manelquerol's profile picture. #Infosec #SysAdmin and #Automation. Formerly Microsoft MVP. #RaisingElephantsIsSoUtterlyBoring

Manel Querol

@manelquerol

#Infosec #SysAdmin and #Automation. Formerly Microsoft MVP. #RaisingElephantsIsSoUtterlyBoring

Manel Querol podał dalej

WhatsApp End-to-End Encryption vs. Forensic Extraction Although WhatsApp uses end-to-end encryption to protect messages, calls, and shared media during transmission, this protection only applies while the data is moving between devices. Once the content reaches the device, it is…

RedHatPentester's tweet image. WhatsApp End-to-End Encryption vs. Forensic Extraction

Although WhatsApp uses end-to-end encryption to protect messages, calls, and shared media during transmission, this protection only applies while the data is moving between devices. Once the content reaches the device, it is…
RedHatPentester's tweet image. WhatsApp End-to-End Encryption vs. Forensic Extraction

Although WhatsApp uses end-to-end encryption to protect messages, calls, and shared media during transmission, this protection only applies while the data is moving between devices. Once the content reaches the device, it is…

Manel Querol podał dalej

🚨Cyber Alert‼️ iOS 26 Zero-Click Exploit Claimed for Sale on Dark Web A threat actor called ResearcherX claimed to be selling a full-chain zero-click exploit for iOS 26 on the dark web, allegedly allowing root access and bypassing new protections. The listing says it…

H4ckmanac's tweet image. 🚨Cyber Alert‼️

iOS 26 Zero-Click Exploit Claimed for Sale on Dark Web

A threat actor called ResearcherX claimed to be selling a full-chain zero-click exploit for iOS 26 on the dark web, allegedly allowing root access and bypassing new protections.

The listing says it…

Manel Querol podał dalej

⛔ | Esto es muy grave, he recibido más evidencia de que la vulnerabilidad en el Registro Civil es real. Clásica inyección SQL, pero con información y endpoints muy delicados. Básicamente puedes dar de alta actas y hasta modificarlas. «La vulnerabilidad está en solo una…

ivillasenor's tweet image. ⛔ | Esto es muy grave, he recibido más evidencia de que la vulnerabilidad en el Registro Civil es real.

Clásica inyección SQL, pero con información y endpoints muy delicados.

Básicamente puedes dar de alta actas y hasta modificarlas.

«La vulnerabilidad está en solo una…
ivillasenor's tweet image. ⛔ | Esto es muy grave, he recibido más evidencia de que la vulnerabilidad en el Registro Civil es real.

Clásica inyección SQL, pero con información y endpoints muy delicados.

Básicamente puedes dar de alta actas y hasta modificarlas.

«La vulnerabilidad está en solo una…

⚠️🇲🇽Alerta: Se ha reportado la presunta oferta de una vulnerabilidad que afectaría a una dependencia del Registro Civil en México. Según la información difundida, esta falla permitiría acceder y descargar documentos como actas de nacimiento, matrimonio y defunción,

victor_ruiz's tweet image. ⚠️🇲🇽Alerta: Se ha reportado la presunta oferta de una vulnerabilidad que afectaría a una dependencia del Registro Civil en México. Según la información difundida, esta falla permitiría acceder y descargar documentos como actas de nacimiento, matrimonio y defunción,


Manel Querol podał dalej

Imagine receiving a normal WhatsApp message from someone… and later discovering that the message secretly contained their exact location, even though they never shared it. That’s exactly what happened during a recent forensic extraction I performed on my iPhone 12 Pro Max.…

elormkdaniel's tweet image. Imagine receiving a normal WhatsApp message from someone… and later discovering that the message secretly contained their exact location, even though they never shared it.

That’s exactly what happened during a recent forensic extraction I performed on my iPhone 12 Pro Max.…
elormkdaniel's tweet image. Imagine receiving a normal WhatsApp message from someone… and later discovering that the message secretly contained their exact location, even though they never shared it.

That’s exactly what happened during a recent forensic extraction I performed on my iPhone 12 Pro Max.…
elormkdaniel's tweet image. Imagine receiving a normal WhatsApp message from someone… and later discovering that the message secretly contained their exact location, even though they never shared it.

That’s exactly what happened during a recent forensic extraction I performed on my iPhone 12 Pro Max.…
elormkdaniel's tweet image. Imagine receiving a normal WhatsApp message from someone… and later discovering that the message secretly contained their exact location, even though they never shared it.

