Zero Trust Hackers . Cyber Security . Hacking Resources . Bug Bounty . Hacks
2.29K subscribers
110 photos
1 video
2 files
160 links
Zero Trust Hackers . Cyber Security . Hacking Resources . Bug Bounty . Hacks
Download Telegram
New PumaBot botnet brute forces SSH credentials to breach devices

A newly discovered Go-based Linux botnet malware named PumaBot is brute-forcing SSH credentials on embedded IoT devices to deploy malicious payloads.

Bill Toulas | bleepingcomputerโ€‹ .com โ€ข May 28, 2025

๐Ÿ’ก t.me/zerotrusthackers
APT41 malware abuses Google Calendar for stealthy C2 communication

The Chinese APT41 hacking group uses a new malware named 'ToughProgress' that abuses Google Calendar for command-and-control (C2) operations, hiding malicious activity behind a trusted cloud service.

Bill Toulas | bleepingcomputer .com โ€ข May 28, 2025

๐Ÿ’ก t.me/zerotrusthackers
Windows 11 KB5058499 update rolls out new Share and Click to Do features

โ€‹โ€‹Microsoft has released the KB5058499 preview cumulative update for Windows 11 24H2 with forty-eight new features or changes, with many gradually rolling out, such as the new Windows Share feature and the Click to Do Preview.

Lawrence Abrams | bleepingcomputer .com โ€ข May 28, 2025

๐Ÿ’ก t.me/zerotrusthackers
Chinese APT41 Exploits Google Calendar for Malware Command-and-Control Operations

APT41 used Google Calendar to control TOUGHPROGRESS malware via encrypted events; Google shut it down.

The Hacker News | thehackernews .com โ€ข May 29, 2025

๐Ÿ’ก t.me/zerotrusthackers
Data broker LexisNexis discloses data breach affecting 364,000 people

Data broker giant LexisNexis Risk Solutions has revealed that unknown attackers stole the personal information of over 364,000 individuals in a December breach.

Sergiu Gatlan | bleepingcomputerโ€‹ .com โ€ข May 29, 2025

๐Ÿ’ก t.me/zerotrusthackers
Microsoft: Windows 11 might fail to start after installing KB5058405

Microsoft has confirmed that some Windows 11 systems might fail to start after installing the KB5058405 security update released during this month's Patch Tuesday.

Sergiu Gatlan | bleepingcomputer .com โ€ข May 29, 2025

๐Ÿ’ก t.me/zerotrusthackers
DragonForce Exploits SimpleHelp Flaws to Deploy Ransomware Across Customer Endpoints

DragonForce exploited three SimpleHelp CVEs to hijack an MSPโ€™s RMM tool, steal data, and deploy ransomware on customer systems.

The Hacker News | thehackernews .com โ€ข May 29, 2025

๐Ÿ’ก t.me/zerotrusthackers
New Windows RAT Evades Detection for Weeks Using Corrupted DOS and PE Headers

Malware with corrupted DOS and PE headers evades detection for weeks, decrypts TLS-based C2 and enables full attacker control.

The Hacker News | thehackernewsโ€‹ .com โ€ข May 29, 2025

๐Ÿ’ก t.me/zerotrusthackers
U.S. DoJ Seizes 4 Domains Supporting Cybercrime Crypting Services in Global Operation

DoJ seized 4 domains on May 27 tied to malware crypting tools, disrupting cybercriminal stealth operations.

The Hacker News | thehackernewsโ€‹ .com โ€ข May 31, 2025

๐Ÿ’ก t.me/zerotrusthackers
New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora

Linux vulnerabilities CVE-2025-5054 and CVE-2025-4598 let local attackers extract sensitive data via SUID core dumps.

The Hacker News | thehackernews โ€‹ .com โ€ข May 31, 2025

๐Ÿ’ก t.me/zerotrusthackers
Exploit details for max severity Cisco IOS XE flaw now public

Technical details about a maximum-severity Cisco IOS XE WLC arbitrary file upload flaw tracked as CVE-2025-20188 have been made publicly available, bringing us closer to a working exploit.

Bill Toulas | bleepingcomputer .com โ€ข May 31, 2025

๐Ÿ’ก t.me/zerotrusthackers
This channels are for Programmers, Coders, Software Engineers.

0๏ธโƒฃ Python
1๏ธโƒฃ Data Science
2๏ธโƒฃ Machine Learning
3๏ธโƒฃ Data Analysis & Visualization
4๏ธโƒฃ Artificial Intelligence
5๏ธโƒฃ Blockchain
6๏ธโƒฃ Statistics
7๏ธโƒฃ Deep Learning
8๏ธโƒฃ Programming & Design
9๏ธโƒฃ Cyber Security
๐Ÿ”Ÿ Tech Jobs

๐Ÿ‘‰ https://t.me/addlist/du5HOxSLF-NkMTFk

๐ŸŸข https://t.me/techpsyche
50 Linux commands for our day-to-day work:

