๐ Pwning the Ladybird browser. https://jessie.cafe/posts/pwning-ladybirds-libjs/
All posts by John Doe
April 30, 2025 at 07:36PM
โ โ โ โ โ Zero-Day: Wormable Zero-Click Remote Code Execution (RCE) in AirPlay Protocol Puts Apple & IoT Devices at Risk. https://www.oligo.security/blog/airborne
April 30, 2025 at 06:12PM
โ โ โ โ โ And another AMSI bypass with a different DLL/patch. ๐ https://medium.com/@andreabocchetti88/ghosting-amsi-cutting-rpc-to-disarm-av-04c26d67bb80
April 30, 2025 at 06:09PM
โ โ โ โ โก USD 64,350 earned in bug-bounties for various organisations by scanning for deleted (or at least presumed) Git files. https://medium.com/@sharon.brizinov/how-i-made-64k-from-deleted-files-a-bug-bounty-story-c5bd3a6f5f9b
April 30, 2025 at 12:01AM
โ โ โ โกโก Researchers reveal a collection of bugs known as AirBorne that would allow any hacker on the same Wi-Fi network as a third-party AirPlay-enabled device to surreptitiously run their own code on it. https://www.wired.com/story/airborne-airplay-flaws/
April 30, 2025 at 12:00AM
โ โ โ โกโก Pwnagotchi, cheap wifi hacking device. ๐นhttps://youtu.be/puOkriFPVtQ
April 29, 2025 at 11:29PM
โ โกโกโกโก Kali Linux warns of update failures after losing repo signing key. https://www.bleepingcomputer.com/news/linux/kali-linux-warns-of-update-failures-after-losing-repo-signing-key/
April 29, 2025 at 02:45AM
โ โ โ โ โก Cyber-War on Iran ๐ฎ๐ท Iran repelled a large cyber-attack on its infrastructure on Sunday, said the head of its Infrastructure Communications Company, a day after a powerful explosion damaged its most important container port and another round of talks with the U.S. over Tehran’s disupted nuclear programme. https://www.reuters.com/world/middle-east/iran-repelled-large-cyber-attack-sunday-2025-04-28/
April 29, 2025 at 02:42AM
โ โ โ โกโก DPRK: Jamf Threat Labs discovered malware samples believed to be tied to the Democratic People’s Republic of Korea (DPRK), aka North Korea, that are built using Flutter, which by design provides obfuscation to the malicious code. JTL performs a deep dive into how the malicious code works to help protect users on macOS devices.…
April 29, 2025 at 02:27AM
๐ฅMicrosoft Zero-Day drop: Server MS-TNAP Authentication Bypass [RCE 0day] A critical 0-click remote authentication bypass vulnerability in Microsoft Telnet Server that allows attackers to gain access as any user, including Administrator, without requiring valid credentials. The vulnerability exploits a misconfiguration in the NTLM Authentication processes of the Telnet MS-TNAP extension allowing remote unauthenticated attackers to…
