infosecWithjosh's profile picture.

Infosec With Josh

@infosecWithjosh

Sec-Gemini v1: A breakthrough cybersecurity AI that shifts advantage to defenders. By integrating Gemini with real-time threat intelligence and OSV data, it outperforms other models by 11% on key benchmarks. Now available to select orgs for research to collaboratively strengthen…


Chrome zero-day (CVE-2025-2783) exploited in targeted Russian cyberattack. Google patches high-severity Windows browser vulnerability linked to sophisticated phishing campaign by suspected state-sponsored group. Update Chrome now.


Security alert: A critical vulnerability in Google Chrome allows attackers to execute arbitrary code with the same privileges as the logged-on user. This means attackers could potentially install programs, manipulate data, or create new accounts if successfully exploited. Users…


Looking for a way into cybersecurity without a 4-year degree? Apprenticeships are booming - up 254% in 5 years with 61,000 participants in 2023. You earn while you learn, get mentorship, and often land a full-time job after 1-2 years. Employers: build skilled talent affordably.…


So I might be a little broken, but this sounds fun.

infosecWithjosh's tweet image. So I might be a little broken, but this sounds fun.

Does your API still have endpoints like /status, /info, /health or /metrics? New research reveals APIs are discovered & targeted within 29 seconds of deployment. Attackers can launch 50 requests/sec across multiple IPs, potentially exfiltrating 10M records in under a minute - all…


CVE-2024-49745 is a critical vulnerability in Android's Parcel.cpp that allows local privilege escalation due to an out-of-bounds write. No user interaction is required for exploitation. Organizations should ensure all devices are updated to the 2025-01-05 security patch or…


Critical security alert: Malicious code discovered in popular Solana blockchain library @solana/web3.js (v1.95.6-7). With 51M+ downloads and 3K+ dependent projects, developers urged to update immediately. Affected versions could compromise private keys.


Anonymity for individuals, transparency for groups!


U.S. Treasury sanctions Chinese tech firm Integrity Group for supporting 'Flax Typhoon' cyber attacks against U.S. targets. The Beijing company reportedly aided operations targeting corporations, universities, and government agencies from 2022-2023. Treasury pledges continued…


Infosec With Josh reposted

Inyección dns-prefetch de #SocGholish vía blackshelter[.]org en sitio chileno comolohago[.]cl 🇨🇱 (rankeado 296.517) conduce, al menos a mi, a la descarga de #LummaStealer desde https://brillflooring[.]com/wp-content/plugins/wd-main-plugin/wd-main.php?eg= 🤔 [+] Muestra:…

1ZRR4H's tweet image. Inyección dns-prefetch de #SocGholish vía blackshelter[.]org en sitio chileno comolohago[.]cl 🇨🇱 (rankeado 296.517) conduce, al menos a mi, a la descarga de #LummaStealer desde https://brillflooring[.]com/wp-content/plugins/wd-main-plugin/wd-main.php?eg= 🤔

[+] Muestra:…
1ZRR4H's tweet image. Inyección dns-prefetch de #SocGholish vía blackshelter[.]org en sitio chileno comolohago[.]cl 🇨🇱 (rankeado 296.517) conduce, al menos a mi, a la descarga de #LummaStealer desde https://brillflooring[.]com/wp-content/plugins/wd-main-plugin/wd-main.php?eg= 🤔

[+] Muestra:…
1ZRR4H's tweet image. Inyección dns-prefetch de #SocGholish vía blackshelter[.]org en sitio chileno comolohago[.]cl 🇨🇱 (rankeado 296.517) conduce, al menos a mi, a la descarga de #LummaStealer desde https://brillflooring[.]com/wp-content/plugins/wd-main-plugin/wd-main.php?eg= 🤔

[+] Muestra:…
1ZRR4H's tweet image. Inyección dns-prefetch de #SocGholish vía blackshelter[.]org en sitio chileno comolohago[.]cl 🇨🇱 (rankeado 296.517) conduce, al menos a mi, a la descarga de #LummaStealer desde https://brillflooring[.]com/wp-content/plugins/wd-main-plugin/wd-main.php?eg= 🤔

[+] Muestra:…

There are three types of truths, Subjective, Objective and Empirical. Subjective truths are things like I love apple pie, or I identify as a badger. Objective truths are things we can agree on like rape should never happen or cannibalism should never happen. Last is empirical as…


Anonymity for individuals, transparency for states. note groups and organizations should also be transparent.


#USCongress considers Manhattan Project-style #AGI program amid reports of widespread AI research theft. Critical wake-up call on #cybersecurity - FBI warns China's #hacking operations exceed all major nations combined. US lead in AI hangs in balance. #NationalSecurity #AI


Russian Phobos #ransomware admin Evgenii Ptitsyn (aka "derxan") was extradited to the US. According to the DOJ: Ransomware targeted 1000+ victims including schools & hospitals, extorted $16M+. An international operation led to their arrest. Faces wire fraud & hacking charges.…


Malware sandboxing is a key in cybersecurity, offering secure environments to analyze threats. By using behavioral analysis, network monitoring, IOC extraction, and detailed reporting, organizations can turn their sandboxes into a powerful defensive capabilities against cyber…


Misconfigurations in Microsoft Power Pages could expose sensitive data. Researchers found issues like NHS data leaks due to overly permissive access controls. With 250M+ users monthly, admins must prioritize security, review access roles, and heed platform warnings.…


The "GoIssue" phishing tool is targeting GitHub developers by automating email scraping and phishing campaigns, posing a serious risk to credentials and repositories. To stay safe, enable 2FA on GitHub and scrutinize all unexpected emails, especially those asking for login…


United States Trends

Loading...

Something went wrong.


Something went wrong.