https://x.com/IntCyberDigest
https://infosec.exchange/@InternationalCyberDigest
Possible victims of the breach can now check whether their data has been leaked.
Check it out: haveibeenpwned.com/Breach/Eurof...
Possible victims of the breach can now check whether their data has been leaked.
Check it out: haveibeenpwned.com/Breach/Eurof...
Submit nominations via DM or Signal (in bio) with reasons for recognition.
This week's nominee is Belgian national @DidierStevens: A pioneer in malware analysis.
Submit nominations via DM or Signal (in bio) with reasons for recognition.
This week's nominee is Belgian national @DidierStevens: A pioneer in malware analysis.
OctoSQL is predominantly a CLI tool which lets you query a plethora of databases and file formats using SQL through a unified interface, even do JOINs between them. (Ever needed to join a JSON file with a PostgreSQL table? OctoSQL can help you with that.)
OctoSQL is predominantly a CLI tool which lets you query a plethora of databases and file formats using SQL through a unified interface, even do JOINs between them. (Ever needed to join a JSON file with a PostgreSQL table? OctoSQL can help you with that.)
A concerned customer, who is frustrated that Beckett is not communicating about the leak, sent the info with to us.
We shared this list with @troyhunt for addition to Have I Been Pwned.
A concerned customer, who is frustrated that Beckett is not communicating about the leak, sent the info with to us.
We shared this list with @troyhunt for addition to Have I Been Pwned.
WhatsApp's entire member directory was freely accessible online.
Austrian researchers downloaded all phone numbers and other profile data – including public keys – without any obstacles.
WhatsApp's entire member directory was freely accessible online.
Austrian researchers downloaded all phone numbers and other profile data – including public keys – without any obstacles.
It wasn't DNS...
A change to permissions in one of their database systems caused the database to output multiple duplicate entries into a “feature file” used by their Bot Management system. That file then doubled in size.
It wasn't DNS...
A change to permissions in one of their database systems caused the database to output multiple duplicate entries into a “feature file” used by their Bot Management system. That file then doubled in size.
Memory leak vulnerability combined with reflected XSS in Citrix NetScaler appliances.
Read:
labs.watchtowr.com/is-it-citrix...
Memory leak vulnerability combined with reflected XSS in Citrix NetScaler appliances.
Read:
labs.watchtowr.com/is-it-citrix...
Writeup of the recently found critical RCE vulnerability in Ubiquiti UniFi Access.
www.catchify.sa/post/cve-202...
Writeup of the recently found critical RCE vulnerability in Ubiquiti UniFi Access.
www.catchify.sa/post/cve-202...
These investigations will assess Amazon and Microsoft.
The DMA aims to ensure contestable and fair markets in the digital sector.
These investigations will assess Amazon and Microsoft.
The DMA aims to ensure contestable and fair markets in the digital sector.
Fully extracted system prompts, guidelines, and tools from OpenAI, Google, Anthropic, xAI, Perplexity, Cursor, Windsurf, Devin, Manus, Replit, and more — covering virtually all major AI models and agents.
Go see: github.com/elder-pliniu...
Fully extracted system prompts, guidelines, and tools from OpenAI, Google, Anthropic, xAI, Perplexity, Cursor, Windsurf, Devin, Manus, Replit, and more — covering virtually all major AI models and agents.
Go see: github.com/elder-pliniu...
The malware creates a test file, encrypts it, and assigns a score based on the machine's speed.
Depending on the score, it decides to fully or partially encrypt the files.
The malware creates a test file, encrypts it, and assigns a score based on the machine's speed.
Depending on the score, it decides to fully or partially encrypt the files.
This has raised many questions among its customers about what data they collect and why they have such a threatening tone.
Many 3D printers these days use the cloud for printing.
This has raised many questions among its customers about what data they collect and why they have such a threatening tone.
Many 3D printers these days use the cloud for printing.
"It is a disgrace that a phone company would sell devices with bloatware. You've already paid for the phone, and now Samsung is making their customers pay double, this time with their data"
"It is a disgrace that a phone company would sell devices with bloatware. You've already paid for the phone, and now Samsung is making their customers pay double, this time with their data"
Samsung faces backlash over AppCloud, an Israeli-developed app pre-installed on budget Galaxy A and M series devices.
Samsung faces backlash over AppCloud, an Israeli-developed app pre-installed on budget Galaxy A and M series devices.
A modern, lightweight torrent streaming application with instant playback.
Try: github.com/hotheadhacke...
A modern, lightweight torrent streaming application with instant playback.
Try: github.com/hotheadhacke...
In-depth research into Windows ARM64 internals and pointer authentication mechanisms.
In-depth research into Windows ARM64 internals and pointer authentication mechanisms.
Dutch police seized thousands of CrazyRDP servers in Zoetermeer, Netherlands, at Serverion's datacenter.
CrazyRDP is linked to numerous cybercrime and CSAM cases.
Video: x.com/IntCyberDige...
Dutch police seized thousands of CrazyRDP servers in Zoetermeer, Netherlands, at Serverion's datacenter.
CrazyRDP is linked to numerous cybercrime and CSAM cases.
Video: x.com/IntCyberDige...
DRAM bus interposition attack against SGX. Complete hardware-level control demonstration.
Read: wiretap.fail
DRAM bus interposition attack against SGX. Complete hardware-level control demonstration.
Read: wiretap.fail
The Nokia WiFi Beacon 1 is a dual-band Wi-Fi 5 (802.11ac) mesh router designed to extend wireless coverage and eliminate dead zones throughout a home.
Read: spaceraccoon.dev/nokia-beacon...
The Nokia WiFi Beacon 1 is a dual-band Wi-Fi 5 (802.11ac) mesh router designed to extend wireless coverage and eliminate dead zones throughout a home.
Read: spaceraccoon.dev/nokia-beacon...
Notable companies and organizations include:
- Airbus
- Multiple French ministries
- Thales
- Orange
Notable companies and organizations include:
- Airbus
- Multiple French ministries
- Thales
- Orange
A Story About Bypassing Air Canada's In-flight Network Restrictions.
Read it: ramsayleung.github.io/en/post/2025...
A Story About Bypassing Air Canada's In-flight Network Restrictions.
Read it: ramsayleung.github.io/en/post/2025...