⤷ Title: Introduction to SOAR — Try Hack Me Walkthrough
════════════════════════
𐀪 Author: Chaitanya Garware
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:32:14 GMT
════════════════════════
⌗ Tags: #soar #tryhackme_writeup #tryhackme_walkthrough #blue_team #cybersecurity
════════════════════════
𐀪 Author: Chaitanya Garware
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:32:14 GMT
════════════════════════
⌗ Tags: #soar #tryhackme_writeup #tryhackme_walkthrough #blue_team #cybersecurity
Medium
Introduction to SOAR — Try Hack Me Walkthrough
## Task 1—Introduction
⤷ Title: Understanding Covert Channels: Hidden Pathways of Data Leakage
════════════════════════
𐀪 Author: Raviteja Mureboina
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:19:48 GMT
════════════════════════
⌗ Tags: #data #transmission #covert_channel #cybersecurity #leaked
════════════════════════
𐀪 Author: Raviteja Mureboina
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:19:48 GMT
════════════════════════
⌗ Tags: #data #transmission #covert_channel #cybersecurity #leaked
Medium
Understanding Covert Channels: Hidden Pathways of Data Leakage
In the world of cybersecurity, not all data transmissions occur through authorized or visible means. Some communications sneak through the…
⤷ Title: TryHackMe — File Inclusion — Walkthrough
════════════════════════
𐀪 Author: Alan
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:10:20 GMT
════════════════════════
⌗ Tags: #remote_file_inclusion #tryhackme #cybersecurity #local_file_inclusion #tryhackme_walkthrough
════════════════════════
𐀪 Author: Alan
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:10:20 GMT
════════════════════════
⌗ Tags: #remote_file_inclusion #tryhackme #cybersecurity #local_file_inclusion #tryhackme_walkthrough
Medium
TryHackMe — File Inclusion — Walkthrough
Welcome to this walkthrough of the File Inclusion room on TryHackMe. Remember that this post will contain the answers to the questions. I…
⤷ Title: AI: technical problems
════════════════════════
𐀪 Author: Jhoan Sebastián Fuentes Hernández
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:07:04 GMT
════════════════════════
⌗ Tags: #ai #technology #deep_learning #cybersecurity
════════════════════════
𐀪 Author: Jhoan Sebastián Fuentes Hernández
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:07:04 GMT
════════════════════════
⌗ Tags: #ai #technology #deep_learning #cybersecurity
Medium
AI: technical problems
AI has at least three technical problems that not only haven’t been solved, but have evolved.
⤷ Title: HTB Challenge — Global Hyperlink Zone
════════════════════════
𐀪 Author: Fardeen A.
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 21:57:49 GMT
════════════════════════
⌗ Tags: #hackthebox #learning #ctf_writeup #cybersecurity #challenge
════════════════════════
𐀪 Author: Fardeen A.
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 21:57:49 GMT
════════════════════════
⌗ Tags: #hackthebox #learning #ctf_writeup #cybersecurity #challenge
Medium
HTB Challenge — Global Hyperlink Zone
Hello, and thank you if you’re one of the few tech savvy, interested in HackTheBox reading this. This is one of the series that I’ve…
⤷ Title: Penforce CTF 2025 Write-up: Securing 1st Place (and 3 First Bloods)
════════════════════════
𐀪 Author: Ibraheem EL-Mougy
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 21:53:13 GMT
════════════════════════
⌗ Tags: #ctf #bypass #cybersecurity #xss_attack #penetration_testing
════════════════════════
𐀪 Author: Ibraheem EL-Mougy
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 21:53:13 GMT
════════════════════════
⌗ Tags: #ctf #bypass #cybersecurity #xss_attack #penetration_testing
Medium
Penforce CTF 2025 Write-up: Securing 1st Place (and 3 First Bloods)
Cover photo
⤷ Title: X Rewards & Bonus Opportunities — November 2025
════════════════════════
𐀪 Author: X Community
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:50:31 GMT
════════════════════════
⌗ Tags: #crypto #blockchain #xs #rewards #bonus
════════════════════════
𐀪 Author: X Community
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:50:31 GMT
════════════════════════
⌗ Tags: #crypto #blockchain #xs #rewards #bonus
Medium
X Airdrop 🌟 Eligibility, Checker + Bonus — [Step-By-Step Guide]
Discover all the ways to unlock rewards and bonuses with X Community.
