{"id":34892,"date":"2025-11-09T16:03:43","date_gmt":"2025-11-10T00:03:43","guid":{"rendered":"https:\/\/www.podfeet.com\/blog\/?p=34892"},"modified":"2025-11-09T16:03:43","modified_gmt":"2025-11-10T00:03:43","slug":"sb-2025-11-09","status":"publish","type":"post","link":"https:\/\/www.podfeet.com\/blog\/2025\/11\/sb-2025-11-09\/","title":{"rendered":"Security Bits \u2014 9 November 2025"},"content":{"rendered":"<h2>Feedback &amp; Followups<\/h2>\n<aside class=\"small-aside\">Listener and community feedback, developments in recently covered stories, and developments in long-running stories we&#8217;re tracking over time.<\/aside>\n<ul>\n<li>More evidence of the dangers of Agentic Browsers: <a href=\"https:\/\/thehackernews.com\/2025\/10\/chatgpt-atlas-browser-can-be-tricked-by.html\">ChatGPT Atlas Browser Can Be Tricked by Fake URLs into Executing Hidden Commands \u2014 thehackernews.com\/\u2026<\/a>\n<ul>\n<li><strong>Related Article:<\/strong> <a href=\"https:\/\/tidbits.com\/2025\/11\/01\/be-cautious-with-agentic-web-browsers\/\">Be Cautious with Agentic Web Browsers \u2014 tidbits.com\/\u2026<\/a> (by Adam Engst)<\/li>\n<\/ul>\n<\/li>\n<li>\ud83c\uddea\ud83c\uddfa The EU&#8217;s latest misguided attempt to destroy End-to-End encryption is dead (again, for now): <a href=\"https:\/\/www.euractiv.com\/news\/danish-presidency-backs-away-from-chat-control\/\">Danish Presidency backs away from &#8216;chat control&#8217; \u2014 www.euractiv.com\/\u2026<\/a><\/li>\n<\/ul>\n<h2>Deep Dive \u2014 Apps Asking for Network Access?<\/h2>\n<p>I want to start with some important context for this entire discussion.<\/p>\n<p>When Apple launched the iPhone, it was initially completely locked down, with no apps at all, and even when it did add 3rd-party apps a year later, those apps were <strong>extremely<\/strong> locked down. Apps were trapped in individual sandboxes and could interact with just a few OS services, and there was no way for apps to interact with each other. Over time, Apple expanded the functionality available to apps, but they never released them from their sandbox. Instead, Apple provided proverbial gates to the available features that were protected by one or two locks:<\/p>\n<ol>\n<li>App Entitlements granted by Apple during App Store Review<\/li>\n<li>User permission prompts<\/li>\n<\/ol>\n<p>Apple&#8217;s original focus was on just app entitlements \u2014 if you wrote an app and you wanted to access the user&#8217;s contacts, you requested that entitlement in your app store submission, providing a justification for the entitlement. Apple&#8217;s reviewers would then judge whether that was a reasonable thing for your app to do. And then grant your app the entitlement if they deem it appropriate. Your app could then just read users&#8217; contacts.<\/p>\n<p>These simple app entitlements succeeded in stopping egregious abuses, like flashlight apps hoovering up all your contacts and selling them, but they provide no visibility to us users, let alone control!<\/p>\n<p>Entitlements have not gone away; they are still a big part of an app submission, but a lot of entitlements no longer grant apps direct permissions, but instead grant permission to ask the user for access via an ever-growing collection of standard OS prompts.<\/p>\n<p>Flashlight apps that ask for the contacts entitlement still get stopped before even going live on the app store via the entitlements process, but even apps that do get the contacts don&#8217;t actually get that access until the user approves it.<\/p>\n<p>Over time, Apple has been delegating more and more control to users, even adding fine-grained options like granting access to just some photos or to different levels of precision for location access.