1. ls - List directory contents.
2. pwd - Display current directory path.
3. cd - Change directory.
4. mkdir - Create a new directory.
5. mv - Move or rename files.
6. cp - Copy files.
7. rm - Delete files.
8. touch - Create an empty file.
9. rmdir - Remove directory.
10. cat - Display file content.
11. clear - Clear terminal screen.
12. echo - Output text or data to a file.
13. less - View text files page-by-page.
14. man - Display command manual.
15. sudo - Execute commands with root privileges.
16. top - Show system processes.
17. tar - Archive files into tarball.
18. grep - Search for text within files.
19. head - Display file's beginning lines.
20. tail - Show file's ending lines.
21. diff - Compare two files' content.
22. kill - Terminate processes.
23. jobs - List active jobs.
24. sort - Sort lines of a text file.
25. df - Display disk usage.
26. du - Show file or directory size.
27. zip - Compress files into zip format.
28. unzip - Extract zip archives.
29. ssh - Secure connection between hosts.
30. cal - Display calendar.
31. apt - Manage packages.
32. alias - Create command shortcuts.
33. w - Show current user details.
34. whereis - Locate binaries, sources, and manuals.
35. whatis - Provide command description.
36. useradd - Add a new user.
37. passwd - Change user password.
38. whoami - Display current user name.
39. uptime - Show system runtime.
40. free - Display memory status.
41. history - List command history.
42. uname - Provide system details.
43. ping - Check network connectivity.
44. chmod - Modify file/directory permissions.
45. chown - Change file/directory owner.
46. find - Search for files/directories.
47. locate - Find files quickly.
48. ifconfig - Display network interfaces.
49. ip a - List network interfaces succinctly.
50. finger - Retrieve user information.

Honeypot Explained: https://t.me/zerotrusthackers/16

OTP Tokens: https://t.me/zerotrusthackers/42

WhatsApp Channel๐Ÿ‘‡
https://whatsapp.com/channel/0029VaxVv551iUxRku094918
Remote Cloud Security Engineer Job at XM

- The main role is ensuring the information security of our business.
- You will be working in a team that is designing and building resilient and secure Cloud environments that proactively prevent security threats.

Apply Here:
https://kenyatrends.co.ke/r47v

Global Tech Jobs Here๐Ÿ‘‡
https://t.me/jobsourceglobal

SHARE WITH YOUR FRIENDS๐Ÿฅณ๐Ÿฅณ

#remote
๐Ÿด ๐—ง๐—ผ๐—ฝ ๐—™๐—ฟ๐—ฒ๐—ฒ ๐——๐—ฎ๐˜๐—ฎ ๐—ฆ๐—ฐ๐—ถ๐—ฒ๐—ป๐—ฐ๐—ฒ ๐—–๐—ผ๐˜‚๐—ฟ๐˜€๐—ฒ๐˜€ ๐—ณ๐—ฟ๐—ผ๐—บ ๐—›๐—ฎ๐—ฟ๐˜ƒ๐—ฎ๐—ฟ๐—ฑ, ๐— ๐—œ๐—ง & ๐—ฆ๐˜๐—ฎ๐—ป๐—ณ๐—ผ๐—ฟ๐—ฑ ๐Ÿ–ฅ

๐ŸŽ“ Learn Data Science for Free from the Worldโ€™s Best Universities๐Ÿš€

Top institutions like Harvard, MIT, and Stanford are offering world-class data science courses online โ€” and theyโ€™re 100% free. ๐ŸŽฏ๐Ÿ“

๐‹๐ข๐ง๐ค๐Ÿ‘‡:-

https://techurl.in/pSkcy

All The Best ๐Ÿ‘
โค1
Fake Recruiter Emails Target CFOs Using Legit NetBird Tool Across

Plug-and-play phishing kits like Haozi drive global scams, bypass MFA, and lower attacker skill bar.

The Hacker News | thehackernewsโ€‹.com โ€ข Jun 2, 2025

๐Ÿ’ก t.me/zerotrusthackers
The Secret Defense Strategy of Four Critical Industries Combating Advanced Cyber Threats

NDR helps detect stealthy threats, protect legacy systems, and meet compliance in critical industries.

The Hacker News | thehackernewsโ€‹.com โ€ข Jun 2, 2025

๐Ÿ’ก t.me/zerotrusthackers
Top Companies Hiring Security Specialists ๐Ÿ›ก

Apply Links:- ๐Ÿ‘‡

Access Softek :- https://techurl.in/OSlKO

Inspectiv :- https://techurl.in/RrAjx

Sporty Group :- https://techurl.in/UDqcs

XM :- https://techurl.in/WzwcX

Other Jobs :- https://t.me/jobsourceglobal

Apply before deadline ๐Ÿ’ซ
๐—Ÿ๐—ฒ๐—ฎ๐—ฟ๐—ป ๐—–๐—น๐—ผ๐˜‚๐—ฑ ๐—–๐—ผ๐—บ๐—ฝ๐˜‚๐˜๐—ถ๐—ป๐—ด ๐—ฎ๐—ป๐—ฑ ๐——๐—ฒ๐˜ƒ๐—ข๐—ฝ๐˜€ ๐—ณ๐—ผ๐—ฟ ๐—™๐—ฅ๐—˜๐—˜ ๐˜„๐—ถ๐˜๐—ต ๐—š๐—ผ๐—ผ๐—ด๐—น๐—ฒ ๐—–๐—น๐—ผ๐˜‚๐—ฑ๐Ÿ–ฅ

๐Ÿš€ Break into Cloud Computing & DevOps with Google Cloud โ€” Absolutely FREE!๐Ÿ”ฅ

Want to become a Cloud Architect, DevOps Engineer, or simply understand cloud systems better?๐Ÿ‘จโ€๐Ÿ’ป

๐‹๐ข๐ง๐ค๐Ÿ‘‡:-

https://techurl.in/iucvS

Develop the skills employers are looking forโœ…
Qualcomm fixes three Adreno GPU zero-days exploited in attacks

Qualcomm has released security patches for three zero-day vulnerabilities in the Adreno Graphics Processing Unit (GPU) driver that impact dozens of chipsets and are actively exploited in targeted attacks.

Sergiu Gatlan | bleepingcomputerโ€‹.com โ€ข Jun 2, 2025

๐Ÿ’ก t.me/zerotrusthackers