❏ </Mr. SAM/> ❏
░▒▓█ SecurityWeek █▓▒░
In Other News: McDonald’s Hack, 1,200 Arrested in Africa, DaVita Breach Grows to 2.7M
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ SecurityWeek █▓▒░
In Other News: McDonald’s Hack, 1,200 Arrested in Africa, DaVita Breach Grows to 2.7M
🔗 ➢➣➤ More ...
@NullError_ir 📢
SecurityWeek
In Other News: McDonald’s Hack, 1,200 Arrested in Africa, DaVita Breach Grows to 2.7M
Noteworthy stories that might have slipped under the radar: cryptojacker sentenced to prison, ECC.fail Rowhammer attack, and Microsoft limits China’s access to MAPP.
گروه سایبری لبدوختگان در اقدامی موسوم به موج دوم حمله سایبری ادعای حمله به شبکه های ارتباطی شرکت های کشتیرانی وابسته به رژیم ایران IRISL و NITC و هک ۶۴ کشتی ایرانی در دریا کردند. سیستمهای ناوبری پاک شده، لینکهای ماهوارهای قطع، نفتکشها و کشتیهای باری همچنان وسط اقیانوس و آفلاین .
@NullError_ir 📢
Please open Telegram to view this post
VIEW IN TELEGRAM
Telegram
Mr. SAM
یکشنبه
۷ ( دی = ۱۰ ) ۱٤۰٤
28 ( دسامبر = december = 12 ) 2025
تکنیکها ، کالبدشکافی ، درک عمیق ، یک قدم جلوتر ...
https://news.1rj.ru/str/boost/NullError_ir
۷ ( دی = ۱۰ ) ۱٤۰٤
28 ( دسامبر = december = 12 ) 2025
تکنیکها ، کالبدشکافی ، درک عمیق ، یک قدم جلوتر ...
https://news.1rj.ru/str/boost/NullError_ir
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
New Cryptojacking Attack Exploits Redis Servers to Install Miners and Disable Defenses
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
New Cryptojacking Attack Exploits Redis Servers to Install Miners and Disable Defenses
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
New Cryptojacking Attack Exploits Redis Servers to Install Miners and Disable Defenses
TA-NATALSTATUS cryptojacking hits Redis servers globally, with infection rates up to 41% in Finland and high impact across nations.
❏ </Mr. SAM/> ❏
░▒▓█ TheHackersNews █▓▒░
Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ TheHackersNews █▓▒░
Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection
🔗 ➢➣➤ More ...
@NullError_ir 📢
Telegram
Mr. SAM
یکشنبه
۷ ( دی = ۱۰ ) ۱٤۰٤
28 ( دسامبر = december = 12 ) 2025
تکنیکها ، کالبدشکافی ، درک عمیق ، یک قدم جلوتر ...
https://news.1rj.ru/str/boost/NullError_ir
۷ ( دی = ۱۰ ) ۱٤۰٤
28 ( دسامبر = december = 12 ) 2025
تکنیکها ، کالبدشکافی ، درک عمیق ، یک قدم جلوتر ...
https://news.1rj.ru/str/boost/NullError_ir
❏ </Mr. SAM/> ❏
░▒▓█ DarkReading █▓▒░
Apple Patches Zero-Day Flaw Used in 'Sophisticated' Attack
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ DarkReading █▓▒░
Apple Patches Zero-Day Flaw Used in 'Sophisticated' Attack
🔗 ➢➣➤ More ...
@NullError_ir 📢
Dark Reading
Apple Fixes Zero Day Used in 'Sophisticated' Attack
CVE-2025-43300 is the latest zero-day flaw used in cyberattacks against "targeted individuals," which could signify spyware or nation-state hacking.
❏ </Mr. SAM/> ❏
░▒▓█ hackday █▓▒░
This Week in Security: Anime Catgirls, Illegal AdBlock, and Disputed Research
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ hackday █▓▒░
This Week in Security: Anime Catgirls, Illegal AdBlock, and Disputed Research
🔗 ➢➣➤ More ...
@NullError_ir 📢
Hackaday
This Week In Security: Anime Catgirls, Illegal AdBlock, And Disputed Research
You may have noticed the Anime Catgirls when trying to get to the Linux Kernel’s mailing list, or one of any number of other sites associated with Open Source projects. [Tavis Ormandy] had th…
❏ </Mr. SAM/> ❏
░▒▓█ BleepingComputer █▓▒░
Fake Mac fixes trick users into installing new Shamos infostealer
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ BleepingComputer █▓▒░
Fake Mac fixes trick users into installing new Shamos infostealer
🔗 ➢➣➤ More ...
@NullError_ir 📢
BleepingComputer
Fake Mac fixes trick users into installing new Shamos infostealer
A new infostealer malware targeting Mac devices, called 'Shamos,' is targeting Mac devices in ClickFix attacks that impersonate troubleshooting guides and fixes.
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
Chinese MURKY PANDA Attacking Government and Professional Services Entities
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
Chinese MURKY PANDA Attacking Government and Professional Services Entities
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
Chinese MURKY PANDA Attacking Government and Professional Services Entities
China-linked APT MURKY PANDA targets North American gov, tech & legal sectors, exploiting cloud flaws & stealing sensitive data.
