This media is not supported in your browser
VIEW IN TELEGRAM
■■■□□ Disinformation in War: Admission by a Zionist official to producing fake news
🔹The head of the press office of the Zionist regime's Prime Minister admitted to producing fake news to confuse the audience.
🔹He stated that for communication tactics, fake news should be created like Trump.
🔹The head of the press office of the Zionist regime's Prime Minister admitted to producing fake news to confuse the audience.
🔹He stated that for communication tactics, fake news should be created like Trump.
Forwarded from cKure Red
⚡️ 0️⃣ ➖ 🔠 🅰️ 🔠 drop by researcher.
The vulnerability, named BlueHammer, allows an attacker to perform Privilege escalation and currently has no proper patch.
The researcher claims that the PoC code he published still contains bugs, and various security researchers have confirmed that they have not been able to reproduce the vulnerability (so far).
https://deadeclipse666.blogspot.com/2026/04/public-disclosure.html
Please open Telegram to view this post
VIEW IN TELEGRAM
Media is too big
VIEW IN TELEGRAM
■■□□□ Information Warfare: Iran is utilizing artificial intelligence to generate sophisticated, high-impact videos designed to precisely target perceived weaknesses in the arguments advanced by the Trump administration. 🤖📹 Estimates indicate these efforts have accumulated over one billion views on the 𝕏 social network alone.
👎1
■■■□□ State sponsored / affiliated hacktivist group shares employee list of Israeli companies affiliated with war and genocide.
The list is searchable and is on their official website:
http://handala-redwanted.ps/
The list is searchable and is on their official website:
http://handala-redwanted.ps/
❤1👎1🔥1
This media is not supported in your browser
VIEW IN TELEGRAM
■□□□□ Algorithm of Google and Apple app stores.
😁1
■■□□□ Data-Leak from UAE as Dubai Health Authority is compromised.
🇦🇪 Data allegedly obtained from a compromise of the Dubai Health Authority has been put up for sale on a popular cybercrime forum.
‣ Threat Actor: dark_habibi
‣ Category: Data Breach / Data Sale
‣ Victim: Dubai Health Authority
‣ Industry: Healthcare / Government
The threat actor claims to have 836 files total from the compromise. The leak allegedly contains:
▪️ Passports (many nationalities)
▪️ Emirates IDs and visas
▪️ Certifications (university, job, doctor)
▪️ Architecture diagrams and blueprints (clinic, hospital, medical places)
▪️ Person signatures
▪️ Government policies documents
▪️ Internal reports, contracts, and sensitive material
The asking price is $300. The actor indicated more leaks should be expected.
🇦🇪 Data allegedly obtained from a compromise of the Dubai Health Authority has been put up for sale on a popular cybercrime forum.
‣ Threat Actor: dark_habibi
‣ Category: Data Breach / Data Sale
‣ Victim: Dubai Health Authority
‣ Industry: Healthcare / Government
The threat actor claims to have 836 files total from the compromise. The leak allegedly contains:
▪️ Passports (many nationalities)
▪️ Emirates IDs and visas
▪️ Certifications (university, job, doctor)
▪️ Architecture diagrams and blueprints (clinic, hospital, medical places)
▪️ Person signatures
▪️ Government policies documents
▪️ Internal reports, contracts, and sensitive material
The asking price is $300. The actor indicated more leaks should be expected.
Source: 𝕏 | Dark Web InformerThis media is not supported in your browser
VIEW IN TELEGRAM
■■□□□ Handala Hackers release video allegedly from Israel showing their access with OGWs (on-ground workers) that are tracking their targets.
In their message, verbatim:
In their message, verbatim:
Operation 7779 | Shadows in the Streets of the Occupied Territories
The footage you are witnessing now is just a glimpse of months-long surveillance and pursuit by Handala’s operational units, tracking one of the highest-ranking Zionist officials, step by step, second by second, through the heart of the occupied territories. From behind the windshield to the doorstep, this individual was fully under the shadow of the Resistance.
The Zionist regime, which proudly boasts of its supposed intelligence supremacy, must now ask itself: does it have the courage to admit that this senior official was silently and meticulously hunted by Handala for months?
Can it acknowledge that the data we hacked didn’t just remain in cyberspace, but translated into real-world field operations and close-proximity tracking, shaking the very core of Zionist psychological security?
