❏ </Mr. SAM/> ❏
░▒▓█ TheRecord █▓▒░
Finnish police wiretap reveals Russian ‘shadow fleet’ captain instructed to destroy evidence
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ TheRecord █▓▒░
Finnish police wiretap reveals Russian ‘shadow fleet’ captain instructed to destroy evidence
🔗 ➢➣➤ More ...
@NullError_ir 📢
therecord.media
Finnish police wiretap reveals Russian ‘shadow fleet’ captain instructed to destroy evidence
The captain of a Russia-linked oil tanker that damaged five subsea cables in the Baltic Sea was reportedly instructed to destroy evidence after the ship was seized by authorities.
❏ </Mr. SAM/> ❏
░▒▓█ SecurityWeek █▓▒░
Infostealers: The Silent Smash-and-Grab Driving Modern Cybercrime
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ SecurityWeek █▓▒░
Infostealers: The Silent Smash-and-Grab Driving Modern Cybercrime
🔗 ➢➣➤ More ...
@NullError_ir 📢
SecurityWeek
Infostealers: The Silent Smash-and-Grab Driving Modern Cybercrime
Competition among malware-as-a-service developers has transformed infostealers into refined, accessible tools for cybercriminals worldwide.
❏ </Mr. SAM/> ❏
░▒▓█ BleepingComputer █▓▒░
Healthcare Services Group data breach impacts 624,000 people
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ BleepingComputer █▓▒░
Healthcare Services Group data breach impacts 624,000 people
🔗 ➢➣➤ More ...
@NullError_ir 📢
BleepingComputer
Healthcare Services Group data breach impacts 624,000 people
The Healthcare Services Group (HSGI) is alerting more than 600,000 individuals that their personal information was exposed in a security breach last year.
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
New Zip Slip Vulnerability Allows Attackers to Manipulate ZIP Files During Decompression
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
New Zip Slip Vulnerability Allows Attackers to Manipulate ZIP Files During Decompression
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
New Zip Slip Vulnerability Allows Attackers to Manipulate ZIP Files During Decompression
New Zip Slip variant exploits path traversal in decompression tools, writing files outside target dirs to implant backdoors.
❏ </Mr. SAM/> ❏
░▒▓█ TheHackersNews █▓▒░
ShadowSilk Hits 36 Government Targets in Central Asia and APAC Using Telegram Bots
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ TheHackersNews █▓▒░
ShadowSilk Hits 36 Government Targets in Central Asia and APAC Using Telegram Bots
🔗 ➢➣➤ More ...
@NullError_ir 📢
Telegram
Mr. SAM
یکشنبه
۷ ( دی = ۱۰ ) ۱٤۰٤
28 ( دسامبر = december = 12 ) 2025
تکنیکها ، کالبدشکافی ، درک عمیق ، یک قدم جلوتر ...
https://news.1rj.ru/str/boost/NullError_ir
۷ ( دی = ۱۰ ) ۱٤۰٤
28 ( دسامبر = december = 12 ) 2025
تکنیکها ، کالبدشکافی ، درک عمیق ، یک قدم جلوتر ...
https://news.1rj.ru/str/boost/NullError_ir
❏ </Mr. SAM/> ❏
░▒▓█ TheRecord █▓▒░
Hundreds of Swedish municipalities impacted by suspected ransomware attack on IT supplier
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ TheRecord █▓▒░
Hundreds of Swedish municipalities impacted by suspected ransomware attack on IT supplier
🔗 ➢➣➤ More ...
@NullError_ir 📢
therecord.media
Hundreds of Swedish municipalities impacted by suspected ransomware attack on IT supplier
A suspected ransomware attack on a Swedish software provider is believed to have impacted around 200 of the country’s municipal governments.
❏ </Mr. SAM/> ❏
░▒▓█ DarkReading █▓▒░
AI-Powered Ransomware Has Arrived With 'PromptLock'
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ DarkReading █▓▒░
AI-Powered Ransomware Has Arrived With 'PromptLock'
🔗 ➢➣➤ More ...
