future_ev_c's profile picture. Building the future of EV charging ⚡🚗

Jesse Taylor

@future_ev_c

Building the future of EV charging ⚡🚗

Jesse Taylor أعاد

🚨 Hackers Abuse ASP.NET Machine Keys to Compromise IIS Servers Read more: cybersecuritynews.com/hackers-abuse-… A sneaky hacking campaign where attackers used publicly available machine keys to break into Windows IIS web servers. These keys, meant…

The_Cyber_News's tweet image. 🚨 Hackers Abuse ASP.NET Machine Keys to Compromise IIS Servers 

Read more: cybersecuritynews.com/hackers-abuse-…

A sneaky hacking campaign where attackers used publicly available  machine keys to break into Windows IIS web servers.

These keys, meant…

Jesse Taylor أعاد

🚨🚨CVE-2025-22167 (CVSS 8.7): Jira Path Traversal flaw allows arbitrary file writes to any JVM-writable path. Possible RCE when chained with other exploits. Search by vul.cve Filter👉vul.cve="CVE-2025-22167" ZoomEye Dork👉app="Atlassian JIRA" Over 107k vulnerable instances.…

zoomeye_team's tweet image. 🚨🚨CVE-2025-22167 (CVSS 8.7): Jira Path Traversal flaw allows arbitrary file writes to any JVM-writable path. Possible RCE when chained with other exploits.

Search by vul.cve Filter👉vul.cve="CVE-2025-22167"
ZoomEye Dork👉app="Atlassian JIRA"
Over 107k vulnerable instances.…

Jesse Taylor أعاد

‼️The plot thickens: Collins Aerospace was targeted by two ransomware gangs simultaneously, unaware of each other. After Everest exfiltrated data from an FTP server, another ransomware operator targeted the MUSE system and deployed ransomware. NCSC-UK stated, “We know the…

‼️ When Collins Aerospace shut down its Multi-User System Environment (MUSE), it informed the press and filed with the SEC, claiming a ransomware attack. This caused major European airports to halt passenger processing, stranding thousands and delaying numerous flights. Turns…

IntCyberDigest's tweet image. ‼️ When Collins Aerospace shut down its Multi-User System Environment (MUSE), it informed the press and filed with the SEC, claiming a ransomware attack.

This caused major European airports to halt passenger processing, stranding thousands and delaying numerous flights.

Turns…
IntCyberDigest's tweet image. ‼️ When Collins Aerospace shut down its Multi-User System Environment (MUSE), it informed the press and filed with the SEC, claiming a ransomware attack.

This caused major European airports to halt passenger processing, stranding thousands and delaying numerous flights.

Turns…
IntCyberDigest's tweet image. ‼️ When Collins Aerospace shut down its Multi-User System Environment (MUSE), it informed the press and filed with the SEC, claiming a ransomware attack.

This caused major European airports to halt passenger processing, stranding thousands and delaying numerous flights.

Turns…
IntCyberDigest's tweet image. ‼️ When Collins Aerospace shut down its Multi-User System Environment (MUSE), it informed the press and filed with the SEC, claiming a ransomware attack.

This caused major European airports to halt passenger processing, stranding thousands and delaying numerous flights.

Turns…


Jesse Taylor أعاد

🚨 Developers, check your NuGet packages. A fake NuGet package “Netherеum.All” — spelled with a Cyrillic ‘e’ — was stealing wallet keys from Ethereum .NET projects. It even faked 11.7M downloads to look real. Full story ↓ thehackernews.com/2025/10/fake-n…


Jesse Taylor أعاد

Reports indicate that the F5 BIG-IP source code leak is linked to state-sponsored campaigns utilizing the BRICKSTORM backdoor, highlighting ongoing cybersecurity threats. #Cybersecurity #F5BIGIP #BRICKSTORM resecurity.com/blog/article/f…


Jesse Taylor أعاد

AI-generated code is now the cause of one-in-five breaches – but developers and security leaders alike are convinced the technology will come good eventually | IT Pro itpro.com/software/devel…


Jesse Taylor أعاد

Report Shows Ransomware Hitting Manufacturing the Hardest | Manufacturing Business Technology mbtmag.com/cybersecurity/…


Jesse Taylor أعاد

Proofpoint has identified a new sophisticated #cybercriminal. Dubbed #TA585, it manages its entire #cyberattack chain, including infrastructure, delivery, and malware installation. Read about its activity, capabilities, and technical details. @techday_ca brnw.ch/21wWPST


Jesse Taylor أعاد

"It is now clear that near-term EV adoption will be slower than planned .... It's clear that ICE volumes will remain higher for longer....strong sustained demand" GM CEO Barra just out Q3 letter.. Note GM taking Q3 charge on EVs "and we expect future charges." #oott

Energy_Tidbits's tweet image. "It is now clear that near-term EV adoption will be slower than planned .... It's clear that ICE volumes will remain higher for longer....strong sustained demand"  GM CEO Barra just out Q3 letter..