Remember this white Hyundai with license plate ending *7779;
Do you know which renowned figure in the regime’s security apparatus owns it?
Do you have the courage to identify the driver, shadowed all the way to their front door by us, and share their name with us on social media?
Handala today is not just a presence online;
Our shadows move through your alleys, your streets, and stand at the very threshold of your leaders’ homes.
If the Zionist regime understands the truth, will it dare to admit it?
For contact, information exchange, or to expose identities, visit our official website.
Shadows are always closer than you think…
🌭1🤣1
This media is not supported in your browser
VIEW IN TELEGRAM
■■■□□ Consider the scenario in which an entire network becomes encrypted due to an unpatched device. This situation, mirrors the tactics employed by the Akira ransomware group to circumvent advanced security measures. While Endpoint Detection and Response (EDR) systems successfully blocked the initial attack, the threat actors subsequently identified an IP webcam configured with default credentials. Given the inability to install security agents on Internet of Things (IoT) devices, this webcam served as an ideal concealed foothold for encrypting the entire office.
👍1
■■■□□ WordPress plugin suite hacked to push malware to thousands of sites
More than 30 WordPress plugins in the EssentialPlugin package have been compromised with malicious code that allows unauthorized access to websites running them.
https://www.bleepingcomputer.com/news/security/wordpress-plugin-suite-hacked-to-push-malware-to-thousands-of-sites/
More than 30 WordPress plugins in the EssentialPlugin package have been compromised with malicious code that allows unauthorized access to websites running them.
https://www.bleepingcomputer.com/news/security/wordpress-plugin-suite-hacked-to-push-malware-to-thousands-of-sites/
BleepingComputer
WordPress plugin suite hacked to push malware to thousands of sites
More than 30 WordPress plugins in the EssentialPlugin package have been compromised with malicious code that allows unauthorized access to websites running them.
■■■□□ Polymarket betting platform on future events hacker by hair dryer as temperate prediction makes easy 38K USD.
https://x.com/slash1sol/status/2047388195596194146
https://x.com/slash1sol/status/2047388195596194146
X (formerly Twitter)
slash1s (@slash1sol) on X
a guy made $36,900 on Polymarket weather bet.
with a hairdryer.
> he figured out the platform was pulling data from a single unguarded sensor near a Paris airport runway.
> bought YES on temperature targets.
walked up to the thermometer.
> plugged in a…
with a hairdryer.
> he figured out the platform was pulling data from a single unguarded sensor near a Paris airport runway.
> bought YES on temperature targets.
walked up to the thermometer.
> plugged in a…
Forwarded from cKure Red
This media is not supported in your browser
VIEW IN TELEGRAM
Declassified: Shreya Pharmaceuticals purchased 1,100 XE9680 Dell servers with Nvidia's H100 GPUs at behest of Russia to train computer models for software to be used in automated drones.
🤣2
This media is not supported in your browser
VIEW IN TELEGRAM
■■□□□ Crypto scams hit global conflicts as vessel crew receive 📨 offers to cross the militarized zone.
■■□□□ ☄️ Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709
🔥 https://github.com/mrmtwoj/apache-vulnerability-testing
Please open Telegram to view this post
VIEW IN TELEGRAM
👎1
■■□□□ STIX Visualizer — Threat Intelligence Graph Explorer
https://cyber.netsecops.io/stix-viz/
https://cyber.netsecops.io/stix-viz/
1. The visualizer renders the full threat picture: actors, malware, attack patterns, indicators, vulnerabilities, and the relationships that connect them, all in a live interactive force graph.
2. STIX 2.1 defines a rich vocabulary of objects — threat actors, malware, attack patterns, indicators, vulnerabilities, and more — plus typed relationships between them, all serialised as JSON.
3. CyberNetSec.io generates a STIX 2.1 bundle for every Critical, High, and Medium severity article, maps incidents to MITRE ATT&CK techniques, embeds SIGMA detection rules into indicator objects, and publishes everything through a live TAXII 2.1 endpoint.
■□□□□ Online SQL database viewer. Allows search and make pdf or csv PoC files.
https://ckure.org/rx/sql/
https://ckure.org/rx/sql/
🤣2😁1🏆1