u/Silly-Commission-630

Image 1 — This is my first moss pole. I added sphagnum moss how should I continue caring for it? There are still no aerial roots. Is it supposed to encourage the plant to root more?
Image 2 — This is my first moss pole. I added sphagnum moss how should I continue caring for it? There are still no aerial roots. Is it supposed to encourage the plant to root more?

This is my first moss pole. I added sphagnum moss how should I continue caring for it? There are still no aerial roots. Is it supposed to encourage the plant to root more?

u/Silly-Commission-630 — 11 hours ago

On one hand, it has lots of flowers, but there are spots on the leaves. Is it better to prune them? What causes this?

UK government renews push for Cyber Resilience Pledge amid rising AI cyber threats

The UK government is urging organizations to adopt a new Cyber Resilience Pledge focused on three core requirements: making cybersecurity a board-level issue, joining the Early Warning Service, and enforcing Cyber Essentials across supply chains.

The move comes as the UK reports major growth in its cyber sector while also warning that AI-powered attacks are evolving faster than traditional defenses.

Officials also highlighted the importance of memory-safe languages like and broader AI-driven security capabilities as part of future resilience strategies.

r/SECITHUBCOMMUNITY Cyber incidents and data breach news explained with context and impact. Share your insights.

reddit.com
u/Silly-Commission-630 — 3 days ago

macOS mistakenly flags ChatGPT as malware, moves app to Trash

Multiple users reported that Apple’s security protections suddenly began identifying the desktop app as potential malware, automatically moving it to the Trash and displaying warnings that it could damage their computers.

The issue appears linked to a third-party dependency or revoked software certificate potentially associated with suspicious activity tied to North Korean threat actors.

The incident highlights a growing software supply chain problem, modern applications rely on countless external components, and a single compromised dependency can trigger large-scale trust failures across legitimate software ecosystems.

r/SECITHUBCOMMUNITY Cyber incidents and data breach news explained with context and impact. Share your insights.

u/Silly-Commission-630 — 3 days ago

Your Employees’ Home Networks Are Part of Your Security Perimeter

With more employees working remotely, the home network has quietly become part of the corporate attack surface.

A compromised home router doesn’t just affect personal devices anymore. It can expose work laptops, authentication sessions, internal communications, cloud access, and sensitive business data.

We spend a lot of time discussing endpoint security, identity protection, and cloud security but sometimes the weakest point is still the network people connect from every single day.

Here’s a short practical checklist for everyone:

Apologies if I missed something important. Would genuinely love to hear additional recommendations or practical hardening tips from others here.

• Replace outdated routers that no longer receive security updates

• Update router firmware regularly

• Change default admin usernames and passwords

• Use strong Wi-Fi passwords with WPA2/WPA3 encryption

• Disable remote management unless absolutely necessary

• Reboot the router periodically

• Review connected devices and remove unknown ones

• Separate IoT/smart-home devices into a guest network if possible

• Disable unnecessary services like WPS or unused port forwarding

• Use a VPN when accessing sensitive organizational resources remotely

The router sits in one of the most privileged positions in any network. Every connection passes through it.

r/SECITHUBCOMMUNITY Cyber incidents and data breach news explained with context and impact. Share your insights.

u/Silly-Commission-630 — 4 days ago

Malicious OpenClaw Skill Abused to Deliver Remcos RAT and GhostLoader

A malicious OpenClaw “DeepSeek-Claw” skill was used to exploit agentic AI workflows and deliver malware through manipulated installation instructions.

The attack targeted developers and AI agents by disguising itself as a legitimate OpenClaw integration. On Windows, it triggered a remote MSI installer that deployed Remcos RAT using DLL sideloading through a trusted GoToMeeting executable. On macOS and Linux, an alternate path delivered GhostLoader through an obfuscated Node.js payload.

The impact is serious, Remcos enables remote access, keylogging, clipboard capture, cookie theft, and interactive command execution. GhostLoader focuses on developer environments, stealing sensitive data such as SSH keys, cloud API tokens, crypto wallets, and keychain data.

r/SECITHUBCOMMUNITY

Cyber incidents and data breach news explained with context and impact.

Share your insights.

u/Silly-Commission-630 — 4 days ago

ENISA expands Europe’s role in the global CVE vulnerability ecosystem

ENISA announced four new CVE Numbering Authorities (CNAs) under its root structure, expanding Europe’s operational role in global vulnerability management.

The move strengthens Europe’s ability to coordinate vulnerability disclosure, CVE assignments and incident response as AI dramatically accelerates vulnerability discovery and exploitation.

ENISA warned that frontier AI models are compressing the entire attack lifecycle from discovery to weaponization forcing governments and defenders to scale vulnerability management faster than ever.

r/SECITHUBCOMMUNITYCyber incidents and data breach news explained with context and impact.Share your insights

u/Silly-Commission-630 — 5 days ago

OpenAI faces product liability lawsuit over alleged ChatGPT psychological harm

OpenAI and CEO are facing a product liability lawsuit filed in California, alleging that ChatGPT caused severe psychological harm during prolonged use in 2025.

