⤷ Title: Critical ADOdb Flaw (CVE-2025-54119, CVSS 10.0) in SQLite3 Driver Allows SQL Injection
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 02:43:34 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #ADOdb #CVE_2025_54119 #cybersecurity #database #php #sql injection #SQLite3 #Vulnerability
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 02:43:34 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #ADOdb #CVE_2025_54119 #cybersecurity #database #php #sql injection #SQLite3 #Vulnerability
Daily CyberSecurity
Critical ADOdb Flaw (CVE-2025-54119, CVSS 10.0) in SQLite3 Driver Allows SQL Injection
A critical SQL injection flaw (CVE-2025-54119, CVSS 10.0) in ADOdb’s SQLite3 driver allows arbitrary SQL execution via improperly escaped table names.
⤷ Title: Amazon Overhauls Wondery Podcast Network, Shifts Focus to Audible and Creator-Led Content
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 02:24:46 +0000
════════════════════════
⌗ Tags: #Technology #Amazon #Audible #audio #Creator Services #media #Podcasts #Restructuring #streaming #Wondery
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 02:24:46 +0000
════════════════════════
⌗ Tags: #Technology #Amazon #Audible #audio #Creator Services #media #Podcasts #Restructuring #streaming #Wondery
Daily CyberSecurity
Amazon Overhauls Wondery Podcast Network, Shifts Focus to Audible and Creator-Led Content
Amazon is reorganizing its audio division, integrating Wondery's narrative content into Audible and creating a new "Creator Services" team for celebrity-led podcasts.
⤷ Title: Broadcom’s Jericho4 Unleashed: The 3nm Switch-Router Connecting a Million XPUs for Distributed AI
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 02:15:47 +0000
════════════════════════
⌗ Tags: #Technology #AI Infrastructure #Broadcom #data centers #Distributed Computing #Ethernet #Jericho4 #MACsec #RoCE #Ultra Ethernet Consortium
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 02:15:47 +0000
════════════════════════
⌗ Tags: #Technology #AI Infrastructure #Broadcom #data centers #Distributed Computing #Ethernet #Jericho4 #MACsec #RoCE #Ultra Ethernet Consortium
Daily CyberSecurity
Broadcom’s Jericho4 Unleashed: The 3nm Switch-Router Connecting a Million XPUs for Distributed AI
Broadcom has shipped Jericho4, a new 3nm Ethernet router designed for distributed AI. It connects over a million XPUs across data centers with lossless, secure 3.2 Tbps HyperPorts.
⤷ Title: Meta Eyes Pika Labs: A Potential $500M Acquisition to Accelerate AI Video Generation
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 02:07:15 +0000
════════════════════════
⌗ Tags: #Technology #acquisition #AI #Generative AI #Meta #Pika Labs #Short_Form Video #Startup #Video Generation
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 02:07:15 +0000
════════════════════════
⌗ Tags: #Technology #acquisition #AI #Generative AI #Meta #Pika Labs #Short_Form Video #Startup #Video Generation
Daily CyberSecurity
Meta Eyes Pika Labs: A Potential $500M Acquisition to Accelerate AI Video Generation
Meta is reportedly in talks to acquire AI video startup Pika Labs, a move that would accelerate its push into generative AI and short-form video creation for its platforms.
⤷ Title: Elon Musk Files “MacroHard” Trademark, Reigniting Rivalry with Microsoft
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 02:02:22 +0000
════════════════════════
⌗ Tags: #Technology #AI #Bill Gates #Elon Musk #Grok #MacroHard #Microsoft #Tech News #Trademark #xAI
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 02:02:22 +0000
════════════════════════
⌗ Tags: #Technology #AI #Bill Gates #Elon Musk #Grok #MacroHard #Microsoft #Tech News #Trademark #xAI
Daily CyberSecurity
Elon Musk Files "MacroHard" Trademark, Reigniting Rivalry with Microsoft
Elon Musk's xAI has filed a trademark for “MacroHard,” a provocative jab at Microsoft. The move hints at a new multi-agent AI venture and reignites a simmering rivalry with Bill Gates.
