Feed aggregator
CISA Releases Guidance on Credential Risks Associated with Potential Legacy Oracle Cloud Compromise
CISA is aware of public reporting regarding potential unauthorized access to a legacy Oracle cloud environment. While the scope and impact remains unconfirmed, the nature of the reported activity presents potential risk to organizations and individuals, particularly where credential material may be exposed, reused across separate, unaffiliated systems, or embedded (i.e., hardcoded into scripts, applications, infrastructure templates, or automation tools). When credential material is embedded, it is difficult to discover and can enable long-term unauthorized access if exposed.
The compromise of credential material, including usernames, emails, passwords, authentication tokens, and encryption keys, can pose significant risk to enterprise environments. Threat actors routinely harvest and weaponize such credentials to:
- Escalate privileges and move laterally within networks.
- Access cloud and identity management systems.
- Conduct phishing, credential-based, or business email compromise (BEC) campaigns.
- Resell or exchange access to stolen credentials on criminal marketplaces.
- Enrich stolen data with prior breach information for resale and/or targeted intrusion.
CISA recommends the following actions to reduce the risks associated with potential credential compromise:
- For Organizations:
- Reset passwords for any known affected users across enterprise services, particularly where local credentials may not be federated through enterprise identity solutions.
- Review source code, infrastructure-as-code templates, automation scripts, and configuration files for hardcoded or embedded credentials and replace them with secure authentication methods supported by centralized secret management.
- Monitor authentication logs for anomalous activity, especially involving privileged, service, or federated identity accounts, and assess whether additional credentials (such as API keys and shared accounts) may be associated with any known impacted identities.
- Enforce phishing-resistant multi-factor authentication (MFA) for all user and administrator accounts wherever technically feasible.
- For additional information for or on Cloud security best practices please review the following Cybersecurity Information Sheets: CISA and NSA Release Cybersecurity Information Sheets on Cloud Security Best Practices.
- For Users:
- Immediately update any potentially affected passwords that may have been reused across other platforms or services.
- Use strong, unique passwords for each account and enable phishing-resistant multifactor authentication (MFA) on services and applications that support it. For more information on using strong passwords, see CISA’s Use Strong Passwords web page. For more information on phishing-resistant MFA see CISA’s Implementing Phishing-Resistant MFA Fact Sheet.
- Remain alert against phishing attempts (e.g., referencing login issues, password resets, or suspicious activity notifications) and reference Phishing Guidance: Stopping the Attack Cycle at Phase One.
Organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at Report@cisa.gov or (888) 282-0870.
Disclaimer:
The information in this report is being provided “as is” for informational purposes only. CISA does not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA.
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.
- CVE-2021-20035 SonicWall SMA100 Appliances OS Command Injection Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
Enhanced Version of ‘BPFDoor’ Linux Backdoor Seen in the Wild
In recent attacks, the state-sponsored backdoor BPFDoor is using a controller to open a reverse shell and move laterally.
The post Enhanced Version of ‘BPFDoor’ Linux Backdoor Seen in the Wild appeared first on SecurityWeek.
Lyft to buy taxi app Free Now for $200M to expand into Europe
Article URL: https://www.cnbc.com/2025/04/16/lyft-to-buy-taxi-app-free-now-for-200-million-to-expand-into-europe.html
Comments URL: https://news.ycombinator.com/item?id=43704228
Points: 1
# Comments: 0
Show HN: Stuffed-Na(a)N, a library for stuffing your NaNs
Article URL: https://github.com/si14/stuffed-naan-js
Comments URL: https://news.ycombinator.com/item?id=43704224
Points: 1
# Comments: 0
Lyft to enter European market with $200M FreeNow acquisition
Article URL: https://www.reuters.com/markets/deals/lyft-enter-european-market-with-200-million-freenow-acquisition-2025-04-16/
Comments URL: https://news.ycombinator.com/item?id=43704220
Points: 1
# Comments: 0
Microsoft BitNet 1.58bit LLM 2B4T released
Article URL: https://huggingface.co/microsoft/bitnet-b1.58-2B-4T
Comments URL: https://news.ycombinator.com/item?id=43704219
Points: 1
# Comments: 0
Show HN: My Prompt Rulebook – Copy-Paste Instructions (GPT/Claude etc.)
