⤷ Title: Cutting the Cord: QEMU 11.0 to Expunge 32-Bit Host Support in Cloud Variant
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 01:36:10 +0000
════════════════════════
⌗ Tags: #Linux #32_bit Deprecation #Cloud Computing #open_source #QEMU #QEMU 11.0 #Server Management #TCG #Tech News 2026 #virtualization
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 01:36:10 +0000
════════════════════════
⌗ Tags: #Linux #32_bit Deprecation #Cloud Computing #open_source #QEMU #QEMU 11.0 #Server Management #TCG #Tech News 2026 #virtualization
Daily CyberSecurity
Cutting the Cord: QEMU 11.0 to Expunge 32-Bit Host Support in Cloud Variant
QEMU 11.0 Cloud is set to drop 32-bit host support, removing 7,000+ lines of legacy code to boost efficiency and security in cloud environments.
⤷ Title: Double Critical: Hardcoded Secrets Expose Ruckus IoT Controllers to Root RCE
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:16:03 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #CVE_2025_69425 #CVE_2025_69426 #Docker escape #hardcoded credentials #IoT security #Root Privilege Escalation #Ruckus Networks #vRIoT Controller
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:16:03 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #CVE_2025_69425 #CVE_2025_69426 #Docker escape #hardcoded credentials #IoT security #Root Privilege Escalation #Ruckus Networks #vRIoT Controller
Daily CyberSecurity
Double Critical: Hardcoded Secrets Expose Ruckus IoT Controllers to Root RCE
Two CVSS 10 flaws (CVE-2025-69425 & CVE-2025-69426) hit Ruckus vRIoT. Hardcoded secrets allow attackers to seize root access. Update to v3.0.0.0 now.
⤷ Title: CVE-2025-52694 (CVSS 10): Critical Advantech SQL Injection Exposes IoT Devices
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:12:15 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Advantech #Critical Vulnerability #CSA Singapore #CVE_2025_52694 #Industrial IoT #IoTSuite #SCADA Security #sql injection
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:12:15 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Advantech #Critical Vulnerability #CSA Singapore #CVE_2025_52694 #Industrial IoT #IoTSuite #SCADA Security #sql injection
Daily CyberSecurity
CVE-2025-52694 (CVSS 10): Critical Advantech SQL Injection Exposes IoT Devices
Critical Advantech flaw CVE-2025-52694 (CVSS 10.0) allows remote SQL injection. Unauthenticated attackers can seize control. Update IoTSuite now.
⤷ Title: Critical Alert: Moxa Switches Exposed to OpenSSH Remote Code Execution (CVSS 9.8)
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:07:14 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #CVE_2023_38408 #ICS security #Industrial Ethernet Switches #Moxa #Network Infrastructure #OpenSSH #Remote Code Execution #SCADA Security
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:07:14 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #CVE_2023_38408 #ICS security #Industrial Ethernet Switches #Moxa #Network Infrastructure #OpenSSH #Remote Code Execution #SCADA Security
Daily CyberSecurity
Critical Alert: Moxa Switches Exposed to OpenSSH Remote Code Execution (CVSS 9.8)
Critical OpenSSH flaw (CVE-2023-38408) hits Moxa EDS & RKS switches. CVSS 9.8. Remote attackers can execute code. Contact support for patches now.
⤷ Title: Tearing Down the Wall: Google Brings AirDrop Support to the Pixel 9
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:03:13 +0000
════════════════════════
⌗ Tags: #Android #AirDrop #Android 16 #Cross_Platform #file sharing #google #iOS 26 #Pixel 10 #Pixel 9 #Qualcomm #Quick Share #Snapdragon #Tech News 2026
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:03:13 +0000
════════════════════════
⌗ Tags: #Android #AirDrop #Android 16 #Cross_Platform #file sharing #google #iOS 26 #Pixel 10 #Pixel 9 #Qualcomm #Quick Share #Snapdragon #Tech News 2026
Daily CyberSecurity
Tearing Down the Wall: Google Brings AirDrop Support to the Pixel 9
Pixel 9 is next in line for AirDrop support! New firmware leaks show Google is backporting the Pixel 10’s game-changing file-sharing bridge to older models.
