❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
Git 2.51 Released With Performance Optimizations and SHA-256 as Default hash Function
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
Git 2.51 Released With Performance Optimizations and SHA-256 as Default hash Function
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
Git 2.51 Released With Performance Optimizations and SHA-256 as Default hash Function
Git 2.51.0 has been officially released after an accelerated 8-week development cycle, introducing significant performance improvements and security enhancements that lay the groundwork for the upcoming Git 3.0 major release.
❏ </Mr. SAM/> ❏
░▒▓█ TheHackersNews █▓▒░
Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ TheHackersNews █▓▒░
Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts
🔗 ➢➣➤ More ...
@NullError_ir 📢
Telegram
Mr. SAM
یکشنبه
۷ ( دی = ۱۰ ) ۱٤۰٤
28 ( دسامبر = december = 12 ) 2025
تکنیکها ، کالبدشکافی ، درک عمیق ، یک قدم جلوتر ...
https://news.1rj.ru/str/boost/NullError_ir
۷ ( دی = ۱۰ ) ۱٤۰٤
28 ( دسامبر = december = 12 ) 2025
تکنیکها ، کالبدشکافی ، درک عمیق ، یک قدم جلوتر ...
https://news.1rj.ru/str/boost/NullError_ir
❏ </Mr. SAM/> ❏
░▒▓█ Mandiant █▓▒░
A Cereal Offender: Analyzing the CORNFLAKE.V3 Backdoor
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ Mandiant █▓▒░
A Cereal Offender: Analyzing the CORNFLAKE.V3 Backdoor
🔗 ➢➣➤ More ...
@NullError_ir 📢
Google Cloud Blog
A Cereal Offender: Analyzing the CORNFLAKE.V3 Backdoor | Google Cloud Blog
A campaign involving a financially motivated group deploying a downloader that delivers CORNFLAKE.V3 malware.
❏ </Mr. SAM/> ❏
░▒▓█ TheRecord █▓▒░
Feds charge alleged administrator of ‘sophisticated’ Rapper Bot botnet
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ TheRecord █▓▒░
Feds charge alleged administrator of ‘sophisticated’ Rapper Bot botnet
🔗 ➢➣➤ More ...
@NullError_ir 📢
therecord.media
Feds charge alleged administrator of ‘sophisticated’ Rapper Bot botnet
A 22-year-old Oregon man has been charged with running a powerful botnet-for-hire service used to launch hundreds of thousands of cyberattacks worldwide, the U.S. Justice Department said.
❏ </Mr. SAM/> ❏
░▒▓█ DarkReading █▓▒░
Europe's Ransomware Surge Is a Warning Shot for US Defenders
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ DarkReading █▓▒░
Europe's Ransomware Surge Is a Warning Shot for US Defenders
🔗 ➢➣➤ More ...
@NullError_ir 📢
Darkreading
Europe's Ransomware Surge Is a Warning Shot for US Defenders
We can strip attackers of their power by implementing layered defenses, ruthless patch management, and incident response that assumes failure and prioritizes transparency.
❏ </Mr. SAM/> ❏
░▒▓█ SecurityWeek █▓▒░
GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ SecurityWeek █▓▒░
GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models
🔗 ➢➣➤ More ...
@NullError_ir 📢
SecurityWeek
GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models
Instead of GPT-5 Pro, your query could be quietly redirected to an older, weaker model, opening the door to jailbreaks, hallucinations, and unsafe outputs.
❏ </Mr. SAM/> ❏
░▒▓█ hackday █▓▒░
Death of the Cheque: Australia Moves On
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ hackday █▓▒░
Death of the Cheque: Australia Moves On
🔗 ➢➣➤ More ...
@NullError_ir 📢
Hackaday
Death Of The Cheque: Australia Moves On
Check (or cheques) have long been a standard way for moving money from one bank account to another. They’re essentially little more than a codified document that puts the necessary informatio…
❏ </Mr. SAM/> ❏
░▒▓█ BleepingComputer █▓▒░
Hackers steal Microsoft logins using legitimate ADFS redirects
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ BleepingComputer █▓▒░
Hackers steal Microsoft logins using legitimate ADFS redirects
🔗 ➢➣➤ More ...
@NullError_ir 📢
BleepingComputer
Hackers steal Microsoft logins using legitimate ADFS redirects
Hackers are using a novel technique that combines legitimate office.com links with Active Directory Federation Services (ADFS) to redirect users to a phishing page that steals Microsoft 365 logins.
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
Link11 Highlights Growing Cybersecurity Risks and Introduces Integrated WAAP Protection Platform
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
Link11 Highlights Growing Cybersecurity Risks and Introduces Integrated WAAP Protection Platform
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
Link11 Highlights Growing Cybersecurity Risks and Introduces Integrated WAAP Protection Platform
Link11, a Germany-based global IT security provider, has released insights into the evolving cybersecurity threat landscape and announced the capabilities.
❏ </Mr. SAM/> ❏
░▒▓█ TheRecord █▓▒░
Britain targets Kyrgyz crypto networks aiding Kremlin with sanctions
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ TheRecord █▓▒░
Britain targets Kyrgyz crypto networks aiding Kremlin with sanctions
🔗 ➢➣➤ More ...
@NullError_ir 📢
therecord.media
Britain targets Kyrgyz crypto networks aiding Kremlin with sanctions
The United Kingdom imposed a new tranche of sanctions targeting financial institutions and cryptocurrency networks in Kyrgyzstan that are accused of facilitating Russian sanctions evasion.
