https://x.com/IntCyberDigest
https://infosec.exchange/@InternationalCyberDigest
Triggering exceptions before Vectored Exception Handlers are called.
kr0tt.github.io/posts/early-...
github.com/kr0tt/EarlyE...
Triggering exceptions before Vectored Exception Handlers are called.
kr0tt.github.io/posts/early-...
github.com/kr0tt/EarlyE...
They claimed to be IT specialists.
They claimed to be IT specialists.
An exercise where NATO tests its ability to protect networks and critical infrastructure against threats like.. you guessed it.. China.
An exercise where NATO tests its ability to protect networks and critical infrastructure against threats like.. you guessed it.. China.
Bluetooth is a prime target for attackers due to its widespread presence in devices like TVs, car chargers, and connected fridges, especially on mobile devices where it runs as a privileged process with potential access to microphones, address books,
Bluetooth is a prime target for attackers due to its widespread presence in devices like TVs, car chargers, and connected fridges, especially on mobile devices where it runs as a privileged process with potential access to microphones, address books,
A guide on exploiting parser confusion in real-world applications.
Read:
www.yeswehack.com/learn-bug-bo...
A guide on exploiting parser confusion in real-world applications.
Read:
www.yeswehack.com/learn-bug-bo...
Comprehensive analysis of (lesser known) RDP exploitation vectors by Google Threat Intelligence.
cloud.google.com/blog/topics/...
Comprehensive analysis of (lesser known) RDP exploitation vectors by Google Threat Intelligence.
cloud.google.com/blog/topics/...
The $600 Kohler Dekoda camera, which requires a subscription to function, was advertised as having “end-to-end” encryption.
Investigations show the other end is the company itself.
The $600 Kohler Dekoda camera, which requires a subscription to function, was advertised as having “end-to-end” encryption.
Investigations show the other end is the company itself.
After doxxing himself, he immediately deleted the post.
But we still have it. You can read all the juicy “dumb shit” Mastercard does.
After doxxing himself, he immediately deleted the post.
But we still have it. You can read all the juicy “dumb shit” Mastercard does.
The EU said that by allowing people to pay for a blue verified checkmark, the platform deceives users because it is not meaningfully verifying who is behind the account.
The EU said that by allowing people to pay for a blue verified checkmark, the platform deceives users because it is not meaningfully verifying who is behind the account.
Simply viewing their ads was enough to get infected.
Surveillance company Intellexa gained full access to cameras, microphones, chat apps, emails, GPS locations, photos, files, and browsing activity.
Simply viewing their ads was enough to get infected.
Surveillance company Intellexa gained full access to cameras, microphones, chat apps, emails, GPS locations, photos, files, and browsing activity.
The man wrote the following on Reddit:
I’m 49.
2025 has been the best year of my life… until two nights ago.
The man wrote the following on Reddit:
I’m 49.
2025 has been the best year of my life… until two nights ago.
gist.github.com/maple3142/48...
gist.github.com/maple3142/48...
In progress - Scheduled maintenance is currently in progress. We will provide updates as necessary.
Dec 05, 2025 - 09:00 UTC
Scheduled - We will be performing scheduled maintenance in DTW (Detroit) datacenter on 2025-12-05 between 09:00 and 13:00 UTC.
In progress - Scheduled maintenance is currently in progress. We will provide updates as necessary.
Dec 05, 2025 - 09:00 UTC
Scheduled - We will be performing scheduled maintenance in DTW (Detroit) datacenter on 2025-12-05 between 09:00 and 13:00 UTC.
The French regulator CNIL stated that cookies were placed upon loading the page, and even when a user opted out, they still placed tracking cookies.
The French regulator CNIL stated that cookies were placed upon loading the page, and even when a user opted out, they still placed tracking cookies.
He was lured into a sandbox by researchers, who observed the wild APT in a controlled setting to see what he would do.
He was lured into a sandbox by researchers, who observed the wild APT in a controlled setting to see what he would do.
Micron announced today that it will exit its Crucial consumer business, ending retail sales of Crucial-branded SSDs and memory modules at major retailers and online stores.
Micron announced today that it will exit its Crucial consumer business, ending retail sales of Crucial-branded SSDs and memory modules at major retailers and online stores.
Researchers found that this method, called “adversarial poetry,” was a jailbreaking technique for all major AI model families, including those from OpenAI, Google, Meta, and China’s DeepSeek.
Researchers found that this method, called “adversarial poetry,” was a jailbreaking technique for all major AI model families, including those from OpenAI, Google, Meta, and China’s DeepSeek.
There is an unauthenticated remote code execution vulnerability in React Server Components.
This vulnerability was disclosed as CVE-2025-55182 and is rated CVSS 10.0.
react.dev/blog/2025/12...
There is an unauthenticated remote code execution vulnerability in React Server Components.
This vulnerability was disclosed as CVE-2025-55182 and is rated CVSS 10.0.
react.dev/blog/2025/12...
RaspAP is feature-rich wireless router software that just works on many popular Debian-based devices, including the Raspberry Pi.
github.com/RaspAP/raspa...
RaspAP is feature-rich wireless router software that just works on many popular Debian-based devices, including the Raspberry Pi.
github.com/RaspAP/raspa...