Article URL: https://www.promptquick.ai/
Comments URL: https://news.ycombinator.com/item?id=43704215
Points: 1
# Comments: 0
How to Optimize Cursor?
What is the best model, i haven't kept up much with the gemini-2.5 and claude 3.7 going bonkers drama, i have sticked with 3.5 sonnet as i only make it do tedious tasks, but i'd like it if was just a tad bit smarter.
Comments URL: https://news.ycombinator.com/item?id=43704194
Points: 1
# Comments: 1
2ch Chronicle
Article URL: https://en.wikibooks.org/wiki/2ch_Chronicle
Comments URL: https://news.ycombinator.com/item?id=43704191
Points: 1
# Comments: 0
What would Darwin say about AI Agents?
Article URL: https://blog.costa.security/what-would-darwin-say-about-ai-agents-e35b343706ef
Comments URL: https://news.ycombinator.com/item?id=43704162
Points: 1
# Comments: 0
Server Side Includes
Article URL: https://en.wikipedia.org/wiki/Server_Side_Includes
Comments URL: https://news.ycombinator.com/item?id=43704144
Points: 1
# Comments: 0
TeapotLLM- an open-source <1B model for hallucination-resistant Q&A on a CPU
Article URL: https://huggingface.co/teapotai/teapotllm
Comments URL: https://news.ycombinator.com/item?id=43704135
Points: 1
# Comments: 0
The Ciris Framework
Article URL: https://www.ethicsengine.org/ciris
Comments URL: https://news.ycombinator.com/item?id=43704124
Points: 1
# Comments: 1
Lyft to enter European market with $200M FreeNow acquisition
Article URL: https://finance.yahoo.com/news/lyft-enter-european-market-200-113633358.html
Comments URL: https://news.ycombinator.com/item?id=43704122
Points: 2
# Comments: 0
Using bitmaps to perform range queries
Article URL: https://www.featurebase.com/blog/featurebase.com/blog/range-encoded-bitmaps
Comments URL: https://news.ycombinator.com/item?id=43704119
Points: 1
# Comments: 0
We built our entire AI App Builder on Cloudflare stack, and it's awesome
Hey everyone, the founder of Fine.dev here.
I wanted to share my experience from switching our cloud provider to CloudFlare. A bit about us:
Last week launched our platform: An all-in-one AI that turns a single prompt into a production-ready app.
Every project our users build comes with auth, database, file storage, LLM integration, and hosting, all working out of the box.
It feels like magic but it's very real - and a lot of it is thanks to Cloudflare.
Our dream with Fine was that anyone, literally anyone, will be able to build and launch something useful. Without wrestling with infrastructure. Without stitching together 10 different services. Without spending weeks before seeing something live.
Cloudflare made that dream feel possible! It is global by default and fast by default. The Infra just "disappears" behind the product. This allowed us to focus all of our energy on our users' experience.
I mentioned the features before because each one of them relies entirely on Cloudflare's powerful stack: → D1 as the database → Workers for backend logic → R2 for file storage → AI Gateway for model routing
We are already having users testing this and the responses have been… incredible.
We’ve seen people ship AI agents, micro-SaaS apps, internal tools and personal productivity tools - everything that you can possibly imagine!
Despite all these different use cases, working with the infrastructure was smooth as butter. Really, one of the best infra experiences I had.
It’s been a joy building this.
A huge shoutout to CF team - we couldn’t have done it without the foundation you’ve built.
Dan
Comments URL: https://news.ycombinator.com/item?id=43704115
Points: 3
# Comments: 0
FBI Denver Warns of Online File Converter Scam
Article URL: https://www.fbi.gov/contact-us/field-offices/denver/news/fbi-denver-warns-of-online-file-converter-scam
Comments URL: https://news.ycombinator.com/item?id=43704112
Points: 3
# Comments: 0
The Path to Open-Sourcing the DeepSeek Inference Engine
Article URL: https://github.com/deepseek-ai/open-infra-index/blob/main/OpenSourcing_DeepSeek_Inference_Engine/README.md
Comments URL: https://news.ycombinator.com/item?id=43704100
Points: 1
# Comments: 0
European Transparent IT Job Market Report 2024 [pdf]
Article URL: https://static.devitjobs.com/market-reports/European-Transparent-IT-Job-Market-Report-2024.pdf
Comments URL: https://news.ycombinator.com/item?id=43704098
Points: 1
# Comments: 0