❏ </Mr. SAM/> ❏
░▒▓█ DarkReading █▓▒░
'ZipLine' Phishers Flip Script as Victims Email First
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ DarkReading █▓▒░
'ZipLine' Phishers Flip Script as Victims Email First
🔗 ➢➣➤ More ...
@NullError_ir 📢
Darkreading
'ZipLine' Phishers Flip Script as Victims Email First
The ZipLine campaign is a sophisticated phishing scheme that has already hit dozens of organizations across industries of all sizes.
❏ </Mr. SAM/> ❏
░▒▓█ cyberguy █▓▒░
How scammers target you even without social media
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cyberguy █▓▒░
How scammers target you even without social media
🔗 ➢➣➤ More ...
@NullError_ir 📢
Telegram
Mr. SAM
یکشنبه
۷ ( دی = ۱۰ ) ۱٤۰٤
28 ( دسامبر = december = 12 ) 2025
تکنیکها ، کالبدشکافی ، درک عمیق ، یک قدم جلوتر ...
https://news.1rj.ru/str/boost/NullError_ir
۷ ( دی = ۱۰ ) ۱٤۰٤
28 ( دسامبر = december = 12 ) 2025
تکنیکها ، کالبدشکافی ، درک عمیق ، یک قدم جلوتر ...
https://news.1rj.ru/str/boost/NullError_ir
❏ </Mr. SAM/> ❏
░▒▓█ DarkReading █▓▒░
Anthropic AI Used to Automate Data Extortion Campaign
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ DarkReading █▓▒░
Anthropic AI Used to Automate Data Extortion Campaign
🔗 ➢➣➤ More ...
@NullError_ir 📢
Dark Reading
Anthropic AI Used to Automate Data Extortion Campaign
The threat actor abused Anthropic's Claude Code service to "an unprecedented degree," automating reconnaissance, intrusions, and credential harvesting.
❏ </Mr. SAM/> ❏
░▒▓█ BleepingComputer █▓▒░
Storm-0501 hackers shift to ransomware attacks in the cloud
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ BleepingComputer █▓▒░
Storm-0501 hackers shift to ransomware attacks in the cloud
🔗 ➢➣➤ More ...
@NullError_ir 📢
BleepingComputer
Storm-0501 hackers shift to ransomware attacks in the cloud
Microsoft warns that a threat actor tracked as Storm-0501 has evolved its operations, shifting away from encrypting devices with ransomware to focusing on cloud-based encryption, data theft, and extortion.
❏ </Mr. SAM/> ❏
░▒▓█ cyberguy █▓▒░
Hacker exploits AI chatbot in cybercrime spree
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cyberguy █▓▒░
Hacker exploits AI chatbot in cybercrime spree
🔗 ➢➣➤ More ...
@NullError_ir 📢
❏ </Mr. SAM/> ❏
░▒▓█ hackday █▓▒░
JuiceBox Rescue: Freeing Tethered EV Chargers From Corporate Overlords
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ hackday █▓▒░
JuiceBox Rescue: Freeing Tethered EV Chargers From Corporate Overlords
🔗 ➢➣➤ More ...
@NullError_ir 📢
Hackaday
JuiceBox Rescue: Freeing Tethered EV Chargers From Corporate Overlords
Having a charger installed at home for your electric car is very convenient, not only for the obvious home charging, but also for having scheduling and other features built-in. Sadly, like with so …
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
Microsoft Teams Issue Blocks Users From Opening Embedded Office Documents
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
Microsoft Teams Issue Blocks Users From Opening Embedded Office Documents
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
Microsoft Teams Issue Blocks Users From Opening Embedded Office Documents
A widespread service issue is impacting Microsoft Teams users globally this Thursday, preventing many from opening embedded Microsoft Office documents within the collaboration platform.
❏ </Mr. SAM/> ❏
░▒▓█ SANS █▓▒░
ISC Stormcast For Thursday, August 28th, 2025 https://isc.sans.edu/podcastdetail/9590, (Thu, Aug 28th)
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ SANS █▓▒░
ISC Stormcast For Thursday, August 28th, 2025 https://isc.sans.edu/podcastdetail/9590, (Thu, Aug 28th)
🔗 ➢➣➤ More ...
@NullError_ir 📢
SANS Internet Storm Center
SANS Stormcast Thursday, August 28th, 2025: Launching Shellcode; NX Compromise; Volt Typhoon Report
❏ </Mr. SAM/> ❏
░▒▓█ hackday █▓▒░
Pascal? On my Arduino? It’s More Likely Than You Think
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ hackday █▓▒░
Pascal? On my Arduino? It’s More Likely Than You Think
🔗 ➢➣➤ More ...
