saʿā

757 posts

saʿā banner
saʿā

saʿā

@kutekle

Katılım Mayıs 2020
457 Takip Edilen21 Takipçiler
saʿā
saʿā@kutekle·
@korraflow I don’t know, they scammed themself, who tf even rent the tate
English
0
0
1
1.8K
Korra
Korra@korraflow·
🚨 BREAKING: CRYPTO CASINO SCAMMED BY FAKE ANDREW TATE IMPERSONATOR They thought they were hiring the real Andrew Tate to deal blackjack for a special event, but the streaming agency they hired sent an impersonator. The owner of the casino announced the scam over Discord.
Korra tweet media
English
277
1.1K
18.6K
1.5M
saʿā
saʿā@kutekle·
@nexta_tv proves again that style cannot be bought, wtf is he even wearing 😂
English
0
0
7
601
NEXTA
NEXTA@nexta_tv·
💸 Son of Iran’s former ambassador to Venezuela shows off luxury lifestyle He is widely identified as Sasha Sobhani, known for flaunting a lavish lifestyle on social media, including luxury cars, jets, and high-end travel. Meanwhile, millions of Iranians struggle to survive under the bloody regime built by the parents of these privileged rich kids.
English
42
134
614
99.9K
Alex Kabari
Alex Kabari@alexblac_ink·
@Dexerto 6 months in prison, and a five-year employment ban is wild. How do they expect him to feed and pay his bills without a job for 5 years?
English
10
0
0
5.8K
Dexerto
Dexerto@Dexerto·
Johnny Somali will be going to a specialized labor prison where his phones will be confiscated, and he will receive offender status Because of the nature of his crimes, the court ordered a five-year employment ban at institutions related to children
Dexerto tweet mediaDexerto tweet media
English
150
595
12.6K
389.8K
saʿā
saʿā@kutekle·
@vxdb for a one-time payment and something you use daily, is it really that crazy?
English
0
0
0
212
vxdb
vxdb@vxdb·
$60 for a browser is crazy
vxdb tweet media
English
230
9
424
1.3M
International Cyber Digest
International Cyber Digest@IntCyberDigest·
❗️ WhatsApp moved status updates to the Chats tab in the latest beta, bringing ads closer to where users spend most of their time. Likely a push to make advertising more viable.
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
16
42
324
28.1K
International Cyber Digest
International Cyber Digest@IntCyberDigest·
🚨 BREAKING: The FBI has successfully extracted deleted Signal messages from a suspect's iPhone via notification storage, the place where all your notifications are stored for up to one month. Notification storage stores data from all messaging apps, it's a big flaw in iOS. But there's a way to turn it off...
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
464
4.7K
24.9K
6.2M
International Cyber Digest
International Cyber Digest@IntCyberDigest·
‼️ A BreachForums administrator has allegedly been identified — caught using his real IP and reusing the same passwords across his criminal persona and business accounts. Meet Angel Tsvetkov AKA N/A: a Bulgarian cybersecurity specialist, penetration tester and bug bounty researcher known for responsibly disclosing vulnerabilities in major global platforms.
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
48
169
1.3K
162.7K
Karun Kaushik
Karun Kaushik@karunkaushik_·
There’s been a lot of allegations against Delve. But we haven’t been able to share our side of the story until today due to ongoing cybersecurity and forensics investigations. Maintaining customer trust is central to everything we do. That said, we grew too fast and fell short of our own standard. To our customers, we deeply apologize for the inconveniences caused. We take these allegations seriously and have made changes: a new auditor network, free re-audits and pentests for all customers, enhanced transparency in audit communications, and more. However, we also want to set the record straight on the anonymous attacks. The evidence we have points to a targeted cyberattack from a malicious actor, not a “whistleblower.” We believe the attacker purchased Delve under false pretenses, exfiltrated internal company data, and used it to launch a coordinated smear campaign. The posts rely on a mix of fabricated claims, cherry-picked screenshots, and stolen data taken out of context. See the link in the comments for more details. Delve was built to modernize compliance. We are not going anywhere and are committed to building what's next.
