May 5, 2025 at 10:51PM

■■■■■ TeleMessage, a modified Signal clone used by US government officials, has been hacked. TeleMessage, a modified Signal clone used by US government officials, has been hacked

May 3, 2025 at 07:26PM

■■■■□ Iran 🇮🇷 | Lemon Sandstorm. An Iranian state-sponsored threat group has been attributed to a long-term cyber intrusion aimed at a critical national infrastructure (CNI) in the Middle East that lasted nearly two years. https://www.fortinet.com/blog/threat-research/fortiguard-incident-response-team-detects-intrusion-into-middle-east-critical-national-infrastructure PARISITE https://thehackernews.com/2024/08/us-agencies-warn-of-iranian-hacking.html https://thehackernews.com/2025/05/iranian-hackers-maintain-2-year-access.html

May 3, 2025 at 07:22PM

■■□□□ OSINT investigation by New York Times on zJewish (Zionist Jew) attack by Israeli 🇮🇱 forces on United Nations officers and medics from Red Crescent. Summary: Jews wait in ambush for medics, kill them, some of them at point blank range. This followed by dumping the 2 dozen UN personnel in mass grave along with…

May 2, 2025 at 09:27PM

■■■■■ CVE-2025-32433: Critical Telecom Vulnerability: No-Auth SSH and Al-Built Exploit. A critical flaw in Erlang/OTP’s SSH server allows attackers to exploit SSH message handling and execute remote code without authentication. What is Erlang? Erlang is a programming language developed by Ericsson in the ’80s, built for telecom systems. It’s still widely used in core networks…

May 2, 2025 at 01:44AM

■■■■□ A proof-of-concept program has been released to demonstrate a so-called monitoring “blind spot” in how some Linux antivirus and other endpoint protection tools use the kernel’s io_uring interface. That interface allows applications to make IO requests without using traditional system calls. That’s a problem for security tools that rely on syscall monitoring to detect…

May 1, 2025 at 04:14PM

■■■□□ After #PahalgamAttack, The Indian Army College of Nursing was hacked by the infamous cyber-hacktivist group, Team_Insane_PK. Since changing their team name in May 2023, they’ve been actively hacking websites every day. From critical infrastructure to military and intelligence agencies, they’ve been gathering sensitive data. https://www.linkedin.com/posts/louis-hur-87313019_pahalgamterrorattack-cybersecurity-hacktivism-ugcPost-7321580713974067200-WmMP