www.youtube.com/watch?v=X3mp...
@tresronours
I'm mainly known on LinkedIn for covering cyber security topics, but I've been banned couple of times by their AI, therefore, I should exist on other platforms as well ! @tresronours on twitter alexandre-blanc-cyber-security-88569022 on linkedin
Your electricity bill is going up because data centers are raising demand, not because your utility started scaling out some renewables. Pass it on.
Acting for good, at all scale and any scale is the only thing that matters.
Bill C-2 is anti-privacy, anti-rights, and anti-Canadian! We need your voice to stop it. β Tell our leaders to scrap this dangerous bill NOW! #StopBillC2 @OpenMediaOrg openmedia.org/Stop-BillC2-bsky
Fun one for a Monday morning :
Pico-mac-nano Fits Working Macintosh on Barbieβs Desk !
hackaday.com/2025/05/26/p...
Threat actors start by publishing legitimate packages to build trust, then
π Dozens of malicious packages on NPM collect host and network data
These malicious packages collect :
βΆοΈHostname
βΆοΈInternal IP address
βΆοΈUser home directory
βΆοΈCurrent working directory
βΆοΈUsername
βΆοΈSystem DNS servers
Better keep a close eye on your AD if you have at least one 2025 domain controller !
Unpatched Windows Server vulnerability allows full domain compromise
connected=hacked #windows #AD #windows2025
www.helpnetsecurity.com/2025/05/22/u...
A theoretical model for deep-space coms using high-powered laser signals that exploit relativistic and gravitational phenomena named "The Great Loopback" has been verified by chatGPT.
The Theorem explores laser overcoming classical spacetime constraints.
www.thecomputerdudesinc.com/index.php
It's only a matter of time and effort to hack systems. Pwn20wn is interesting in this, reminding that everything can be hacked.
Security is about to reduce the likelihood of an incident, but nothing is bullet proof.
connected=hacked
gbhackers.com/vmware-esxi-...
Printer Company Distributes Malicious Drivers Infected with XRed Malware
Procolored initially dismissed the antivirus alerts as false positives but removed the downloads from their website around May 8, 2025, after persistent concerns.
They have since provided clean software packages.
New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads
Multi-stage infection chain that begins with a deceptive PDF document titled βPay Adjustment.β This document lures victims into downloading a malicious ZIP file hosted on Netlify, a popular web hosting platform.
A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign embedded within the seemingly innocuous package os-info-checker-es6. First published on March 19, 2025, with initial versions appearing benign, the package rapidly evolved into a complex threat.
gbhackers.com/critical-wor...
A serious security flaw affecting the Eventin plugin, a popular event management solution for WordPress, was recently discovered by Denver Jackson, a member of the Patchstack Alliance community.
You can go for opensense, pfsense, and many other options, it can run on small PCs with 2 network cards, or in virtual machines if you have the setup.
Just don't keep outdated EOL firewalls and routers !
connected=hacked
#cybersecurity
thehackernews.com/2025/05/brea...
The bigger an organization is, the bigger the challenge is to protect data.
π¬ Ascension says recent data breach affects over 430,000 patients
Zero day, third party vulnerable tools, and lack of visibility on complex tech stack kind of make it challenging to assess the impact.
connected=hacked
Hopefully you keep your apple stuff patched, because worms love to exploit Apple !
Especially wirelessly (made up word), especially without user interaction.
connected=hacked
#cybersecurity #apple #airplay
www.bleepingcomputer.com/news/securit...
With AI, you don't need much to hack the system, you just have to talk like a care salesman, and it will give it all !
Hopefully you run your local private GenAI stack, so as you limit the exposure of it. Yet, when hosting your own instance, be aware of the models you use. #cybersecurity #AI
It makes sense to see more exploit targeting enterprise, as this is where transnational criminal organizations actually can take money.
π‘ This is a good reminder for organization to make sure they keep their enterprise solutions patched, with best security practices in place.
#cybersecurity
What a revolution ! Staging just got invented...or maybe it was already there and this is just more BS by repackaging good practice in whipped cream ?
#cybersecurity
www.darkreading.com/endpoint-sec...
It's almost like a backdoor π
A critical remote code execution (RCE) vulnerability has been discovered in Cisco products using Erlang/OTP's SSH server.
π― The flaw, with a CVSS score of 10.0, allows unauthenticated attackers to execute arbitrary code on vulnerable devices.
#cybersecurity #cisco
π§ Researchers have demonstrated a PoC rootkit dubbed Curing that leverages a Linux asynchronous I/O mechanism called io_uring to bypass traditional system call monitoring.
βοΈ ARMO's analysis highlights the need for better detection mechanisms to address the vulnerabilities posed by io_uring.
It's #zyxel patch time !
#cybersecurity
gbhackers.com/zyxel-releas...
They finally patched it
βMicrosoft has resolved a known issue causing Remote Desktop sessions to freeze on Windows Server 2025 and Windows 11 24H2 devices.
#microsoft #RDP
www.bleepingcomputer.com/news/microso...
β‘οΈ A sophisticated malware campaign targets Docker, exploiting its popularity as a frequently attacked service.
πͺ€ The campaign uses intricate obfuscation techniques to conceal malicious payload within Python scripts, making it difficult for analysts to detect and reverse-engineer.
#cybersecurity
I mean, who calls a product "AiCloud" and not expect it to leak as hell ! π€£ π
β οΈ ASUS Confirms Critical Flaw in AiCloud Routers; Users Urged to Update Firmware
Patch it ! (see if you can rename this, likelihood of breach is highly reduced without Ai and Cloud in the product)
#cybersecurity #asus
β οΈ Immediate patching to the latest version is recommended, along with monitoring for unauthorized access attempts and implementing additional security measures.
connected=hacked
#cybersecurity #ivanti
gbhackers.com/hackers-expl...
β οΈ Removing the packages does not eliminate the threat, as inserted SSH keys grant remote access for subsequent code execution and data exfiltration.
connected=hacked
#cybersecurity
thehackernews.com/2025/04/rogu...
This is an obvious point, but cannot overstated. There is an enormous difference between deporting someone - where they get off a plane as a free citizen in their home country AND FUNNELING THEM INTO A BRUTAL PRISON FROM WHICH THEY HAVE NO CHANCE OF EVER EMERGING!!!
Your local LLM may not have all the latest hype, but has no time restrictions !
β οΈ Claude copies ChatGPT with $200 Max plan, but users aren't happy
"However, Claude Max limits users to 50 sessions per month. A session is a 5-hour period that starts when you send your first message to Claude."