mstdn.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A general-purpose Mastodon server with a 500 character limit. All languages are welcome.

Administered by:

Server stats:

16K
active users

#zeroday

20 posts18 participants3 posts today
Christoph Schmees<p>Notfall-Update Google Chrome</p><p>Ja, ich weiß, ich hatte mal versprochen, über Google Chrome und seine (teils konzeptionellen) Sicherheitslücken nicht mehr zu berichten. Heute mache ich eine Ausnahme, weil wahrscheinlich auch Chromium und seine Weiterentwicklungen (Brave, Cromite, Opera, Vivaldi) betroffen sind. In Chro</p><p><a href="https://www.pc-fluesterer.info/wordpress/2025/03/27/notfall-update-google-chrome-2/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pc-fluesterer.info/wordpress/2</span><span class="invisible">025/03/27/notfall-update-google-chrome-2/</span></a></p><p><a href="https://social.tchncs.de/tags/Empfehlung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Empfehlung</span></a> <a href="https://social.tchncs.de/tags/Hintergrund" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hintergrund</span></a> <a href="https://social.tchncs.de/tags/Warnung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Warnung</span></a> <a href="https://social.tchncs.de/tags/0day" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>0day</span></a> <a href="https://social.tchncs.de/tags/browser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>browser</span></a> <a href="https://social.tchncs.de/tags/chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>chrome</span></a> <a href="https://social.tchncs.de/tags/google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>google</span></a> <a href="https://social.tchncs.de/tags/sicherheit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sicherheit</span></a> <a href="https://social.tchncs.de/tags/windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>windows</span></a> <a href="https://social.tchncs.de/tags/zeroday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zeroday</span></a></p>
Scripter :verified_flashing:<p>Zero-Day Alert: Google Releases Chrome Patch for Exploit Used in Russian Espionage Attacks<br><a href="https://thehackernews.com/2025/03/zero-day-alert-google-releases-chrome.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/03/zero</span><span class="invisible">-day-alert-google-releases-chrome.html</span></a> <a href="https://social.tchncs.de/tags/Webbrowser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Webbrowser</span></a> <a href="https://social.tchncs.de/tags/Browser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Browser</span></a> <a href="https://social.tchncs.de/tags/Chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chrome</span></a> <a href="https://social.tchncs.de/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZeroDay</span></a></p>
Opalsec :verified:<p>Hey <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> pros! 👋 Ready to dive into the latest threats and breaches making headlines? </p><p>Our latest blog post is packed with need-to-know info to keep you ahead of the curve. </p><p>🗞️ <a href="https://opalsec.io/daily-news-update-thursday-march-27-2025-australia-melbourne/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">opalsec.io/daily-news-update-t</span><span class="invisible">hursday-march-27-2025-australia-melbourne/</span></a></p><p>Here's a quick rundown of what's inside:</p><p>🕵️‍♂️ FamousSparrow's Return: The Chinese government-backed hacking group is back, targeting organizations in North America. Important distinction: ESET insists on tracking them separately from Salt Typhoon. Remember to prioritize TTPs and IOCs/IOAs accordingly!</p><p>🗄️ RedCurl's Ransomware Twist: This corporate espionage group is now deploying "QWCrypt" ransomware, targeting Hyper-V servers. Phishing emails with malicious IMG attachments are the initial attack vector.</p><p>😬 StreamElements Data Breach: A third-party service provider suffered a breach, exposing data of 210,000 customers.!</p><p>🏛️ NSW Court System Data Theft: Sensitive documents, including AVOs, were stolen from the NSW Online Registry website. This could have serious consequences for victims of domestic violence.</p><p>👨‍🎓 NYU Website Defacement: A hacker compromised NYU's website, leaking personal data of over 1 million students. Even with good intentions, the collateral damage is unacceptable.</p><p>💰 Defense Contractor Fined: MORSE Corp will pay millions for failing to meet federal cybersecurity requirements. Third-party risk management is crucial!</p><p>🤖 Atlantis AIO Automates Credential Stuffing: This new platform automates credential stuffing attacks against 140 online services. Stay vigilant against brute force attacks!</p><p>🚨 Chrome Zero-Day Exploited: Google patched a zero-day vulnerability exploited in espionage campaigns targeting Russian organizations. Keep your browsers updated!</p><p>👦 UK Warns of 'Com Networks': The UK's NCA is warning of a growing threat from online networks of teenage boys who are "dedicated to inflicting harm and committing a range of criminality." A very worrying trend that we need to be aware of.