⤷ Title: Angular Security Alert: High-Severity SVG Flaw CVE-2026-22610 Exposes Apps to XSS
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 01:59:12 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Angular #CVE_2026_22610 #Front_end Development #javanoscript #Patch Alert #SVG Vulnerability #Web Security #XSS (Cross_Site Scripting)
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 01:59:12 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Angular #CVE_2026_22610 #Front_end Development #javanoscript #Patch Alert #SVG Vulnerability #Web Security #XSS (Cross_Site Scripting)
Daily CyberSecurity
Angular Security Alert: High-Severity SVG Flaw CVE-2026-22610 Exposes Apps to XSS
Angular CVE-2026-22610 (CVSS 8.5) allows XSS via SVG noscript attributes. Update to v21.0.7 or v20.3.16 immediately to secure your apps.
⤷ Title: “TryCloudflare” Abuse: AsyncRAT Exploits Free Tunnels to Build Stealthy WebDAV Network
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 01:52:42 +0000
════════════════════════
⌗ Tags: #Malware #AsyncRAT #cloudflare #Malware Analysis #phishing #Python Injection #Trend Micro #TryCloudflare #WebDAV
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 01:52:42 +0000
════════════════════════
⌗ Tags: #Malware #AsyncRAT #cloudflare #Malware Analysis #phishing #Python Injection #Trend Micro #TryCloudflare #WebDAV
Daily CyberSecurity
"TryCloudflare" Abuse: AsyncRAT Exploits Free Tunnels to Build Stealthy WebDAV Network
New AsyncRAT campaign abuses free Cloudflare tunnels for stealthy malware delivery. Learn how phishing emails lead to WebDAV attacks & Python injection.
⤷ Title: The AI Alliance: Apple Taps Google Gemini to Power the New Siri
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 01:43:13 +0000
════════════════════════
⌗ Tags: #Technology #Apple #Apple Intelligence #Gemini #Generative AI #google #iOS 26 #Private Cloud Compute #Siri #Sundar Pichai #Tim Cook #WWDC 2026
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 01:43:13 +0000
════════════════════════
⌗ Tags: #Technology #Apple #Apple Intelligence #Gemini #Generative AI #google #iOS 26 #Private Cloud Compute #Siri #Sundar Pichai #Tim Cook #WWDC 2026
Daily CyberSecurity
The AI Alliance: Apple Taps Google Gemini to Power the New Siri
It’s official: Apple will use Google Gemini to power its next-gen Siri and AI features in 2026, combining Google's models with Apple's privacy.
⤷ Title: India’s Source Code Demand Sparks Tech Revolt
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 01:40:28 +0000
════════════════════════
⌗ Tags: #Technology #android #Apple #Cybersecurity 2026 #India #ios #MAIT #Make in India #MeitY #Narendra Modi #samsung #Smartphone Security #source code #Tech Policy
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 01:40:28 +0000
════════════════════════
⌗ Tags: #Technology #android #Apple #Cybersecurity 2026 #India #ios #MAIT #Make in India #MeitY #Narendra Modi #samsung #Smartphone Security #source code #Tech Policy
Daily CyberSecurity
India’s Source Code Demand Sparks Tech Revolt
India faces a revolt from Apple and Samsung over a 2026 proposal to mandate source code disclosure for security audits, sparking a major IP standoff.
⤷ Title: Cutting the Cord: QEMU 11.0 to Expunge 32-Bit Host Support in Cloud Variant
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 01:36:10 +0000
════════════════════════
⌗ Tags: #Linux #32_bit Deprecation #Cloud Computing #open_source #QEMU #QEMU 11.0 #Server Management #TCG #Tech News 2026 #virtualization
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 01:36:10 +0000
════════════════════════
⌗ Tags: #Linux #32_bit Deprecation #Cloud Computing #open_source #QEMU #QEMU 11.0 #Server Management #TCG #Tech News 2026 #virtualization
Daily CyberSecurity
Cutting the Cord: QEMU 11.0 to Expunge 32-Bit Host Support in Cloud Variant
QEMU 11.0 Cloud is set to drop 32-bit host support, removing 7,000+ lines of legacy code to boost efficiency and security in cloud environments.
