Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: secret Clear Filter

Self Propagating NPM Malware Compromises over 40 Packages

Executive Summary The NPM ecosystem is facing another critical supply chain attack. The popular @ctrl/tinycolor package, which receives over 2 million weekly downloads, has been compromised along with more than 40 other packages across multiple maintainers. This attack demonstrates a concerning evolution in supply chain threats - the malware includes a self-propagating mechanism that automatically infects downstream packages, creating a cascading compromise across the ecosystem. The compromised

Hackers steal 3,325 secrets in GhostAction GitHub supply chain attack

A new supply chain attack on GitHub, dubbed 'GhostAction,' has compromised 3,325 secrets, including PyPI, npm, DockerHub, GitHub tokens, Cloudflare, and AWS keys. The attack was discovered by GitGuardian researchers, who report that the first signs of compromise on one of the impacted projects, FastUUID, became evident on September 2, 2025. The attack involved leveraging compromised maintainer accounts to perform commits that added a malicious GitHub Actions workflow file that triggers automat

Keeping secrets out of logs (2024)

Keeping Secrets Out of Logs tl;dr: There's no silver bullet, but if we put some "lead" bullets in the right places, we have a good shot at keeping sensitive data out of logs. "This is the blog version of a talk I gave at LocoMocoSec 2024. It’s mostly a lightly edited transcript with some screenshots, so if you’d prefer, you can watch the "This is the blog version of a talk I gave at LocoMocoSec 2024. It’s mostly a lightly edited transcript with some screenshots, so if you’d prefer, you can wat

AI-powered malware hit 2,180 GitHub accounts in “s1ngularity” attack

Investigations into the Nx "s1ngularity" NPM supply chain attack have unveiled a massive fallout, with thousands of account tokens and repository secrets leaked. According to a post-incident evaluation by Wiz researchers, the Nx compromise has resulted in the exposure of 2,180 accounts and 7,200 repositories across three distinct phases. Wiz also stressed that the incident's scope of impact remains significant, as many of the leaked secrets remain valid, and so the effect is still unfolding.

Playing every game of Wordle simultaneously

If you’ve fallen far enough down the Wordle rabbit hole you may have heard of Quordle, a version of Wordle where you solve four words at once. If you’re looking for more of a challenge, Britannica has you covered with Octordle, where you solve eight words at once. And of course any Wordler worth their salt should be able to handle sixteen words, like in Sedecordle. And no, it doesn’t stop there: Sexaginta-quattuordle isn’t real, it can’t hurt yo– One logical extreme of this trend would be to

Apple accuses Android brand of trade secret theft over wearables (Update: Response)

Update: August 25, 2025 (1:07 AM ET): OPPO has now issued an official statement addressing Apple’s legal filing against it and a former Apple employee. The company posted the following in an email to Android Authority: We are aware of the recent lawsuit filed by Apple in California and have carefully reviewed the allegations in Apple’s complaint. We have found no evidence establishing any connection between these allegations and the employee’s conduct during his employment at OPPO. OPPO respec

Secretive, Peter Thiel-Founded ‘Tech Bilderberg” Group Is Moving Up in the World

A secretive group founded by Palantir mogul Peter Thiel is planning to expand its influence in Washington, D.C., according to a report from Axios. The group, called Dialog, wants to establish a permanent physical campus in the capital, where it can carry on its invite-only meetings involving major power players. Working off information provided by a source with knowledge of the group’s activities, Axios claims that Dialog—which it says is “often compared to a tech-era Bilderberg”—has plans for

Show HN: Stasher – Burn-after-read secrets from the CLI, no server, no trust

Stasher CLI Share secrets from your terminal. One-time only. No accounts. No backend. No BS. I just wanted to share a password. Not spin up a server. Not sign up for a "secure" web app. Not trust a Slack thread. Just. Send. A. Secret. So I built Stasher — a burn-after-read, command-line tool for secure, ephemeral secret sharing. Built for people who are busy, paranoid, or both. "How Can I Trust You?" That's what someone asked me — and they were right to. Even if I say: "It's encrypted"

