TechNadu's profile picture. Cutting through tech noise, covering #Cybersecurity, #VPNs | Real insights. Expert reviews. Daily threats decoded. #InfoSec #Privacy

TechNadu

@TechNadu

Cutting through tech noise, covering #Cybersecurity, #VPNs | Real insights. Expert reviews. Daily threats decoded. #InfoSec #Privacy

👉 @grafana patched a CVSS 10.0 SCIM flaw (CVE-2025-41115) that could enable impersonation or privilege escalation when SCIM + user sync are enabled. Issue: numeric externalId values could override internal user IDs. Patched in latest enterprise builds. 💬 Thoughts? Follow…

TechNadu's tweet image. 👉 @grafana patched a CVSS 10.0 SCIM flaw (CVE-2025-41115) that could enable impersonation or privilege escalation when SCIM + user sync are enabled.

Issue: numeric externalId values could override internal user IDs.
Patched in latest enterprise builds.

💬 Thoughts?
Follow…

🌍 @CISACyber added CVE-2025-61757 - a critical Oracle Identity Manager flaw - to its KEV list after signs of active exploitation. Attackers can bypass auth by appending ?WSDL or ;.wadl, hitting protected endpoints + achieving pre-auth RCE. Researchers say it may have been…

TechNadu's tweet image. 🌍 @CISACyber  added CVE-2025-61757 - a critical Oracle Identity Manager flaw - to its KEV list after signs of active exploitation.

Attackers can bypass auth by appending ?WSDL or ;.wadl, hitting protected endpoints + achieving pre-auth RCE.

Researchers say it may have been…

If an “agent” tells you to stay off the internet or not talk to anyone… that’s a major scam red flag. Scammers use fear + urgency to isolate you. ✔ Claim your name is tied to crimes ✔ Pressure you to act fast ✔ Tell you not to verify anything ✔ Ask you to “protect” your…

TechNadu's tweet image. If an “agent” tells you to stay off the internet or not talk to anyone… that’s a major scam red flag.
Scammers use fear + urgency to isolate you.
✔ Claim your name is tied to crimes
✔ Pressure you to act fast
✔ Tell you not to verify anything
✔ Ask you to “protect” your…

The @FCC voted 2–1 to reverse a telecom security rulemaking tied to the Salt Typhoon intrusions. Supporters say the earlier rule overextended authority; critics warn it could weaken protections for lawful intercept systems. 💬 Thoughts on balancing regulation & telecom security?…

TechNadu's tweet image. The @FCC voted 2–1 to reverse a telecom security rulemaking tied to the Salt Typhoon intrusions.
Supporters say the earlier rule overextended authority; critics warn it could weaken protections for lawful intercept systems.

💬 Thoughts on balancing regulation & telecom security?…

A hacker claims to have stolen 2.3TB of data from Italian rail IT provider Almaviva - impacting FS Italiane Group. Analysts say the files look recent and include internal shares, HR archives & technical docs. Almaviva confirmed a cyber incident but says critical services stayed…

TechNadu's tweet image. A hacker claims to have stolen 2.3TB of data from Italian rail IT provider Almaviva - impacting FS Italiane Group.

Analysts say the files look recent and include internal shares, HR archives & technical docs.

Almaviva confirmed a cyber incident but says critical services stayed…

The PCLOB has clarified that the @FBI does not buy real-time location data for counterterrorism cases - but does use historical data from brokers like Babel Street. The report frames open-source info as a “least intrusive” investigative method, raising questions about privacy +…

TechNadu's tweet image. The PCLOB has clarified that the @FBI  does not buy real-time location data for counterterrorism cases - but does use historical data from brokers like Babel Street.

The report frames open-source info as a “least intrusive” investigative method, raising questions about privacy +…

The SEC has dropped its lawsuit against @solarwinds and its CISO - a case that fueled big discussions about cybersecurity disclosures and regulatory expectations. SolarWinds says the outcome supports its position and may ease industry concerns. How should cyber risks be…

TechNadu's tweet image. The SEC has dropped its lawsuit against @solarwinds  and its CISO - a case that fueled big discussions about cybersecurity disclosures and regulatory expectations.

SolarWinds says the outcome supports its position and may ease industry concerns.
How should cyber risks be…

Two teenagers accused in relation to the TfL cyberattack have pleaded not guilty in court. The NCA says investigations also extend to possible links with attacks on U.S. healthcare organizations. Legal restrictions apply - meaning no speculation about guilt. Thoughts on how…

TechNadu's tweet image. Two teenagers accused in relation to the TfL cyberattack have pleaded not guilty in court.

The NCA says investigations also extend to possible links with attacks on U.S. healthcare organizations.

Legal restrictions apply - meaning no speculation about guilt.

Thoughts on how…

Fairplay is urging parents to be cautious with AI-powered toys this holiday season. Concerns include: privacy risks, sensitive data collection, inappropriate chatbot replies, and young children forming false “friendships” with AI. Some toys - like FoloToy's Kumma bear - were…

TechNadu's tweet image. Fairplay is urging parents to be cautious with AI-powered toys this holiday season.

Concerns include: privacy risks, sensitive data collection, inappropriate chatbot replies, and young children forming false “friendships” with AI.

Some toys - like FoloToy's Kumma bear - were…

Mozilla says its partnership with Onerep is ending in Dec 2025, following a long review of vendor standards and the challenges of the data-broker ecosystem. Highlights ⬇️ • Monitor Plus will be discontinued • Breach alerts in Firefox will continue • Subscribers get prorated…

TechNadu's tweet image. Mozilla says its partnership with Onerep is ending in Dec 2025, following a long review of vendor standards and the challenges of the data-broker ecosystem.

Highlights ⬇️
• Monitor Plus will be discontinued
• Breach alerts in Firefox will continue
• Subscribers get prorated…

Cloud ransomware is evolving - and experts warn that S3, KMS, SSE-C, and imported key material abuses are becoming real-world attack paths. Key shifts ⬇️ • Attackers treat AWS as the ransomware mechanism • Misconfigs + exposed IAM keys remain common entry points • New S3…

TechNadu's tweet image. Cloud ransomware is evolving - and experts warn that S3, KMS, SSE-C, and imported key material abuses are becoming real-world attack paths.

Key shifts ⬇️ 
• Attackers treat AWS as the ransomware mechanism
• Misconfigs + exposed IAM keys remain common entry points
• New S3…

Loading...

Something went wrong.


Something went wrong.