TrueConf zero-day abused update trust.
One server → multiple victims.
Internal trust = attack vector.
Source: https://www.securityweek.com/trueconf-zero-day-exploited-in-asian-government-attacks/
Follow TechNadu.
TrueConf zero-day abused update trust.
One server → multiple victims.
Internal trust = attack vector.
Source: https://www.securityweek.com/trueconf-zero-day-exploited-in-asian-government-attacks/
Follow TechNadu.
🔴 New security advisory:
CVE-2026-34563 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-34563-ci4ms-xss-vulnerability
🔴 New security advisory:
CVE-2026-26135 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-26135-azure-custom-locations-ssrf
🔴 New security advisory:
CVE-2026-33105 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-33105-azure-kubernetes-privilege-escalation
🔴 New security advisory:
CVE-2026-33105 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-33105-azure-kubernetes-privilege-escalation
Apple expanded iOS 18.7.7 to cover all devices from iPhone XR through iPhone 16, protecting against the DarkSword exploit kit that uses multiple zero-days for one-click browser compromise. The update initially only covered 4 older models. Apples doing something rare—backporting security patches across the entire supported device range. When Apple backports to every supported device, the threat is serious enough to break their own update policy.
#Apple #iOS #DarkSword #Security #ZeroDay
Source: https://thehackernews.com/2026/04/apple-expands-ios-1877-update-to-more.html
Jeez. This Claude code leak. Sloppy sloppy slop.
> https://cyberpunk.gay/notes/akjr3ydangf7000m
The fact that this unbelievably shitty slop leaked is basically a crisis for every single Claude slopper (major global company), but one can assume all other GPT derivative comparable products are exactly this. Sheesh, and you wonder why they suck. Jeez Louise. #ai #llms #cybersecurity #programming #leak #sourceCode #zeroDay

Claude Code leaked, you know what that means. Time to break down the worst typescript I've ever seen. First off this isn't code, its advanced begging. The most common design pattern I can find is just `recurseUntilSuccess` which is more of a prayer than an efficient architecture. Shit like this is hard fucking coded into the prompts. Not that the LLM will obey, they just hope it will: "You are not a lawyer and never comment on the legality of your own prompts and responses." "In the Sources section, list all relevant URLs from the search results as markdown hyperlinks: [Title](URL). This is MANDATORY - never skip including sources in your response" "IMPORTANT - The current month is ${currentMonthYear}. You MUST use this year when searching" "ONLY mark a task as completed when you have FULLY accomplished it" These people use caps like children. This isn't code, this is begging to a false god that cannot understand your words. (1/?)
🚨 New security advisory:
CVE-2026-20160 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-20160-cisco-ssm-on-prem-rce