Chinese APT41 Exploits Google Calendar for Malware Command-and-Control Operations
APT41 used Google Calendar to control TOUGHPROGRESS malware via encrypted events; Google shut it down.
The Hacker News | thehackernews .com โข May 29, 2025
๐ก t.me/zerotrusthackers
APT41 used Google Calendar to control TOUGHPROGRESS malware via encrypted events; Google shut it down.
The Hacker News | thehackernews .com โข May 29, 2025
๐ก t.me/zerotrusthackers
Data broker LexisNexis discloses data breach affecting 364,000 people
Data broker giant LexisNexis Risk Solutions has revealed that unknown attackers stole the personal information of over 364,000 individuals in a December breach.
Sergiu Gatlan | bleepingcomputerโ .com โข May 29, 2025
๐ก t.me/zerotrusthackers
Data broker giant LexisNexis Risk Solutions has revealed that unknown attackers stole the personal information of over 364,000 individuals in a December breach.
Sergiu Gatlan | bleepingcomputerโ .com โข May 29, 2025
๐ก t.me/zerotrusthackers
Microsoft: Windows 11 might fail to start after installing KB5058405
Microsoft has confirmed that some Windows 11 systems might fail to start after installing the KB5058405 security update released during this month's Patch Tuesday.
Sergiu Gatlan | bleepingcomputer .com โข May 29, 2025
๐ก t.me/zerotrusthackers
Microsoft has confirmed that some Windows 11 systems might fail to start after installing the KB5058405 security update released during this month's Patch Tuesday.
Sergiu Gatlan | bleepingcomputer .com โข May 29, 2025
๐ก t.me/zerotrusthackers
DragonForce Exploits SimpleHelp Flaws to Deploy Ransomware Across Customer Endpoints
DragonForce exploited three SimpleHelp CVEs to hijack an MSPโs RMM tool, steal data, and deploy ransomware on customer systems.
The Hacker News | thehackernews .com โข May 29, 2025
๐ก t.me/zerotrusthackers
DragonForce exploited three SimpleHelp CVEs to hijack an MSPโs RMM tool, steal data, and deploy ransomware on customer systems.
The Hacker News | thehackernews .com โข May 29, 2025
๐ก t.me/zerotrusthackers
New Windows RAT Evades Detection for Weeks Using Corrupted DOS and PE Headers
Malware with corrupted DOS and PE headers evades detection for weeks, decrypts TLS-based C2 and enables full attacker control.
The Hacker News | thehackernewsโ .com โข May 29, 2025
๐ก t.me/zerotrusthackers
Malware with corrupted DOS and PE headers evades detection for weeks, decrypts TLS-based C2 and enables full attacker control.
The Hacker News | thehackernewsโ .com โข May 29, 2025
๐ก t.me/zerotrusthackers
U.S. DoJ Seizes 4 Domains Supporting Cybercrime Crypting Services in Global Operation
DoJ seized 4 domains on May 27 tied to malware crypting tools, disrupting cybercriminal stealth operations.
The Hacker News | thehackernewsโ .com โข May 31, 2025
๐ก t.me/zerotrusthackers
DoJ seized 4 domains on May 27 tied to malware crypting tools, disrupting cybercriminal stealth operations.
The Hacker News | thehackernewsโ .com โข May 31, 2025
๐ก t.me/zerotrusthackers
New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora
Linux vulnerabilities CVE-2025-5054 and CVE-2025-4598 let local attackers extract sensitive data via SUID core dumps.
The Hacker News | thehackernews โ .com โข May 31, 2025
๐ก t.me/zerotrusthackers
Linux vulnerabilities CVE-2025-5054 and CVE-2025-4598 let local attackers extract sensitive data via SUID core dumps.
The Hacker News | thehackernews โ .com โข May 31, 2025
๐ก t.me/zerotrusthackers
Exploit details for max severity Cisco IOS XE flaw now public
Technical details about a maximum-severity Cisco IOS XE WLC arbitrary file upload flaw tracked as CVE-2025-20188 have been made publicly available, bringing us closer to a working exploit.
Bill Toulas | bleepingcomputer .com โข May 31, 2025
๐ก t.me/zerotrusthackers
Technical details about a maximum-severity Cisco IOS XE WLC arbitrary file upload flaw tracked as CVE-2025-20188 have been made publicly available, bringing us closer to a working exploit.
Bill Toulas | bleepingcomputer .com โข May 31, 2025
๐ก t.me/zerotrusthackers
This channels are for Programmers, Coders, Software Engineers.