TSMC launches legal action against former employees for allegedly trying to leak 2nm trade secrets

What just happened? TSMC says has taken strict disciplinary action and launched legal proceedings against a number of employees over potential trade secret leaks. The world's largest chipmaker said that the discovery was made after it detected unauthorized activities on its network during routine monitoring. TSMC said in a statement that its comprehensive and robust monitoring mechanisms allowed it to identify the potential crime early. It started an internal investigation, which led to discipl

Proton fixes Authenticator bug leaking TOTP secrets in logs

Proton fixed a bug in its new Authenticator app for iOS that logged users' sensitive TOTP secrets in plaintext, potentially exposing multi-factor authentication codes if the logs were shared. Last week, Proton released a new Proton Authenticator app, which is a free standalone two-factor authentication (2FA) application for Windows, macOS, Linux, Android, and iOS. The app is used to store multi-factor authentication TOTP secrets that can be used to generate one-time passcodes for authenticatio

Hiding secret codes in light protects against fake videos

Fact-checkers may have a new tool in the fight against misinformation. A team of Cornell researchers has developed a way to “watermark” light in videos, which they can use to detect if video is fake or has been manipulated. The idea is to hide information in nearly-invisible fluctuations of lighting at important events and locations, such as interviews and press conferences or even entire buildings, like the United Nations Headquarters. These fluctuations are designed to go unnoticed by humans

Microsoft catches Russian hackers targeting foreign embassies

Russian-state hackers are targeting foreign embassies in Moscow with custom malware that gets installed using adversary-in-the-middle attacks that operate at the ISP level, Microsoft warned Thursday. The campaign has been ongoing since last year. It leverages ISPs in that country, which are obligated to work on behalf of the Russian government. With the ability to control the ISP network, the threat group—which Microsoft tracks under the name Secret Blizzard—positions itself between a targeted

Google won’t say if UK secretly demanded a backdoor for user data

The U.K. government is reportedly backing down from its earlier demand that Apple builds a secret backdoor allowing its authorities access to customer data worldwide, following a harsh rebuke from the U.S. government. But one U.S. senator wants to know if other tech giants, like Google, have also received secret backdoor demands from the U.K. government, and Google has so far refused to say. Earlier this year, The Washington Post reported that the U.K. Home Office sought a secret court order i

‘Talamasca: The Secret Order’ Lures You Deeper Into the World of ‘Interview With the Vampire’

Vampires, witches, and demons, beware: the Talamasca, a secret group that fans of Interview With the Vampire will already have an inkling about, has you under surveillance. But can the watchers themselves be trusted? The first teaser trailer for Talamasca: The Secret Order, AMC’s latest show in its Anne Rice Immortal Universe, suggests that even those on the inside should definitely watch their backs. The trailer heavily features a very blonde Elizabeth McGovern doing her best to recruit Nichol

SecretSpec: Declarative Secrets Management

Announcing SecretSpec: Declarative Secrets Management We've supported .env integration for managing secrets, but it has several issues: Apps are disconnected from their secrets - applications lack a clear contract about which secrets they need - applications lack a clear contract about which secrets they need Parsing .env is unclear - comments, multiline values, and special characters all have ambiguous behavior across different parsers - comments, multiline values, and special characters al

Mistakes Microsoft made in the Xbox security system (2005)

From xboxdevwiki This article has been retrieved from [1]. We might have a similar article. [[]] by Michael Steil Introduction The Xbox is a gaming console, which has been introduced by Microsoft Corporation in late 2001 and competed with the Sony Playstation 2 and the Nintendo GameCube. Microsoft wanted to prevent the Xbox from being used with copied games, unofficial applications and alternative operating systems, and therefore designed and implemented a security system for this purpos