That’s exactly what happened during a recent forensic extraction I performed on my iPhone 12 Pro Max.…

Manel Querol podał dalej

Uncovered screen recordings from threat actors! 👀 Real footage of cybercriminals using anti-detect browsers and infostealer malware logs for session hijacking, and another using GraphSpy to read their Entra ID victim's emails in Outlook! 💀 Video: youtu.be/vX7JcpRqbEk

_JohnHammond's tweet image. Uncovered screen recordings from threat actors! 👀 Real footage of cybercriminals using anti-detect browsers and infostealer malware logs for session hijacking, and another using GraphSpy to read their Entra ID victim's emails in Outlook! 💀 Video: youtu.be/vX7JcpRqbEk

Manel Querol podał dalej

Microsoft Defender now prevents threats on endpoints during an attack Predictive shielding in Defender not only responds instantly during an attack but also jumps ahead of attackers, predicting and preventing the next move before it happens with just-in-time hardening controls…

techcommunity.microsoft.com

Ignite 2025: Microsoft Defender now prevents threats on endpoints during an attack | Microsoft...

This year at Microsoft Ignite, Microsoft Defender is announcing exciting innovations for endpoint protection that help security teams deploy faster, gain...


Manel Querol podał dalej

Walking through the start of Sean Metcalf's presentation and writeup on "Improving Entra ID Security More Quickly"... starting with removing some insecure defaults for user settings, device settings, and guest access! youtu.be/WUHzpDdauAw

_JohnHammond's tweet image. Walking through the start of Sean Metcalf's presentation and writeup on "Improving Entra ID Security More Quickly"... starting with removing some insecure defaults for user settings, device settings, and guest access! youtu.be/WUHzpDdauAw

Manel Querol podał dalej

Schneider Electric has been breached by Clop Ransomware via Oracle E-Business Suite 0day CVE-2025-61882

AlvieriD's tweet image. Schneider Electric has been breached by Clop Ransomware via Oracle E-Business Suite 0day CVE-2025-61882

Manel Querol podał dalej

🛡️ Otra vez una actualización de seguridad en Windows causa problemas La actualización de octubre en Windows introdujo un cambio que causa fallos con tarjetas inteligentes (smart cards) y autenticación basada en certificados. Microsoft confirmó que el problema afecta a todas…

CycuraMX's tweet image. 🛡️ Otra vez una actualización de seguridad en Windows causa problemas

La actualización de octubre en Windows introdujo un cambio que causa fallos con tarjetas inteligentes (smart cards) y autenticación basada en certificados.

Microsoft confirmó que el problema afecta a todas…

Manel Querol podał dalej

ATTENTION: Phishing Attack Uses Azure Blob Storage to Impersonate Microsoft! Attackers have found a new method to trick end users into logging in to a malicious login page, intercepting tokens, and infiltrating the tenant. What makes this particularly sneaky is that they are…

alitajran's tweet image. ATTENTION: Phishing Attack Uses Azure Blob Storage to Impersonate Microsoft!

Attackers have found a new method to trick end users into logging in to a malicious login page, intercepting tokens, and infiltrating the tenant.

What makes this particularly sneaky is that they are…

Manel Querol podał dalej

🔐 Windows BitLocker Vulnerabilities Let Attackers Bypass Security Feature Read more: cybersecuritynews.com/windows-bitloc… Microsoft has disclosed two critical vulnerabilities in its Windows BitLocker encryption feature, allowing attackers with physical access to bypass security…

The_Cyber_News's tweet image. 🔐 Windows BitLocker Vulnerabilities Let Attackers Bypass Security Feature 

Read more: cybersecuritynews.com/windows-bitloc…

Microsoft has disclosed two critical vulnerabilities in its Windows BitLocker encryption feature, allowing attackers with physical access to bypass security…

Manel Querol podał dalej

🚨Cyber Update‼️ 🇪🇸Spain - Agencia Tributaria has denied any intrusion into its systems. After reviewing the leaked materials, officials concluded that the data did not originate from their internal systems but likely came from a private tax consultancy firm that handles…

H4ckmanac's tweet image. 🚨Cyber Update‼️ 

🇪🇸Spain - Agencia Tributaria has denied any intrusion into its systems.

After reviewing the leaked materials, officials concluded that the data did not originate from their internal systems but likely came from a private tax consultancy firm that handles…

🚨🚨Cyberattack Alert ‼️ 🇪🇸Spain - Agencia Tributaria Qilin hacking group claims to have breached Agencia Tributaria. According to the attackers, 60 GB of data (238,799 files) have been exfiltrated. Sample have been provided. Observed: Oct 15, 2025 Status: Unverified claim…

H4ckmanac's tweet image. 🚨🚨Cyberattack Alert ‼️

🇪🇸Spain - Agencia Tributaria

Qilin hacking group claims to have breached Agencia Tributaria.

According to the attackers, 60 GB of data (238,799 files) have been exfiltrated. Sample have been provided.

Observed: Oct 15, 2025
Status: Unverified claim…


Manel Querol podał dalej

🚨🚨Cyberattack Alert ‼️ 🇪🇸Spain - Agencia Tributaria Qilin hacking group claims to have breached Agencia Tributaria. According to the attackers, 60 GB of data (238,799 files) have been exfiltrated. Sample have been provided. Observed: Oct 15, 2025 Status: Unverified claim…

H4ckmanac's tweet image. 🚨🚨Cyberattack Alert ‼️

🇪🇸Spain - Agencia Tributaria

Qilin hacking group claims to have breached Agencia Tributaria.