The complaint includes allegations of design defects, failure to warn, negligence, and emotional distress. It also claims the plaintiff sent multiple crisis notifications to the company without response.

The case is part of a growing wave of legal scrutiny around frontier AI systems and their behavioral impact on vulnerable users.

r/SECITHUBCOMMUNITY Cyber incidents and data breach news explained with context and impact. Share your insights.

u/Silly-Commission-630 — 5 days ago

ShinyHunters attack disrupts thousands of universities and schools worldwide

claimed responsibility for a cyberattack targeting ’s Canvas platform, impacting an estimated 9,000 schools and universities across the US, Canada and Australia.

Students reported ransom notes appearing during final exams, while multiple universities were forced to postpone exams, disable systems or temporarily shut down access to coursework platforms. The attackers threatened to leak stolen data unless ransom payments were made in Bitcoin.

r/SECITHUBCOMMUNITY Cyber incidents and data breach news explained with context and impact. Share your insights.

u/Silly-Commission-630 — 5 days ago

This isn't about cybersecurity, but I think it could impact all industries if it develops into another outbreak we fail to manage properly. The WHO (world health org) says not to panic because the virus has low exposure risk. But we now see it’s gone from animal-to-human transmission to human-to-human. Currently 8 cases, 5 confirmed, 3 deaths. In my view, we should take it seriously and learn from past mistakes before we’re sent home again.

According to "WHO" and recent reports, the Andes hantavirus strain rare for human-to-human transmissionwas confirmed on the MV Hondius cruise ship. "WHO" still assesses general risk as low, but close contact environments saw spread. With no specific treatment, rapid isolation and awareness matter. What do you think is likely to happen from this situation? Share your thoughts!

r/SECITHUBCOMMUNITY Cyber incidents and data breach news explained with context and impact. Share your insights.

u/Silly-Commission-630 — 7 days ago

An investigation by The Guardian and partner outlets claims that Russia’s Bauman Moscow State Technical University operates a secret cyber training pipeline tied directly to Russian intelligence-linked cyber units.

According to the leaked files, students were trained in penetration testing, malware development, disinformation campaigns, surveillance techniques and psychological manipulation before being assigned to units linked to operations such as Fancy Bear and Sandworm.

This wasn’t described as isolated hacker recruitment but as a structured long-term talent pipeline blending academia, cyber operations and state intelligence objectives.

r/SECITHUBCOMMUNITY Cyber incidents and data breach news explained with context and impact. Share your insights.

u/Silly-Commission-630 — 7 days ago
▲ 3 r/secithubcommunity+1 crossposts

As AI adoption keeps growing, many organizations are facing a new challenge...employees uploading internal files, source code, contracts, customer data, or sensitive documents into personal AI tools

How is your organization dealing with this risk?

Are you blocking AI tools completely? Using DLP or CASB solutions? Monitoring uploads and prompts? Providing approved enterprise AI alternatives? Relying mostly on policies and employee awareness?

Would be interesting to hear what’s actually working in real production environments today especially from security, compliance, and IT teams.

r/SECITHUBCOMMUNITY Cyber incidents and data breach news explained with context and impact. Share your insights.

u/Silly-Commission-630 — 7 days ago

Researchers from Dragos revealed that attackers used Anthropic’s Claude and GPT models during an intrusion targeting a Mexican water utility and other government organizations. According to the report, Claude generated offensive tooling, guided reconnaissance, identified a SCADA/IIoT management interface on its own, and even recommended password-spraying techniques against the OT-adjacent system. The attack ultimately failed to access control systems but the real story is different: AI is now helping low-to-mid tier attackers discover and prioritize industrial targets they may not have recognized themselves.

r/SECITHUBCOMMUNITY Cyber incidents and data breach news explained with context and impact. Share your insights.

u/Silly-Commission-630 — 7 days ago

National Institute of Standards and Technology announced it will conduct pre-deployment security evaluations of frontier AI models from Google, Microsoft and xAI to assess potential cybersecurity and national security risks before release.

The move comes after concerns around advanced AI capabilities escalated following Anthropic’s decision not to publicly release Claude Mythos due to its ability to discover dangerous software vulnerabilities.

r/SECITHUBCOMMUNITY Cyber incidents and data breach news explained with context and impact. Share your insights.

u/Silly-Commission-630 — 7 days ago

New research from Optus found that only 40% of Australian small businesses prioritize cybersecurity, despite 1 in 3 already experiencing a cyber incident. Phishing and email scams remain the top attack vector, while reused passwords and weak password hygiene continue to expose businesses to preventable compromise. Alarmingly, 79% of sole traders still have no cyber response plan. At the same time, Office of the Australian Information Commissioner is increasing compliance scrutiny across high-risk sectors.

r/SECITHUBCOMMUNITY
Cyber incidents and data breach news explained with context and impact.
Share your insights.

u/Silly-Commission-630 — 7 days ago
▲ 5 r/secithubcommunity+1 crossposts

Security isn’t failing because attackers are better.
It’s failing because organizations can’t move fast enough.

