❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
WinRAR 0-Day Vulnerabilities Exploited in Wild by Hackers – Detailed Case Study
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
WinRAR 0-Day Vulnerabilities Exploited in Wild by Hackers – Detailed Case Study
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
WinRAR 0-Day Vulnerabilities Exploited in Wild by Hackers – Detailed Case Study
The cybersecurity landscape has been significantly impacted by the discovery and active exploitation of two critical zero-day vulnerabilities in WinRAR.
❏ </Mr. SAM/> ❏
░▒▓█ SecurityWeek █▓▒░
AI Systems Vulnerable to Prompt Injection via Image Scaling Attack
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ SecurityWeek █▓▒░
AI Systems Vulnerable to Prompt Injection via Image Scaling Attack
🔗 ➢➣➤ More ...
@NullError_ir 📢
SecurityWeek
AI Systems Vulnerable to Prompt Injection via Image Scaling Attack
Researchers show how popular AI systems can be tricked into processing malicious instructions by hiding them in images.
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
PoC Exploit Released for Chrome 0-Day Vulnerability Exploited in the Wild
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
PoC Exploit Released for Chrome 0-Day Vulnerability Exploited in the Wild
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
PoC Exploit Released for Chrome 0-Day Vulnerability Exploited in the Wild
Google has disclosed a critical zero-day vulnerability in the V8 JavaScript engine used by Chrome, tracked as CVE-2025-5419.
❏ </Mr. SAM/> ❏
░▒▓█ SecurityWeek █▓▒░
Docker Desktop Vulnerability Leads to Host Compromise
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ SecurityWeek █▓▒░
Docker Desktop Vulnerability Leads to Host Compromise
🔗 ➢➣➤ More ...
@NullError_ir 📢
SecurityWeek
Docker Desktop Vulnerability Leads to Host Compromise
A critical vulnerability in Docker Desktop allows attackers to modify the filesystem of Windows hosts to become administrators.
❏ </Mr. SAM/> ❏
░▒▓█ Schneier █▓▒░
Encryption Backdoor in Military/Police Radios
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ Schneier █▓▒░
Encryption Backdoor in Military/Police Radios
🔗 ➢➣➤ More ...
@NullError_ir 📢
Schneier on Security
Encryption Backdoor in Military/Police Radios - Schneier on Security
I wrote about this in 2023. Here’s the story: Three Dutch security analysts discovered the vulnerabilities—five in total—in a European radio standard called TETRA (Terrestrial Trunked Radio), which is used in radios made by Motorola, Damm, Hytera, and others.…
❏ </Mr. SAM/> ❏
░▒▓█ hackday █▓▒░
Confirmation of Record 220 PeV Cosmic Neutrino Hit on Earth
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ hackday █▓▒░
Confirmation of Record 220 PeV Cosmic Neutrino Hit on Earth
🔗 ➢➣➤ More ...
@NullError_ir 📢
Hackaday
Confirmation Of Record 220 PeV Cosmic Neutrino Hit On Earth
Neutrinos are exceedingly common in the Universe, with billions of them zipping around us throughout the day from a variety of sources. Due to their extremely low mass and no electric charge they b…
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
WhatsApp Desktop Users At Risk of Code Execution Attacks with Python on Windows PCs
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
WhatsApp Desktop Users At Risk of Code Execution Attacks with Python on Windows PCs
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
WhatsApp Desktop Users At Risk of Code Execution Attacks with Python on Windows PCs
WhatsApp Desktop users who have Python installed on their Windows PCs are at risk of arbitrary code execution due to a flaw in how the application handles Python archive files.
❏ </Mr. SAM/> ❏
░▒▓█ TheHackersNews █▓▒░
AI-Driven Trends in Endpoint Security: What the 2025 Gartner® Magic Quadrant™ Reveals
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ TheHackersNews █▓▒░
AI-Driven Trends in Endpoint Security: What the 2025 Gartner® Magic Quadrant™ Reveals
🔗 ➢➣➤ More ...
