❏ </Mr. SAM/> ❏
░▒▓█ TheRecord █▓▒░
Governments, tech companies meet in Tokyo to share tips on fighting North Korea IT worker scheme
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ TheRecord █▓▒░
Governments, tech companies meet in Tokyo to share tips on fighting North Korea IT worker scheme
🔗 ➢➣➤ More ...
@NullError_ir 📢
therecord.media
Governments, tech companies meet in Tokyo to share tips on fighting North Korea IT worker scheme
The U.S. State Department said it worked with the Ministries of Foreign Affairs in Japan and South Korea to organize the forum, which had more than 130 attendees from freelance work platforms, payment service providers, cryptocurrency companies, AI firms…
❏ </Mr. SAM/> ❏
░▒▓█ DarkReading █▓▒░
1M Farmers Insurance Customer Data Compromised
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ DarkReading █▓▒░
1M Farmers Insurance Customer Data Compromised
🔗 ➢➣➤ More ...
@NullError_ir 📢
Darkreading
1M Farmers Insurance Customers' Data Compromised
Though the company is informing its customers of the breach, Farmers isn't publicly divulging what kinds of personal data were affected.
❏ </Mr. SAM/> ❏
░▒▓█ BleepingComputer █▓▒░
Citrix fixes critical NetScaler RCE flaw exploited in zero-day attacks
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ BleepingComputer █▓▒░
Citrix fixes critical NetScaler RCE flaw exploited in zero-day attacks
🔗 ➢➣➤ More ...
@NullError_ir 📢
BleepingComputer
Citrix fixes critical NetScaler RCE flaw exploited in zero-day attacks
Citrix fixed three NetScaler ADC and NetScaler Gateway flaws today, including a critical remote code execution flaw tracked as CVE-2025-7775 that was actively exploited in attacks as a zero-day vulnerability.
❏ </Mr. SAM/> ❏
░▒▓█ BleepingComputer █▓▒░
Google to verify all Android devs to block malware on Google Play
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ BleepingComputer █▓▒░
Google to verify all Android devs to block malware on Google Play
🔗 ➢➣➤ More ...
@NullError_ir 📢
BleepingComputer
Google to verify all Android devs to protect users from malware
Google is introducing a new defense for Android called 'Developer Verification' to block malware installations from sideloaded apps sourced from outside the official Google Play app store.
❏ </Mr. SAM/> ❏
░▒▓█ Unit42 █▓▒░
Data Is the New Diamond: Heists in the Digital Age
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ Unit42 █▓▒░
Data Is the New Diamond: Heists in the Digital Age
🔗 ➢➣➤ More ...
@NullError_ir 📢
Unit 42
Data Is the New Diamond: Heists in the Digital Age
Unit 42 explores the similarities between the social engineering and reconnaissance tactics used by financially motivated criminals.
❏ </Mr. SAM/> ❏
░▒▓█ SANS █▓▒░
ISC Stormcast For Wednesday, August 27th, 2025 https://isc.sans.edu/podcastdetail/9588, (Wed, Aug 27th)
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ SANS █▓▒░
ISC Stormcast For Wednesday, August 27th, 2025 https://isc.sans.edu/podcastdetail/9588, (Wed, Aug 27th)
🔗 ➢➣➤ More ...
@NullError_ir 📢
SANS Internet Storm Center
SANS Stormcast Wednesday, August 27th, 2025: Analyzing IDNs; Netscaler 0-Day Vuln; Git Vuln Exploited;
❏ </Mr. SAM/> ❏
░▒▓█ hackday █▓▒░
Google Will Require Developer Verification Even for Sideloading
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ hackday █▓▒░
Google Will Require Developer Verification Even for Sideloading
🔗 ➢➣➤ More ...
@NullError_ir 📢
Hackaday
Google Will Require Developer Verification Even For Sideloading
Do you like writing software for Android, perhaps even sideload the occasional APK onto your Android device? In that case some big changes are heading your way, with Google announcing that they wil…
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
New Hook Android Banking Malware With New Advanced Capabilities and Supports 107 Remote Commands
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
New Hook Android Banking Malware With New Advanced Capabilities and Supports 107 Remote Commands
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
New Hook Android Banking Malware With New Advanced Capabilities and Supports 107 Remote Commands
A sophisticated new variant of the Hook Android banking trojan has emerged with unprecedented capabilities that position it among the most advanced mobile malware families observed to date. This latest version, designated Hook Version 3, represents a significant…
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
China-based Threat Actor Mustang Panda’s Tactics, Techniques, and Procedures Unveiled
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
China-based Threat Actor Mustang Panda’s Tactics, Techniques, and Procedures Unveiled
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
China-based Threat Actor Mustang Panda’s Tactics, Techniques, and Procedures Unveiled
China-based threat actor Mustang Panda has emerged as one of the most sophisticated cyber espionage groups operating in the current threat landscape, with operations dating back to at least 2014. This advanced persistent threat (APT) group has systematically…
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
Salesloft Drift Hacked to Steal OAuth Tokens and Exfiltrate from Salesforce Corporate Instances
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
Salesloft Drift Hacked to Steal OAuth Tokens and Exfiltrate from Salesforce Corporate Instances
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
Salesloft Drift Hacked to Steal OAuth Tokens and Exfiltrate from Salesforce Corporate Instances
A sophisticated data exfiltration campaign targeting corporate Salesforce instances has exposed sensitive information from multiple organizations through compromised OAuth tokens associated with the Salesloft Drift third-party application.