</p><p>Ready for the full scoop? Read the full blog post here 👉 <a href="https://opalsec.io/daily-news-update-thursday-march-27-2025-australia-melbourne/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">opalsec.io/daily-news-update-t</span><span class="invisible">hursday-march-27-2025-australia-melbourne/</span></a> </p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/DataBreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataBreach</span></a> <a href="https://infosec.exchange/tags/Ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ransomware</span></a> <a href="https://infosec.exchange/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://infosec.exchange/tags/DataPrivacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataPrivacy</span></a> <a href="https://infosec.exchange/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZeroDay</span></a> <a href="https://infosec.exchange/tags/FamousSparrow" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FamousSparrow</span></a> <a href="https://infosec.exchange/tags/RedCurl" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RedCurl</span></a> <a href="https://infosec.exchange/tags/StreamElements" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>StreamElements</span></a> <a href="https://infosec.exchange/tags/NSWCourts" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NSWCourts</span></a> <a href="https://infosec.exchange/tags/NYU" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NYU</span></a> <a href="https://infosec.exchange/tags/MORSECorp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MORSECorp</span></a> <a href="https://infosec.exchange/tags/AtlantisAIO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AtlantisAIO</span></a> <a href="https://infosec.exchange/tags/Chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chrome</span></a> <a href="https://infosec.exchange/tags/ComNetworks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ComNetworks</span></a> <a href="https://infosec.exchange/tags/SecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityNews</span></a> <a href="https://infosec.exchange/tags/CybersecurityThreats" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CybersecurityThreats</span></a> <a href="https://infosec.exchange/tags/InfoSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSecurity</span></a> <a href="https://infosec.exchange/tags/CyberAttack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberAttack</span></a> <a href="https://infosec.exchange/tags/DataSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataSecurity</span></a> <a href="https://infosec.exchange/tags/PrivacyMatters" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PrivacyMatters</span></a> <a href="https://infosec.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a> <a href="https://infosec.exchange/tags/Cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybercrime</span></a> <a href="https://infosec.exchange/tags/ThreatActor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatActor</span></a> <a href="https://infosec.exchange/tags/ESET" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ESET</span></a> <a href="https://infosec.exchange/tags/SaltTyphoon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SaltTyphoon</span></a> <a href="https://infosec.exchange/tags/NIST" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NIST</span></a> <a href="https://infosec.exchange/tags/ZeroTrust" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZeroTrust</span></a> <a href="https://infosec.exchange/tags/SaltTyphoon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SaltTyphoon</span></a> <a href="https://infosec.exchange/tags/CriticalInfrastructure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CriticalInfrastructure</span></a></p>
Sam Stepanyan :verified: 🐘<p><a href="https://infosec.exchange/tags/Chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chrome</span></a>: Google Patches Chrome Sandbox Escape <a href="https://infosec.exchange/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZeroDay</span></a> Caught by Kaspersky. CVE-2025-278</p><p>You need to close and re-start your Chrome today to get it updated to the latest out-of-band security patch.</p><p><a href="https://www.securityweek.com/google-patches-chrome-sandbox-escape-zero-day-caught-by-kaspersky/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/google-patche</span><span class="invisible">s-chrome-sandbox-escape-zero-day-caught-by-kaspersky/</span></a></p>
Cyber Kendra :verified:<p>Kaspersky Uncovers New Chrome 0-Day Actively Exploited<br><a href="https://www.cyberkendra.com/2025/03/kaspersky-uncovers-new-chrome-0-day.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cyberkendra.com/2025/03/kasper</span><span class="invisible">sky-uncovers-new-chrome-0-day.html</span></a><br><a href="https://techhub.social/tags/google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>google</span></a> <a href="https://techhub.social/tags/update" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>update</span></a> <a href="https://techhub.social/tags/zeroday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zeroday</span></a> <a href="https://techhub.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://techhub.social/tags/0day" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>0day</span></a></p>
AAKL<p>Cisco has tagged medDream for a zero-day report <a href="https://talosintelligence.com/vulnerability_info" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">talosintelligence.com/vulnerab</span><span class="invisible">ility_info</span></a> <span class="h-card" translate="no"><a href="https://mstdn.social/@TalosSecurity" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>TalosSecurity</span></a></span> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/zeroday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zeroday</span></a></p>
