Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Submission + - Over 10,000 Docker Hub images found leaking credentials, auth keys (bleepingcomputer.com)

joshuark writes: More than 10,000 Docker Hub container images expose data that should be protected, including live credentials to production systems, CI/CD databases, or LLM model keys. After scanning container images uploaded to Docker Hub in November, security researchers at threat intelligence company Flare found that 10,456 of them exposed one or more keys.The most frequent secrets were access tokens for various AI models (OpenAI, HuggingFace, Anthropic, Gemini, Groq). In total, the researchers found 4,000 such keys.

"These multi-secret exposures represent critical risks, as they often provide full access to cloud environments, Git repositories, CI/CD systems, payment integrations, and other core infrastructure components," Flare notes

Additionally, they found hardcoded API tokens for AI services being hardcoded in Python application files, config.json files, YAML configs, GitHub tokens, and credentials for multiple internal environments.

Some of the sensitive data was present in the manifest of Docker images, a file that provides details about the image.Flare notes that roughly 25% of developers who accidentally exposed secrets on Docker Hub realized the mistake and removed the leaked secret from the container or manifest file within 48 hours.

However, in 75% of these cases, the leaked key was not revoked, meaning that anyone who stole it during the exposure period could still use it later to mount attacks.

Flare suggests that developers avoid storing secrets in container images, stop using static, long-lived credentials, and centralize their secrets management using a dedicated vault or secrets manager.

Organizations should implement active scanning across the entire software development life cycle and revoke exposed secrets and invalidate old sessions immediately.

Comment It then becomes... (Score 1) 76

It then becomes like the infinite monkeys trying to write a masterpiece...

https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3F...

Or infinite monkeys with platinum corporate credit cards imitating a robot vacuum at the docking station during a blackout... "Charging..." ad infinitum.

Or infinite monkeys with a revolver...a very messy mess-terpiece, the blust of times.

JoshK.

Submission + - "Slop" may be seeping into the nooks and crannies of our brains. (gizmodo.com)

joshuark writes: Gizmodo reports that: Evidence That Humans Now Speak in a Chatbot-Influenced Dialect Is Getting Stronger. In theory, all organically grown utterances and snippets of text are safe from that label. But our shared linguistic ecosystem may be so AI-saturated, we now all sound like AI. Worse, in some cases AI-infected speech is being spouted by (ostensibly human) elected officials.

But two new, more anecdotal reports, suggest that our chatbot dialect isn’t just something that can be found through close analysis of data. It might be an obvious, every day fact of life now.

One can state pretty categorically, however, that the sign is written in a new style of annoying prose that has only existed since the release of ChatGPT. And at least some of that annoying new style may be embedded in all of our brains now whether we like it or not. The trend started with the infamous ELIZA.BAS BASIC program [https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Fwww.atariarchives.org%2Fbcc3%2Fshowpage.php%3Fpage%3D251] a friend programmed into their Atari 800XL home computer.

Submission + - Microsoft "mitigates" Windows LNK flaw exploited as zero-day (bleepingcomputer.com)

joshuark writes: Microsoft has silently "mitigated" a high-severity Windows LNK vulnerability exploited by multiple state-backed and cybercrime hacking groups in zero-day attacks.

Tracked as CVE-2025-9491, this security flaw allows attackers to hide malicious commands within Windows LNK files, which can be used to deploy malware and gain persistence on compromised devices. However, the attacks require user interaction to succeed, as they involve tricking potential victims into opening malicious Windows Shell Link (.lnk) files. Thus some element of social engineering, and user technically naive and gullibility such as thinking Windows is secure is required.

As Trend Micro threat analysts discovered in March 2025, the CVE-2025-9491 was already being widely exploited by 11 state-sponsored groups and cybercrime gangs, including Evil Corp, Bitter, APT37, APT43 (also known as Kimsuky), Mustang Panda, SideWinder, RedHotel, Konni, and others.

Microsoft told BleepingComputer in March that it would "consider addressing" this zero-day flaw, even though it didn't "meet the bar for immediate servicing."

ACROS Security CEO and 0patch co-founder Mitja Kolsek found, Microsoft has silently changed LNK files in the November updates in an apparent effort to mitigate the CVE-2025-9491 flaw. After installing last month's updates, users can now see all characters in the Target field when opening the Properties of LNK files, not just the first 260.

A Microsoft spokesperson was not immediately available for comment when contacted by BleepingComputer earlier today to confirm if this change is an attempt to mitigate the vulnerability. As the movie the Ninth Gate stated: "silentium est aurum"

Submission + - Meta buried 'causal' evidence of social media harm (reuters.com)

joshuark writes: In a 2020 research project code-named “Project Mercury,” Meta scientists worked with survey firm Nielsen to gauge the effect of “deactivating” Facebook, according to Meta documents obtained via discovery. To the company’s disappointment, “people who stopped using Facebook for a week reported lower feelings of depression, anxiety, loneliness and social comparison,” internal documents said.

Rather than publishing those findings or pursuing additional research, the filing states, Meta called off further work and internally declared that the negative study findings were tainted by the “existing media narrative” around the company. Despite Meta’s own work documenting a causal link between its products and negative mental health effects, the filing alleges, Meta told Congress that it had no ability to quantify whether its products were harmful to teenage girls.

The allegation of Meta burying evidence of social media harms is just one of many in a filing by Motley Rice, a law firm suing Meta. Broadly, the plaintiffs argue the companies have intentionally hidden the internally recognized risks of their products from users, parents and teachers.

Meta spokesman Andy Stone said the study was stopped because its methodology was flawed and that it worked diligently to improve the safety of its products. “The full record will show that for over a decade, we have listened to parents, researched issues that matter most, and made real changes to protect teens,” he said.

"We strongly disagree with these allegations, which rely on cherry-picked quotes and misinformed opinions,” Stone said.
The underlying Meta documents cited in the filing are not public, and Meta has filed a motion to strike the documents. Stone said the objection was to the over-broad nature of what plaintiffs are seeking to unseal, not unsealing in its entirety.
A hearing regarding the filing is set for January 26 in Northern California District Court.

Submission + - Meta wants to get into the electricity trading business (yahoo.com)

joshuark writes: Meta is looking to get into the business of trading electricity to accelerate the construction of new power plants needed to provide energy for its data centers.

Meta are asking for federal approval to trade power. According to Meta, this will allow it to make long-term commitments to buy electricity from new plants, while mitigating the risk by having the ability to resell some of that power on wholesale power markets.

Meta’s head of global energy, Urvi Parekh, states that power plant developers “want to know that the consumers of power are willing to put skin in the game.” “Without Meta taking a more active voice in the need to expand the amount of power that’s on the system, it’s not happening as quickly as we would like,” Parekh said.

Two Stupid Dogs captured the moment in the 1990s: https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3F...

Comment C. Montgomery Burns... (Score 1) 117

C. Montgomery Burns tried this idea...

https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3F...

And I agree with Waylon Smithers, "Owls will deafen us with incessant hooting..." Woodsy the Owl will become our greatest nemesis...

https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3F... the new "dirty bird" without the sun. The new golden age, of darkness looms overhead...

JoshK.

Slashdot Top Deals

Vital papers will demonstrate their vitality by spontaneously moving from where you left them to where you can't find them.

Working...