@anon
sign up
@anon
sign up
pull down to refresh
New post-exploit tool called Splinter being used by threat actors
www.theregister.com/2024/09/23/splinter_red_team_tool/
110 sats
\
0 comments
\
@red5d
23 Sep 2024
security
related
Critical cPanel Vulnerability Weaponized to Target Government and MSP Networks
thehackernews.com/2026/05/critical-cpanel-vulnerability.html
499 sats
\
0 comments
\
@ch0k1
6 May
security
Attackers are mapping your attack surface—are you?
www.bleepingcomputer.com/news/security/attackers-are-mapping-your-attack-surface-are-you/
215 sats
\
0 comments
\
@ch0k1
31 May 2025
security
Unpatched Windows Flaw Exploited by 11 State-Sponsored Threat Groups Since 2017
thehackernews.com/2025/03/unpatched-windows-zero-day-flaw.html
499 sats
\
0 comments
\
@ch0k1
18 Mar 2025
security
New “Darksword” iOS exploit used in infostealer attack on iPhones
www.bleepingcomputer.com/news/security/new-darksword-ios-exploit-used-in-infostealer-attack-on-iphones/
312 sats
\
0 comments
\
@winteryeti
18 Mar
tech
CISA confirms active exploitation of four enterprise software bugs
www.bleepingcomputer.com/news/security/cisa-confirms-active-exploitation-of-four-enterprise-software-bugs/
227 sats
\
0 comments
\
@ch0k1
25 Jan
news
Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit
cloud.google.com/blog/topics/threat-intelligence/coruna-powerful-ios-exploit-kit
1067 sats
\
0 comments
\
@k00b
5 Mar
tech
Distillation, Experimentation, and Integration of AI for Adversarial Use
cloud.google.com/blog/topics/threat-intelligence/distillation-experimentation-integration-ai-adversarial-use
335 sats
\
0 comments
\
@0xbitcoiner
13 Feb
AI
Commercial Spyware Vendors Are Behind Most Zero-Day Exploits
securityaffairs.com/158750/hacking/commercial-spyware-vendors-zero-day.html
423 sats
\
0 comments
\
@0xbitcoiner
6 Feb 2024
security
Vulnhuntr: Open-source tool to identify remotely exploitable vulnerabilities
www.helpnetsecurity.com/2025/07/28/vulnhuntr-open-source-tool-identify-remotely-exploitable-vulnerabilities/
210 sats
\
0 comments
\
@ch0k1
28 Jul 2025
security
Reimbursement options for victims of the May 1 exploit · Bisq Network
github.com/bisq-network/bisq/discussions/7628
1239 sats
\
4 comments
\
@hasherstacker
3 May
bitcoin_beginners
Hackers used new Windows Defender zero-day to drop DarkMe malware
www.bleepingcomputer.com/news/security/hackers-used-new-windows-defender-zero-day-to-drop-darkme-malware/
339 sats
\
0 comments
\
@ch0k1
14 Feb 2024
security
Inside the KelpDAO Bridge Exploit
www.chainalysis.com/blog/kelpdao-bridge-exploit-april-2026/
705 sats
\
1 comment
\
@0xbitcoiner
24 Apr
security
GrapheneOS discloses vulnerabilities actively exploited by forensic companies
5869 sats
\
7 comments
\
@final
12 Jan 2024
security
Metasploit Module Released 4 Actively Exploited SharePoint 0-Day Vulnerabilities
cybersecuritynews.com/metasploit-module-for-sharepoint-0-day/
236 sats
\
0 comments
\
@ch0k1
28 Jul 2025
security
GrayKey leak implicating GrapheneOS success with vulnerability disclosures
4016 sats
\
4 comments
\
@final
19 Nov 2024
tech
Spending 1.4BTC to send pleading texts to someone who just robbed you | REKT
rekt.news/the-one-that-got-away
267 sats
\
12 comments
\
@DarthCoin
11 Sep 2025
bitcoin
Operation MidnightEclipse, Post-Exploitation Activity
unit42.paloaltonetworks.com/cve-2024-3400/
258 sats
\
3 comments
\
@Gian
15 Apr 2024
security
Operation Triangulation: The last (hardware) mystery
securelist.com/operation-triangulation-the-last-hardware-mystery/111669/
3867 sats
\
7 comments
\
@k00b
28 Dec 2023
security
Claude Mythos | First public macOS kernel memory corruption exploit on Apple M5
blog.calif.io/p/first-public-kernel-memory-corruption
442 sats
\
0 comments
\
@jakoyoh629
15 May
AI
What the Bybit Exploit Reveals About Enterprise Custody
blog.blockstream.com/what-the-bybit-exploit-reveals-about-enterprise-custody/
259 sats
\
0 comments
\
@0xbitcoiner
10 May
security
Anthropic just announced a model so powerful they won't release it
466 sats
\
10 comments
\
@justin_shocknet
7 Apr
AI
devs
more