๐ด ๐ง๐ผ๐ฝ ๐๐ฟ๐ฒ๐ฒ ๐๐ฎ๐๐ฎ ๐ฆ๐ฐ๐ถ๐ฒ๐ป๐ฐ๐ฒ ๐๐ผ๐๐ฟ๐๐ฒ๐ ๐ณ๐ฟ๐ผ๐บ ๐๐ฎ๐ฟ๐๐ฎ๐ฟ๐ฑ, ๐ ๐๐ง & ๐ฆ๐๐ฎ๐ป๐ณ๐ผ๐ฟ๐ฑ ๐ฅ
๐ Learn Data Science for Free from the Worldโs Best Universities๐
Top institutions like Harvard, MIT, and Stanford are offering world-class data science courses online โ and theyโre 100% free. ๐ฏ๐
๐๐ข๐ง๐ค๐:-
https://techurl.in/pSkcy
All The Best ๐
๐ Learn Data Science for Free from the Worldโs Best Universities๐
Top institutions like Harvard, MIT, and Stanford are offering world-class data science courses online โ and theyโre 100% free. ๐ฏ๐
๐๐ข๐ง๐ค๐:-
https://techurl.in/pSkcy
All The Best ๐
โค1
Fake Recruiter Emails Target CFOs Using Legit NetBird Tool Across
Plug-and-play phishing kits like Haozi drive global scams, bypass MFA, and lower attacker skill bar.
The Hacker News | thehackernewsโ.com โข Jun 2, 2025
๐ก t.me/zerotrusthackers
Plug-and-play phishing kits like Haozi drive global scams, bypass MFA, and lower attacker skill bar.
The Hacker News | thehackernewsโ.com โข Jun 2, 2025
๐ก t.me/zerotrusthackers
The Secret Defense Strategy of Four Critical Industries Combating Advanced Cyber Threats
NDR helps detect stealthy threats, protect legacy systems, and meet compliance in critical industries.
The Hacker News | thehackernewsโ.com โข Jun 2, 2025
๐ก t.me/zerotrusthackers
NDR helps detect stealthy threats, protect legacy systems, and meet compliance in critical industries.
The Hacker News | thehackernewsโ.com โข Jun 2, 2025
๐ก t.me/zerotrusthackers
Top Companies Hiring Security Specialists ๐ก
Apply Links:- ๐
Access Softek :- https://techurl.in/OSlKO
Inspectiv :- https://techurl.in/RrAjx
Sporty Group :- https://techurl.in/UDqcs
XM :- https://techurl.in/WzwcX
Other Jobs :- https://t.me/jobsourceglobal
Apply before deadline ๐ซ
Apply Links:- ๐
Access Softek :- https://techurl.in/OSlKO
Inspectiv :- https://techurl.in/RrAjx
Sporty Group :- https://techurl.in/UDqcs
XM :- https://techurl.in/WzwcX
Other Jobs :- https://t.me/jobsourceglobal
Apply before deadline ๐ซ
๐๐ฒ๐ฎ๐ฟ๐ป ๐๐น๐ผ๐๐ฑ ๐๐ผ๐บ๐ฝ๐๐๐ถ๐ป๐ด ๐ฎ๐ป๐ฑ ๐๐ฒ๐๐ข๐ฝ๐ ๐ณ๐ผ๐ฟ ๐๐ฅ๐๐ ๐๐ถ๐๐ต ๐๐ผ๐ผ๐ด๐น๐ฒ ๐๐น๐ผ๐๐ฑ๐ฅ
๐ Break into Cloud Computing & DevOps with Google Cloud โ Absolutely FREE!๐ฅ
Want to become a Cloud Architect, DevOps Engineer, or simply understand cloud systems better?๐จโ๐ป
๐๐ข๐ง๐ค๐:-
https://techurl.in/iucvS
Develop the skills employers are looking forโ
๐ Break into Cloud Computing & DevOps with Google Cloud โ Absolutely FREE!๐ฅ
Want to become a Cloud Architect, DevOps Engineer, or simply understand cloud systems better?๐จโ๐ป
๐๐ข๐ง๐ค๐:-
https://techurl.in/iucvS
Develop the skills employers are looking forโ
Qualcomm fixes three Adreno GPU zero-days exploited in attacks
Qualcomm has released security patches for three zero-day vulnerabilities in the Adreno Graphics Processing Unit (GPU) driver that impact dozens of chipsets and are actively exploited in targeted attacks.
