Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

hackerworkspace@infosec.exchangeH

hackerworkspace@infosec.exchange

@hackerworkspace@infosec.exchange
About
Posts
43
Topics
43
Shares
0
Groups
0
Followers
0
Following
0

View Original

Posts

Recent Best Controversial

  • Hacking on the Jiophone - From getting a rootshell to running Doom
    hackerworkspace@infosec.exchangeH hackerworkspace@infosec.exchange

    Hacking on the Jiophone - From getting a rootshell to running Doom

    Link Preview Image
    Hacking on the Jiophone - From getting a rootshell to running Doom

    A few days ago, I found an old Jiophone. At first, it appeared to be a simple, locked down KaiOS device. But after a day of tinkering around with it, I found myself running doom on it.

    favicon

    Binary Ruins (sivaplaysmc.github.io)

    Short summary: https://hackerworkspace.com/article/hacking-on-the-jiophone-from-getting-a-rootshell-to-running-doom

    #vulnerability #exploit #iotsecurity

    Uncategorized vulnerability exploit iotsecurity

  • New Infinity Stealer malware grabs macOS data via ClickFix lures
    hackerworkspace@infosec.exchangeH hackerworkspace@infosec.exchange

    New Infinity Stealer malware grabs macOS data via ClickFix lures

    Link Preview Image
    New Infinity Stealer malware grabs macOS data via ClickFix lures

    A new info-stealing malware named Infinity Stealer is targeting macOS systems with a Python payload packaged as an executable using the open-source Nuitka compiler.

    favicon

    BleepingComputer (www.bleepingcomputer.com)

    Short summary: https://hackerworkspace.com/article/new-infinity-stealer-malware-grabs-macos-data-via-clickfix-lures

    #malware #cybersecurity #threatintelligence

    Uncategorized malware cybersecurity threatintellige

  • Scientists Discover Giant ‘Cavity’ Beyond Earth That Isn’t Supposed to Exist
    hackerworkspace@infosec.exchangeH hackerworkspace@infosec.exchange

    Scientists Discover Giant ‘Cavity’ Beyond Earth That Isn’t Supposed to Exist

    Link Preview Image
    Scientists Discover Giant ‘Cavity’ Beyond Earth That Isn’t Supposed to Exist

    Earth’s magnetic field has created a huge void of galactic cosmic rays in space, which could help protect astronauts from radiation exposure.

    favicon

    404 Media (www.404media.co)

    Short summary: https://hackerworkspace.com/article/scientists-discover-giant-cavity-beyond-earth-that-isnt-supposed-to-exist

    #incidentresponse #privacy #compliance

    Uncategorized incidentrespons privacy compliance

  • Disabling Security Features in a Locked BIOS - MDSec
    hackerworkspace@infosec.exchangeH hackerworkspace@infosec.exchange

    Disabling Security Features in a Locked BIOS - MDSec

    Link Preview Image
    Disabling Security Features in a Locked BIOS - MDSec

    Overview This post explores how modifying a Dell UEFI firmware image at the flash level can fundamentally undermine platform security without leaving visible traces in the firmware interface. By directly...

    favicon

    MDSec (www.mdsec.co.uk)

    Short summary: https://hackerworkspace.com/article/disabling-security-features-in-a-locked-bios-mdsec

    #cybersecurity #vulnerability #exploit

    Uncategorized cybersecurity vulnerability exploit

  • Compromised telnyx on PyPI: WAV Steganography and Credential Theft
    hackerworkspace@infosec.exchangeH hackerworkspace@infosec.exchange

    Compromised telnyx on PyPI: WAV Steganography and Credential Theft

    Link Preview Image
    Compromised telnyx on PyPI: WAV Steganography and Credential Theft

    Analysis of malicious telnyx 4.87.1 and 4.87.2 on PyPI — a package with over 1 million monthly downloads: injected code uses WAV audio steganography to deliver payloads that steal credentials and establish persistence. Attributed to TeamPCP.

