New Phoenix Rowhammer Attack Variant Bypasses Protection With DDR5 Chips

New Phoenix Rowhammer Attack Variant Bypasses Protection With DDR5 Chips

Cyber Security News cybersecuritynews.com

A new Rowhammer attack variant named Phoenix can bypass the latest protections in modern DDR5 memory chips, researchers have revealed. The attack is the first to demonstrate a practical privilege escalation exploit on a commodity system equipped with DDR5 RAM, undermining the assumption that these newer memory modules were immune to such threats. Rowhammer is

Fortinet vs NetApp - Which Certs Are Hot in 2025?

Fortinet vs NetApp - Which Certs Are Hot in 2025?

cybersecurity www.reddit.com

Been seeing a lot of ppl ask about which path is worth more right now: security-heavy Fortinet or data-focused NetApp . Both are in demand but in different ways - Fortinet for network/security engineers, and NetApp for those leaning into storage + cloud. I came across this breakdown that dives into the most demanded certs from both sides and how they stack up in 2025: 🔗 https://www.nwexam.com/Fortinet-vs-NetApp-Certifications-The-Ultimate-Showdown Curious: anyone here actually pursuing either...

Latest NPM Package Compromise Using Secret Scanning Tools to Steal Credentials

Latest NPM Package Compromise Using Secret Scanning Tools to Steal Credentials

cybersecurity www.reddit.com

A few dozen new npm packages were compromised today including ctrl/tinycolor, react-jsonschema, ngx-toastr, nativescript-community, etc. What's interesting about this round of supply chain attack is that the compromised packages were using a secret scanning security tool as a post install hook to gather credentials from the local filesystem and then calling a webhook endpoint to exfiltrate the data. submitted by /u/j12y [link] [comments]

How I started with ELK stack to build a basic monitoring system

How I started with ELK stack to build a basic monitoring system

cybersecurity www.reddit.com

What tools would you use to build a security monitoring system , opensource or paid and which ones specifically , I am thinking roll your own XDR but its a lot of effort ? Would something like ELK Stack be a good starting point or do you suggest other tools ideally a system that can be highly customised and tuned over time. Curious what options are out there. submitted by /u/Red_One_101 [link] [comments]

From Shadow IT to Shadow AI: The Evolution of Unseen Risk

From Shadow IT to Shadow AI: The Evolution of Unseen Risk

LevelBlue Blogs levelblue.com

Security leaders are well acquainted with Shadow IT; the unsanctioned apps, services, and even devices employees adopt to bypass bureaucracy and accelerate productivity. Think rogue cloud storage, messaging platforms, or unapproved SaaS tools. These all often slip past governance until they trigger a breach, compliance issue, or operational failure. Now, a more complex threat is emerging - Shadow AI. Employees are already using AI tools to automate tasks, generate code, analyze data, and make...

40 npm Packages Compromised in Supply Chain Attack Using bundle.js to Steal Credentials

40 npm Packages Compromised in Supply Chain Attack Using bundle.js to Steal Credentials

The Hacker News thehackernews.com

Cybersecurity researchers have flagged a fresh software supply chain attack targeting the npm registry that has affected more than 40 packages that belong to multiple maintainers. "The compromised versions include a function (NpmModule.updatePackage) that downloads a package tarball, modifies package.json, injects a local script (bundle.js), repacks the archive, and republishes it, enabling

Cryptanalysis and design for a family of plaintext non-delayed chaotic ciphers

Cryptanalysis and design for a family of plaintext non-delayed chaotic ciphers

cs.CR updates on arXiv.org arxiv.org

arXiv:2509.11158v1 Announce Type: new Abstract: Plaintext non-delayed chaotic cipher (PNDCC) means that in the diffusion equation, plaintext has no delay terms while ciphertext has a feedback term. In existing literature, chaotic cipher diffusions invariably take this form. Since its introduction, PNDCC has attracted attention but also doubts. Designers of chaotic ciphers usually claim PNDCC security by statistical tests, while rigorous cryptographic proofs are absent. Thus, it is necessary to...

ODoQ: Oblivious DNS-over-QUIC

ODoQ: Oblivious DNS-over-QUIC

cs.CR updates on arXiv.org arxiv.org

arXiv:2509.11123v1 Announce Type: new Abstract: The Domain Name System (DNS), which converts domain names to their respective IP addresses, has advanced enhancements aimed at safeguarding DNS data and users' identity from attackers. The recent privacy-focused advancements have enabled the IETF to standardize several protocols. Nevertheless, these protocols tend to focus on either strengthening user privacy (like Oblivious DNS and Oblivious DNS-over-HTTPS) or reducing resolution latency (as...

Senior Enterprise Security Engineer

Senior Enterprise Security Engineer

JOB Webflow job-boards.greenhouse.io

Location: Buenos Aires or Remote (Argentina); Type: Full-time. As a Senior Enterprise Security Engineer on our Security Operations team, you will: Help execute ...

Product Engineer Graduate @ incident.io

Product Engineer Graduate @ incident.io

JOB incident.io London $70,000 - $85,000 jobs.ashbyhq.com

... incident response smoother, to AI agents that investigate, explain, and even ... Remote working and personal development budget - Enhanced pension/401k.

Senior Security Engineer @ Welltech

Senior Security Engineer @ Welltech

JOB Welltech Barcelona, Catalonia jobs.ashbyhq.com

Senior Security Engineer. Location. Spain. Employment Type. Full time. Location Type. Remote. Department. Engineering. OverviewApplication. Autofill from resume.

Cloud Security Engineer @ Sardine

Cloud Security Engineer @ Sardine

JOB Sardine jobs.ashbyhq.com

Cloud Security Engineer. Location. North America - Remote, Canada - Remote, United States - Remote. Employment Type. Full time. Location Type. Remote ...

at CoreWeave - Security Operations Engineer I

at CoreWeave - Security Operations Engineer I

JOB Embed Livingston, New Jersey, United States, NJ $92,000 boards.greenhouse.io

... detection and response capabilities. ... Foundational understanding of information security concepts, including incident response, threat detection, and network ...

Kraken - Lead Security Engineer

Kraken - Lead Security Engineer

JOB Kraken123 New York jobs.lever.co

Lead Security Engineer. New York. Platform – Security /. Full-time ... No, I am looking for more remote working. Additional information. Equality ...

Join Our Team - AlertMedia

Join Our Team - AlertMedia

JOB Alertmedia boards.greenhouse.io

... Remote, United States or Austin, TX HQ · DevSecOps Engineer. Mexico City ... Incident Response · Pricing. Resources. Downloads & Guides · Podcast · Blog ...

Kaseya Careers - Sales Operations Manager

Kaseya Careers - Sales Operations Manager

JOB Kaseya boards.greenhouse.io

Protect your business with advanced ransomware prevention and rapid threat detection. ... Advanced Excel skills with a strong understanding of Salesforce.