❏ </Mr. SAM/> ❏
░▒▓█ TheHackersNews █▓▒░
Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ TheHackersNews █▓▒░
Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection
🔗 ➢➣➤ More ...
@NullError_ir 📢
Telegram
Mr. SAM
یکشنبه
۷ ( دی = ۱۰ ) ۱٤۰٤
28 ( دسامبر = december = 12 ) 2025
تکنیکها ، کالبدشکافی ، درک عمیق ، یک قدم جلوتر ...
https://news.1rj.ru/str/boost/NullError_ir
۷ ( دی = ۱۰ ) ۱٤۰٤
28 ( دسامبر = december = 12 ) 2025
تکنیکها ، کالبدشکافی ، درک عمیق ، یک قدم جلوتر ...
https://news.1rj.ru/str/boost/NullError_ir
❏ </Mr. SAM/> ❏
░▒▓█ DarkReading █▓▒░
Apple Patches Zero-Day Flaw Used in 'Sophisticated' Attack
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ DarkReading █▓▒░
Apple Patches Zero-Day Flaw Used in 'Sophisticated' Attack
🔗 ➢➣➤ More ...
@NullError_ir 📢
Dark Reading
Apple Fixes Zero Day Used in 'Sophisticated' Attack
CVE-2025-43300 is the latest zero-day flaw used in cyberattacks against "targeted individuals," which could signify spyware or nation-state hacking.
❏ </Mr. SAM/> ❏
░▒▓█ hackday █▓▒░
This Week in Security: Anime Catgirls, Illegal AdBlock, and Disputed Research
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ hackday █▓▒░
This Week in Security: Anime Catgirls, Illegal AdBlock, and Disputed Research
🔗 ➢➣➤ More ...
@NullError_ir 📢
Hackaday
This Week In Security: Anime Catgirls, Illegal AdBlock, And Disputed Research
You may have noticed the Anime Catgirls when trying to get to the Linux Kernel’s mailing list, or one of any number of other sites associated with Open Source projects. [Tavis Ormandy] had th…
❏ </Mr. SAM/> ❏
░▒▓█ BleepingComputer █▓▒░
Fake Mac fixes trick users into installing new Shamos infostealer
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ BleepingComputer █▓▒░
Fake Mac fixes trick users into installing new Shamos infostealer
🔗 ➢➣➤ More ...
@NullError_ir 📢
BleepingComputer
Fake Mac fixes trick users into installing new Shamos infostealer
A new infostealer malware targeting Mac devices, called 'Shamos,' is targeting Mac devices in ClickFix attacks that impersonate troubleshooting guides and fixes.
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
Chinese MURKY PANDA Attacking Government and Professional Services Entities
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
Chinese MURKY PANDA Attacking Government and Professional Services Entities
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
Chinese MURKY PANDA Attacking Government and Professional Services Entities
China-linked APT MURKY PANDA targets North American gov, tech & legal sectors, exploiting cloud flaws & stealing sensitive data.
❏ </Mr. SAM/> ❏
░▒▓█ SecurityWeek █▓▒░
Large Interpol Cybercrime Crackdown in Africa Leads to the Arrest of Over 1,200 Suspects
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ SecurityWeek █▓▒░
Large Interpol Cybercrime Crackdown in Africa Leads to the Arrest of Over 1,200 Suspects
🔗 ➢➣➤ More ...
@NullError_ir 📢
SecurityWeek
Large Interpol Cybercrime Crackdown in Africa Leads to the Arrest of Over 1,200 Suspects
Dubbed Operation Serengeti 2.0, the operation took place between June and August.
❏ </Mr. SAM/> ❏
░▒▓█ hackday █▓▒░
Hackaday Podcast Episode 334: Radioactive Shrimp Clocks, Funky Filaments, Owning the Hardware
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ hackday █▓▒░
Hackaday Podcast Episode 334: Radioactive Shrimp Clocks, Funky Filaments, Owning the Hardware
🔗 ➢➣➤ More ...
@NullError_ir 📢
Hackaday
Hackaday Podcast Episode 334: Radioactive Shrimp Clocks, Funky Filaments, Owning The Hardware
In this episode of the Hackaday Podcast, editors Elliot Williams and Tom Nardi start out with a warning about potentially radioactive shrimp entering the American food supply via Walmart, and thing…
❏ </Mr. SAM/> ❏
░▒▓█ BleepingComputer █▓▒░
APT36 hackers abuse Linux .desktop files to install malware in new attacks
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ BleepingComputer █▓▒░
APT36 hackers abuse Linux .desktop files to install malware in new attacks
🔗 ➢➣➤ More ...
