Le logiciel #espion utilisé par le renseignement russe avait bien été développé pour la #NSA. La semaine passée, on apprenait coup sur coup la condamnation de l’auteur d’un vol de #failles de #sécurité #0days  développées pour la NSA et ses partenaires. Puis (...)
https://next.ink/brief_article/le-logiciel-espion-utilise-par-le-renseignement-russe-avait-bien-ete-developpe-pour-la-nsa/
#spyware #zeroday
Le logiciel espion utilisé par le renseignement russe avait bien été développé pour la NSA - Next

Exploiting zero days in abandoned hardware

We successfully exploited two discontinued network devices at DistrictCon’s inaugural Junkyard competition in February, winning runner-up for Most Innovative Exploitation Technique. Our exploit chains demonstrate why end-of-life hardware poses persistent security risks.

The Trail of Bits Blog
Spent the weekend decompiling and messing with a bunch of windows printer drivers. Was lot of fun and learnt a lot ! Found a few #0days and reported them to NCSC NZ formally known as CERT NZ. Hoping I hear back from them, and these get patched!
UNC3886 Hackers Exploiting 0-Days in VMware vCenter/ESXi, Fortinet FortiOS, and Junos OS

Singapore’s critical infrastructure is under siege from UNC3886, a sophisticated China-linked advanced persistent threat (APT) group. As of July 2025, the group has been actively targeting essential services like energy, water, telecommunications, and government systems, prompting urgent warnings from officials. This isn’t just another hack, it’s a calculated assault exploiting zero-day vulnerabilities in widely used […]

Cyber Security News
Installazioni SharePoint on-premise: vulnerabilità ToolShell

Patch d'emergenza Microsoft per SharePoint on-premise: vulnerabilità ToolShell consente accessi remoti, colpite agenzie governative, università e aziende.

Gomoot : tecnologia e lifestyle Scopri le ultime novità in fatto di hardware, tecnologia IA e altro

TL;DR - Zero days are becoming more difficult. China has a more nimble supply chain and a training system. The US relies on a more rigid acquisition chain.

#cybersecurity #offense #redteam #0days
https://www.atlanticcouncil.org/in-depth-research-reports/report/crash-exploit-and-burn/#analysis

Crash (exploit) and burn: Securing the offensive cyber supply chain to counter China in cyberspace 

If the United States wishes to compete in cyberspace, it must compete against China to secure its offensive cyber supply chain.

Atlantic Council
Government hackers are leading the use of attributed zero-days, Google says | TechCrunch

Governments like China and North Korea, along with spyware makers, used the most recorded zero-days in 2024.

TechCrunch

TOMORROW (4/8) at 6:30 PM EST, legendary @defcon speaker @RenderMan will be talking about his #intetnrtofdongs project finding #vuln #0days & #infosec research into smart sex toys for #DESCI NYC!

RSVP Here: https://lu.ma/descinyc32

#fediverse #mastodon #Hacker #sextoys #dildos #sextech

DeSciNYC: The Internet Of Dongs Project · Luma

Is North Korea in bed with you? Internet connected dongs can be hacked, potentially exposing private habits, biometric details, and intimate data to…

TOMORROW (4/8) at 6:30 PM EST, legendary @defcon.bsky.social speaker @ihackedwhat.bsky.social will be talking about his #intetnrtofdongs project finding #vuln #0days & #infosec research into smart sex toys for #DESCI NYC! RSVP Here: lu.ma/descinyc32
Critical Windows Warning As 6 Zero-Day Attacks Confirmed—Update Now

Microsoft has confirmed that no less than six zero-day vulnerabilities are exploiting Windows users in the wild. Here’s what you need to know and do.

Forbes