■■■□□ Researchers Warn of Sitecore Exploit Chain Linking Cache Poisoning and Remote Code Execution. https://thehackernews.com/2025/08/researchers-warn-of-sitecore-exploit.html
All posts in Uncategorized
September 1, 2025 at 11:58PM
■■■■□ Hardware disassembly of Starlink 🇪🇺 based drone. An investing thread on 𝕏. https://x.com/FPGAX_/status/1962179402076410322
September 1, 2025 at 11:29PM
■■■■□ Bug-Hunting 101: Sensitive Endpoint Wordlist for Bug Hunting Uncover Hidden Flaws: A Powerful Wordlist for Bug Bounty Success. https://infosecwriteups.com/sensitive-endpoint-wordlist-for-bug-hunting-1acb50034629
September 1, 2025 at 04:49PM
■■■■□ Satellite 🛰 Hacking: How to Hack a Vulnerable Satellite: PWNSAT Project. How to Hack a Vulnerable Satellite: PWNSAT Project
September 1, 2025 at 02:44PM
■■■□□ Abandoned Sogou Zhuyin Update Server Hijacked, Weaponized in Taiwan Espionage Campaign. An abandoned update server associated with input method editor (IME) software Sogou Zhuyin was leveraged by threat actors as part of an espionage campaign to deliver several malware families, including C6DOOR and GTELAM, in attacks primarily targeting users across Eastern Asia. https://thehackernews.com/2025/08/abandoned-sogou-zhuyin-update-server.html
August 31, 2025 at 10:44PM
■□□□□ India: New ‘Sindoor Dropper’ Malware Targets Linux Systems with Weaponized .desktop Files. New ‘Sindoor Dropper’ Malware Targets Linux Systems with Weaponized .desktop Files
August 31, 2025 at 01:42AM
■■■■■ Bypassing HTTPS by installing custom CA by a malicious app (branded as a VPN) made by Jews of Unit-8200 calling it Onavo. This app was banned by Apple for privacy breaches. However, the Jews ✡️ used Apple’s other technical loophole to bypass this restriction with more advanced hookings. This Onavo app was used by…
August 31, 2025 at 01:07AM
🙋😴😴😊Disclosure: Covert Web-to-App Tracking via Localhost on Android. Organizations like Meta / Yandex have stopped this intrusive privacy breaching activity. localmess.github.io
August 30, 2025 at 09:50PM
■■■□□ Multiple Hikvision Vulnerabilities Let Attackers Execute Malicious Commands. Multiple Hikvision Vulnerabilities Let Attackers Execute Malicious Commands
August 30, 2025 at 08:21PM
■■■□□ Scientists Crack a 40-Year Puzzle in Unbreakable Encryption. https://scitechdaily.com/scientists-crack-a-40-year-puzzle-in-unbreakable-encryption/
