■■■■□ Jewish NSO group Fallout. NSO Group developed a specialized system called the WhatsApp Installation Server (WIS) to deploy its Pegasus spyware. This server sent malformed messages through WhatsApp’s infrastructure, mimicking legitimate traffic. These messages exploited vulnerabilities in WhatsApp’s code, causing target devices to reach out to NSO-controlled servers and install the spyware—all without user…
All posts by John Doe
May 15, 2025 at 02:50AM
■■■■□ Seven things we learned from WhatsApp vs. NSO Group spyware lawsuit. Seven things we learned from WhatsApp vs. NSO Group spyware lawsuit
May 14, 2025 at 01:25PM
■■■■□ Interesting post. Bypassing Cloudflare: From Smart RXSS Payload to Full Account Takeover. https://www.linkedin.com/posts/hushamosman_xss-bugbounty-cloudflarebypass-ugcPost-7328051349504311296-k1FE
May 13, 2025 at 09:03PM
■■□□□ 2025-05-12: Unidentified malware infection from email attachment. https://www.malware-traffic-analysis.net/2025/05/12/index.html
May 13, 2025 at 09:02PM
■■■■□ Zero-Day: PoC Exploit Released For Linux Kernel’s nftables Subsystem Vulnerability. PoC Exploit Released For Linux Kernel’s nftables Subsystem Vulnerability
May 13, 2025 at 03:47PM
■□□□□ Interesting thread on AI https://x.com/ngxson/status/1921980096421806127
May 12, 2025 at 10:30PM
■■■■□ India and Pakistan are still in a cyber war, even though the guns stopped amid ceasefire. UPI payment systems from India down a couple of times today are likely due to the cyber-attacks across the border. While in Pakistan, major sites allegedly suffer data leak including government agencies.
May 12, 2025 at 08:29PM
■■■■■ 🇨🇳 WireWatch: Measuring the security of proprietary network encryption in the global Android ecosystem. How secure are the apps on your Android phone? Researchers at the Citizen Lab and Princeton evaluated the network security of Android apps & found that a large portion of popular Chinese apps use broken proprietary network protocols instead of…
May 11, 2025 at 11:08PM
■■■■■ Injecting rootkit shellcode into an industrial PLC. Security vulnerabilities in the Schneider Electric M340. LE Security researchers Amir Zaltzman and Avishai Wool shared their journey to hacking Schneider Electric equipment and were able to find and exploit multiple vulnerabilities in its PLCs. In their paper, “From Pass-the-Hash to Code Execution on Schneider Electric M340…
May 11, 2025 at 03:07PM
■■■■□ Unconfirmed video of Defense Bypass / adding exclusion. Bypass windows defender with JScript
