⤷ Title: Open Firmware Reverse Analysis Konsole: binary analysis and modification platform
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:01:46 +0000
════════════════════════
⌗ Tags: #Reverse Engineering
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:01:46 +0000
════════════════════════
⌗ Tags: #Reverse Engineering
Penetration Testing Tools
Open Firmware Reverse Analysis Konsole: binary analysis and modification platform
Open Firmware Reverse Analysis (OFRAK) supports a range of embedded firmware file formats beyond userspace executables
⤷ Title: EscalateGPT: leverages the power of OpenAI to analyze AWS IAM misconfigurations
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 01:59:13 +0000
════════════════════════
⌗ Tags: #Web AppSec #AWS IAM misconfigurations #EscalateGPT
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 01:59:13 +0000
════════════════════════
⌗ Tags: #Web AppSec #AWS IAM misconfigurations #EscalateGPT
Penetration Testing Tools
EscalateGPT: leverages the power of OpenAI to analyze AWS IAM misconfigurations
EscalateGPT is a powerful Python tool that leverages the power of OpenAI to analyze AWS IAM misconfigurations.
⤷ Title: GitHub Enterprise SAML Bypass Flaw (CVE-2025-23369) Exposed – Technical Analysis and Exploit PoC
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:38:14 +0000
════════════════════════
⌗ Tags: #Vulnerability #CVE_2025_23369 #CVE_2025_23369 PoC #GitHub Enterprise
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:38:14 +0000
════════════════════════
⌗ Tags: #Vulnerability #CVE_2025_23369 #CVE_2025_23369 PoC #GitHub Enterprise
Cybersecurity News
GitHub Enterprise SAML Bypass Flaw (CVE-2025-23369) Exposed – Technical Analysis and Exploit PoC
Discover the details of the SAML authentication flaw in GitHub Enterprise (CVE-2025-23369) that allows attackers to bypass security measures.
⤷ Title: Multiple Security and Privacy Flaws Found in DeepSeek iOS App
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:36:17 +0000
════════════════════════
⌗ Tags: #Data Leak #Vulnerability #ByteDance #DeepSeek #DeepSeek Privacy Flaw #Privacy Flaw
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:36:17 +0000
════════════════════════
⌗ Tags: #Data Leak #Vulnerability #ByteDance #DeepSeek #DeepSeek Privacy Flaw #Privacy Flaw
Daily CyberSecurity
Multiple Security and Privacy Flaws Found in DeepSeek iOS App
Learn about the alarming security vulnerabilities found in the popular DeepSeek iOS app. Find out why several governments have banned its use.
⤷ Title: Alabama Man Pleads Guilty in Bitcoin Price Manipulation Scheme Involving Hacked SEC X Account
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:31:35 +0000
════════════════════════
⌗ Tags: #Cyber Security #Bitcoin #SEC
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:31:35 +0000
════════════════════════
⌗ Tags: #Cyber Security #Bitcoin #SEC
Cybersecurity News
Alabama Man Pleads Guilty in Bitcoin Price Manipulation Scheme Involving Hacked SEC X Account
Learn about the shocking hack of the SEC's X account and its impact on the cryptocurrency market. Find out the role of Eric Council Jr. in the fraudulent Bitcoin ETF announcement.
⤷ Title: Malicious Models on Hugging Face: A New Threat to AI Development
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:28:42 +0000
════════════════════════
⌗ Tags: #Malware #Hugging Face #Hugging Face platform #nullifAI #Pickle #platform
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:28:42 +0000
════════════════════════
⌗ Tags: #Malware #Hugging Face #Hugging Face platform #nullifAI #Pickle #platform
Cybersecurity News
Malicious Models on Hugging Face: A New Threat to AI Development
Learn about the latest malware distribution technique, nullifAI, targeting the Hugging Face platform and exploiting vulnerabilities in Pickle file serialization.
⤷ Title: The Rise of Phishing-as-a-Service: How Cybercriminals are Outsourcing Attacks
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:25:54 +0000
════════════════════════
⌗ Tags: #Cyber Security #Phishing_as_a_Service
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:25:54 +0000
════════════════════════
⌗ Tags: #Cyber Security #Phishing_as_a_Service
Cybersecurity News
The Rise of Phishing-as-a-Service: How Cybercriminals are Outsourcing Attacks
Explore the dangerous world of Phishing-as-a-Service (PhaaS). Learn about the rise of subscription-based platforms that enable cybercriminals to launch sophisticated phishing campaigns.
