ظاهرا روسیه شروع به نصب مودمهای رادیویی روی پهپادهای شاهد ایرانی کرده است، که قبلاً روی پهپادهای گربرا نصب میشدند.
برای واحد جنگ الکترونیک (EW)، بسیار مهم است که دقیقاً بفهمند سیگنال این مودم چگونه به نظر میرسد. زیرا در این بازه فرکانسی، چندین نوع دیگر از پهپادها نیز پرواز میکنند.
منبع : کانالهای تلگرامی طرفدار اوکراین
@NullError_ir 📢
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
افزونه VPN کروم با بیش از ۱۰۰٬۰۰۰ نصب بهطور مخفیانه از صفحهنمایشها عکس میگیرد و دادههای حساس را استخراج میکند.
https://cybersecuritynews.com/legitimate-chrome-vpn/
@NullError_ir 📢
Please open Telegram to view this post
VIEW IN TELEGRAM
Cyber Security News
Chrome VPN Extension With 100,000+ Installs Silently Captures Screenshots and Exfiltrates Sensitive Data
Chrome extension FreeVPN.One, with 100K+ installs & verified badge, exposed as spyware stealing data and screenshots from users.
❏ </Mr. SAM/> ❏
░▒▓█ BleepingComputer █▓▒░
Colt confirms customer data stolen as Warlock ransomware auctions files
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ BleepingComputer █▓▒░
Colt confirms customer data stolen as Warlock ransomware auctions files
🔗 ➢➣➤ More ...
@NullError_ir 📢
BleepingComputer
Colt confirms customer data stolen as Warlock ransomware auctions files
UK-based telecommunications company Colt Technology Services confirms that customer documentation was stolen as Warlock ransomware gang auctions files.
❏ </Mr. SAM/> ❏
░▒▓█ DarkReading █▓▒░
Easy ChatGPT Downgrade Attack Undermines GPT-5 Security
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ DarkReading █▓▒░
Easy ChatGPT Downgrade Attack Undermines GPT-5 Security
🔗 ➢➣➤ More ...
@NullError_ir 📢
Dark Reading
Easy ChatGPT Downgrade Attack Undermines GPT-5 Security
By using brief, plain clues in their prompts that are likely to influence the app to query older models, a user can downgrade ChatGPT for malicious ends.
❏ </Mr. SAM/> ❏
░▒▓█ hackday █▓▒░
Using the 74HC595 Shift Register to Drive 7-Segment Displays
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ hackday █▓▒░
Using the 74HC595 Shift Register to Drive 7-Segment Displays
🔗 ➢➣➤ More ...
@NullError_ir 📢
Hackaday
Using The 74HC595 Shift Register To Drive 7-Segment Displays
In a recent video our hacker [Electronic Wizard] introduces the 74HC595 shift register and explains how to use it to drive 7-segment displays. [Electronic Wizard] explains that understanding how to…
❏ </Mr. SAM/> ❏
░▒▓█ cyberguy █▓▒░
Over 2 billion users face phishing risks after Google data leak
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cyberguy █▓▒░
Over 2 billion users face phishing risks after Google data leak
🔗 ➢➣➤ More ...
@NullError_ir 📢
Telegram
Mr. SAM
یکشنبه
۷ ( دی = ۱۰ ) ۱٤۰٤
28 ( دسامبر = december = 12 ) 2025
تکنیکها ، کالبدشکافی ، درک عمیق ، یک قدم جلوتر ...
https://news.1rj.ru/str/boost/NullError_ir
۷ ( دی = ۱۰ ) ۱٤۰٤
28 ( دسامبر = december = 12 ) 2025
تکنیکها ، کالبدشکافی ، درک عمیق ، یک قدم جلوتر ...
https://news.1rj.ru/str/boost/NullError_ir
❏ </Mr. SAM/> ❏
░▒▓█ DarkReading █▓▒░
System Shocks? EV Smart Charging Tech Poses Cyber-Risks
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ DarkReading █▓▒░
System Shocks? EV Smart Charging Tech Poses Cyber-Risks
🔗 ➢➣➤ More ...
@NullError_ir 📢
Darkreading
System Shocks? EV Smart Charging Tech Poses Cyber-Risks
Trend Micro's Salvatore Gariuolo talks with the lack Hat USA 2025 News Desk about the new ISO 15118 standard for electric vehicle smart charging.
❏ </Mr. SAM/> ❏
░▒▓█ BleepingComputer █▓▒░
Dev gets 4 years for creating kill switch on ex-employer's systems
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ BleepingComputer █▓▒░
Dev gets 4 years for creating kill switch on ex-employer's systems
🔗 ➢➣➤ More ...
@NullError_ir 📢
BleepingComputer
Dev gets 4 years for creating kill switch on ex-employer's systems
A software developer has been sentenced to four years in prison for sabotaging his ex-employer's Windows network with custom malware and a kill switch that locked out employees when his account was disabled.
❏ </Mr. SAM/> ❏
░▒▓█ hackday █▓▒░
This Pocket Multitool Weighs less than a Penny
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ hackday █▓▒░
This Pocket Multitool Weighs less than a Penny
🔗 ➢➣➤ More ...
