> We looked at 50 leading AI companies and found that 65% had leaked verified secrets on GitHub. Think API keys, tokens, and sensitive credentials, often buried deep in deleted forks, gists, and developer repos most scanners never touch.
Have a fun Patch Tuesday, nerds. :heart_cyber:
Anyone have some FortiShit to test something on? https://x.com/DefusedCyber/status/1986544427121471513 > ⚠️Actor mass exploiting unknown Fortinet exploit (FortiWeb path traversal / API exploitation) from 107.152.41.19 πŸ‡ΊπŸ‡Έ ( TZULO ) > VirusTotal Detections 0/95 🟒 > After the exploit, the actor attempted to login using the newly created username-credential pair πŸ” #RUMINT #threatIntel image
IDK what GOG Galaxy is, but if you do, maybe go hack it or something.
These three perfect 10s seem bad if they're exposed anywhere. > Radiometrics VizAir is vulnerable to exposure of the system's REST API key through a publicly accessible configuration file. This allows attackers to remotely alter weather data and configurations, automate attacks against multiple instances, and extract sensitive meteorological data, which could potentially compromise airport operations. Additionally, attackers could flood the system with false alerts, leading to a denial-of-service condition and significant disruption to airport operations. Unauthorized remote control over aviation weather monitoring and data manipulation could result in incorrect flight planning and hazardous takeoff and landing conditions. https://www.cve.org/CVERecord?id=CVE-2025-54863 > Radiometrics VizAir is vulnerable to a lack of authentication mechanisms for critical functions, such as admin access and API requests. Attackers can modify configurations without authentication, potentially manipulating active runway settings and misleading air traffic control (ATC) and pilots. Additionally, manipulated meteorological data could mislead forecasters and ATC, causing inaccurate flight planning. https://www.cve.org/CVERecord?id=CVE-2025-61946 > Radiometrics VizAir is vulnerable to any remote attacker via access to the admin panel of the VizAir system without authentication. Once inside, the attacker can modify critical weather parameters such as wind shear alerts, inversion depth, and CAPE values, which are essential for accurate weather forecasting and flight safety. This unauthorized access could result in the disabling of vital alerts, causing hazardous conditions for aircraft, and manipulating runway assignments, which could result in mid-air conflicts or runway incursions. https://www.cve.org/CVERecord?id=CVE-2025-61945 cc: @npub17cvz...9jd4 @Mike Sheward @npub17sst...qqcz