❏ </Mr. SAM/> ❏
░▒▓█ hackday █▓▒░
Google Will Require Developer Verification Even for Sideloading
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ hackday █▓▒░
Google Will Require Developer Verification Even for Sideloading
🔗 ➢➣➤ More ...
@NullError_ir 📢
Hackaday
Google Will Require Developer Verification Even For Sideloading
Do you like writing software for Android, perhaps even sideload the occasional APK onto your Android device? In that case some big changes are heading your way, with Google announcing that they wil…
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
New Hook Android Banking Malware With New Advanced Capabilities and Supports 107 Remote Commands
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
New Hook Android Banking Malware With New Advanced Capabilities and Supports 107 Remote Commands
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
New Hook Android Banking Malware With New Advanced Capabilities and Supports 107 Remote Commands
A sophisticated new variant of the Hook Android banking trojan has emerged with unprecedented capabilities that position it among the most advanced mobile malware families observed to date. This latest version, designated Hook Version 3, represents a significant…
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
China-based Threat Actor Mustang Panda’s Tactics, Techniques, and Procedures Unveiled
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
China-based Threat Actor Mustang Panda’s Tactics, Techniques, and Procedures Unveiled
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
China-based Threat Actor Mustang Panda’s Tactics, Techniques, and Procedures Unveiled
China-based threat actor Mustang Panda has emerged as one of the most sophisticated cyber espionage groups operating in the current threat landscape, with operations dating back to at least 2014. This advanced persistent threat (APT) group has systematically…
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
Salesloft Drift Hacked to Steal OAuth Tokens and Exfiltrate from Salesforce Corporate Instances
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
Salesloft Drift Hacked to Steal OAuth Tokens and Exfiltrate from Salesforce Corporate Instances
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
Salesloft Drift Hacked to Steal OAuth Tokens and Exfiltrate from Salesforce Corporate Instances
A sophisticated data exfiltration campaign targeting corporate Salesforce instances has exposed sensitive information from multiple organizations through compromised OAuth tokens associated with the Salesloft Drift third-party application.
❏ </Mr. SAM/> ❏
░▒▓█ DarkReading █▓▒░
African Law Enforcement Agencies Nab Cybercrime Syndicates
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ DarkReading █▓▒░
African Law Enforcement Agencies Nab Cybercrime Syndicates
🔗 ➢➣➤ More ...
@NullError_ir 📢
Darkreading
African Law Enforcement Nabs Cybercrime Syndicates
African nations work with Interpol and private-sector partners to disrupt cybercriminal operations on the continent, but more work needs to be done.
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
Critical Chrome Use After Free Vulnerability Let Attackers Execute Arbitrary Code
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
Critical Chrome Use After Free Vulnerability Let Attackers Execute Arbitrary Code
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
Critical Chrome Use After Free Vulnerability Let Attackers Execute Arbitrary Code
Google has released an emergency security update for Chrome to address a critical use-after-free vulnerability (CVE-2025-9478) in the ANGLE graphics library that could allow attackers to execute arbitrary code on compromised systems.
❏ </Mr. SAM/> ❏
░▒▓█ افتانا █▓▒░
همه توسعهدهندگان برنامههای اندرویدی احراز هویت خواهندشد
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ افتانا █▓▒░
همه توسعهدهندگان برنامههای اندرویدی احراز هویت خواهندشد
🔗 ➢➣➤ More ...
@NullError_ir 📢
AFTANA.ir
همه توسعهدهندگان برنامههای اندرویدی احراز هویت خواهندشد
گوگل اعلام کرده قصد دارد هویت همه توسعهدهندگانی را که اپلیکیشنهای اندروید را منتشر میکنند بررسی و تأیید کند؛ حتی توسعهدهندگانی که اپهایشان را خارج از گوگلپلی در دسترس قرار میدهند.