@NullError_ir 📢
Hackaday
This Pocket Multitool Weighs Less Than A Penny
A multitool that weighs less than a penny? Yes, it exists. This video by [ToolTechGeek] shows his titanium flat-cut design tipping the scales at only 1.9 grams—lighter than the 2.5-gram copper penn…
❏ </Mr. SAM/> ❏
░▒▓█ hackday █▓▒░
Replicating the World’s Oldest Stringed Instrument
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ hackday █▓▒░
Replicating the World’s Oldest Stringed Instrument
🔗 ➢➣➤ More ...
@NullError_ir 📢
Hackaday
Replicating The World’s Oldest Stringed Instrument
Posts on Hackaday sometimes trend a little bit retro, but rarely do we cover hacks that reach back into the Bronze Age. Still, when musician [Peter Pringle] put out a video detailing how he replica…
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
ChatGPT-5 Downgrade Attack Let Hackers Bypass AI Security With Just a Few Words
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
ChatGPT-5 Downgrade Attack Let Hackers Bypass AI Security With Just a Few Words
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
ChatGPT-5 Downgrade Attack Let Hackers Bypass AI Security With Just a Few Words
A critical vulnerability in OpenAI's latest flagship model, ChatGPT-5, allows attackers to sidestep its advanced safety features using simple phrases.
❏ </Mr. SAM/> ❏
░▒▓█ SANS █▓▒░
ISC Stormcast For Friday, August 22nd, 2025 https://isc.sans.edu/podcastdetail/9582, (Fri, Aug 22nd)
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ SANS █▓▒░
ISC Stormcast For Friday, August 22nd, 2025 https://isc.sans.edu/podcastdetail/9582, (Fri, Aug 22nd)
🔗 ➢➣➤ More ...
@NullError_ir 📢
SANS Internet Storm Center
SANS Stormcast Friday, August 22nd, 2025: The -n switch; Commvault Exploit; Docker Desktop Escape Vuln;
❏ </Mr. SAM/> ❏
░▒▓█ hackday █▓▒░
Now that Commodore is Back, Could Amiga Be Next?
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ hackday █▓▒░
Now that Commodore is Back, Could Amiga Be Next?
🔗 ➢➣➤ More ...
@NullError_ir 📢
Hackaday
Now That Commodore Is Back, Could Amiga Be Next?
Now that Commodore has arisen from the depths of obscurity like Cthulhu awoken from R’lyeh, the question on every shoggoth’s squamose lips is this: “Will there be a new Commodore …
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
AI Systems Can Generate Working Exploits for Published CVEs in 10-15 Minutes
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
AI Systems Can Generate Working Exploits for Published CVEs in 10-15 Minutes
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
AI Systems Can Generate Working Exploits for Published CVEs in 10-15 Minutes
Artificial intelligence systems can automatically generate functional exploits for newly published Common Vulnerabilities and Exposures (CVEs) in just 10-15 minutes at approximately $1 per exploit.
❏ </Mr. SAM/> ❏
░▒▓█ TheHackersNews █▓▒░
Ex-Developer Jailed Four Years for Sabotaging Ohio Employer with Kill-Switch Malware
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ TheHackersNews █▓▒░
Ex-Developer Jailed Four Years for Sabotaging Ohio Employer with Kill-Switch Malware
🔗 ➢➣➤ More ...
@NullError_ir 📢
Telegram
Mr. SAM
یکشنبه
۷ ( دی = ۱۰ ) ۱٤۰٤
28 ( دسامبر = december = 12 ) 2025
تکنیکها ، کالبدشکافی ، درک عمیق ، یک قدم جلوتر ...
https://news.1rj.ru/str/boost/NullError_ir
۷ ( دی = ۱۰ ) ۱٤۰٤
28 ( دسامبر = december = 12 ) 2025
تکنیکها ، کالبدشکافی ، درک عمیق ، یک قدم جلوتر ...
https://news.1rj.ru/str/boost/NullError_ir
❏ </Mr. SAM/> ❏
░▒▓█ infosecwriteups █▓▒░
XSS Exploit via RichText Parser
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ infosecwriteups █▓▒░
XSS Exploit via RichText Parser
🔗 ➢➣➤ More ...
@NullError_ir 📢
Medium
XSS Exploit via RichText Parser
How a Flaw in Reddit’s Scheduled Post Feature Enabled Malicious JavaScript Execution
❏ </Mr. SAM/> ❏
░▒▓█ SecurityWeek █▓▒░
MITRE Updates List of Most Common Hardware Weaknesses
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ SecurityWeek █▓▒░
MITRE Updates List of Most Common Hardware Weaknesses
🔗 ➢➣➤ More ...
@NullError_ir 📢
SecurityWeek
MITRE Updates List of Most Common Hardware Weaknesses
MITRE has updated the list of Most Important Hardware Weaknesses to align it with evolving hardware security challenges.
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
New Linux Malware With Weaponized RAR Archive Deploys VShell Backdoor
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
New Linux Malware With Weaponized RAR Archive Deploys VShell Backdoor
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
New Linux Malware With Weaponized RAR Archive Deploys VShell Backdoor
New Linux malware uses malicious RAR filenames to drop VShell backdoor via spam surveys, exploiting shell operations & metadata.