Forwarded from ᴛᴇɴɢᴋᴏʀᴀᴋᴄʏʙᴇʀᴄʀᴇᴡ Official
⚠️ Attention Kyocera & QNAP users:
Kyocera addresses dangerous CVE-2023-50916 flaw, preventing unauthorized access. QNAP tackles CVE-2023-39296, safeguarding against crashes.
Read details here: https://thehackernews.com/2024/01/alert-new-vulnerabilities-discovered-in.html
Kyocera addresses dangerous CVE-2023-50916 flaw, preventing unauthorized access. QNAP tackles CVE-2023-39296, safeguarding against crashes.
Read details here: https://thehackernews.com/2024/01/alert-new-vulnerabilities-discovered-in.html
TERKINI* ISU INI TELAH DISELESAIKAN. Sistem adalah selamat sekarang.
- Kelemahan dalam pengendalian authentication ini tidak ditemui semasa Security Posture Assessment (SPA).
- Pasukan telah mengambil tindakan segera serta penyelesaian telah dilaksanakan dalam tempoh 1 jam dan telah selesai pada 2 Januari 2024 jam 9.15 malam.
***
Macam tu lah dia punya security. Adoila.
Tak tegur nanti orang kata walanon.
Tegur nanti orang kata walaun.
Kelemahan pada API (Application Programming Interface) sistem PADU membolehkan pihak tidak bertanggungjawab mengubah maklumat login (password) kita dengan hanya menggunakan maklumat nombor kad pengenalan.
Mana nak dapat nombor kad pengenalan? Banyak dah bocor. Tak perlu cari dekat dark web, Internet forum biasa pun berlambak dah.
Rafizi Ramli
Fahmi Fadzil
Dr. Ong Kian Ming - 王建民
https://m.facebook.com/story.php?story_fbid=pfbid0DXrra3e1r7cckhkdVVQYAxVoo2eddF5uLWD9gcaWtQUVCuhmwydsZizaHjZ8oSxHl&id=100063807923072&mibextid=NOb6eG
- Kelemahan dalam pengendalian authentication ini tidak ditemui semasa Security Posture Assessment (SPA).
- Pasukan telah mengambil tindakan segera serta penyelesaian telah dilaksanakan dalam tempoh 1 jam dan telah selesai pada 2 Januari 2024 jam 9.15 malam.
***
Macam tu lah dia punya security. Adoila.
Tak tegur nanti orang kata walanon.
Tegur nanti orang kata walaun.
Kelemahan pada API (Application Programming Interface) sistem PADU membolehkan pihak tidak bertanggungjawab mengubah maklumat login (password) kita dengan hanya menggunakan maklumat nombor kad pengenalan.
Mana nak dapat nombor kad pengenalan? Banyak dah bocor. Tak perlu cari dekat dark web, Internet forum biasa pun berlambak dah.
Rafizi Ramli
Fahmi Fadzil
Dr. Ong Kian Ming - 王建民
https://m.facebook.com/story.php?story_fbid=pfbid0DXrra3e1r7cckhkdVVQYAxVoo2eddF5uLWD9gcaWtQUVCuhmwydsZizaHjZ8oSxHl&id=100063807923072&mibextid=NOb6eG
👍2
Forwarded from 𝕶𝖎𝖓𝖌 𝕺𝖋 𝕿𝖍𝖊 𝕯𝖆𝖗𝖐𝖓𝖊𝖘𝖘
سْــــــــــــــــــمِ اللهِ الرَّحْمَنِ الرَّحِيْمِ
الله أكبر الله أكبر الله أكبر
إن شاء الله
We are legion❗we do not forgive❗we do not forget❗expect us❗
We are not PHISANGGGGG❗️
We are not PALABANA❗️
We are not PALATAU❗️
😂🤣😂🤣😂🤣😂🤣
MASA DDOS : 1️⃣1️⃣ : 0️⃣0️⃣ pm
TARIKH : 09.DISEMBER.2023
Target : https://www.natal.org.il
No WAF detected by the generic detection
IP : 185.106.128.156
Hostname : 185.106.128.156
ISP : O.M.C. COMPUTERS & COMMUNICATIONS LTD
Port : 53 open domain
Port : open 80 http
Port : open 443 https
Port : 8443 http-alt
Method : GET HEAD POST
Method Proxy : http-proxy/socks5.txt
