hacker0x0
hacker0x0.bsky.social
hacker0x0
@hacker0x0.bsky.social
Reposted by hacker0x0
MITRE Caldera security suite scores perfect 10 for insecurity
MITRE Caldera security tool gets perfect 10 in insecurity
Is a trivial remote-code execution hole in every version part of the training, or?
www.theregister.com
February 25, 2025 at 9:12 PM
Reposted by hacker0x0
Chris Hadnagy vs. DEF CON Lawsuit update
2025/02/24

It’s been a while since our last update - a lot has been going on behind the scenes - and with the discovery phase complete we have filed a motion for summary judgement asking the court to dismiss his lawsuit.
February 24, 2025 at 5:02 PM
Reposted by hacker0x0
There is nothing illegal about naming inexperienced people currently accessing sensitive government data at the behest of Elon Musk.

They are:
Akash Bobba
Edward Coristine
Luke Farritor
Gautier Cole Killian
Gavin Kliger
Ethan Shaotran

This is a major security breach.

SPREAD
February 4, 2025 at 12:26 AM
Reposted by hacker0x0
Russian-based #RomCom cybercrime group chained two zero-day vulnerabilities in recent attacks targeting Firefox and Tor Browser users across Europe and North America. #cyberattacks #Russia #zeroday
www.bleepingcomputer.com/news/securit...
Firefox and Windows zero-days exploited by Russian RomCom hackers
​Russian-based RomCom cybercrime group chained two zero-day vulnerabilities in recent attacks targeting Firefox and Tor Browser users across Europe and North America.
www.bleepingcomputer.com
November 26, 2024 at 5:38 PM
Reposted by hacker0x0
Please repost! We’ve got a great community at CISSPStudyGroup.com
CISSP Study Group
Share resources, get advice, and connect with peers studying cybersecurity. Join our CISSP study group and connect with fellow professionals today!
CISSPStudyGroup.com
November 18, 2024 at 10:58 PM
Reposted by hacker0x0
Threat actors increasingly use Scalable Vector Graphics (SVG) attachments to display phishing forms or deploy malware while evading detection.
www.bleepingcomputer.com/news/securit...
Phishing emails increasingly use SVG attachments to evade detection
Threat actors increasingly use Scalable Vector Graphics (SVG) attachments to display phishing forms or deploy malware while evading detection.
www.bleepingcomputer.com
November 17, 2024 at 4:38 PM
Reposted by hacker0x0
www.wired.com/story/apple-...
In the past, spyware was delivered via phishing,requiring the victim to click on a link or download an image.Today, it can be delivered in so-called”zeroclick attacks” via an iMessage or WhatsAppimage that will automatically plant spyware on your device.
Apple’s iPhone Spyware Problem Is Getting Worse. Here’s What You Should Know
Apple has detected iPhone spyware attacks against people in more than 150 countries. Knowing if your device is infected can be tricky—but there are a few steps you can take to protect yourself.
www.wired.com
November 17, 2024 at 6:51 PM
Reposted by hacker0x0
Never forget that humans are the biggest strength and the biggest weakness of your info sec strategy medium.com/@davenport.a... #infosec #informationsecurity #security
The Human Element: The Heart of Information Security
In the realm of information security, we often focus on the latest technologies, sophisticated algorithms, and cutting-edge defences. Yet…
medium.com
November 17, 2024 at 7:06 PM