Advertisement · 728 × 90

Posts by InfoSec

Preview
Lovable denies data leak, cites 'intentional behavior' : A lesson in how not to respond to vulnerability reports

Vibe coding upstart Lovable denies data leak, cites 'intentional behavior,' then throws HackerOne under the bus

2 hours ago 0 0 0 0
Preview
KelpDAO suffers $290 million heist tied to Lazarus hackers State-sponsored North Korean hackers are likely behind the $290 million crypto-heist that impacted the KelpDAO DeFi project on Saturday.

KelpDAO suffers $290 million heist tied to Lazarus hackers

3 hours ago 1 0 0 0
Preview
China's Apple App Store infiltrated by crypto-stealing wallet apps A set of 26 malicious apps on Apple App Store impersonate popular wallets, such as Metamask, Coinbase, Trust Wallet, and OneKey, to steal recovery or seed phrases and drain them of cryptocurrency assets.

China's Apple App Store infiltrated by crypto-stealing wallet apps

4 hours ago 1 1 0 0
Vuln in Google’s Antigravity AI agent manager could escape sandbox, give attackers remote code execution Google’s highest security setting for its agents runs command operations through a sandbox and throttles network access, but is still vulnerable to prompt injection.

Vuln in Google’s Antigravity AI agent manager could escape sandbox, give attackers remote code execution

4 hours ago 0 0 0 0
Preview
Vercel Employee's AI Tool Access Led to Data Breach Stolen OAuth tokens, which are at the root of these breaches, "are the new attack surface, the new lateral movement," a researcher noted.

Vercel Employee's AI Tool Access Led to Data Breach

4 hours ago 0 0 0 0
The FTC’s AI portfolio is about to get bigger The FTC is preparing to enforce key parts of a new law against sexual deepfakes and searching for ways to block AI-driven scamming using voice clones.

The FTC’s AI portfolio is about to get bigger

5 hours ago 0 0 0 0
Hackers Use AppDomain Hijacking to Turn Trusted Intel Utility Into Malware Launcher Security researchers have uncovered a highly sophisticated attack campaign that weaponizes a legitimate, digitally signed Intel utility to secretly deploy malware, all without touching a single line of the original program’s code. The campaign, dubbed Operation PhantomCLR, represents a serious evolution in how advanced attackers hide inside trusted systems to avoid detection. The attack exploits a feature built into Microsoft’s .NET runtime called the AppDomainManager mechanism. When a .NET application starts up, the runtime automatically looks for a configuration file in the same folder as the executable. Attackers have figured out how to abuse this behavior by placing a weaponized configuration file next to a legitimate Intel binary called IAStorHelp.exe, a real, signed Intel storage utility. By doing so, the malicious code runs first, before the Intel program even begins its normal operations, making it almost invisible to traditional security tools. Organizations in the Middle East and EMEA financial sectors are the primary targets of this operation. Attackers gain initial access through spear-phishing emails carrying a malicious ZIP archive. Inside the archive is what appears to be a work-from-home policy PDF document from a Saudi government Ministry. The file is actually a disguised shortcut (.pdf.lnk) that, once clicked, silently launches the Intel binary and triggers the entire attack chain in the background, while the decoy document opens on screen to avoid suspicion. Cyfirma researchers identified and analyzed this framework following continuous monitoring of evolving threats targeting enterprise environments. Their investigation revealed a multi-stage post-exploitation framework with capabilities comparable to mature offensive toolkits such as Cobalt Strike and Brute Ratel C4, yet without clear direct attribution to a known threat actor. The level of design discipline, modular architecture, and anti-forensic techniques observed indicate the work of a well-resourced and operationally experienced group. Once the attacker gains control, they have full remote access to the compromised system, including the ability to steal credentials, financial records, and intellectual property. The broader risk to organizations is severe. Because the malware runs entirely inside a trusted, signed process, most endpoint detection and antivirus tools will not flag it. Command-and-control communications are routed through Amazon CloudFront CDN infrastructure using a technique called domain fronting, which makes the malicious traffic look like normal cloud service activity. Any system where this framework is active should be treated as fully compromised, with the strong likelihood that the attacker has already moved laterally through the network and may have domain-level access. How the Infection Works The infection follows six well-engineered stages, each designed to bypass a specific layer of enterprise security. ZIP Archive Contents (Source – Cyfirma) It starts with the spear-phishing ZIP delivery, then moves to the victim executing the disguised shortcut file. Directory Listing – Victim Perspective (Source – Cyfirma) From there, the AppDomainManager hijack takes over via the malicious configuration file, loading a rogue .NET DLL named IAStorHelpMosquitoproof.dll before legitimate program logic runs. Weaponized .exe.config showing decoy appSettings and runtime CLR hijack (Source – Cyfirma) To avoid triggering automated sandbox environments, the malware uses a clever two-part delay strategy. First, it runs a CPU-intensive prime number calculation that burns a full 60 seconds of processing time without making any suspicious system calls. The 60-second sandbox evasion timing gate (Source – Cyfirma) Second, it cycles through 892,007 iterations of a constrained AES key derivation loop, performing trial decryptions using SHA-256 hashed integer seeds until it finds the correct key at iteration 41,410. Together, these phases exhaust most sandbox analysis windows before any malicious behavior appears. Once the payload is decrypted and active, it uses a JIT trampoline technique to run shellcode entirely inside memory, bypassing the standard Windows memory allocation functions that most security tools monitor. The malware also performs a “DLL injection storm,” loading 16 legitimate-looking Windows libraries in random order to flood security monitoring systems with noise and hide its real activity. After execution completes, it cleans up all memory traces in two phases using NtProtectVirtualMemory and NtFreeVirtualMemory, making forensic recovery extremely difficult. Security teams should take the following actions in response to this threat:- Strategic actions: Deploy updated detection signatures across all endpoints immediately, as the framework bypasses conventional EDR and antivirus controls without them. Invest in SSL/TLS inspection for traffic bound to CDN platforms like CloudFront, since IP-based blocking alone will not stop domain fronting. Launch a .NET security hardening initiative focused specifically on restricting AppDomainManager usage, as this technique is being adopted by multiple threat actors. Tactical actions: Block the identified C2 domains at the DNS and firewall level: dp8519iqiftub[.]cloudfront[.]net and the associated AWS ELB backend. Review DNS logs to identify any systems that have already resolved these malicious domains . Conduct endpoint sweeps to detect suspicious binaries running from non-standard paths. Operational actions: Enforce AppDomainManager restrictions through application whitelisting and policy controls to prevent execution flow hijacking. Implement SSL/TLS inspection specifically for non-browser processes communicating with CDN endpoints. Enable constrained execution environments to limit abuse of .NET runtime components and scripting engines. Follow us on  Google News ,  LinkedIn , and  X  to Get More Instant Updates ,  Set CSN as a Preferred Source in  Google . The post Hackers Use AppDomain Hijacking to Turn Trusted Intel Utility Into Malware Launcher appeared first on Cyber Security News .