0๏ธโฃ Python
1๏ธโฃ Data Science
2๏ธโฃ Machine Learning
3๏ธโฃ Data Analysis & Visualization
4๏ธโฃ Artificial Intelligence
5๏ธโฃ Blockchain
6๏ธโฃ Statistics
7๏ธโฃ Deep Learning
8๏ธโฃ Programming & Design
9๏ธโฃ Cyber Security
๐ Tech Jobs
๐ https://t.me/addlist/du5HOxSLF-NkMTFk
๐ข https://t.me/techpsyche
0๏ธโฃ Python
1๏ธโฃ Data Science
2๏ธโฃ Machine Learning
3๏ธโฃ Data Analysis & Visualization
4๏ธโฃ Artificial Intelligence
5๏ธโฃ Blockchain
6๏ธโฃ Statistics
7๏ธโฃ Deep Learning
8๏ธโฃ Programming & Design
9๏ธโฃ Cyber Security
๐ Tech Jobs
๐ https://t.me/addlist/du5HOxSLF-NkMTFk
๐ข https://t.me/techpsyche
50 Linux commands for our day-to-day work:
1. ls - List directory contents.
2. pwd - Display current directory path.
3. cd - Change directory.
4. mkdir - Create a new directory.
5. mv - Move or rename files.
6. cp - Copy files.
7. rm - Delete files.
8. touch - Create an empty file.
9. rmdir - Remove directory.
10. cat - Display file content.
11. clear - Clear terminal screen.
12. echo - Output text or data to a file.
13. less - View text files page-by-page.
14. man - Display command manual.
15. sudo - Execute commands with root privileges.
16. top - Show system processes.
17. tar - Archive files into tarball.
18. grep - Search for text within files.
19. head - Display file's beginning lines.
20. tail - Show file's ending lines.
21. diff - Compare two files' content.
22. kill - Terminate processes.
23. jobs - List active jobs.
24. sort - Sort lines of a text file.
25. df - Display disk usage.
26. du - Show file or directory size.
27. zip - Compress files into zip format.
28. unzip - Extract zip archives.
29. ssh - Secure connection between hosts.
30. cal - Display calendar.
31. apt - Manage packages.
32. alias - Create command shortcuts.
33. w - Show current user details.
34. whereis - Locate binaries, sources, and manuals.
35. whatis - Provide command description.
36. useradd - Add a new user.
37. passwd - Change user password.
38. whoami - Display current user name.
39. uptime - Show system runtime.
40. free - Display memory status.
41. history - List command history.
42. uname - Provide system details.
43. ping - Check network connectivity.
44. chmod - Modify file/directory permissions.
45. chown - Change file/directory owner.
46. find - Search for files/directories.
47. locate - Find files quickly.
48. ifconfig - Display network interfaces.
49. ip a - List network interfaces succinctly.
50. finger - Retrieve user information.
Honeypot Explained: https://t.me/zerotrusthackers/16
OTP Tokens: https://t.me/zerotrusthackers/42
WhatsApp Channel๐
https://whatsapp.com/channel/0029VaxVv551iUxRku094918
1. ls - List directory contents.
2. pwd - Display current directory path.
3. cd - Change directory.
4. mkdir - Create a new directory.
5. mv - Move or rename files.
6. cp - Copy files.
7. rm - Delete files.
8. touch - Create an empty file.
9. rmdir - Remove directory.
10. cat - Display file content.
11. clear - Clear terminal screen.
12. echo - Output text or data to a file.
13. less - View text files page-by-page.
14. man - Display command manual.
15. sudo - Execute commands with root privileges.
16. top - Show system processes.
17. tar - Archive files into tarball.
18. grep - Search for text within files.
19. head - Display file's beginning lines.
20. tail - Show file's ending lines.
21. diff - Compare two files' content.
22. kill - Terminate processes.
23. jobs - List active jobs.
24. sort - Sort lines of a text file.
25. df - Display disk usage.
26. du - Show file or directory size.
27. zip - Compress files into zip format.
28. unzip - Extract zip archives.
29. ssh - Secure connection between hosts.
30. cal - Display calendar.
31. apt - Manage packages.
32. alias - Create command shortcuts.
33. w - Show current user details.
34. whereis - Locate binaries, sources, and manuals.
35. whatis - Provide command description.
36. useradd - Add a new user.
37. passwd - Change user password.
38. whoami - Display current user name.
39. uptime - Show system runtime.