<\/p>\n<p>Meanwhile, the Mac app started off with completely unsandboxed apps, basically free to do whatever they wished. When Apple added the Mac App Store, they also added optional app sandboxing to the Mac using the same entitlements model pioneered on the iPhone. Over time, app sandboxing went from optional to suggested to all but mandatory, and the number of entitlements switching from direct access to permission to ask for access grew to align ever more closely with iOS\/iPad OS. Today, Mac apps have more entitlements available to them, but every app that just runs (without the user needing to open the settings app to add an exception) is sandboxed, and the Mac now shares many of the same permission prompts users see on their iPhones and iPads.<\/p>\n<h3>The LAN Permission<\/h3>\n<p>As of iOS\/iPadOS 14, the entitlement apps need to access devices on your local network (LAN) has joined the ever-growing lists of indirect entitlements, i.e., permission to ask for permission rather than direct permission.<\/p>\n<p>Here&#8217;s an example from <a href=\"https:\/\/support.apple.com\/en-ie\/102229\">Apple&#8217;s iOS support article<\/a> about these prompts:<\/p>\n<figure style=\"float: center; margin: 10px\"><img decoding=\"async\" src=\"https:\/\/www.podfeet.com\/blog\/wp-content\/uploads\/2025\/11\/Security-Bits-%E2%80%94-2025-11-09-%E2%80%94-iOS-Network-Access-Prompt.png\" alt=\"A screenshot showing the iOs prompt which clearly names the app requesting the permission and shows a description of why the permission is needed below the title\"  title=\"Security Bits \u2014 2025-11-09 \u2014 iOS Network Access Prompt.png\" width=\"350 \" height=\"500\"><figcaption style=\"text-align:center\">iOS Permissions Request with App Name and Why<\/figcaption><\/figure>\n<p>Apple added the same prompt to the Mac in macOS Sequoia, though <a href=\"https:\/\/support.apple.com\/en-ie\/guide\/mac-help\/mchla4f49138\/mac\">the support article<\/a> is much sparser. I can only assume it works the same way (as is the norm these days).<\/p>\n<p>This request causes confusion, especially from people who are technically savvy but not developers or networking specialists. In other words, it confuses many NosillaCastaways! My theory is that when you understand enough about how the internet works to realise that every app connecting to the internet must be making use of your LAN to get to and from the internet, you assume that means the apps must have access to the LAN anyway. But that&#8217;s a false assumption.<\/p>\n<p>Developers familiar with the networking APIs provided to apps by OSes, and network engineers familiar with how TCP\/IP network connections work under the hood, are not confused because they understand the difference between endpoints and transit points when it comes to network connections. Every network connection has two endpoints, but passes through arbitrarily many transit points. Network connections transiting through the LAN can&#8217;t access devices on the LAN because the packets are like people on a train between stations \u2014 they move across rails they can&#8217;t see and have no control over where they go or how they get there!<\/p>\n<p>When apps ask an OS to establish a network connection for them, they have to provide the desired remote endpoint (the local device is the other endpoint), and the OS is free to apply some rules before returning a connection object or an error object. That means Apple can provide two entirely different entitlements for internet connections and LAN connections, which is exactly what they do.<\/p>\n<p>These prompts are asking for more than just permission to connect to a specific endpoint on the LAN; they are asking for permission to scan the LAN for possible endpoints to connect to! This is vital from a usability perspective, because without the ability to probe the network and discover devices, users would need to provide local private IP addresses to connect to devices, and that&#8217;s utterly impractical \u2014 they change all the time thanks to DHCP, and what regular person would even know where to begin to find those addresses\u203d<\/p>\n<h3>How Do We Answer?<\/h3>\n<p>OK, so now we know what the prompts are and what they mean. How should we answer?