chronosond3r.bsky.social
@chronosond3r.bsky.social
Reposted
🚨 New Blog Alert! 🚨 Check out our latest post on the top 10 industries targeted by threat actors in 2024. Stay informed and protect your business! 🔒💻 Read more: https://innovirtuoso.com/technology/top-10-industries-targeted-by-threat-actors-in-2024/ #CyberSecurity #ThreatIntel #Infosec
Top 10 Industries Targeted by Threat Actors in 2024
As 2024 unfolds, understanding the industries most susceptible to cyber threats becomes increasingly crucial. This blog post examines the top 10 sectors at risk
innovirtuoso.com
September 22, 2025 at 4:52 AM
Reposted
⚠️ Trojan in disguise: PDF editor backdoor

The “AppSuite PDF Editor” poses as a legit tool but is a backdoor: most of its code supports malware functions, including C2 comms, scheduled tasks, and AES-encrypted data exfiltration.

Persistence is full, cleanup needs system repave.

#ransomNews
August 31, 2025 at 3:37 PM
Reposted
A Critical Zero-Click WhatsApp Flaw, CVE-2025-55177, Was Exploited in Zero-Day Attacks
A Critical Zero-Click WhatsApp Flaw, CVE-2025-55177, Was Exploited in Zero-Day Attacks
A critical zero-click flaw in WhatsApp (CVE-2025-55177), paired with an Apple zero-day, was used in sophisticated attacks. All users must update now.
securityonline.info
August 30, 2025 at 6:45 AM
Reposted
What defence should do next: stop chasing single posts or model fingerprints. Track conversations and coordination—cadence, stance persistence, routing fingerprints, template reuse. Open models push capability to the edge.
Substack: techletters.substack.com/p/techletter...
TechLetters Insights. AI propaganda factories: from State actors to bedroom micro‑actors
AI will transform propaganda and information influence.
techletters.substack.com
August 29, 2025 at 7:05 AM
Reposted
📣AI propaganda factories🏭 are now operational. My study shows how small, open-weight models can run as fully automatic generators in influence campaigns. mechanising personas, engagement, cadence. Possible for State, non-state, and micro-actors, including and bedroom ones.
August 29, 2025 at 7:05 AM
Reposted
AI Agents Access Everything, Fall to Zero-Click Exploit
AI Agents Access Everything, Fall to Zero-Click Exploit
Zenity CTO Michael Bargury joins the Black Hat USA 2025 News Desk to discuss research on a dangerous exploit, how generative AI technology has "grown arms and legs" —and what that means for cyber risk.
www.darkreading.com
August 19, 2025 at 7:33 PM
Reposted
AI infrastructure also carries cybersecurity risks. MCP servers (AI connectors to data and tools) can become a backdoor and be used to steal company data. Researchers found 492 servers exposed without authentication. www.trendmicro.com/vinfo/us/sec...
August 18, 2025 at 6:55 AM
Reposted
Man-in-the-Prompt: The invisible attack threatening ChatGPT and other AI systems
Man-in-the-Prompt: The invisible attack threatening ChatGPT and other AI systems
Man-in-the-Prompt: a new threat targeting AI tools like ChatGPT and Gemini via simple browser extensions, no complex attack needed.
securityaffairs.com
August 16, 2025 at 5:52 PM
Reposted
Critical FortiSIEM Vulnerability Let Attackers to Execute Malicious Commands – PoC Found in Wild
Critical FortiSIEM Vulnerability Let Attackers to Execute Malicious Commands - PoC Found in Wild
cybersecuritynews.com
August 13, 2025 at 6:20 AM
Reposted
⚠️ Netherlands' NCSC warns that the critical Citrix NetScaler flaw

CVE-2025-6543, a memory overflow, has been exploited as a zero-day since May 2025.

Multiple vital organizations were breached, with attackers deploying stealthy web shells and erasing forensic traces. Patch immediately.

