Forwarded from OS Internals (Abolfazl Kazemi)
📢🐧 مخزن دورهی Linux Exploit Development روی گیتهاب ایجاد شد.
از این به بعد همهی منابع و فایلهای کمکی دوره از طریق این مخزن منتشر میشن.
📂 لینک مخزن:
👉 https://github.com/akazemi67/Linux-Exploit-Development-Course
⚠️ ویدئوها به زبان فارسی هستن و مستندات مخزن به زبان انگلیسی آماده شدن.
#linux #exploitdev #GitHub
از این به بعد همهی منابع و فایلهای کمکی دوره از طریق این مخزن منتشر میشن.
📂 لینک مخزن:
👉 https://github.com/akazemi67/Linux-Exploit-Development-Course
⚠️ ویدئوها به زبان فارسی هستن و مستندات مخزن به زبان انگلیسی آماده شدن.
#linux #exploitdev #GitHub
GitHub
GitHub - akazemi67/Linux-Exploit-Development-Course: This course provides a practical introduction to Linux reverse engineering…
This course provides a practical introduction to Linux reverse engineering and exploitation. You’ll learn how Linux binaries work under the hood, how vulnerabilities arise, and how to discover and ...
❏ </Mr. SAM/> ❏
░▒▓█ CisaAlerts █▓▒░
Citrix NetScaler Memory Overflow Vulnerability - undefined
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ CisaAlerts █▓▒░
Citrix NetScaler Memory Overflow Vulnerability - undefined
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cybersecurity and Infrastructure Security Agency CISA
Known Exploited Vulnerabilities Catalog | CISA
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the…
❏ </Mr. SAM/> ❏
░▒▓█ TheRecord █▓▒░
Governments, tech companies meet in Tokyo to share tips on fighting North Korea IT worker scheme
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ TheRecord █▓▒░
Governments, tech companies meet in Tokyo to share tips on fighting North Korea IT worker scheme
🔗 ➢➣➤ More ...
@NullError_ir 📢
therecord.media
Governments, tech companies meet in Tokyo to share tips on fighting North Korea IT worker scheme
The U.S. State Department said it worked with the Ministries of Foreign Affairs in Japan and South Korea to organize the forum, which had more than 130 attendees from freelance work platforms, payment service providers, cryptocurrency companies, AI firms…
❏ </Mr. SAM/> ❏
░▒▓█ DarkReading █▓▒░
1M Farmers Insurance Customer Data Compromised
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ DarkReading █▓▒░
1M Farmers Insurance Customer Data Compromised
🔗 ➢➣➤ More ...
@NullError_ir 📢
Darkreading
1M Farmers Insurance Customers' Data Compromised
Though the company is informing its customers of the breach, Farmers isn't publicly divulging what kinds of personal data were affected.
❏ </Mr. SAM/> ❏
░▒▓█ BleepingComputer █▓▒░
Citrix fixes critical NetScaler RCE flaw exploited in zero-day attacks
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ BleepingComputer █▓▒░
Citrix fixes critical NetScaler RCE flaw exploited in zero-day attacks
🔗 ➢➣➤ More ...
@NullError_ir 📢
BleepingComputer
Citrix fixes critical NetScaler RCE flaw exploited in zero-day attacks
Citrix fixed three NetScaler ADC and NetScaler Gateway flaws today, including a critical remote code execution flaw tracked as CVE-2025-7775 that was actively exploited in attacks as a zero-day vulnerability.
❏ </Mr. SAM/> ❏
░▒▓█ BleepingComputer █▓▒░
Google to verify all Android devs to block malware on Google Play
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ BleepingComputer █▓▒░
Google to verify all Android devs to block malware on Google Play
🔗 ➢➣➤ More ...
@NullError_ir 📢
BleepingComputer
Google to verify all Android devs to protect users from malware
Google is introducing a new defense for Android called 'Developer Verification' to block malware installations from sideloaded apps sourced from outside the official Google Play app store.
❏ </Mr. SAM/> ❏
░▒▓█ Unit42 █▓▒░
Data Is the New Diamond: Heists in the Digital Age
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ Unit42 █▓▒░
Data Is the New Diamond: Heists in the Digital Age
🔗 ➢➣➤ More ...
@NullError_ir 📢
Unit 42
Data Is the New Diamond: Heists in the Digital Age
Unit 42 explores the similarities between the social engineering and reconnaissance tactics used by financially motivated criminals.
❏ </Mr. SAM/> ❏
░▒▓█ SANS █▓▒░
ISC Stormcast For Wednesday, August 27th, 2025 https://isc.sans.edu/podcastdetail/9588, (Wed, Aug 27th)
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ SANS █▓▒░
ISC Stormcast For Wednesday, August 27th, 2025 https://isc.sans.edu/podcastdetail/9588, (Wed, Aug 27th)
🔗 ➢➣➤ More ...
@NullError_ir 📢
SANS Internet Storm Center
SANS Stormcast Wednesday, August 27th, 2025: Analyzing IDNs; Netscaler 0-Day Vuln; Git Vuln Exploited;
❏ </Mr. SAM/> ❏
░▒▓█ hackday █▓▒░
Google Will Require Developer Verification Even for Sideloading
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ hackday █▓▒░
Google Will Require Developer Verification Even for Sideloading
🔗 ➢➣➤ More ...
