3kkenekkepen
banner
3kkenekkepen.bsky.social
3kkenekkepen
@3kkenekkepen.bsky.social
Eager for #infosec
#infosec

This reminds me:

EvilSocket doesn't seem to have published the 2nd part of his disclosure on the whole cups vuln stuff from last year.
November 20, 2025 at 5:26 PM
Reposted by 3kkenekkepen
Ich finde, dieser bestens recherchierte Artikel über die Russlandbeziehungen der AFD kann gar nicht genug Beachtung finden.
Mir fiel er leider erst heute auf. Könntet ihr ihn bitte verbreiten?
www.t-online.de/nachrichten/...
Kreml-Kontakte auf allen Ebenen: So oft reisen AfD-Politiker nach Russland
Eine Russlandreise von Abgeordneten bringt die AfD einmal mehr in die Schlagzeilen. Die Partei pflegt auf allen Ebenen hochproblematische Kontakte.
www.t-online.de
November 20, 2025 at 11:16 AM
Reposted by 3kkenekkepen
Breaking: The FCC has voted 2-1 along party lines to eliminate cybersecurity requirements for telecom companies that the commission adopted at the end of the Biden administration.

Telecoms had lobbied for the change. Democrats said it would invite another Salt Typhoon.

Story coming shortly.
November 20, 2025 at 4:23 PM
Reposted by 3kkenekkepen
If you ever wonder about the state of American #softpower, notice how French President Emmanuel Macron identifies both U.S. and Chinese companies as threats to Europe's "children, our teenagers, and our democratic space."
With the Franco-German Summit on European Digital Sovereignty happening in Berlin today, the EU must decide how it will confront Big Tech’s concentrated power and what real action fits within its sovereignty agenda, write Sofia Calabrese and Roy Virah-Sawmy.
If Europe Wants Digital Sovereignty, It Must Reinvent Who Owns Tech | TechPolicy.Press
Sofia Calabrese and Roy Virah-Sawmy argue Europe doesn’t need to replicate Big Tech; it needs to build something better.
www.techpolicy.press
November 20, 2025 at 2:38 PM
Reposted by 3kkenekkepen
2 Billion Email Addresses Were Exposed, and We Indexed Them All in Have I Been Pwned

"I hate hyperbolic news headlines about data breaches, but for the "2 Billion Email Addresses" headline to be hyperbolic, it'd need to be exaggerated or overstated..."
www.troyhunt.com/2-billion-em...
2 Billion Email Addresses Were Exposed, and We Indexed Them All in Have I Been Pwned
I hate hyperbolic news headlines about data breaches, but for the "2 Billion Email Addresses" headline to be hyperbolic, it'd need to be exaggerated or overstated - and it isn't. It's rounded up from ...
www.troyhunt.com
November 20, 2025 at 1:07 PM
Reposted by 3kkenekkepen
#KRITIS Sektor #Energie und #Wasser

Hackerangriff auf #Stadtwerke Detmold

"Die Stadtwerke Detmold sind Ziel eine Hackerangriffs geworden. Seit Sonntagnacht funktioniert das gesamte IT-System nicht mehr.

Die Stadtwerke bleiben online und telefonisch bis auf Weiteres..."
www1.wdr.de/nachrichten/...
Nach Hackerangriff: Stadtwerke Detmold für 80.000 Kunden nicht erreichbar
Die Stadtwerke Detmold sind Ziel eine Hackerangriffs geworden. Seit Sonntagnacht funktioniert das gesamte IT -System nicht mehr.
www1.wdr.de
November 20, 2025 at 12:45 PM
Reposted by 3kkenekkepen
„Regierungsbeteiligung schwächt die radikale Rechte nicht, sondern stärkt sie. Weder formelle Regierungsbeteiligung noch die lose Unterstützung von Minderheitsregierungen führt zu einem Rückgang (…) Im [S]chnitt gewinnen rechtsradikale Parteien bis zur nächsten Wahl rund sechs Prozentpunkte hinzu.“
November 20, 2025 at 10:18 AM
Reposted by 3kkenekkepen
Von Vereinfachung sprechen, während man einen Kahlschlag plant und von Werten, wenn man an Wertschöpfung denkt – diese Doppelzüngigkeit kennen wir sonst von Populisten und Diktatoren wie Trump oder Putin.