Panethos<p><strong>Best TV/Streaming dramas of the 1st quarter of&nbsp;2025</strong></p> <strong>Severance</strong> – Source: nytimes.com <ol><li><strong><em>Severance</em> (Seasons 1-2) – Apple+</strong> – if this show doesn’t will every award possible, it will be a crime against art and humanity!</li></ol><p>2. <em><strong>The Diplomat</strong></em> (Season 2) – Netflix</p><p>3. <em><strong>Silo</strong></em> (Season 2) – Apple+</p><p>4. <em><strong>The Night Agent</strong></em> (Season 2) – Netflix</p><p>5. <em><strong>Zero Day</strong></em> (Season 1) – Netflix</p><p>6. <em><strong>Prime Target</strong></em> (Season 1) – Apple+</p> Source: droidjournal.com <p>With Season 6 of <em>The Handmaid’s Tal</em>e coming out on Hulu in April, as well as Season 3 of <em>The Diplomat</em> (Netflix) and Season 5 of <em>Slow Horses</em> (Apple+) due to be released this year, the drama competition will be intense. Peace!</p> Source: epicdope.com <p><a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://panethos.wordpress.com/tag/acting/" target="_blank">#acting</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://panethos.wordpress.com/tag/art/" target="_blank">#art</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://panethos.wordpress.com/tag/drama/" target="_blank">#drama</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://panethos.wordpress.com/tag/night-agent/" target="_blank">#NightAgent</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://panethos.wordpress.com/tag/prime-target/" target="_blank">#PrimeTarget</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://panethos.wordpress.com/tag/severance/" target="_blank">#Severance</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://panethos.wordpress.com/tag/silo/" target="_blank">#Silo</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://panethos.wordpress.com/tag/streaming/" target="_blank">#streaming</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://panethos.wordpress.com/tag/television/" target="_blank">#television</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://panethos.wordpress.com/tag/the-diplomat/" target="_blank">#TheDiplomat</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://panethos.wordpress.com/tag/tv/" target="_blank">#TV</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://panethos.wordpress.com/tag/zero-day/" target="_blank">#ZeroDay</a></p>
Murat Timur<p>Hello dear followers,</p><p>My new article was published in Tech Magazine. Critical Warning to Chrome Users Update Now!</p><p>You can visit our website for the details of the news.</p><p><a href="https://www.techdergi.net/google-chrome-sifir-gun-rusya-siber-saldiri" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">techdergi.net/google-chrome-si</span><span class="invisible">fir-gun-rusya-siber-saldiri</span></a></p><p><a href="https://mastodon.social/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a><br><a href="https://mastodon.social/tags/Chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chrome</span></a><br><a href="https://mastodon.social/tags/Russia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Russia</span></a><br><a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a><br><a href="https://mastodon.social/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZeroDay</span></a><br><a href="https://mastodon.social/tags/Technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Technology</span></a><br><a href="https://mastodon.social/tags/News" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>News</span></a></p>
Enrico "meldrian" Michaelis<p>Moin zusammen,</p><p>nutzt hier jemand <a href="https://social.tchncs.de/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a> <a href="https://social.tchncs.de/tags/Chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chrome</span></a> als <a href="https://social.tchncs.de/tags/Browser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Browser</span></a>?</p><p>Update. <br>Jetzt.</p><p>Für Interessierte die es noch nicht auf dem Schirm haben: "CVE-2025-2783". <br>Viel Spaß beim nachblättern. </p><p>Für alle anderen gilt:<br>Update.<br>Jetzt.</p><p><a href="https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0641" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">wid.cert-bund.de/portal/wid/se</span><span class="invisible">curityadvisory?name=WID-SEC-2025-0641</span></a></p><p>Viel Erfolg.</p><p><a href="https://social.tchncs.de/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZeroDay</span></a> <a href="https://social.tchncs.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.tchncs.de/tags/GoogleChrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GoogleChrome</span></a> <a href="https://social.tchncs.de/tags/Sicherheit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheit</span></a> <a href="https://social.tchncs.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a></p>
OTX Bot<p>Operation ForumTroll exploits zero-days in Google Chrome</p><p>In March 2025, a sophisticated malware campaign exploited a zero-day vulnerability in Google Chrome to infect targets. The attack, dubbed Operation ForumTroll, used personalized phishing emails with short-lived links to deliver malware. Kaspersky detected the exploit, reported it to Google, and an update was released to fix the vulnerability (CVE-2025-2783). The campaign targeted media outlets, educational institutions, and government organizations in Russia, disguising itself as invitations to the 'Primakov Readings' forum. The attackers' goal appears to be espionage, and the sophistication of the malware suggests a state-sponsored APT group is behind the operation. The exploit chain involved sandbox escape and remote code execution, though only the former was fully analyzed.