❏ </Mr. SAM/> ❏
░▒▓█ DarkReading █▓▒░
African Law Enforcement Agencies Nab Cybercrime Syndicates
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ DarkReading █▓▒░
African Law Enforcement Agencies Nab Cybercrime Syndicates
🔗 ➢➣➤ More ...
@NullError_ir 📢
Darkreading
African Law Enforcement Nabs Cybercrime Syndicates
African nations work with Interpol and private-sector partners to disrupt cybercriminal operations on the continent, but more work needs to be done.
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
Critical Chrome Use After Free Vulnerability Let Attackers Execute Arbitrary Code
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
Critical Chrome Use After Free Vulnerability Let Attackers Execute Arbitrary Code
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
Critical Chrome Use After Free Vulnerability Let Attackers Execute Arbitrary Code
Google has released an emergency security update for Chrome to address a critical use-after-free vulnerability (CVE-2025-9478) in the ANGLE graphics library that could allow attackers to execute arbitrary code on compromised systems.
❏ </Mr. SAM/> ❏
░▒▓█ افتانا █▓▒░
همه توسعهدهندگان برنامههای اندرویدی احراز هویت خواهندشد
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ افتانا █▓▒░
همه توسعهدهندگان برنامههای اندرویدی احراز هویت خواهندشد
🔗 ➢➣➤ More ...
@NullError_ir 📢
AFTANA.ir
همه توسعهدهندگان برنامههای اندرویدی احراز هویت خواهندشد
گوگل اعلام کرده قصد دارد هویت همه توسعهدهندگانی را که اپلیکیشنهای اندروید را منتشر میکنند بررسی و تأیید کند؛ حتی توسعهدهندگانی که اپهایشان را خارج از گوگلپلی در دسترس قرار میدهند.
❏ </Mr. SAM/> ❏
░▒▓█ تاکیان █▓▒░
آسیبپذیری بحرانی در پلتفرم Securden PAM: کلیدهای شبکه در خطر سرقت
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ تاکیان █▓▒░
آسیبپذیری بحرانی در پلتفرم Securden PAM: کلیدهای شبکه در خطر سرقت
🔗 ➢➣➤ More ...
@NullError_ir 📢
www.takian.net
آسیبپذیری بحرانی در پلتفرم Securden PAM: کلیدهای شبکه در خطر سرقت
یک آسیبپذیری امنیتی بحرانی در پلتفرم مدیریت دسترسی ممتاز (Privileged Access Management) شرکت Securden کشف شده است که به مهاجمان احراز هویت نشده اجازه میدهد تا با دور زدن کامل مکانیزمهای امنیتی، کنترل سیستم را به دست گرفته و به تمام رمزهای عبور و اسرار…
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - hheydarian/task-programming-in-csharp-dotnet-persian: Persian translation of "Task Programming in C# and .NET" by Vaskaran…
Persian translation of "Task Programming in C# and .NET" by Vaskaran Sarcar. - hheydarian/task-programming-in-csharp-dotnet-persian
❏ </Mr. SAM/> ❏
░▒▓█ SANS █▓▒░
Interesting Technique to Launch a Shellcode, (Wed, Aug 27th)
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ SANS █▓▒░
Interesting Technique to Launch a Shellcode, (Wed, Aug 27th)
🔗 ➢➣➤ More ...
@NullError_ir 📢
SANS Internet Storm Center
Interesting Technique to Launch a Shellcode - SANS ISC
Interesting Technique to Launch a Shellcode, Author: Xavier Mertens
❏ </Mr. SAM/> ❏
░▒▓█ hackday █▓▒░
A Tool-changing 3D Printer For the Masses
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ hackday █▓▒░
A Tool-changing 3D Printer For the Masses
🔗 ➢➣➤ More ...
@NullError_ir 📢
Hackaday
A Tool-changing 3D Printer For The Masses
Modern multi-material printers certainly have their advantages, but all that purging has a way to add up to oodles of waste. Tool-changing printers offer a way to do multi-material prints without t…
❏ </Mr. SAM/> ❏
░▒▓█ افتانا █▓▒░
سیتریکس آسیبپذیریهای حیاتی در NetScaler را وصله کرد
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ افتانا █▓▒░
سیتریکس آسیبپذیریهای حیاتی در NetScaler را وصله کرد
🔗 ➢➣➤ More ...
@NullError_ir 📢
AFTANA.ir
سیتریکس آسیبپذیریهای حیاتی در NetScaler را وصله کرد
شرکت سیتریکس سه آسیبپذیری امنیتی در محصولات NetScaler ADC و NetScaler Gateway را برطرف کرد.