Iranian 🇮🇷 state sponsored threat actor burned at least 3 zero-day vulnerabilities after the SOC tried to remove them from the network in UAE's 🇦🇪 critical infrastructure who were in the system for over 2 years.
-Fortinet
As per Fortinet, the environment was staging or not fully production.A possible malware distribution mechanism.
https://kianbradley.com/2025/06/15/resurrecting-a-dead-tracker.html
Please open Telegram to view this post
VIEW IN TELEGRAM
Kian Bradley’s Blog
Resurrecting a dead torrent tracker and finding 3 million peers
So I was uh, downloading some linux isos, like usual. It was going slowly, so I opened up the Trackers tab in qBittorrent and saw the following:
🔥1
cKure Red
Please open Telegram to view this post
VIEW IN TELEGRAM
🤡4👍2🤮1
An interesting thread.
https://x.com/giammaiot2/status/1939711630511595664
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥2❤1
https://cybersecuritynews.com/zig-strike/
https://kpmg.com/nl/en/home/insights/2024/12/zig-strike-the-ultimate-toolkit-for-payload-creation-and-evasion.html
https://github.com/0xsp-SRD/zigstrike
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥2✍1🥱1 1
https://trufflesecurity.com/blog/guest-post-how-i-scanned-all-of-github-s-oops-commits-for-leaked-secrets
Please open Telegram to view this post
VIEW IN TELEGRAM
Trufflesecurity
Guest Post: How I Scanned all of GitHub’s “Oops Commits” for Leaked Secrets ◆ Truffle Security Co.
GitHub Archive logs every public commit, even the ones developers try to delete. Force pushes often cover up mistakes like leaked credentials by rewriting Git history. GitHub keeps these dangling commits, from what we can tell, forever. In the archive, they…
💯3👍2👌1
Their findings indicate that EFR systems employ an
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥3
It requires no installation and can be executed directly from a USB drive or over a network share — ideal for forensic workflows with minimal footprint on the target system.
https://github.com/gustavoparedes/Browser-Reviewer
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥2
Math.random() is predictable.CVE-2025-7783: Critical Vulnerability in JavaScript Library Exposes Millions of Apps to Code Execution Attacks.
https://cybersecuritynews.com/javanoscript-library-vulnerability/
https://github.com/form-data/form-data/security/advisories/GHSA-fjxv-7rqg-78g4
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥4😁1🤯1🙊1
https://www.cnx-software.com/2025/07/23/diabolic-parasite-esp32-s3-usb-dongle-for-penetration-testing-and-security-research/
Please open Telegram to view this post
VIEW IN TELEGRAM
❤1🔥1👀1
⤷ $150K funneled from North Korea’s Lazarus hacking group 💻
⤷ Facilitating romance scams, human trafficking, and money laundering
⤷ Monthly inflows up 51% since July 2024 📈
https://youtu.be/3f8ohjxHVmw
https://thehackernews.com/2025/01/illicit-huione-telegram-market.html
Please open Telegram to view this post
VIEW IN TELEGRAM
YouTube
How a Billion-Dollar Cambodian Cybercrime Empire Was Built
What once took place in the dark corners of the internet is now a sprawling ecosystem of illicit activity operating in plain sight - and one Cambodia-based operation seems to have made it all possible.
The US Treasury alleges a unit of a Cambodian conglomerate…
The US Treasury alleges a unit of a Cambodian conglomerate…
👍1
https://research.checkpoint.com/2025/cursor-vulnerability-mcpoison/
Please open Telegram to view this post
VIEW IN TELEGRAM
Check Point Research
Cursor IDE's MCP Vulnerability - Check Point Research
Identified Cursor IDE's vulnerability allows attackers to modify MCP configuration files after its one-time approval system
🔥1
72nd Edition of Phrack has been released in limited capacity. Full release in a few days
https://phrack.org/
Please open Telegram to view this post
VIEW IN TELEGRAM
Phrack
Introduction
Click to read the article on phrack
2🔥2👍1
From Orange 🍊 Tsai to Richard Johnson; researchers / authors have received the hard copy of Phrack and coins.
❤1👍1🔥1