Note GM taking Q3 charge on EVs  "and we expect future charges." 

#oott

Jesse Taylor أعاد

$NVDA LOWER EARTH ORBIT AI FACTORIES? NVIDIA just posted a video of a 5GW datacenter in space. Meanwhile, $AMZN founder Jeff Bezos is talking about compute bases on the moon. $TSLA CEO targeting for Mars next?

من NVIDIA

Jesse Taylor أعاد

Singapore’s Shanmugam warns weaponised technology fuelling ‘cyber arms race’ | South China Morning Post scmp.com/week-asia/poli…


Jesse Taylor أعاد

Looking back, this was probably the most important slide from Analyst Day. For years CRQCs were a 2030 problem. Academic talk more than operational risk. Now the Department of War is saying encryption could be toast in just three years. That shifts it from lab demo to war budget…

DesFrontierTech's tweet image. Looking back, this was probably the most important slide from Analyst Day. For years CRQCs were a 2030 problem. Academic talk more than operational risk. Now the Department of War is saying encryption could be toast in just three years. That shifts it from lab demo to war budget…

Jesse Taylor أعاد

🗞️ Red Hat has confirmed a security incident involving a breach of one of its GitLab instances by a group calling itself the Crimson Collective. The hackers claim to have stolen nearly 570GB of data, including sensitive customer engagement reports.


Jesse Taylor أعاد

ESET researchers look at two Android spyware campaigns targeting individuals interested in secure communication apps (Signal & ToTok). The campaigns distribute malware through deceptive websites & social engineering & appear to target residents of the UAE. welivesecurity.com/en/eset-resear…

virusbtn's tweet image. ESET researchers look at two Android spyware campaigns targeting individuals interested in secure communication apps (Signal & ToTok). The campaigns distribute malware through deceptive websites & social engineering & appear to target residents of the UAE. welivesecurity.com/en/eset-resear…

Jesse Taylor أعاد

Luno: Linux botnet combining modular DDoS, stealthy crypto-mining, binary replacement & watchdog loops cyble.com/blog/lunobotne… #Linux #botnet

0xor0ne's tweet image. Luno: Linux botnet combining modular DDoS, stealthy crypto-mining, binary replacement & watchdog loops

cyble.com/blog/lunobotne…

#Linux #botnet
0xor0ne's tweet image. Luno: Linux botnet combining modular DDoS, stealthy crypto-mining, binary replacement & watchdog loops

cyble.com/blog/lunobotne…

#Linux #botnet

Jesse Taylor أعاد

How does a digital twin transform an airport? ✈️ Explore how @flySFO geospatial approach keeps flights on time and travelers happy. ow.ly/7yJ150X4GXs #sfo #bim #digitaltwin


Jesse Taylor أعاد

unfortunately ads fund research. google ads → deepmind → transformer. meta ads → billions poured into ar/vr. openai needs massive cashflow to bankroll agi. the treadmill sucks but it’s also the only mechanism society has ever found to subsidize frontier science at scale. i…

Why do we keep dedicating our brightest minds, billions of dollars, and the most powerful GPUs on earth to building yet another app that optimizes for attention decay? I was hopeful when ChatGPT seemed to reclaim time from TikTok and Instagram. It felt useful, even nourishing.…



Jesse Taylor أعاد

WhatsApp 0-Click Vulnerability Exploited Using Malicious DNG File! The exploit, demonstrated in a proof-of-concept (PoC) shared by the DarkNavyOrg researchers, is initiated by sending a specially crafted malicious (DNG) image file to a victim’s WhatsApp account. As a…

officer_cia's tweet image. WhatsApp 0-Click Vulnerability Exploited Using Malicious DNG File!

The exploit, demonstrated in a proof-of-concept (PoC) shared by the DarkNavyOrg researchers, is initiated by sending a specially crafted malicious (DNG) image file to a victim’s WhatsApp account.

As a…

United States الاتجاهات

Loading...

Something went wrong.


Something went wrong.