■■■□□ User Email Disclosure via ID-Based Invitation. https://hackerone.com/reports/3003716
All posts by John Doe
February 22, 2025 at 12:09PM
■■■■□ Unconfirmed: North Korea’s Lazarus Group stole $1.4 billion from Bybit.
February 22, 2025 at 12:10AM
■■■□□ Microsoft expands Copilot bug bounty targets, payouts. https://www.theregister.com/2025/02/20/microsoft_copilot_bug_bounty_updated/ https://msrc.microsoft.com/blog/2025/02/exciting-updates-to-the-copilot-ai-bounty-program-enhancing-security-and-incentivizing-innovation/
February 21, 2025 at 10:31PM
■■■□□ Bybit cryptocurrency exchange experienced a loss of approximately $1,400,000,000 today, primarily in ETH. The perpetrator employed sophisticated transaction chains to obfuscate the movement of funds and hinder traceability.
February 21, 2025 at 07:45PM
■■■■□ SonicWall CVE-2024-53704: SSL VPN Session Hijacking. https://bishopfox.com/blog/sonicwall-cve-2024-53704-ssl-vpn-session-hijacking
February 21, 2025 at 07:43PM
■■■■□ 9️⃣ Apple removes cloud encryption feature from UK after the government ordered the company to build a backdoor for accessing user data — Bloomberg
February 21, 2025 at 06:18PM
■■□□□ Microsoft fixes Power Pages zero-day bug exploited in attacks. https://www.bleepingcomputer.com/news/security/microsoft-fixes-power-pages-zero-day-bug-exploited-in-attacks/
February 20, 2025 at 09:28PM
■■□□□ A new and dangerous keylogger is on the loose – here’s how to stay safe. https://www.techradar.com/pro/security/a-new-and-dangerous-keylogger-is-on-the-loose-heres-how-to-stay-safe
February 20, 2025 at 09:15PM
■■■■□ The ExoUmbra Is a Compact, Easily-Portable Raspberry Pi 5 Pen-Testing Setup in an Upcycled Dice Case. 📱 https://www.hackster.io/news/the-exoumbra-is-a-compact-easily-portable-raspberry-pi-5-pen-testing-setup-in-an-upcycled-dice-case-33328c2668c3
February 20, 2025 at 09:12PM
💎 Sandbox evasions are a strange world: a tiny mouse jitter can decide the fate of a whole attack chain. CPR describes statistical attacks they launched on sandbox human interaction modules, then gives full mitigation, including exposition and source code. Exploiting Statistical Weaknesses in Human Interaction Anti-Evasions. https://research.checkpoint.com/2025/the-cat-and-mouse-game-exploiting-statistical-weaknesses-in-human-interaction-anti-evasions/
