Forwarded from FloridaπΈ
Iβve been deep diving into n8n for the past 4 months, and honestly itβs become the glue for almost all my AI and data experiments.
For those who haven't come across it yet, n8n is basically a flexible automation tool. itβs a bridge that helps your data move and it lets you connect your favorite apps, AI models, and databases using a visual node based interface. I actually spent some time trying to make Google Cloud Workflows work for my setup too, but i eventually went all in on n8n.
The biggest reason why i chose n8n over Google Cloud Workflows is the pre-built nodes and speed. in n8n, if i want to connect a Telegram bot to OpenAI and then dump the data into a database, i just add the nodes and link them together visually. in Google Cloud Workflows, iβd be writing lines of text based configuration files and manually handling API authentications for every single service. n8n lets me spend more time building the actual "AI logic" and less time fighting with documentation. So use Google Cloud Workflows to coordinate and manage internal Google services (like Bigquery) with high-scale, enterprise-level reliability, and you're comfortable writing code to keep things lightweight.
Use n8n when you want to prototype fast, connect dozens of different SaaS tools, or build complex AI agents without getting stuck in a technical setup
For those who haven't come across it yet, n8n is basically a flexible automation tool. itβs a bridge that helps your data move and it lets you connect your favorite apps, AI models, and databases using a visual node based interface. I actually spent some time trying to make Google Cloud Workflows work for my setup too, but i eventually went all in on n8n.
The biggest reason why i chose n8n over Google Cloud Workflows is the pre-built nodes and speed. in n8n, if i want to connect a Telegram bot to OpenAI and then dump the data into a database, i just add the nodes and link them together visually. in Google Cloud Workflows, iβd be writing lines of text based configuration files and manually handling API authentications for every single service. n8n lets me spend more time building the actual "AI logic" and less time fighting with documentation. So use Google Cloud Workflows to coordinate and manage internal Google services (like Bigquery) with high-scale, enterprise-level reliability, and you're comfortable writing code to keep things lightweight.
Use n8n when you want to prototype fast, connect dozens of different SaaS tools, or build complex AI agents without getting stuck in a technical setup
n8n.io
Discover 8306 Automation Workflows from the n8n's Community
Explore 8306 automated workflow templates from n8n's global community. Simplify your automation tasks with ready-made solutions tailored to your needs.
β€5
YouTube
Live from Pwn2Own Ireland: Qrious Secure vs. Samsung Galaxy
#Pwn2Own
Join us for a live look-in from Pwn2Own Ireland 2025. In this highlight from Day Two, the team from Qrious Secure will be targeting the Samsung Galaxy S25 - Remote in the Mobile Phones category for $50,000 and 5 Master of Pwn Points.
Join us for a live look-in from Pwn2Own Ireland 2025. In this highlight from Day Two, the team from Qrious Secure will be targeting the Samsung Galaxy S25 - Remote in the Mobile Phones category for $50,000 and 5 Master of Pwn Points.
https://www.youtube.com/live/DYjWzgS2JXg?si=vnxW_dVMn90pgvvN
A while back I watched these guys trying to exploit the Samsung Galaxy S25
pretty wild stuff.
They even ended up with a zero-click vuln at the end π₯²
@AfroSec
A while back I watched these guys trying to exploit the Samsung Galaxy S25
pretty wild stuff.
They even ended up with a zero-click vuln at the end π₯²
@AfroSec
π€―2π₯1
π©Έ CRTOM β done.
Started my red team cert path with Red Team Operations Management.
Not about popping shells yet β this oneβs about how real ops are planned, scoped, and run.
Foundations first:
π§ attacker mindset
π engagement flow
π― operational thinking
@AfroSec
Started my red team cert path with Red Team Operations Management.
Not about popping shells yet β this oneβs about how real ops are planned, scoped, and run.
Foundations first:
π§ attacker mindset
π engagement flow
π― operational thinking
@AfroSec
β‘23β€2π2
This media is not supported in your browser
VIEW IN TELEGRAM
can we make it anonymous seriously like by changing the bios chip firmware and stuff like that ?
@AfroSec
@AfroSec
β2π€2
Some people think that when I quit uni I just went dumb, quit life, and rot in bed. Bruh can u relax ?π
every time I open my PC and connect to the internet, Iβm learning
letβs be honest ena malet in uni most of us only read modules for exams and forget them right after,π
In tech ? every hour, every minute, youβre googling, low-key abusing AI lol π
anyways if anyone who think like this please α¨α΅ααα³α½α α°αα α‘π
@AfroSec
every time I open my PC and connect to the internet, Iβm learning
letβs be honest ena malet in uni most of us only read modules for exams and forget them right after,π
In tech ? every hour, every minute, youβre googling, low-key abusing AI lol π
anyways if anyone who think like this please α¨α΅ααα³α½α α°αα α‘π
@AfroSec
π16π€£5π3
The Hacker News
β οΈ Astaroth banking malware is now using WhatsApp as its main delivery channel in Brazil. Researchers report a new Python-based module that steals a victimβs contact list and auto-sends malicious ZIP files, spreading the infection chat to chat. π How theβ¦
astaroth is back ylal
i wrote abt it a yr ago ig
is file less malware like it executes directly in memory
@AfroSec
i wrote abt it a yr ago ig
is file less malware like it executes directly in memory
@AfroSec
π3π₯1
https://github.com/jivoi/awesome-osint
stalkers i mean Osint Nerds π where are u ???? this one is for u
@AfroSec
stalkers i mean Osint Nerds π where are u ???? this one is for u
@AfroSec
GitHub
GitHub - jivoi/awesome-osint: :scream: A curated list of amazingly awesome OSINT
:scream: A curated list of amazingly awesome OSINT - jivoi/awesome-osint
π₯3π3
Forwarded from AXUM SEC
CVE-2025-53770: When SharePoint Zero-Days Proved Perimeter
Security Isnβt Enough
In July 2025, attackers actively exploited a critical SharePoint zero-day to gain unauthenticated RCE, deploy web shells, steal machine keys, and persist even after patching.
The hard truth?
Patching closes the door, but it doesnβt tell you who already walked in.
Modern attacks blend into normal operations and stay quiet. Defending against them takes more than alerts it takes continuous validation and real exposure visibility.
Thatβs where AxumSec comes in.
Because modern threats donβt wait and security shouldnβt either.
π¬ What cyber risk do you think organizations still underestimate?
π https://preregister.axumsec.com
Security Isnβt Enough
In July 2025, attackers actively exploited a critical SharePoint zero-day to gain unauthenticated RCE, deploy web shells, steal machine keys, and persist even after patching.
The hard truth?
Patching closes the door, but it doesnβt tell you who already walked in.
Modern attacks blend into normal operations and stay quiet. Defending against them takes more than alerts it takes continuous validation and real exposure visibility.
Thatβs where AxumSec comes in.
Because modern threats donβt wait and security shouldnβt either.
π¬ What cyber risk do you think organizations still underestimate?
π https://preregister.axumsec.com
π₯3