⤷ Title: LegionLoader Malware Downloader Resurfaces with 2,000+ New Samples
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:24:22 +0000
════════════════════════
⌗ Tags: #Malware #CurlyGate #LegionLoader #RobotDropper #Satacom
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:24:22 +0000
════════════════════════
⌗ Tags: #Malware #CurlyGate #LegionLoader #RobotDropper #Satacom
Daily CyberSecurity
LegionLoader Malware Downloader Resurfaces with 2,000+ New Samples
Discover the resurgence of LegionLoader, a sophisticated malware downloader. Learn how it spreads and the impact it has on global cybersecurity.
⤷ Title: CVE-2025-1077 (CVSSv4 9.5): Critical RCE Vulnerability Found in Visual Weather Products
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:18:53 +0000
════════════════════════
⌗ Tags: #Vulnerability #CVE_2025_1077 #IBL Software Engineering #Python #Visual Weather
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:18:53 +0000
════════════════════════
⌗ Tags: #Vulnerability #CVE_2025_1077 #IBL Software Engineering #Python #Visual Weather
Cybersecurity News
CVE-2025-1077 (CVSSv4 9.5): Critical RCE Vulnerability Found in Visual Weather Products
Stay informed about the critical RCE vulnerability (CVE-2025-1077) affecting IBL Software Engineering's Visual Weather and derived products. Learn how to protect your servers.
⤷ Title: BadIIS Malware Hijacks Asian Websites for SEO Fraud
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:14:01 +0000
════════════════════════
⌗ Tags: #Malware #BadIIS malware
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:14:01 +0000
════════════════════════
⌗ Tags: #Malware #BadIIS malware
Cybersecurity News
BadIIS Malware Hijacks Asian Websites for SEO Fraud
Discover the malicious BadIIS malware campaign targeting organizations in Asia. Find out how vulnerabilities in IIS are exploited for SEO manipulation.
⤷ Title: Progress LoadMaster Security Update: Multiple Vulnerabilities Addressed
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:08:35 +0000
════════════════════════
⌗ Tags: #Vulnerability #CVE_2024_56131 #CVE_2024_56132 #CVE_2024_56133 #CVE_2024_56134 #CVE_2024_56135 #LoadMaster #LoadMaster Multi_Tenant #Progress
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:08:35 +0000
════════════════════════
⌗ Tags: #Vulnerability #CVE_2024_56131 #CVE_2024_56132 #CVE_2024_56133 #CVE_2024_56134 #CVE_2024_56135 #LoadMaster #LoadMaster Multi_Tenant #Progress
Cybersecurity News
Progress LoadMaster Security Update: Multiple Vulnerabilities Addressed
Take action against CVE-2024-56131 and other vulnerabilities affecting LoadMaster. Upgrade now to protect your system from potential attacks.
⤷ Title: Misconfigured APIs Expose Sensitive Medical Data in Major Diagnostic Chain
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:00:48 +0000
════════════════════════
⌗ Tags: #Data Leak #Vulnerability #Misconfigured API
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:00:48 +0000
════════════════════════
⌗ Tags: #Data Leak #Vulnerability #Misconfigured API
Daily CyberSecurity
Misconfigured APIs Expose Sensitive Medical Data in Major Diagnostic Chain
Discover the critical vulnerabilities in the API infrastructure of a well-known diagnostic chain, exposing sensitive personal and medical data.
⤷ Title: 768 CVEs Exploited in 2024: VulnCheck Warns of Rising Threat
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 01:57:19 +0000
════════════════════════
⌗ Tags: #Vulnerability #Vulnerability Exploitation
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 01:57:19 +0000
════════════════════════
⌗ Tags: #Vulnerability #Vulnerability Exploitation
Daily CyberSecurity
768 CVEs Exploited in 2024: VulnCheck Warns of Rising Threat
Discover the concerning rise in vulnerability exploitation and its impact on cyber threats. Learn about the key findings from the VulnCheck report.
⤷ Title: The Ghost Network Hack: 2025’s Creepy Cyber Threat That’s Stealing Control of Your Devices
════════════════════════
𐀪 Author: Noel
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:56:22 GMT
════════════════════════
⌗ Tags: #ghosts #networking #cyber_security_awareness #cybersecurity #hacking
════════════════════════
𐀪 Author: Noel
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:56:22 GMT
════════════════════════
⌗ Tags: #ghosts #networking #cyber_security_awareness #cybersecurity #hacking
Medium
The Ghost Network Hack: 2025’s Creepy Cyber Threat That’s Stealing Control of Your Devices
In 2025, the world of cybersecurity has taken an unexpected, and frankly bizarre, twist. Picture this: you’re peacefully going about your…
⤷ Title: WPA3 Will Save Our Wi-Fi! Uh, Yeah, Not So Fast…
════════════════════════
𐀪 Author: z3r0trust
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:24:08 GMT
════════════════════════
⌗ Tags: #hacking #wifihacking #wifi #wifi_router #cybersecurity
════════════════════════
𐀪 Author: z3r0trust
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:24:08 GMT
════════════════════════
⌗ Tags: #hacking #wifihacking #wifi #wifi_router #cybersecurity
Medium
WPA3 Will Save Our Wi-Fi! Uh, Yeah, Not So Fast…
*Note: This article was originally published by the author on April 12, 2019. It is re-published here by the author for archival purposes.
