Daily Security – Telegram
https://unphishable.io

- Train to spot Web3 phishing scams — safely, in your browser.
-30+ real attack simulations
-Testnet only. No real assets.

Source: https://x.com/slowmist_team/status/1939914194197135467?s=61
🔥6
Forwarded from Investigations by ZachXBT
The recent ~$140M (R$ 800M) cyberattack on the Central Bank of Brazil services provider C&M Software is easily one of the most insane cases from this year.

Six financial institutions experienced unauthorized access to their reserve accounts on June 30, 2025.

Attackers converted fiat to BTC / ETH / USDT via Latam OTCs / exchanges. By my estimate at least $30-40M was converted to crypto.

Brazilian law enforcement has since shared the threat actor paid an employee at C&M only $2.76K (R$ 15K) for his corporate login and password.

I'll publish theft addresses related to the incident that I found when it's ok to share them as I have been helping freeze funds and attributing unlabeled OTCs.

Have not seen much coverage on the incident outside of Brazil.
3
Forwarded from Vladimir S. | Officer's Channel (Vladimir S. | officercia)
An open, precise, and distributed approach to producing and consuming vulnerability information for open source ⬇️

https://x.com/officer_cia/status/1949100969410679262

#security
Please open Telegram to view this post
VIEW IN TELEGRAM
Odin Fun Got Hacked Today
Some notes regarding the incident:

- Attackers deposited a worthless token along with BTC, manipulated the pool price ratio and eventually withdrew the BTC.
- Looks like the whitelisting wasn’t properly implemented. Moreover, it looks like Chinese hackers have been involved

Attached more information under the twit here 🙃
Please open Telegram to view this post
VIEW IN TELEGRAM
🙉4
Forwarded from Apple Actively Exploited
Update with a fix for an actively exploited vuln(s):
iOS 18.6.2 and iPadOS 18.6.2

For:
iPhone XS and later, iPad Pro 13-inch, iPad Pro 12.9-inch 3rd generation and later, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 7th generation and later, and iPad mini 5th generation and later

Released:
20 Aug 2025

Security Document
1
Forwarded from Apple Actively Exploited
Update with a fix for an actively exploited vuln(s):
iPadOS 17.7.10

For:
iPad Pro 12.9-inch 2nd generation, iPad Pro 10.5-inch, and iPad 6th generation

Released:
20 Aug 2025

Security Document
Forwarded from Apple Actively Exploited
Update with a fix for an actively exploited vuln(s):
macOS Sequoia 15.6.1

For:
macOS Sequoia

Released:
20 Aug 2025

Security Document
Forwarded from Apple Actively Exploited
Update with a fix for an actively exploited vuln(s):
macOS Sonoma 14.7.8

For:
macOS Sonoma

Released:
20 Aug 2025

Security Document
Forwarded from Apple Actively Exploited
Update with a fix for an actively exploited vuln(s):
macOS Ventura 13.7.8

For:
macOS Ventura

Released:
20 Aug 2025

Security Document
🚨 DOM-Based Extension Clickjacking Exposes Popular Password Managers to Credential and Data Theft

🚨Until fixes are available, it's advised that users disable the auto-fill function in their password managers and only use copy/paste.

"For Chromium-based browser users, it is recommended to configure site access to 'on click' in extension settings," Tóth said. "This configuration allows users to manually control auto-fill functionality."

❗️ The Bitwarden team released a fix of clickjacking in their recent patch

Source
Please open Telegram to view this post
VIEW IN TELEGRAM