⤷ Title: Android Security Update: Critical RCE Flaw (CVE-2025-48530) in System Component Patched
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 01:35:02 +0000
════════════════════════
⌗ Tags: #Android #Vulnerability Report #android #AOSP #CVE_2025_48530 #cybersecurity #rce #Remote Code Execution #Security Bulletin #Vulnerability
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 01:35:02 +0000
════════════════════════
⌗ Tags: #Android #Vulnerability Report #android #AOSP #CVE_2025_48530 #cybersecurity #rce #Remote Code Execution #Security Bulletin #Vulnerability
Daily CyberSecurity
Android Security Update: Critical RCE Flaw (CVE-2025-48530) in System Component Patched
Google's August 2025 Android Security Bulletin addresses a critical RCE flaw (CVE-2025-48530) in the core System component, which requires no user interaction for exploitation. Update now!
⤷ Title: New Android Malware Impersonates Indian Banks to Steal Data & Secretly Mine Monero
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 00:40:07 +0000
════════════════════════
⌗ Tags: #Malware #Android Malware #Axis Bank #Banking Trojan #Cryptojacking #India #IndusInd Bank #Monero #phishing #SBI Card #XMRig
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 00:40:07 +0000
════════════════════════
⌗ Tags: #Malware #Android Malware #Axis Bank #Banking Trojan #Cryptojacking #India #IndusInd Bank #Monero #phishing #SBI Card #XMRig
Daily CyberSecurity
New Android Malware Impersonates Indian Banks to Steal Data & Secretly Mine Monero
McAfee uncovers a new Android malware campaign targeting Indian users. The malware impersonates major banks to steal financial data and silently mines Monero in the background.
⤷ Title: Critical Triton Flaws (CVSS 9.8) Expose AI Servers to Remote Takeover – Patch Now!
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 00:35:13 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #AI #cybersecurity #Data Tampering #Inference Server #NVIDIA Triton #rce #Remote Code Execution #Vulnerability #Wiz Research
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 00:35:13 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #AI #cybersecurity #Data Tampering #Inference Server #NVIDIA Triton #rce #Remote Code Execution #Vulnerability #Wiz Research
Daily CyberSecurity
Critical Triton Flaws (CVSS 9.8) Expose AI Servers to Remote Takeover – Patch Now!
NVIDIA has patched multiple critical flaws (CVSS 9.8) in its Triton Inference Server. A vulnerability chain allows unauthenticated attackers to gain RCE and seize AI servers.
⤷ Title: PlayPraetor: New Android RAT Infects 11,000+ Devices with Real-Time On-Device Fraud
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 00:28:42 +0000
════════════════════════
⌗ Tags: #Malware #Android Malware #Chinese Threat Actors #cybersecurity #financial fraud #MaaS #ODF #On_Device Fraud #PlayPraetor #rat
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 00:28:42 +0000
════════════════════════
⌗ Tags: #Malware #Android Malware #Chinese Threat Actors #cybersecurity #financial fraud #MaaS #ODF #On_Device Fraud #PlayPraetor #rat
Daily CyberSecurity
PlayPraetor: New Android RAT Infects 11,000+ Devices with Real-Time On-Device Fraud
Cleafy uncovers PlayPraetor, a Chinese-speaking MaaS Android RAT that has infected 11,000+ devices, using real-time control via Accessibility Services to conduct on-device fraud.
⤷ Title: APT36 Targets Indian Government with Sophisticated Phishing, Bypassing MFA with Real-Time OTP Harvest
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 00:26:08 +0000
════════════════════════
⌗ Tags: #Cybercriminals #APT36 #cybersecurity #India #Kavach #MFA Bypass #Pakistan #phishing #Transparent Tribe #Typo_squatting
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 00:26:08 +0000
════════════════════════
⌗ Tags: #Cybercriminals #APT36 #cybersecurity #India #Kavach #MFA Bypass #Pakistan #phishing #Transparent Tribe #Typo_squatting
Daily CyberSecurity
APT36 Targets Indian Government with Sophisticated Phishing, Bypassing MFA with Real-Time OTP Harvest
APT36, a Pakistan-linked threat actor, is targeting Indian government officials with phishing campaigns that mimic official websites to harvest credentials and Kavach MFA OTPs in real time.