⤷ Title: If You Believe These Myths, You’re an Easy Target for Hackers — Here’s Why.
════════════════════════
𐀪 Author: Joctan
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:20:10 GMT
════════════════════════
⌗ Tags: #cybersecurity_awareness #cybersecurity #hacking #passwords
════════════════════════
𐀪 Author: Joctan
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:20:10 GMT
════════════════════════
⌗ Tags: #cybersecurity_awareness #cybersecurity #hacking #passwords
Medium
If You Believe These Myths, You’re an Easy Target for Hackers — Here’s Why.
What Are They, and How to Make Hacking You a Total Nightmare?
⤷ Title: HOW TO GET STARTED IN BUG BOUNTY AS A BEGINNER
════════════════════════
𐀪 Author: Pratik Jha
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:57:32 GMT
════════════════════════
⌗ Tags: #ethical_hacking #penetration_testing #bug_bounty #web_security #cybersecurity
════════════════════════
𐀪 Author: Pratik Jha
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:57:32 GMT
════════════════════════
⌗ Tags: #ethical_hacking #penetration_testing #bug_bounty #web_security #cybersecurity
Medium
HOW TO GET STARTED IN BUG BOUNTY AS A BEGINNER
Bug bounty hunting is a rewarding field where ethical hackers get paid to find security flaws in websites and applications. If you’re a…
⤷ Title: Deploying and Configuring a WinCollect Agent on a Windows Client for IBM QRadar
════════════════════════
𐀪 Author: Daouda Diallo
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:56:13 GMT
════════════════════════
⌗ Tags: #qradar_wincollect #cybersecurity #qradar #logs #siem
════════════════════════
𐀪 Author: Daouda Diallo
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:56:13 GMT
════════════════════════
⌗ Tags: #qradar_wincollect #cybersecurity #qradar #logs #siem
Medium
Deploying and Configuring a WinCollect Agent on a Windows Client for IBM QRadar
In this blog post, we will explore the steps for configuring WinCollect in IBM QRadar to collect logs from a Windows machine and integrate…
⤷ Title: Security Obscurity-7.19_Hiding From Data Breaches
════════════════════════
𐀪 Author: z3r0trust
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:27:11 GMT
════════════════════════
⌗ Tags: #data_breach #obscurity #cybersecurity #information_security #security
════════════════════════
𐀪 Author: z3r0trust
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:27:11 GMT
════════════════════════
⌗ Tags: #data_breach #obscurity #cybersecurity #information_security #security
Medium
Security Obscurity-7.19_Hiding From Data Breaches
*Note: This article was originally published by the author on July 8, 2019. It is re-published here by the author for archival purposes…
⤷ Title: Higher Education Desperately Needs a Cybersecurity Wake-Up Call
════════════════════════
𐀪 Author: z3r0trust
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:25:35 GMT
════════════════════════
⌗ Tags: #information_security #higher_ed #cybersecurity #colleges_and_universities #cybersecurity_awareness
════════════════════════
𐀪 Author: z3r0trust
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:25:35 GMT
════════════════════════
⌗ Tags: #information_security #higher_ed #cybersecurity #colleges_and_universities #cybersecurity_awareness
Medium
Higher Education Desperately Needs a Cybersecurity Wake-Up Call
*Note: This article was originally published by the author on July 18, 2019. It is re-published here by the author for archival purposes…
⤷ Title: AI Algorithmic Red Teaming Tools, Resources, and Mindmap
════════════════════════
𐀪 Author: Omar Santos
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:23:30 GMT
════════════════════════
⌗ Tags: #ai_tools #owasp #ai #ai_red_teaming #cybersecurity
════════════════════════
𐀪 Author: Omar Santos
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:23:30 GMT
════════════════════════
⌗ Tags: #ai_tools #owasp #ai #ai_red_teaming #cybersecurity
Medium
AI Algorithmic Red Teaming Tools, Resources, and Mindmap
This week I am presenting two sessions at Cisco Live EMEA: