Cybersecurity News & Threat Intel Feed

  • Alright everyone this is the place to post and discus any news related to hacking.
  1. To Google or not to Google that is the question?
5 Likes

Thanks for starting this thread.

5 Likes

Check this out:

1 Like

Hi everybody beware of new apache vulnerability it gives a remote control go check it out

1 Like

@Al0ne https://thehackernews.com/2019/04/apache-tomcat-security-flaw.html

2 Likes

https://mrcybersecurity.blogspot.com/2019/04/security-flaws-in-wpa3-protocol-let.html
Wpa3 security is vulnerable ?

1 Like

After reading this article we can say that “YES” it is vulnerable.
2 Likes
  • My heart goes out to all the victims in Sri Lanka. I’m very upset to hear there was a warning of the bombings 10 days before it happened. No precautions were taken and that is a shame. On top of everything they have taken social media sites from the people of Sri Lanka which is the main way Sri Lankans get the news and stay in contact with loved ones.
2 Likes

Condolences. May god give people the power to overcome this time of distress and disaster. May people recover from this huge loss quickly and start a new life once again. May god shower his blessings upon them. May god fulfil their needs. Today let’s come together and pray for the people of Sri Lanka who needs us in their time of need. God bless them all.

3 Likes
  • THE SPY’S DO NOT LIKE BEING SPIED ON
2 Likes

I have moved this to a different area sorry :slight_smile:

2 Likes
1 Like
1 Like
1 Like

I am not sure what it is exactly and how to use it.
If you understand this, then enlighten me

I am sure it’s really important.

This Metasploit module uses the su binary present on rooted devices to run a payload as root. A rooted Android device will contain a su binary (often linked with an application) that allows the user to run commands as root. This module will use the su binary to execute a command stager as root. The command stager will write a payload binary to a temporary directory, make it executable, execute it in the background, and finally delete the executable. On most devices the su binary will pop-up a prompt on the device asking the user for permission.

1 Like

The “latest hacking news” podcast is really cool. It’s a daily short podcast about the latest news from the hacking scene.

1 Like
1 Like
1 Like
1 Like