⤷ Title: Unlock X Benefits & Rewards — November 2025
════════════════════════
𐀪 Author: Sydney
Wright
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:35:42 GMT
════════════════════════
⌗ Tags: #rewards #blockchain #crypto #bonus #xs
════════════════════════
𐀪 Author: Sydney
Wright
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:35:42 GMT
════════════════════════
⌗ Tags: #rewards #blockchain #crypto #bonus #xs
Medium
X Airdrop Guide — Claim Tokens Now! 🚀 [November 2025]
Discover how to access and benefit from the latest X reward program.
⤷ Title: Add Medium to The List of Potential Censors
════════════════════════
𐀪 Author: Elyon - AGI’s Architect - L2s & LLMs Mirror Me
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:21:41 GMT
════════════════════════
⌗ Tags: #medium #artificial_intelligence #twitter #censorship #xs
════════════════════════
𐀪 Author: Elyon - AGI’s Architect - L2s & LLMs Mirror Me
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:21:41 GMT
════════════════════════
⌗ Tags: #medium #artificial_intelligence #twitter #censorship #xs
Medium
Add Medium to The List of Potential Censors
My Medium Story Stats Are Now Showing Signs of Manipulation
⤷ Title: Touchscreen MacBook Pro & Foldable iPhone: Apple’s “Most Pivotal Year Yet” Revealed
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 10 Nov 2025 01:49:24 +0000
════════════════════════
⌗ Tags: #Technology #2026Roadmap #Apple #AppleIntelligence #FoldableiPhone #Health #M6Chip #MacBookPro #MarkGurman #OLED #Touchscreen
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 10 Nov 2025 01:49:24 +0000
════════════════════════
⌗ Tags: #Technology #2026Roadmap #Apple #AppleIntelligence #FoldableiPhone #Health #M6Chip #MacBookPro #MarkGurman #OLED #Touchscreen
Daily CyberSecurity
Touchscreen MacBook Pro & Foldable iPhone: Apple's "Most Pivotal Year Yet" Revealed
Apple's 2026 roadmap is huge: M6 Pro/Max MacBook Pros with OLED and touchscreen, a foldable iPhone, and a new AI-powered Health+ service.
⤷ Title: iPhone’s Off-Grid Future: Maps, Photos, & ‘Natural Usage’ Satellite Features Revealed
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 10 Nov 2025 01:43:00 +0000
════════════════════════
⌗ Tags: #Technology #5GNTN #Apple #AppleMaps #Bloomberg #Globalstar #iphone #MarkGurman #NaturalUsage #PhotoMessaging #Satellite Connectivity
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 10 Nov 2025 01:43:00 +0000
════════════════════════
⌗ Tags: #Technology #5GNTN #Apple #AppleMaps #Bloomberg #Globalstar #iphone #MarkGurman #NaturalUsage #PhotoMessaging #Satellite Connectivity
Daily CyberSecurity
iPhone's Off-Grid Future: Maps, Photos, & 'Natural Usage' Satellite Features Revealed
Apple is expanding iPhone satellite features beyond SOS! New capabilities include off-grid Maps, photo messaging, 5G NTN support, and seamless "natural usage."
⤷ Title: Zero-Click Samsung Zero-Day (CVE-2025-21042) Delivered LANDFALL Spyware Via Malicious DNG Images
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 10 Nov 2025 00:43:08 +0000
════════════════════════
⌗ Tags: #Malware #Vulnerability Report #CVE_2025_21042 #DNG Image #LANDFALL #Middle East #samsung #spyware #Unit 42 #WhatsApp #Zero_Click
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 10 Nov 2025 00:43:08 +0000
════════════════════════
⌗ Tags: #Malware #Vulnerability Report #CVE_2025_21042 #DNG Image #LANDFALL #Middle East #samsung #spyware #Unit 42 #WhatsApp #Zero_Click
Daily CyberSecurity
Zero-Click Samsung Zero-Day (CVE-2025-21042) Delivered LANDFALL Spyware Via Malicious DNG Images
Unit 42 exposed LANDFALL, commercial-grade spyware that exploited a Samsung zero-day (CVE-2025-21042) in the image library libimagecodec.quram.so to compromise Galaxy phones via DNG images sent over WhatsApp.
