❏ </Mr. SAM/> ❏
░▒▓█ hackday █▓▒░
Hackaday Podcast Episode 334: Radioactive Shrimp Clocks, Funky Filaments, Owning the Hardware
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ hackday █▓▒░
Hackaday Podcast Episode 334: Radioactive Shrimp Clocks, Funky Filaments, Owning the Hardware
🔗 ➢➣➤ More ...
@NullError_ir 📢
Hackaday
Hackaday Podcast Episode 334: Radioactive Shrimp Clocks, Funky Filaments, Owning The Hardware
In this episode of the Hackaday Podcast, editors Elliot Williams and Tom Nardi start out with a warning about potentially radioactive shrimp entering the American food supply via Walmart, and thing…
❏ </Mr. SAM/> ❏
░▒▓█ BleepingComputer █▓▒░
APT36 hackers abuse Linux .desktop files to install malware in new attacks
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ BleepingComputer █▓▒░
APT36 hackers abuse Linux .desktop files to install malware in new attacks
🔗 ➢➣➤ More ...
@NullError_ir 📢
BleepingComputer
APT36 hackers abuse Linux .desktop files to install malware in new attacks
The Pakistani APT36 cyberspies are using Linux .desktop files to load malware in new attacks against government and defense entities in India.
❏ </Mr. SAM/> ❏
░▒▓█ DarkReading █▓▒░
Interpol Arrests Over 1K Cybercriminals in 'Operation Serengeti 2.0'
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ DarkReading █▓▒░
Interpol Arrests Over 1K Cybercriminals in 'Operation Serengeti 2.0'
🔗 ➢➣➤ More ...
@NullError_ir 📢
Darkreading
Interpol Arrests 1K+ in 'Operation Serengeti 2.0'
The operation disrupted countless scams, and authorities seized a significant amount of evidence and recovered nearly $100 million in lost funds.
❏ </Mr. SAM/> ❏
░▒▓█ Schneier █▓▒░
I’m Spending the Year at the Munk School
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ Schneier █▓▒░
I’m Spending the Year at the Munk School
🔗 ➢➣➤ More ...
@NullError_ir 📢
Schneier on Security
I'm Spending the Year at the Munk School - Schneier on Security
This academic year, I am taking a sabbatical from the Kennedy School and Harvard University. (It’s not a real sabbatical—I’m just an adjunct—but it’s the same idea.) I will be spending the Fall 2025 and Spring 2026 semesters at the Munk School at the University…
❏ </Mr. SAM/> ❏
░▒▓█ Lifehacker █▓▒░
How to Tell If a Phone App Is Invading Your Privacy (and How to Limit It)
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ Lifehacker █▓▒░
How to Tell If a Phone App Is Invading Your Privacy (and How to Limit It)
🔗 ➢➣➤ More ...
@NullError_ir 📢
Lifehacker
How to Tell If a Phone App Is Invading Your Privacy (and How to Limit It)
Many apps you use every day are highly invasive—but you don't have to make it easy for companies and data brokers to obtain and use your information.
❏ </Mr. SAM/> ❏
░▒▓█ DarkReading █▓▒░
Silk Typhoon Attacks North American Orgs in the Cloud
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ DarkReading █▓▒░
Silk Typhoon Attacks North American Orgs in the Cloud
🔗 ➢➣➤ More ...
@NullError_ir 📢
Dark Reading
Silk Typhoon Attacks North American Orgs in the Cloud
A Chinese APT is going where most APTs don't: deep into the cloud, compromising supply chains and deploying uncommon malware.
❏ </Mr. SAM/> ❏
░▒▓█ hackday █▓▒░
How to Stop Zeus from Toasting Your Pi
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ hackday █▓▒░
How to Stop Zeus from Toasting Your Pi
🔗 ➢➣➤ More ...
@NullError_ir 📢
Hackaday
How To Stop Zeus From Toasting Your Pi
If you’ve ever lost gear to lightning or power spikes, you know what a pain they are. Out in rural Arkansas, where [vinthewrench] lives, the grid is more chaos than comfort – especially when …
❏ </Mr. SAM/> ❏
░▒▓█ BleepingComputer █▓▒░
Murky Panda hackers exploit cloud trust to hack downstream customers
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ BleepingComputer █▓▒░
Murky Panda hackers exploit cloud trust to hack downstream customers
🔗 ➢➣➤ More ...
@NullError_ir 📢
BleepingComputer
Murky Panda hackers exploit cloud trust to hack downstream customers
A Chinese state-sponsored hacking group known as Murky Panda (Silk Typhoon) exploits trusted relationships in cloud environments to gain initial access to the networks and data of downstream customers.