<\/p>\n<p>As with every prompt, <em>that depends \u2026<\/em> \u2014 if there was a clear universal answer, there would be no prompt! Apple are asking because for some people in some situations, some apps should be given permission, and for other people in other situations, permission should be denied.<\/p>\n<p>Not very helpful, but it&#8217;s important to understand that you are being asked to make a judgment, and there is no universally correct answer; you actually need to stop and think. Sorry!<\/p>\n<p>We are being asked to trade off risks in exchange for functionality, so that&#8217;s the right structure for the remainder of this discussion.<\/p>\n<h3>Why Might I Want to Allow Access?<\/h3>\n<p>Firstly, Apple allows apps requesting this permission to describe why they need it in the smaller text on the permission prompt. The most important questions are always <em>&#8220;does that even make sense?&#8221;<\/em>, followed by <em>&#8220;do I actually want the functionality described?&#8221;<\/em>. If you can&#8217;t answer &#8220;<em>yes<\/em>&#8221; to the first, and at least <em>&#8220;maybe&#8221;<\/em> to the second, just say no!<\/p>\n<p>As Apple describes in their <a href=\"https:\/\/support.apple.com\/en-ie\/102229\">support document<\/a>, rejecting the permission is no big deal:<\/p>\n<blockquote><p>\n  If you don\u2019t want to allow access, or if it\u2019s not clear to you why the app needs access, you can tap <em>Don\u2019t Allow<\/em>. The app can still use the internet or interact with the local network using a system service, such as AirPrint, AirPlay, AirDrop or HomeKit.\n<\/p><\/blockquote>\n<p>Notice that Apple&#8217;s own LAN services are explicitly excluded, and that gives us a clue as to why we might want to grant this permission \u2014 third-party alternatives to those services <strong>do<\/strong> need this permission to discover and connect to other devices on your LAN!<\/p>\n<p>This is by no means an exhaustive list, but here are some legitimate uses for this permission:<\/p>\n<ul>\n<li>3rd-party AirPlay alternatives like:\n<ul>\n<li>Google&#8217;s <em>Chromecast<\/em><\/li>\n<li>Samsung&#8217;s <em>Smart View<\/em><\/li>\n<li>Networked speakers that don&#8217;t use AirPlay as their communication protocol<\/li>\n<li>Console game streaming protocols like <em>Xbox Console Streaming<\/em> or <em>PlayStation Remote Play<\/em><\/li>\n<\/ul>\n<\/li>\n<li>Accessing content on home media servers like <em>Plex<\/em> or <em>Emby<\/em><\/li>\n<li>Accessing IoT (Internet of Things) devices that connect to your LAN but don&#8217;t communicate over the HomeKit or Matter protocols.<\/li>\n<li>Accessing printers using protocols other than AirPrint<\/li>\n<li>Accessing files shared on the LAN from PCs or NAS devices<\/li>\n<li>Games with multi-player features that can work over the LAN<\/li>\n<li>Apps with support for remote control via hardware devices or companion apps like hardware clickers or smartphone companion apps for PowerPoint.<\/li>\n<\/ul>\n<p>I think Chromecast explains a lot of these requests, certainly on iOS, because streaming to smart TVs other than the AppleTV is definitely something a lot of apps like to support these days.<\/p>\n<h3>What are the Risks?<\/h3>\n<p>We have many reasons we may want to grant access. Why might we push back?<\/p>\n<p>In a word \u2014 <strong>privacy<\/strong>!<\/p>\n<p>The devices you choose to connect to your home network say a lot about you, so they can really help advertising companies expand their profiles of you. They could see you have HP printers, Dell laptops, Samsung TVs, a home weather station, a 3D printer, a smart fridge from Electrolux, and so on and so forth.<\/p>\n<h3>The Bottom Line<\/h3>\n<p>Don&#8217;t stress too much about this one. If you deny access, most apps will work fine, with the obvious exception of apps whose sole purpose is to be companions to LAN devices, of course. You can also change your mind at any time in the security and privacy section of the relevant settings app for your OS.