Hackers Use AppDomain Hijacking to Turn Trusted Intel Utility Into Malware Launcher

5 hours ago 0 0 0 0
Preview
Claude Desktop changes software permissions without consent : Installation and pre-approval without consent looks dubious under EU law

Claude Desktop changes app access settings for browsers you don't even have installed yet

5 hours ago 1 0 0 0
Advertisement
Preview
The Gentlemen ransomware now uses SystemBC for bot-powered attacks A SystemBC proxy malware botnet of more than 1,570 hosts, believed to be corporate victims, has been discovered following an investigation into a Gentlemen ransomware attack carried out by a gang affiliate.

The Gentlemen ransomware now uses SystemBC for bot-powered attacks

5 hours ago 1 0 0 0
Preview
Serial-to-IP Devices Hide Thousands of Old and New Bugs The OT devices that translate machine talk into Internet-speak are riddled with vulnerabilities and more frequently targeted for attacks, researchers say.

Serial-to-IP Devices Hide Thousands of Old and New Bugs

6 hours ago 0 0 0 0
Preview
oss-sec: Fwd: [CVE-2026-3219] pip doesn't reject concatenated ZIP and tar archives Posted by Alan Coopersmith on Apr 20 -------- Forwarded Message -------- Subject: [Security-announce][CVE-2026-3219] pip doesn't reject concatenated ZIP and tar archives Date: Mon, 20 Apr 2026 15:02:13 +0000 From: Seth Larson <seth () python org> Reply-To: security-sig () python org To: security-announce () python org There is a MEDIUM severity vulnerability affecting pip. pip handles concatenated tar and ZIP files as ZIP files regardless of...

Fwd: [CVE-2026-3219] pip doesn't reject concatenated ZIP and tar archives

6 hours ago 0 0 0 0
North Korea-Linked UNC1069 Uses Fake Zoom and Teams Meetings to Hack Crypto Professionals A North Korean threat group known as UNC1069 has been running a sophisticated campaign that tricks cryptocurrency and Web3 professionals into joining fake online meetings, only to infect their computers with malware designed to steal digital assets. The group pretends to be venture capital firms looking for investment partnerships, building trust with targets over time before delivering malicious payloads through counterfeit video conferencing platforms. This operation is financially motivated and is believed to directly support North Korea’s missile, nuclear, and espionage programs. The attackers make first contact through LinkedIn and Telegram, sometimes using previously compromised accounts to appear more legitimate. They then share scheduling links via Calendly to set up meetings on fake platforms that closely copy the look and feel of Zoom, Google Meet, and Microsoft Teams. The fake meeting environments are convincing enough to include live participation from the attackers themselves, and in some cases, deepfake video footage of real executives is used to build trust before delivering the attack. Once a victim joins the fake meeting , they are told their microphone or camera is not working. The attacker creates a sense of urgency, pressuring the victim to fix the issue quickly. When the victim tries to enable their audio or video, a ClickFix-style prompt appears on the screen, instructing them to copy and run a piece of code. This is the moment the malware enters the system, and from this point, the attacker has a foothold on the victim’s device. Validin researchers identified and analyzed the full attack chain in April 2026, revealing the scale and technical complexity of the campaign’s supporting infrastructure. They found that payloads are built specifically for the victim’s operating system, whether Windows, macOS, or Linux, and that the malware used appears to be updated variants of Cabbage RAT, also known as CageyChameleon. In addition, the research linked UNC1069 to the recent Axios NPM package compromise and noted overlaps with the Bluenoroff threat cluster previously reported by Mandiant. The campaign’s impact extends beyond simple system compromise. The fake meeting platforms also capture victims’ audio and video in real time through the browser’s navigator.mediaDevices.getUserMedia API, streaming the data to attacker-controlled servers via WebRTC and WebSocket channels. This recorded footage is then reused in later social engineering campaigns to impersonate real people, making future attacks even harder to detect. How the Infection Takes Hold on Windows Systems On Windows machines, the ClickFix prompt instructs victims to press Win + X followed by “A” to open a terminal with administrator privileges, then paste and run a set of commands. PowerShell snippet from a ClickFix lure for Windows-based victims (Source – Validin) These commands pull down two separate PowerShell scripts from attacker-controlled servers. The first script downloads a VBScript file, writes it to the temporary directory, and executes it twice using wscript.exe, while also adding the C:\Users directory to Windows Defender’s exclusion list and restarting the WinDefend service to suppress any alerts. Content of the first PowerShell payload for Windows-based victims (Source – Validin) The VBScript payload is an updated variant of Cabbage RAT that begins by collecting system details including the current username, hostname, operating system version, and installed browser extensions. Content of the VBS payload revealing collection of system and user details (Source – Validin) The addition of Google Chrome extension collection is a new capability clearly aimed at identifying installed cryptocurrency wallet extensions. A notable change in this version is the introduction of a .lnk shortcut file placed in the Windows Startup folder, ensuring the malware runs every time the user logs in. The RAT communicates with its command-and-control server, sending host data and awaiting coded responses: code “20” triggers a secondary encrypted payload, code “21” terminates execution, and code “22” serves as a keep-alive signal. Security teams are advised to treat unexpected requests to run terminal commands during video calls as a serious red flag. Organizations working in the cryptocurrency and Web3 space should verify the identity of meeting organizers through trusted, out-of-band channels before joining any session, and should monitor for unsigned scripts executing from temporary directories, unexpected Windows Defender exclusions, and outbound connections to domains mimicking Zoom or Google Meet naming patterns. Follow us on  Google News ,  LinkedIn , and  X  to Get More Instant Updates ,  Set CSN as a Preferred Source in  Google . The post North Korea-Linked UNC1069 Uses Fake Zoom and Teams Meetings to Hack Crypto Professionals appeared first on Cyber Security News .

North Korea-Linked UNC1069 Uses Fake Zoom and Teams Meetings to Hack Crypto Professionals

7 hours ago 0 0 0 0
Preview
Critical 9.4 CVSS Flaw Leaves Dolibarr ERP Open to RCE Dolibarr ERP faces a critical 9.4 CVSS RCE flaw (CVE-2026-23500) in its PDF conversion logic. Unsanitized commands allow full system takeover. Upgrade to 23.0!

Critical 9.4 CVSS Flaw Leaves Dolibarr ERP Open to RCE

7 hours ago 0 0 0 0
Public PoC and Technical Details Disclosed for Apache Syncope RCE Apache Syncope CVE-2025-57738 allows root RCE via unsandboxed Groovy. Technical details and PoC are now public. Upgrade to v3.0.14 or 4.0.2 immediately.

Public PoC and Technical Details Disclosed for Apache Syncope RCE

7 hours ago 0 0 0 0
Preview
Scattered Spider member Tyler Buchanan pleads guilty to major crypto theft Tyler Buchanan, linked to Scattered Spider, pleaded guilty in the US to hacking companies and stealing millions in cryptocurrency.

Scattered Spider member Tyler Buchanan pleads guilty to major crypto theft

7 hours ago 0 0 0 0
Preview
Making opportunistic cyberattacks harder by design | Microsoft Security Blog How Microsoft secures Dynamics 365 and Power Platform by removing credentials, reducing attack surfaces, and using platform engineering to block opportunistic threats.

