❏ </Mr. SAM/> ❏
░▒▓█ hackday █▓▒░
Volkswagen Joins the Car-As-A-Service Movement With Its ID.3 BEV
🔗 ➢➣➤ More ...
░▒▓█ hackday █▓▒░
Volkswagen Joins the Car-As-A-Service Movement With Its ID.3 BEV
🔗 ➢➣➤ More ...
Hackaday
Volkswagen Joins The Car-As-A-Service Movement With Its ID.3 BEV
More and more car manufacturers these days are becoming interested in the recurring revenue model, with Volkswagen’s ID.3 BEV being the latest to have an optional ‘motor power upgrade&#…
❏ </Mr. SAM/> ❏
░▒▓█ Bleeping Computer █▓▒░
NY Business Council discloses data breach affecting 47,000 people
🔗 ➢➣➤ More ...
░▒▓█ Bleeping Computer █▓▒░
NY Business Council discloses data breach affecting 47,000 people
🔗 ➢➣➤ More ...
BleepingComputer
NY Business Council discloses data breach affecting 47,000 people
The Business Council of New York State (BCNYS) has revealed that attackers who breached its network in February stole the personal, financial, and health information of over 47,000 individuals.
❏ </Mr. SAM/> ❏
░▒▓█ RedCanary █▓▒░
Patching for persistence: How DripDropper Linux malware moves through the cloud
🔗 ➢➣➤ More ...
░▒▓█ RedCanary █▓▒░
Patching for persistence: How DripDropper Linux malware moves through the cloud
🔗 ➢➣➤ More ...
Red Canary
Patching for persistence: How DripDropper Linux malware moves through the cloud | Red Canary
DripDropper is a Red Canary-named Linux malware variant that uses an encrypted PyInstaller ELF file to communicate with a Dropbox account.
❏ </Mr. SAM/> ❏
░▒▓█ TheRecord █▓▒░
Drug development company Inotiv reports ransomware attack to SEC
🔗 ➢➣➤ More ...
░▒▓█ TheRecord █▓▒░
Drug development company Inotiv reports ransomware attack to SEC
🔗 ➢➣➤ More ...
therecord.media
Drug development company Inotiv reports ransomware attack to SEC
The Indiana-based pharmaceutical company Inotiv discovered a cybersecurity incident earlier this month and found the hackers had encrypted certain systems.
❏ </Mr. SAM/> ❏
░▒▓█ SecurityWeek █▓▒░
Australia’s TPG Telecom Investigating iiNet Hack
🔗 ➢➣➤ More ...
░▒▓█ SecurityWeek █▓▒░
Australia’s TPG Telecom Investigating iiNet Hack
🔗 ➢➣➤ More ...
SecurityWeek
Australia’s TPG Telecom Investigating iiNet Hack
TPG Telecom has disclosed a cybersecurity incident after discovering unauthorized access to an iiNet order management system.
❏ </Mr. SAM/> ❏
░▒▓█ Bleeping Computer █▓▒░
Microsoft: August security updates break Windows recovery, reset
🔗 ➢➣➤ More ...
░▒▓█ Bleeping Computer █▓▒░
Microsoft: August security updates break Windows recovery, reset
🔗 ➢➣➤ More ...
BleepingComputer
Microsoft: August security updates break Windows recovery, reset
Microsoft has confirmed that the August 2025 Windows security updates are breaking reset and recovery operations on systems running Windows 10 and older versions of Windows 11.
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
New Exploit for SAP 0-Day Vulnerability Allegedly Released in the Wild by ShinyHunters Hackers
🔗 ➢➣➤ More ...
░▒▓█ cybersecurity █▓▒░
New Exploit for SAP 0-Day Vulnerability Allegedly Released in the Wild by ShinyHunters Hackers
🔗 ➢➣➤ More ...
Cyber Security News
New Exploit for SAP 0-Day Vulnerability Allegedly Released in the Wild by ShinyHunters Hackers
A working exploit targeting critical SAP vulnerabilities CVE-2025-31324 and CVE-2025-42999 has been publicly released by the notorious cybercriminal group "Scattered LAPSUS$ Hunters – ShinyHunters" via Telegram channels, with VX Underground subsequently publishing…
❏ </Mr. SAM/> ❏
░▒▓█ TheHackersNews █▓▒░
Public Exploit for Chained SAP Flaws Exposes Unpatched Systems to Remote Code Execution
🔗 ➢➣➤ More ...
░▒▓█ TheHackersNews █▓▒░
Public Exploit for Chained SAP Flaws Exposes Unpatched Systems to Remote Code Execution
🔗 ➢➣➤ More ...
❏ </Mr. SAM/> ❏
░▒▓█ DarkReading █▓▒░
10 Major GitHub Risk Vectors Hidden in Plain Sight
🔗 ➢➣➤ More ...