⤷ Title: Double Critical: Hardcoded Secrets Expose Ruckus IoT Controllers to Root RCE
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:16:03 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #CVE_2025_69425 #CVE_2025_69426 #Docker escape #hardcoded credentials #IoT security #Root Privilege Escalation #Ruckus Networks #vRIoT Controller
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:16:03 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #CVE_2025_69425 #CVE_2025_69426 #Docker escape #hardcoded credentials #IoT security #Root Privilege Escalation #Ruckus Networks #vRIoT Controller
Daily CyberSecurity
Double Critical: Hardcoded Secrets Expose Ruckus IoT Controllers to Root RCE
Two CVSS 10 flaws (CVE-2025-69425 & CVE-2025-69426) hit Ruckus vRIoT. Hardcoded secrets allow attackers to seize root access. Update to v3.0.0.0 now.
⤷ Title: CVE-2025-52694 (CVSS 10): Critical Advantech SQL Injection Exposes IoT Devices
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:12:15 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Advantech #Critical Vulnerability #CSA Singapore #CVE_2025_52694 #Industrial IoT #IoTSuite #SCADA Security #sql injection
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:12:15 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Advantech #Critical Vulnerability #CSA Singapore #CVE_2025_52694 #Industrial IoT #IoTSuite #SCADA Security #sql injection
Daily CyberSecurity
CVE-2025-52694 (CVSS 10): Critical Advantech SQL Injection Exposes IoT Devices
Critical Advantech flaw CVE-2025-52694 (CVSS 10.0) allows remote SQL injection. Unauthenticated attackers can seize control. Update IoTSuite now.
⤷ Title: Critical Alert: Moxa Switches Exposed to OpenSSH Remote Code Execution (CVSS 9.8)
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:07:14 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #CVE_2023_38408 #ICS security #Industrial Ethernet Switches #Moxa #Network Infrastructure #OpenSSH #Remote Code Execution #SCADA Security
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:07:14 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #CVE_2023_38408 #ICS security #Industrial Ethernet Switches #Moxa #Network Infrastructure #OpenSSH #Remote Code Execution #SCADA Security
Daily CyberSecurity
Critical Alert: Moxa Switches Exposed to OpenSSH Remote Code Execution (CVSS 9.8)
Critical OpenSSH flaw (CVE-2023-38408) hits Moxa EDS & RKS switches. CVSS 9.8. Remote attackers can execute code. Contact support for patches now.
⤷ Title: Tearing Down the Wall: Google Brings AirDrop Support to the Pixel 9
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:03:13 +0000
════════════════════════
⌗ Tags: #Android #AirDrop #Android 16 #Cross_Platform #file sharing #google #iOS 26 #Pixel 10 #Pixel 9 #Qualcomm #Quick Share #Snapdragon #Tech News 2026
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:03:13 +0000
════════════════════════
⌗ Tags: #Android #AirDrop #Android 16 #Cross_Platform #file sharing #google #iOS 26 #Pixel 10 #Pixel 9 #Qualcomm #Quick Share #Snapdragon #Tech News 2026
Daily CyberSecurity
Tearing Down the Wall: Google Brings AirDrop Support to the Pixel 9
Pixel 9 is next in line for AirDrop support! New firmware leaks show Google is backporting the Pixel 10’s game-changing file-sharing bridge to older models.