Making opportunistic cyberattacks harder by design

7 hours ago 1 0 0 0
Preview
Seiko USA website defaced as hacker claims customer data theft The Seiko USA website was defaced over the weekend, displaying a message from attackers claiming they stole its Shopify customer database and threatening to leak it unless a ransom is paid.

Seiko USA website defaced as hacker claims customer data theft

7 hours ago 0 0 0 0
Advertisement
Preview
SGLang CVE-2026-5760 (CVSS 9.8) Enables RCE via Malicious GGUF Model Files A critical security vulnerability has been disclosed in SGLang that, if successfully exploited, could result in remote code execution on susceptible systems. The vulnerability, tracked as CVE-2026-5760, carries a CVSS score of 9.8 out of 10.0. It has been described as a case of command injection leading to the execution of arbitrary code. SGLang is a high-performance, open-source serving

SGLang CVE-2026-5760 (CVSS 9.8) Enables RCE via Malicious GGUF Model Files

7 hours ago 0 0 0 0
Preview
US gets second Scattered Spider-linked guilty plea : Tyler Buchanan admits role in scheme that stole at least $8 million in virtual currency

Scot becomes second Scattered Spider-linked crook to plead guilty in US

7 hours ago 1 0 0 0
Preview
Italian regulator fines national postal service orgs $15 million for data privacy violations

Italian regulator fines national postal service orgs $15 million for data privacy violations

8 hours ago 1 0 0 0
Preview
Malicious Packages Don't Fit the Vulnerability Intelligence Model

Malicious Packages Don't Fit the Vulnerability Intelligence Model

8 hours ago 0 0 0 0
Preview
Malicious Packages Don't Fit the Vulnerability Intelligence Model

Malicious Packages Don't Fit the Vulnerability Intelligence Model

8 hours ago 0 0 0 0
Re: Go 1.26.2 and Go 1.25.9 are released with 10 security fixes Posted by Demi Marie Obenour on Apr 20 I wonder if build infra needs to be updated to support automated rebuilds when a reverse dependency is updated. My understanding is that FreeBSD ports, Nix, and OBS already support this. There is a very strong trend towards static linking, and even when dynamic linking is used, ABI stability might not be guaranteed. I agree that this is extra work for distros, but I don't think distros will be able to convince upstreams to prioritize ABI...

Re: Go 1.26.2 and Go 1.25.9 are released with 10 security fixes

8 hours ago 0 0 0 0
Researchers Say Iranian MOIS Uses Multiple Hacker Personas for One Coordinated Cyber Campaign Iran’s Ministry of Intelligence and Security (MOIS) has been running a long and carefully organized cyber campaign using three separate hacker identities. These identities, known as Homeland Justice, Karma/KarmaBelow80, and Handala, were widely believed to be independent hacktivist groups. However, a detailed investigation has now confirmed that all three are part of a single, state-directed operation controlled by the Iranian government. The campaign blends cyber intrusions, sensitive data theft, destructive attacks, and psychological influence operations into one fully coordinated strategy targeting governments and organizations across multiple countries. The story began in 2022 when a group calling itself “Homeland Justice” launched a series of attacks against the Government of Albania. What made this operation stand out was the level of planning involved. Iranian state actors had already gained access to Albanian government systems approximately fourteen months before going public with their attacks. They used this access to steal sensitive documents, deploy destructive tools, and make high-profile public announcements claiming credit for the damage. This combination of hacking and deliberate public messaging turned a technical attack into a carefully staged influence event with significant geopolitical effects. DomainTools analysts identified that the same threat actor later pivoted to a new persona called “Karma,” and then “KarmaBelow80,” shifting focus to Israeli organizations in late 2023. Researchers noted that the underlying tools, infrastructure, and attack methods remained fully consistent across these rebranded campaigns. Shared domain patterns, the consistent use of Telegram for command-and-control communications, and repeated technical behaviors across what appeared to be separate groups gave DomainTools high confidence to assess all of them as one connected system operating directly under MOIS authority. By 2024 and continuing into 2026, the operation evolved under the “Handala” banner. Named after the well-known Palestinian cartoon character, the Handala persona focused heavily on information operations, including curated data leaks and targeted harassment of journalists, dissidents, and Israeli-connected individuals. The Justice Department responded in March 2026, announcing the seizure of four linked domains: Handala-Hack.to, Karmabelow80.org, Justicehomeland.org, and Handala-Redwanted.to. These domains had been actively used to publish stolen data, claim responsibility for attacks, and call for violence against specific named individuals. The overall threat actor is tracked as “Void Manticore” by security researchers and also referenced as MOIST GRASSHOPPER in DomainTools reporting. The group is directly linked to Iran’s MOIS and represents one of the most active state-linked cyber influence ecosystems currently in operation. MOIS-Attributed cyber groups and persona layer (Source – DomainTools) Its methods go well beyond simple hacking, combining long-term network access with psychological pressure, data weaponization, and carefully timed public releases that are designed to shape public opinion and behavior in targeted countries. Multi-Persona Infrastructure and Deception Tactics One of the most notable aspects of this campaign is how it uses multiple branded identities to serve distinct operational goals while sharing a single backend infrastructure. Homeland Justice handles destructive operations against Albania. Karma and KarmaBelow80 targeted Israeli entities during a defined period, while Handala now serves as the primary vehicle for influence and information warfare. This structure allows Iran’s intelligence service to segment its messaging and targeting while maintaining the outward appearance of completely separate, unconnected hacktivist groups . The technical infrastructure connecting these personas includes shared hosting patterns, overlapping domain registration behaviors, and the reuse of identical malware components across operations. The group deployed wiper tools to permanently destroy data, alongside ransomware-style encryption used not for financial gain but purely to maximize operational disruption. Tools like Rhadamanthys, a commercial infostealer available on darknet forums, appeared in Handala-linked operations paired with custom wipers in phishing campaigns impersonating software updates from vendors such as F5. MOIS Connection (Source – DomainTools) Security organizations and government agencies recommend monitoring for suspicious exploitation of internet-facing services such as Microsoft SharePoint, the initial access method used in the Albania campaign. Organizations should implement strict network segmentation , regularly audit privileged account activity, and deploy endpoint detection tools capable of identifying manual intrusion behavior. Threat intelligence teams should monitor domain infrastructure associated with MOIST GRASSHOPPER and block domains flagged in the Justice Department’s March 2026 seizure to reduce ongoing exposure. Follow us on  Google News ,  LinkedIn , and  X  to Get More Instant Updates ,  Set CSN as a Preferred Source in  Google . The post Researchers Say Iranian MOIS Uses Multiple Hacker Personas for One Coordinated Cyber Campaign appeared first on Cyber Security News .

