Microsoft is being criticized (again) because Administrator-to-Kernel mode execution is not considered a security boundary.
Researchers noted that home users, who often run as administrator, could be a victim of this lack-of security boundary.
Researchers asked Microsoft why?
Law enforcement agencies across the globe have come together, similar to Goku and Vegeta doing the Gogeta fusion dance, to form "Operation Endgame".
Agencies from The Netherlands, Denmark, United Kingdom, France, Germany, and the United States have created a website and disclose…
Thanks to our friends @TorGuard and the degenerates from the DEFCON Data Duplication Village (@ly7ine) we now allow individuals to torrent vx-underground
Note: Not all torrents are available yet
You can download the torrents here:
vx-underground.org/Torrents
A leader of what was once the world’s most harmful cyber crime group has been unmasked and sanctioned by the UK, US and Australia, following an NCA-led international disruption campaign.
#Cronos@FBI@Europol
Full story ➡️ nationalcrimeagency.gov.uk/news/lockbit-l…
1\ My thoughts on the Chinese APT contractor leak 🇨🇳
Specifically, I want to talk about the leaked
- iOS Spyware
- Physical implantable devices
- Email surveillance system
Let's consider detection and how these would be installed.
1\ My thoughts on the Chinese APT contractor leak 🇨🇳
Specifically, I want to talk about the leaked
- iOS Spyware
- Physical implantable devices
- Email surveillance system
Let's consider detection and how these would be installed.
Today was a big day for the United States government and United Kingdom government. The Federal Bureau of Investigation and U.K. National Crime Agency’s (NCA) Cyber Division unveiled a massive, multi-year long investigation which has led to a catastrophic blow to Lockbit…
Also he did not hack Rockstar with an Amazon TV stick. He >>presumably<< mirrored his smartphone’s display to the stick to use the hotel TV as a monitor. He then connected to the smartphone with a Bluetooth keyboard and mouse.
lifewire.com/mirror-iphone-…
This guy is just a scumbag.
tl;dr summary of United States government (and associated entities) vs ALPHV ransomware group
December 10th, 2023: ALPHV primary domain goes offline, administration saying it is hardware failure
December 10th, 2023: Rumors circulate that is it LE taking down ALPHV
December…
If you're a French citizen and have received an Apple threat notification, feel free to reach out to your local authorities for help (if you work for gov or regulated org cyber.gouv.fr/en-cas-dincide…), you may be in danger.
Session hijacking a Microsoft 365 account! Stealing their credentials and bypassing MFA prompt with Evilginx: a reverse-proxy phishing framework! We stage a phishing domain and email pretense, and gain full access to the victim account! youtu.be/sZ22YulJwao
iOS 17 Jailbreak RELEASED! How to Jailbreak iOS 17 with PaleRa1n
🔥READ MORE: idevicecentral.com/jailbreak-news…
It's finally here! The first iOS 17 jailbreak. PaleRa1n now supports iOS 17.0 - 17.1 with tweaks on pre-A12! #ios#jailbreak
True Tolkien aficionados and art historians will find much to be annoyed about. But Στέλιος Καρέλλας on FB had AI render scenes from Lord the Rings as Byzantine mosaics, and I think it's glorious.
1. Gandalf VS Balrog
30 Followers 563 Following🛡️ Black Hat Defense | Free Penetration Test | Your Asset
💻 Specializing in cybersecurity solutions to outsmart black hat hackers.
5K Followers 181 FollowingSenior Security Researcher @akamai - Malicious Group - SRT - DoD researcher of the year 2022 - Top 10 web attacks 2023 - CRTO - MSRC Top 75 in Q1/Q2 2025
4K Followers 2K Followingjust a french canadien | ai red team @HiddenLayerSec | CISSP BSCP CRTL CRTO OSCP eWPTX eCPPT | goofing off @ https://t.co/aWC0YYEp9x
13K Followers 1 FollowingOSINT-powered tools for email and phone number investigations.
Telegram: https://t.co/wzX59rY4LS
Linkedin: https://t.co/ivbM2gkKnq
15K Followers 0 FollowingConsultancy and Training from a trusted supplier of offensive security. Red Team and Adversary Simulation by ActiveBreach team | https://t.co/fqpbJ9WDXD | https://t.co/UvOhGA4Zou
2K Followers 86 FollowingData center expert. CEO of @subseacloud. Author of The Art of the Attack (cyber security book) and contributing author to Greener Data V2&3.
948 Followers 94 FollowingCybersecurity meets metal. Shirts for fictional bands named after malware and threat actors. Literal malwear. DM for international orders. Requests are welcome.
794 Followers 1 FollowingI am the evil bot capturing your MFA tokens.
Offensive security reverse-proxy phishing framework capable of bypassing MFA protections, created by @mrgretzky
229K Followers 934 FollowingResearcher and a best-selling author. Keynote talks at RSA, Black Hat & DEF CON. TED Speaker. Chief Research Officer at Sensofusion.
37K Followers 2K Following20+ yrs in Infosec. Malware Influencer. I turn Malware into Art and Music. Art @MalwareArt. 4x Pwnie Nominee. 𝕍𝕏. GameDev. Autistic.
2K Followers 78 FollowingFounded by Lena Yu aka @LambdaMamba | Run by World Cyber Health (WCH) Non-Profit | Discord: https://t.co/JE25nRRco6 | Email: [email protected]