#ransomNews
August 12, 2025 at 7:08 AM
Reposted
Poisoned telemetry can turn AIOps into AI Oops, researchers show
AI models can be tricked into mismanaging IT operations
: Sysadmins, your job is safe
www.theregister.com
August 12, 2025 at 7:23 AM
Reposted
According to discovery by an investigative journalist Henk van Ess of Digital Digging, over 100,000 conversations people had with ChatGPT are available on Archive.org www.digitaldigging.org/p/the-chatgp...
The ChatGPT confession files
Digital Digging investigation: how your AI conversation could end your career
www.digitaldigging.org
August 4, 2025 at 10:41 AM
Reposted
Search Engines are Indexing ChatGPT Conversations! – Here is our OSINT Research
Search Engines are Indexing ChatGPT Conversations! - Here is our OSINT Research
cybersecuritynews.com
August 1, 2025 at 8:08 AM
Reposted
🚨 Is the US set to ban TP-Link routers? Discover what you need to know about potential impacts on connectivity and security. Read more here: https://innovirtuoso.com/technology/is-the-us-set-to-ban-tp-link-routers-what-you-need-to-know/ #TPLink #TechNews 💻🔒
Is the US Set to Ban TP-Link Routers? What You Need to Know
This decision, driven by security vulnerabilities and geopolitical tensions, could disrupt service for users reliant on these devices.
innovirtuoso.com
July 30, 2025 at 2:15 PM
Reposted
Hackers Exploit SAP Vulnerability to Breach Linux Systems and Deploy Auto-Color Malware
Hackers Exploit SAP Vulnerability to Breach Linux Systems and Deploy Auto-Color Malware
thehackernews.com
July 30, 2025 at 8:27 AM
Reposted
Hackers Attacking IIS Servers With New Web Shell Script to Gain Complete Remotely Control
Hackers Attacking IIS Servers With New Web Shell Script to Gain Complete Remotely Control
cybersecuritynews.com
July 29, 2025 at 6:48 AM
Reposted
Worked with @lloydslisted.bsky.social to uncover a massive network of fraudulent ship registry websites, many listed as official flag state contacts in the IMO GISIS website:
Massive fraudulent flag operation linking over 20 separate fake sites uncovered
A Lloyd’s List investigation has revealed the connections between the rapidly growing number of fraudulent ship registries being used by hundreds of sanctioned ships globally
www.lloydslist.com
July 25, 2025 at 5:43 PM
Reposted
Pentests once a year? Nope. It’s time to build an offensive SOC
Pentests once a year? Nope. It’s time to build an offensive SOC
thehackernews.com
July 24, 2025 at 12:52 PM
Reposted
Proton launches privacy-respecting encrypted AI assistant Lumo
Proton launches privacy-respecting encrypted AI assistant Lumo
Proton has launched a new tool called Lumo, offering a privacy-first AI assistant that does not log user conversations and doesn't use their prompts for training.
www.bleepingcomputer.com
July 23, 2025 at 5:58 PM
Reposted
New PoisonSeed Attack Let Attackers Trick Users into Scanning a QR Code with an MFA Authenticator
New PoisonSeed Attack Let Attackers Trick Users into Scanning a QR Code with an MFA Authenticator
cybersecuritynews.com
July 21, 2025 at 6:56 AM
Reposted
File Pursuit

Open Directory Search Engine. Search audio, video, archives, documents, mobile apps and other files.

Browse list of IPs/domains with open directories.

filepursuit.com
July 14, 2025 at 9:08 PM
Reposted
Top 11 Best SysAdmin Tools in 2025
Top 11 Best SysAdmin Tools in 2025
cybersecuritynews.com
July 11, 2025 at 7:26 AM
Reposted
Critical mcp-remote Vulnerability Exposes LLM Clients to Remote Code Execution Attacks
Critical mcp-remote Vulnerability Exposes LLM Clients to Remote Code Execution Attacks
cybersecuritynews.com
July 10, 2025 at 12:45 PM
Reposted
🔍 Apple users, beware! The AMOS MacOS Infostealer has evolved, embedding a backdoor that allows cybercriminals persistent access to your Mac. Discover how this threat targets crypto assets and more in our latest blog: https://innovirtuoso.com/ai-and-cybersecurity/amos-macos-in...
AMOS MacOS Infostealer Evolves: New Backdoor Threat Exposes Apple Users to Persistent Attacks
If you use a Mac and think you’re safe from the world of malware—think again. The landscape is changing fast, and a dangerous new player has just upped the stakes. Say hello (or rather, don’t) to the upgraded Atomic macOS Stealer (AMOS). This infamous infostealer has just evolved, now armed with a s
innovirtuoso.com
July 10, 2025 at 12:53 PM