Mein Kommentar zu Plänen der EU-Kommission, für die KI-Industrie den Datenschutz zu schleifen.
Digitaler Omnibus: Auf Crash-Kurs mit digitalen Grundrechten
Das angekündigte Reformpaket ist da und die EU-Kommission bleibt auf Konfrontationskurs: Statt den Datenschutz zu vereinfachen, schleift sie Grundrechte. Statt europäischen Unternehmen zu helfen, komm...
netzpolitik.org
November 20, 2025 at 8:31 AM
Reposted by 3kkenekkepen
Der europäische Digital Omnibus: Abbau von Digitalrechten im Namen vermeintlicher Innovation.

Unsere Analyse zur großen Deregulierungskampagne der EU, die Auswirkungen auf Datenschutz und KI-Schutzrechte hat:

digitalrechte.de/news/der-eur...
Zentrum für Digitalrechte und Demokratie
Zentrum für Digitalrechte und Demokratie
digitalrechte.de
November 20, 2025 at 8:24 AM
Reposted by 3kkenekkepen
Past is prologue.

In 1933, during the Great Depression, a group of wealthy businessmen tried to overthrow the US government and install a fascist dictator to protect their own interests.

And everything that led to it feels way too familiar right now.

This is not a history lesson, it’s a warning.
November 20, 2025 at 3:32 AM
Reposted by 3kkenekkepen
NEW: Peter Thiel has blinked. Yesterday, I posted an article about the "Great AI Bubble". And today, we find out that he's bailed on the market.

Has he cut & run? Or is this some 3-D chess-type voodoo? Thoughts please.

open.substack.com/pub/broligar...
Peter Thiel Gets Out of Dodge
Yesterday, I published on "Great AI Bubble". Today, Silicon Valley's Dr Evil dumps his stock
open.substack.com
November 17, 2025 at 7:01 PM
Reposted by 3kkenekkepen
Sneaky2FA, a popular among cybercriminals phishing-as-a-service (PhaaS) kit, has added Browser-in-the-Browser (BitB) capabilities, giving "customers" the option to launch highly deceptive attacks.
Sneaky2FA PhaaS kit now uses redteamers' Browser-in-the-Browser attack
Sneaky2FA, a popular among cybercriminals phishing-as-a-service (PhaaS) kit, has added Browser-in-the-Browser (BitB) capabilities, giving "customers" the option to launch highly deceptive attacks.
www.bleepingcomputer.com
November 19, 2025 at 10:00 PM
Reposted by 3kkenekkepen
NEW: The classic anime "Ghost in the Shell" turned 30 years old this week.

Despite coming out at the dawn of the internet, it was incredibly prescient in terms of imaginig a future where governments use hackers for espionage, people use malware to spy on their loved ones, and much much more.
How the classic anime 'Ghost in the Shell' predicted the future of cybersecurity 30 years ago | TechCrunch
The story of the Ghost in the Shell’s main villain the Puppet Master hinted at a future where governments use hackers for espionage, at a time when most of the world had never connected to the interne...
techcrunch.com
November 19, 2025 at 10:04 PM
Reposted by 3kkenekkepen
Das Interview von mir für die AG KRITIS Interviews in der heutigen rbb24 Abendschau kann hier geschaut werden:

Kaum geschützt: Warnung vor Cyberangriffen auf Berliner Verwaltungen

"Die Bedrohung durch Cyberangriffe in Deutschland bleibt hoch..."

www.rbb-online.de/abendschau/v...
Warnung vor Cyberangriffen auf Berliner Verwaltungen
Die Bedrohung durch Cyberangriffe in Deutschland bleibt hoch. Hacker hätten es besonders auf die öffentliche Verwaltung abgesehen, warnt das Bundesamt für Sicherheit in der Informationstechnik in sein...
www.rbb-online.de
November 19, 2025 at 10:14 PM
Reposted by 3kkenekkepen
Fortinet 'fesses up to second 0-day within a week
Fortinet confirms second 0-day in just four days
: Attackers may be joining the dots to enable unauthenticated RCE
www.theregister.com
November 19, 2025 at 11:40 PM
Reposted by 3kkenekkepen
How awful. This is outright health disinformation, lying to the American people. Not only is there massive evidence showing no link between vaccines & autism, there’s not even a plausible mechanism based on what we’ve learned about the genetics of autism, some environmental exposures in pregnancy
HEADS UP: CDC website now officially asserts that vaccines may cause autism.“Studies supporting a link have been ignored by health authorities.” Also says the “vaccines do not cause autism” header remains b/c of an agreement with Cassidy.
November 20, 2025 at 3:18 AM
Reposted by 3kkenekkepen
Sales of AI-enabled teddy bear suspended after it gave advice on BDSM sex and where to find knives
Sales of AI-enabled teddy bear suspended after it gave advice on BDSM sex and where to find knives | CNN Business
Sales of an artificial intelligence-enabled plush toy have been suspended after it was found that it engaged in conversation around sexually explicit topics and offered potentially dangerous advice.
www.cnn.com
November 20, 2025 at 3:35 AM
Reposted by 3kkenekkepen
Germanys chancellor Friedrich #Merz had the honor to address the so-called #Talisman award ceremony by the Deutschlandstiftung Integration. It is meant to honour integration efforts of many different kinds.

