I see some weird things but this takes the biscuit. A vulnerability in the Companies House website, that let anyone view the private dashboard of any one of the five million registered companies, see directors' personal details.
And modify them.
So many responses! Thanks y'all.
This is what I got from the replies:
Lego - the most popular option.
Real Bricks - bad(ish) idea.
Tech - well funded, great if I want to sell it.
Crypto always a option.
Sell a niche product under that name.
Cyber security is now a board-level agenda. The NCSC Annual Review 2025 warns of rising, severe threats & urges leaders to act. Resilience and a strong cyber culture are key. ncsc.gov.uk/files/ncsc-ann…#CyberSecurity
Discover the power of AI with Perplexity! 🚀 Try it for yourself and ask anything. no topic too big or small. Sign up with my link: pplx.ai/alphajuliet_
Not been in the car much for the last few days as I’m doing some training. Anyone know a way of turning off Tron mode but keeping the Tron lock sound? Love the sound 👍🏼😁
Cisco just confirmed that multiple zero-days against ASA/FTD VPN web services were exploited in the wild. CISA followed up with an Emergency Directive ordering federal agencies to inventory, patch, or disconnect affected devices.
The last 3 Cisco advisories are directly tied to this campaign:
- CVE-2025-20333 - RCE (CVSS 9.9)
- CVE-2025-20363 - RCE (CVSS 9.0)
- CVE-2025-20362 - Unauthorized access (CVSS 6.5)
Cisco’s own report details persistence in ROMMON on legacy ASA 5500-X devices without Secure Boot. Attacker activity includes malware implantation, command execution, log tampering, and even crashing devices to block forensics. Cisco links this to the ArcaneDoor threat actor they exposed in 2024.
Cisco advisory listing
sec.cloudapps.cisco.com/security/cente…
Cisco “Continued Attacks Against Cisco Firewalls”
sec.cloudapps.cisco.com/security/cente…
CISA Emergency Directive ED 25-03
cisa.gov/news-events/di…
Admins should treat this as active exploitation, not theoretical risk.