@NullError_ir 📢
Telegram
Mr. SAM
یکشنبه
۷ ( دی = ۱۰ ) ۱٤۰٤
28 ( دسامبر = december = 12 ) 2025
تکنیکها ، کالبدشکافی ، درک عمیق ، یک قدم جلوتر ...
https://news.1rj.ru/str/boost/NullError_ir
۷ ( دی = ۱۰ ) ۱٤۰٤
28 ( دسامبر = december = 12 ) 2025
تکنیکها ، کالبدشکافی ، درک عمیق ، یک قدم جلوتر ...
https://news.1rj.ru/str/boost/NullError_ir
❏ </Mr. SAM/> ❏
░▒▓█ PortSwigger █▓▒░
Inline Style Exfiltration: leaking data with chained CSS conditionals
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ PortSwigger █▓▒░
Inline Style Exfiltration: leaking data with chained CSS conditionals
🔗 ➢➣➤ More ...
@NullError_ir 📢
PortSwigger Research
Inline Style Exfiltration: leaking data with chained CSS conditionals
I discovered how to use CSS to steal attribute data without selectors and stylesheet imports! This means you can now exploit CSS injection via style attributes! Learn how below: Someone asked if you c
❏ </Mr. SAM/> ❏
░▒▓█ BleepingComputer █▓▒░
Nissan confirms design studio data breach claimed by Qilin ransomware
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ BleepingComputer █▓▒░
Nissan confirms design studio data breach claimed by Qilin ransomware
🔗 ➢➣➤ More ...
@NullError_ir 📢
BleepingComputer
Nissan confirms design studio data breach claimed by Qilin ransomware
Nissan Japan has confirmed to BleepingComputer that it suffered a data breach following unauthorized access to a server of one of its subsidiaries, Creative Box Inc. (CBI).
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
CISA Warns of Git Arbitrary File Write Vulnerability Exploited in Attacks
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
CISA Warns of Git Arbitrary File Write Vulnerability Exploited in Attacks
🔗 ➢➣➤ More ...
@NullError_ir 📢
❏ </Mr. SAM/> ❏
░▒▓█ TheHackersNews █▓▒░
MixShell Malware Delivered via Contact Forms Targets U.S. Supply Chain Manufacturers
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ TheHackersNews █▓▒░
MixShell Malware Delivered via Contact Forms Targets U.S. Supply Chain Manufacturers
🔗 ➢➣➤ More ...
@NullError_ir 📢
Telegram
Mr. SAM
یکشنبه
۷ ( دی = ۱۰ ) ۱٤۰٤
28 ( دسامبر = december = 12 ) 2025
تکنیکها ، کالبدشکافی ، درک عمیق ، یک قدم جلوتر ...
https://news.1rj.ru/str/boost/NullError_ir
۷ ( دی = ۱۰ ) ۱٤۰٤
28 ( دسامبر = december = 12 ) 2025
تکنیکها ، کالبدشکافی ، درک عمیق ، یک قدم جلوتر ...
https://news.1rj.ru/str/boost/NullError_ir
❏ </Mr. SAM/> ❏
░▒▓█ TheRecord █▓▒░
Nevada state websites, phone lines knocked offline by cyberattack
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ TheRecord █▓▒░
Nevada state websites, phone lines knocked offline by cyberattack
🔗 ➢➣➤ More ...
@NullError_ir 📢
therecord.media
Nevada state websites, phone lines knocked offline by cyberattack
The governor added that the state is working with local, tribal and federal partners to restore services, and is “using temporary routing and operational workarounds to maintain public access where it is feasible."
❏ </Mr. SAM/> ❏
░▒▓█ DarkReading █▓▒░
The Hidden Risk of Consumer Devices in the Hybrid Workforce
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ DarkReading █▓▒░
The Hidden Risk of Consumer Devices in the Hybrid Workforce
🔗 ➢➣➤ More ...
