B33tl3juic3

33.4K posts

B33tl3juic3 banner
B33tl3juic3

B33tl3juic3

@fprado28

@hacknotcrime advocate - hacker news, Information security news. Security professional, Musician, father, skateboarder. Old School. In security since 1988...

loading....................... Katılım Nisan 2009
1.1K Takip Edilen1.3K Takipçiler
B33tl3juic3 retweetledi
The Hacker News
The Hacker News@TheHackersNews·
🚨 Coruna turns a 2023 #iOS espionage exploit into a broader attack kit. Kaspersky confirms it reuses and evolves the Triangulation kernel exploit, now updated for newer chips and iOS versions and still actively maintained. Now bundled into 23 exploits across 5 chains and used beyond targeted ops, it shows #iPhone exploitation is scaling. 🔗 How Coruna evolved and is being deployed → thehackernews.com/2026/03/coruna…
The Hacker News tweet media
English
1
23
59
8.8K
B33tl3juic3 retweetledi
The Hacker News
The Hacker News@TheHackersNews·
🚨 WARNING - A new #iOS exploit kit, DarkSword, has been active since late 2025 across multiple threat groups. It targets #iPhone on iOS 18.4–18.7, chaining zero-days to gain full access and rapidly extract data—files, messages, credentials, and crypto wallets—then wipe traces within minutes. 🔗 DarkSword details here → thehackernews.com/2026/03/darksw…
The Hacker News tweet media
English
10
175
505
274.3K
B33tl3juic3 retweetledi
The Hacker News
The Hacker News@TheHackersNews·
🔥 54 EDR killers now use BYOVD, abusing 34 signed drivers to reach kernel access. Ransomware operators deploy them first to disable defenses, not evade detection inside the encryptor. Evasion has moved out—into dedicated tools built to break EDR reliably. 🔗 Tools, tactics, and defensive gaps explained → thehackernews.com/2026/03/54-edr…
The Hacker News tweet media
English
5
33
86
11.9K
B33tl3juic3 retweetledi
Cyber Security News
Cyber Security News@The_Cyber_News·
⚠️ CISA Urges Securing Microsoft Intune Following Stryker Breach Source: cybersecuritynews.com/secure-microso… CISA has issued an urgent alert urging organizations to harden their endpoint management system configurations following a cyberattack on Stryker Corporation, a U.S.-based medical technology firm, on March 11, 2026. The cyberattack against Stryker Corporation highlights a growing trend of threat actors targeting endpoint management platforms, particularly Microsoft Intune, to gain privileged access across enterprise environments. In response to the breach, CISA is urging all organizations to implement Microsoft’s newly released best practices for securing Microsoft Intune. #cybersecuritynews
Cyber Security News tweet media
English
10
121
362
37K
Gilmar Mendes
Gilmar Mendes@gilmarmendes·
A exposição pública de conversas de cunho estritamente privado, desvinculadas de qualquer ilicitude, constitui uma gravíssima violação ao direito à intimidade e uma demonstração de barbárie institucional que transgride todos os limites impostos pelas leis e pela Constituição. Na semana em que se comemora o Dia Internacional da Mulher, parece ainda mais grave a divulgação de tais diálogos, denotando a urgência de refletir sobre como a intimidade feminina é, historicamente, o alvo preferencial de tentativas de desmoralização e controle. Ao permitir a publicação de diálogos íntimos de um casal, o Estado e seus agentes não apenas falham em seu dever de guarda, mas desrespeitam a legislação, que impõe categoricamente a inutilização de trechos que não interessam à persecução penal. Esse cenário evidencia a necessidade inadiável da aprovação da LGPD Penal, garantindo que o tratamento de dados na esfera criminal não seja subvertido em ferramenta de opressão. Ao transformar o que deveria ser uma investigação técnica em um espetáculo e em um verdadeiro ato de linchamento moral, o sistema incorre em nítida afronta à dignidade humana e aos direitos fundamentais. g1.globo.com/politica/blog/…
Português
11.5K
1.1K