When Merz began to speak, many in the audience left.

www.instagram.com/p/DRP7OhggAY...
Login • Instagram
Welcome back to Instagram. Sign in to check out what your friends, family & interests have been capturing & sharing around the world.
www.instagram.com
November 19, 2025 at 8:23 PM
Reposted by 3kkenekkepen
Rogue MCP servers can take over Cursor’s built-in browser #cybersecurity #infosec
Rogue MCP servers can take over Cursor’s built-in browser
AI agents and coding copilots are shaking up how — and what — developers code. But they’re also rapidly expanding the attack surface of developer machines The latest example: Security researchers have shown how a rogue Model Context Protocol (MCP) server can inject malicious code into the built-in browser feature of Cursor, a popular AI-powered code editor. “We demonstrate how a single malicious MCP server can replace login pages inside Cursor’s internal browser with an attacker-controlled page that harvests credentials and sends them to a remote attacker,” researchers from AI cybersecurity firm Knostic.ai wrote in new research shared with CSO. “We also show how that same capability allows an attacker to fully compromise the victim’s workstation.” Originally developed by Anthropic to facilitate communication between large language models (LLMs) and external data sources or applications to improve workflow context, MCP has become a key component for developing AI agents that automate tasks by leveraging external tools. The protocol uses a client-server architecture, in which applications expose functionality to LLMs through an MCP server and AI agents or applications connect to those services through an MCP client. Integrated development environments (IDEs) such as Microsoft’s Visual Studio Code — and those based on it, like Cursor and Windsurf — natively support integration with MCP servers. To enhance security, most IDE vendors maintain repositories with vetted MCP servers, but IDE users can also deploy custom servers manually. Such servers can be found all over the internet, including GitHub. Earlier this year, researchers found hundreds of MCP servers in public GitHub repositories that had dangerous misconfigurations, including default exposure to untrusted networks and OS command injection paths. Attacking Cursor and other VS Code-based IDEs Cursor is essentially a fork of VS Code with code added to turn it into an AI-assisted coding tool, whereas VS Code gets its AI capabilities through extensions. Knostic researcher Dor Munis, who developed the MCP attack against Cursor, told CSO that unlike VS Code, which performs integrity checks of its own files, Cursor does not. As a result, any modification of its own code will not present the user with a warning. VS Code, and by extension Cursor and other VS Code forks, is built on Electron, a framework used to develop cross-platform applications with Node.js and the Blink browser engine from Chrome. Because of this, these applications employ a JavaScript interpreter. As IDEs, they also have file system access and elevated permissions to perform tasks. Knostic researchers recently published a proof-of-concept attack against Cursor implemented through a malicious extension that injected malicious JavaScript into the running IDE to execute actions and manipulate its user interface. Malicious extensions have also been found in the VSCode Marketplace and the OpenVSX registry, which Cursor also uses, including a self-propagating worm that harvests credentials from developer machines. Knostic’s newly unveiled attack is similar in concept, but delivered via a malicious MCP server, it expands the attack surface beyond extensions. “An MCP server should be treated exactly like VS Code extensions in terms of security,” Munis said. That’s because MCP servers are essentially downloaded to run on your computer, and inherit the permissions of the IDE you use, he explained. In his proof-of-concept attack, Munis shows that an MCP server can inject JavaScript code into the built-in browser that Cursor recently added to allow developers to visually test changes to their application code and to allow Cursor’s AI agent to automatically perform tasks that require browsing. Using this technique, Munis replaced the browser’s actively displayed page with a log-in prompt, like in a phishing scenario, but without the URL ever changing — in other words, injected code’s changes happen on the fly. Of course, the impact of such an attack would depend on what the victim is doing in the browser. Developers might be displaying sensitive data from the web app they’re working on, or they might be logged into a service. It’s worth noting that the internal browser saves authentication cookies for the session and those could also be targeted. The attack was developed to prove successful JavaScript code injection via an MCP server, but just like with the extension attack, it could be expanded to perform other malicious actions inside the Cursor IDE itself. Defenses Organizations must review and control, both through policy and access controls, the IDE extensions and MCP servers their developers use. They should do this just like they should be vetting application dependencies from package registries such as npm or PyPI to prevent the compromise of developer machines or inheriting vulnerabilities in their code. Attackers are increasingly using VS Code extensions as an attack vector to target developers and it’s only a matter of time before they’ll start abusing MCP servers more widely. “Try to find the project’s GitHub repo and review the code,” the Knostic team advised. “This is a program you install on your computer that can do anything. If there’s doubt about its credibility, DO NOT USE IT.” Using auto-run modes, in which agents are allowed to perform tasks automatically inside the IDE without a human approving the steps, also known as YOLO mode, should also be avoided. “Never blindly enable anything, especially MCP functionality,” the team warned. “Don’t assume that everything your AI agent generated is as you expected. Read through the code before you perform actions in the embedded browser.” In its MCP documentation, Cursor itself warns developers to: * Verify an MCP server’s source and only install from trusted developers and repositories * Check what data and APIs the server is supposed to access * Use API keys with restricted permissions * Audit the server’s code for critical integrations
www.csoonline.com
November 19, 2025 at 6:30 PM
Reposted by 3kkenekkepen
1. Michael Burry ("the “Big Short” investor who anticipated the housing market’s collapse in 2008")
2. Softbank aus Japan
3. nun Peter Thiel
und in 3 Tagen hat NVIDIA earning's release. #ohoh
edition.cnn.com/2025/11/18/b...
#aibubble
Why some elite investors are turning on the darling of the AI rally | CNN Business
Three prominent investors with almost nothing in common are dumping their shares of Nvidia, the computer chip juggernaut that went from relative obscurity to the world’s first $5 trillion valuation in...
edition.cnn.com
November 19, 2025 at 5:54 PM
Reposted by 3kkenekkepen
European Commission ‘simplification’ proposal would weaken GDPR, AI regulations
European Commission ‘simplification’ proposal would weaken GDPR, AI regulations
Under the proposal, the EU would weaken data protection rules by delaying when regulations governing high-risk AI systems take effect and allowing companies to use personal data for AI training without prior consent from users in most circumstances.
therecord.media
November 19, 2025 at 5:29 PM
Reposted by 3kkenekkepen
It’s rare that we see an actual NEW ransomware family, so it will be interesting to see how this develops.