According to the attackers, 60 GB of data (238,799 files) have been exfiltrated. Sample have been provided.

Observed: Oct 15, 2025
Status: Unverified claim…

Manel Querol podał dalej

🚨 Microsoft Defender Vulnerabilities Allow Attackers to Bypass Authentication Source: cybersecuritynews.com/microsoft-defe…

H4ckmanac's tweet image. 🚨 Microsoft Defender Vulnerabilities Allow Attackers to Bypass Authentication

Source:
cybersecuritynews.com/microsoft-defe…

Manel Querol podał dalej

🚨Cyber Alert ‼️ 🇯🇵 Japan - Nintendo Crimson Collective hacking group, known for the breach on Red Hat, now claims to have breached Nintendo. Discover more at hackrisk.io

H4ckmanac's tweet image. 🚨Cyber Alert ‼️

🇯🇵 Japan - Nintendo

Crimson Collective hacking group, known for the breach on Red Hat, now claims to have breached Nintendo.

Discover more at hackrisk.io

Manel Querol podał dalej

🚨 Google Gemini Vulnerabilities Let Attackers Exfiltrate Users’ Saved Data and Location Read more: cybersecuritynews.com/google-gemini-… Three new vulnerabilities in Google’s Gemini AI assistant suite could have allowed attackers to exfiltrate users’ saved information and location data.…

The_Cyber_News's tweet image. 🚨 Google Gemini Vulnerabilities Let Attackers Exfiltrate Users’ Saved Data and Location 

Read more: cybersecuritynews.com/google-gemini-…

Three new vulnerabilities in Google’s Gemini AI assistant suite could have allowed attackers to exfiltrate users’ saved information and location data.…

Manel Querol podał dalej

🚨 WhatsApp 0-Click Vulnerability Exploited Using Malicious DNG File Read more: cybersecuritynews.com/whatsapp-0-cli… 📌 WhatsApp 0-click remote code execution (RCE) vulnerability affecting Apple’s iOS, macOS, and iPadOS platforms, detailed with a proof of concept demonstration. 📌 The…

The_Cyber_News's tweet image. 🚨 WhatsApp 0-Click Vulnerability Exploited Using Malicious DNG File 

Read more: cybersecuritynews.com/whatsapp-0-cli…

📌 WhatsApp 0-click remote code execution (RCE) vulnerability affecting Apple’s iOS, macOS, and iPadOS platforms, detailed with a proof of concept demonstration.

📌 The…

Manel Querol podał dalej

You got access to vsphere and want to compromise the Windows hosts running on that ESX? 💡 1) Create a clone into a new template of the target VM 2) Download the VMDK file of the template from the storage 3) Parse it with Volumiser, extract SAM/SYSTEM/SECURITY (1/3)

ShitSecure's tweet image. You got access to vsphere and want to compromise the Windows hosts running on that ESX? 💡

1) Create a clone into a new template of the target VM
2) Download the VMDK file of the template from the storage
3) Parse it with Volumiser, extract SAM/SYSTEM/SECURITY 
(1/3)

Manel Querol podał dalej

👀 New Microsoft threat report shows how attackers are using AI for evasion and obfuscation in a phishing campaign! One part is very interesting, the team spotted 5 AI fingerprints in the code. But instead of hiding the attack (the initial goal), these fingerprints actually…

fr0gger_'s tweet image. 👀 New Microsoft threat report shows how attackers are using AI for evasion and obfuscation in a phishing campaign!

One part is very interesting, the team spotted 5 AI fingerprints in the code. But instead of hiding the attack (the initial goal), these fingerprints actually…

Manel Querol podał dalej

🚨 U.S. Secret Service dismantled a massive SIM network in NYC — 300+ servers & 100K SIM cards capable of crippling telecoms & launching anonymous attacks — neutralized just before world leaders arrived for the UN General Assembly.

IntCyberDigest's tweet image. 🚨 U.S. Secret Service dismantled a massive SIM network in NYC — 300+ servers & 100K SIM cards capable of crippling telecoms & launching anonymous attacks — neutralized just before world leaders arrived for the UN General Assembly.
IntCyberDigest's tweet image. 🚨 U.S. Secret Service dismantled a massive SIM network in NYC — 300+ servers & 100K SIM cards capable of crippling telecoms & launching anonymous attacks — neutralized just before world leaders arrived for the UN General Assembly.
IntCyberDigest's tweet image. 🚨 U.S. Secret Service dismantled a massive SIM network in NYC — 300+ servers & 100K SIM cards capable of crippling telecoms & launching anonymous attacks — neutralized just before world leaders arrived for the UN General Assembly.

United States Trendy

Loading...

Something went wrong.


Something went wrong.