October 6, 2025 at 02:35PM

📱 Critical zero-click vulnerability (CVE-2025-55177) within WhatsApp has been leveraged in targeted spyware operations, in conjunction with an Apple Imagel0 flaw (CVE-2025-43300). This combination enabled malicious actors to disseminate exploits via WhatsApp, resulting in potential data exfiltration from the user’s Apple device. The attack sequence involved: 🚫Attacker-controlled delivery 🚫Malicious DNG/remote image (Imagel0) parsing vulnerability (OOB…

October 3, 2025 at 04:39PM

■■■■■ New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer. In yet another piece of research, academics from Georgia Institute of Technology and Purdue University have demonstrated that the security guarantees offered by Intel’s Software Guard eXtensions (SGX) can be bypassed on DDR4 systems to passively decrypt sensitive data. https://thehackernews.com/2025/10/new-wiretap-attack-extracts-intel-sgx.html

October 3, 2025 at 02:24AM

🔑 OpenSSL Vulnerabilities Let Attackers Execute Malicious Code and Recover Private Key Remotely. ➿CVE-2025-9230: Memory Corruption Vulnerability ➿CVE-2025-9231: Timing Side-Channel Flaw OpenSSL Vulnerabilities Let Attackers Execute Malicious Code and Recover Private Key Remotely

October 2, 2025 at 01:00PM

■■■□□ 📡 Cisco Meraki interactive auditing tool in python. 〰️Installs its own dependencies. 〰️Tool does read-only API check. 〰️Dumps the config in JSON (missing natively in Meraki Dashboard) 〰️Has option to select Network or dump-all 〰️Performs security audit and saves in csv And saves as: meraki/ └── NetworkName/ ├── config.json # Complete configuration dump └──…