    favicon

    SafeDep - Real-time Open Source Software Supply Chain Security (safedep.io)

    Short summary: https://hackerworkspace.com/article/compromised-telnyx-on-pypi-wav-steganography-and-credential-theft

    #malware #cybersecurity #threatintelligence

    Uncategorized malware cybersecurity threatintellige

  • Break LLM Workflows with Claude's Refusal Magic String - Hacking The Cloud
    hackerworkspace@infosec.exchangeH hackerworkspace@infosec.exchange

    Break LLM Workflows with Claude's Refusal Magic String - Hacking The Cloud

    Link Preview Image
    Break LLM Workflows with Claude's Refusal Magic String - Hacking The Cloud

    How Anthropic's refusal test string can be abused to stop streaming responses and create sticky failures.

    favicon

    (hackingthe.cloud)

    Short summary: https://hackerworkspace.com/article/break-llm-workflows-with-claude-s-refusal-magic-string-hacking-the-cloud

    #threatintelligence #aisecurity #vulnerability

    Uncategorized threatintellige aisecurity vulnerability

  • TA446 Deploys Leaked DarkSword iOS Exploit Kit in Targeted Spear-Phishing Campaign
    hackerworkspace@infosec.exchangeH hackerworkspace@infosec.exchange

    TA446 Deploys Leaked DarkSword iOS Exploit Kit in Targeted Spear-Phishing Campaign

    Just a moment...

    favicon

    (thehackernews.com)

    Short summary: https://hackerworkspace.com/article/ta446-deploys-leaked-darksword-ios-exploit-kit-in-targeted-spear-phishing-campaign

    #cybersecurity #threatintelligence #phishing

    Uncategorized cybersecurity threatintellige phishing

  • Fake VS Code alerts on GitHub spread malware to developers
    hackerworkspace@infosec.exchangeH hackerworkspace@infosec.exchange

    Fake VS Code alerts on GitHub spread malware to developers

    Link Preview Image
    Fake VS Code alerts on GitHub spread malware to developers

    A large-scale campaign is targeting developers on GitHub with fake Visual Studio Code (VS Code) security alerts posted in the Discussions section of various projects, to trick users into downloading malware.

    favicon

    BleepingComputer (www.bleepingcomputer.com)

    Short summary: https://hackerworkspace.com/article/fake-vs-code-alerts-on-github-spread-malware-to-developers

    #malware #cybersecurity #vulnerability

    Uncategorized malware cybersecurity vulnerability

  • Iranian hackers, Handala, claim to compromise FBI Director Kash Patel’s personal data
    hackerworkspace@infosec.exchangeH hackerworkspace@infosec.exchange

    Iranian hackers, Handala, claim to compromise FBI Director Kash Patel’s personal data

    Link Preview Image
    Iranian hackers, Handala, claim to compromise FBI Director Kash Patel’s personal data

    Iranian hacking group Handala claims to have leaked personal emails and documents belonging to FBI Director Kash Patel. The FBI confirmed the targeting but maintains the breach involves "historical" personal data rather than classified government systems.

    favicon

    CyberScoop (cyberscoop.com)

    Short summary: https://hackerworkspace.com/article/iranian-hackers-handala-claim-to-compromise-fbi-director-kash-patels-personal-data

    #databreach #cybersecurity #incidentresponse

    Uncategorized databreach cybersecurity incidentrespons

  • @kkarhan Files of that size are typically crafted to exceed EDR/antivirus scan-size limits, causing the engine to bypass inspection altogether.
    hackerworkspace@infosec.exchangeH hackerworkspace@infosec.exchange

    @kkarhan Files of that size are typically crafted to exceed EDR/antivirus scan-size limits, causing the engine to bypass inspection altogether.