❏ </Mr. SAM/> ❏
░▒▓█ تاکیان █▓▒░
آسیبپذیری بحرانی در پلتفرم Securden PAM: کلیدهای شبکه در خطر سرقت
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ تاکیان █▓▒░
آسیبپذیری بحرانی در پلتفرم Securden PAM: کلیدهای شبکه در خطر سرقت
🔗 ➢➣➤ More ...
@NullError_ir 📢
www.takian.net
آسیبپذیری بحرانی در پلتفرم Securden PAM: کلیدهای شبکه در خطر سرقت
یک آسیبپذیری امنیتی بحرانی در پلتفرم مدیریت دسترسی ممتاز (Privileged Access Management) شرکت Securden کشف شده است که به مهاجمان احراز هویت نشده اجازه میدهد تا با دور زدن کامل مکانیزمهای امنیتی، کنترل سیستم را به دست گرفته و به تمام رمزهای عبور و اسرار…
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - hheydarian/task-programming-in-csharp-dotnet-persian: Persian translation of "Task Programming in C# and .NET" by Vaskaran…
Persian translation of "Task Programming in C# and .NET" by Vaskaran Sarcar. - hheydarian/task-programming-in-csharp-dotnet-persian
❏ </Mr. SAM/> ❏
░▒▓█ SANS █▓▒░
Interesting Technique to Launch a Shellcode, (Wed, Aug 27th)
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ SANS █▓▒░
Interesting Technique to Launch a Shellcode, (Wed, Aug 27th)
🔗 ➢➣➤ More ...
@NullError_ir 📢
SANS Internet Storm Center
Interesting Technique to Launch a Shellcode - SANS ISC
Interesting Technique to Launch a Shellcode, Author: Xavier Mertens
❏ </Mr. SAM/> ❏
░▒▓█ hackday █▓▒░
A Tool-changing 3D Printer For the Masses
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ hackday █▓▒░
A Tool-changing 3D Printer For the Masses
🔗 ➢➣➤ More ...
@NullError_ir 📢
Hackaday
A Tool-changing 3D Printer For The Masses
Modern multi-material printers certainly have their advantages, but all that purging has a way to add up to oodles of waste. Tool-changing printers offer a way to do multi-material prints without t…
❏ </Mr. SAM/> ❏
░▒▓█ افتانا █▓▒░
سیتریکس آسیبپذیریهای حیاتی در NetScaler را وصله کرد
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ افتانا █▓▒░
سیتریکس آسیبپذیریهای حیاتی در NetScaler را وصله کرد
🔗 ➢➣➤ More ...
@NullError_ir 📢
AFTANA.ir
سیتریکس آسیبپذیریهای حیاتی در NetScaler را وصله کرد
شرکت سیتریکس سه آسیبپذیری امنیتی در محصولات NetScaler ADC و NetScaler Gateway را برطرف کرد.
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
DOGE Accused of Creating Live Copy of the Country’s Social Security Information in Unsecured Cloud Environment
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
DOGE Accused of Creating Live Copy of the Country’s Social Security Information in Unsecured Cloud Environment
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
DOGE Accused of Mimicking Country’s Social Security Info in Unsecured Cloud
A whistleblower disclosure filed today alleges that the Department of Government Efficiency (DOGE) within the Social Security Administration (SSA) covertly created a live copy of the nation’s entire Social Security dataset in an unsecured cloud environment.
❏ </Mr. SAM/> ❏
░▒▓█ TheHackersNews █▓▒░
Salesloft OAuth Breach via Drift AI Chat Agent Exposes Salesforce Customer Data
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ TheHackersNews █▓▒░
Salesloft OAuth Breach via Drift AI Chat Agent Exposes Salesforce Customer Data
🔗 ➢➣➤ More ...
