Wild videos capture fiery scenes from a massive Ukrainian drone attack on Russian bombers shielded by tires ⌘ Read more
‘Now The War Has Reached Us Too,’ Russians Far From Ukraine Say After Drone Attacks ⌘ Read more
Ukraine’s drone attack the latest in a series of daring David versus Goliath hits against Russian targets ⌘ Read more
Hundreds walk in solidarity after ‘unspeakable’ attack on running woman
Hundreds of Canberrans take part in a solidarity walk to show support for a woman grabbed from behind and assaulted while running at the Mulligan’s Flat Nature Reserve in Bonner last Monday. ⌘ Read more
What we know about the suspected ‘terror attack’ at the Colorado mall
Six people are injured after an attack on a group of people raising awareness about Israeli hostages held in Gaza. The FBI is treating the incident in Boulder, Colorado, as an act of terrorism but local police are refusing to speculate on the motive. ⌘ Read more
22yo woman dies in Darwin hospital after alleged domestic violence attack
A 22-year-old woman has died at Royal Darwin Hospital 10 days after an alleged domestic violence attack. A man has been charged as police continue to investigate. ⌘ Read more
How Ukraine pulled off its ‘extremely complex’ drone attack on Russia
Ukraine’s security services say they have destroyed 34 per cent of Russia’s air missile carriers with a bold drone attack. Here’s what we know. ⌘ Read more
Trump was not informed of Ukraine attack on Russia ⌘ Read more
Ukraine did not inform US of large-scale attack on Russian airfields in advance, says Axios ⌘ Read more
FBI investigating ‘targeted terror attack’ in Colorado
Local police in Boulder, Colorado and FBI agents establish an evacuation zone at a popular pedestrian area, where authorities say “several victims” have been targeted. ⌘ Read more
Molotov Cocktails thrown at peaceful vigil for the Israeli hostages in Boulder, multiple injured. FBI calls it a targeted terrorist attack ⌘ Read more
Trump was not informed of Ukraine attack on Russia ⌘ Read more
“Russia’s Pearl Harbor”—Ukraine surprise drone attack hits nuclear bombers ⌘ Read more
Ukraine launches major drone attack on Russian bombers, security official says | Ukraine ⌘ Read more
The Hidden Admin Backdoor in Reddit Ads
An Invisibility Cloak for Attackers: How One Admin Created a Stealth Account That Even the Owner Couldn’t See or Remove
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/the-hidden-admin-backdoor-in-reddit-ads … ⌘ Read more
Ukraine reportedly strikes down over 40 Russian strategic bombers in mass drone attack ⌘ Read more
‘Russian bombers are burning en masse’ — Ukraine’s SBU drones hit ‘more than 40’ aircraft in mass attack, source claims ⌘ Read more
Samus using screw attack (AkaiRiot) ⌘ Read more
Half Spectre, Full Exploit: Hardening Rowhammer Attacks with Half-Spectre Gadgets
Comments ⌘ Read more
Russia Accused of Staging Attack on Putin’s Helicopter ⌘ Read more
Pakistani terrorist behind deadly Pahalgam attack is former Para commando, probe finds ⌘ Read more
Kremlin staged drone attack on Putin’s helicopter ⌘ Read more
Ukrainian forces repel over 170 Russian attacks, fiercest fighting on Pokrovsk front – Ukraine’s General Staff ⌘ Read more
Passkeys: The Waterproof Defense Against Phishing Attacks
The Passkeys — a next-generation authentication technology poised to be a game-changer, offering what many describe as a truly waterproof…
[Continue reading on InfoSec Write-ups … ⌘ Read more
Walkthrough - Host & Network Penetration Testing: System-Host Based Attacks CTF 2 ⌘ Read more
What do your cats do that makes you laugh out loud? Mine hides behind a see through curtain eying my toes to attack ⌘ Read more
After 3 days of consecutive attacks on Ukraine, Russia calls UN meeting over alleged European ‘threats to peace’ ⌘ Read more
[$] Glibc project revisits infrastructure security
The GNU C Library