Researchers Say Iranian MOIS Uses Multiple Hacker Personas for One Coordinated Cyber Campaign

9 hours ago 1 1 0 0
Preview
Crypto infrastructure company blames $290 million theft on North Korean hackers

Crypto infrastructure company blames $290 million theft on North Korean hackers

9 hours ago 3 1 0 0
Preview
Pluralistic: Comrade Trump (20 Apr 2026) – Pluralistic: Daily links from Cory Doctorow Today's links Comrade Trump : Burning down the American empire to save it. Hey look at this : Delights to delectate. Object permanence : MPAA's threat-based 'education'; Cuehack; Heinlein on GWB; AT&T v the internet; British tax-havens v HMG; What is neoliberalism?; Newspaper landlords; Watch-part motorcycle; Tax havens bad; Buscemi's eyes; Sesame Street on lead poisoning. Upcoming appearances : San Francisco, London, Berlin, NYC, Barcelona, Hay-on-Wye, London, NYC. Recent appearances : Where I've been. Latest books : You keep readin' em, I'll keep writin' 'em. Upcoming books : Like I said, I'll keep writin' 'em. Colophon : All the rest. Comrade Trump ( permalink ) There aren't a lot of things I agree with Mark Carney about, but there's one area where he and I are in total accord: the old, US-dominated, "rules-based international order" was total bullshit: https://www.weforum.org/stories/2026/01/davos-2026-special-address-by-mark-carney-prime-minister-of-canada/ Unlike Carney, I never pretended to like that old order, and indeed, I spent my entire life fighting against it – literally, all the way back to childhood, organizing other children to march against Canada's participation in America's nuclear weapons programs: https://www.flickr.com/photos/doctorow/53616011737/in/photolist-2pFS5kt All of which means that my experience of the Trump years is decidedly weird . On the one hand, I exist in a near-perpetual state of anxious misery, as Trump and his chud army of Christian nationalists and degenerate gamblers pursue a program of gleeful genocide. But at the very same time, I'm living in a world in which Trump is (inadvertently) dismantling many of the worst aspects of the old order in favor of something decidedly better . Take Trump's tariff policy. Back during Trump I, he decided that Americans couldn't buy Chinese solar anymore, which had the double benefit of allowing him to pursue the twin goals of throwing red meat to Sinophobic Cold War 2.0 freaks and delivering a giant gift to the planet-wrecking oil companies that had helped him buy his way into office. This was really bad for America, of course, but those solar panels had to go somewhere . Mostly, they ended up in Pakistan, dumped there at such a massive discount that the country solarized virtually overnight. Pakistani solar installers learned their trade from Tiktok videos set to Tamil film soundtracks, and unwired the country so thoroughly that today, the national power company is in danger of going bust because no one buys their electricity from the grid anymore. Pakistani bridal dowries now routinely include four panels, an inverter and a battery: https://billmckibben.substack.com/p/a-tale-of-two-countries This is an inversion of the normal order of things, in which rich countries get all the good stuff first, and poor countries like Pakistan get scraps after we've gorged ourselves. Think of vaccine apartheid, in which monsters like Howard Dean insisted that we had to prevent countries in the global south from making their own covid vaccines, because poor brown people are too stupid and primitive to run a pharma manufacturing operation: https://pluralistic.net/2021/04/08/howard-dino/#the-scream But, thanks to Comrade Trump, Pakistan was first in line to become the world's solar capital. The country's LNG terminal – built with Chinese Belt-and-Road money – is now a stranded asset, because no one there needs gas. That's gas whose supply has been choked off in the Strait of Epstein…which brings me to Trump's foreign policy and its impact on the global energy shift. Transitive energy shortages have small effects: when your energy bill goes up for a while (because of extreme weather, say), it makes you angry and sad and might result in an electoral loss for whatever politician presided over the price hike. But when you get genuine, prolonged shortages – the sort that are accompanied by rationing – you make permanent changes. Rationing is so psychologically scarring that it induces people to make long-delayed investments that result in permanent changes to their consumption habits. Maybe you've known for a long time that an induction top would be better for your indoor air quality and your cooking than the gas range you have now, but you don't want to buy a whole new appliance and pay for an electrician to run a high-wattage line in expensive conduit from your breaker panel to your kitchen. But if you're an Indian restaurateur who can no longer get any cooking gas – because it's being rationed for household use – then you are going out to buy whatever induction top you can lay hands on. Maybe it's a cheap, low-powered single burner one that plugs into your existing electrics, or maybe you're splashing out and swapping out your whole gas appliance. Whichever it is, you are no longer interested in your chef's insistence that real cooking gets done over gas. If your chef can't cook on an induction top, your chef will need to find employment elsewhere. This is going on all over the world right now, as people buy EVs (and pay to have chargers installed at home – maybe getting a twofer on their conduit runs with two high power lines run through the same conduit infrastructure). In Australia – where the last shipment of gas for the foreseeable came into port last week – people are calling their local EV dealers and offering to buy whatever car is on the lot, sight unseen. Meanwhile, in Ethiopia, a series of dollar-related crises caused the country to ban imports of internal combustion engines altogether (oil and gas are denominated in dollars, which means you can only get oil if you first sell stuff to Americans or others who'll pay in dollars). The country's fleet of noisy, dirty motorbikes is being swiftly replaced by ebikes that get eight miles to the penny : https://www.ecofinagency.com/news-industry/0810-49366-ethiopia-expands-vehicle-import-ban-to-trucks-pushing-electric-transport Ebikes are insanely great technology. Cheap, rugged and reliable, they're basically bicycles that abolish hills . Once you've gotten accustomed to an ebike – maybe you've invested in a folding helmet and a raincoat – you'll never go back. The advantages of an ebike commute over a car commute are legion, but my favorite little pleasure is the ability to easily make a stop at a nice coffee shop halfway between home and work, rather than being stuck buying shitty chain coffee near the office. Four years ago, another mad emperor, Vladimir Putin, invaded Ukraine – and in so doing, catapulted Europe's energy transition into the Gretacene, with unimaginable defeats for the fossil fuel lobby. Not just subsidies for the clean energy transition, but also policy shifts in areas that had been deadlocked for a decade, like approvals for balcony solar, which is transforming the continent. Even the UK, one of the oil industry's most reliable vassal states, is now greenlighting balcony solar: https://www.gov.uk/government/news/government-to-make-plug-in-solar-available-within-months This may not sound like much, but the UK is a country whose politics is composed 50% hatred of migrants and trans people, and 50% incredibly stupid planning battles. Great Britain is a magical land where your neighbors can ask the government to prevent you from installing double-glazing on the grounds that it will change the "historic character" of their neighborhood of terraced Victorian