Sergiu Gatlan | bleepingcomputerโ.com โข Jun 2, 2025
๐ก t.me/zerotrusthackers
Qualcomm has released security patches for three zero-day vulnerabilities in the Adreno Graphics Processing Unit (GPU) driver that impact dozens of chipsets and are actively exploited in targeted attacks.
Sergiu Gatlan | bleepingcomputerโ.com โข Jun 2, 2025
๐ก t.me/zerotrusthackers
โRussian Marketโ emerges as a go-to shop for stolen credentials
The "Russian Market" cybercrime marketplace has emerged as one of the most popular platforms for buying and selling credentials stolen by information stealer malware.
Bill Toulas | bleepingcomputerโ.com โข Jun 2, 2025
๐ก t.me/zerotrusthackers
The "Russian Market" cybercrime marketplace has emerged as one of the most popular platforms for buying and selling credentials stolen by information stealer malware.
Bill Toulas | bleepingcomputerโ.com โข Jun 2, 2025
๐ก t.me/zerotrusthackers
Fake DocuSign, Gitcode Sites Spread NetSupport RAT via Multi-Stage PowerShell Attack
Fake Gitcode and DocuSign sites are tricking users into running PowerShell scripts that install NetSupport RAT.
The Hacker News | thehackernewsโ.com โข Jun 3, 2025
๐ก t.me/zerotrusthackers
Fake Gitcode and DocuSign sites are tricking users into running PowerShell scripts that install NetSupport RAT.
The Hacker News | thehackernewsโ.com โข Jun 3, 2025
๐ก t.me/zerotrusthackers
โค1
Stop Blurring Your Sensitive Information in Screenshots
Want to hide parts of a screenshot that contain personal info, such as ๐ณ number? Thatโs a good idea, but you should stop using tools that pixelate, blur, or use other effects like swirls to hide this infoโitโs almost like baiting strangers into trying to see whatโs been redacted.
Unredacter can easily reveal text hidden using crude effects such as pixelation. Itโs a free tool available for anyone to use, and itโs been created to generate awareness about the dangers of sharing poorly hidden text in screenshots.
The next time you want to share a screenshot online, use better tools to hide your personal data. The safest tool for most people is solid color blocks. You can quickly draw a solid color rectangle over sensitive information to make it almost impossible to decipher. On Windows and Mac, any free image editor can do it.
๐ก t.me/zerotrusthackers
Want to hide parts of a screenshot that contain personal info, such as ๐ณ number? Thatโs a good idea, but you should stop using tools that pixelate, blur, or use other effects like swirls to hide this infoโitโs almost like baiting strangers into trying to see whatโs been redacted.
Unredacter can easily reveal text hidden using crude effects such as pixelation. Itโs a free tool available for anyone to use, and itโs been created to generate awareness about the dangers of sharing poorly hidden text in screenshots.
The next time you want to share a screenshot online, use better tools to hide your personal data. The safest tool for most people is solid color blocks. You can quickly draw a solid color rectangle over sensitive information to make it almost impossible to decipher. On Windows and Mac, any free image editor can do it.
๐ก t.me/zerotrusthackers
โค3
๐จ Over 700 downloads of multiple malicious Chrome extensions are stealing banking data from Brazilians and 70+ companies.
Phishing emails disguised as invoices install spyware targeting Banco do Brasil.๐จ Over 700 downloads of multiple malicious Chrome extensions are stealing banking data from Brazilians and 70+ companies.
Phishing emails disguised as invoices install spyware targeting Banco do Brasil.