</p><p>Pulse ID: 67e33790837554926530dc06<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/67e33790837554926530dc06" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/67e33</span><span class="invisible">790837554926530dc06</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-03-25 23:09:04</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/Chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chrome</span></a> <a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/ELF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ELF</span></a> <a href="https://social.raytec.co/tags/Education" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Education</span></a> <a href="https://social.raytec.co/tags/Email" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Email</span></a> <a href="https://social.raytec.co/tags/Espionage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Espionage</span></a> <a href="https://social.raytec.co/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a> <a href="https://social.raytec.co/tags/Government" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Government</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/Kaspersky" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kaspersky</span></a> <a href="https://social.raytec.co/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a> <a href="https://social.raytec.co/tags/RAT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RAT</span></a> <a href="https://social.raytec.co/tags/RemoteCodeExecution" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RemoteCodeExecution</span></a> <a href="https://social.raytec.co/tags/Russia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Russia</span></a> <a href="https://social.raytec.co/tags/Troll" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Troll</span></a> <a href="https://social.raytec.co/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a> <a href="https://social.raytec.co/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZeroDay</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AlienVault</span></a></p>
Joaquim Homrighausen<p>Time to update Chrome 🕵️ 🔒 </p><p><a href="https://thehackernews.com/2025/03/zero-day-alert-google-releases-chrome.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/03/zero</span><span class="invisible">-day-alert-google-releases-chrome.html</span></a></p><p><a href="https://mastodon.online/tags/chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>chrome</span></a> <a href="https://mastodon.online/tags/browser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>browser</span></a> <a href="https://mastodon.online/tags/webbrowser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webbrowser</span></a> <a href="https://mastodon.online/tags/cybersec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersec</span></a> <a href="https://mastodon.online/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.online/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.online/tags/zeroday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zeroday</span></a> <a href="https://mastodon.online/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a></p>
Pyrzout :vm:<p>Zero-Day Alert: Google Releases Chrome Patch for Exploit Used in Russian Espionage Attacks – Source:thehackernews.com <a href="https://ciso2ciso.com/zero-day-alert-google-releases-chrome-patch-for-exploit-used-in-russian-espionage-attacks-sourcethehackernews-com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/zero-day-alert-g</span><span class="invisible">oogle-releases-chrome-patch-for-exploit-used-in-russian-espionage-attacks-sourcethehackernews-com/</span></a> <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/TheHackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TheHackerNews</span></a> <a href="https://social.skynetcloud.site/tags/zeroday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zeroday</span></a></p>
Opalsec :verified:<p>Hey Cyber Security Pros! 👋</p><p>Ready to dive into the latest security updates and breaches that should be on your radar? We've got you covered.</p><p>🗞️ <a href="https://opalsec.io/daily-news-update-wednesday-march-26-2025-australia-melbourne/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">opalsec.io/daily-news-update-w</span><span class="invisible">ednesday-march-26-2025-australia-melbourne/</span></a></p><p>At a high level, here are the main stories:</p><p>- EncryptHub's Zero-Day Exploits: Trend Micro links EncryptHub (a.k.a. Water Gamayun) to attacks leveraging a Microsoft Management Console (MMC) zero-day vulnerability (CVE-2025-26633). Discover how they're bypassing Windows protections and deploying various payloads.</p><p>- Windows NTLM Hash Leak Zero-Day: A new zero-day flaw allows remote attackers to steal NTLM credentials. Learn how this vulnerability affects all Windows versions and how 0Patch is providing unofficial fixes. Don't forget about those older, unpatched vulnerabilities too!</p><p>- HaveIBeenPwned Gets Phished: Even security experts aren't immune! Troy Hunt shares his experience of a sophisticated Mailchimp phishing attack. Lessons learned on OTP security and the importance of monitoring password manager behavior.</p><p>- Oracle Breach Controversy: Customers are confirming the legitimacy of leaked data despite Oracle Cloud's denial. Could this lead to supply chain and ransomware attacks? Ensure you're rotating those SSO and LDAP credentials and enforcing strong MFA!</p><p>- Astral Foods Cyberattack: South Africa's largest chicken producer faced a $1 million loss due to a recent cyberattack.</p><p>- Android Malware Evolution: New Android malware is using .NET MAUI to evade detection. Learn how it's disguising itself and targeting users in China and India.