homes. I once lost a fight to get permission to put a little glass greenhouse on my balcony on the grounds that it would "alter the facade" of the undistinguished low-rise 1960s industrial building I live on top of. The fact that HMG is going to tell your facade-obsessed neighbors to fuck off all the way into the sun so that you can hang solar panels off your balcony is nothing short of a miracle . Comrade Putin's contribution to oil-soaked Britain's energy transition can't be overstated. Thanks to "free market" policies that sent energy prices soaring after the Ukraine invasion, Brits installed so much solar ( despite the existing impediments to solarization) that now the government is begging us to use more energy this summer, because the grid can't absorb all those lovely free electrons: https://www.theguardian.com/environment/2026/apr/14/uk-households-power-renewables-soar The UK is on a glide-path to adopting the Australian plan. Australia also benefited from Trump I's solar embargo, receiving a ton of cheap solar that would otherwise have ended up in America. Now Australia has so much solar that they're giving away electricity , with three free hours of unlimited energy every day. Stick your dishwasher, clothes-dryer and EV charger on a timer, invest in a battery or two, and fill your boots: https://billmckibben.substack.com/p/free-electricity-like-at-no-cost (Maybe at this point you're thinking dark thoughts about critical minerals and such. That's not the problem you think it is and it's getting better every day. To take just one example, lithium batteries are about to be replaced with sodium batteries. Sodium is the world's sixth-most abundant element:) https://www.livescience.com/technology/electric-vehicles/china-puts-a-sodium-ion-battery-into-an-ev-for-the-first-time-it-can-drive-248-miles-on-a-single-charge The Strait of Epstein crisis is going to do more to accelerate permanent, unidirectional migration away from fossil fuels to cleantech than decades of environmental activism. Cleantech is so much better than fossil fuels – cheaper, more reliable, cleaner – that anyone who tries it becomes an instant convert. That's why the fossil fuel industry has been so insistent that no one get to try it! To take just one example here: Texas ranchers have been solarizing, thanks to the state's bizarre "free market" energy system that sees energy prices spiking so high during cold snaps that you literally have to choose between freezing to death and going bankrupt. Solar is great for agriculture, especially in climate-ravaged Texas, where it provides crucial shade for crops and livestock, while substantially reducing soil evaporation, resulting in substantial irrigation savings. When the oil-captured Texas legislature introduced a bill to force electric companies to add one watt of fossil power for every watt of solar that their customers installed, furious ranchers from blood red Republican rural districts flooded their town hall meetings, decrying the plan as "DEI for fossil fuels." The bill died: https://austinfreepress.org/renewables-are-now-the-costco-of-energy-production-bill-mckibben-says/ This is the template for the long-foreseeable future. Thanks to Trump's stupid, bloody, unforgivable war of choice in the Gulf, the world is going to install unimaginable amounts of cleantech. They are going to throw away their water heaters, motorbikes, furnaces and cars and replace them with all-electric versions. They're going to cover their roofs and balconies with panels. The battery industry will experience a sustained boom. The fortunes that fossil fuel companies are reaping from the current shortage is their last windfall. The writing is on the wall. Trump opened Alaska for drilling and the oil companies noped out because they couldn't find a bank that would loan them the money needed to get started. Then it happened again in Venezuela. This de-fossilizing was already the direction of travel, the only question was the pace at which the transition would proceed – and Comrade Trump has just stomped all over the (liquid natural) gas pedal. Energy is just one realm where Trump is doing praxis. One of the most exciting developments that Trumpismo's incontinent belligerence has induced is the global technology transition. For decades, the only people pointing out the dangers of using America's cash-grabbing, privacy invading defective tech exports were digital rights hippies like me, and our victories were modest and far between. Despite the Snowden revelations, despite the tech industry's prolific snood-cocking at EU privacy regulators and Canadian lawmakers, we all just carried on using these incredibly dangerous, steadily enshittifying Big Tech products. We even run our governments and structurally important companies off Big Tech. We let US tech companies update (that is, downgrade) the software on our cars and tractors, our pacemakers and ventilators, our power plants and telephone switches. There's lots of reasons for this. For one thing, ripping out and replacing all that software and firmware is a prodigious challenge, as is building the data-centers to host it for every "digitally sovereign" country. Add to that the complexity of successfully migrating data, edit histories, archives and identities and you're looking at a very big lift. So long as the American tech bosses kept their enshittificatory gambits to a measured, slow flow, they could keep the pain beneath the threshold where it was worth us boiling frogs leaping out of their pot. But the most important force defending American internet hegemony was free trade: specifically, the US forced all of its trading partners to adopt "anticircumvention" laws that make it illegal to modify US tech exports. That means that you can't go into business selling your neighbors the tools to use generic ink or an independent app store, much less make a fortune exporting those tools to the rest of the world: https://pluralistic.net/2026/03/16/whittle-a-webserver/#mere-ornaments Enter Comrade Trump. When Trump started weaponizing US tech platforms to take away the working files, email accounts and cloud calendars of judges who pissed him off (by sentencing Bolsonaro to prison and swearing out a genocide warrant for Netanyahu), he put the whole world on notice that he could shut down their governments, judiciaries or companies at the click of a mouse: https://pluralistic.net/2026/04/16/pascals-wager/#doomer-challenge And of course, he's whacked the whole world with tariffs that violate the trade agreements that imposed those anticircumvention obligations that protect America's defective tech exports. Now there's no longer any reason to keep those laws on the books. Happy Liberation Day, everyone! The post-American internet is at hand: https://pluralistic.net/2026/01/01/39c3/#the-new-coalition But Trump has even more praxis up his spraytan-stained sleeves. Trump is succeeding where Bernie Sanders, Elizabeth Warren and AOC failed: he's making the case for Democrats to defenestrate their useless, sellout, Epstein-poisoned leaders. All across the country, radical Dems and avowed socialists are sweeping primaries and elections, as voters realize that Blue No Matter Who will doom them to eternal torment in the Manchin-Synematic Universe: https://prospect.org/2026/02/11/progressive-win-new-jersey-anti-ice-organizing-mejia/ Fury over Trumpismo is pushing even the most useless Democratic leaders to sign up for billionaire taxes: https://jacobin.com/2026/04/zohran-tax-rich-hochul-nyc Thanks to Comrade Trump, the median Democratic voter will no longer be satisfied with Kente cloth photo-ops and little ping-pong paddles stenciled with "down with this sort of thing": https://www.truthdig.com/articles/ping-pong-paddles-to-a-gun-fight/ Thanks to Trump, we