Oracle databases, TNS, and how to hack it.

Oracle databases, TNS, and how to hack it.

The Oracle Transparent Network Substrate (TNS) server is a communication protocol that enables communication between Oracle databases and applications across networks. Initially introduced as part of the Oracle Net Services software suite, TNS supports diverse networking protocols, including IPX/SPX and TCP/IP protocol stacks, facilitating communication between Oracle databases and client applications. Its built-in encryption mechanism ensures the security of data transmitted. Over time, TNS has undergone updates to support newer technologies, including IPv6 and SSL/TLS encryption.
DARPA issues call to private sector, urging partners to assist in strengthening DoD’s cybersecurity.

DARPA issues call to private sector, urging partners to assist in strengthening DoD’s cybersecurity.

Defense Advanced Research Projects Agency (DARPA) has issued a significant call to the private sector, urging industry partners to assist in improving and strengthening cybersecurity for the Department of Defense (DoD). This initiative is part of a broader strategy to address escalating cyber threats targeting U.S. military and critical infrastructure systems.
Qilin ransomware-as-a-service (RaaS) adds a “call an attorney” feature to pressure victims to pay.

Qilin ransomware-as-a-service (RaaS) adds a “call an attorney” feature to pressure victims to pay.

The threat actors behind the Qilin ransomware-as-a-service (RaaS) scheme have recently introduced a “Call Lawyer” feature, offering legal counsel to their affiliates as a means to increase pressure on victims during ransom negotiations. This development is part of a broader strategy to make Qilin stand out in the cybercrime marketplace by providing a full suite of services to affiliates, including legal assistance, negotiation support, data storage, DDoS capabilities, and even media support.
How to hijack a television broadcast signal.

How to hijack a television broadcast signal.

Broadcast signal hijacking—also known as broadcast signal intrusion—is the unauthorized takeover of television (or radio) signals, allowing attackers to inject their own content into a broadcast. Over the years, several methods have been used to achieve this, ranging from physical tampering to sophisticated cyberattacks.
Iran’s state-owned TV broadcaster hacked to air calls for street protests.

Iran’s state-owned TV broadcaster hacked to air calls for street protests.

On Wednesday night, June 18, 2025, Iran’s state-owned television broadcaster was hacked, interrupting regular programming to air videos calling for street protests against the Iranian government. The broadcast was briefly hijacked, with footage showing women cutting their hair and messages urging citizens to “rise up” and “take control of your future”. The disruption was widely shared on social media and quickly drew both domestic and international attention.
You’ve been dragged through hell and emerged bruised and battered. Now how do you conduct an effective post-incident review?

You’ve been dragged through hell and emerged bruised and battered. Now how do you conduct an effective post-incident review?

When an incident occurs—whether it’s a security breach, a system outage, or a critical business disruption—the immediate priority is resolution. But once the dust settles, the real opportunity lies in learning from the event to strengthen your organization’s resilience. Conducting an effective post-incident review (PIR) is essential for continuous improvement, risk mitigation, and fostering a culture of transparency and trust.
Confirmed – FreeType zero-day (reported by Meta) was exploited in Paragon spyware attacks.

Confirmed – FreeType zero-day (reported by Meta) was exploited in Paragon spyware attacks.

SecurityWeek reported this week that WhatsApp, owned by Meta, confirmed its researchers had requested the CVE identifier CVE-2025-27363 after linking the flaw to an exploit used by Paragon, an Israeli surveillance solutions provider. The vulnerability, CVE-2025-27363, is an out-of-bounds write in the FreeType open-source library, which could allow for arbitrary code execution. This flaw was initially highlighted in a Meta advisory in mid-March 2025, warning that it may have been exploited in the wild.