@NullError_ir 📢
Hackaday
Pascal? On My Arduino? It’s More Likely Than You Think
The Arduino ecosystem is an amazing learning tool, but even those of us who love it admit that even the simplified C Arduino uses isn’t the ideal teaching language. Those of us who remember l…
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
Underground Ransomware Gang With New Tactics Against Organizations Worldwide
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
Underground Ransomware Gang With New Tactics Against Organizations Worldwide
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
Underground Ransomware Gang With New Tactics Against Organizations Worldwide
Over the past year, the Underground ransomware gang has emerged as a formidable threat to organizations across diverse industries and geographies. First identified in July 2023, the group resurfaced in May 2024 with a Dedicated Leak Site (DLS), signaling…
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
New Malware Attack Exploiting TASPEN’s Legacy to Target Indonesian Senior Citizens
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
New Malware Attack Exploiting TASPEN’s Legacy to Target Indonesian Senior Citizens
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
New Malware Attack Exploiting TASPEN’s Legacy to Target Indonesian Senior Citizens
A sophisticated malware campaign has emerged, targeting Indonesia’s most vulnerable digital citizens through a calculated exploitation of trust in the nation’s pension fund system. The malicious operation impersonates PT Dana Tabungan dan Asuransi Pegawai…
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
CISA Warns of Citrix Netscaler 0-day RCE Vulnerability Exploited in Attacks
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
CISA Warns of Citrix Netscaler 0-day RCE Vulnerability Exploited in Attacks
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
CISA Warns of Citrix Netscaler 0-day RCE Vulnerability Exploited in Attacks
CISA has issued an urgent warning regarding a critical zero-day vulnerability affecting Citrix NetScaler systems, designated as CVE-2025-7775.
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
Kea DHCP Server Vulnerability Let Remote Attacker With a Single Crafted Packet
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
Kea DHCP Server Vulnerability Let Remote Attacker With a Single Crafted Packet
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
Kea DHCP Server Vulnerability Let Remote Attacker Crash With a Single Crafted Packet
A newly disclosed vulnerability in the widely-used ISC Kea DHCP server poses a significant security risk to network infrastructure worldwide.
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
TAG-144 Actors Attacking Government Entities With New Tactics, Techniques, and Procedures
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
TAG-144 Actors Attacking Government Entities With New Tactics, Techniques, and Procedures
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
TAG-144 Actors Attacking Government Entities With New Tactics, Techniques, and Procedures
Over the past year, a shadowy threat actor known as TAG-144—also tracked under aliases Blind Eagle and APT-C-36—has intensified operations against South American government institutions. First observed in 2018, this group has adopted an array of commodity…
@NullError_ir
░▒▓█ تاکیان █▓▒░
آسیبپذیری بحرانی در پلتفرم Securden PAM: کلیدهای شبکه در خطر سرقت
🔗 ➢➣➤ More ...
░▒▓█ تاکیان █▓▒░
آسیبپذیری بحرانی در پلتفرم Securden PAM: کلیدهای شبکه در خطر سرقت
🔗 ➢➣➤ More ...
www.takian.net
آسیبپذیری بحرانی در پلتفرم Securden PAM: کلیدهای شبکه در خطر سرقت
یک آسیبپذیری امنیتی بحرانی در پلتفرم مدیریت دسترسی ممتاز (Privileged Access Management) شرکت Securden کشف شده است که به مهاجمان احراز هویت نشده اجازه میدهد تا با دور زدن کامل مکانیزمهای امنیتی، کنترل سیستم را به دست گرفته و به تمام رمزهای عبور و اسرار…
@NullError_ir
░▒▓█ TheHackersNews █▓▒░
U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits
🔗 ➢➣➤ More ...
░▒▓█ TheHackersNews █▓▒░
U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits
🔗 ➢➣➤ More ...
ابزار hoontr برای توسعه دهندگان بدافزار و رد تیم
مثال : شما میتوانید چیزی شبیه به NtAllocateVirtualMemoryEx را بدون اینکه حتی به ntdll دست بزنید، فراخوانی کنید!
@NullError_ir
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - whokilleddb/hoontr: A hoontr must hoont
A hoontr must hoont. Contribute to whokilleddb/hoontr development by creating an account on GitHub.
اولین گونه باجافزاری که از هوش مصنوعی برای رمزگذاری استفاده میکند . کشف شده توسط تیم تحققاتی ESET و هنوز فعال در کمپین ها.
@NullError_ir
Please open Telegram to view this post
VIEW IN TELEGRAM
Cyber Security News
First AI Ransomware ‘PromptLock’ Uses OpenAI gpt-oss-20b Model for Encryption
A new ransomware has been identified, which is believed to be the first-ever ransomware strain that leverages a local AI model to generate its malicious components.