might see criminal prosecutions – and a primary challenge for any Dem that gets in the way of a serious, Nuremberg-style reckoning with Trumpismo and its gangsters: https://pluralistic.net/2026/02/10/miller-in-the-dock/#denazification Look, all things being equal, I would have preferred that Trump had keeled over from a mid-burger stroke on the campaign trail in 2016. But when life gives you SARS, you make sarsaparilla. This is a deeply shitty timeline, but Comrade Trump keeps tripping over his red tie. Let's take the wins. Hey look at this ( permalink ) Stop New York's Attack on 3D Printing https://www.eff.org/deeplinks/2026/04/stop-new-yorks-attack-3d-printing Make It Myself https://xkcd.com/3233/ Mind the Gap https://www.butthistime.com/p/mind-the-gap?hide_intro_popup=true Billionaire Blues https://harpers.org/archive/2026/05/billionaire-blues-thomas-frank/ What, Exactly, Is a Fair Wage? https://prospect.org/2026/04/17/fair-wage-standard-arindrajit-dube-book-review/ Object permanence ( permalink ) #25yrsago The MPAA 'educates the public' with threatening letters https://web.archive.org/web/20120318060108/http://news.cnet.com/2100-1023-255961.html&tag=tp_pr #25yrsago Cuehack for the :CueCat https://web.archive.org/web/20010803172853/http://www.rtmark.com/cuejack/ #25yrsago Microsoft Technical Support vs The Psychic Friends Network https://web.archive.org/web/20010410171616/http://www.bmug.org/news/articles/MSvsPF.html #20yrsago The novel Heinlein would have written about GW Bush’s America https://memex.craphound.com/2006/04/17/the-novel-heinlein-would-have-written-about-gw-bushs-america/ #20yrsago Hilarious hijinx with security guards who hate building-photographers https://thomashawk.com/2006/04/photographing-architecture-is-not.html #20yrsago Hundreds ask Smithsonian not to sell out to Showtime https://web.archive.org/web/20060420031124/https://www.americanprogress.org/site/pp.asp?c=biJRJ8OVF&b=1554385 #20yrsago How AT&T wants to turn the Internet into mere TV https://web.archive.org/web/20060620095643/http://www.salon.com/tech/feature/2006/04/17/toll/index_np.html #20yrsago NOLA mayoral candidate doctors Disneyland photo – again https://web.archive.org/web/20060422010054/https://www.wonkette.com/politics/new-orleans/kimberly-williamson-butler-continues-to-astound-us-167923.php #20yrsago Where He-Man came from https://web.archive.org/web/20060423061651/https://thesneeze.com/mt-archives/000500.php #20yrsago FBI demand chance to censor muckracking journo’s papers https://web.archive.org/web/20060421045340/https://www.chronicle.com/free/2006/04/2006041801n.htm #15yrsago Ethiopia’s “newspaper landlords” rent the want-ads by the minute https://www.cnn.com/2011/BUSINESS/04/19/newspaper.rental.ethiopia/index.html #15yrsago It’s people like us what makes trouble: the pernicious influence of immigrants in the UK. https://web.archive.org/web/20080314013819/http://feorag.newsvine.com/_news/2008/03/10/1356131-the-pernicious-influence-of-immigrants-in-the-uk #15yrsago China’s “Jasmine Revolution”: anonymous out-of-country bloggers troll the politburo https://web.archive.org/web/20110412063347/http://globalguerrillas.typepad.com/globalguerrillas/2011/04/the-jasmine-revolution.html #15yrsago Motorcycles made from watch parts https://www.deviantart.com/dkart71/art/Motorcycles-out-of-watch-parts-18a-204941090 #15yrsago Steve Buscemi’s Eyes: the printable mask https://eyesuckink.blogspot.com/2011/04/free-home-version-of-steve-buscemis.html #15yrsago Privacy, Facebook, politics and kids https://www.theguardian.com/commentisfree/video/2011/apr/18/cory-doctorow-networking-technologies-video?CMP=twt_fd #15yrsago NZ MP votes for anti-piracy law hours after tweeting about her love of pirated music https://torrentfreak.com/kiwi-mp-called-out-as-pirate-after-passing-anti-piracy-law-110415/ #15yrsago Righthaven copyright trolls never had the right to sue, have their asses handed to them by the EFF https://web.archive.org/web/20110418001051/http://paidcontent.org/article/419-righthavens-secret-contract-is-revealedwill-its-strategy-collapse/ #15yrsago TSA considers being upset at screening procedures to be an indicator of terrorist intentions https://www.cnn.com/2011/TRAVEL/04/15/tsa.screeners.complain/ #10yrsago The saga of Ian Bogost’s pressure-washer https://bogostpressurewasherstatus.tumblr.com/ #10yrsago Heads of UK’s tax havens to Her Majesty’s Government: go fuck yourself https://web.archive.org/web/20160411112631/http://www.independent.co.uk/news/uk/politics/tax-haven-corporate-tax-avoidance-uk-ministers-humiliated-after-cayman-bvi-british-virgin-islands-a6974956.html #10yrsago George Clooney’s neighbor threw a $27/plate Sanders fundraiser to counter Clooney’s $33K/head Hillary event https://www.nbcnews.com/politics/2016-election/sanders-supporters-shower-clinton-motorcade-1-bills-n557191 #10yrsago What is neoliberalism? https://www.theguardian.com/books/2016/apr/15/neoliberalism-ideology-problem-george-monbiot?CMP=twt_books_b-gdnbooks #10yrsago No, tax-havens aren’t good for society (duh) https://web.archive.org/web/20160602053124/https://www.washingtonpost.com/opinions/five-myths-about-tax-havens/2016/04/15/76d001d2-0255-11e6-b823-707c79ce3504_story.html #10yrsago John Oliver and the cast of Sesame Street on lead poisoning https://www.youtube.com/watch?v=GUizvEjR-0U #10yrsago Supreme Court sends Authors Guild packing, won’t hear Google Books case https://arstechnica.com/tech-policy/2016/04/fair-use-prevails-as-supreme-court-rejects-google-books-copyright-case/ #10yrsago Four years later, Popehat’s favorite con-artist is indicted https://web.archive.org/web/20160419031946/https://popehat.com/2016/04/18/anatomy-of-a-scam-investigation-chapter-14-the-indictment/ #10yrsago Hacking Team supplied cyber-weapons to corrupt Latin American governments for human rights abuses https://www.derechosdigitales.org/wp-content/uploads/malware-para-la-vigilancia.pdf #10yrsago High profits mean capitalism is cooked https://www.promarket.org/2016/04/16/are-we-all-rent-seeking-investors/ #10yrsago A look back at the D&D moral panic https://www.nytimes.com/2016/04/18/us/when-dungeons-dragons-set-off-a-moral-panic.html #10yrsago Petition to reassign head of Canada Post to deliver letters at $500k/year https://www.ipetitions.com/petition/help-canada-post-ceo-deepak-chopra-keep-his-job #1yrago Mark Zuckerberg personally lost the Facebook antitrust case https://pluralistic.net/2025/04/18/chatty-zucky/#is-you-taking-notes-on-a-criminal-fucking-conspiracy #20yrsago NOLA mayoral candidate doctors Disneyland photo – again https://web.archive.org/web/20060422010054/https://www.wonkette.com/politics/new-orleans/kimberly-williamson-butler-continues-to-astound-us-167923.php #20yrsago Where He-Man came from https://web.archive.org/web/20060423061651/https://thesneeze.com/mt-archives/000500.php #20yrsago FBI demand chance to censor muckracking journo’s papers https://web.archive.org/web/20060421045340/https://www.chronicle.com/free/2006/04/2006041801n.htm #15yrsago Ethiopia’s “newspaper landlords” rent the want-ads by the minute https://www.cnn.com/2011/BUSINESS/04/19/newspaper.rental.ethiopia/index.html #15yrsago It’s people like us what makes trouble: the pernicious influence of immigrants in the UK. https://web.archive.org/web/20080314013819/http://feorag.newsvine.com/_news/2008/03/10/1356131-the-pernicious-influence-of-immigrants-in-the-uk #15yrsago China’s “Jasmine Revolution”: anonymous out-of-country bloggers troll the politburo https://web.archive.org/web/20110412063347/http://globalguerrillas.typepad.com/globalguerrillas/2011/04/the-jasmine-revolution.html #15yrsago Motorcycles made from watch parts https://www.deviantart.com/dkart71/art/Motorcycles-out-of-watch-parts-18a-204941090 #15yrsago Steve Buscemi’s Eyes: the printable