๐ก t.me/zerotrusthackers
Phishing emails disguised as invoices install spyware targeting Banco do Brasil.๐จ Over 700 downloads of multiple malicious Chrome extensions are stealing banking data from Brazilians and 70+ companies.
Phishing emails disguised as invoices install spyware targeting Banco do Brasil.
๐ก t.me/zerotrusthackers
โค1
New Mirai botnet infect TBK DVR devices via command injection flaw
A new variant of the Mirai malware botnet is exploiting a command injection vulnerability in TBK DVR-4104 and DVR-4216 digital video recording devices to hijack them.
Bill Toulas | bleepingcomputerโ.com โข Jun 8, 2025
๐ก t.me/zerotrusthackers
A new variant of the Mirai malware botnet is exploiting a command injection vulnerability in TBK DVR-4104 and DVR-4216 digital video recording devices to hijack them.
Bill Toulas | bleepingcomputerโ.com โข Jun 8, 2025
๐ก t.me/zerotrusthackers
OpenAI Bans ChatGPT Accounts Used by Russian, Iranian and Chinese Hacker Groups
OpenAI banned ChatGPT accounts tied to Russian, Chinese, and Iranian hackers using AI for malware and influence campaigns.
The Hacker News | thehackernewsโ.com โข Jun 9, 2025
๐ก t.me/zerotrusthackers
OpenAI banned ChatGPT accounts tied to Russian, Chinese, and Iranian hackers using AI for malware and influence campaigns.
The Hacker News | thehackernewsโ.com โข Jun 9, 2025
๐ก t.me/zerotrusthackers
9th June | ๐ฅทBug Bounty Write-Ups
Multiple CVEs in Infoblox NetMRI: RCE, Auth Bypass, SQLi, and File Read Vulnerabilities
https://rhinosecuritylabs.com/research/infoblox-multiple-cves/
Cyber Security Updates Here: Daily Posts at Your Comfort
https://t.me/zerotrusthackers
Poison everywhere: No output from your MCP server is safe
https://www.cyberark.com/resources/threat-research-blog/poison-everywhere-no-output-from-your-mcp-server-is-safe
Roundcube โค 1.6.10 Post-Auth RCE via PHP Object Deserialization [CVE-2025-49113]
https://fearsoff.org/research/roundcube
The Ultimate Guide to JWT Vulnerabilities and Attacks (with Exploitation Examples)
https://pentesterlab.com/blog/jwt-vulnerabilities-attacks-guide
Weaponizing Dependabot: Pwn Request at its finest
https://boostsecurity.io/blog/weaponizing-dependabot-pwn-request-at-its-finest
Cobalt Pentester Spotlight - Egidio Romano
https://www.cobalt.io/blog/cobalt-pentester-spotlight-egidio-romano
arete | Fuzzing WebSockets for Server-Side Vulnerabilities
https://arete06.com/posts/fuzzing-ws/
Daily Cyber Security Updates Here:
https://t.me/zerotrusthackers
WhatsApp Channel:
https://whatsapp.com/channel/0029VaxVv551iUxRku094918
Multiple CVEs in Infoblox NetMRI: RCE, Auth Bypass, SQLi, and File Read Vulnerabilities
https://rhinosecuritylabs.com/research/infoblox-multiple-cves/
Cyber Security Updates Here: Daily Posts at Your Comfort
https://t.me/zerotrusthackers
Poison everywhere: No output from your MCP server is safe
https://www.cyberark.com/resources/threat-research-blog/poison-everywhere-no-output-from-your-mcp-server-is-safe
Roundcube โค 1.6.10 Post-Auth RCE via PHP Object Deserialization [CVE-2025-49113]
https://fearsoff.org/research/roundcube
The Ultimate Guide to JWT Vulnerabilities and Attacks (with Exploitation Examples)
https://pentesterlab.com/blog/jwt-vulnerabilities-attacks-guide
Weaponizing Dependabot: Pwn Request at its finest