Mistakes Microsoft made in the Xbox security system

From xboxdevwiki This article has been retrieved from [1]. We might have a similar article. [[]] by Michael Steil Introduction The Xbox is a gaming console, which has been introduced by Microsoft Corporation in late 2001 and competed with the Sony Playstation 2 and the Nintendo GameCube. Microsoft wanted to prevent the Xbox from being used with copied games, unofficial applications and alternative operating systems, and therefore designed and implemented a security system for this purpos

Apple TV+ docuseries scores 6 Daytime Emmy Awards nominations

Apple has picked up six Daytime Emmy nominations for one of its most interesting nature docuseries, produced in partnership with the BBC Studios Natural History Unit. See the categories and watch the trailer below. Winners will be announced this October Today, the Television Academy announced the nominees for the 52nd Daytime Emmy Awards. The winners will be revealed on October 17, a little more than a month after the 77th Primetime Emmy Awards, which will take place on September 14. Among th

Magic .env files built for sharing: Human-first, AI-friendly

██▒ █▓ ▄▄▄ ██▀███ ██▓ ▒█████ ▄████▄ ██ ▄█▀ ▓██░ █▒▒████▄ ▓██ ▒ ██▒▓██▒ ▒██▒ ██▒▒██▀ ▀█ ██▄█▒ ▓██ █▒░▒██ ▀█▄ ▓██ ░▄█ ▒▒██░ ▒██░ ██▒▒██ ▄ ▓███▄░ ▒██ █░░░██▄▄▄▄██ ▒██▀▀█▄ ▒██░ ▒██ ██░▒██▄ ▄██▒▓██ █▄ ▒▀█░ ▓█ ▓██▒░██▓ ▒██▒░██████▒░ █████▒░▒ ████▀ ░▒██▒ █▄ ░ ▐░ ▒▒ ▓▒█░░ ▒▓ ░▒▓░░ ▒░▓ ░░ ▒░▒░▒░ ░ ░▒ ▒ ░▒ ▒▒ ▓▒ ░ ░░ ▒ ▒▒ ░ ░▒ ░ ▒░░ ░ ▒ ░ ░ ▒ ▒░ ░ ▒ ░ ░▒ ▒░ ░░ ░ ▒ ░░ ░ ░ ░ ░ ░ ░ ▒ ░ ░ ░░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ Magic .env files built for sharing: Human-first, AI-friendly .env.schema # API key with val

I scanned all of GitHub's "oops commits" for leaked secrets

TL;DR GitHub Archive logs every public commit, even the ones developers try to delete. Force pushes often cover up mistakes like leaked credentials by rewriting Git history. GitHub keeps these dangling commits, from what we can tell, forever. In the archive, they show up as “zero-commit” PushEvents . I scanned every force push event since 2020 and uncovered secrets worth $25k in bug bounties. Together with Truffle Security, we're open sourcing a new tool to scan your own GitHub organization for

Show HN: A local secrets manager with easy backup

yacs Yet another credential store 🔐 yacs is a command-line tool that allows you to securely store, manage, and retrieve secrets locally in an encrypted JSON file. This tool uses AES encryption with a master password to ensure your secrets are kept safe. Features Initialization: Set up a new credential store with a master password and a hint. Adding Secrets: Add secrets with descriptions, supporting both string and binary types. Retrieving Secrets: Retrieve secrets by their key. Viewing Keys

Everything You Need to Know About the Sonic the Hedgehog Magic: The Gathering Drop

Magic: The Gathering hit a goldmine earlier this month when it released its Final Fantasy set based on one of the most popular video game franchises of all time. Final Fantasy was reportedly the best-selling Magic set before it even released, thanks to extensive preorders. Now Wizards of the Coast is hoping to repeat that success with Secret Lair drops themed around video game icon Sonic the Hedgehog, launching Monday, July 14. Wizards of the Coast/Sega Wizards of the Coast/Sega Wizards of th

Sonic the Hedgehog Is Speeding Into ‘Magic: The Gathering’