mask https://eyesuckink.blogspot.com/2011/04/free-home-version-of-steve-buscemis.html #10yrsago No, tax-havens aren’t good for society (duh) https://web.archive.org/web/20160602053124/https://www.washingtonpost.com/opinions/five-myths-about-tax-havens/2016/04/15/76d001d2-0255-11e6-b823-707c79ce3504_story.html #10yrsago John Oliver and the cast of Sesame Street on lead poisoning https://www.youtube.com/watch?v=GUizvEjR-0U #10yrsago Supreme Court sends Authors Guild packing, won’t hear Google Books case https://arstechnica.com/tech-policy/2016/04/fair-use-prevails-as-supreme-court-rejects-google-books-copyright-case/ #10yrsago Four years later, Popehat’s favorite con-artist is indicted https://web.archive.org/web/20160419031946/https://popehat.com/2016/04/18/anatomy-of-a-scam-investigation-chapter-14-the-indictment/ #10yrsago Hacking Team supplied cyber-weapons to corrupt Latin American governments for human rights abuses https://www.derechosdigitales.org/wp-content/uploads/malware-para-la-vigilancia.pdf #10yrsago High profits mean capitalism is cooked https://www.promarket.org/2016/04/16/are-we-all-rent-seeking-investors/ #10yrsago A look back at the D&D moral panic https://www.nytimes.com/2016/04/18/us/when-dungeons-dragons-set-off-a-moral-panic.html #10yrsago Petition to reassign head of Canada Post to deliver letters at $500k/year https://www.ipetitions.com/petition/help-canada-post-ceo-deepak-chopra-keep-his-job #1yrago Mark Zuckerberg personally lost the Facebook antitrust case https://pluralistic.net/2025/04/18/chatty-zucky/#is-you-taking-notes-on-a-criminal-fucking-conspiracy Upcoming appearances ( permalink ) San Francisco: 2026 Berkeley Spring Forum on M&A and the Boardroom, Apr 23 https://www.theberkeleyforum.com/#agenda London: Resisting Big Tech Empires (LSBU), Apr 25 https://www.tickettailor.com/events/globaljusticenow/2042691 NYC: Enshittification at Commonweal Ventures, Apr 29 https://luma.com/ssgfvqz8 NYC: Techidemic with Sarah Jeong, Tochi Onyibuchi and Alia Dastagir (PEN World Voices), Apr 30 https://worldvoices.pen.org/event/techidemic/ Barcelona: Internet no tiene que ser un vertedero (Global Digital Rights Forum), May 13 https://encuentroderechosdigitales.com/en/ Berlin: Re:publica, May 18-20 https://re-publica.com/de/news/rp26-sprecher-cory-doctorow Berlin: Enshittification at Otherland Books, May 19 https://www.otherland-berlin.de/de/event-details/cory-doctorow.html Hay-on-Wye: HowTheLightGetsIn, May 22-25 https://howthelightgetsin.org/festivals/hay/big-ideas-2 SXSW London, Jun 2 https://www.sxswlondon.com/session/how-big-tech-broke-the-internet-b3c4a901 NYC: The Reverse Centaur's Guide to Life After AI (The Strand), Jun 24 https://www.strandbooks.com/cory-doctorow-the-reverse-centaur-s-guide-to-life-after-ai.html Recent appearances ( permalink ) When Do Platforms Stop Innovating and Start Extracting? (InnovEU) https://www.youtube.com/watch?v=cccDR0YaMt8 Pete "Mayor" Buttigieg (No Gods No Mayors) https://www.patreon.com/posts/pete-mayor-with-155614612 The internet is getting worse (CBC The National) https://youtu.be/dCVUCdg3Uqc?si=FMcA0EI_Mi13Lw-P Do you feel screwed over by big tech? (Ontario Today) https://www.cbc.ca/listen/live-radio/1-45-ontario-today/clip/16203024-do-feel-screwed-big-tech Launch for Cindy's Cohn's "Privacy's Defender" (City Lights) https://www.youtube.com/watch?v=WuVCm2PUalU Latest books ( permalink ) "Canny Valley": A limited edition collection of the collages I create for Pluralistic, self-published, September 2025 https://pluralistic.net/2025/09/04/illustrious/#chairman-bruce "Enshittification: Why Everything Suddenly Got Worse and What to Do About It," Farrar, Straus, Giroux, October 7 2025 https://us.macmillan.com/books/9780374619329/enshittification/ "Picks and Shovels": a sequel to "Red Team Blues," about the heroic era of the PC, Tor Books (US), Head of Zeus (UK), February 2025 ( https://us.macmillan.com/books/9781250865908/picksandshovels ). "The Bezzle": a sequel to "Red Team Blues," about prison-tech and other grifts, Tor Books (US), Head of Zeus (UK), February 2024 ( thebezzle.org ). "The Lost Cause:" a solarpunk novel of hope in the climate emergency, Tor Books (US), Head of Zeus (UK), November 2023 ( http://lost-cause.org ). "The Internet Con": A nonfiction book about interoperability and Big Tech (Verso) September 2023 ( http://seizethemeansofcomputation.org ). Signed copies at Book Soup ( https://www.booksoup.com/book/9781804291245 ). "Red Team Blues": "A grabby, compulsive thriller that will leave you knowing more about how the world works than you did before." Tor Books http://redteamblues.com . "Chokepoint Capitalism: How to Beat Big Tech, Tame Big Content, and Get Artists Paid, with Rebecca Giblin", on how to unrig the markets for creative labor, Beacon Press/Scribe 2022 https://chokepointcapitalism.com Upcoming books ( permalink ) "The Reverse-Centaur's Guide to AI," a short book about being a better AI critic, Farrar, Straus and Giroux, June 2026 ( https://us.macmillan.com/books/9780374621568/thereversecentaursguidetolifeafterai/ ) "Enshittification, Why Everything Suddenly Got Worse and What to Do About It" (the graphic novel), Firstsecond, 2026 "The Post-American Internet," a geopolitical sequel of sorts to Enshittification , Farrar, Straus and Giroux, 2027 "Unauthorized Bread": a middle-grades graphic novel adapted from my novella about refugees, toasters and DRM, FirstSecond, 2027 "The Memex Method," Farrar, Straus, Giroux, 2027 Colophon ( permalink ) Today's top sources: Currently writing: "The Post-American Internet," a sequel to "Enshittification," about the better world the rest of us get to have now that Trump has torched America. Third draft completed. Submitted to editor. "The Reverse Centaur's Guide to AI," a short book for Farrar, Straus and Giroux about being an effective AI critic. LEGAL REVIEW AND COPYEDIT COMPLETE. "The Post-American Internet," a short book about internet policy in the age of Trumpism. PLANNING. A Little Brother short story about DIY insulin PLANNING This work – excluding any serialized fiction – is licensed under a Creative Commons Attribution 4.0 license. That means you can use it any way you like, including commercially, provided that you attribute it to me, Cory Doctorow, and include a link to pluralistic.net. https://creativecommons.org/licenses/by/4.0/ Quotations and images are not included in this license; they are included either under a limitation or exception to copyright, or on the basis of a separate license. Please exercise caution. How to get Pluralistic: Blog (no ads, tracking, or data-collection): Pluralistic.net Newsletter (no ads, tracking, or data-collection): https://pluralistic.net/plura-list Mastodon (no ads, tracking, or data-collection): https://mamot.fr/@pluralistic Bluesky (no ads, possible tracking and data-collection): https://bsky.app/profile/doctorow.pluralistic.net Medium (no ads, paywalled): https://doctorow.medium.com/ Tumblr (mass-scale, unrestricted, third-party surveillance and advertising): https://mostlysignssomeportents.tumblr.com/tagged/pluralistic " When life gives you SARS, you make sarsaparilla " -Joey "Accordion Guy" DeVilla READ CAREFULLY: By reading this, you agree, on behalf of your employer, to release me from all obligations and waivers arising from any and all NON-NEGOTIATED agreements, licenses, terms-of-service, shrinkwrap, clickwrap, browsewrap, confidentiality, non-disclosure, non-compete and acceptable use policies ("BOGUS AGREEMENTS") that I have entered into with your employer, its partners, licensors, agents and assigns, in perpetuity, without prejudice to my ongoing rights and privileges. You further represent that you have the authority to release me from any BOGUS AGREEMENTS on behalf of your employer. ISSN: 3066-764X