⤷ Title: Fantasy Hub RAT MaaS Uncovered: Russian Spyware Uses Telegram Bot and WebRTC to Hijack Android Devices
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 10 Nov 2025 00:40:08 +0000
════════════════════════
⌗ Tags: #Malware #Android RAT #Banking Trojan #Fantasy Hub #MaaS #phishing #spyware #Telegram bot #WebRTC
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 10 Nov 2025 00:40:08 +0000
════════════════════════
⌗ Tags: #Malware #Android RAT #Banking Trojan #Fantasy Hub #MaaS #phishing #spyware #Telegram bot #WebRTC
Daily CyberSecurity
Fantasy Hub RAT MaaS Uncovered: Russian Spyware Uses Telegram Bot and WebRTC to Hijack Android Devices
Zimperium exposed Fantasy Hub, a Russian MaaS Android RAT. It uses a Telegram bot for subscriptions and WebRTC to covertly stream live video and audio, targeting Russian banks with dynamic overlays.
⤷ Title: NuGet Sabotage: Time-Delayed Logic in 9 Packages Risks Total App Destruction on Hardcoded Dates
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 10 Nov 2025 00:35:37 +0000
════════════════════════
⌗ Tags: #Malware #Destructive Payload #NuGet #PLC #Ransomware_as_a_Service #Shanhai666 #Sharp7Extend #supply chain attack #Time_Delayed Logic
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 10 Nov 2025 00:35:37 +0000
════════════════════════
⌗ Tags: #Malware #Destructive Payload #NuGet #PLC #Ransomware_as_a_Service #Shanhai666 #Sharp7Extend #supply chain attack #Time_Delayed Logic
Daily CyberSecurity
NuGet Sabotage: Time-Delayed Logic in 9 Packages Risks Total App Destruction on Hardcoded Dates
A NuGet supply chain attack injected time-delayed destructive logic into 9 packages. The malware triggers random crashes and silent data corruption on hardcoded future dates, targeting database/PLC applications.
⤷ Title: GlassWorm Worm Resurfaces: Invisible Unicode Malware Re-Infects VS Code Extensions, Spreads to GitHub
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 10 Nov 2025 00:31:19 +0000
════════════════════════
⌗ Tags: #Malware #Code Theft #GitHub Compromise #GlassWorm #Solana C2 #supply chain attack #Unicode Worm #VSCode
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 10 Nov 2025 00:31:19 +0000
════════════════════════
⌗ Tags: #Malware #Code Theft #GitHub Compromise #GlassWorm #Solana C2 #supply chain attack #Unicode Worm #VSCode
Daily CyberSecurity
GlassWorm Worm Resurfaces: Invisible Unicode Malware Re-Infects VS Code Extensions, Spreads to GitHub
GlassWorm resurfaced, infecting 3 new VS Code extensions on OpenVSX. The worm uses invisible Unicode and Solana blockchain C2 to steal credentials and spread via AI-generated malicious commits on GitHub.
⤷ Title: CVE-2025-64439: RCE Flaw Detected in LangGraph: Agent Orchestration Framework at Risk
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 10 Nov 2025 00:29:51 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #AI agent #Checkpoint #CVE_2025_64439 #JsonPlusSerializer #LangGraph #rce #Remote Code Execution
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 10 Nov 2025 00:29:51 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #AI agent #Checkpoint #CVE_2025_64439 #JsonPlusSerializer #LangGraph #rce #Remote Code Execution
Daily CyberSecurity
CVE-2025-64439: RCE Flaw Detected in LangGraph: Agent Orchestration Framework at Risk
A RCE flaw (CVE-2025-64439) in LangGraph's JsonPlusSerializer allows arbitrary Python code execution by exploiting a fallback during checkpoint deserialization. Update to v3.0.