(glibc) is the core C library for most Linux distributions, so it is a
crucial part of the open-source ecosystem—and an attractive
target for any attackers looking to carry out supply-chain
attacks. With that being the case, securing the project’s
infrastructure using industry best practices and improving the
security of its development practices are a frequent topic among glibc
developers. A recent discussion suggests that improveme … ⌘ Read more
[$] System-wide encrypted DNS
The increasing sophistication of attackers has organizations
realizing that perimeter-based security models are inadequate. Many
are planning to transition their internal networks to a zero-trust\
architecture. This requires every communication on the network to
be encrypted, authenticated, and authorized. This can be achieved in
applications and services by using modern communication
protocols. However, the world still depends on Domain Name Syste … ⌘ Read more
Hundreds of drones attack Russia with impacts, disruption reported in Moscow ⌘ Read more
Did Harvard reject Barron Trump? Truth behind his college choice has sparks buzz online
, - The Economic Times (India)
_Stephan: I have been following closely Trump’s attack on Harvard. At one level it is clearly part of MAGAt coup to intimidate or take over universities, so they do what the MAGAt fascists want, indoctrinate instead of educate. But there is something weird and personal about what Trump is doing and saying. According … ⌘ Read more
Demystifying Cookies : The Complete Guide for Bug Bounty Hunters — Part 1
Everything you need to know about cookies to expand your attack surface and find real bugs.
[Continue reading on InfoSec Write-ups »](h … ⌘ Read more
Russia can attack Europe 2-4 years after war’s end, faster with lifted sanctions, Ukrainian intel chief warns ⌘ Read more
Russia says Trump’s attack on Putin due to “emotional overstrain” ⌘ Read more
Trump calls Putin ‘absolutely crazy’ after largest Russian attack on Ukraine - BBC News ⌘ Read more
Russia launches war’s largest air attack on Ukraine, kills at least 12 people ⌘ Read more
Trump calls Putin ‘crazy’ after largest Russian attack on Ukraine ⌘ Read more
Zelensky says ‘US silence’ over Russian attacks ‘encourages Putin’ ⌘ Read more
German Foreign Minister Johann Wadephul called for additional EU sanctions against Russia on May 25 following Russia’s large-scale overnight attack on Ukraine that killed 12 and injured 79. ⌘ Read more
Ukraine’s Zelenskyy denounces U.S. silence after massive Russian drone-and-missile attacks ⌘ Read more
Russia launches mass attack on Kyiv, Ukrainian cities for second night in row ⌘ Read more
Russia launches major aerial attack on Ukraine capital ⌘ Read more
Ukraine is using helium-filled balloons to extend the range of its attack drones ⌘ Read more
Kyiv comes under large-scale Russian drone and missile attack with explosions heard throughout city ⌘ Read more
Is GNOME Conducting False Flag Attacks to Smear Lunduke?
Very bizarre things are happening within GNOME. ⌘ Read more
$750 Bounty: for HTTP Request Smuggling on Data.gov
How a cleverly crafted desync attack revealed a hidden path to client-side compromise, JS injection and potential cookie theft
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/ … ⌘ Read more
Training Solo: On the Limitations of Domain Isolation Against Spectre-v2 Attacks
Comments ⌘ Read more
DCShadow Attacks: Subverting Active Directory Replication for Stealthy Persistence
Technique that allows adversaries to manipulate directory data by simulating the behavior of a legitimate Doma … ⌘ Read more
Master CRLF Injection: The Underrated Bug with Dangerous Potential
Learn how attackers exploit CRLF Injection to manipulate HTTP responses, hijack headers and unlock hidden vulnerabilities in modern web…
[Continue rea … ⌘ Read more
A Guide to SQL Injection Attacks: Hackers Don’t Want You to Know This!
