❏ </Mr. SAM/> ❏
░▒▓█ cyberguy █▓▒░
Hacker exploits AI chatbot in cybercrime spree
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cyberguy █▓▒░
Hacker exploits AI chatbot in cybercrime spree
🔗 ➢➣➤ More ...
@NullError_ir 📢
❏ </Mr. SAM/> ❏
░▒▓█ hackday █▓▒░
JuiceBox Rescue: Freeing Tethered EV Chargers From Corporate Overlords
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ hackday █▓▒░
JuiceBox Rescue: Freeing Tethered EV Chargers From Corporate Overlords
🔗 ➢➣➤ More ...
@NullError_ir 📢
Hackaday
JuiceBox Rescue: Freeing Tethered EV Chargers From Corporate Overlords
Having a charger installed at home for your electric car is very convenient, not only for the obvious home charging, but also for having scheduling and other features built-in. Sadly, like with so …
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
Microsoft Teams Issue Blocks Users From Opening Embedded Office Documents
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
Microsoft Teams Issue Blocks Users From Opening Embedded Office Documents
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
Microsoft Teams Issue Blocks Users From Opening Embedded Office Documents
A widespread service issue is impacting Microsoft Teams users globally this Thursday, preventing many from opening embedded Microsoft Office documents within the collaboration platform.
❏ </Mr. SAM/> ❏
░▒▓█ SANS █▓▒░
ISC Stormcast For Thursday, August 28th, 2025 https://isc.sans.edu/podcastdetail/9590, (Thu, Aug 28th)
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ SANS █▓▒░
ISC Stormcast For Thursday, August 28th, 2025 https://isc.sans.edu/podcastdetail/9590, (Thu, Aug 28th)
🔗 ➢➣➤ More ...
@NullError_ir 📢
SANS Internet Storm Center
SANS Stormcast Thursday, August 28th, 2025: Launching Shellcode; NX Compromise; Volt Typhoon Report
❏ </Mr. SAM/> ❏
░▒▓█ hackday █▓▒░
Pascal? On my Arduino? It’s More Likely Than You Think
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ hackday █▓▒░
Pascal? On my Arduino? It’s More Likely Than You Think
🔗 ➢➣➤ More ...
@NullError_ir 📢
Hackaday
Pascal? On My Arduino? It’s More Likely Than You Think
The Arduino ecosystem is an amazing learning tool, but even those of us who love it admit that even the simplified C Arduino uses isn’t the ideal teaching language. Those of us who remember l…
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
Underground Ransomware Gang With New Tactics Against Organizations Worldwide
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
Underground Ransomware Gang With New Tactics Against Organizations Worldwide
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
Underground Ransomware Gang With New Tactics Against Organizations Worldwide
Over the past year, the Underground ransomware gang has emerged as a formidable threat to organizations across diverse industries and geographies. First identified in July 2023, the group resurfaced in May 2024 with a Dedicated Leak Site (DLS), signaling…
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
New Malware Attack Exploiting TASPEN’s Legacy to Target Indonesian Senior Citizens
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
New Malware Attack Exploiting TASPEN’s Legacy to Target Indonesian Senior Citizens
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
New Malware Attack Exploiting TASPEN’s Legacy to Target Indonesian Senior Citizens
A sophisticated malware campaign has emerged, targeting Indonesia’s most vulnerable digital citizens through a calculated exploitation of trust in the nation’s pension fund system. The malicious operation impersonates PT Dana Tabungan dan Asuransi Pegawai…
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
CISA Warns of Citrix Netscaler 0-day RCE Vulnerability Exploited in Attacks
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
CISA Warns of Citrix Netscaler 0-day RCE Vulnerability Exploited in Attacks
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
CISA Warns of Citrix Netscaler 0-day RCE Vulnerability Exploited in Attacks
CISA has issued an urgent warning regarding a critical zero-day vulnerability affecting Citrix NetScaler systems, designated as CVE-2025-7775.
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
Kea DHCP Server Vulnerability Let Remote Attacker With a Single Crafted Packet
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
Kea DHCP Server Vulnerability Let Remote Attacker With a Single Crafted Packet
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
Kea DHCP Server Vulnerability Let Remote Attacker Crash With a Single Crafted Packet
A newly disclosed vulnerability in the widely-used ISC Kea DHCP server poses a significant security risk to network infrastructure worldwide.
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
TAG-144 Actors Attacking Government Entities With New Tactics, Techniques, and Procedures
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
TAG-144 Actors Attacking Government Entities With New Tactics, Techniques, and Procedures
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
TAG-144 Actors Attacking Government Entities With New Tactics, Techniques, and Procedures
Over the past year, a shadowy threat actor known as TAG-144—also tracked under aliases Blind Eagle and APT-C-36—has intensified operations against South American government institutions. First observed in 2018, this group has adopted an array of commodity…
@NullError_ir
░▒▓█ تاکیان █▓▒░
آسیبپذیری بحرانی در پلتفرم Securden PAM: کلیدهای شبکه در خطر سرقت
🔗 ➢➣➤ More ...
░▒▓█ تاکیان █▓▒░
آسیبپذیری بحرانی در پلتفرم Securden PAM: کلیدهای شبکه در خطر سرقت
🔗 ➢➣➤ More ...
www.takian.net
آسیبپذیری بحرانی در پلتفرم Securden PAM: کلیدهای شبکه در خطر سرقت
یک آسیبپذیری امنیتی بحرانی در پلتفرم مدیریت دسترسی ممتاز (Privileged Access Management) شرکت Securden کشف شده است که به مهاجمان احراز هویت نشده اجازه میدهد تا با دور زدن کامل مکانیزمهای امنیتی، کنترل سیستم را به دست گرفته و به تمام رمزهای عبور و اسرار…
@NullError_ir
░▒▓█ TheHackersNews █▓▒░
U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits
🔗 ➢➣➤ More ...