@NullError_ir 📢
Telegram
Mr. SAM
یکشنبه
۷ ( دی = ۱۰ ) ۱٤۰٤
28 ( دسامبر = december = 12 ) 2025
تکنیکها ، کالبدشکافی ، درک عمیق ، یک قدم جلوتر ...
https://news.1rj.ru/str/boost/NullError_ir
۷ ( دی = ۱۰ ) ۱٤۰٤
28 ( دسامبر = december = 12 ) 2025
تکنیکها ، کالبدشکافی ، درک عمیق ، یک قدم جلوتر ...
https://news.1rj.ru/str/boost/NullError_ir
❏ </Mr. SAM/> ❏
░▒▓█ افتانا █▓▒░
صدور 56 مجوز فعالیت بخش خصوصی در صنعت افتا
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ افتانا █▓▒░
صدور 56 مجوز فعالیت بخش خصوصی در صنعت افتا
🔗 ➢➣➤ More ...
@NullError_ir 📢
AFTANA.ir
صدور 56 مجوز فعالیت بخش خصوصی در صنعت افتا
مرکز مدیریت راهبردی افتا، مردادماه با درخواست صدور و یا تمدید 56 مجوز شرکتهای متقاضی فعالیت در سازمانها و دستگاههای دارای زیرساخت حیاتی کشور موافقت کرد.
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
New ZipLine Campaign Attacks Critical Manufacturing Companies to Deploy In-memory Malware MixShell
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
New ZipLine Campaign Attacks Critical Manufacturing Companies to Deploy In-memory Malware MixShell
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
New ZipLine Campaign Attacks Critical Manufacturing Companies to Deploy In-memory Malware MixShell
In recent weeks, a sophisticated phishing operation known as the ZipLine campaign has targeted U.S.-based manufacturing firms, leveraging supply-chain criticality and legitimate-seeming business communications to deploy an advanced in-memory implant dubbed…
❏ </Mr. SAM/> ❏
░▒▓█ Securelist █▓▒░
Exploits and vulnerabilities in Q2 2025
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ Securelist █▓▒░
Exploits and vulnerabilities in Q2 2025
🔗 ➢➣➤ More ...
@NullError_ir 📢
Securelist
Vulnerability landscape analysis for Q2 2025
This report provides statistical data on published vulnerabilities and exploits we researched in Q2 2025. It also includes summary data on the use of C2 frameworks.
❏ </Mr. SAM/> ❏
░▒▓█ TheHackersNews █▓▒░
The 5 Golden Rules of Safe AI Adoption
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ TheHackersNews █▓▒░
The 5 Golden Rules of Safe AI Adoption
🔗 ➢➣➤ More ...
@NullError_ir 📢
Telegram
Mr. SAM
یکشنبه
۷ ( دی = ۱۰ ) ۱٤۰٤
28 ( دسامبر = december = 12 ) 2025
تکنیکها ، کالبدشکافی ، درک عمیق ، یک قدم جلوتر ...
https://news.1rj.ru/str/boost/NullError_ir
۷ ( دی = ۱۰ ) ۱٤۰٤
28 ( دسامبر = december = 12 ) 2025
تکنیکها ، کالبدشکافی ، درک عمیق ، یک قدم جلوتر ...
https://news.1rj.ru/str/boost/NullError_ir
❏ </Mr. SAM/> ❏
░▒▓█ SecurityWeek █▓▒░
Citrix Patches Exploited NetScaler Zero-Day
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ SecurityWeek █▓▒░
Citrix Patches Exploited NetScaler Zero-Day
🔗 ➢➣➤ More ...
@NullError_ir 📢
SecurityWeek
Citrix Patches Exploited NetScaler Zero-Day
Zero-day exploited in the wild forces Citrix and CISA to push emergency patch deadlines for federal agencies.
❏ </Mr. SAM/> ❏
░▒▓█ Schneier █▓▒░
We Are Still Unable to Secure LLMs from Malicious Inputs
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ Schneier █▓▒░
We Are Still Unable to Secure LLMs from Malicious Inputs
🔗 ➢➣➤ More ...
@NullError_ir 📢
Schneier on Security
We Are Still Unable to Secure LLMs from Malicious Inputs - Schneier on Security
Nice indirect prompt injection attack: Bargury’s attack starts with a poisoned document, which is shared to a potential victim’s Google Drive. (Bargury says a victim could have also uploaded a compromised file to their own account.) It looks like an official…