feeds

by zer0x0ne — on

cover-image

some of my favourite websites: portswigger almost secure dark reading packet storm xkcd



xkcd

Retrieved title: xkcd.com, 5 item(s)
Proof Without Content

Chemical Formula

Early Arthropods

Double-Pronged Extension Cord

Rapid7 Blog

Retrieved title: Rapid7 Cybersecurity Blog , 5 item(s)
Critical Ivanti Endpoint Manager Mobile (EPMM) zero-day exploited in the wild (CVE-2026-1281 & CVE-2026-1340)

Patch Tuesday and the Enduring Challenge of Windows’ Backwards Compatibility

Multiple Critical SolarWinds Web Help Desk Vulnerabilities: CVE-2025-40551, CVE-2025-40552, CVE-2025-40553, CVE-2025-40554

Threat Actors Using AWS WorkMail in Phishing Campaigns

The End of the Road for Cisco Kenna: Take a Measured Path into Exposure Management

The Hacker News

Retrieved title: The Hacker News, 5 item(s)
Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

Badges, Bytes and Blackmail

Ex-Google Engineer Convicted for Stealing 2,000 AI Trade Secrets for China Startup

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

Almost Secure

Retrieved title: Almost Secure, 5 item(s)
Backdoors in VStarcam cameras

Analysis of PPPP “encryption”

Unpacking VStarcam firmware for fun and profit

An overview of the PPPP protocol for IoT cameras

A look at a P2P camera (LookCam app)

Dark Reading

Retrieved title: darkreading, 5 item(s)
Chinese APTs Hacking Asian Orgs With High-End Malware

Trump Administration Rescinds Biden-Era Software Guidance

Second Round of Critical RCE Bugs in n8n Spikes Corporate Risk

'Semantic Chaining' Jailbreak Dupes Gemini Nano Banana, Grok 4

From Quantum to AI Risks: Preparing for Cybersecurity's Future

BREAKDEV

Retrieved title: BREAKDEV, 5 item(s)
Evilginx Pro 4.3 - Event Notifications & Proxies Overhaul

Evilginx Pro 4.2 - Anti-phishing evasions and more!

Evilginx Pro is finally here!

Evilginx 3.3 - Go & Phish

Evilginx Pro - The Future of Phishing