@pedri77

43.3K posts

@pedri77 banner
@pedri77

@pedri77

@pedri77

Entusiasta de la (in)seguridad informática, Security Manager, CEH, CHFI

El mundo Katılım Şubat 2010
4.8K Takip Edilen2.1K Takipçiler
@pedri77
@pedri77@pedri77·
A Trend Micro analysis of Earth Estries found that the Chinese threat actor is using new backdoors to avoid detection during espionage operations f.mtr.cool/wyrbtuybyv
English
0
0
0
3
@pedri77
@pedri77@pedri77·
GreyNoise researchers have observed exploit attempts targeting the remote code execution vulnerability CVE-2023-28771 in Zyxel devices. On June 16, GreyNoise researchers detected exploit attempts targeting CVE-2023-2877... f.mtr.cool/seikawkhxh
English
0
0
0
24
@pedri77
@pedri77@pedri77·
Continuous Integration and Continuous Delivery/Deployment (CI/CD) refers to practices that automate how code is developed and released to different environments. CI/CD pipelines are fundamental in modern software develo... f.mtr.cool/wotxwcxoxz
English
0
0
0
8
@pedri77
@pedri77@pedri77·
WhatsApp has addressed a security vulnerability in its messaging apps for Apple iOS and macOS that it said may have been exploited in the wild in conjunction with a recently disclosed Apple flaw in targeted zero-day att... f.mtr.cool/nsewxhftsz
English
0
0
0
15
@pedri77
@pedri77@pedri77·
Researchers have uncovered a critical vulnerability (CVE-2025-29927) in Next.js middleware, allowing authorization bypass. Learn about the exploit and fixes. f.mtr.cool/qcdfjyxczz
English
0
0
0
131
@pedri77
@pedri77@pedri77·
In this agentic era, security must be woven into, and around, every layer of the AI estate. At RSAC 2026, we are delivering on that vision with new purpose-built capabilities designed to help organizations secure agents... f.mtr.cool/snyoiquaht
English
0
0
0
12
@pedri77
@pedri77@pedri77·
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Apple products, and TP-Link routers flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA... f.mtr.cool/gsgtqzfspw
English
0
0
0
10
@pedri77
@pedri77@pedri77·
Counterfeit Facebook pages and sponsored ads on the social media platform are being employed to direct users to fake websites masquerading as Kling AI with the goal of tricking victims into downloading malware. Kling AI... f.mtr.cool/ucstdipsad
English
0
0
0
12
@pedri77
@pedri77@pedri77·
Cybersecurity researchers have called attention to a cyber attack in which unknown threat actors deployed an open-source endpoint monitoring and digital forensic tool called Velociraptor, illustrating ongoing abuse of l... f.mtr.cool/ahiquembxb
English
0
0
0
140
@pedri77
@pedri77@pedri77·
🕹️  WinBoat, la herramienta que integra y ejecuta aplicaciones de Windows en Linux de la mejor manera posible  ⬇️ f.mtr.cool/nbftxdtaht
Español
0
0
0
20
@pedri77
@pedri77@pedri77·
Security researchers at ReversingLabs have discovered a new malware campaign on the npm package repository, revealing a new… f.mtr.cool/krbcofkvmj
English
0
0
1
14
@pedri77
@pedri77@pedri77·
Excerpt: CTI-REALM is Microsoft’s open-source benchmark for evaluating AI agents on real-world detection engineering—turning cyber threat intelligence (CTI) into validated detections. The post CTI-REALM: A new benchmark... f.mtr.cool/cvmxvxfcrw
English
0
0
0
5
@pedri77
@pedri77@pedri77·
Cybercriminals are ramping up scams via darknet marketplaces, selling phishing kits for $100-$1000 f.mtr.cool/uqdsfdnrld
English
0
0
1
15
@pedri77
@pedri77@pedri77·
Experts found two vulnerabilities in the vBulletin forum software, one of which is already being exploited in real-world attacks. Two critical vBulletin flaws, tracked as CVE-2025-48827 and CVE-2025-48828, enable API ab... f.mtr.cool/pnbwgefadm
English
0
1
0
178
@pedri77
@pedri77@pedri77·
Russian organizations have become the target of a phishing campaign that distributes malware called PureRAT, according to new findings from Kaspersky. "The campaign aimed at Russian business began back in March 202... f.mtr.cool/oyhrvcvgrj
English
0
0
0
17
@pedri77
@pedri77@pedri77·
Digital advertising offers unparalleled opportunities for growth, but it also exposes businesses to a major… How to protect your digital advertising budget from invalid traffic on Latest Hacking News | Cyber Security Ne... f.mtr.cool/bohkqgndrn
English
0
0
0
4
@pedri77
@pedri77@pedri77·
Cybersecurity researchers have discovered a new phishing campaign undertaken by the North Korea-linked hacking group called ScarCruft (aka APT37) to deliver a malware known as RokRAT. The activity has been codenamed Ope... f.mtr.cool/hzsimqvhiy
English
0
0
0
22
@pedri77
@pedri77@pedri77·
🕹️  Nano Banana en GIMP: la creación de imágenes con IA llega al editor vía plugin  ⬇️ f.mtr.cool/piqrdrsgmg
Español
0
0
0
18
@pedri77
@pedri77@pedri77·
Microsoft introduces Zero Trust for AI, adding a new AI pillar to its workshop, enhanced reference architecture, updated guidance, and a new assessment tool. The post New tools and guidance: Announcing Zero Trust for AI... f.mtr.cool/aelblrntzg
English
0
0
0
14