https://boostsecurity.io/blog/weaponizing-dependabot-pwn-request-at-its-finest
Cobalt Pentester Spotlight - Egidio Romano
https://www.cobalt.io/blog/cobalt-pentester-spotlight-egidio-romano
arete | Fuzzing WebSockets for Server-Side Vulnerabilities
https://arete06.com/posts/fuzzing-ws/
Daily Cyber Security Updates Here:
https://t.me/zerotrusthackers
WhatsApp Channel:
https://whatsapp.com/channel/0029VaxVv551iUxRku094918
32 Advance Search Engine For Hacker
1. www.shodan.io/ (IoT device search engine)
2. censys.io/ (Internet asset discovery platform)
3. www.zoomeye.org/ (Cyberspace search engine for devices)
4. www.greynoise.io/ (Internet noise and threat intelligence)
5. www.onyphe.io/ (Cyber defense search engine)
6. www.binaryedge.io/ (Threat intelligence data platform)
7. www.fofa.info/ (Cyberspace asset mapping engine)
8. leakix.net/ (Information leaks search engine)
9. www.criminalip.io/ (Asset inventory and risk assessment)
10. www.netlas.io/ (Attack surface discovery platform)
11. www.dehashed.com/ (Leaked credentials search engine)
12. securitytrails.com/ (DNS and domain data platform)
13. www.dorksearch.com/ (Google dorking search tool)
14. www.exploit-db.com/ (Exploit and vulnerability archive)
15. pulsedive.com/ (Threat intelligence search engine)
16. grayhatwarfare.com/ (Public S3 buckets search engine)
17. polyswarm.io/ (Threat detection marketplace)
18. urlscan.io/ (Website and URL scanning service)
19. vulners.com/ (Vulnerability database and search engine)
20. archive.org/web/ (Historical web page archive)
21. crt.sh/ (Certificate transparency search engine)
22. wigle.net/ (Wireless network mapping platform)
23. publicwww.com/ (Source code search engine)
24. hunter.io/ (Email address finder tool)
25. intelx.io/ (OSINT and data breach search)
26. grep.app/ (Code search engine for GitHub)
27. www.packetstomsecurity.com/ (Security tools and resources)
28. searchcode.com/ (Source code and API search engine)
29. www.dnsdb.info/ (Historical DNS data search)
30. fullhunt.io/ (Attack surface discovery platform)
31. www.virustotal.com/ (Malware analysis and file scanning)
32. dnsdumpster.com/ (DNS recon and research tool)
Top Hackers Tools๐
https://t.me/zerotrusthackers/47
Cyber Security & Ethical Hacking Courses๐
https://t.me/zerotrusthackers/41
More Resources Here
https://whatsapp.com/channel/0029VaxVv551iUxRku094918
โก๏ธ Give 100+ Reactions for More Such Content ๐ค
1. www.shodan.io/ (IoT device search engine)
2. censys.io/ (Internet asset discovery platform)
3. www.zoomeye.org/ (Cyberspace search engine for devices)
4. www.greynoise.io/ (Internet noise and threat intelligence)
5. www.onyphe.io/ (Cyber defense search engine)
6. www.binaryedge.io/ (Threat intelligence data platform)
7. www.fofa.info/ (Cyberspace asset mapping engine)
8. leakix.net/ (Information leaks search engine)
9. www.criminalip.io/ (Asset inventory and risk assessment)
10. www.netlas.io/ (Attack surface discovery platform)
11. www.dehashed.com/ (Leaked credentials search engine)
12. securitytrails.com/ (DNS and domain data platform)
13. www.dorksearch.com/ (Google dorking search tool)
14. www.exploit-db.com/ (Exploit and vulnerability archive)
15. pulsedive.com/ (Threat intelligence search engine)
16. grayhatwarfare.com/ (Public S3 buckets search engine)
17. polyswarm.io/ (Threat detection marketplace)