English
801
48
1.3K
4.8M
flux
flux@0xfluxsec·
As I teased earlier - I used Claude Code to (near enough) autonomously develop an exploit for a known vulnerable driver. Claude did it with no hesitation - from triage to exploit. As you can see, it was successful in privilege escalation. Read what I found below! This is a long read - but I hope you find it useful and an interesting topic to debate. As a background, through the last week I used GPT-5.4 to analyse a known vulnerable driver to identify any opportunities to exploit. I have already documented my process in detail (check my recent posts for context if you wish) - in short I connected it to an MCP in IDA Pro for GPT to find the vulnerability. It did it. I then asked it to develop an exploit but it refused, I had to write an exploit myself which I did, as a POC that it had found the vuln. The vulnerability in question is an arbitrary physical memory read & memory write - a super critical bug. There was one limiting factor to this, the driver was limited to only 32-bits of physical address, which covers up to 4 GB of physical RAM. On modern systems with 8+ GB RAM, EPROCESS structures for important processes (including System, PID 4) are typically allocated well above the 4 GiB boundary. The driver simply cannot address them. This is also where my knowledge starts breaking down; I'm not a well versed kernel exploit dev and there is always more to learn with low level security. So, I'm going to quote Claude here: But VirtualAlloc + VirtualLock has a key property: the physical pages backing locked user-space memory are guaranteed to be resident (non-pageable), and on x64 Windows with typical RAM configurations, user-mode allocations frequently land in low physical memory because the user-mode VA range starts from the bottom of the address space, and early allocations map to low physical pages. More precisely: you don't need the physical address to be below 4 GiB for EPROCESS — you need the payload to be below 4 GiB. The write primitive lets you write from a physical address into a kernel VA. ---- To the point before we return to Claude, I asked Claude to exploit the driver. Recall GPT refused.. well.. Claude to my (un)surprise, did not! Fantastic! For context I purchased the £20 p/m plan, and had to buy extra tokens also. So, off it went - I had to go back and forth over the course of several days to get the exploit working as 3 prompts.. YES THREE PROMPTS.. was enough to hit my cap.........!? But that aside, I did not have to guide it, only pass it what the console printed in my VM and the occasional crash dump when I hit a Blue Screen. Many iterations and £40 later, I tested it (this morning) and VIOLA, it managed to exploit the driver to get NT AUTHORITY\SYSTEM, the highest privilege level available in user mode. So back to the technical topic, as mentioned, the difficulty was that we only had a 32-bit register to use in order to overwrite critical structures in memory to elevate our privilege. Claude came up with the following strategy: 1. VirtualAlloc + VirtualLock a page in your own process — this pins it in physical RAM 2. Write your payload (the SYSTEM token value) into that page 3. Find the physical address of that page by scanning physical RAM for a sentinel you wrote alongside the payload 4. Use the write primitive: memmove(target_kernel_va, your_physical_page, 8) — this copies 8 bytes from your user page's physical address into the kernel VA of the target's EPROCESS.Token The user-mode page is virtually always sub-4GiB in physical address because Windows allocates low physical pages to user processes first (high memory is preferred for kernel use). Even if it weren't guaranteed, you'd just retry until you get a sub-4GiB physical page. One critical safety measure: you must exclude MMIO regions from the scan. Certain physical address ranges are memory-mapped I/O — reading them via MmMapIoSpace can trigger hardware side effects or cause an IRQL_NOT_LESS_OR_EQUAL BSOD. The registry CM_RESOURCE_LIST gives you the actual RAM ranges, so you scan only those. Early iterations that scanned the full 4 GiB range BSODed immediately upon hitting MMIO. I will include some screenshots in this post showing its thought process. ---- On to the code that it wrote, I (of course) asked it to write the exploit in Rust. Now, the code it wrote is 923 lines, kinda gross, lots of sweeping unsafe code, but I cannot fault the results. It provided good comments, descriptive code, and good problem solving. I don't really have much else to say on this point, good robot. ---- Now, this driver was abused by ransomware gangs for spreading their ransomware by elevating privilege and executing arbitrary code. Thankfully now - this driver is on the blocklist so I