e₿ky ⚡
ebky@nostrcom.com
npub1tvww...6w8u
Free Palestine 🇵🇸
Web3, BTC, Cybersec, Backend
لا إله إلا الله
PALESTINE, IT DIDN'T START ON 7 OCTOBER
1. Haifa Massacre 1937
2. Jerusalem Massacre 1937
3. Haifa Massacre 1938
4. Balad al-Sheikh Massacre 1939
5. Haifa Massacre 1939
6. Haifa Massacre 1947
7. Abbasiya Massacre 1947
8. Al-Khisas massacre 1947
9. Bab al- Amud Massacre 1947
10. Jerusalem Massacre 1947
11. Sheikh Bureik Massacre 1947
12. Jaffa Massacre 1948
13. Khan Yunis massacre 1956
14. Jerusalem Massacre 1967
15. Sabra and Shatila massacre 1982
16. Al-Aqsa massacre 1990
17. Ibrahimi Mosque Massacre 1994
18. Jenin refugee camp, April 2002
19. Gaza massacre 2008-09
20. Gaza massacre 2012
21. Gaza Massacre 2014
22. Gaza Massacre 2018-19
23. Gaza Massacre 2021
24. The 2023 Gaza genocide is still going on.
we're on the right road
'Who elected George Soros to dictate laws?': El Salvador President Bukele blasts global elites
@Alby
??? 

China had "persistent" access to U.S. critical infrastructure
🤣🤣
https://www.axios.com/2024/02/07/china-volt-typhoon-critical-cyberattacks
Mastodon vulnerability allows attackers to take over accounts
#cybersecurity #decentralized

BleepingComputer
Mastodon vulnerability allows attackers to take over accounts
Mastodon, the free and open-source decentralized social networking platform, has fixed a critical vulnerability that allows attackers to impersonat...
Hackers steal $112 million of XRP Ripple cryptocurrency


TechCrunch
Hackers steal $112 million of XRP Ripple cryptocurrency | TechCrunch
A crypto wallet was hacked, but questions remain over who exactly owns and controls the wallet.
Arrests in $400M SIM-Swap Tied to Heist at FTX?
Arrests in $400M SIM-Swap Tied to Heist at FTX? – Krebs on Security
We must thank the super backdoor that is JavaScript, without which this exploit would not have been possible, and the vast majority of cybersecurity exploits would not have been possible. View quoted note →
Highly attackers can send a text to an iPhone and take complete control of it without you knowing. View quoted note →
Dissecting TriangleDB, a Triangulation spyware implant on IOS. How the attackers would know about ?
They Found The iPhone Backdoor by Mental Outlaw
Article by Kaspesrky
detailed explanations in talk on #37С3 by Kaspesrky team

Odysee
They Found The iPhone Backdoor
In this video I discuss the TriangleDB attack chain that allowed hackers to completely compromise iPhones starting with a zero click exploit and en...

Securelist
Dissecting TriangleDB, a Triangulation spyware implant
In researching Operation Triangulation, we set ourselves the goal to retrieve as many parts of the exploitation chain as possible. As of now, we ha...

Kaspersky official blog
Kaspersky official blog
The Official Blog from Kaspersky covers information to help protect you against viruses, spyware, hackers, spam & other forms of malware.
Milei is a clown 🤡🤡🤡
Argentina formally rejects BRICS membership


Insider Paper
Argentina formally rejects BRICS membership
Argentine President Javier Milei has sent letters to BRICS leaders to formalize his decision to reject an invitation to join the grouping of major
🤣🤣🤣🤣 🥳🥳🥳🥳 View quoted note →
Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data #book


micahflee
Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data
After just about two years of writing, hacking, analyzing, writing some more, and editing, I'm ridiculously excited to announce that I'm now a publ...

Detection as code A Paradigm Shift


Medium
From soup to nuts: Building a Detection-as-Code pipeline
Part 1 of 2
Police Can Spy on Your iOS and Android Push Notifications…. 🚨 🚨


WIRED
Police Can Spy on Your iOS and Android Push Notifications
Governments can access records related to push notifications from mobile apps by requesting that data from Apple and Google, according to details i...
The sound of you typing on your keyboard could reveal your password


Malwarebytes
The sound of you typing on your keyboard could reveal your password
Researchers have found a way to guess passwords from keyboard sounds recorded by a smartphone with 95% accuracy.