⤷ Title: The End of the Shopping Tab: Google Unveils “Agentic Commerce” and UCP
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:00:59 +0000
════════════════════════
⌗ Tags: #Technology #Agentic Commerce #AI Agents #e_commerce #Gemini AI #google #NRF 2026 #Retail Tech #Shopify #Sundar Pichai #UCP #Universal Commerce Protocol #Walmart
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:00:59 +0000
════════════════════════
⌗ Tags: #Technology #Agentic Commerce #AI Agents #e_commerce #Gemini AI #google #NRF 2026 #Retail Tech #Shopify #Sundar Pichai #UCP #Universal Commerce Protocol #Walmart
Daily CyberSecurity
The End of the Shopping Tab: Google Unveils "Agentic Commerce" and UCP
Google debuts Agentic Commerce and the Universal Commerce Protocol (UCP) at NRF 2026, enabling AI agents to shop and checkout across retailers natively.
⤷ Title: Bypassing Two-Factor Authentication via Password Reset Functionality
════════════════════════
𐀪 Author: WHO AM I ?
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:40:35 GMT
════════════════════════
⌗ Tags: #2fa #penetration_testing #bug_bounty #cybersecurity #broken_access_control
════════════════════════
𐀪 Author: WHO AM I ?
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:40:35 GMT
════════════════════════
⌗ Tags: #2fa #penetration_testing #bug_bounty #cybersecurity #broken_access_control
Medium
Bypassing Two-Factor Authentication via Password Reset Functionality
⤷ Title: Masscan vs. Nmap: Guía de Escaneo de Puertos para Bug Bounty
════════════════════════
𐀪 Author: JPablo13
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:02:56 GMT
════════════════════════
⌗ Tags: #technology #reconnaissance #bug_bounty #cybersecurity #hacking
════════════════════════
𐀪 Author: JPablo13
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:02:56 GMT
════════════════════════
⌗ Tags: #technology #reconnaissance #bug_bounty #cybersecurity #hacking
Medium
Masscan vs. Nmap: Guía de Escaneo de Puertos para Bug Bounty
Aprende a combinar Masscan y Nmap para un reconocimiento eficiente en Bug Bounty. Optimiza tu pipeline de seguridad ofensiva.
⤷ Title: IPV6'nın Potansiyel Tehlikesi
════════════════════════
𐀪 Author: Eren
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:15:23 GMT
════════════════════════
⌗ Tags: #cybersecurity #technology #infosec #web_security #devops
════════════════════════
𐀪 Author: Eren
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:15:23 GMT
════════════════════════
⌗ Tags: #cybersecurity #technology #infosec #web_security #devops
Medium
IPV6'nın Potansiyel Tehlikesi
Herkese merhaba, Üzerinde yeterince durulmadığını düşündüğüm bir konuya değinmek istiyorum. IPv6 destekleyen web sitelerinin, IPv4…
⤷ Title: Breaking Trust at the Core: Kerberos Authentication Flow and Common Roasting Attacks
════════════════════════
𐀪 Author: Eray Yavuz
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:12:47 GMT
════════════════════════
⌗ Tags: #offensive_security #pentesting #cybersecurity #red_team #infosec
════════════════════════
𐀪 Author: Eray Yavuz
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:12:47 GMT
════════════════════════
⌗ Tags: #offensive_security #pentesting #cybersecurity #red_team #infosec
Medium
Breaking Trust at the Core: Kerberos Authentication Flow and Common Roasting Attacks
Introduction
⤷ Title: WSUS over HTTPS? Still Secure? Think Again…
════════════════════════
𐀪 Author: Mohammed ElKhateb
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 01:20:35 GMT
════════════════════════
⌗ Tags: #penetration_testing #red_team #cybersecurity #windows_security #active_directory
════════════════════════
𐀪 Author: Mohammed ElKhateb
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 01:20:35 GMT
════════════════════════
⌗ Tags: #penetration_testing #red_team #cybersecurity #windows_security #active_directory
Medium
🔐 WSUS over HTTPS? Still Secure? Think Again…
From Domain User to Full Domain Control via AD CS ESC1 & WSUS MITM Attack (Even Over HTTPS!)
