This media is not supported in your browser
VIEW IN TELEGRAM
Major coordinated operation leads to the arrest of 7 suspects behind a large-scale SMS spoofing and SIM-boxing network.
Operation highlights:
๐ 26 searches conducted
๐ฅ 5 main operators apprehended
๐ฆ 1,200 SIM-boxes running 40,000 SIM cards seized
๐ณ Hundreds of thousands of additional SIM cards confiscated
๐ 5 servers hosting the illegal service dismantled
๐ป 2 domains โ gogetsms.com & apisim.com โ seized and replaced with law enforcement splash pages
๐ถ โฌ431,000 frozen in bank accounts
๐ฐ $333,000 in crypto seized
๐ 4 luxury cars confiscated
๐ก Credits:@smspoolnet(๐)
๐ More: https://x.com/DarkWebInformer/status/1978603403354792430
#CyberSecurity #Takedown #OSINT #CyberCrime #LEA
Please open Telegram to view this post
VIEW IN TELEGRAM
๐2โค1๐ฅ1๐คฃ1
https://eclypsium.com/blog/bombshell-the-signed-backdoor-hiding-in-plain-sight-on-framework-devices/
Please open Telegram to view this post
VIEW IN TELEGRAM
Eclypsium | Supply Chain Security for the Modern Enterprise
BombShell: The Signed Backdoor Hiding in Plain Sight on Framework Devices
Eclypsium researchers have discovered UEFI shells, authorized via Secure Boot, on Framework laptops. The UEFI shells contain capabilities that allow attackers to bypass Secure Boot on roughly 200,000 affected Framework laptops and desktops.
๐ฅ2
PwnยฒOwn Day 2: Hackers exploit 56 zero-days for $790,000.
https://www.bleepingcomputer.com/news/security/samsung-galaxy-s25-hacked-on-day-two-of-pwn2own-ireland-2025/
https://www.bleepingcomputer.com/news/security/samsung-galaxy-s25-hacked-on-day-two-of-pwn2own-ireland-2025/
BleepingComputer
Pwn2Own Day 2: Hackers exploit 22 zero-days for $267,500
Security researchers collected $267,500 in cash after exploiting 22โโโโโโโ unique zero-day vulnerabilities during the second day of the Pwn2Own Ireland 2025 hacking competition.
๐ฅ1
https://securelist.com/forumtroll-apt-hacking-team-dante-spyware/117851/
Please open Telegram to view this post
VIEW IN TELEGRAM
Securelist
Mem3nt0 mori โ The Hacking Team is back!
Kaspersky researchers discovered previously unidentified commercial Dante spyware developed by Memento Labs (formerly Hacking Team) and linked it to the ForumTroll APT attacks.
๐ฅ1
Media is too big
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
๐ฅ2๐ฑ1
https://openai.com/index/introducing-aardvark/
Please open Telegram to view this post
VIEW IN TELEGRAM
Openai
Introducing Aardvark: OpenAIโs agentic security researcher
Now in private beta: an AI agent that thinks like a security researcher and scales to meet the demands of modern software.
โค1๐ค1
Juan Sacco
https://www.exploitpack.com/blogs/news/0-day-msr-kernel-exploit-for-windows-11-25h2
Please open Telegram to view this post
VIEW IN TELEGRAM
Exploit Pack
0-Day MSR Kernel Exploit for Windows 11 25H2
New 0-day Windows Kernel Exploit, working in Windows 11 25h2 fully patched.It took me 2 weeks of endless coffee cups! MSRs control where the CPU jumps for privileged transitions, they are a sensitive part of system state. Operating systems carefully themโฆ
๐1๐ฅ1๐1
A Major Leak Spills a Chinese Hacking Contractorโs Tools and Targets.
https://www.wired.com/story/major-leak-spills-chinese-hacking-contractor-tools-targets/
https://www.wired.com/story/major-leak-spills-chinese-hacking-contractor-tools-targets/
WIRED
A Major Leak Spills a Chinese Hacking Contractorโs Tools and Targets
Plus: State-sponsored AI hacking is here, Google hosts a CBP face recognition app, and more of the weekโs top security news.
๐2 1
https://cybersecuritynews.com/7-zip-rce-vulnerability-exploited/
Please open Telegram to view this post
VIEW IN TELEGRAM
Cyber Security News
Hackers Actively Exploiting 7-Zip RCE Vulnerability in the Wild
Hackers have begun actively exploiting a critical remote code execution (RCE) vulnerability in the popular file archiver 7-Zip, putting millions of users at risk of malware infection and system compromise.
โคโ๐ฅ1๐1๐ฅ1
https://cybersecuritynews.com/critical-windows-graphics-vulnerability/
Please open Telegram to view this post
VIEW IN TELEGRAM
Cyber Security News
Critical Windows Graphics Vulnerability Lets Hackers Seize Control with a Single Image
A critical remote code execution flaw in Microsoft's Windows Graphics Component allows attackers to seize control of systems using specially crafted JPEG images.
โ2๐1๐1 1
cKure Red
The zionist entity (Israel) has โIronโ in the name of many ๐ช technologies (defense-related):
Iron Beam โ Israel. High-energy laser air-defense system.
Iron Fist โ Israel. Active protection system for vehicles.
Iron Curtain โ US. APS for close-range RPG/missile interception.
Iron Wolf โ Lithuania. Mechanized infantry brigade (NATO).
Iron Dome โ Missile Defense system of Israel.
Iron Sting โ Israel. Precision 120mm mortar-guided munition.
Iron Vision โ Elbit helmet-mounted 360ยฐ situational awareness for tanks.
Please open Telegram to view this post
VIEW IN TELEGRAM
๐คฏ3๐คฎ2๐ค1
https://securelist.com/tomiris-new-tools/118143/
Please open Telegram to view this post
VIEW IN TELEGRAM
๐ฅ1
https://github.com/mmathivanan17/CVE-2024-21413
https://cybersecuritynews.com/outlook-remote-code-execution-vulnerability-2/
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - mmathivanan17/CVE-2024-21413: Outlook exploitation
Outlook exploitation. Contribute to mmathivanan17/CVE-2024-21413 development by creating an account on GitHub.
๐ฅ5๐1 1
https://github.com/hackersatyamrastogi/react2shell-ultimate
Please open Telegram to view this post
VIEW IN TELEGRAM
๐ฅ3๐1 1
Hacked in Pakistan: Israeli Spyware Firm Intellexa, Owned by Ex-intel Officer, Still Active Amid
Spyware targets in Pakistan
https://www.haaretz.com/israel-news/security-aviation/2025-12-04/ty-article-magazine/.premium/israeli-spyware-firm-intellexa-owned-by-ex-intel-officer-still-active-amid-us-sanctions/0000019a-e3e8-db35-afbf-ebfcb8bb0000
Please open Telegram to view this post
VIEW IN TELEGRAM
โค1
https://www.iranintl.com/en/202512164597
Please open Telegram to view this post
VIEW IN TELEGRAM
Iranintl
Iran-linked hacker group offers $30,000 bounty for Israel's military info
An Iran-linked hacker group said it was offering a $30,000 reward for information related to Israelโs military sector after releasing material it said identified people involved in designing Israeli missile defense systems.
โค1
This media is not supported in your browser
VIEW IN TELEGRAM
OSINT via Google ๐
Please open Telegram to view this post
VIEW IN TELEGRAM
๐ค1
Please open Telegram to view this post
VIEW IN TELEGRAM
โค4