@NullError_ir 📢
Darkreading
The Risk of Consumer Devices in the Hybrid Workforce
Until businesses begin to account for uncontrolled variables in their threat models, attackers will continue to exploit the weakest link in the chain.
❏ </Mr. SAM/> ❏
░▒▓█ SecurityWeek █▓▒░
Healthcare Services Group Data Breach Impacts 624,000
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ SecurityWeek █▓▒░
Healthcare Services Group Data Breach Impacts 624,000
🔗 ➢➣➤ More ...
@NullError_ir 📢
SecurityWeek
Healthcare Services Group Data Breach Impacts 624,000
The personal information of many individuals was stolen from Healthcare Services Group’s computer systems in 2024.
❏ </Mr. SAM/> ❏
░▒▓█ BleepingComputer █▓▒░
CISA warns of actively exploited Git code execution flaw
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ BleepingComputer █▓▒░
CISA warns of actively exploited Git code execution flaw
🔗 ➢➣➤ More ...
@NullError_ir 📢
BleepingComputer
CISA warns of actively exploited Git code execution flaw
The U.S. Cybersecurity & Infrastructure Security Agency (CISA) is warning of hackers exploiting an arbitrary code execution flaw in the Git distributed version control system.
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
Online PDF Editors Safe to Use? Detailed Analysis of Security Risks Associated With It
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
Online PDF Editors Safe to Use? Detailed Analysis of Security Risks Associated With It
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
Online PDF Editors Safe to Use? Detailed Analysis of Security Risks Associated With It
Online PDF editors have become ubiquitous tools for quick document manipulation, offering convenient alternatives to desktop software.
❏ </Mr. SAM/> ❏
░▒▓█ KrebsOnSecurity █▓▒░
DSLRoot, Proxies, and the Threat of ‘Legal Botnets’
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ KrebsOnSecurity █▓▒░
DSLRoot, Proxies, and the Threat of ‘Legal Botnets’
🔗 ➢➣➤ More ...
@NullError_ir 📢
Krebs on Security
DSLRoot, Proxies, and the Threat of ‘Legal Botnets’
The cybersecurity community on Reddit responded in disbelief this month when a self-described Air National Guard member with top secret security clearance began questioning the arrangement they'd made with company called DSLRoot, which was paying $250 a month…
❏ </Mr. SAM/> ❏
░▒▓█ SecurityWeek █▓▒░
Beyond the Prompt: Building Trustworthy Agent Systems
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ SecurityWeek █▓▒░
Beyond the Prompt: Building Trustworthy Agent Systems
🔗 ➢➣➤ More ...
@NullError_ir 📢
SecurityWeek
Beyond the Prompt: Building Trustworthy Agent Systems
Building secure AI agent systems requires a disciplined engineering approach focused on deliberate architecture and human oversight.
❏ </Mr. SAM/> ❏
░▒▓█ hackday █▓▒░
Where There Is No Down: Measuring Liquid Levels in Space
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ hackday █▓▒░
Where There Is No Down: Measuring Liquid Levels in Space
🔗 ➢➣➤ More ...
@NullError_ir 📢
Hackaday
Where There Is No Down: Measuring Liquid Levels In Space
As you can probably imagine, we get tips on a lot of really interesting projects here at Hackaday. Most are pretty serious, at least insofar as they aim to solve a specific problem in some new and …
❏ </Mr. SAM/> ❏
░▒▓█ citizenlab █▓▒░
Job Posting: Systems and Security Administrator
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ citizenlab █▓▒░
Job Posting: Systems and Security Administrator
🔗 ➢➣➤ More ...
@NullError_ir 📢
The Citizen Lab
Job Posting
Join our team! We are hiring a Systems and Security Administrator to oversee the daily operations of networks and systems administration and oversee security and administration of all information technology in the Citizen Lab. Apply by September 10, 2025.