░▒▓█ TheHackersNews █▓▒░
U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits
🔗 ➢➣➤ More ...
ابزار hoontr برای توسعه دهندگان بدافزار و رد تیم
مثال : شما میتوانید چیزی شبیه به NtAllocateVirtualMemoryEx را بدون اینکه حتی به ntdll دست بزنید، فراخوانی کنید!
@NullError_ir
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - whokilleddb/hoontr: A hoontr must hoont
A hoontr must hoont. Contribute to whokilleddb/hoontr development by creating an account on GitHub.
اولین گونه باجافزاری که از هوش مصنوعی برای رمزگذاری استفاده میکند . کشف شده توسط تیم تحققاتی ESET و هنوز فعال در کمپین ها.
@NullError_ir
Please open Telegram to view this post
VIEW IN TELEGRAM
Cyber Security News
First AI Ransomware ‘PromptLock’ Uses OpenAI gpt-oss-20b Model for Encryption
A new ransomware has been identified, which is believed to be the first-ever ransomware strain that leverages a local AI model to generate its malicious components.
Forwarded from OS Internals (Abolfazl Kazemi)
📢 انتشار فصل دوم دوره Linux Exploit Development
📚 توی این فصل وارد دنیای اکسپلویت میشیم.
قبل از هر چیز ابزارها و مفاهیم پایه مثل GDB و اسمبلی رو مرور میکنیم، بعد یاد میگیریم چطور توی سطح پایین با کدها و فراخوانی توابع کار کنیم. کمکم میریم سراغ اصول اولیه اکسپلویت، تغییر آدرس بازگشت و در نهایت اولین Stack Overflow خودمون رو میسازیم. این فصل در واقع نقطه شروع عملی برای بحث توسعه اکسپلویت محسوب میشه.
✍️ لینک ویدئوهای فصل در یوتیوب:
P02-01) GDB Intro
P02-02) Assembly Review
P02-03) 32bit Calling Conventions
P02-04) Tracing a Function Call
P02-05) Using GDB for Tracing Function Calls
P02-06) Exploit Basics
P02-07) Return Address Example
P02-08) Our First Stack Overflow
P02-09) Practicing with exploit.education
✍️ لینک ویدئوهای فصل در آپارات:
https://aparat.com/v/gae2knx
https://aparat.com/v/gxj2i17
https://aparat.com/v/qqbf6k5
https://aparat.com/v/yzw6zb8
https://aparat.com/v/scrz84v
https://aparat.com/v/tjd2542
https://aparat.com/v/kxmt3e0
https://aparat.com/v/brj4447
https://aparat.com/v/rfdp5bb
#linux #exploitdev #assembly #security #bufferoverflow #gdb #x86
📚 توی این فصل وارد دنیای اکسپلویت میشیم.
قبل از هر چیز ابزارها و مفاهیم پایه مثل GDB و اسمبلی رو مرور میکنیم، بعد یاد میگیریم چطور توی سطح پایین با کدها و فراخوانی توابع کار کنیم. کمکم میریم سراغ اصول اولیه اکسپلویت، تغییر آدرس بازگشت و در نهایت اولین Stack Overflow خودمون رو میسازیم. این فصل در واقع نقطه شروع عملی برای بحث توسعه اکسپلویت محسوب میشه.
✍️ لینک ویدئوهای فصل در یوتیوب:
P02-01) GDB Intro
P02-02) Assembly Review
P02-03) 32bit Calling Conventions
P02-04) Tracing a Function Call
P02-05) Using GDB for Tracing Function Calls
P02-06) Exploit Basics
P02-07) Return Address Example
P02-08) Our First Stack Overflow
P02-09) Practicing with exploit.education
✍️ لینک ویدئوهای فصل در آپارات:
https://aparat.com/v/gae2knx
https://aparat.com/v/gxj2i17
https://aparat.com/v/qqbf6k5
https://aparat.com/v/yzw6zb8
https://aparat.com/v/scrz84v
https://aparat.com/v/tjd2542
https://aparat.com/v/kxmt3e0
https://aparat.com/v/brj4447
https://aparat.com/v/rfdp5bb
#linux #exploitdev #assembly #security #bufferoverflow #gdb #x86
YouTube
P02-01) GDB Intro [PER]
معرفی دیباگر GDB، مهمترین ابزار برای بررسی باینریها و دنبال کردن رفتار برنامه در سطح دستورالعمل.
OS Internals
📢 انتشار فصل دوم دوره Linux Exploit Development 📚 توی این فصل وارد دنیای اکسپلویت میشیم. قبل از هر چیز ابزارها و مفاهیم پایه مثل GDB و اسمبلی رو مرور میکنیم، بعد یاد میگیریم چطور توی سطح پایین با کدها و فراخوانی توابع کار کنیم. کمکم میریم سراغ اصول…
GitHub
GitHub - Null-Err0r/YouTube-Downloader: YouTube-Downloader
YouTube-Downloader. Contribute to Null-Err0r/YouTube-Downloader development by creating an account on GitHub.
@NullError_ir
░▒▓█ TheHackersNews █▓▒░
Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials
🔗 ➢➣➤ More ...
░▒▓█ TheHackersNews █▓▒░
Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials
🔗 ➢➣➤ More ...
@NullError_ir
░▒▓█ TheHackersNews █▓▒░
Hidden Vulnerabilities of Project Management Tools & How FluentPro Backup Secures Them
🔗 ➢➣➤ More ...
░▒▓█ TheHackersNews █▓▒░
Hidden Vulnerabilities of Project Management Tools & How FluentPro Backup Secures Them
🔗 ➢➣➤ More ...