8.5K
1.7M
B33tl3juic3 retweetledi
Cyber Security News
Cyber Security News@The_Cyber_News·
⚠️ Ubuntu Desktop Systems Vulnerability Enables Attackers to Gain Full Root Access Source: cybersecuritynews.com/ubuntu-desktop… A Local Privilege Escalation (LPE) vulnerability in default installations of Ubuntu Desktop 24.04 and later allows an unprivileged local attacker to gain full root access. Tracked as CVE-2026-3888, the flaw exploits an unintended interaction between two standard system components, snap-confine and systemd-tmpfiles, making it particularly dangerous given how deeply both are embedded in default Ubuntu deployments. Snapd is Ubuntu's background service that manages snap packages, self-contained application bundles with their own dependencies. #cybersecuritynews #Ubuntu
Cyber Security News tweet media
English
45
258
903
54.7K
B33tl3juic3 retweetledi
The Hacker News
The Hacker News@TheHackersNews·
⚠️ CERT/CC warns a ZIP flaw tracked as CVE-2026-0866 lets attackers hide malware using malformed archive headers. Security tools trust the header and miss the payload, while it can still be extracted and executed with the right method. It breaks how AV and EDR validate files. 🔗 How Zombie ZIP bypasses detection and runs payloads → #zip-evasion-technique" target="_blank" rel="nofollow noopener">thehackernews.com/2026/03/threat…
The Hacker News tweet media
English
3
48
133
13.9K
B33tl3juic3 retweetledi
The Hacker News
The Hacker News@TheHackersNews·
⚠️ WARNING - An unpatched critical telnetd bug (CVE-2026-32746) lets attackers gain full system access with no credentials. One connection to port 23 is enough to trigger memory corruption and execute code as root. No patch yet. Prior telnet flaw is already exploited in the wild. 🔗Read → thehackernews.com/2026/03/critic…
The Hacker News tweet media
English
61
335
1.4K
213.6K
B33tl3juic3
B33tl3juic3@fprado28·
@lindberghfarias Kkkkkk.. vc cospe na cara dos brasileiros … beira o ridículo … vc julga que todo mundo é petista e acredita nos seu relinches kkkkkkk… fala sério …
Português
0
0
0
3
Lindbergh Farias
Lindbergh Farias@lindberghfarias·
Não caia em fake news! O preço do diesel está 60% mais barato no Brasil em relação ao exterior. O preço do petróleo está acima de 100 dólares o barril no mercado internacional. Se o PPI de Bolsonaro ainda estivesse em vigor, o diesel estaria R$ 2,18 por litro mais caro. O presidente Lula tomou medidas efetivas para evitar o aumento abusivo nos postos e isentou PIS Cofins para importação e comercialização do diesel. Enquanto Bolsonaro privatizou a BR Distribuidora e atacou nossa soberania energética, Lula trabalha pelo povo para impedir a escalada dos preços Compartilhe a verdade!
Português
2.2K
1.6K
4.2K
117.8K
B33tl3juic3 retweetledi
The Hacker News
The Hacker News@TheHackersNews·
⚠️ A newly tracked threat cluster is quietly breaching critical infrastructure across Asia. Unit 42 says attackers exploit web servers, plant web shells, and dump credentials with tools like Mimikatz to move across networks in aviation, energy, and government sectors. 🔗 Read → thehackernews.com/2026/03/web-se…
The Hacker News tweet media
English
7
30
85
17.5K
B33tl3juic3 retweetledi
The Hacker News
The Hacker News@TheHackersNews·
🛑 Two Chrome extensions turned malicious after an ownership transfer. Researchers say QuickLens (7,000 users) now strips security headers and pulls remote code every 5 minutes. The payload executes via hidden elements, leaving no malicious code in the extension source. 🔗 Read → thehackernews.com/2026/03/chrome…
The Hacker News tweet media
English
6
104
287
74.4K
B33tl3juic3 retweetledi
Hacking Articles
Hacking Articles@hackinarticles·