⤷ Title: Atomic Bird Goes Purple #1 notes — TryHackMe
════════════════════════
𐀪 Author: Jose Praveen
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 01:36:57 GMT
════════════════════════
⌗ Tags: #tryhackme #powershell #purple_team
════════════════════════
𐀪 Author: Jose Praveen
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 01:36:57 GMT
════════════════════════
⌗ Tags: #tryhackme #powershell #purple_team
Medium
Atomic Bird Goes Purple #1 notes — TryHackMe
Time to simulate hunting and detecting activities to sharpen your purple teaming skills.
⤷ Title: CIRT (Cyber Incident Response Team)
════════════════════════
𐀪 Author: D.Jackson
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:32:17 GMT
════════════════════════
⌗ Tags: #tryhackme #soc_role_in_blue_team
════════════════════════
𐀪 Author: D.Jackson
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:32:17 GMT
════════════════════════
⌗ Tags: #tryhackme #soc_role_in_blue_team
Medium
CIRT (Cyber Incident Response Team)
A Cyber Incident Response Team (CIRT) or Computer Security Incident Response Team (CSIRT) is a group of professionals equipped to handle…
⤷ Title: Anatomy of a Breach: From Public Web Server to Internal Data Exfiltration
════════════════════════
𐀪 Author: 0xPmCr
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:02:43 GMT
════════════════════════
⌗ Tags: #red_team #cybersecurity #red_teaming #learning #ethical_hacking
════════════════════════
𐀪 Author: 0xPmCr
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:02:43 GMT
════════════════════════
⌗ Tags: #red_team #cybersecurity #red_teaming #learning #ethical_hacking
Medium
Anatomy of a Breach: From Public Web Server to Internal Data Exfiltration
A Step-by-Step Red Team Operation using the Sliver C2 Framework.
⤷ Title: A03 Injection — OWASP Top 10 Series (with Labs)
════════════════════════
𐀪 Author: CyberQuestor
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:27:24 GMT
════════════════════════
⌗ Tags: #owasp #owasp_api_security_top_10 #owasp_top_10 #sql_injection #injection
════════════════════════
𐀪 Author: CyberQuestor
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:27:24 GMT
════════════════════════
⌗ Tags: #owasp #owasp_api_security_top_10 #owasp_top_10 #sql_injection #injection
Medium
A03 Injection — OWASP Top 10 Series (with Labs)
In the previous part of this blog series, we explored A02: Cryptographic Failures, which focused on exposing sensitive data due to weak or…
⤷ Title: The Trojan in the Living Room: 2 Million Android TV Boxes Hijacked by Kimwolf
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 04:00:26 +0000
════════════════════════
⌗ Tags: #Malware #Android TV #BOTNET #DDoS #Ethereum Name Service #IoT Security #Kimwolf #Malware 2026 #Resi Rack #Residential Proxy #Synthient #XLab
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 04:00:26 +0000
════════════════════════
⌗ Tags: #Malware #Android TV #BOTNET #DDoS #Ethereum Name Service #IoT Security #Kimwolf #Malware 2026 #Resi Rack #Residential Proxy #Synthient #XLab
Penetration Testing Tools
The Trojan in the Living Room: 2 Million Android TV Boxes Hijacked by Kimwolf
When you procure an inexpensive, unbranded Android TV box, connect it to your television, and relegate it to
⤷ Title: Term Interrupted: Higham Lane School Shuttered by Christmas Cyber Incursion
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 03:58:33 +0000
════════════════════════
⌗ Tags: #Cybercriminals #2026 Tech News #Central England Academy Trust #cyberattack #data breach #Education Sector #Higham Lane School #ICO #Michael Gannon #Nuneaton #ransomware #UK Schools
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 03:58:33 +0000
════════════════════════