░▒▓█ DarkReading █▓▒░
10 Major GitHub Risk Vectors Hidden in Plain Sight
🔗 ➢➣➤ More ...
Dark Reading
10 Major GitHub Risk Vectors Hidden in Plain Sight
By addressing these overlooked risk vectors, organizations can continue leveraging GitHub's innovation while protecting against sophisticated supply chain attacks targeting interconnected software.
❏ </Mr. SAM/> ❏
░▒▓█ Bleeping Computer █▓▒░
Pharma firm Inotiv says ransomware attack impacted operations
🔗 ➢➣➤ More ...
░▒▓█ Bleeping Computer █▓▒░
Pharma firm Inotiv says ransomware attack impacted operations
🔗 ➢➣➤ More ...
BleepingComputer
Pharma firm Inotiv says ransomware attack impacted operations
American pharmaceutical company Inotiv has disclosed that some of its systems and data have been encrypted in a ransomware attack, impacting the company's business operations.
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
MCDonald’s Free Nuggets Hack Leads to Expose of Confidential Data
🔗 ➢➣➤ More ...
░▒▓█ cybersecurity █▓▒░
MCDonald’s Free Nuggets Hack Leads to Expose of Confidential Data
🔗 ➢➣➤ More ...
Cyber Security News
McDonald’s Free Nuggets Hack Leads to Exposure of Confidential Data
A series of alarming vulnerabilities in McDonald's digital infrastructure, from free food exploits to exposed executive data.
❏ </Mr. SAM/> ❏
░▒▓█ PortSwigger █▓▒░
Beware the false false-positive: how to distinguish HTTP pipelining from request smuggling
🔗 ➢➣➤ More ...
░▒▓█ PortSwigger █▓▒░
Beware the false false-positive: how to distinguish HTTP pipelining from request smuggling
🔗 ➢➣➤ More ...
PortSwigger Research
Beware the false false-positive: how to distinguish HTTP pipelining from request smuggling
Sometimes people think they've found HTTP request smuggling, when they're actually just observing HTTP keep-alive or pipelining. This is usually a false positive, but sometimes there's actually a real
❏ </Mr. SAM/> ❏
░▒▓█ RedCanary █▓▒░
Respond faster and empower users with Red Canary Managed Phishing Response
🔗 ➢➣➤ More ...
░▒▓█ RedCanary █▓▒░
Respond faster and empower users with Red Canary Managed Phishing Response
🔗 ➢➣➤ More ...
Red Canary
Respond faster and empower users with Red Canary Managed Phishing Response | Red Canary
Managed Phishing Response offers AI-powered triage, rapid expert analysis, and tailored feedback for every user-reported phishing email
❏ </Mr. SAM/> ❏
░▒▓█ TheRecord █▓▒░
North Korea-linked hackers target embassies in Seoul in new espionage campaign
🔗 ➢➣➤ More ...
░▒▓█ TheRecord █▓▒░
North Korea-linked hackers target embassies in Seoul in new espionage campaign
🔗 ➢➣➤ More ...
therecord.media
North Korea-linked hackers target embassies in Seoul in new espionage campaign
North Korea-linked hackers were seen targeting more than a dozen embassies in Seoul with phishing emails.
❏ </Mr. SAM/> ❏
░▒▓█ hackday █▓▒░
How to Sink a Ship: Preparing the SS United States For its Final Journey
🔗 ➢➣➤ More ...
░▒▓█ hackday █▓▒░
How to Sink a Ship: Preparing the SS United States For its Final Journey
🔗 ➢➣➤ More ...
Hackaday
How To Sink A Ship: Preparing The SS United States For Its Final Journey
When we last brought you word of the SS United States, the future of the storied vessel was unclear. Since 1996, the 990 foot (302 meter) ship — the largest ocean liner ever to be constructed…
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
Microsoft Defender AI to Uncover Plain Text Credentials Within Active Directory
🔗 ➢➣➤ More ...
░▒▓█ cybersecurity █▓▒░
Microsoft Defender AI to Uncover Plain Text Credentials Within Active Directory
🔗 ➢➣➤ More ...
Cyber Security News
Microsoft Defender AI to Uncover Plain Text Credentials Within Active Directory
Microsoft has unveiled a groundbreaking AI-powered security feature that addresses one of cybersecurity's most persistent vulnerabilities: plain text credentials stored in Active Directory (AD) free text fields.
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
Scans From Hacked Cisco Small Business Routers, Linksys and Araknis are at the Raise
🔗 ➢➣➤ More ...
░▒▓█ cybersecurity █▓▒░
Scans From Hacked Cisco Small Business Routers, Linksys and Araknis are at the Raise
🔗 ➢➣➤ More ...
Cyber Security News
Scans From Hacked Cisco Small Business Routers, Linksys and Araknis are at the Raise
Researchers have identified a significant surge in malicious HTTP scanning activities originating from approximately 2,200 compromised small business routers across multiple vendors.