⤷ Title: The End of the Shopping Tab: Google Unveils “Agentic Commerce” and UCP
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:00:59 +0000
════════════════════════
⌗ Tags: #Technology #Agentic Commerce #AI Agents #e_commerce #Gemini AI #google #NRF 2026 #Retail Tech #Shopify #Sundar Pichai #UCP #Universal Commerce Protocol #Walmart
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:00:59 +0000
════════════════════════
⌗ Tags: #Technology #Agentic Commerce #AI Agents #e_commerce #Gemini AI #google #NRF 2026 #Retail Tech #Shopify #Sundar Pichai #UCP #Universal Commerce Protocol #Walmart
Daily CyberSecurity
The End of the Shopping Tab: Google Unveils "Agentic Commerce" and UCP
Google debuts Agentic Commerce and the Universal Commerce Protocol (UCP) at NRF 2026, enabling AI agents to shop and checkout across retailers natively.
⤷ Title: Bypassing Two-Factor Authentication via Password Reset Functionality
════════════════════════
𐀪 Author: WHO AM I ?
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:40:35 GMT
════════════════════════
⌗ Tags: #2fa #penetration_testing #bug_bounty #cybersecurity #broken_access_control
════════════════════════
𐀪 Author: WHO AM I ?
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:40:35 GMT
════════════════════════
⌗ Tags: #2fa #penetration_testing #bug_bounty #cybersecurity #broken_access_control
Medium
Bypassing Two-Factor Authentication via Password Reset Functionality
⤷ Title: Masscan vs. Nmap: Guía de Escaneo de Puertos para Bug Bounty
════════════════════════
𐀪 Author: JPablo13
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:02:56 GMT
════════════════════════
⌗ Tags: #technology #reconnaissance #bug_bounty #cybersecurity #hacking
════════════════════════
𐀪 Author: JPablo13
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:02:56 GMT
════════════════════════
⌗ Tags: #technology #reconnaissance #bug_bounty #cybersecurity #hacking
Medium
Masscan vs. Nmap: Guía de Escaneo de Puertos para Bug Bounty
Aprende a combinar Masscan y Nmap para un reconocimiento eficiente en Bug Bounty. Optimiza tu pipeline de seguridad ofensiva.
⤷ Title: IPV6'nın Potansiyel Tehlikesi
════════════════════════
𐀪 Author: Eren
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:15:23 GMT
════════════════════════
⌗ Tags: #cybersecurity #technology #infosec #web_security #devops
════════════════════════
𐀪 Author: Eren
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:15:23 GMT
════════════════════════
⌗ Tags: #cybersecurity #technology #infosec #web_security #devops
Medium
IPV6'nın Potansiyel Tehlikesi
Herkese merhaba, Üzerinde yeterince durulmadığını düşündüğüm bir konuya değinmek istiyorum. IPv6 destekleyen web sitelerinin, IPv4…
⤷ Title: Breaking Trust at the Core: Kerberos Authentication Flow and Common Roasting Attacks
════════════════════════
𐀪 Author: Eray Yavuz
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:12:47 GMT
════════════════════════
⌗ Tags: #offensive_security #pentesting #cybersecurity #red_team #infosec
════════════════════════
𐀪 Author: Eray Yavuz
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:12:47 GMT
════════════════════════
⌗ Tags: #offensive_security #pentesting #cybersecurity #red_team #infosec
Medium
Breaking Trust at the Core: Kerberos Authentication Flow and Common Roasting Attacks
Introduction
⤷ Title: WSUS over HTTPS? Still Secure? Think Again…
════════════════════════
𐀪 Author: Mohammed ElKhateb
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 01:20:35 GMT
════════════════════════
⌗ Tags: #penetration_testing #red_team #cybersecurity #windows_security #active_directory
════════════════════════
𐀪 Author: Mohammed ElKhateb
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 01:20:35 GMT
════════════════════════
⌗ Tags: #penetration_testing #red_team #cybersecurity #windows_security #active_directory
Medium
🔐 WSUS over HTTPS? Still Secure? Think Again…
From Domain User to Full Domain Control via AD CS ESC1 & WSUS MITM Attack (Even Over HTTPS!)