⌗ Tags: #Cybercriminals #2026 Tech News #Central England Academy Trust #cyberattack #data breach #Education Sector #Higham Lane School #ICO #Michael Gannon #Nuneaton #ransomware #UK Schools
Penetration Testing Tools
Term Interrupted: Higham Lane School Shuttered by Christmas Cyber Incursion
A comprehensive school nestled in the British town of Nuneaton—a locale of approximately 90,000 residents—has been compelled to
⤷ Title: The Proxy Trap: Single Click on Telegram Can Unmask Your Real IP Address
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 03:51:36 +0000
════════════════════════
⌗ Tags: #Vulnerability #Android Security #Cybernews #De_anonymization #InfoSec 2026 #iOS Security #IP Leak #Messaging App Security #privacy #Proxy Vulnerability #Telegram
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 03:51:36 +0000
════════════════════════
⌗ Tags: #Vulnerability #Android Security #Cybernews #De_anonymization #InfoSec 2026 #iOS Security #IP Leak #Messaging App Security #privacy #Proxy Vulnerability #Telegram
Penetration Testing Tools
The Proxy Trap: Single Click on Telegram Can Unmask Your Real IP Address
A cursory engagement with a hyperlink in Telegram can result in the inadvertent exfiltration of one’s authentic IP
⤷ Title: The Retail Revolution: Google Unveils UCP to Power Your AI Personal Shopper
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 03:49:51 +0000
════════════════════════
⌗ Tags: #Google #Agentic Commerce #AI Agents #Digital Transformation #E_commerce Trends #Gemini AI #google #NRF 2026 #Retail Tech #Shopify #UCP #Universal Commerce Protocol
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 03:49:51 +0000
════════════════════════
⌗ Tags: #Google #Agentic Commerce #AI Agents #Digital Transformation #E_commerce Trends #Gemini AI #google #NRF 2026 #Retail Tech #Shopify #UCP #Universal Commerce Protocol
Penetration Testing Tools
The Retail Revolution: Google Unveils UCP to Power Your AI Personal Shopper
Digital commerce is on the precipice of a transformation, poised to mirror an experience where a bespoke personal
⤷ Title: Doomsday for Hackers: 324,000 BreachForums Accounts Exposed in Massive Leak
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 03:48:11 +0000
════════════════════════
⌗ Tags: #Data Leak #Anonymity #BreachForums #Cybercrime 2026 #Dark Web #data leak #Database Breach #Infosec #Law Enforcement #MyBB #PGP Key #ShinyHunters
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 03:48:11 +0000
════════════════════════
⌗ Tags: #Data Leak #Anonymity #BreachForums #Cybercrime 2026 #Dark Web #data leak #Database Breach #Infosec #Law Enforcement #MyBB #PGP Key #ShinyHunters
Penetration Testing Tools
Doomsday for Hackers: 324,000 BreachForums Accounts Exposed in Massive Leak
A comprehensive database associated with BreachForums—one of the most notorious clearinghouses for exfiltrated data and illicit network access—has
⤷ Title: Rust in the Water: Iranian Hackers Deploy New “RustyWater” RAT Across Middle East
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 03:46:21 +0000
════════════════════════
⌗ Tags: #Malware #Archer RAT #CloudSEK #Iranian APT #Mango Sandstorm #Middle East Cyber Attacks #MuddyWater #Operation IconCat #Rust Malware #RUSTRIC #RustyWater #Seqrite Labs
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 03:46:21 +0000
════════════════════════
⌗ Tags: #Malware #Archer RAT #CloudSEK #Iranian APT #Mango Sandstorm #Middle East Cyber Attacks #MuddyWater #Operation IconCat #Rust Malware #RUSTRIC #RustyWater #Seqrite Labs
Penetration Testing Tools
Rust in the Water: Iranian Hackers Deploy New "RustyWater" RAT Across Middle East
The Iranian threat collective MuddyWater has intensified its offensives against organizations across the Middle East, deploying a sophisticated