40. free - Display memory status.
41. history - List command history.
42. uname - Provide system details.
43. ping - Check network connectivity.
44. chmod - Modify file/directory permissions.
45. chown - Change file/directory owner.
46. find - Search for files/directories.
47. locate - Find files quickly.
48. ifconfig - Display network interfaces.
49. ip a - List network interfaces succinctly.
50. finger - Retrieve user information.
Honeypot Explained: https://t.me/zerotrusthackers/16
OTP Tokens: https://t.me/zerotrusthackers/42
WhatsApp Channel๐
https://whatsapp.com/channel/0029VaxVv551iUxRku094918
Remote Cloud Security Engineer Job at XM
- The main role is ensuring the information security of our business.
- You will be working in a team that is designing and building resilient and secure Cloud environments that proactively prevent security threats.
Apply Here:
https://kenyatrends.co.ke/r47v
Global Tech Jobs Here๐
https://t.me/jobsourceglobal
SHARE WITH YOUR FRIENDS๐ฅณ๐ฅณ
#remote
- The main role is ensuring the information security of our business.
- You will be working in a team that is designing and building resilient and secure Cloud environments that proactively prevent security threats.
Apply Here:
https://kenyatrends.co.ke/r47v
Global Tech Jobs Here๐
https://t.me/jobsourceglobal
SHARE WITH YOUR FRIENDS๐ฅณ๐ฅณ
#remote
๐ด ๐ง๐ผ๐ฝ ๐๐ฟ๐ฒ๐ฒ ๐๐ฎ๐๐ฎ ๐ฆ๐ฐ๐ถ๐ฒ๐ป๐ฐ๐ฒ ๐๐ผ๐๐ฟ๐๐ฒ๐ ๐ณ๐ฟ๐ผ๐บ ๐๐ฎ๐ฟ๐๐ฎ๐ฟ๐ฑ, ๐ ๐๐ง & ๐ฆ๐๐ฎ๐ป๐ณ๐ผ๐ฟ๐ฑ ๐ฅ
๐ Learn Data Science for Free from the Worldโs Best Universities๐
Top institutions like Harvard, MIT, and Stanford are offering world-class data science courses online โ and theyโre 100% free. ๐ฏ๐
๐๐ข๐ง๐ค๐:-
https://techurl.in/pSkcy
All The Best ๐
๐ Learn Data Science for Free from the Worldโs Best Universities๐
Top institutions like Harvard, MIT, and Stanford are offering world-class data science courses online โ and theyโre 100% free. ๐ฏ๐
๐๐ข๐ง๐ค๐:-
https://techurl.in/pSkcy
All The Best ๐
โค1
Fake Recruiter Emails Target CFOs Using Legit NetBird Tool Across
Plug-and-play phishing kits like Haozi drive global scams, bypass MFA, and lower attacker skill bar.
The Hacker News | thehackernewsโ.com โข Jun 2, 2025
๐ก t.me/zerotrusthackers
Plug-and-play phishing kits like Haozi drive global scams, bypass MFA, and lower attacker skill bar.
The Hacker News | thehackernewsโ.com โข Jun 2, 2025
๐ก t.me/zerotrusthackers
The Secret Defense Strategy of Four Critical Industries Combating Advanced Cyber Threats
NDR helps detect stealthy threats, protect legacy systems, and meet compliance in critical industries.
The Hacker News | thehackernewsโ.com โข Jun 2, 2025
๐ก t.me/zerotrusthackers
NDR helps detect stealthy threats, protect legacy systems, and meet compliance in critical industries.