don't mind sharing the POC (I will leave a link in the comments to the code it created). For my own ethical sanity, from the horses mouth: "These vulnerabilities have been patched by both Paragon Software, and vulnerable BioNTdrv.sys versions blocked by Microsoft's Vulnerable Driver Blocklist". The implication of this is, in my opinion, massive. Ransomware gangs, hacktivists, nation states, now have the power to develop exploits at scale, with a lower barrier to entry to conduct their activity. So, that leads to the question - should companies such as OpenAI / Anthropic with their ChatGPT and Claude models restrict this? In my opinion - no. I think more good can come of it than bad - there are far more good people in the world who are trying to make things more secure, and with the advent of researchers and programmers using these tools to find and disclose vulnerabilities ethically, gives more credence to them being fixed and security tools & vendors being on top of the game. Adversaries are always going to have local LLMs as the tech evolves that is unrestricted - so the leading companies in this space should adopt and be ahead of the curve, giving researchers and devs the same power as the adversary. Also, as a fun idea, it could push people towards memory safe languages such as Rust which are significantly less prone to memory bugs that often allow remote code execution. Note that in this case, Rust would not have prevented this vulnerability, as it comes from a bad driver implementation, rather than a strict memory safety issue. ---- If you made it this far, thanks for reading, this turned out longer than expected and I may move it over to a blog post! I am working on a tool to automate this process at scale (more the discovery of vulnerabilities) so, make sure to follow me if you want to check in with the progress of that project! Remember - SECURE BOOT: ON, HVCI: ON, and known vulnerable driver blocklist: ON!
flux tweet mediaflux tweet mediaflux tweet mediaflux tweet media
English
18
89
523
55.3K
saʿā
saʿā@kutekle·
@nexta_tv she’s not ment for sports, can be a cashier insted
English
0
0
0
66
NEXTA
NEXTA@nexta_tv·
🟥 Russian gymnast turns her back during Ukraine’s anthem At the World Cup stage in Sofia, 15-year-old Russian gymnast Sofia Iltyeryakova, competing under a “neutral” status, stood with her back to the flags during the medal ceremony. The anthem was played for the winner — Ukraine’s Taisiia Onofriichuk. Ukraine’s gymnastics federation calls it a violation of ethics and Fair Play, demanding she be banned from international competitions.
English
183
439
3K
245.7K
International Cyber Digest
International Cyber Digest@IntCyberDigest·
‼️We did some OSINT on the leaked Kash Patel email addresses (spiderkash and patelkpp) and found some interesting things. A thread... We found Kash identified himself as FEMALE on the Mindbody app. 💅
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
375
3.5K
21.2K
2.7M
saʿā
saʿā@kutekle·
@IntelOpsV3 damn, even they fell back, for a moment I thought pcp have some skills and balls
English
0
0
2
737
IntelOps
IntelOps@IntelOpsV3·
Vect and TeamPCP have reportedly partnered, but that is not all. Every member of Hasan BF automatically becomes an affiliate. We have never seen anything like this before, what is going on? 😂
IntelOps tweet media
English
12
15
123
15.5K
Daily Noud
Daily Noud@DailyNoud·
BREAKING: Elon Musk has expressed interest in purchasing OnlyFans and shutting down the company: “Yeah, I’ll do it. I don’t see why not.”
Daily Noud tweet mediaDaily Noud tweet media
English
7.1K
6.4K
101.4K
21.5M
saʿā
saʿā@kutekle·
@CR1337 @mullvadnet I just kite between firefox, brave and tor, have not came down to a single one
English
0
0
0
90
CR1337
CR1337@CR1337·
More than 70% of desktop users are still using Google Chrome... Ditch Chrome. Even fully hardened it still leaks data to Google via weak fingerprint resistance and telemetry. Best Browsers For Privacy in 2026: 1. @mullvadnet Browser (Tor Project + Mullvad) → Great solution for serious users. Uniform fingerprint (blends you with millions), auto-clears everything on close, built-in uBlock + NoScript, zero telemetry. Paired with Mullvad VPN (Monero accepted) a nice solution. 2. @firefox Browser → Best balanced browser for daily usage when some measures are in place. Turn on Strict Enhanced Tracking Protection + HTTPS-Only to fight trackers, fingerprinters & cryptominers. Fully customizable, open-source, E2EE sync. 3. @brave Browser → Easiest switch from Chrome. Aggressive Shields block ads/trackers/fingerprinting by default, state partitioning, forget-on-close, and full Chromium extension support. Bonus: Tor Browser by @torproject for max anonymity; @LibreWolf_Brows if you want Firefox pre-hardened.