❏ </Mr. SAM/> ❏
░▒▓█ hackday █▓▒░
Building a Robotic Arm Without Breaking the Bank
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ hackday █▓▒░
Building a Robotic Arm Without Breaking the Bank
🔗 ➢➣➤ More ...
@NullError_ir 📢
Hackaday
Building A Robotic Arm Without Breaking The Bank
There are probably at least as many ways to construct a robotic arm as there are uses for them. In the case of [Thomas Sanladerer] his primary requirement for the robotic arm was to support a digit…
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins
A novel and highly tricky phishing campaign is actively stealing Microsoft 365 credentials by exploiting Microsoft's own Active Directory Federation Services (ADFS) to redirect users from legitimate office.com links to malicious login pages.
❏ </Mr. SAM/> ❏
░▒▓█ BleepingComputer █▓▒░
“Rapper Bot” malware seized, alleged developer identified and charged
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ BleepingComputer █▓▒░
“Rapper Bot” malware seized, alleged developer identified and charged
🔗 ➢➣➤ More ...
@NullError_ir 📢
BleepingComputer
“Rapper Bot” malware seized, alleged developer identified and charged
The U.S. Department of Justice (DoJ) announced charges against the alleged developer and administrator of the "Rapper Bot" DDoS-for-hire botnet.
❏ </Mr. SAM/> ❏
░▒▓█ SANS █▓▒░
Airtell Router Scans, and Mislabeled usernames, (Wed, Aug 20th)
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ SANS █▓▒░
Airtell Router Scans, and Mislabeled usernames, (Wed, Aug 20th)
🔗 ➢➣➤ More ...
@NullError_ir 📢
SANS Internet Storm Center
Airtell Router Scans, and Mislabeled usernames - SANS ISC
Airtell Router Scans, and Mislabeled usernames, Author: Johannes Ullrich
❏ </Mr. SAM/> ❏
░▒▓█ BleepingComputer █▓▒░
Apple fixes new zero-day flaw exploited in targeted attacks
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ BleepingComputer █▓▒░
Apple fixes new zero-day flaw exploited in targeted attacks
🔗 ➢➣➤ More ...
@NullError_ir 📢
BleepingComputer
Apple fixes new zero-day flaw exploited in targeted attacks
Apple has released emergency updates to patch another zero-day vulnerability that was exploited in an "extremely sophisticated attack."
❏ </Mr. SAM/> ❏
░▒▓█ TheHackersNews █▓▒░
DOM-Based Extension Clickjacking Exposes Popular Password Managers to Credential and Data Theft
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ TheHackersNews █▓▒░
DOM-Based Extension Clickjacking Exposes Popular Password Managers to Credential and Data Theft
🔗 ➢➣➤ More ...
@NullError_ir 📢
Telegram
Mr. SAM
یکشنبه
۷ ( دی = ۱۰ ) ۱٤۰٤
28 ( دسامبر = december = 12 ) 2025
تکنیکها ، کالبدشکافی ، درک عمیق ، یک قدم جلوتر ...
https://news.1rj.ru/str/boost/NullError_ir
۷ ( دی = ۱۰ ) ۱٤۰٤
28 ( دسامبر = december = 12 ) 2025
تکنیکها ، کالبدشکافی ، درک عمیق ، یک قدم جلوتر ...
https://news.1rj.ru/str/boost/NullError_ir
❏ </Mr. SAM/> ❏
░▒▓█ DarkReading █▓▒░
How Outer Space Became the Next Big Attack Surface
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ DarkReading █▓▒░
How Outer Space Became the Next Big Attack Surface
🔗 ➢➣➤ More ...
@NullError_ir 📢
Darkreading
How Outer Space Became the Next Big Attack Surface
VisionSpace Technologies' Andrzej Olchawa and Milenko Starcik discussed a set of vulnerabilities capable of ending space missions at the Black Hat USA 2025 News Desk.
❏ </Mr. SAM/> ❏
░▒▓█ hackday █▓▒░
FLOSS Weekly Episode 843: Money Usually Helps
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ hackday █▓▒░
FLOSS Weekly Episode 843: Money Usually Helps
🔗 ➢➣➤ More ...
@NullError_ir 📢
Hackaday
FLOSS Weekly Episode 843: Money Usually Helps
This week Jonathan and Dan chat with Farid Abdelnour about Kdenlive! It’s top quality video editing software, and happens to be what we use to edit the show! What’s next for the project…
❏ </Mr. SAM/> ❏
░▒▓█ infosecwriteups █▓▒░
“Day 7: API Hacking — How I Stole 5000 OAuth Tokens & Won $300”
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ infosecwriteups █▓▒░
“Day 7: API Hacking — How I Stole 5000 OAuth Tokens & Won $300”
🔗 ➢➣➤ More ...
@NullError_ir 📢
Medium
“Day 7: API Hacking — How I Stole 5000 OAuth Tokens & Won $300”
Last month, while testing a “secure” fintech app, I discovered an unprotected Firebase database leaking OAuth tokens, bank account links…
❏ </Mr. SAM/> ❏
░▒▓█ TheRecord █▓▒░
Russian state cyber group Static Tundra exploiting Cisco devices, FBI warns
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ TheRecord █▓▒░
Russian state cyber group Static Tundra exploiting Cisco devices, FBI warns
🔗 ➢➣➤ More ...
@NullError_ir 📢
therecord.media
Russian state cyber group Static Tundra exploiting Cisco devices, FBI warns
A Russian cyber-espionage group is increasingly targeting unpatched Cisco networking devices through a vulnerability first discovered in 2018, the FBI warned.