Forwarded from The Hacker News
🚨 Cloudflare just stopped the largest DDoS attack ever recorded — peaking at 11.5 Tbps.
It lasted only 35 seconds… but experts warn these “tsunami” attacks can be smoke screens for data theft and deeper breaches.
Here’s what happened ↓ https://thehackernews.com/2025/09/cloudflare-blocks-record-breaking-115.html
It lasted only 35 seconds… but experts warn these “tsunami” attacks can be smoke screens for data theft and deeper breaches.
Here’s what happened ↓ https://thehackernews.com/2025/09/cloudflare-blocks-record-breaking-115.html
Forwarded from The Hacker News
🚨 Iranian-linked hackers just launched a global spear-phishing blitz—targeting embassies, consulates & ministries across Europe, Africa, Asia & the Americas.
The bait? Fake “urgent” diplomatic emails—some sent from a hacked Oman MFA mailbox.
Full details → https://thehackernews.com/2025/09/iranian-hackers-exploit-100-embassy.html
The bait? Fake “urgent” diplomatic emails—some sent from a hacked Oman MFA mailbox.
Full details → https://thehackernews.com/2025/09/iranian-hackers-exploit-100-embassy.html
Forwarded from The Hacker News
🚨 Google patched 120 Android security flaws — including 2 already exploited in real-world attacks.
Hackers don’t need your clicks. They don’t need your permission. They’re already in.
Update immediately. Full story → https://thehackernews.com/2025/09/android-security-alert-google-patches.html
Hackers don’t need your clicks. They don’t need your permission. They’re already in.
Update immediately. Full story → https://thehackernews.com/2025/09/android-security-alert-google-patches.html
Forwarded from The Hacker News
⚠️ Hackers are already weaponizing HexStrike AI—a tool built for ethical hacking—to exploit fresh Citrix flaws.
What was meant to protect networks is now fueling real-world cyberattacks at scale.
Patch fast. Details here → https://thehackernews.com/2025/09/threat-actors-weaponize-hexstrike-ai-to.html
What was meant to protect networks is now fueling real-world cyberattacks at scale.
Patch fast. Details here → https://thehackernews.com/2025/09/threat-actors-weaponize-hexstrike-ai-to.html
Forwarded from 𝗽𝗼𝗽𝗠𝗢𝗗𝗦 | 𝗙𝗢𝗦𝗦, 𝗟𝗶𝗳𝗲, 𝗠𝗲𝗺𝗲𝘀 (Ömer)
WhatsCLI
A command-line WhatsApp client written in Go and highly riceable with Lua scripts
🔗 Links:
- Installation
- Screenshots
- Features
- Source code
Developer: ArturCSega
🏷 Tags: #Social #MacOS #Windows #Linux
A command-line WhatsApp client written in Go and highly riceable with Lua scripts
🔗 Links:
- Installation
- Screenshots
- Features
- Source code
Developer: ArturCSega
❤️ Support the Project
If this project makes your life easier, here are a few quick ways to show some love:
⭐ Star the repo/app
☕ Buy a coffee for the developer
🛠 Contribute code, issues, or pull-requests
🏷 Tags: #Social #MacOS #Windows #Linux
Forwarded from GSMArena (IFTTT)
Here's our first look at the Infinix GT 30's Shadow Ash model launching globally next week
https://ift.tt/naAC9KL
https://ift.tt/naAC9KL
GSMArena.com
Here's our first look at the Infinix GT 30's Shadow Ash model launching globally next week
The Infinix GT 30 is available in India in three colors, but it will make its global debut with four color options. Yesterday, we exclusively reported that...
Forwarded from The Hacker News
Media is too big
VIEW IN TELEGRAM
Still in the dark about your identity risks? BeyondTrust flips the switch 💡
Their complimentary Identity Security Risk Assessment gives you rapid clarity on hidden privilege risks & best remediation steps.
Try it out today ⤵️ https://thn.news/secure-identity-check
Their complimentary Identity Security Risk Assessment gives you rapid clarity on hidden privilege risks & best remediation steps.
Try it out today ⤵️ https://thn.news/secure-identity-check
Forwarded from Hacker News
Brendan Long
%CPU Utilization Is A Lie
I deal with a lot of servers at work, and one thing everyone wants to know about their servers is how close they are to being at max utilization. It should be easy, right? Just pull up top or another system monitor tool, look at network, memory and CPU utilization…
Forwarded from Hacker News
Alexander Popov
Kernel-hack-drill and a new approach to exploiting CVE-2024-50264 in the Linux kernel
Some memory corruption bugs are much harder to exploit than others. They can involve race conditions, crash the system, and impose limitations that make a researcher's life difficult. Working with such fragile vulnerabilities demands significant time and…
Forwarded from Hacker News
Forwarded from Hacker News
GitHub
GitHub - Tencent-Hunyuan/HunyuanWorld-Voyager: Voyager is an interactive RGBD video generation model conditioned on camera input…
Voyager is an interactive RGBD video generation model conditioned on camera input, and supports real-time 3D reconstruction. - Tencent-Hunyuan/HunyuanWorld-Voyager
Forwarded from Hacker News
actu.epfl.ch
Apertus: a fully open, transparent, multilingual language model
EPFL, ETH Zurich and the Swiss National Supercomputing Centre (CSCS) released Apertus today, Switzerland’s first large-scale, open, multilingual language model — a milestone in generative AI for transparency and diversity.
Forwarded from cKure
■■□□□ News circulating online.
Cloudflare just blocked the largest DDOS attack of all time at 11.5 Tbps. The attack was a UDP flood that came from Google Cloud.
Cloudflare just blocked the largest DDOS attack of all time at 11.5 Tbps. The attack was a UDP flood that came from Google Cloud.