<\/p>\n<p>The risks are small, so I don&#8217;t think you should lose too much sleep over these requests. If you trust the developer, it seems reasonable to trust their apps \ud83d\ude42<\/p>\n<p>Personally, when I&#8217;m not sure if the functionality will or will not be useful to me, I tend to just grant that access, especially if the app itself has earned my trust in some way (long-time user\/customer, reputable developer, recommended by someone I trust \u2026).<\/p>\n<h2>\u2757 Action Alerts<\/h2>\n<aside class=\"small-aside\">Calls to action, if any stories in this section are relevant to you, there is some action you should take.<\/aside>\n<ul>\n<li><a href=\"https:\/\/isc.sans.edu\/diary\/rss\/32448\">Apple Patches Everything, Again \u2014 isc.sans.edu\/\u2026<\/a>\n<ul>\n<li>The \uf8ffOS 26.1 updates are more than just bug fixes!<\/li>\n<li>Some Older OSes patched too: <a href=\"https:\/\/appleinsider.com\/articles\/25\/11\/05\/apple-releases-ios-1872-ipados-1872-updates\">Apple releases iOS 18.7.2, iPadOS 18.7.2 updates \u2014 appleinsider.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>\u26a0\ufe0f <strong>Twitter\/X Users:<\/strong> <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/x-re-enroll-2fa-security-keys-by-november-10-or-get-locked-out\/\">X: Re-enroll 2FA security keys by November 10 or get locked out \u2014 www.bleepingcomputer.com\/\u2026<\/a> (remove and re-add your passkeys!)<\/li>\n<li>\u26a0\ufe0f <strong>QNAP NAS Owners:<\/strong> <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/qnap-fixes-seven-nas-zero-day-vulnerabilities-exploited-at-pwn2own\/\">QNAP fixes seven NAS zero-day flaws exploited at Pwn2Own \u2014 www.bleepingcomputer.com\/\u2026<\/a><\/li>\n<li>\u26a0\ufe0f <strong>Windows 10 Users:<\/strong> next Tuesday will be the first Patch Tuesday you get left un-patched unless you activate an ESU (Extended Security Updates) license on your machine, even in Europe where this is free you <strong>must take action to enable further updates<\/strong>\n<ul>\n<li>An excellent explainer on what is needed and all available options \u2014 <a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/still-on-windows-10-enroll-in-free-extended-security-updates\/\">www.bleepingcomputer.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2>Worthy Warnings<\/h2>\n<aside class=\"small-aside\">Potentially relevant warnings from government organisations, public interest groups, or the security community.<\/aside>\n<ul>\n<li><a href=\"https:\/\/cyberinsider.com\/hibp-adds-2-billion-leaked-emails-from-credential-stuffing-dataset\/\">HIBP adds 2 billion leaked emails from credential stuffing dataset \u2014 cyberinsider.com\/\u2026<\/a>\n<ul>\n<li>These are username+password pairs gathered together by cyber criminals from various breaches, key loggers, and goodness knows what else that were discovered circulating online by security researchers<\/li>\n<li>A lot of this data appears to be old, so it may be a good time to refresh some of your older credentials!<\/li>\n<li>The full technical details of how Troy Hunt was able to process that much raw data: <a href=\"https:\/\/www.troyhunt.com\/2-billion-email-addresses-were-exposed-and-we-indexed-them-all-in-have-i-been-pwned\/\">2 Billion Email Addresses Were Exposed, and We Indexed Them All in Have I Been Pwned \u2014 www.troyhunt.com\/\u2026<\/a> (It&#8217;s really quite a challenge to process such colossal data sets!)<\/li>\n<\/ul>\n<\/li>\n<li><strong>Beware, ClickFix Techniques Continuing to Evolve:<\/strong> <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/clickfix-malware-attacks-evolve-with-multi-os-support-video-tutorials\/\">ClickFix malware attacks evolve with multi-OS support, video tutorials \u2014 www.bleepingcomputer.com\/\u2026<\/a>\n<ul>\n<li>Look at the screenshot \u2014 these are now very professional looking!