⤷ Title: Ancient D-Link Routers Hijacked by New “Tuxnokill” Mirai Botnet
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 07:46:49 +0000
════════════════════════
⌗ Tags: #Malware #Vulnerability #Akamai SIRT #CVE_2025_29635 #D_Link DIR_823X #DDOS attack #End of Life Hardware #IoT Malware #Mirai botnet #router security #TP_Link CVE_2023_1389 #Tuxnokill #ZTE RCE
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 07:46:49 +0000
════════════════════════
⌗ Tags: #Malware #Vulnerability #Akamai SIRT #CVE_2025_29635 #D_Link DIR_823X #DDOS attack #End of Life Hardware #IoT Malware #Mirai botnet #router security #TP_Link CVE_2023_1389 #Tuxnokill #ZTE RCE
Penetration Testing Tools
Ancient D-Link Routers Hijacked by New "Tuxnokill" Mirai Botnet
Routers that have long been decommissioned from official support have suddenly become the epicenter of a resurgent wave
⤷ Title: Apple Issues Emergency Fix for iPhone Notification “Leaks” Exploited by Forensics
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 07:45:08 +0000
════════════════════════
⌗ Tags: #Apple #Vulnerability #CVE_2026_28950 #Data Security #Encryption #FBI #Forensics #iOS 26.4.2 #iPhone Update #Notification Database #privacy #Signal Messenger
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 07:45:08 +0000
════════════════════════
⌗ Tags: #Apple #Vulnerability #CVE_2026_28950 #Data Security #Encryption #FBI #Forensics #iOS 26.4.2 #iPhone Update #Notification Database #privacy #Signal Messenger
Penetration Testing Tools
Apple Issues Emergency Fix for iPhone Notification "Leaks" Exploited by Forensics
Apple has expeditiously addressed a critical vulnerability within the iPhone and iPad architecture, wherein notifications designated for deletion
⤷ Title: The Critical 9.1 Flaw in ASP.NET Core that Turns Cookies into Master Keys
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 07:44:01 +0000
════════════════════════
⌗ Tags: #Vulnerability #.NET 10 #ASP.NET Core #cryptography #CVE_2026_40372 #Cybersecurity 2026 #Data Protection #Infosec #Microsoft #Patch Tuesday #privilege escalation #web security
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 07:44:01 +0000
════════════════════════
⌗ Tags: #Vulnerability #.NET 10 #ASP.NET Core #cryptography #CVE_2026_40372 #Cybersecurity 2026 #Data Protection #Infosec #Microsoft #Patch Tuesday #privilege escalation #web security
Penetration Testing Tools
The Critical 9.1 Flaw in ASP.NET Core that Turns Cookies into Master Keys
An unforeseen regression within a software update has inadvertently caused a security mechanism to serve as a gateway
⤷ Title: The Global Surge in Modbus/TCP Probes Targeting Our Physical World
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 09:18:47 +0000
════════════════════════
⌗ Tags: #Cybercriminals #Cato Networks #Critical Infrastructure #Cyber Reconnaissance #ICS security #industrial control systems #infosec #Manufacturing Security #Modbus #OT Security #PLC #SCADA
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 09:18:47 +0000
════════════════════════
⌗ Tags: #Cybercriminals #Cato Networks #Critical Infrastructure #Cyber Reconnaissance #ICS security #industrial control systems #infosec #Manufacturing Security #Modbus #OT Security #PLC #SCADA
Daily CyberSecurity
The Global Surge in Modbus/TCP Probes Targeting Our Physical World
Cato Networks reveals 235,500+ Modbus probes on PLCs across 70 countries. Learn how attackers fingerprint and hijack industrial control systems. Patch now.
⤷ Title: “Bug Bounty Bootcamp #35: SSRF — Turning the Server Into Your Personal Proxy to Hack Internal…
════════════════════════
𐀪 Author: Aman Sharma
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 10:07:15 GMT
════════════════════════
⌗ Tags: #penetration_testing #hacking #bug_bounty #cybersecurity #technology
════════════════════════
𐀪 Author: Aman Sharma
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 10:07:15 GMT
════════════════════════
⌗ Tags: #penetration_testing #hacking #bug_bounty #cybersecurity #technology
Medium
“Bug Bounty Bootcamp #35: SSRF — Turning the Server Into Your Personal Proxy to Hack Internal Networks”