Imagine your website as a big toy box filled with treasures — like user info, passwords, or blog posts — and you’ve got a robot helper…
[Contin … ⌘ Read more
Stop Uncapped Cloud Billing
This emerging community was created when its author got a single-day cloud bill of $97k due to a DoS attack that killed his small business.
[$] Injecting speculation barriers into BPF programs
The disclosure of the Spectre\
class of hardware vulnerabilities created a lot of pain for kernel
developers (and many others). That pain was especially acutely felt in the
BPF community. While an attacker might have to painfully search the kernel
code base for exploitable code, an attacker using BPF can simply write and
load their own speculation gadgets, which is a much more efficient way of
operating. The BPF comm … ⌘ Read more
i love it when k-pop girls get to do unusual genres. you ever wanted to hear a k-pop girl group do something massive attack-ish with a bit of breakbeat? well we got it https://www.youtube.com/watch?v=jy0qJC6IbgY
Secure your Python applications: Best practices for developers
Practical security tips every Python developer should know — from dependency safety to protecting against injection attacks and securing…
[Continue reading on InfoSec Write … ⌘ Read more
Nagatoro third attack animation video by Zukanyan ⌘ Read more
**IDOR Attacks Made Simple: How Hackers Access Unauthorized Data **
IDOR Attacks Made Simple: How Hackers Access Unauthorized Data 🔐
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/idor-attacks-made-simple-h … ⌘ Read more
So, the “AI” bots have reached my website. Looks like they’re just slowly crawling everything at the moment – no DDoS-like attack yet. I wonder if that has something to do with my website being 100% static HTML. There are no GET parameters they can tweak and, at the end of the day, there’s not that much data on my server anyway … And maybe they have no idea what stagit is, so it doesn’t trigger “standard behavior”, like “this is a Gitea instance, let’s crawl this like crazy!”?
** The $2500 bug: Remote Code Execution via Supply Chain Attack** ⌘ Read more
Does anyone else wakes up to their feet being groomed and attacked every morning 🌅 ⌘ Read more
**Path Traversal Attack: How I Accessed Admin Secrets **
Path Traversal Attack: How I Accessed Admin Secrets 📂
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/path-traversal-attack-how-i-accessed-admin-secrets-fa5de1865031?source … ⌘ Read more
Top 5 Open Source Tools to Scan Your Code for Vulnerabilities
These tools help you find security flaws in your code before attackers do.
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/top-5-open-source-tools-to-s … ⌘ Read more
How to Create a Botnet Using One Tool: A Proof of Concept for Educational Purposes Aspiring…
Learn how attackers build and control botnets — safely and ethically — using … ⌘ Read more
CNCF Announces Graduation of in-toto Security Framework, Enhancing Software Supply Chain Integrity Across Industries
NYU Tandon-developed software security framework achieves highest CNCF maturity level, combating rising software supply chain attacks SAN FRANCISCO, CA, April 23, 2025 – The Cloud Native Computing Foundation® (CNCF®), which builds sustainable ecosystems for cloud native… ⌘ Read more
@aelaraji@aelaraji.com sounds like a panic attack to me 🤯
Also, I should cut down on coffee. Seriously, I’ve nearly had a … I honestly don’t know what it was; A Panic attack? A heart attack? I dunno, I just felt like my heart and lungs were so about to burst I had to go for a run to cope.