<\/li>\n<li>Continuing to leverage the fact that CAPTCHAs have taught us all to do really weird things to see web pages<\/li>\n<li>Advice remains the same: <strong>never copy-and-paste anything from the web into anything unless you fully understand it<\/strong><\/li>\n<\/ul>\n<\/li>\n<li><strong>Beware a new Phishing Trick:<\/strong> <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/bidi-swap-the-bidirectional-text-trick-that-makes-fake-urls-look-real\/\">BiDi Swap: The bidirectional text trick that makes fake URLs look real \u2014 www.bleepingcomputer.com\/\u2026<\/a>\n<ul>\n<li>By causing the browser to work right-to-left in a weird way, it makes the path part of the URL look like the domain part, i.e., <code>https:\/\/hackersite.com\/google.com\/...` can look like<\/code>https:\/\/google.com\/hackersite.com&#8230;` \u2014 breaks Bart&#8217;s advice to always check the domain part of the URL!<\/li>\n<li>For this attack to work the URL <strong>must<\/strong> contain characters from a right-to-left script in it somewhere<\/li>\n<li>For now, all the major browsers are vulnerable, but expect the browser vendors to respond soon.<\/li>\n<li><strong>Lesson to Learn:<\/strong> treat any URL with <strong>any weird characters<\/strong> (not on a standard QWERTY\/AZERTY keyboard) as <strong>malicious<\/strong>, even if the domain part looks legitimate<\/li>\n<\/ul>\n<\/li>\n<li><strong>Beware LNK Files:<\/strong> <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/chinese-hackers-exploit-windows-zero-day-to-spy-on-european-diplomats\/\">Windows zero-day actively exploited to spy on European diplomats \u2014 www.bleepingcomputer.com\/\u2026<\/a>\n<ul>\n<li>This is a genuine zero-day, still no patch!<\/li>\n<li>There are no legitimate reasons to email someone an LNK (Windows Link) file, so threat every email that has one attached as malicious!<\/li>\n<\/ul>\n<\/li>\n<li>\u26a0\ufe0f <strong>World of Warships Blitz Players:<\/strong> <a href=\"https:\/\/cyberinsider.com\/world-of-warships-blitz-exposed-player-credentials-in-network-traffic\/\">World of Warships Blitz exposed player credentials in network traffic \u2014 cyberinsider.com\/\u2026<\/a>\n<ul>\n<li><em>&#8220;World of Warships Blitz players are advised to update their app to the latest version and reset their account credentials on the game, and also anywhere else they might be using the same username and password.&#8221;<\/em><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2>Notable News<\/h2>\n<ul>\n<li>\ud83c\uddec\ud83c\udde7 <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/uk-carriers-to-block-spoofed-phone-numbers-in-fraud-crackdown\/\">UK carriers to block spoofed phone numbers in fraud crackdown \u2014 www.bleepingcomputer.com\/\u2026<\/a>\n<ul>\n<li>No mention of specific technologies<\/li>\n<li>A lot of mention of close cooperation with the government and more tracking<\/li>\n<li>Remember that cellphones are not private and never have been \u2014 this is just the taste evolution of the same network on which wiretapping was literally invented!<\/li>\n<\/ul>\n<\/li>\n<li>There is an as-yet unpatched flaw in Chromium browsers that allows a single malicious webpage to crash your browser: <a href=\"https:\/\/cyberinsider.com\/new-brash-exploit-can-crash-chrome-based-browsers-in-seconds\/\">New \u2018Brash\u2019 Exploit Can Crash Chrome-Based Browsers in Seconds \u2014 cyberinsider.com\/\u2026<\/a>\n<ul>\n<li>There is no danger of code execution; this is <em>just<\/em> a potential annoyance<\/li>\n<li>In theory, it should be easy to fix (a function needs a rate-limit attached), so expect patches soon<\/li>\n<\/ul>\n<\/li>\n<li>The end of the insecure web is finally in sight with the rollout of two changes to Chrome:\n<ul>\n<li><a href=\"https:\/\/www.bleepingcomputer.com\/news\/google\/google-chrome-to-warn-users-before-opening-insecure-http-sites\/\">Google Chrome to warn users before opening insecure HTTP sites \u2014 www.bleepingcomputer.