الله أكبر الله أكبر الله أكبر
إن شاء الله
We are legion❗we do not forgive❗we do not forget❗expect us❗
We are not PHISANGGGGG❗️
We are not PALABANA❗️
We are not PALATAU❗️
😂🤣😂🤣😂🤣😂🤣
MASA DDOS : 1️⃣1️⃣ : 0️⃣0️⃣ pm
TARIKH : 09.DISEMBER.2023
Target : https://www.natal.org.il
No WAF detected by the generic detection
IP : 185.106.128.156
Hostname : 185.106.128.156
ISP : O.M.C. COMPUTERS & COMMUNICATIONS LTD
Port : 53 open domain
Port : open 80 http
Port : open 443 https
Port : 8443 http-alt
Method : GET HEAD POST
Method Proxy : http-proxy/socks5.txt
🔥1
Exploit for Out-of-bounds Write in Polkit Project Polkit exploit
https://sploitus.com/exploit?id=7F53E177-1517-5E69-84F1-CC304A3F87F3
Intrasrv Simple Web Server 1.0 Denial Of Service Exploit exploit
https://sploitus.com/exploit?id=1337DAY-ID-39231
liveSite 2019.1 Remote Code Execution Vulnerability exploit
https://sploitus.com/exploit?id=1337DAY-ID-39234
AdvantechWeb / SCADA 9.1.5U SQL Injection Vulnerability exploit
https://sploitus.com/exploit?id=1337DAY-ID-39233
Microsoft SQL Server db_ddladmin Privilege Escalation Vulnerability exploit
https://sploitus.com/exploit?id=1337DAY-ID-39232
cpio 2.13 Privilege Escalation Vulnerability exploit
https://sploitus.com/exploit?id=1337DAY-ID-39235
Exploit for Missing Authentication for Critical Function in F5 Big-Ip Access Policy Manager exploit
https://sploitus.com/exploit?id=A6CCA51E-2A51-52B2-A2E6-4518F7790F37
https://sploitus.com/exploit?id=7F53E177-1517-5E69-84F1-CC304A3F87F3
Intrasrv Simple Web Server 1.0 Denial Of Service Exploit exploit
https://sploitus.com/exploit?id=1337DAY-ID-39231
liveSite 2019.1 Remote Code Execution Vulnerability exploit
https://sploitus.com/exploit?id=1337DAY-ID-39234
AdvantechWeb / SCADA 9.1.5U SQL Injection Vulnerability exploit
https://sploitus.com/exploit?id=1337DAY-ID-39233
Microsoft SQL Server db_ddladmin Privilege Escalation Vulnerability exploit
https://sploitus.com/exploit?id=1337DAY-ID-39232
cpio 2.13 Privilege Escalation Vulnerability exploit
https://sploitus.com/exploit?id=1337DAY-ID-39235
Exploit for Missing Authentication for Critical Function in F5 Big-Ip Access Policy Manager exploit
https://sploitus.com/exploit?id=A6CCA51E-2A51-52B2-A2E6-4518F7790F37
Sploitus
💀 Exploit for Out-of-bounds Read in Polkit Project Polkit CVE-2021-4034
Exploit for Out-of-bounds Read in Polkit Project Polkit CVE-2021-4034 | Sploitus | Exploit & Hacktool Search Engine
🔥2
ADA KA OQANG SIK KEDAH KA DALAM NI? 😊BEST NI ADA WAYANG KULIT/CERAMAH DAN SEBAGAINYA😊🥰, JEMPUT HADIR NANTI, HARAP SAYA PUN XKENA SCAM JUGAK LA NANTI🤣🥰
SALAMFORCE24 By @HelangMerahGroup 🦅
SITE: https://rankonetechnology.in/hmg.html
Zone-H <OK
Greetz:
#StucxTeam
#4-EXPLOITATION
#SkyNetdox
#AnonymosIslamic
#JokersSec
#HelangMerahGroup
#GhostClanMalaysia🇲🇾
SITE: https://rankonetechnology.in/hmg.html
Zone-H <OK
Greetz:
#StucxTeam
#4-EXPLOITATION
#SkyNetdox
#AnonymosIslamic
#JokersSec
#HelangMerahGroup
#GhostClanMalaysia🇲🇾
rankonetechnology.in
HELANG MERAH GROUP
🔥2
Forwarded from Cinta Salam Malaysia
Salam Subuh semua!