🛰️ Nmap For Pentester – GitHub Cheatsheet 🔥 Telegram: t.me/hackinarticles A practical Nmap reference guide designed for Red Teamers, Bug Bounty Hunters, and Penetration Testers to quickly perform network reconnaissance, enumeration, and vulnerability discovery. ⚡ Topics Covered: 📡 Host Discovery 📊 Output Format Scan 🧠 Understanding Nmap Packet Trace ⏱️ Nmap Scan with Timing Parameters 🧪 Nmap Scans using Hex Value of Flags 🕵️ Forensic Investigation of Nmap Scan using Wireshark ⏳ Nmap for Pentester: Timing Scan 📡 Nmap for Pentester: Ping Scan 🚪 Nmap for Pentester: Port Status 🚨 How to Detect Nmap Scan Using Snort 🛡️ Understanding Guide to Nmap Firewall Scan (Part 2) 🛡️ Understanding Guide to Nmap Firewall Scan (Part 1) 📦 Understanding Nmap Scan with Wireshark 🔐 Password Cracking using Nmap 💥 Vulnerability Scan 🌐 Network Scanning using NMAP (Beginner Guide) 🗄️ MSSQL Penetration Testing using Nmap 🗄️ MySQL Penetration Testing with Nmap 🎯 Useful for CTF players, pentesters, and security researchers looking for a structured Nmap learning and reference resource. 🔗 GitHub Repository: github.com/Ignitetechnolo… #CyberSecurity #Pentesting #Nmap #RedTeam #InfoSec #HackingArticles 🚀
Hacking Articles tweet media
English
0
47
182
6.9K
B33tl3juic3 retweetledi
Cyber Security News
Cyber Security News@The_Cyber_News·
🛡️ Argus – Python-powered Toolkit for Information Gathering and Reconnaissance Source: cybersecuritynews.com/argus-python-t… Argus is a comprehensive Python-based toolkit designed for reconnaissance tasks in cybersecurity. The developers recently released version 2.0, expanding it to include 135 modules. This tool consolidates network analysis, web app scanning, and threat intelligence into one interface. Users access modules through an interactive CLI that supports searching, favorites, and batch runs. Network and infrastructure modules cover DNS records, open ports, SSL chain analysis, and traceroute from 1 to 52. #cybersecuritynews
Cyber Security News tweet media
English
3
73
334
13.8K
B33tl3juic3 retweetledi
Dark Web Informer
Dark Web Informer@DarkWebInformer·
💥 MITRE ATT&CK Explorer was updated with the following: Added Relationship cross-linking in modals, Data Sources tab (empty currently), ATT&CK Navigator-style heatmap, Global cross-section search, Comparison mode, and Platform filter on techniques This will be available for everyone for free, later this month. Currently Elite only: darkwebinformer.com/mitre-att-ck-e…
Dark Web Informer tweet media
English
2
37
190
13.3K
B33tl3juic3 retweetledi
Cyber Security News
Cyber Security News@The_Cyber_News·
🚨 Hackers Allegedly Selling Exploit for Windows Remote Desktop Services 0-Day Flaw Source: cybersecuritynews.com/windows-remote… A threat actor identified is allegedly selling a zero-day exploit for a Windows Remote Desktop Services privilege escalation vulnerability, tracked as CVE-2026-21533, for a staggering $220,000 on a dark web forum. This highly priced exploit targets improper privilege management to grant attackers local administrative control. While CVE-2026-21533 was initially published by Microsoft in February 2026, the availability of a functional, weaponized exploit presents a severe risk to enterprise environments. #cybersecuritynews
Cyber Security News tweet media
English
8
68
218
12.5K
B33tl3juic3 retweetledi
Cyber Security News
Cyber Security News@The_Cyber_News·
🛡️ Windows 11 23H2 to 25H2 Upgrade Allegedly Breaking Internet Connectivity Source: cybersecuritynews.com/windows-11-23h… A persistent bug in Windows 11 in-place upgrades is reportedly wiping critical 802.1X wired authentication configurations, leaving enterprise workstations completely offline until manual intervention is performed. During an in-place Windows 11 upgrade, the contents of the C:\Windows\dot3svc\Policies folder that stores 802.1X wired network (LAN) authentication profiles applied via Group Policy are silently deleted. #windows11 #cybersecuritynews
Cyber Security News tweet media
English
13
104
261
18.5K
B33tl3juic3 retweetledi
Alex Xu
Alex Xu@alexxubyte·
Top 4 API Gateway Use Cases
Alex Xu tweet media
English
3
53
268
10.3K