❏ </Mr. SAM/> ❏
░▒▓█ hackday █▓▒░
How’s the Weather? (Satellite Edition)
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ hackday █▓▒░
How’s the Weather? (Satellite Edition)
🔗 ➢➣➤ More ...
@NullError_ir 📢
Hackaday
How’s The Weather? (Satellite Edition)
When [Tom Nardi] reported on NOAA’s statement that many of its polar birds were no longer recommended for use, he mentioned that when the satellites do give up, there are other options if you…
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
Hackers Can Exfiltrate Windows Secrets and Credentials Silently by Evading EDR Detection
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
Hackers Can Exfiltrate Windows Secrets and Credentials Silently by Evading EDR Detection
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
Hackers Can Exfiltrate Windows Secrets and Credentials Silently by Evading EDR Detection
A method to silently exfiltrate Windows secrets and credentials, evading detection from most Endpoint Detection and Response (EDR) solutions.
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
Microsoft to Limit Onmicrosoft Domain Usage for Sending Emails
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
Microsoft to Limit Onmicrosoft Domain Usage for Sending Emails
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
Microsoft to Limit Onmicrosoft Domain Usage for Sending Emails
Microsoft has announced significant restrictions on email sending capabilities for organizations using default onmicrosoft.com domains, implementing a throttling system that limits external email delivery to 100 recipients per organization every 24 hours.
❏ </Mr. SAM/> ❏
░▒▓█ افتانا █▓▒░
ادعای هک شدن ارتباطات شبکه کشتیرانی ایران
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ افتانا █▓▒░
ادعای هک شدن ارتباطات شبکه کشتیرانی ایران
🔗 ➢➣➤ More ...
@NullError_ir 📢
AFTANA.ir
ادعای هک شدن ارتباطات شبکه کشتیرانی ایران
یک گروه هکری با انتشار تصاویری مدعیشده شبکه ارتباطی بیش از ۶۰ کشتی متعلق به دو شرکت بزرگ دریایی جمهوری اسلامی ایران را از کار انداخته و ارتباط آنها با یکدیگر، بنادر و جهان خارج را مختل کرده است.
❏ </Mr. SAM/> ❏
░▒▓█ افتانا █▓▒░
این هکرها آسیبپذیری را پس از نفوذ وصله میکنند
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ افتانا █▓▒░
این هکرها آسیبپذیری را پس از نفوذ وصله میکنند
🔗 ➢➣➤ More ...
@NullError_ir 📢
AFTANA.ir
این هکرها آسیبپذیری را پس از نفوذ وصله میکنند
پژوهشگران امنیتی هشدار میدهند: مهاجمان از آسیبپذیری وصلهنشده ActiveMQ برای استقرار بدافزار DripDropper روی سیستمهای لینوکسی استفاده کرده و حتی پس از نفوذ، حفره امنیتی را ترمیم میکنند تا دسترسیشان پنهان بماند.
❏ </Mr. SAM/> ❏
░▒▓█ TheHackersNews █▓▒░
GeoServer Exploits, PolarEdge, and Gayfemboy Push Cybercrime Beyond Traditional Botnets
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ TheHackersNews █▓▒░
GeoServer Exploits, PolarEdge, and Gayfemboy Push Cybercrime Beyond Traditional Botnets
🔗 ➢➣➤ More ...
@NullError_ir 📢
Telegram
Mr. SAM
یکشنبه
۷ ( دی = ۱۰ ) ۱٤۰٤
28 ( دسامبر = december = 12 ) 2025
تکنیکها ، کالبدشکافی ، درک عمیق ، یک قدم جلوتر ...
https://news.1rj.ru/str/boost/NullError_ir
۷ ( دی = ۱۰ ) ۱٤۰٤
28 ( دسامبر = december = 12 ) 2025
تکنیکها ، کالبدشکافی ، درک عمیق ، یک قدم جلوتر ...
https://news.1rj.ru/str/boost/NullError_ir
❏ </Mr. SAM/> ❏
░▒▓█ hackday █▓▒░
Solar Powered Pyrolysis Facility Converts Scrap Plastic into Fuel
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ hackday █▓▒░
Solar Powered Pyrolysis Facility Converts Scrap Plastic into Fuel
🔗 ➢➣➤ More ...
@NullError_ir 📢
Hackaday
Solar Powered Pyrolysis Facility Converts Scrap Plastic Into Fuel
[naturejab] shows off his solar powered pyrolysis machine which can convert scrap plastic into fuel. According to the video, this is the world’s most complex hand-made pyrolysis reactor ever …