Daily Writeups – Telegram
Daily Writeups
3.2K subscribers
106K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: Cloudflare Accuses Perplexity AI of Evading Blocks and Impersonating Chrome to Scrape Websites
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 05 Aug 2025 07:08:33 +0000
════════════════════════
Tags: #Technology #AI #cloudflare #cybersecurity #Data Collection #Perplexity.ai #robots.txt #User Agent #Web Scraping
Title: OpenAI Introduces “Take a Break” Reminders to ChatGPT, Refines Responses for High-Stakes Decisions
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 05 Aug 2025 02:47:54 +0000
════════════════════════
Tags: #Technology #AI safety #ChatGPT #ethical AI #Mental Health #Misinformation #OpenAI #Prompt #User Interaction #Well_being
Title: Critical ADOdb Flaw (CVE-2025-54119, CVSS 10.0) in SQLite3 Driver Allows SQL Injection
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 05 Aug 2025 02:43:34 +0000
════════════════════════
Tags: #Vulnerability Report #ADOdb #CVE_2025_54119 #cybersecurity #database #php #sql injection #SQLite3 #Vulnerability
Title: Amazon Overhauls Wondery Podcast Network, Shifts Focus to Audible and Creator-Led Content
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 05 Aug 2025 02:24:46 +0000
════════════════════════
Tags: #Technology #Amazon #Audible #audio #Creator Services #media #Podcasts #Restructuring #streaming #Wondery
Title: Broadcom’s Jericho4 Unleashed: The 3nm Switch-Router Connecting a Million XPUs for Distributed AI
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 05 Aug 2025 02:15:47 +0000
════════════════════════
Tags: #Technology #AI Infrastructure #Broadcom #data centers #Distributed Computing #Ethernet #Jericho4 #MACsec #RoCE #Ultra Ethernet Consortium
Title: Meta Eyes Pika Labs: A Potential $500M Acquisition to Accelerate AI Video Generation
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 05 Aug 2025 02:07:15 +0000
════════════════════════
Tags: #Technology #acquisition #AI #Generative AI #Meta #Pika Labs #Short_Form Video #Startup #Video Generation
Title: Elon Musk Files “MacroHard” Trademark, Reigniting Rivalry with Microsoft
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 05 Aug 2025 02:02:22 +0000
════════════════════════
Tags: #Technology #AI #Bill Gates #Elon Musk #Grok #MacroHard #Microsoft #Tech News #Trademark #xAI
Title: Android Security Update: Critical RCE Flaw (CVE-2025-48530) in System Component Patched
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 05 Aug 2025 01:35:02 +0000
════════════════════════
Tags: #Android #Vulnerability Report #android #AOSP #CVE_2025_48530 #cybersecurity #rce #Remote Code Execution #Security Bulletin #Vulnerability
Title: New Android Malware Impersonates Indian Banks to Steal Data & Secretly Mine Monero
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 05 Aug 2025 00:40:07 +0000
════════════════════════
Tags: #Malware #Android Malware #Axis Bank #Banking Trojan #Cryptojacking #India #IndusInd Bank #Monero #phishing #SBI Card #XMRig
Title: Critical Triton Flaws (CVSS 9.8) Expose AI Servers to Remote Takeover – Patch Now!
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 05 Aug 2025 00:35:13 +0000
════════════════════════
Tags: #Vulnerability Report #AI #cybersecurity #Data Tampering #Inference Server #NVIDIA Triton #rce #Remote Code Execution #Vulnerability #Wiz Research
Title: PlayPraetor: New Android RAT Infects 11,000+ Devices with Real-Time On-Device Fraud
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 05 Aug 2025 00:28:42 +0000
════════════════════════
Tags: #Malware #Android Malware #Chinese Threat Actors #cybersecurity #financial fraud #MaaS #ODF #On_Device Fraud #PlayPraetor #rat
Title: Critical Dell DD OS Flaw (CVSS 9.8) Allows Unauthenticated Remote Access
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 05 Aug 2025 00:16:34 +0000
════════════════════════
Tags: #Vulnerability #Authentication Bypass #Command Injection #cybersecurity #DD OS #DDSH #dell #PowerProtect
Title: The Evolution of Evasion: Raspberry Robin Malware Upgrades with New Encryption & UAC Bypass Exploit
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 05 Aug 2025 00:10:15 +0000
════════════════════════
Tags: #Malware #ChaCha20 #CVE_2024_38196 #cybersecurity #evasion #Local Privilege Escalation #malware #Obfuscation #Raspberry Robin #tor
Title: Beavertail Malware Returns: North Korean Hackers Use NPM Packages to Steal Crypto & Secrets
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 05 Aug 2025 00:06:14 +0000
════════════════════════
Tags: #Cybercriminals #BeaverTail malware #cryptocurrency #cybersecurity #info_stealer #North Korea #npm #supply chain attack #Veracode
Title: Kimsuky APT Escalates Cyberespionage with Stealthy LNK Files & Reflective Malware Payloads
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 05 Aug 2025 00:01:08 +0000
════════════════════════
Tags: #Cybercriminals #APT #Cyberespionage #cybersecurity #Kimsuky #LNK Files #malware #North Korea #Reflective DLL Injection #south korea
Title: Urgent Zero-Day Warning: SonicWall VPNs Under Attack, Akira Ransomware Deployed Within Hours
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Mon, 04 Aug 2025 23:24:09 +0000
════════════════════════
Tags: #Vulnerability Report #Akira #cybersecurity #Huntress #MFA Bypass #ransomware #security alert #SonicWall #vpn #zero_day
Title: DAY 1 Recon: Manual Reconnaissance: How I Explore Targets Like a Hacker (But With Good Intentions)
════════════════════════
𐀪 Author: Ayush Kumar
════════════════════════
Time: Tue, 05 Aug 2025 08:35:57 GMT
════════════════════════
Tags: #hacking #bug_bounty #ethical_hacking #programming #cybersecurity
Title: Ticket to Trouble: How I Hijacked Support Tickets to See Everyone’s Complaints ️
════════════════════════
𐀪 Author: Iski
════════════════════════
Time: Tue, 05 Aug 2025 08:35:50 GMT
════════════════════════
Tags: #hacking #infosec #money #bug_bounty #cybersecurity
Title: Burp Suite For Beginners: How I Learned the Proxy and Interceptor
════════════════════════
𐀪 Author: Ayush Kumar
════════════════════════
Time: Tue, 05 Aug 2025 08:35:21 GMT
════════════════════════
Tags: #programming #bug_bounty #hacking #ethical_hacking #cybersecurity