18. urlscan.io/ (Website and URL scanning service)
19. vulners.com/ (Vulnerability database and search engine)
20. archive.org/web/ (Historical web page archive)
21. crt.sh/ (Certificate transparency search engine)
22. wigle.net/ (Wireless network mapping platform)
23. publicwww.com/ (Source code search engine)
24. hunter.io/ (Email address finder tool)
25. intelx.io/ (OSINT and data breach search)
26. grep.app/ (Code search engine for GitHub)
27. www.packetstomsecurity.com/ (Security tools and resources)
28. searchcode.com/ (Source code and API search engine)
29. www.dnsdb.info/ (Historical DNS data search)
30. fullhunt.io/ (Attack surface discovery platform)
31. www.virustotal.com/ (Malware analysis and file scanning)
32. dnsdumpster.com/ (DNS recon and research tool)
Top Hackers Tools๐
https://t.me/zerotrusthackers/47
Cyber Security & Ethical Hacking Courses๐
https://t.me/zerotrusthackers/41
More Resources Here
https://whatsapp.com/channel/0029VaxVv551iUxRku094918
โก๏ธ Give 100+ Reactions for More Such Content ๐ค
๐1
๐๐๐จ๐จ๐ฌ๐ญ ๐๐จ๐ฎ๐ซ ๐๐๐ซ๐๐๐ซ ๐ฐ๐ข๐ญ๐ก ๐๐ข๐๐ซ๐จ๐ฌ๐จ๐๐ญโ๐ฌ ๐
๐ซ๐๐ ๐๐จ๐ฎ๐ซ๐ฌ๐๐ฌ!
๐ก Learn directly from industry leaders at Microsoft and LinkedIn Learning and gain in-demand skills to elevate your careerโall without spending a dime!
๐๐ข๐ง๐ค๐:-
https://tinyurl.com/nheyanxr
๐ Donโt miss this chance to build your skills, earn certifications, and get job-readyโall for free. Your journey in data analytics begins now!
๐ Start Learning Today!
๐ก Learn directly from industry leaders at Microsoft and LinkedIn Learning and gain in-demand skills to elevate your careerโall without spending a dime!
๐๐ข๐ง๐ค๐:-
https://tinyurl.com/nheyanxr
๐ Donโt miss this chance to build your skills, earn certifications, and get job-readyโall for free. Your journey in data analytics begins now!
๐ Start Learning Today!
New Secure Boot flaw lets attackers install bootkit malware, patch now
Security researchers have disclosed a new Secure Boot bypass tracked as CVE-2025-3052 that can be used to turn off security on PCs and servers and install bootkit malware.
Lawrence Abrams | bleepingcomputerโ.com โข Jun 10, 2025
๐ก t.me/zerotrusthackers
Security researchers have disclosed a new Secure Boot bypass tracked as CVE-2025-3052 that can be used to turn off security on PCs and servers and install bootkit malware.
Lawrence Abrams | bleepingcomputerโ.com โข Jun 10, 2025
๐ก t.me/zerotrusthackers
Forwarded from Free Courses: Google | Microsoft | Udemy | Coursera | IBM | NVIDIA | LinkedIn Learning | MIT | Udemy Coupons & PDF Books
8 Free AI Courses by Google
๐ Google is offering 8 amazing AI coursesโperfect for beginners and pros! Whether you're curious about machine learning or want to sharpen your AI skills, these courses are a golden opportunity.
๐ก No cost, no catchโjust pure knowledge from one of the biggest names in tech.
๐๐ข๐ง๐ค๐
https://techurl.in/iOhWh
โ Donโt miss out on this chance to boost your career or explore a new field
๐ Google is offering 8 amazing AI coursesโperfect for beginners and pros! Whether you're curious about machine learning or want to sharpen your AI skills, these courses are a golden opportunity.
๐ก No cost, no catchโjust pure knowledge from one of the biggest names in tech.
๐๐ข๐ง๐ค๐
https://techurl.in/iOhWh
โ Donโt miss out on this chance to boost your career or explore a new field
โค1