CR1337 tweet media
English
83
130
727
46.6K
GTA 6 Countdown ⏳
GTA 6 Countdown ⏳@GTAVI_Countdown·
In Red Dead Redemption 2 (2018): railroad workers are actually working and they nail the track into the ground before moving onto the next nail until they finish. In Crimson Desert (2026): NPCs endlessly hit the same rocks without a purpose while clipping through them.
English
1.2K
436
14.3K
7.1M
saʿā
saʿā@kutekle·
@elnormous jo nevarēs Tev kredītus karināt virsū, bez ienākumiem
Latviešu
0
0
1
208
Elviss Strazdiņš 🇱🇻 🇺🇦
Gribēju visās bankās atvērt pa kontam, lai varētu izpētīt to drošību, bet tā kā esmu bezdarbnieks, man nav ienākumu avota, ko norādīt, un bankas man neļauj atvērt kontu. Kāpēc cilvēkam bez ienākumu avota (pat ja viņam ir iekrājumi) nevarētu būt savs bankas konts?
Latviešu
72
41
394
44.7K
saʿā
saʿā@kutekle·
@VPPzinas tak vismaz kaut cik patieku kaut ko izdomā :D
Latviešu
0
0
0
112
VPP 🇺🇦🇮🇱🇱🇻
🇱🇻 “Es kliedzu pilnā rīklē, lai kaimiņi, dievs dod, mani sadzird!” Divu bērnu mammai gaišā dienas laikā kāpņu telpā uzbrūk “Bolt” kurjers, ziņo portāls LA. Rebeka ejot lejā pa kāpņu telpu dzirdējusi, ka kāda persona tai kaut ko jautā, nesaprotamā valodā. Pārjautāja “Ko lūdzu” uz ko maskētā persona izbolīja acis un uzreiz uzbruka un ar kulaku iesita pa krūškurvi. Bolt uz uzbrukumu reaģē atturīgi. Cietusī kompānijai iedeva savu adresi, lai zinātu, kurš kurjers viņai uzbruka, bet “Bolt” atbildējuši, ka no savas puses neko datos neredz un nevar šo cilvēku identificēt. Cietušajai kopā ar kaimiņiem izdevās identificēt kopīgu pasūtījumu. Uz to Bolt sāka attaisnoties, ka viņiem kurjeri ir kā ārpakalpojums, viņi visus nezina. Iespējams uzbrucēja ir sieviete, bet Rebeka stāsta, ka cilvēks bijis maskā un pēc balsts izklausījās vīrišķīgi. Kopš islāmistu pulcēšanās uz Ilukstes ieli šāda tipa jautājumi Latvijā ir kļuvuši par vieniem no aktuālākajiem. Vienlaikus ir arī islāmistu un migrācijas atbalstītāji, piemēram, atsevišķi progresīvie aktīvisti kā aŗi bēdīgi slavenā Nacionālās Apvienības aktīviste Līva Tammama. Foto: cietusī Rebeka ieraksta video vēstījumu.
VPP 🇺🇦🇮🇱🇱🇻 tweet mediaVPP 🇺🇦🇮🇱🇱🇻 tweet media
Latviešu
29
98
261
22.6K
CR1337
CR1337@CR1337·
A short @pcgamer story: 1.) Notification popup, a newsletter popup and a dimmed background with five visible ads 2.) Indeed five ads, 37 MB initial load 3.) After five minutes, almost half a gigabyte of new ads were loaded Okay..
CR1337 tweet mediaCR1337 tweet mediaCR1337 tweet media
English
4
0
14
1K