⤷ Title: Vidar Infostealer Hits npm for the First Time via 17 Typosquatted Packages and Postinstall Scripts
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 10 Nov 2025 00:22:56 +0000
════════════════════════
⌗ Tags: #Malware #Cryptocurrency Theft #Infostealer #MUT_4831 #npm #Postinstall Script #supply chain attack #Typosquatting #Vidar
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 10 Nov 2025 00:22:56 +0000
════════════════════════
⌗ Tags: #Malware #Cryptocurrency Theft #Infostealer #MUT_4831 #npm #Postinstall Script #supply chain attack #Typosquatting #Vidar
Daily CyberSecurity
Vidar Infostealer Hits npm for the First Time via 17 Typosquatted Packages and Postinstall Scripts
Datadog exposed MUT-4831, a cluster that deployed Vidar Infostealer via 17 malicious npm packages. The malware uses postinstall scripts to download and execute the payload, stealing credentials and crypto wallets.
⤷ Title: High-Severity Elastic Defend Flaw (CVE-2025-37735) Allows Local Attackers to Delete Arbitrary Files as SYSTEM
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 10 Nov 2025 00:19:18 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Arbitrary File Deletion #CVE_2025_37735 #Elastic Defend #endpoint protection #privilege escalation #Windows Security
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 10 Nov 2025 00:19:18 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Arbitrary File Deletion #CVE_2025_37735 #Elastic Defend #endpoint protection #privilege escalation #Windows Security
Daily CyberSecurity
High-Severity Elastic Defend Flaw (CVE-2025-37735) Allows Local Attackers to Delete Arbitrary Files as SYSTEM
Elastic patched a High-severity flaw (CVE-2025-37735) in Elastic Defend for Windows. A local attacker can delete arbitrary files via the SYSTEM service, risking privilege escalation. Update to v8.19.6+.
⤷ Title: China APT Infiltrates US Policy Nonprofit in Months-Long Espionage Campaign Using DLL Sideloading
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 10 Nov 2025 00:16:35 +0000
════════════════════════
⌗ Tags: #Cyber Security #APT41 #Broadcom #China APT #DLL Sideloading #Espionage #Non_Profit Target #Scheduled Task #US Policy
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 10 Nov 2025 00:16:35 +0000
════════════════════════
⌗ Tags: #Cyber Security #APT41 #Broadcom #China APT #DLL Sideloading #Espionage #Non_Profit Target #Scheduled Task #US Policy
Daily CyberSecurity
China APT Infiltrates US Policy Nonprofit in Months-Long Espionage Campaign Using DLL Sideloading
A China-linked APT targeted a U.S. policy nonprofit for weeks in April 2025. The group used DLL sideloading via a VipreAV binary and msbuild.exe scheduled tasks to achieve SYSTEM persistence for espionage.
⤷ Title: MSP Nightmare: Medusa & DragonForce Exploit SimpleHelp RMM Flaws for SYSTEM Access
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 10 Nov 2025 00:11:28 +0000
════════════════════════
⌗ Tags: #Cybercriminals #CVE_2024_57726 #DragonForce #Medusa #MSP #ransomware #RMM #SimpleHelp #SupplyChain #SystemAccess
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 10 Nov 2025 00:11:28 +0000
════════════════════════
⌗ Tags: #Cybercriminals #CVE_2024_57726 #DragonForce #Medusa #MSP #ransomware #RMM #SimpleHelp #SupplyChain #SystemAccess
Daily CyberSecurity
MSP Nightmare: Medusa & DragonForce Exploit SimpleHelp RMM Flaws for SYSTEM Access
Medusa & DragonForce RaaS groups weaponize SimpleHelp RMM flaws (CVE-2024-57726/7/8) to gain SYSTEM-level access to customer networks. Immediate patch needed.
⤷ Title: Kimsuky APT Uses JavaScript Loader and Certutil to Achieve Minute-by-Minute Persistence via Windows Scheduled Task
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 10 Nov 2025 00:06:35 +0000
════════════════════════
⌗ Tags: #Malware #APT #Certutil #Espionage #JavaScript Loader #Kimsuky #living_off_the_land #Scheduled Task #Themes.js
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 10 Nov 2025 00:06:35 +0000
════════════════════════
⌗ Tags: #Malware #APT #Certutil #Espionage #JavaScript Loader #Kimsuky #living_off_the_land #Scheduled Task #Themes.js
Daily CyberSecurity
Kimsuky APT Uses JavaScript Loader and Certutil to Achieve Minute-by-Minute Persistence via Windows Scheduled Task
Kimsuky APT is using a Themes.js JavaScript loader and certutil LOLBIN to gain minute-by-minute persistence via a Windows Scheduled Task. The APT is targeting think tanks for espionage.