■■■■□ Cyber-Attack on Israel: Hackers exploit voicemail to hijack Telegram accounts in Israel, experts warn Cyber campaign, traced to Bangladesh and Indonesia, uses fake profiles and social engineering to breach Telegram accounts; Experts urge Israelis to disable voicemail or change default PINs and activate two-step verification for protection. https://www.ynetnews.com/business/article/sya8100kayg
All posts by John Doe
April 2, 2025 at 03:29PM
■■■□□ Interesting thread: Malware by Lazarus. 🫥 🔤🅰️🔤🅰️🔤🔤🔤 https://x.com/blackorbird/status/1907393815633445261
April 2, 2025 at 09:51AM
■■■■■ Peeko – Browser-based XSS C2 for stealthy internal network exploration via victim’s browser. 🔤🔤🔤🔤🔤 🔠🔠🔠 https://github.com/b3rito/peeko
April 2, 2025 at 08:40AM
■■■■□ NetGaze is a tool designed to capture and analyze network traffic on Android devices without requiring root access. 🔤🔤🔤🔤🅰️🔤🔤 https://github.com/ThatNotEasy/NetGaze/
April 1, 2025 at 05:28AM
■■■□□ ‘Sim farms’, high heels, zombie knives: what scammers buy with the money they steal. https://www.theguardian.com/money/2025/mar/31/changing-threat-police-hunting-hi-tech-scammers-uk-billions
March 31, 2025 at 09:45PM
■■■■□🎲Feberis Pro: 4-in-1 Expansion Board for Flipper Zero. Feberis Pro: The Ultimate 4-in-1 Expansion Board for Flipper Zero
March 31, 2025 at 09:37PM
😀😀RamiGPT – AI Tool To Escalate Privilege & Gain Root Access Within a Minute. RamiGPT – AI Tool To Escalate Privilege & Gain Root Access Within a Minute
March 31, 2025 at 09:31PM
🌐 Yet another website: sploitify.haxx.it [interactive public exploit cheat sheet]
March 31, 2025 at 09:09PM
■■■■□ Check Point Breached. A digital burglar is claiming to have nabbed a trove of “highly sensitive” data from Check Point – something the American-Israeli security biz claims is a huge exaggeration. A cybercrime forum user going by the name CoreInjection advertised “a highly sensitive dataset” allegedly comprised of Check Point files on Sunday evening.…
March 30, 2025 at 10:47PM
■■□□□ New Ubuntu Linux security bypasses require manual mitigations. https://www.bleepingcomputer.com/news/security/new-ubuntu-linux-security-bypasses-require-manual-mitigations/
