Bad Connection: Global telecom exploitation by covert surveillance actors
(news.ycombinator.com)
1.
2.
Surveillance Pricing: Exploiting Information Asymmetries
(news.ycombinator.com)
4.
How Do You Find an Illegal Image Without Looking at It?
(news.ycombinator.com)
5.
6.
Jury says Meta knowingly harmed children for profit, awarding landmark verdict
(news.ycombinator.com)
7.
8.
10.
11.
Warlock Ransomware Group Augments Post-Exploitation Activities
(darkreading.com)
12.
Most Google Cloud Attacks Start With Bug Exploitation
(darkreading.com)
13.
Hacker broke into FBI and compromised Epstein files, report says
(techcrunch.com)
14.
Flaw in Grandstream VoIP phones allows stealthy eavesdropping
(bleepingcomputer.com)
15.
Sleeper Shells: Attackers Are Planting Dormant Backdoors in Ivanti EPMM
(news.ycombinator.com)
16.
Ivanti warns of two EPMM flaws exploited in zero-day attacks
(bleepingcomputer.com)
17.
18.
OpenAI’s child exploitation reports increased sharply this year
(arstechnica.com)
19.
20.
Attackers Exploited Gogs Zero-Day Flaw for Months
(darkreading.com)
21.
React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable
(bleepingcomputer.com)
22.
RondoDox botnet malware now hacks servers using XWiki flaw
(bleepingcomputer.com)
23.
Two Windows vulnerabilities, one a 0-day, are under active exploitation
(arstechnica.com)
24.
WordPress security plugin exposes private data to site subscribers
(bleepingcomputer.com)
25.
Hackers exploiting critical "SessionReaper" flaw in Adobe Magento
(bleepingcomputer.com)
26.
27.
28.
Citrix Bleed 2 exploited weeks before PoCs as Citrix denied attacks
(bleepingcomputer.com)
29.
CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch
(bleepingcomputer.com)
30.