@NullError_ir 📢
Hackaday
Google Will Require Developer Verification Even For Sideloading
Do you like writing software for Android, perhaps even sideload the occasional APK onto your Android device? In that case some big changes are heading your way, with Google announcing that they wil…
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
New Hook Android Banking Malware With New Advanced Capabilities and Supports 107 Remote Commands
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
New Hook Android Banking Malware With New Advanced Capabilities and Supports 107 Remote Commands
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
New Hook Android Banking Malware With New Advanced Capabilities and Supports 107 Remote Commands
A sophisticated new variant of the Hook Android banking trojan has emerged with unprecedented capabilities that position it among the most advanced mobile malware families observed to date. This latest version, designated Hook Version 3, represents a significant…
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
China-based Threat Actor Mustang Panda’s Tactics, Techniques, and Procedures Unveiled
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
China-based Threat Actor Mustang Panda’s Tactics, Techniques, and Procedures Unveiled
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
China-based Threat Actor Mustang Panda’s Tactics, Techniques, and Procedures Unveiled
China-based threat actor Mustang Panda has emerged as one of the most sophisticated cyber espionage groups operating in the current threat landscape, with operations dating back to at least 2014. This advanced persistent threat (APT) group has systematically…
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
Salesloft Drift Hacked to Steal OAuth Tokens and Exfiltrate from Salesforce Corporate Instances
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
Salesloft Drift Hacked to Steal OAuth Tokens and Exfiltrate from Salesforce Corporate Instances
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
Salesloft Drift Hacked to Steal OAuth Tokens and Exfiltrate from Salesforce Corporate Instances
A sophisticated data exfiltration campaign targeting corporate Salesforce instances has exposed sensitive information from multiple organizations through compromised OAuth tokens associated with the Salesloft Drift third-party application.
❏ </Mr. SAM/> ❏
░▒▓█ DarkReading █▓▒░
African Law Enforcement Agencies Nab Cybercrime Syndicates
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ DarkReading █▓▒░
African Law Enforcement Agencies Nab Cybercrime Syndicates
🔗 ➢➣➤ More ...
@NullError_ir 📢
Darkreading
African Law Enforcement Nabs Cybercrime Syndicates
African nations work with Interpol and private-sector partners to disrupt cybercriminal operations on the continent, but more work needs to be done.
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
Critical Chrome Use After Free Vulnerability Let Attackers Execute Arbitrary Code
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
Critical Chrome Use After Free Vulnerability Let Attackers Execute Arbitrary Code
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
Critical Chrome Use After Free Vulnerability Let Attackers Execute Arbitrary Code
Google has released an emergency security update for Chrome to address a critical use-after-free vulnerability (CVE-2025-9478) in the ANGLE graphics library that could allow attackers to execute arbitrary code on compromised systems.
❏ </Mr. SAM/> ❏
░▒▓█ افتانا █▓▒░
همه توسعهدهندگان برنامههای اندرویدی احراز هویت خواهندشد
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ افتانا █▓▒░
همه توسعهدهندگان برنامههای اندرویدی احراز هویت خواهندشد
🔗 ➢➣➤ More ...
@NullError_ir 📢
AFTANA.ir
همه توسعهدهندگان برنامههای اندرویدی احراز هویت خواهندشد
گوگل اعلام کرده قصد دارد هویت همه توسعهدهندگانی را که اپلیکیشنهای اندروید را منتشر میکنند بررسی و تأیید کند؛ حتی توسعهدهندگانی که اپهایشان را خارج از گوگلپلی در دسترس قرار میدهند.
❏ </Mr. SAM/> ❏
░▒▓█ تاکیان █▓▒░
آسیبپذیری بحرانی در پلتفرم Securden PAM: کلیدهای شبکه در خطر سرقت
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ تاکیان █▓▒░
آسیبپذیری بحرانی در پلتفرم Securden PAM: کلیدهای شبکه در خطر سرقت
🔗 ➢➣➤ More ...
@NullError_ir 📢
www.takian.net
آسیبپذیری بحرانی در پلتفرم Securden PAM: کلیدهای شبکه در خطر سرقت
یک آسیبپذیری امنیتی بحرانی در پلتفرم مدیریت دسترسی ممتاز (Privileged Access Management) شرکت Securden کشف شده است که به مهاجمان احراز هویت نشده اجازه میدهد تا با دور زدن کامل مکانیزمهای امنیتی، کنترل سیستم را به دست گرفته و به تمام رمزهای عبور و اسرار…
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - hheydarian/task-programming-in-csharp-dotnet-persian: Persian translation of "Task Programming in C# and .NET" by Vaskaran…
Persian translation of "Task Programming in C# and .NET" by Vaskaran Sarcar. - hheydarian/task-programming-in-csharp-dotnet-persian
❏ </Mr. SAM/> ❏
░▒▓█ SANS █▓▒░
Interesting Technique to Launch a Shellcode, (Wed, Aug 27th)
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ SANS █▓▒░
Interesting Technique to Launch a Shellcode, (Wed, Aug 27th)
🔗 ➢➣➤ More ...
@NullError_ir 📢
SANS Internet Storm Center
Interesting Technique to Launch a Shellcode - SANS ISC
Interesting Technique to Launch a Shellcode, Author: Xavier Mertens