πΌα₯αα³α α2018 α.α α α²α΅ ααα΅ α α°αα α α°α¨α³α½α!πΌ
αα£α α αα΅ α α ααα£ α α°α΅α³ α₯α α αα α α¨α°αα α₯α©α α α²α΅ ααα΅ α₯αα²ααααΉ α¨αα₯ α₯ααααα!
CODE N CRAX
πΌααα«α α α²α΅ ααα΅!πΌ
αα£α α αα΅ α α ααα£ α α°α΅α³ α₯α α αα α α¨α°αα α₯α©α α α²α΅ ααα΅ α₯αα²ααααΉ α¨αα₯ α₯ααααα!
CODE N CRAX
πΌααα«α α α²α΅ ααα΅!πΌ
π₯11
#NEWS
β οΈ Samsung just fixed a zero-day bug in Android 13β16.
Hackers were already using it to break in through a hidden image library π³
If youβve got a Galaxy, update ASAP. Donβt wait.
Hereβs the full story β https://thehackernews.com/2025/09/samsung-fixes-critical-zero-day-cve.html
Telegram | LinkedIn
β οΈ Samsung just fixed a zero-day bug in Android 13β16.
Hackers were already using it to break in through a hidden image library π³
If youβve got a Galaxy, update ASAP. Donβt wait.
Hereβs the full story β https://thehackernews.com/2025/09/samsung-fixes-critical-zero-day-cve.html
Telegram | LinkedIn
π2π2
#NEWS
π¨ China-backed hackers are targeting Thailand with a stealthy new cyber weapon.
π SnakeDisk β a USB worm that hides files, tricks you to click a fake βUSB.exe,β and installs the Yokai backdoor.
Full story β https://thehackernews.com/2025/09/mustang-panda-deploys-snakedisk-usb.html
Telegram | LinkedIn
π¨ China-backed hackers are targeting Thailand with a stealthy new cyber weapon.
π SnakeDisk β a USB worm that hides files, tricks you to click a fake βUSB.exe,β and installs the Yokai backdoor.
Full story β https://thehackernews.com/2025/09/mustang-panda-deploys-snakedisk-usb.html
Telegram | LinkedIn
π1
#NEWS
π¨ Chrome users: a new zero-day is under active attack.
CVE-2025-10585 targets Chromeβs V8 engineβChromeβs 6th zero-day of 2025.
Details β https://thehackernews.com/2025/09/google-patches-chrome-zero-day-cve-2025.html
β‘ Update now: 140.0.7339.185/.186 (Win/macOS), 140.0.7339.185 (Linux).
If you use Edge/Brave/Opera/Vivaldi, patch too.
Telegram | LinkedIn
π¨ Chrome users: a new zero-day is under active attack.
CVE-2025-10585 targets Chromeβs V8 engineβChromeβs 6th zero-day of 2025.
Details β https://thehackernews.com/2025/09/google-patches-chrome-zero-day-cve-2025.html
β‘ Update now: 140.0.7339.185/.186 (Win/macOS), 140.0.7339.185 (Linux).
If you use Edge/Brave/Opera/Vivaldi, patch too.
Telegram | LinkedIn
β€2π2π1
β οΈ First-ever GPT-4 powered malware uncovered.
Researchers found βMalTerminal,β a prototype that can write its own ransomware or reverse shellβcode dated before Nov 2023.
Hackers are also slipping hidden prompts into phishing emails to trick AI scanners and unleash Follina exploits.
Full story
Telegram | LinkedIn
Researchers found βMalTerminal,β a prototype that can write its own ransomware or reverse shellβcode dated before Nov 2023.
Hackers are also slipping hidden prompts into phishing emails to trick AI scanners and unleash Follina exploits.
Full story
Telegram | LinkedIn
π€―8π1
Digital Forensics & Investigation Workshop with Adiss Ababa University, Information System HUB will be tomorrow @2:00 mata lay.
π» If youβre curious about how technology plays a role in solving crimes, this workshop is for you!