</p><p>- CS2 Phishing Attacks: Browser-in-the-Browser attacks are targeting Counter-Strike 2 players' Steam accounts. </p><p>- VMware Tools Vulnerability: Broadcom warns of an authentication bypass vulnerability in VMware Tools for Windows. Update those systems ASAP!</p><p>- CrushFTP Unauthenticated Access Flaw: CrushFTP warns users to patch an unauthenticated HTTP(S) port access vulnerability.</p><p>- Kubernetes IngressNightmare: Wiz researchers uncovered critical vulnerabilities in Ingress-Nginx Controller that could lead to complete cluster takeovers.</p><p>- Trump Officials' Signal SNAFU: High-profile officials accidentally shared classified Yemen airstrike plans in a Signal group with a journalist.</p><p>- FCC Investigates Huawei: The FCC is scrutinizing Chinese manufacturers for circumventing US regulations.</p><p>- Privacy-Boosting Tech: A new report suggests governments should prioritize privacy-enhancing technologies to prevent breaches.</p><p>Check out the full blog post 👉 <a href="https://opalsec.io/daily-news-update-wednesday-march-26-2025-australia-melbourne/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">opalsec.io/daily-news-update-w</span><span class="invisible">ednesday-march-26-2025-australia-melbourne/</span></a></p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/securitybreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securitybreach</span></a> <a href="https://infosec.exchange/tags/zeroday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zeroday</span></a> <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudsecurity</span></a> <a href="https://infosec.exchange/tags/vulnerabilitymanagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilitymanagement</span></a> <a href="https://infosec.exchange/tags/kubernetes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kubernetes</span></a> <a href="https://infosec.exchange/tags/dataprotection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataprotection</span></a> <a href="https://infosec.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> <a href="https://infosec.exchange/tags/NTLM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NTLM</span></a> <a href="https://infosec.exchange/tags/EncryptHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EncryptHub</span></a> <a href="https://infosec.exchange/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a> <a href="https://infosec.exchange/tags/Android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Android</span></a> <a href="https://infosec.exchange/tags/VMware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VMware</span></a> <a href="https://infosec.exchange/tags/CrushFTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CrushFTP</span></a> <a href="https://infosec.exchange/tags/Kubernetes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kubernetes</span></a> <a href="https://infosec.exchange/tags/HaveIBeenPwned" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HaveIBeenPwned</span></a> <a href="https://infosec.exchange/tags/Oracle" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Oracle</span></a> <a href="https://infosec.exchange/tags/Signal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Signal</span></a> <a href="https://infosec.exchange/tags/CounterStrike" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CounterStrike</span></a> <a href="https://infosec.exchange/tags/cyberattack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberattack</span></a> <a href="https://infosec.exchange/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a></p>
OTX Bot<p>CVE-2025-26633: How Water Gamayun Weaponizes MUIPath using MSC EvilTwin</p><p>Trend Research uncovered a campaign by the Russian threat actor Water Gamayun that exploits a zero-day vulnerability in the Microsoft Management Console framework to execute malicious code, named MSC EvilTwin (CVE-2025-26633).</p><p>Pulse ID: 67e31bb008959a0b0a250d43<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/67e31bb008959a0b0a250d43" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/67e31</span><span class="invisible">bb008959a0b0a250d43</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-03-25 21:10:08</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/Russia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Russia</span></a> <a href="https://social.raytec.co/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a> <a href="https://social.raytec.co/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZeroDay</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AlienVault</span></a></p>
OTX Bot<p>Active Zero-Day Campaign Vulnerability In Windows MMC Is Exploited</p><p>A zero-day vulnerability in Microsoft Management Console (MMC) has been<br>patched.</p><p>Pulse ID: 67e319a12c5015dd9cd963c4<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/67e319a12c5015dd9cd963c4" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/67e31</span><span class="invisible">9a12c5015dd9cd963c4</span></a> <br>Pulse Author: cryptocti<br>Created: 2025-03-25 21:01:21</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a> <a href="https://social.raytec.co/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a> <a href="https://social.raytec.co/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZeroDay</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/cryptocti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptocti</span></a></p>