⤷ Title: New PXA Stealer Campaign Hits 62 Countries with Stealthy DLL Sideloading and Telegram Exfiltration
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 00:21:09 +0000
════════════════════════
⌗ Tags: #Malware #cloudflare #cybersecurity #DLL Sideloading #evasion #Infostealer #malware #PXA Stealer #SentinelOne #Telegram
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 00:21:09 +0000
════════════════════════
⌗ Tags: #Malware #cloudflare #cybersecurity #DLL Sideloading #evasion #Infostealer #malware #PXA Stealer #SentinelOne #Telegram
Daily CyberSecurity
New PXA Stealer Campaign Hits 62 Countries with Stealthy DLL Sideloading and Telegram Exfiltration
SentinelLABS and Beazley expose PXA Stealer, a Python-based infostealer campaign targeting 62 countries with stealthy DLL sideloading, decoy files, and Telegram-based data exfiltration.
⤷ Title: Critical Dell DD OS Flaw (CVSS 9.8) Allows Unauthenticated Remote Access
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 00:16:34 +0000
════════════════════════
⌗ Tags: #Vulnerability #Authentication Bypass #Command Injection #cybersecurity #DD OS #DDSH #dell #PowerProtect
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 00:16:34 +0000
════════════════════════
⌗ Tags: #Vulnerability #Authentication Bypass #Command Injection #cybersecurity #DD OS #DDSH #dell #PowerProtect
Daily CyberSecurity
Critical Dell DD OS Flaw (CVSS 9.8) Allows Unauthenticated Remote Access
Dell patched a critical flaw (CVE-2025-36594) in DD OS allowing unauthenticated remote auth bypass. DDSH CLI flaws (CVE-2025-30096-30099) also patched.
⤷ Title: The Evolution of Evasion: Raspberry Robin Malware Upgrades with New Encryption & UAC Bypass Exploit
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 00:10:15 +0000
════════════════════════
⌗ Tags: #Malware #ChaCha20 #CVE_2024_38196 #cybersecurity #evasion #Local Privilege Escalation #malware #Obfuscation #Raspberry Robin #tor
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 00:10:15 +0000
════════════════════════
⌗ Tags: #Malware #ChaCha20 #CVE_2024_38196 #cybersecurity #evasion #Local Privilege Escalation #malware #Obfuscation #Raspberry Robin #tor
Daily CyberSecurity
The Evolution of Evasion: Raspberry Robin Malware Upgrades with New Encryption & UAC Bypass Exploit
ThreatLabz reveals the evolution of Raspberry Robin malware, now featuring stronger encryption, complex obfuscation, and a new privilege escalation exploit to bypass detection.
⤷ Title: Beavertail Malware Returns: North Korean Hackers Use NPM Packages to Steal Crypto & Secrets
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 00:06:14 +0000
════════════════════════
⌗ Tags: #Cybercriminals #BeaverTail malware #cryptocurrency #cybersecurity #info_stealer #North Korea #npm #supply chain attack #Veracode
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 00:06:14 +0000
════════════════════════
⌗ Tags: #Cybercriminals #BeaverTail malware #cryptocurrency #cybersecurity #info_stealer #North Korea #npm #supply chain attack #Veracode
Daily CyberSecurity
Beavertail Malware Returns: North Korean Hackers Use NPM Packages to Steal Crypto & Secrets
Veracode warns of a North Korean cyber-espionage campaign using malicious NPM packages to spread Beavertail malware and steal crypto from developers via fake interview tasks.
⤷ Title: Kimsuky APT Escalates Cyberespionage with Stealthy LNK Files & Reflective Malware Payloads
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 00:01:08 +0000
════════════════════════
⌗ Tags: #Cybercriminals #APT #Cyberespionage #cybersecurity #Kimsuky #LNK Files #malware #North Korea #Reflective DLL Injection #south korea
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 00:01:08 +0000
════════════════════════
⌗ Tags: #Cybercriminals #APT #Cyberespionage #cybersecurity #Kimsuky #LNK Files #malware #North Korea #Reflective DLL Injection #south korea
Daily CyberSecurity
Kimsuky APT Escalates Cyberespionage with Stealthy LNK Files & Reflective Malware Payloads
A new report reveals Kimsuky, a North Korea-linked APT, is using sophisticated LNK files and reflective payloads to infiltrate systems and conduct cyberespionage against South Korean targets.