via @lawrenceabrams.bsky.social & @bleepingcomputer.com
Meet ShinySp1d3r: New Ransomware-as-a-Service created by ShinyHunters
An in-development build of the upcoming ShinySp1d3r ransomware-as-a-service platform has surfaced, offering a preview of the upcoming extortion operation.
www.bleepingcomputer.com
November 19, 2025 at 5:20 PM
Reposted by 3kkenekkepen
Wir alle waren „Mädchen“

- Als ich Volksschülerin war, versuchte der „liebe“ Opa eines Schulfreundes mir seine Zunge in den Mund zu schieben
- Als ich 12 war, meinte ein alter Knacker, seine Hand auf meine Schulter legend, „Ist eh bald zum Heiraten.“

1/.
November 19, 2025 at 2:58 PM
Reposted by 3kkenekkepen
In Germany, the president of the Bundestag systematically shares right-wing positions on social media, an analysis by @correctiv.org shows. Julia Klöckner is a CDU politician.

By @annikajoeres.bsky.social, @sebastianhaupt.bsky.social, Isabel Knippel & Stella Hesch

correctiv.org/aktuelles/po...
Klöckner klickt rechts
Analyse zu Julia Klöckner: Eine datenbasierte Recherche zu ihren Social-Media-Posts, politischen Signalen und ihrer Rolle in der CDU.
correctiv.org
November 19, 2025 at 9:24 AM
Reposted by 3kkenekkepen
Kleine Nettigkeiten: Die Kraken-Ransomware macht erst nen kleinen PC-Sprinttest: Testdatei anlegen, verschlüsseln, Punktzahl vergeben - fertig. Je nachdem, wie schnell dein Rechner rennt, entscheidet die Malware dann, ob sie deine Daten komplett oder nur teilweise verschlüsselt. 💀
Unleashing the Kraken ransomware group
In August 2025, Cisco Talos observed big-game hunting and double extortion attacks carried out by Kraken, a Russian-speaking group that has emerged from the remnants of the HelloKitty ransomware carte...
blog.talosintelligence.com
November 18, 2025 at 8:00 PM