Lara De Jong
-

JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers
A new cybersecurity campaign, dubbed JackFix, is tricking users into installing malware via fake Windows update pop-ups on adult websites. Attackers use ClickFix lures to deceive victims into running malicious commands. This tactic leverages fake adult sites (like xHamster or PornHub clones), often distributed via malvertising. The “urgent security update” creates psychological pressure on victims,…
-

Fire Department Insufficiently Prepared for Large and Long-Term Incidents
The Dutch fire department is currently unprepared to handle large-scale, simultaneous, or long-term incidents like wildfires or floods across multiple safety regions or nationwide. According to a new investigation by the Inspectorate of Justice and Security (Inspectie JenV), existing efforts to assist other regions directly compromise regular service coverage, endangering citizens and responders. The Inspectorate…
-

Minister: Mandatory Acceptance of Digital Euro for Stores is Understandable
The Dutch Minister of Finance, Heinen, finds the mandatory acceptance of the digital euro by stores and businesses understandable. This stance comes as Europe continues negotiations on the digital currency, aiming for a council agreement this year. The minister emphasizes finding a balance between widespread adoption and practical implementation for smaller retailers. Concerns were raised…
-

U.S. Army Wants to Manufacture 30,000 155mm Cluster Shells Per Year
The U.S. Army is seeking manufacturers for its new XM1208 155mm cluster shells, aiming for a production of up to 30,000 rounds annually. This push addresses the urgent demand for howitzer munitions, particularly amidst global conflicts. The current U.S. production of artillery shells is 40,000 per month, but Western allies are still struggling to meet…
-

New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions
Five new vulnerabilities have been discovered in Fluent Bit, a popular open-source telemetry agent. These flaws could be exploited to compromise and take over cloud infrastructures, raising significant security concerns. Successful exploitation means attackers could disrupt operations, tamper with sensitive data, and gain deeper access into cloud and Kubernetes environments.
-

Japan’s defense chief inspects frontline bases close to Taiwan
Japan’s Defense Minister Shinjiro Koizumi recently visited Ground Self-Defense Force units on Ishigaki and Yonaguni, islands strategically located near Taiwan. This inspection comes amid increasingly strained relations between Japan and China, highlighting the importance of these remote garrisons.
-

Google Brings AirDrop Compatibility to Android’s Quick Share Using Rust-Hardened Security
Google has made a significant move: Android’s Quick Share now works with Apple’s AirDrop, enabling easier file and photo transfers between Android and iPhone devices. This cross-platform sharing feature, initially for Pixel 10 and expanding to more Android devices, was built with memory-safe Rust for robust security against common vulnerabilities, ensuring direct peer-to-peer transfers without…
-

Cabinet does not yet want to block takeover of cloud company Solvinity
The Dutch cabinet is reviewing a potential acquisition of cloud company Solvinity, which handles critical services like DigiD. Demissionary Minister Frank Rijkaart noted concerns but stated it’s too soon to block the deal, initiating a full investigation into the implications. Solvinity’s vital infrastructure supports key government systems, prompting questions from the House of Representatives. The…
-

10 Cyber Security Tools for 2025
Cybersecurity tools protect devices, systems, applications, networks, and data from cyber threats. These solutions improve security posture, manage compliance, and maintain reputation, preventing costly fixes.
-

Kimsuky and Lazarus Join Forces in Coordinated Attacks
North Korean hacking groups Kimsuky and Lazarus combine forces. They exploit zero-day vulnerabilities in coordinated attacks, targeting critical sectors worldwide. This marks a shift in state-sponsored threat operations.
