By MaryOn November 7, 2025
11 ways to delete or hide yourself from the internet – and protect your privacy
Keeping a tight lid on the online data connected to you, your life, and your habits is becoming increasingly important — and difficult. A PC, mobile device, or even a smartwatch with an internet connection allows us to stay connected with friends and family, work, stay entertained, monitor our health and habits, and handle our finances. But benefits aside, how you represent yourself, and how others see you, on social media and other online platforms can …
By MaryOn November 7, 2025
11 ways to delete or hide yourself from the internet – and protect your privacy
Keeping a tight lid on the online data connected to you, your life, and your habits is becoming increasingly important — and difficult. A PC, mobile device, or even a smartwatch with an internet connection allows us to stay connected with friends and family, work, stay entertained, monitor our health and habits, and handle our finances. But benefits aside, how you represent yourself, and how others see you, on social media and other online platforms can have a real impact on your career prospects, reputation, and relationships.
How an Attacker Drained $128M from Balancer Through Rounding Error Exploitation
On November 3, 2025, Check Point Research’s blockchain monitoring systems detected a sophisticated exploit targeting Balancer V2’s ComposableStablePool contracts. The attacker exploited arithmetic precision loss in pool invariant calculations to drain $128.64 million across six blockchain networks in under 30 minutes. The attack leveraged a rounding error vulnerability in the _upscaleArray function that, when combined with carefully crafted batchSwap operations, allowed the attacker to artificially suppress BPT (Balancer Pool Token) prices and extract value through repeated arbitrage cycles. The exploitation occurred primarily during attacker smart contract deployment, with the constructor executing 65+ micro-swaps that compounded precision loss to devastating effect.
Consumer Financial Protection Bureau’s security falls apart amid layoffs
The infosec program run by the US’ Consumer Financial Protection Bureau (CFPB) “is not effective,” according to a fresh audit published by the Office of the Inspector General (OIG). A summary of the report, dated October 31 and published on Monday, stated that since the OIG’s previous audit, the CFPB’s overall cybersecurity posture has decreased from level-4 maturity, defined as “managed and measurable,” to level-2 maturity – “defined.” The two main factors adversely affecting the efficacy of its infosec management are sub-par maintenance of system authorizations and its failure to establish cybersecurity risk profiles.
List of AI Tools Promoted by Threat Actors in Underground Forums and Their Capabilities
The cybercrime landscape has undergone a dramatic transformation in 2025, with artificial intelligence emerging as a cornerstone technology for malicious actors operating in underground forums. According to Google’s Threat Intelligence Group (GTIG), the underground marketplace for illicit AI tools has matured significantly this year, with multiple offerings of multifunctional tools designed to support various stages of the attack lifecycle. This evolution has fundamentally altered the accessibility and sophistication of cybercrime, lowering barriers to entry for less technical threat actors while amplifying the capabilities of experienced criminals.
Vibe-coded ransomware proof-of-concept ended up on Microsoft’s marketplace
A suspicious Visual Studio Code extension with file-encrypting and data-stealing behavior successfully bypassed marketplace review and entered the developer ecosystem. In a suspected test effort, unknown actors have successfully embedded a strain of ransomware-style behavior, dubbed Ransomvibe, into extensions listed for Visual Studio Code. According to Secure Annex findings, the malicious code published to the VSCode extension marketplace was clearly vibe-coded, lacking any real sophistication.