Pyrzout :vm:<p>Russian Firm Offers $4 Million for Telegram Exploits – Source: www.securityweek.com <a href="https://ciso2ciso.com/russian-firm-offers-4-million-for-telegram-exploits-source-www-securityweek-com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/russian-firm-off</span><span class="invisible">ers-4-million-for-telegram-exploits-source-www-securityweek-com/</span></a> <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a> <a href="https://social.skynetcloud.site/tags/securityweekcom" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityweekcom</span></a> <a href="https://social.skynetcloud.site/tags/OperationZero" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OperationZero</span></a> <a href="https://social.skynetcloud.site/tags/securityweek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityweek</span></a> <a href="https://social.skynetcloud.site/tags/Telegram" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Telegram</span></a> <a href="https://social.skynetcloud.site/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> <a href="https://social.skynetcloud.site/tags/zeroday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zeroday</span></a></p>
Pyrzout :vm:<p>Russian Firm Offers $4 Million for Telegram Exploits <a href="https://www.securityweek.com/russian-firm-offers-4-million-for-telegram-exploits/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/russian-firm-</span><span class="invisible">offers-4-million-for-telegram-exploits/</span></a> <a href="https://social.skynetcloud.site/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerabilities</span></a> <a href="https://social.skynetcloud.site/tags/OperationZero" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OperationZero</span></a> <a href="https://social.skynetcloud.site/tags/Telegram" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Telegram</span></a> <a href="https://social.skynetcloud.site/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> <a href="https://social.skynetcloud.site/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZeroDay</span></a></p>
Pyrzout :vm:<p>Russian Firm Offers $4 Million for Telegram Exploits <a href="https://www.securityweek.com/russian-firm-offers-4-million-for-telegram-exploits/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/russian-firm-</span><span class="invisible">offers-4-million-for-telegram-exploits/</span></a> <a href="https://social.skynetcloud.site/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerabilities</span></a> <a href="https://social.skynetcloud.site/tags/OperationZero" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OperationZero</span></a> <a href="https://social.skynetcloud.site/tags/Telegram" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Telegram</span></a> <a href="https://social.skynetcloud.site/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> <a href="https://social.skynetcloud.site/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZeroDay</span></a></p>
Pyrzout :vm:<p>Zero-day broker Operation Zero offers up to $4 million for Telegram exploits – Source: securityaffairs.com <a href="https://ciso2ciso.com/zero-day-broker-operation-zero-offers-up-to-4-million-for-telegram-exploits-source-securityaffairs-com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/zero-day-broker-</span><span class="invisible">operation-zero-offers-up-to-4-million-for-telegram-exploits-source-securityaffairs-com/</span></a> <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/informationsecuritynews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecuritynews</span></a> <a href="https://social.skynetcloud.site/tags/ITInformationSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITInformationSecurity</span></a> <a href="https://social.skynetcloud.site/tags/SecurityAffairscom" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityAffairscom</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/SecurityAffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityAffairs</span></a> <a href="https://social.skynetcloud.site/tags/SecurityAffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityAffairs</span></a> <a href="https://social.skynetcloud.site/tags/OperationZero" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OperationZero</span></a> <a href="https://social.skynetcloud.site/tags/BreakingNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BreakingNews</span></a> <a href="https://social.skynetcloud.site/tags/SecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/hackingnews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hackingnews</span></a> <a href="https://social.skynetcloud.site/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.skynetcloud.site/tags/Telegram" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Telegram</span></a> <a href="https://social.skynetcloud.site/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://social.skynetcloud.site/tags/zeroday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zeroday</span></a> <a href="https://social.skynetcloud.site/tags/Mobile" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mobile</span></a></p>
The New Oil<p>Russian <a href="https://mastodon.thenewoil.org/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZeroDay</span></a> seller is offering up to $4 million for <a href="https://mastodon.thenewoil.org/tags/Telegram" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Telegram</span></a> exploits</p><p><a href="https://techcrunch.com/2025/03/21/russian-zero-day-seller-is-offering-up-to-4-million-for-telegram-exploits/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2025/03/21/russ</span><span class="invisible">ian-zero-day-seller-is-offering-up-to-4-million-for-telegram-exploits/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/Russia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Russia</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/0Day" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>0Day</span></a></p>