❏ </Mr. SAM/> ❏
░▒▓█ SecurityWeek █▓▒░
Large Interpol Cybercrime Crackdown in Africa Leads to the Arrest of Over 1,200 Suspects
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ SecurityWeek █▓▒░
Large Interpol Cybercrime Crackdown in Africa Leads to the Arrest of Over 1,200 Suspects
🔗 ➢➣➤ More ...
@NullError_ir 📢
SecurityWeek
Large Interpol Cybercrime Crackdown in Africa Leads to the Arrest of Over 1,200 Suspects
Dubbed Operation Serengeti 2.0, the operation took place between June and August.
❏ </Mr. SAM/> ❏
░▒▓█ hackday █▓▒░
Hackaday Podcast Episode 334: Radioactive Shrimp Clocks, Funky Filaments, Owning the Hardware
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ hackday █▓▒░
Hackaday Podcast Episode 334: Radioactive Shrimp Clocks, Funky Filaments, Owning the Hardware
🔗 ➢➣➤ More ...
@NullError_ir 📢
Hackaday
Hackaday Podcast Episode 334: Radioactive Shrimp Clocks, Funky Filaments, Owning The Hardware
In this episode of the Hackaday Podcast, editors Elliot Williams and Tom Nardi start out with a warning about potentially radioactive shrimp entering the American food supply via Walmart, and thing…
❏ </Mr. SAM/> ❏
░▒▓█ BleepingComputer █▓▒░
APT36 hackers abuse Linux .desktop files to install malware in new attacks
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ BleepingComputer █▓▒░
APT36 hackers abuse Linux .desktop files to install malware in new attacks
🔗 ➢➣➤ More ...
@NullError_ir 📢
BleepingComputer
APT36 hackers abuse Linux .desktop files to install malware in new attacks
The Pakistani APT36 cyberspies are using Linux .desktop files to load malware in new attacks against government and defense entities in India.
❏ </Mr. SAM/> ❏
░▒▓█ DarkReading █▓▒░
Interpol Arrests Over 1K Cybercriminals in 'Operation Serengeti 2.0'
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ DarkReading █▓▒░
Interpol Arrests Over 1K Cybercriminals in 'Operation Serengeti 2.0'
🔗 ➢➣➤ More ...
@NullError_ir 📢
Darkreading
Interpol Arrests 1K+ in 'Operation Serengeti 2.0'
The operation disrupted countless scams, and authorities seized a significant amount of evidence and recovered nearly $100 million in lost funds.
❏ </Mr. SAM/> ❏
░▒▓█ Schneier █▓▒░
I’m Spending the Year at the Munk School
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ Schneier █▓▒░
I’m Spending the Year at the Munk School
🔗 ➢➣➤ More ...
@NullError_ir 📢
Schneier on Security
I'm Spending the Year at the Munk School - Schneier on Security
This academic year, I am taking a sabbatical from the Kennedy School and Harvard University. (It’s not a real sabbatical—I’m just an adjunct—but it’s the same idea.) I will be spending the Fall 2025 and Spring 2026 semesters at the Munk School at the University…
❏ </Mr. SAM/> ❏
░▒▓█ Lifehacker █▓▒░
How to Tell If a Phone App Is Invading Your Privacy (and How to Limit It)
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ Lifehacker █▓▒░
How to Tell If a Phone App Is Invading Your Privacy (and How to Limit It)
🔗 ➢➣➤ More ...
@NullError_ir 📢
Lifehacker
How to Tell If a Phone App Is Invading Your Privacy (and How to Limit It)
Many apps you use every day are highly invasive—but you don't have to make it easy for companies and data brokers to obtain and use your information.
❏ </Mr. SAM/> ❏
░▒▓█ DarkReading █▓▒░
Silk Typhoon Attacks North American Orgs in the Cloud
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ DarkReading █▓▒░
Silk Typhoon Attacks North American Orgs in the Cloud
🔗 ➢➣➤ More ...
@NullError_ir 📢
Dark Reading
Silk Typhoon Attacks North American Orgs in the Cloud
A Chinese APT is going where most APTs don't: deep into the cloud, compromising supply chains and deploying uncommon malware.
❏ </Mr. SAM/> ❏
░▒▓█ hackday █▓▒░
How to Stop Zeus from Toasting Your Pi
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ hackday █▓▒░
How to Stop Zeus from Toasting Your Pi
🔗 ➢➣➤ More ...
@NullError_ir 📢
Hackaday
How To Stop Zeus From Toasting Your Pi
If you’ve ever lost gear to lightning or power spikes, you know what a pain they are. Out in rural Arkansas, where [vinthewrench] lives, the grid is more chaos than comfort – especially when …
❏ </Mr. SAM/> ❏
░▒▓█ BleepingComputer █▓▒░
Murky Panda hackers exploit cloud trust to hack downstream customers
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ BleepingComputer █▓▒░
Murky Panda hackers exploit cloud trust to hack downstream customers
🔗 ➢➣➤ More ...
@NullError_ir 📢
BleepingComputer
Murky Panda hackers exploit cloud trust to hack downstream customers
A Chinese state-sponsored hacking group known as Murky Panda (Silk Typhoon) exploits trusted relationships in cloud environments to gain initial access to the networks and data of downstream customers.