With the success of the Final Fantasy set transitioning Magic‘s collaboration era truly into the mainstream, Wizards of the Coast is running full speed ahead with its latest collaboration: a new Secret Lair drop that will bring Sonic the Hedgehog and his friends to the game. Rather than being reprints of old cards with new art, like the case of the SpongeBob Secret Lair or the recent benefit for the National Association of Latino Arts and Cultures, the new Sonic cards, revealed by Variety today

Finding a 27-year-old easter egg in the Power Mac G3 ROM

I was recently poking around inside the original Power Macintosh G3’s ROM and accidentally discovered an easter egg that nobody has documented until now. This story starts with me on a lazy Sunday using Hex Fiend in conjunction with Eric Harmon’s Mac ROM template (ROM Fiend) to look through the resources stored in the Power Mac G3’s ROM. This ROM was used in the beige desktop, minitower, and all-in-one G3 models from 1997 through 1999. As I write this post in mid-2025, I’m having a really diff

Topics: disk image mac rom secret

Show HN: Ariadne – A Rust implementation of aperiodic cryptography

Ariadne Suite ariadne.ciphernomad.org This repository contains the Ariadne Suite, our canonical Rust implementation of the Ariadne Protocol. The protocol is a novel cryptographic architecture we designed around the Labyrinth Construction to provide aperiodic, or non-repeating, cryptographic transformations. The project mission is to create resilient, open-source tools for digital sovereignty. This is independent research, released as a public good. Its continuation, development, and future s

HCP Vault Secrets End of Life

HashiCorp will be decommissioning HCP Vault Secrets. The team is shifting focus to bringing the ease of use learnings from HCP Vault Secrets to HCP Vault Dedicated. Current HCP Vault Secrets users are encouraged to migrate to HCP Vault Dedicated. Important Timelines End of Sale: June 30, 2025 New customers will no longer have access to HCP Vault Secrets Existing customers will be able to add new HCP Vault Secrets applications until the end of life End of life: August 27, 2025 (pay-as-you-go

A deep-dive explainer on Ink and Switch's BeeKEM protocol

I’ve spent the last year working on local-first apps, most recently with Muni Town. For me, ‘local-first’ isn’t just a technical architecture — it’s a political and social stance. It’s about shifting control: from remote servers and top-down central authorities deciding how data, workflows, and communities operate, to individuals and communities reclaiming that control and gaining autonomy. Seen this way, privacy and consent aren’t add-ons — they’re foundational, just as critical as sync or data

Topics: group key keys new secret

Former NASA Agent Suggests Government Used UFO Theories To Cover "Stealth Technology"

A former NASA official says he thinks the government uses rumors of alien conspiracies to hide its secrets — a suggestion corroborated by a recent bombshell report about military officials spreading UFO disinformation. In an interview with Fox News, Joseph Gutheinz, a former special agent at NASA's inspector general, said that the US military's clandestine operations are likely behind many UFO conspiracy theories. "I believe early on in the 1940s when all these UFO stories started coming up, i

Victoria’s Secret restores critical systems after cyberattack

Victoria's Secret has restored all critical systems impacted by a May 24 security incident that forced it to shut down corporate systems and the e-commerce website. The company operates around 1,380 retail stores in nearly 70 countries and has reported net sales of $1.353 billion for the first quarter of 2025, with a forecasted net sales range of up to $6.3 billion for the year. In a Thursday filing with the U.S. Securities and Exchange Commission, the company disclosed that all restored criti

After RFK Jr. fires vaccine advisors, doctors brace for blitz on childhood shots

The medical community is bracing for attacks on, and the possible dismantling of, federal recommendations for safe, lifesaving childhood vaccinations after health secretary and fervent anti-vaccine advocate Robert F. Kennedy Jr. abruptly fired all 17 members of a federal vaccine advisory committee Monday. Outrage has been swift after Kennedy announced the "clean sweep" of the Centers for Disease Control and Prevention's vaccine advisory panel, the Advisory Committee on Immunization Practices (A