⤷ Title: Atomic Bird Goes Purple #1 notes — TryHackMe
════════════════════════
𐀪 Author: Jose Praveen
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 01:36:57 GMT
════════════════════════
⌗ Tags: #tryhackme #powershell #purple_team
════════════════════════
𐀪 Author: Jose Praveen
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 01:36:57 GMT
════════════════════════
⌗ Tags: #tryhackme #powershell #purple_team
Medium
Atomic Bird Goes Purple #1 notes — TryHackMe
Time to simulate hunting and detecting activities to sharpen your purple teaming skills.
⤷ Title: CIRT (Cyber Incident Response Team)
════════════════════════
𐀪 Author: D.Jackson
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:32:17 GMT
════════════════════════
⌗ Tags: #tryhackme #soc_role_in_blue_team
════════════════════════
𐀪 Author: D.Jackson
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:32:17 GMT
════════════════════════
⌗ Tags: #tryhackme #soc_role_in_blue_team
Medium
CIRT (Cyber Incident Response Team)
A Cyber Incident Response Team (CIRT) or Computer Security Incident Response Team (CSIRT) is a group of professionals equipped to handle…
⤷ Title: Anatomy of a Breach: From Public Web Server to Internal Data Exfiltration
════════════════════════
𐀪 Author: 0xPmCr
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:02:43 GMT
════════════════════════
⌗ Tags: #red_team #cybersecurity #red_teaming #learning #ethical_hacking
════════════════════════
𐀪 Author: 0xPmCr
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:02:43 GMT
════════════════════════
⌗ Tags: #red_team #cybersecurity #red_teaming #learning #ethical_hacking
Medium
Anatomy of a Breach: From Public Web Server to Internal Data Exfiltration
A Step-by-Step Red Team Operation using the Sliver C2 Framework.
⤷ Title: A03 Injection — OWASP Top 10 Series (with Labs)
════════════════════════
𐀪 Author: CyberQuestor
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:27:24 GMT
════════════════════════
⌗ Tags: #owasp #owasp_api_security_top_10 #owasp_top_10 #sql_injection #injection
════════════════════════
𐀪 Author: CyberQuestor
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:27:24 GMT
════════════════════════
⌗ Tags: #owasp #owasp_api_security_top_10 #owasp_top_10 #sql_injection #injection
Medium
A03 Injection — OWASP Top 10 Series (with Labs)
In the previous part of this blog series, we explored A02: Cryptographic Failures, which focused on exposing sensitive data due to weak or…
⤷ Title: The Trojan in the Living Room: 2 Million Android TV Boxes Hijacked by Kimwolf
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 04:00:26 +0000
════════════════════════
⌗ Tags: #Malware #Android TV #BOTNET #DDoS #Ethereum Name Service #IoT Security #Kimwolf #Malware 2026 #Resi Rack #Residential Proxy #Synthient #XLab
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 04:00:26 +0000
════════════════════════
⌗ Tags: #Malware #Android TV #BOTNET #DDoS #Ethereum Name Service #IoT Security #Kimwolf #Malware 2026 #Resi Rack #Residential Proxy #Synthient #XLab
Penetration Testing Tools
The Trojan in the Living Room: 2 Million Android TV Boxes Hijacked by Kimwolf
When you procure an inexpensive, unbranded Android TV box, connect it to your television, and relegate it to
⤷ Title: Term Interrupted: Higham Lane School Shuttered by Christmas Cyber Incursion
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 03:58:33 +0000
════════════════════════
⌗ Tags: #Cybercriminals #2026 Tech News #Central England Academy Trust #cyberattack #data breach #Education Sector #Higham Lane School #ICO #Michael Gannon #Nuneaton #ransomware #UK Schools
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 03:58:33 +0000
════════════════════════
⌗ Tags: #Cybercriminals #2026 Tech News #Central England Academy Trust #cyberattack #data breach #Education Sector #Higham Lane School #ICO #Michael Gannon #Nuneaton #ransomware #UK Schools
Penetration Testing Tools
Term Interrupted: Higham Lane School Shuttered by Christmas Cyber Incursion
A comprehensive school nestled in the British town of Nuneaton—a locale of approximately 90,000 residents—has been compelled to