@NullError_ir 📢
Dark Reading
AI-Powered Ransomware Has Arrived With 'PromptLock'
Researchers raise the alarm that a new, rapidly evolving ransomware strain uses an OpenAI model to render and execute malicious code in real time.
❏ </Mr. SAM/> ❏
░▒▓█ SecurityWeek █▓▒░
Nevada State Offices Closed Following Disruptive Cyberattack
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ SecurityWeek █▓▒░
Nevada State Offices Closed Following Disruptive Cyberattack
🔗 ➢➣➤ More ...
@NullError_ir 📢
SecurityWeek
Nevada State Offices Closed Following Disruptive Cyberattack
State websites and phone lines were taken offline, but officials say emergency services and personal data remain unaffected.
❏ </Mr. SAM/> ❏
░▒▓█ BleepingComputer █▓▒░
Why zero trust is never 'done' and is an ever-evolving process
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ BleepingComputer █▓▒░
Why zero trust is never 'done' and is an ever-evolving process
🔗 ➢➣➤ More ...
@NullError_ir 📢
BleepingComputer
Why zero trust is never 'done' and is an ever-evolving process
Zero trust isn't a project you finish—it's a cycle that keeps evolving. From supply chain exploits to policy drift, resilience requires continuous testing and adaptation. Learn how Specops Software supports this journey with tools that make it easier.
❏ </Mr. SAM/> ❏
░▒▓█ TheRecord █▓▒░
Spanish police arrest student suspected of hacking school system to change grades
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ TheRecord █▓▒░
Spanish police arrest student suspected of hacking school system to change grades
🔗 ➢➣➤ More ...
@NullError_ir 📢
therecord.media
Spanish police arrest student suspected of hacking school system to change grades
Spanish police have arrested a university student suspected of hacking the local government’s education management system to alter grades and gain access to professors’ emails.
❏ </Mr. SAM/> ❏
░▒▓█ TheHackersNews █▓▒░
Anthropic Disrupts AI-Powered Cyberattacks Automating Theft and Extortion Across Critical Sectors
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ TheHackersNews █▓▒░
Anthropic Disrupts AI-Powered Cyberattacks Automating Theft and Extortion Across Critical Sectors
🔗 ➢➣➤ More ...
@NullError_ir 📢
Telegram
Mr. SAM
یکشنبه
۷ ( دی = ۱۰ ) ۱٤۰٤
28 ( دسامبر = december = 12 ) 2025
تکنیکها ، کالبدشکافی ، درک عمیق ، یک قدم جلوتر ...
https://news.1rj.ru/str/boost/NullError_ir
۷ ( دی = ۱۰ ) ۱٤۰٤
28 ( دسامبر = december = 12 ) 2025
تکنیکها ، کالبدشکافی ، درک عمیق ، یک قدم جلوتر ...
https://news.1rj.ru/str/boost/NullError_ir
❏ </Mr. SAM/> ❏
░▒▓█ TheRecord █▓▒░
Allied spy agencies blame 3 Chinese tech companies for Salt Typhoon attacks
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ TheRecord █▓▒░
Allied spy agencies blame 3 Chinese tech companies for Salt Typhoon attacks
🔗 ➢➣➤ More ...
@NullError_ir 📢
therecord.media
Allied spy agencies blame 3 Chinese tech companies for Salt Typhoon attacks
The three companies were accused of providing “cyber-related products and services to China’s intelligence services, including multiple units in the People’s Liberation Army and Ministry of State Security” since at least 2021, according to the advisory.
❏ </Mr. SAM/> ❏
░▒▓█ DarkReading █▓▒░
Storm-0501 Hits Enterprise With 'Cloud-Based Ransomware' Attack
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ DarkReading █▓▒░
Storm-0501 Hits Enterprise With 'Cloud-Based Ransomware' Attack
🔗 ➢➣➤ More ...
