■■■■□ Satellite 🛰 Hacking: How to Hack a Vulnerable Satellite: PWNSAT Project. How to Hack a Vulnerable Satellite: PWNSAT Project
All posts by John Doe
September 1, 2025 at 02:44PM
■■■□□ Abandoned Sogou Zhuyin Update Server Hijacked, Weaponized in Taiwan Espionage Campaign. An abandoned update server associated with input method editor (IME) software Sogou Zhuyin was leveraged by threat actors as part of an espionage campaign to deliver several malware families, including C6DOOR and GTELAM, in attacks primarily targeting users across Eastern Asia. https://thehackernews.com/2025/08/abandoned-sogou-zhuyin-update-server.html
August 31, 2025 at 10:44PM
■□□□□ India: New ‘Sindoor Dropper’ Malware Targets Linux Systems with Weaponized .desktop Files. New ‘Sindoor Dropper’ Malware Targets Linux Systems with Weaponized .desktop Files
August 31, 2025 at 01:42AM
■■■■■ Bypassing HTTPS by installing custom CA by a malicious app (branded as a VPN) made by Jews of Unit-8200 calling it Onavo. This app was banned by Apple for privacy breaches. However, the Jews ✡️ used Apple’s other technical loophole to bypass this restriction with more advanced hookings. This Onavo app was used by…
August 31, 2025 at 01:07AM
🙋😴😴😊Disclosure: Covert Web-to-App Tracking via Localhost on Android. Organizations like Meta / Yandex have stopped this intrusive privacy breaching activity. localmess.github.io
August 30, 2025 at 09:50PM
■■■□□ Multiple Hikvision Vulnerabilities Let Attackers Execute Malicious Commands. Multiple Hikvision Vulnerabilities Let Attackers Execute Malicious Commands
August 30, 2025 at 08:21PM
■■■□□ Scientists Crack a 40-Year Puzzle in Unbreakable Encryption. https://scitechdaily.com/scientists-crack-a-40-year-puzzle-in-unbreakable-encryption/
August 30, 2025 at 02:47PM
■■■□□ Defending against malware persistence techniques with Wazuh. https://www.bleepingcomputer.com/news/security/defending-against-malware-persistence-techniques-with-wazuh/
August 30, 2025 at 12:26PM
■■■■■ Browser SOP bypass by Prompt Injection 💉 Perplexity Comet Browser Vulnerable To Prompt Injection Exploit. Vulnerability discovered in Perplexity’s Comet AI browser enables attackers to gain access to sensitive data in open browser tabs. https://www.searchenginejournal.com/perplexity-comet-browser-vulnerable-to-prompt-injection-exploit/554575/
August 30, 2025 at 12:24PM
■■■■□ Safari Address Bar Spoof via Cursor Overlap. https://github.com/RenwaX23/X/blob/master/safari_bug2.md