See you all there! ππ΅ββ
π» If youβre curious about how technology plays a role in solving crimes, this workshop is for you!
See you all there! ππ΅ββ
Telegram
Information Systems Hub π»π
ISHub AAU (Information Systems Hub β AAU) is a student-led tech community at Addis Ababa University open to all tech-enthusiast students, regardless of department.
Contact us
Telegram: @ISHubAAU_Support
Email: ishubaau@gmail.com
Contact us
Telegram: @ISHubAAU_Support
Email: ishubaau@gmail.com
β€7π₯1
Hey fams π Iβm Yeabsira, and Iβm excited to share something Iβve been working on in Cybersecurity especially in Reverse Engineering!
π REX β Reverse Engineering Automation Tool
A powerful tool built to automate static malware analysis and make reverse engineering faster and easier.
Key Features:
π Automated static binary analysis
π File metadata, entropy, strings, sections
π₯οΈ Simple GUI + CLI support
β‘ Fast & lightweight β built in C and Python
π Designed for educational and research purposes only, safe to use and explore.
Check it out here: π GitHub | LinkedIn
π REX β Reverse Engineering Automation Tool
A powerful tool built to automate static malware analysis and make reverse engineering faster and easier.
Key Features:
π Automated static binary analysis
π File metadata, entropy, strings, sections
π₯οΈ Simple GUI + CLI support
β‘ Fast & lightweight β built in C and Python
π Designed for educational and research purposes only, safe to use and explore.
Check it out here: π GitHub | LinkedIn
π12π₯3
#NEWS
π¨ Cisco flaw already under attack: CVE-2025-20352 lets remote hackers crash systems or run code as root via SNMP.
Cisco IOS & IOS XE devices with SNMP enabled are at riskβMeraki MS390 & Catalyst 9300 included. Patch to IOS XE 17.15.4a now.
Full story: https://thehackernews.com/2025/09/cisco-warns-of-actively-exploited-snmp.html
Telegram | LinkedIn
π¨ Cisco flaw already under attack: CVE-2025-20352 lets remote hackers crash systems or run code as root via SNMP.
Cisco IOS & IOS XE devices with SNMP enabled are at riskβMeraki MS390 & Catalyst 9300 included. Patch to IOS XE 17.15.4a now.
Full story: https://thehackernews.com/2025/09/cisco-warns-of-actively-exploited-snmp.html
Telegram | LinkedIn
β€2
Forwarded from Information Systems Hub π»π
π Workshop Recap
Our Digital Forensics & Cyber Investigation workshop was a huge success! π
A big thank you to Nehimya Mesfin for sharing his expert insights on tracing hackers, analyzing digital evidence.
The session was hosted by Eyerusalem Belay , who guided participants through interactive discussions and Q&A.
π‘ Key Takeaway:Forensics is more than solving cybercrimesβitβs about combining technology, ethics, and critical thinking to protect and secure our digital world.
Thank you to everyone who joined and made this session truly impactful! π
Our Digital Forensics & Cyber Investigation workshop was a huge success! π
A big thank you to Nehimya Mesfin for sharing his expert insights on tracing hackers, analyzing digital evidence.
The session was hosted by Eyerusalem Belay , who guided participants through interactive discussions and Q&A.
π‘ Key Takeaway:Forensics is more than solving cybercrimesβitβs about combining technology, ethics, and critical thinking to protect and secure our digital world.
Thank you to everyone who joined and made this session truly impactful! π
π₯2β€1
Forwarded from Information Systems Hub π»π
π₯ Missed the session? Donβt worry! We have a video recording available for you to catch up.
π€2β€1
π To the burnouts and endless classes!π
Melkam yetemert gize class lejemerachu hulu π₯
Melkam yetemert gize class lejemerachu hulu π₯
π₯14
#AdwaCTF #Adwa_Night
π¨βπ» Get ready... a little fun is waiting for you at the end of this week! π₯π₯
Telegram | LinkedIn
π¨βπ» Get ready... a little fun is waiting for you at the end of this week! π₯π₯
Telegram | LinkedIn
π₯10β€3π2