Jom kita #SedekahSubuhMacamJumaat
Cara-caranya mudah je!
1. Klik www.ramadan4syria.com
2. Pilih slot ‘Amaun lain-lain’
3. Tuliskan amaun sumbangan anda.
3. Klik ‘Sumbang Sekarang.'
Terima kasih!
Jom kita #SedekahSubuhMacamJumaat
Cara-caranya mudah je!
1. Klik www.ramadan4syria.com
2. Pilih slot ‘Amaun lain-lain’
3. Tuliskan amaun sumbangan anda.
3. Klik ‘Sumbang Sekarang.'
Terima kasih!
Assalamualaikum Dan SALAMFORCE24 @HelangMerahGroup 🦅
Target untuk hangpa nah
https://www.instagram.com/reel/C0-fuPoJV-7/?igsh=aWxrejhxYTQxaXA3
CC - @TrashDono
Target untuk hangpa nah
https://www.instagram.com/reel/C0-fuPoJV-7/?igsh=aWxrejhxYTQxaXA3
CC - @TrashDono
Forwarded from ᴛᴇɴɢᴋᴏʀᴀᴋᴄʏʙᴇʀᴄʀᴇᴡ Official
👨💻 Microsoft's latest January 2024 Patch Tuesday updates address 48 security flaws. Two of these flaws are rated Critical, while the rest are marked as Important.
Learn more: https://thehackernews.com/2024/01/microsofts-january-2024-windows-update.html
Learn more: https://thehackernews.com/2024/01/microsofts-january-2024-windows-update.html
Forwarded from ᴛᴇɴɢᴋᴏʀᴀᴋᴄʏʙᴇʀᴄʀᴇᴡ Official
🔐 Good news for ransomware victims!
Researchers have released FREE DECRYPTORs for both the Tortilla variant of Babuk ransomware and Black Basta ransomware.
Regain control of your files now ➡️ https://thehackernews.com/2024/01/free-decryptor-released-for-black-basta.html
Researchers have released FREE DECRYPTORs for both the Tortilla variant of Babuk ransomware and Black Basta ransomware.
Regain control of your files now ➡️ https://thehackernews.com/2024/01/free-decryptor-released-for-black-basta.html
Forwarded from 𝕶𝖎𝖓𝖌 𝕺𝖋 𝕿𝖍𝖊 𝕯𝖆𝖗𝖐𝖓𝖊𝖘𝖘
سْــــــــــــــــــمِ اللهِ الرَّحْمَنِ الرَّحِيْمِ
الله أكبر الله أكبر الله أكبر
إن شاء الله
We are legion❗we do not forgive❗we do not forget❗expect us❗
Kita sudah tua tapi kita tidak lupa ❗PHISANGGGGG❗️
😂🤣😂🤣😂🤣🤣😂🤣😂🤣😂🤣😂🤣😂🤣😂🤣😂🤣😂🤣
MASA DDOS : 0️⃣9️⃣ : 0️⃣0️⃣ pm
TARIKH : 10.DISEMBER.2023
Target : https://studyisrael.org.il
IP : 88.218.117.88
Hostname : s-vps-il-681.upress.io
ISP : uPress Inc
Info : no waf
Port : 53
Port : 80
Port : 443
Method : GET HEAD POST
الله أكبر الله أكبر الله أكبر
إن شاء الله
We are legion❗we do not forgive❗we do not forget❗expect us❗
Kita sudah tua tapi kita tidak lupa ❗PHISANGGGGG❗️
😂🤣😂🤣😂🤣🤣😂🤣😂🤣😂🤣😂🤣😂🤣😂🤣😂🤣😂🤣
MASA DDOS : 0️⃣9️⃣ : 0️⃣0️⃣ pm
TARIKH : 10.DISEMBER.2023
Target : https://studyisrael.org.il
IP : 88.218.117.88
Hostname : s-vps-il-681.upress.io
ISP : uPress Inc
Info : no waf
Port : 53
Port : 80
Port : 443
Method : GET HEAD POST
🔥2