August 13, 2025 at 09:37AM

■□□□□ India 🇮🇳 | Election Fraud in 2024: A video Surface online showing EVMs (Electronic Voting Machine) 🗳 being abused to cast multiple votes per person. The voter was son of the; now winning party BJP. https://x.com/AdityaGoswami_/status/1953791078999482454

August 12, 2025 at 11:19PM

■■□□□ Defacement of Israeli sites continues as hackers take toll on another popular site. In a message shared by hacker group: תיירות, “צימרים בישראל” is the largest holiday booking center in ISRAEL TODAY GOT HACKED BY DIENET דף הבית

August 12, 2025 at 01:46PM

■■■■□ Malicious actors have been observed exploiting a now-patched critical security flaw impacting Erlang/Open Telecom Platform (OTP) SSH as early as beginning of May 2025, with about 70% of detections originating from firewalls protecting operational technology (OT) networks. The vulnerability in question is CVE-2025-32433 (CVSS score: 10.0), a missing authentication issue that could be abused…

August 11, 2025 at 12:30PM

■■■□□ United States | IoT: ICS/SCADA: DEF CON hackers plug security holes in US water systems amid tsunami of threats. Five pilot deployments are just a drop in the bucket, so it’s time to turbo scale. https://www.theregister.com/2025/08/10/def_con_hackers_water_security/

August 11, 2025 at 11:07AM

■■■■■ Researchers Detail Windows EPM Poisoning Exploit Chain Leading to Domain Privilege Escalation. You Snooze You Lose: RPC-Racer Winning RPC Endpoints Against Services https://thehackernews.com/2025/08/researchers-detail-windows-epm.html

August 10, 2025 at 11:55AM

■■■■■ BitUnlocker – Multiple 0-days to Bypass BitLocker and Extract All Protected Data. 🚫Boot.sdi Parsing Vulnerability (CVE-2025-48800) 🚫ReAgent.xml Exploitation (CVE-2025-48003) 🚫Trusted App Manipulation (CVE-2025-48804) 🚫BCD Configuration Attack (CVE-2025-48818) Mitigation: Enable TPM+PIN authentication for pre-boot verification. BitUnlocker – Multiple 0-days to Bypass BitLocker and Extract All Protected Data

August 10, 2025 at 11:47AM

■□□□□ Red Teams Jailbreak GPT-5 With Ease, Warn It’s ‘Nearly Unusable’ for Enterprise Researchers demonstrate how multi-turn “storytelling” attacks bypass prompt-level filters, exposing systemic weaknesses in GPT-5’s defenses. https://www.securityweek.com/red-teams-breach-gpt-5-with-ease-warn-its-nearly-unusable-for-enterprise/