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/cyberinsider.com\/chrome-will-default-to-https-for-all-public-sites-starting-october-2026\/\">Chrome Will Default to HTTPS for All Public Sites Starting October 2026 \u2014 cyberinsider.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>The Swiss privacy-focused company Proton is creating an interesting alternative to HIBP: <a href=\"https:\/\/cyberinsider.com\/proton-launches-free-data-breach-observatory-to-track-dark-web-leaks\/\">Proton Launches Free Data Breach Observatory to Track Dark Web Leaks \u2014 cyberinsider.com\/\u2026<\/a>\n<ul>\n<li>HIBP uses breach notifications, both directly from companies and from security researchers, as its source<\/li>\n<li>This new observatory will proactively scan the dark web for leaked data<\/li>\n<li>This alternative view of the same problem will help us get a better handle on the number of data breaches successfully hushed up by victims, or executed so stealthily that the victims never even notice.<\/li>\n<\/ul>\n<\/li>\n<li>More Passkey support: <a href=\"https:\/\/cyberinsider.com\/microsoft-edge-adds-passkey-syncing-in-its-password-manager\/\">Microsoft Edge Adds Passkey Syncing in Its Password Manager \u2014 cyberinsider.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/whatsapp-adds-passwordless-chat-backups-on-ios-and-android\/\">WhatsApp adds passwordless chat backups on iOS and Android \u2014 www.bleepingcomputer.com\/\u2026<\/a> (Passkeys)<\/li>\n<li>The two sides of AI on display again:\n<ul>\n<li>\ud83d\ude20  <a href=\"https:\/\/cyberinsider.com\/promptflux-malware-uses-gemini-to-rewrite-and-hide-itself-in-real-time\/\">PromptFlux Malware Uses Gemini to Rewrite and Hide Itself in Real Time \u2014 cyberinsider.com\/\u2026<\/a> (makes things much more difficult for anti-virus\/end-point protection apps)<\/li>\n<li>\ud83d\ude00 <a href=\"https:\/\/thehackernews.com\/2025\/10\/googles-built-in-ai-defenses-on-android.html\">Google&#8217;s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month \u2014 thehackernews.com\/\u2026<\/a><\/li>\n<li>\ud83d\ude00 <a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-edge-gets-scareware-sensor-for-faster-scam-detection\/\">Microsoft Edge gets scareware sensor for faster scam detection \u2014 www.bleepingcomputer.com\/\u2026<\/a> (on-device AI acting as a sensor for immediate blocks and to update Defender&#8217;s block-lists for everyone)<\/li>\n<li>\ud83d\ude00 <a href=\"https:\/\/thehackernews.com\/2025\/10\/openai-unveils-aardvark-gpt-5-agent.html\">OpenAI Unveils Aardvark: GPT-5 Agent That Finds and Fixes Code Flaws Automatically \u2014 thehackernews.com\/\u2026<\/a><\/li>\n<li>\ud83d\ude00 <a href=\"https:\/\/thehackernews.com\/2025\/11\/googles-ai-big-sleep-finds-5-new.html\">Google&#8217;s AI &#8216;Big Sleep&#8217; Finds 5 New Vulnerabilities in Apple&#8217;s Safari WebKit \u2014 thehackernews.com\/\u2026<\/a> (patched now)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2>Palate Cleansers<\/h2>\n<aside class=\"small-aside\">Anything upbeat and nerdy Bart and\/or Allison think you might enjoy.<\/aside>\n<ul>\n<li><strong>From Bart:<\/strong>\n<ul>\n<li>\ud83c\uddec\ud83c\udde7 The nation that famously voted to name a state-of-the-art arctic exploration vessel <em>Boaty McBoatface<\/em> redeems itself \u2014 naming the nation&#8217;s newest leaf-clearing train (leaves on train lines cause major delays when they&#8217;re not cleared before being crushed to a banana-peel-like mush) <strong><em>ctrl Alt Deleaf<\/em><\/strong> \u2014 <a href=\"https:\/\/www.networkrailmediacentre.co.uk\/news\/network-rail-gears-up-for-autumn-as-ctrl-alt-deleaf-takes-to-the-tracks\">www.networkrailmediacentre.co.uk\/\u2026<\/a><\/li>\n<li>\ud83c\udfa7 The BBC&#8217;s excellent Lazarus Heist Podcast is back, in a new form:<\/li>\n<li>A special episode on North Korea&#8217;s biggest cybercrime success: <a href=\"https:\/\/overcast.fm\/+AAsmMMwW-54\">The Lazarus Heist Special: The biggest heist yet \u2014 overcast.fm\/\u2026<\/a><\/li>\n<li>The podcast is back for a third series with a new name and a new focus \u2014 from North Korean state-sponsored hackers, to Russia&#8217;s biggest cybercrime group: <a href=\"https:\/\/www.bbc.co.uk\/programmes\/w13xtvg9\/episodes\/downloads\">Cyber Hack Podcast \u2014 www.bbc.co.uk\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2>Legend<\/h2>\n<p>When the textual description of a link is part of the link, it is the title of the page being linked to, when the text describing a link is not part of the link, it is a description written by <a href=\"https:\/\/bartb.ie\/\">Bart<\/a>.