Everyone is talking about the coming “patch wave” driven by AI. But that’s not the real issue.

AI is accelerating vulnerability discovery vendors are finding bugs faster, releasing patches faster, and exposing years of technical debt almost overnight . The problem is that most organizations can’t even keep up with today’s patch cycles. Now imagine compressing that timeline from weeks… to days. This isn’t a vulnerability problem it’s an operational failure at scale.

Legacy systems won’t get patched.
Teams don’t have full visibility.
Ownership is fragmented.
And in many cases nobody really knows what’s exposed.

We’ve spent years focusing on detection and response. But the reality is shifting!
The gap between “vulnerability discovered” and “patch applied” is becoming the most dangerous window in cybersecurity. AI is about to make that window smaller faster than most organizations can adapt.

r/SECITHUBCOMMUNITY
Cyber incidents and data breach news explained with context and impact.
Share your insights.

u/Silly-Commission-630 — 9 days ago

The UK’s NCSC is warning organizations to prepare for a massive influx of software patches as AI accelerates vulnerability discovery.

Security teams are being told to expect a “patch wave” a surge of newly identified vulnerabilities as vendors use advanced AI tools to scan and fix code at scale .

The concern is simple 'the same AI capabilities that help vendors find bugs can also enable attackers to discover and exploit them faster. This creates a compressed timeline where organizations must patch quickly or risk exposure. Recommendations focus on prioritizing external attack surfaces first, enabling automatic updates where possible, and adopting risk-based patching strategies. But there’s a deeper issue legacy systems and technical debt may not be patchable at all, forcing organizations to replace or isolate vulnerable infrastructure. There’s also growing pressure to reduce patch timelines dramatically, with discussions around cutting remediation windows from weeks to just days.

r/SECITHUBCOMMUNITY
Cyber incidents and data breach news explained with context and impact.
Share your insights.

u/Silly-Commission-630 — 9 days ago

Instructure, the company behind the Canvas LMS platform, confirmed a cybersecurity incident exposing user data across its systems, impacting schools and universities worldwide.

The company states the breach is contained and has already taken action revoking tokens, rotating keys, patching systems, and increasing monitoring. Exposed data appears to include names, emails, student IDs, and user messages, with no current evidence of passwords or financial data being compromised.

However, the story escalates with claims from the ShinyHunters group, which says it accessed data tied to up to 275 million individuals across nearly 9,000 schools. The group has added Instructure to its leak site and issued an extortion deadline, threatening to publish the data. The risk here isn’t just PII exposure it’s the scale and sensitivity of communication data, including interactions between students and teachers, which raises serious privacy concerns, especially for minors. This highlights a growing pattern: centralized platforms holding massive user datasets are becoming prime extortion targets where breach impact goes far beyond technical damage.

r/SECITHUBCOMMUNITY
Cyber incidents and data breach news explained with context and impact.
Share your insights.

u/Silly-Commission-630 — 9 days ago

Cisco is moving to acquire Astrix Security in a strategic push to secure the rapidly expanding attack surface created by AI agents, API keys, and service accounts.

The focus is clear: as organizations adopt AI at scale, non-human identities (NHIs) are becoming a major security gap. API keys, OAuth tokens, and service accounts now heavily used by AI agents are increasingly difficult to track, govern, and secure. Cisco plans to integrate Astrix’s capabilities into its security platform to provide visibility, governance, lifecycle management, and real-time threat detection for these identities . The urgency is real only 24% of organizations can properly control AI agent actions, and just 31% feel capable of securing agent-based systems today . This move reinforces a growing shift in cybersecurity:
The attack surface is no longer just users it’s machines acting on behalf of users

Cisco’s strategy is to extend Zero Trust into this new layer what it calls the “agentic workforce” bringing identity, behavior, and context into a unified security model.

r/SECITHUBCOMMUNITY
Cyber incidents and data breach news explained with context and impact.
Share your insights.

u/Silly-Commission-630 — 9 days ago

The ShinyHunters group is back this time targeting Instructure, the company behind the widely used Canvas LMS platform across schools and universities.

According to reports, attackers claim to have breached Instructure’s infrastructure, potentially impacting around 9,000 schools and exposing data linked to up to 275 million users, including students, teachers, and staff.

The exposed data reportedly includes personal information such as names, emails, and student IDs but more concerning is the alleged leak of private communications between students and teachers, raising serious privacy and safety concerns, especially for minors.

Instructure has acknowledged the incident and confirmed that sensitive data was accessed, though the full scope is still under investigation.

This follows a pattern: ShinyHunters has been repeatedly linked to large-scale breaches, including previous campaigns involving hundreds of organizations and massive data exfiltration.

r/SECITHUBCOMMUNITY

Cyber incidents and data breach news explained with context and impact.

Share your insights.

u/Silly-Commission-630 — 10 days ago