■□□□□ A possible cyber-attack on BAE systems as their weapons depot explodes. It could be due to kinetic weapons though. https://t.me/cKure/14379
All posts in Uncategorized
July 9, 2024 at 10:04PM
■■■■□ Interesting thread on Russian Disinformation accounts on Twitter (𝕏). https://x.com/BratvaCorp/status/1810712160768496121 https://t.me/cKure/14378
July 9, 2024 at 09:30PM
BlastRADIUS Critical vulnerability in the RADIUS protocol leaves networking equipment open to attack. https://www.helpnetsecurity.com/2024/07/09/blastradius-radius-protocol-vulnerability/ https://t.me/cKure/14376
July 9, 2024 at 05:45PM
■■□□□ Government in Pakistan authorises ISI (secret service) to trace, intercept calls, messages in a privacy violation law by state. https://www.geo.tv/latest/553339-govt-empowers-isi-to-intercept-trace-calls-after-cabinets-approval https://t.me/cKure/14375
July 9, 2024 at 01:31PM
■■□□□ Cybersecurity Agencies Warn of China-linked APT40’s Rapid Exploit Adaptation. https://thehackernews.com/2024/07/cybersecurity-agencies-warn-of-china.html https://t.me/cKure/14374
July 9, 2024 at 09:30AM
■■□□□ Nuitka: Revisit the basics of Python reversing. https://goatmilkk.notion.site/Nuitka-a3ac9ee7f3f240f3baa345c17f2b8aa3 https://t.me/cKure/14373
July 9, 2024 at 02:29AM
■■■■□ RCE bug in widely used Ghostscript library now exploited in attacks. https://www.bleepingcomputer.com/news/security/rce-bug-in-widely-used-ghostscript-library-now-exploited-in-attacks/ https://t.me/cKure/14372
July 9, 2024 at 12:01AM
■■■■□ Solar 4RAYS threat intel team uncovers a new APT group “Lifting Zmiy” (eng. Lifting Serpent) that targets government organizations in Russia and Eastern Europe. The group hosted their C2 infrastructure on compromised servers, which were used in SCADA networks. https://rt-solar.ru/solar-4rays/blog/4506/ https://t.me/cKure/14371
July 7, 2024 at 09:35PM
https://s3.timeweb.cloud/fd51ce25-6f95e3f8-263a-4b13-92af-12bc265adb44/rockyou2024.zip https://t.me/cKure/14370
July 7, 2024 at 06:05PM
■■■■□ How CVE-2022-24785 MomentJS Path Traversal Works: Detailed Exploit Guide. https://0xjay.com/how-cve-2022-24785-momentjs-path-traversal-works-detailed-exploit-guide https://t.me/cKure/14369