Update. This is the face of a cat who got sent home cause he attacked the vet and now has to come back drugged up. ⌘ Read more
‘Deep red rural America’ hurts most as Trump attacks on liberal programs backfire: report
Jennifer Bowers Bahney, Contributing Writer - Raw Story
_Stephan: Just as I, and many others have predicted, MAGAt world is going to experience the worst effects of the Trump coup and dismantlement of the economy and government. And in many ways, MAGAt voters didn’t even think about that when they voted. Here is an example of what I mean. I think … ⌘ Read more
SHE SURVIVED! She was attacked by a male cat when I found her downstairs. Thought she would be gone, but she survived!🥹 ⌘ Read more
️ Blind XSS Attack in Production: My Favorite Exploit with a Delayed Surprise
Free Article Link
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/%EF%B8%8F-bli … ⌘ Read more
@eapl.me@eapl.me This is one of my concerns too. The moment you post publicly ciphertext, you open yourself up for future attacks on the ciphertext, which you really want to avoid if you can. If you have a read of the Salty.im Spec you’ll note we went to great lengths to protect the user’s privacy as well as their identity and make it incredibly hard to guess at inboxes. It’s still a WIP, but I’d love to see it progressed even further – I truly feel strongly about a purely decentralised messaging ecosystem 👌
(#2zhuzoa) @eapl.me@eapl.me This is one of my concerns too. The moment you post publicly ciphertext, you open yourself up for future attacks on …
@eapl.me @eapl.me This is one of my concerns too. The moment you post publicly ciphertext, you open yourself up for future attacks on the ciphertext, which you really want to avoid if you can. If you have a read of the Salty.im Spec you’ll note we went to great lengths to protect the user’s … ⌘ Read more
So pretty anie attack on titan ⌘ Read more
There’s one way you can make your super more secure
Super funds are attractive targets for hackers, and recent attacks on funds have put the sector’s security practices under the microscope. ⌘ Read more
@movq@www.uninformativ.de @ionores@twtxt.net Thank you! Nope, still a petting farm over here. The only dangerous (to humans) animals are boars and ticks. But I only ever encountered a wild hog once in my entire life so far. Luckily, it took off and didn’t attack me. Ticks, on the other hand, regularly attack me.
Chaos and Corruption Weekly Digest: Week 11
, - American Federation of Government Employees
Stephan: Week 11 of the corruption that is the unacknowledged but defining character of the coup.
Week 11 saw Trump’s attack on the free press, our country’s economy and ability to fight diseases and find cures. But the American people pushed back against his attacks in four elect … ⌘ Read more
Hardening the Firefox frontend
Tom Schuster, Frederik Braun, and Christoph Kerschbaumer have
published an article
on the Firefox Security team’s Attack & Defense
blog that explains recent work to harden Firefox’s frontend code.
We have rewritten over 600 JavaScript event handlers to mitigate XSS
and other injection attacks in the main Firefox user interface. This
mitigation will ship in … ⌘ Read more
Reputation Lag Attack - Computerphile ⌘ Read more
I can live without my phone, survive without my keys, and replace my wallet… But when the cat disappears? Instant heart attack. ⌘ Read more
10 People Who Were Attacked for the Clothes They Wore
Black clothing. A sweatshirt. A “too small” skirt. A “blasphemous” dress. A crop top. Pretentious attire. Hats. A bikini. Jeans. Zoot suits. These clothes outraged some, who associated the articles of clothing with devil worship, immorality, nontraditional attire, and beliefs, attitudes, or behaviors that outraged the spectators. The attacks weren’t really about the victims’ clothing. […]
The post [10 People Who Were Attacke … ⌘ Read more
Attack on Booty (Jerk Dibuja) ⌘ Read more
athena was NOT making that night longer for ODYSSEUS to enjoy the sex get serious. she made that man see the gods above so clearly that he almost had a panic attack
@kat@yarn.girlonthemoon.xyz it’s mostly under control now but jesus christ i almost had a panic attack
Law firms refuse to represent Trump opponents in the wake of his attacks
Michael Birnbaum , - msn | The Washington Post
_Stephan: One of the keys to all fascist takeovers of democracies when the democracy is being taken apart is to so threaten and badly damage the legal system that when critics and opponents are attacked by the authoritarian, they cannot even get a lawyer to represent and defend them in the courts while, at the same time, the cour … ⌘ Read more
Speaker Mike Johnson floats eliminating federal courts as GOP ramps up attacks on judges
Scott Wong, Melanie Zanona and Rebecca Kaplan, Reporters - NBC News
_Stephan: The Speaker of the House, Mike Johnson, is not functioning as the leader of a coequal branch of the Executive branch. Instead, he behaves like a White House staff assistant. He is clearly a participant in the authoritarian dismantlement of the legal system of the United … ⌘ Read more
Hi! i’m a paralyzed cat. When i was just one month old, i was attacked by a dog or a human and my spine was broken. This is how meowmy found me and adopted. Meowmy always helps me with difficulties in my daily life ⌘ Read more
Here are the 60 universities under investigation by the Trump administration
Ray Bogan , Political Correspondent - Straight Arrow News
_Stephan: The Trump coup has made clear it considers the universities of America enemies of its authoritarian takeover of the United States. So completely predictably, like all fascist coups in history, the Trumpers (read neo-Nazis) are attacking and attempting to take control of American higher education. They g … ⌘ Read more
[$] LWN.net Weekly Edition for March 20, 2025
Inside this week’s LWN.net Weekly Edition:
Front: Oxidizr; Spectre mitigations; Frozen pages; Mapcount madness; Open-source risks; /e/OS.