@NullError_ir 📢
BleepingComputer
APT36 hackers abuse Linux .desktop files to install malware in new attacks
The Pakistani APT36 cyberspies are using Linux .desktop files to load malware in new attacks against government and defense entities in India.
❏ </Mr. SAM/> ❏
░▒▓█ DarkReading █▓▒░
Interpol Arrests Over 1K Cybercriminals in 'Operation Serengeti 2.0'
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ DarkReading █▓▒░
Interpol Arrests Over 1K Cybercriminals in 'Operation Serengeti 2.0'
🔗 ➢➣➤ More ...
@NullError_ir 📢
Darkreading
Interpol Arrests 1K+ in 'Operation Serengeti 2.0'
The operation disrupted countless scams, and authorities seized a significant amount of evidence and recovered nearly $100 million in lost funds.
❏ </Mr. SAM/> ❏
░▒▓█ Schneier █▓▒░
I’m Spending the Year at the Munk School
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ Schneier █▓▒░
I’m Spending the Year at the Munk School
🔗 ➢➣➤ More ...
@NullError_ir 📢
Schneier on Security
I'm Spending the Year at the Munk School - Schneier on Security
This academic year, I am taking a sabbatical from the Kennedy School and Harvard University. (It’s not a real sabbatical—I’m just an adjunct—but it’s the same idea.) I will be spending the Fall 2025 and Spring 2026 semesters at the Munk School at the University…
❏ </Mr. SAM/> ❏
░▒▓█ Lifehacker █▓▒░
How to Tell If a Phone App Is Invading Your Privacy (and How to Limit It)
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ Lifehacker █▓▒░
How to Tell If a Phone App Is Invading Your Privacy (and How to Limit It)
🔗 ➢➣➤ More ...
@NullError_ir 📢
Lifehacker
How to Tell If a Phone App Is Invading Your Privacy (and How to Limit It)
Many apps you use every day are highly invasive—but you don't have to make it easy for companies and data brokers to obtain and use your information.
❏ </Mr. SAM/> ❏
░▒▓█ DarkReading █▓▒░
Silk Typhoon Attacks North American Orgs in the Cloud
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ DarkReading █▓▒░
Silk Typhoon Attacks North American Orgs in the Cloud
🔗 ➢➣➤ More ...
@NullError_ir 📢
Dark Reading
Silk Typhoon Attacks North American Orgs in the Cloud
A Chinese APT is going where most APTs don't: deep into the cloud, compromising supply chains and deploying uncommon malware.
❏ </Mr. SAM/> ❏
░▒▓█ hackday █▓▒░
How to Stop Zeus from Toasting Your Pi
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ hackday █▓▒░
How to Stop Zeus from Toasting Your Pi
🔗 ➢➣➤ More ...
@NullError_ir 📢
Hackaday
How To Stop Zeus From Toasting Your Pi
If you’ve ever lost gear to lightning or power spikes, you know what a pain they are. Out in rural Arkansas, where [vinthewrench] lives, the grid is more chaos than comfort – especially when …
❏ </Mr. SAM/> ❏
░▒▓█ BleepingComputer █▓▒░
Murky Panda hackers exploit cloud trust to hack downstream customers
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ BleepingComputer █▓▒░
Murky Panda hackers exploit cloud trust to hack downstream customers
🔗 ➢➣➤ More ...
@NullError_ir 📢
BleepingComputer
Murky Panda hackers exploit cloud trust to hack downstream customers
A Chinese state-sponsored hacking group known as Murky Panda (Silk Typhoon) exploits trusted relationships in cloud environments to gain initial access to the networks and data of downstream customers.
❏ </Mr. SAM/> ❏
░▒▓█ hackday █▓▒░
How’s the Weather? (Satellite Edition)
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ hackday █▓▒░
How’s the Weather? (Satellite Edition)
🔗 ➢➣➤ More ...
@NullError_ir 📢
Hackaday
How’s The Weather? (Satellite Edition)
When [Tom Nardi] reported on NOAA’s statement that many of its polar birds were no longer recommended for use, he mentioned that when the satellites do give up, there are other options if you…
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
Hackers Can Exfiltrate Windows Secrets and Credentials Silently by Evading EDR Detection
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
Hackers Can Exfiltrate Windows Secrets and Credentials Silently by Evading EDR Detection
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
Hackers Can Exfiltrate Windows Secrets and Credentials Silently by Evading EDR Detection
A method to silently exfiltrate Windows secrets and credentials, evading detection from most Endpoint Detection and Response (EDR) solutions.