Latest Tweets

Latest Ransomware and Zero Day

The Big Feed

  • Last week the Register warned “If you’re running the Unix printing system CUPS, with cups-browsed present and enabled, you may be vulnerable to attacks that could lead to your computer being commandeered over the network or internet.” (Although the CEO of cybersecurity platform watchTowr told them “the vulnerability impacts less than a single-digit percentage of…

  • T-Mobile experienced three major data breaches in 2021, 2022, and 2023, according to CSO Online, “which impacted millions of its customers.” After a series of investigations by America’s Federal Communications Commission, T-Mobile agreed in court to a number of settlement conditions, including moving toward a “modern zero-trust architecture,” designating a Chief Information Security Office, implementing…

  • Iran warned Israel of possible attacks on energy facilities in the event of an attack on Iranian territory.

  • In their words: Permission to fight is given to those who are being fought because they have been wronged. Indeed, Allah is competent to give them victory.Hajj: 39

  • In the past, we revealed information about the Shahid Hemet group affiliated with the terrorist cyber corps. Until today, we exposed 7 terrorists of this group:– Mohammad Reza Rifatinejad– Hossein Rafiei– Mohammad Hossein MoradiAmir Hossein Hosseini– Mohammad Qazvinah– Manouchehr Akbari– Kamil Brothers SalmaniThis time we expose two more terrorists from this group– Hossein Kasai, the…

  • Zorin OS: The Perfect Linux Distro for Migrating From Windows – The New Stack

  • CVSS Meta Temp Score CVSS is a standardized scoring system to determine possibilities of attacks. The Temp Score considers temporal factors like disclosure, exploit and countermeasures. The unique Meta Score calculates the average score of different sources to provide a normalized scoring system. Current Exploit Price (≈) Our analysts are monitoring exploit markets and are…

  • CVSS Meta Temp Score CVSS is a standardized scoring system to determine possibilities of attacks. The Temp Score considers temporal factors like disclosure, exploit and countermeasures. The unique Meta Score calculates the average score of different sources to provide a normalized scoring system. Current Exploit Price (≈) Our analysts are monitoring exploit markets and are…

  • CVSS Meta Temp Score CVSS is a standardized scoring system to determine possibilities of attacks. The Temp Score considers temporal factors like disclosure, exploit and countermeasures. The unique Meta Score calculates the average score of different sources to provide a normalized scoring system. Current Exploit Price (≈) Our analysts are monitoring exploit markets and are…

  • CVSS Meta Temp Score CVSS is a standardized scoring system to determine possibilities of attacks. The Temp Score considers temporal factors like disclosure, exploit and countermeasures. The unique Meta Score calculates the average score of different sources to provide a normalized scoring system. Current Exploit Price (≈) Our analysts are monitoring exploit markets and are…

  • CVSS Meta Temp Score CVSS is a standardized scoring system to determine possibilities of attacks. The Temp Score considers temporal factors like disclosure, exploit and countermeasures. The unique Meta Score calculates the average score of different sources to provide a normalized scoring system. Current Exploit Price (≈) Our analysts are monitoring exploit markets and are…

  • Days after a hurricane struck America’s southeast, Florida’s state’s fire marshall “confirmed 16 lithium-ion battery fires related to storm surge,” according to local news reports. “Officials said six of those fires are associated with electric vehicles and they are working with fire departments statewide to gather more data.” (Earlier this year America’s federal transportation safety…

  • Introduction to Freelancer: In this write-up, we will explore the “Freelancer” machine from Hack the Box, categorized as a Hard difficulty challenge. This walkthrough will cover the reconnaissance, exploitation, and privilege escalation steps required to capture the flag. Objective: The goal of this walkthrough is to complete the “Freelancer” machine from Hack The Box by…

  • An invisible war surrounds us: cybercriminals versus the security of data and money. This battle has been a constant since the inception of the computer age, with cyber threats evolving in sophistication and scale.

  • When it comes to scalability, smart contract applications are the most advanced blockchain use case, they also use blockchain technology as their base. The benefit of such technology is the trust, safety, and integrity it provides, but as secure as they are, even the blockchain networks (more specific to smart contract networks) can be attacked.…

  • English Version, 中文版本 This is a series of research related to Kernel Streaming attack surface. It is recommended to read the following articles first. In the previous research on Proxying to Kernel, we discovered multiple vulnerabilities in Kernel Stearming as well as an overlooked bug Class. We successfully exploited vulnerabilities CVE-2024-35250 and CVE-2024-30084 to compromise…

  • Rubble in a central Israeli city in the aftermath of the Iranian missile attack, Tehran’s second-ever direct strike on its regional foe – Copyright AFP/File Rebecca DROKE

  • “Can you believe that we’ve been demanding user freedom since 1985?” asks a new blog post at FSF.org: Today, we’re celebrating our thirty-ninth anniversary, the “lace year,” which represents the intertwined nature and strength of our relationship with the free software community. We wouldn’t be here without you, and we are so grateful for everyone…

  • The United Nations has strongly condemned the killing of several Palestinians, including women and children, when a residential building in Tulkarem camp in the West Bank was hit by Israeli airstrikes Thursday night

  • Android qrtr_bpf_filter_detach Double-Free / Use-After-Free – CXSecurity.com