#security #Bluetooth #hack by #Apple #AirTag
An interesting topic on turning any Bluetooth device into an Apple AirTag tracker. Researchers have come up with a method that allows attackers to take the Bluetooth signal of any device, calculate a possible private key from the FindMy system, transmit it to Apple's FindMy servers, and then get the location of that unit.
https://nroottag.github.io/
An interesting topic on turning any Bluetooth device into an Apple AirTag tracker. Researchers have come up with a method that allows attackers to take the Bluetooth signal of any device, calculate a possible private key from the FindMy system, transmit it to Apple's FindMy servers, and then get the location of that unit.
https://nroottag.github.io/
nroottag.github.io
nRootTag - Tracking You from a Thousand Miles Away!
Research on how Apple's Find My network can be exploited to track non-Apple devices
🤯3🔥2🤔2
#security #GoogleDrive #USA
https://www.washingtonpost.com/politics/2025/04/20/trump-biden-sensitive-documents-shared/
https://www.washingtonpost.com/politics/2025/04/20/trump-biden-sensitive-documents-shared/
The Washington Post
Sensitive documents, including White House floor plans, improperly shared with thousands
The inadvertent sharing of a Google Drive folder with the entire staff of the General Services Administration was the latest instance of sloppy handling of sensitive documents under both Biden and Trump.
🤯2🤩2
#security #AI #health
Looks interesting:
https://github.com/aligorithm/Zero-Health
Looks interesting:
Zero trust. Zero security. Total exposure. A deliberately vulnerable health tech platform with AI Chatbot for learning about application security and ethical hacking. It contains vulnerabilities from OWASP top 10 Web, API and AI/LLM Security Vulnerabilities. Highly vulnerable, never use in production.
https://github.com/aligorithm/Zero-Health
GitHub
GitHub - aligorithm/Zero-Health: Zero trust. Zero security. Total exposure. A deliberately vulnerable health tech platform with…
Zero trust. Zero security. Total exposure. A deliberately vulnerable health tech platform with AI Chatbot for learning about application security and ethical hacking. It contains vulnerabilities fr...
✍2🔥1👌1
#security #Twitter
https://blog.cryptographyengineering.com/2025/06/09/a-bit-more-on-twitter-xs-new-encrypted-messaging/
https://blog.cryptographyengineering.com/2025/06/09/a-bit-more-on-twitter-xs-new-encrypted-messaging/
A Few Thoughts on Cryptographic Engineering
A bit more on Twitter/X’s new encrypted messaging
Update 6/10: Based on a short conversation with an engineering lead at X, some of the devices used at X are claimed to be using HSMs. See more further below. Matthew Garrett has a nice post about T…
👏2🤨1
#Security Analysis: MCP Protocol Vulnerabilities in #AI Toolchains
https://www.cyberark.com/resources/threat-research-blog/is-your-ai-safe-threat-analysis-of-mcp-model-context-protocol
https://www.reddit.com/r/netsec/comments/1ldiilv/security_analysis_mcp_protocol_vulnerabilities_in/
https://www.cyberark.com/resources/threat-research-blog/is-your-ai-safe-threat-analysis-of-mcp-model-context-protocol
https://www.reddit.com/r/netsec/comments/1ldiilv/security_analysis_mcp_protocol_vulnerabilities_in/
👀2👌1🙈1