<\/p>\n<table>\n<thead>\n<tr>\n<th align=\"center\">Emoji<\/th>\n<th align=\"left\">Meaning<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td align=\"center\">\ud83c\udfa7<\/td>\n<td align=\"left\">A link to <strong>audio content<\/strong>, probably a podcast.<\/td>\n<\/tr>\n<tr>\n<td align=\"center\">\u2757<\/td>\n<td align=\"left\">A <strong>call to action<\/strong>.<\/td>\n<\/tr>\n<tr>\n<td align=\"center\"><em>flag<\/em><\/td>\n<td align=\"left\">The story is particularly relevant to people living in a <strong>specific country<\/strong>, or, the organisation the story is about is affiliated with the government of a specific country.<\/td>\n<\/tr>\n<tr>\n<td align=\"center\">\ud83d\udcca<\/td>\n<td align=\"left\">A link to <strong>graphical content<\/strong>, probably a chart, graph, or diagram.<\/td>\n<\/tr>\n<tr>\n<td align=\"center\">\ud83e\uddef<\/td>\n<td align=\"left\">A story that has been <strong>over-hyped<\/strong> in the media, or, <em>&#8220;no need to light your hair on fire&#8221;<\/em> \ud83d\ude42<\/td>\n<\/tr>\n<tr>\n<td align=\"center\">\ud83d\udcb5<\/td>\n<td align=\"left\">A link to an article behind a <strong>paywall<\/strong>.<\/td>\n<\/tr>\n<tr>\n<td align=\"center\">\ud83d\udccc<\/td>\n<td align=\"left\">A <strong>pinned<\/strong> story, i.e. one to keep an eye on that&#8217;s likely to develop into something significant in the future.<\/td>\n<\/tr>\n<tr>\n<td align=\"center\">\ud83c\udfa9<\/td>\n<td align=\"left\">A <strong><em>tip of the hat<\/em><\/strong> to thank a member of the community for bringing the story to our attention.<\/td>\n<\/tr>\n<tr>\n<td align=\"center\">\ud83c\udfa6<\/td>\n<td align=\"left\">A link to <strong>video content<\/strong>.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Feedback &amp; Followups Listener and community feedback, developments in recently covered stories, and developments in long-running stories we&#8217;re tracking over time. More evidence of the dangers of Agentic Browsers: ChatGPT Atlas Browser Can Be Tricked by Fake URLs into Executing Hidden Commands \u2014 thehackernews.com\/\u2026 Related Article: Be Cautious with Agentic Web Browsers \u2014 tidbits.com\/\u2026 (by [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":28385,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[147,214],"tags":[7664,2650,7665,114,50,569],"class_list":["post-34892","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-posts","category-security-bits","tag-allow-devices-on-lan","tag-breach","tag-network-access","tag-privacy","tag-security","tag-security-bits"],"jetpack_featured_media_url":"https:\/\/www.podfeet.com\/blog\/wp-content\/uploads\/2023\/05\/Security-Bits-Logo_1040x520.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/34892","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/comments?post=34892"}],"version-history":[{"count":3,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/34892\/revisions"}],"predecessor-version":[{"id":34896,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/34892\/revisions\/34896"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/media\/28385"}],"wp:attachment":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/media?parent=34892"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/categories?post=34892"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/tags?post=34892"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}