@NullError_ir 📢
Darkreading
Storm-0501 Shifts to 'Cloud-Based Ransomware' Attacks
The financially motivated threat group used cloud resources to conduct a complex, ransomware-style attack against an enterprise victim.
❏ </Mr. SAM/> ❏
░▒▓█ hackday █▓▒░
Homebrew Tire Pressure Monitoring System
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ hackday █▓▒░
Homebrew Tire Pressure Monitoring System
🔗 ➢➣➤ More ...
@NullError_ir 📢
Hackaday
Homebrew Tire Pressure Monitoring System
When [upir] saw that you could buy tire valve stem caps that read pressure electronically, he decided to roll his own Tire Pressure Monitoring System (TPMS) like the one found on modern cars. An ES…
❏ </Mr. SAM/> ❏
░▒▓█ BleepingComputer █▓▒░
Over 28,000 Citrix devices vulnerable to new exploited RCE flaw
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ BleepingComputer █▓▒░
Over 28,000 Citrix devices vulnerable to new exploited RCE flaw
🔗 ➢➣➤ More ...
@NullError_ir 📢
BleepingComputer
Over 28,000 Citrix devices vulnerable to new exploited RCE flaw
More than 28,200 Citrix instances are vulnerable to a critical remote code execution vulnerability tracked as CVE-2025-7775 that is already being exploited in the wild.
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
CISA releases New ICS Advisories Surrounding Vulnerabilities and Exploits
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
CISA releases New ICS Advisories Surrounding Vulnerabilities and Exploits
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
CISA releases New ICS Advisories Surrounding Vulnerabilities and Exploits
CISA released three significant Industrial Control Systems (ICS) advisories on August 26, 2025, alerting organizations to critical vulnerabilities affecting widely-deployed automation systems.
❏ </Mr. SAM/> ❏
░▒▓█ TheRecord █▓▒░
Hackers use fake NDAs to deliver malware to US manufacturers
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ TheRecord █▓▒░
Hackers use fake NDAs to deliver malware to US manufacturers
🔗 ➢➣➤ More ...
@NullError_ir 📢
therecord.media
Hackers use fake NDAs to deliver malware to US manufacturers
Hackers are targeting American industrial firms by contacting them through their website forms, posing as potential business partners before infecting them with malware.
❏ </Mr. SAM/> ❏
░▒▓█ SecurityWeek █▓▒░
Hackers Weaponize Trust with AI-Crafted Emails to Deploy ScreenConnect
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ SecurityWeek █▓▒░
Hackers Weaponize Trust with AI-Crafted Emails to Deploy ScreenConnect
🔗 ➢➣➤ More ...
@NullError_ir 📢
SecurityWeek
Hackers Weaponize Trust with AI-Crafted Emails to Deploy ScreenConnect
AI-powered phishing attacks leverage ConnectWise ScreenConnect for remote access, underscoring their sophistication.
❏ </Mr. SAM/> ❏
░▒▓█ BleepingComputer █▓▒░
Global Salt Typhoon hacking campaigns linked to Chinese tech firms
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ BleepingComputer █▓▒░
Global Salt Typhoon hacking campaigns linked to Chinese tech firms
🔗 ➢➣➤ More ...
@NullError_ir 📢
BleepingComputer
Global Salt Typhoon hacking campaigns linked to Chinese tech firms
The U.S. National Security Agency (NSA), the UK's National Cyber Security Centre (NCSC), and partners from over a dozen countries have linked the Salt Typhoon global hacking campaigns to three China-based technology firms.
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
IPFire Web-Based Firewall Interface Allows Authenticated Administrator to Inject Persistent JavaScript
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
IPFire Web-Based Firewall Interface Allows Authenticated Administrator to Inject Persistent JavaScript
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
IPFire Web-Based Firewall Interface Allows Authenticated Administrator to Inject Persistent JavaScript
A stored cross-site noscripting (XSS) flaw identified in IPFire 2.29’s web-based firewall interface (firewall.cgi).