Pluralistic: Comrade Trump (20 Apr 2026)

9 hours ago 0 0 0 0
Preview
oss-sec: Re: Go 1.26.2 and Go 1.25.9 are released with 10 security fixes Posted by Morten Linderud on Apr 20 We don't. I originall did this work a few years ago but it just produced a huge list of packages that would need to be worked through that carried other issues. The build infra is not there to dispatch larger rebuilds for this and all of it would be hand holding. There are 431 depending on go, and each project would need to be unpacked/scanned and then rebuilt accordingly. You could just rebuild everything, but that alone would take a few...

Re: Go 1.26.2 and Go 1.25.9 are released with 10 security fixes

9 hours ago 0 0 0 0
Advertisement
Preview
oss-sec: Re: [ADVISORY] CVE-2026-5367: Heap over-read in OVN DHCPv6 Client ID processing Posted by Ales Musil on Apr 20 One small correction: the 24.09 release is not happening so for 24.09 please upgrade to the next available release.

Re: [ADVISORY] CVE-2026-5367: Heap over-read in OVN DHCPv6 Client ID processing

9 hours ago 0 0 0 0
Lovable AI App Builder Reportedly Exposes Thousands of Projects Data via API Flaw A critical Broken Object Level Authorization (BOLA) vulnerability in Lovable, the popular AI-powered app builder platform, is reportedly allowing unauthorized users to access sensitive project data, including source code, database credentials, AI chat histories, and real customer information from thousands of projects created before November 2025. The flaw, classified as a Broken Object Level Authorization issue, allows any free-tier Lovable account holder to make unauthenticated API calls to the platform’s backend and retrieve project data belonging to other users. BOLA vulnerabilities occur when an API grants access to objects without verifying whether the requesting user actually owns or has permission to view them. This class of flaw is ranked #1 in the OWASP API Security Top 10 for its prevalence and ease of exploitation. According to a researcher with the handle @weezerOSINT, the API endpoint https://api.lovable.dev/GetProjectMessagesOutputBody appears to return full project message histories, AI thinking logs, and tool-use records without enforcing proper object-level access controls. The exposed JSON responses contain user IDs, session content, and internal AI reasoning chains that were never intended to be publicly accessible. The vulnerability was reported to Lovable via HackerOne approximately 48 days before public disclosure, yet the flaw reportedly remains unpatched for projects created prior to November 2025. Lovable has a mass data breach affecting every project created before november 2025. I made a lovable account today and was able to access another users source code, database credentials, AI chat histories, and customer data are all readable by any free account. nvidia,… pic.twitter.com/QcVvz9cNZl — impulsive (@weezerOSINT) April 20, 2026 While Lovable appears to have applied a fix for newly created projects, the legacy project base remains exposed, leaving a significant risk window for users who built applications on the platform before the cutoff date. Researchers examining the vulnerability uncovered particularly alarming examples. One affected project belonged to Connected Women in AI, a nonprofit organization, and reportedly contained exposed Supabase database credentials alongside real user data. Among the data found were records linked to individuals from Accenture Denmark and Copenhagen Business School. Beyond nonprofit exposure, employees at major technology firms, including Nvidia, Microsoft, Uber, and Spotify, reportedly have Lovable accounts tied to affected projects, raising the potential that sensitive corporate development data could be at risk. The vulnerability was submitted on the HackerOne bug bounty platform and was marked as a duplicate of report #3583821, labeled “Broken Object Level Authorization on Lovable API leads to unauthorized access to user data and project source code”. The duplicate submission was flagged as Informative, suggesting the issue was already known to the platform prior to the latest disclosure on March 3, 2026, yet public evidence continues to show the flaw remains exploitable on legacy accounts. Security researchers recommend that Lovable users who created projects before November 2025 should immediately rotate any API keys, database credentials, or secrets stored within those projects. Users should assume that chat histories and source code associated with older projects may have already been accessed. The incident underscores a recurring challenge in AI-native development platforms: security controls often lag behind rapid feature deployment, leaving early adopters most exposed. Organizations building production applications on low-code AI builders should enforce secrets management practices independent of the platform, and regularly audit API exposure for any sensitive credentials embedded in project repositories or chat contexts. Follow us on Google News , LinkedIn , and X for daily cybersecurity updates. Contact us to feature your stories. The post Lovable AI App Builder Reportedly Exposes Thousands of Projects Data via API Flaw appeared first on Cyber Security News .

Lovable AI App Builder Reportedly Exposes Thousands of Projects Data via API Flaw

10 hours ago 1 2 0 0
Preview
oss-sec: [ADVISORY] CVE-2026-5367: Heap over-read in OVN DHCPv6 Client ID processing Posted by Ales Musil on Apr 20 Description =========== Multiple versions of OVN (Open Virtual Network) are vulnerable to crafted DHCPv6 packets that could potentially read out-of-bounds, leaking adjacent info stored on the heap. OVN supports configuring DHCPv6 options for Logical Switch Ports. When configured we allow handling of DHCPv6 requests in a userspace thread called pinctrl. The thread accesses user-controlled packet data and copies some of it in the process of...

[ADVISORY] CVE-2026-5367: Heap over-read in OVN DHCPv6 Client ID processing

10 hours ago 0 0 0 0