Sharing Act
The bill is advancing in the House, but its path forward in the Senate remains unclear as the law’s expiration nears.