⤷ Title: Urgent Zero-Day Warning: SonicWall VPNs Under Attack, Akira Ransomware Deployed Within Hours
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 04 Aug 2025 23:24:09 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Akira #cybersecurity #Huntress #MFA Bypass #ransomware #security alert #SonicWall #vpn #zero_day
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 04 Aug 2025 23:24:09 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Akira #cybersecurity #Huntress #MFA Bypass #ransomware #security alert #SonicWall #vpn #zero_day
Daily CyberSecurity
Urgent Zero-Day Warning: SonicWall VPNs Under Attack, Akira Ransomware Deployed Within Hours
Huntress and other firms warn of a likely zero-day vulnerability in SonicWall VPNs. Attackers are bypassing MFA and deploying Akira ransomware within hours of initial access.
⤷ Title: DAY 1 Recon: Manual Reconnaissance: How I Explore Targets Like a Hacker (But With Good Intentions)
════════════════════════
𐀪 Author: Ayush Kumar
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 08:35:57 GMT
════════════════════════
⌗ Tags: #hacking #bug_bounty #ethical_hacking #programming #cybersecurity
════════════════════════
𐀪 Author: Ayush Kumar
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 08:35:57 GMT
════════════════════════
⌗ Tags: #hacking #bug_bounty #ethical_hacking #programming #cybersecurity
Medium
DAY 1 Recon: Manual Reconnaissance: How I Explore Targets Like a Hacker (But With Good Intentions)
Before the tools come out, I like to get my hands dirty — and here’s why that matters.
⤷ Title: Ticket to Trouble: How I Hijacked Support Tickets to See Everyone’s Complaints ️
════════════════════════
𐀪 Author: Iski
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 08:35:50 GMT
════════════════════════
⌗ Tags: #hacking #infosec #money #bug_bounty #cybersecurity
════════════════════════
𐀪 Author: Iski
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 08:35:50 GMT
════════════════════════
⌗ Tags: #hacking #infosec #money #bug_bounty #cybersecurity
Medium
Ticket to Trouble: How I Hijacked Support Tickets to See Everyone’s Complaints 🎟️😈
Free Link 🎈
⤷ Title: Burp Suite For Beginners: How I Learned the Proxy and Interceptor
════════════════════════
𐀪 Author: Ayush Kumar
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 08:35:21 GMT
════════════════════════
⌗ Tags: #programming #bug_bounty #hacking #ethical_hacking #cybersecurity
════════════════════════
𐀪 Author: Ayush Kumar
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 08:35:21 GMT
════════════════════════
⌗ Tags: #programming #bug_bounty #hacking #ethical_hacking #cybersecurity
Medium
Burp Suite For Beginners: How I Learned the Proxy and Interceptor
Ever tried to peek behind the curtain of a website? Maybe you’re curious how apps talk to each other. Or you keep hearing about “Burp…
⤷ Title: Reflected XSS Made Easy: Catching Real Bugs in the Wild
════════════════════════
𐀪 Author: Monika sharma
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 08:33:44 GMT
════════════════════════
⌗ Tags: #penetration_testing #tips_and_tricks #javanoscript #vulnerability #bug_bounty
════════════════════════
𐀪 Author: Monika sharma
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 08:33:44 GMT
════════════════════════
⌗ Tags: #penetration_testing #tips_and_tricks #javanoscript #vulnerability #bug_bounty
Medium
Reflected XSS Made Easy: Catching Real Bugs in the Wild
How a Simple Payload Uncovered a Real Vulnerability on MTN’s Website
⤷ Title: Extracting Data from the Subdomain Grave
════════════════════════
𐀪 Author: SIDDHANT SHUKLA
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 08:33:39 GMT
════════════════════════
⌗ Tags: #bug_bounty #hacking #technology #programming #cybersecurity
════════════════════════
𐀪 Author: SIDDHANT SHUKLA
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 08:33:39 GMT
════════════════════════
⌗ Tags: #bug_bounty #hacking #technology #programming #cybersecurity
Medium
Extracting Data from the Subdomain Grave
The buried aren’t always silent