The Hacker News | thehackernewsโ.com โข Jun 2, 2025
๐ก t.me/zerotrusthackers
Top Companies Hiring Security Specialists ๐ก
Apply Links:- ๐
Access Softek :- https://techurl.in/OSlKO
Inspectiv :- https://techurl.in/RrAjx
Sporty Group :- https://techurl.in/UDqcs
XM :- https://techurl.in/WzwcX
Other Jobs :- https://t.me/jobsourceglobal
Apply before deadline ๐ซ
Apply Links:- ๐
Access Softek :- https://techurl.in/OSlKO
Inspectiv :- https://techurl.in/RrAjx
Sporty Group :- https://techurl.in/UDqcs
XM :- https://techurl.in/WzwcX
Other Jobs :- https://t.me/jobsourceglobal
Apply before deadline ๐ซ
๐๐ฒ๐ฎ๐ฟ๐ป ๐๐น๐ผ๐๐ฑ ๐๐ผ๐บ๐ฝ๐๐๐ถ๐ป๐ด ๐ฎ๐ป๐ฑ ๐๐ฒ๐๐ข๐ฝ๐ ๐ณ๐ผ๐ฟ ๐๐ฅ๐๐ ๐๐ถ๐๐ต ๐๐ผ๐ผ๐ด๐น๐ฒ ๐๐น๐ผ๐๐ฑ๐ฅ
๐ Break into Cloud Computing & DevOps with Google Cloud โ Absolutely FREE!๐ฅ
Want to become a Cloud Architect, DevOps Engineer, or simply understand cloud systems better?๐จโ๐ป
๐๐ข๐ง๐ค๐:-
https://techurl.in/iucvS
Develop the skills employers are looking forโ
๐ Break into Cloud Computing & DevOps with Google Cloud โ Absolutely FREE!๐ฅ
Want to become a Cloud Architect, DevOps Engineer, or simply understand cloud systems better?๐จโ๐ป
๐๐ข๐ง๐ค๐:-
https://techurl.in/iucvS
Develop the skills employers are looking forโ
Qualcomm fixes three Adreno GPU zero-days exploited in attacks
Qualcomm has released security patches for three zero-day vulnerabilities in the Adreno Graphics Processing Unit (GPU) driver that impact dozens of chipsets and are actively exploited in targeted attacks.
Sergiu Gatlan | bleepingcomputerโ.com โข Jun 2, 2025
๐ก t.me/zerotrusthackers
Qualcomm has released security patches for three zero-day vulnerabilities in the Adreno Graphics Processing Unit (GPU) driver that impact dozens of chipsets and are actively exploited in targeted attacks.
Sergiu Gatlan | bleepingcomputerโ.com โข Jun 2, 2025
๐ก t.me/zerotrusthackers
โRussian Marketโ emerges as a go-to shop for stolen credentials
The "Russian Market" cybercrime marketplace has emerged as one of the most popular platforms for buying and selling credentials stolen by information stealer malware.
Bill Toulas | bleepingcomputerโ.com โข Jun 2, 2025
๐ก t.me/zerotrusthackers
The "Russian Market" cybercrime marketplace has emerged as one of the most popular platforms for buying and selling credentials stolen by information stealer malware.
Bill Toulas | bleepingcomputerโ.com โข Jun 2, 2025
๐ก t.me/zerotrusthackers
Fake DocuSign, Gitcode Sites Spread NetSupport RAT via Multi-Stage PowerShell Attack
Fake Gitcode and DocuSign sites are tricking users into running PowerShell scripts that install NetSupport RAT.
The Hacker News | thehackernewsโ.com โข Jun 3, 2025
๐ก t.me/zerotrusthackers
Fake Gitcode and DocuSign sites are tricking users into running PowerShell scripts that install NetSupport RAT.
The Hacker News | thehackernewsโ.com โข Jun 3, 2025
๐ก t.me/zerotrusthackers
โค1
Stop Blurring Your Sensitive Information in Screenshots
Want to hide parts of a screenshot that contain personal info, such as ๐ณ number? Thatโs a good idea, but you should stop using tools that pixelate, blur, or use other effects like swirls to hide this infoโitโs almost like baiting strangers into trying to see whatโs been redacted.
Unredacter can easily reveal text hidden using crude effects such as pixelation. Itโs a free tool available for anyone to use, and itโs been created to generate awareness about the dangers of sharing poorly hidden text in screenshots.
The next time you want to share a screenshot online, use better tools to hide your personal data. The safest tool for most people is solid color blocks. You can quickly draw a solid color rectangle over sensitive information to make it almost impossible to decipher. On Windows and Mac, any free image editor can do it.
๐ก t.me/zerotrusthackers
Want to hide parts of a screenshot that contain personal info, such as ๐ณ number? Thatโs a good idea, but you should stop using tools that pixelate, blur, or use other effects like swirls to hide this infoโitโs almost like baiting strangers into trying to see whatโs been redacted.
Unredacter can easily reveal text hidden using crude effects such as pixelation. Itโs a free tool available for anyone to use, and itโs been created to generate awareness about the dangers of sharing poorly hidden text in screenshots.
The next time you want to share a screenshot online, use better tools to hide your personal data. The safest tool for most people is solid color blocks. You can quickly draw a solid color rectangle over sensitive information to make it almost impossible to decipher. On Windows and Mac, any free image editor can do it.
๐ก t.me/zerotrusthackers
โค3