Briefs: Supply chain attacks; SystemRescue 12.00; Casual Make; GIMP 3.0; Git 2.49.0; GNOME 48; PeerTube 7.1; Quotes; …
Announcements: Newsletters, conferences, security updates, patches, and more. ⌘ Read more
Apple Passwords App Bug Left Users Vulnerable to Phishing Attacks for Months Before Being Fixed
Apple fixed a bug in its Passwords app with December’s iOS 18.2 update that had left users vulnerable to phishing attacks in the three months since the launch of iOS 18.
According to an Apple security update spotted by _[9to5Mac](https://9to5mac.com/2025/03/18/apples-passwords-app-was-vulnerable-to-phi … ⌘ Read more
Trump’s FBI Moves to Criminally Charge Major Climate Groups
Marin Scotten, Staff Writer - The New Republic
_Stephan: Habitat for Humanity, a non-profit organization dedicated to fostering wellbeing that President Jimmy Carter worked with for years, and to which my wife and I have sent support, is one of a number of wellbeing fostering foundations now being attacked by psychopath fascist Trump using as his agents his corrupted FBI. I predict that any 501©3 that … ⌘ Read more
‘A Hallmark of Autocracy’: Flurry of Trump Attacks on Universities Sparks Alarm
Eloise Goldsmith, Staff Writer - Common Dreams
_Stephan: As many, perhaps most of you, know I live mostly in the world of research and science as an experimentalist. Many of my friends and colleagues come from that world and today, in addition to the letter from the woman about why I call Trump a psychopath, I heard from a researcher at John Hopkins University who ha … ⌘ Read more
Legends of Open Source Under Attack by Leftist Extremists
The most prominent leaders in Free and Open Source Software (from Stallman to Torvalds) are regularly attacked, ostracized, or outright banned by Leftist Extremists. ⌘ Read more
This monster goes from licking my arm to attacking me, all while purring the whole time ⌘ Read more
RFK Jr. targets childhood psychiatric drugs; doctors push back
Joseph Choi , Staff Writer - The Hill
_Stephan: And so it starts. The first child in a decade in the United States has just died of measles, and now Robert Kennedy, jr. is attacking psychiatric drugs used in the treatment of children. So if you have a child who is depressed, anxious, or hyperactive. Trump and the Republican Congress members are telling you, “tough… you need to understand your well … ⌘ Read more
The cat attack ⌘ Read more
I got promoted today to try using Passkeys on Github.com. Fine 😅 I did that, but I discovered that when you use your Passkey to login, Chrome prompts you for your device’s password (i.e: The password you use to login to your macOS Desktop). Is that intentional? Kind of defeats the point no? I mean sure, now there’s no Password being transmitted, stored or presented to Github.com but still, all an attacker has to do is somehow be on my device and know my login password to my device right? Is that better or worse? 🤔
PostmarketOS Joins Codeberg’s Fight Against “Right Wing Forces”
Following dubious announcement of attack by “Right Wing Forces” by Git hosting company, a Linux Phone OS project has joined their crusade. ⌘ Read more