YouTube
Live from Pwn2Own Ireland: Qrious Secure vs. Samsung Galaxy
#Pwn2Own
Join us for a live look-in from Pwn2Own Ireland 2025. In this highlight from Day Two, the team from Qrious Secure will be targeting the Samsung Galaxy S25 - Remote in the Mobile Phones category for $50,000 and 5 Master of Pwn Points.
Join us for a live look-in from Pwn2Own Ireland 2025. In this highlight from Day Two, the team from Qrious Secure will be targeting the Samsung Galaxy S25 - Remote in the Mobile Phones category for $50,000 and 5 Master of Pwn Points.
https://www.youtube.com/live/DYjWzgS2JXg?si=vnxW_dVMn90pgvvN
A while back I watched these guys trying to exploit the Samsung Galaxy S25
pretty wild stuff.
They even ended up with a zero-click vuln at the end 🥲
@AfroSec
A while back I watched these guys trying to exploit the Samsung Galaxy S25
pretty wild stuff.
They even ended up with a zero-click vuln at the end 🥲
@AfroSec
🤯2🔥1
This media is not supported in your browser
VIEW IN TELEGRAM
can we make it anonymous seriously like by changing the bios chip firmware and stuff like that ?
@AfroSec
@AfroSec
✍2🤔2
Some people think that when I quit uni I just went dumb, quit life, and rot in bed. Bruh can u relax ?😂
every time I open my PC and connect to the internet, I’m learning
let’s be honest ena malet in uni most of us only read modules for exams and forget them right after,🙄
In tech ? every hour, every minute, you’re googling, low-key abusing AI lol 😅
anyways if anyone who think like this please ከድርጊታችሁ ተቆጠቡ😂
@AfroSec
every time I open my PC and connect to the internet, I’m learning
let’s be honest ena malet in uni most of us only read modules for exams and forget them right after,🙄
In tech ? every hour, every minute, you’re googling, low-key abusing AI lol 😅
anyways if anyone who think like this please ከድርጊታችሁ ተቆጠቡ😂
@AfroSec
😁16🤣5👍3
The Hacker News
⚠️ Astaroth banking malware is now using WhatsApp as its main delivery channel in Brazil. Researchers report a new Python-based module that steals a victim’s contact list and auto-sends malicious ZIP files, spreading the infection chat to chat. 🔗 How the…
astaroth is back ylal
i wrote abt it a yr ago ig
is file less malware like it executes directly in memory
@AfroSec
i wrote abt it a yr ago ig
is file less malware like it executes directly in memory
@AfroSec
👏3🔥1
https://github.com/jivoi/awesome-osint
stalkers i mean Osint Nerds 🙄 where are u ???? this one is for u
@AfroSec
stalkers i mean Osint Nerds 🙄 where are u ???? this one is for u
@AfroSec
GitHub
GitHub - jivoi/awesome-osint: :scream: A curated list of amazingly awesome OSINT
:scream: A curated list of amazingly awesome OSINT - jivoi/awesome-osint
🔥3🙏3
Forwarded from AXUM SEC
CVE-2025-53770: When SharePoint Zero-Days Proved Perimeter
Security Isn’t Enough
In July 2025, attackers actively exploited a critical SharePoint zero-day to gain unauthenticated RCE, deploy web shells, steal machine keys, and persist even after patching.
The hard truth?
Patching closes the door, but it doesn’t tell you who already walked in.
Modern attacks blend into normal operations and stay quiet. Defending against them takes more than alerts it takes continuous validation and real exposure visibility.
That’s where AxumSec comes in.
Because modern threats don’t wait and security shouldn’t either.
💬 What cyber risk do you think organizations still underestimate?
🔗 https://preregister.axumsec.com
Security Isn’t Enough
In July 2025, attackers actively exploited a critical SharePoint zero-day to gain unauthenticated RCE, deploy web shells, steal machine keys, and persist even after patching.
The hard truth?
Patching closes the door, but it doesn’t tell you who already walked in.
Modern attacks blend into normal operations and stay quiet. Defending against them takes more than alerts it takes continuous validation and real exposure visibility.
That’s where AxumSec comes in.
Because modern threats don’t wait and security shouldn’t either.
💬 What cyber risk do you think organizations still underestimate?
🔗 https://preregister.axumsec.com
🔥3