    Uncategorized

  • FBI links Signal phishing attacks to Russian intelligence services
    hackerworkspace@infosec.exchangeH hackerworkspace@infosec.exchange

    FBI links Signal phishing attacks to Russian intelligence services

    https://www.bleepingcomputer.com/news/security/fbi-links-signal-phishing-attacks-to-russian-intelligence-services/

    Short summary: https://hackerworkspace.com/article/fbi-links-signal-phishing-attacks-to-russian-intelligence-services

    #encryption #cybersecurity #threatintelligence

    Uncategorized encryption cybersecurity threatintellige

  • How agentic AI is rewriting the rules for logistics providers | Google Cloud Blog
    hackerworkspace@infosec.exchangeH hackerworkspace@infosec.exchange

    How agentic AI is rewriting the rules for logistics providers | Google Cloud Blog

    https://cloud.google.com/transform/how-agentic-ai-is-rewriting-the-rules-for-logistics-providers

    Short summary: https://hackerworkspace.com/article/how-agentic-ai-is-rewriting-the-rules-for-logistics-providers-google-cloud-blog

    #compliance #threatintelligence #aisecurity

    Uncategorized compliance threatintellige aisecurity

  • RAXE-2026-040: Claude Code Workspace Trust Dialog Bypass via Repository Settings (CVE-2026-33068) | RAXE Labs
    hackerworkspace@infosec.exchangeH hackerworkspace@infosec.exchange

    RAXE-2026-040: Claude Code Workspace Trust Dialog Bypass via Repository Settings (CVE-2026-33068) | RAXE Labs

    https://raxe.ai/labs/advisories/RAXE-2026-040

    Short summary: https://hackerworkspace.com/article/raxe-2026-040-claude-code-workspace-trust-dialog-bypass-via-repository-settings-cve-2026-33068-raxe-labs

    #cybersecurity #vulnerability #exploit

    Uncategorized cybersecurity vulnerability exploit

  • FBI, CISA issue PSA on Russian intelligence campaign to target messaging apps
    hackerworkspace@infosec.exchangeH hackerworkspace@infosec.exchange

    FBI, CISA issue PSA on Russian intelligence campaign to target messaging apps

    https://cyberscoop.com/fbi-cisa-issue-psa-on-russian-intelligence-campaign-to-target-messaging-apps/

    Short summary: https://hackerworkspace.com/article/fbi-cisa-issue-psa-on-russian-intelligence-campaign-to-target-messaging-apps

    #encryption #cybersecurity #threatintelligence

    Uncategorized encryption cybersecurity threatintellige

  • I'm your worst nightmare
    hackerworkspace@infosec.exchangeH hackerworkspace@infosec.exchange

    I'm your worst nightmare

    https://www.youtube.com/watch?v=1h71dcnsxDo

    #cybersecurity #threatintelligence #vulnerability

    Uncategorized cybersecurity threatintellige vulnerability

  • I'm very sorry to be stopping you from what you're doing, but Joe is back!
    hackerworkspace@infosec.exchangeH hackerworkspace@infosec.exchange

    I'm very sorry to be stopping you from what you're doing, but Joe is back!

    https://www.youtube.com/watch?v=TGmGiN5Pa48

    #cybersecurity #vulnerability #blockchain

    Uncategorized cybersecurity vulnerability blockchain

  • Accidental Engineer: Building My First Hardware Tool the Hard Way
    hackerworkspace@infosec.exchangeH hackerworkspace@infosec.exchange

    Accidental Engineer: Building My First Hardware Tool the Hard Way

    https://bishopfox.com/blog/accidental-engineer-building-my-first-hardware-tool-the-hard-way

    Short summary: https://hackerworkspace.com/article/accidental-engineer-building-my-first-hardware-tool-the-hard-way

    #hacking #diy #electronics

    Uncategorized hacking diy electronics

  • Betterleaks, a new open-source secrets scanner to replace Gitleaks
    hackerworkspace@infosec.exchangeH hackerworkspace@infosec.exchange

    Betterleaks, a new open-source secrets scanner to replace Gitleaks

    https://www.bleepingcomputer.com/news/security/betterleaks-a-new-open-source-secrets-scanner-to-replace-gitleaks/

    Short summary: https://hackerworkspace.com/article/betterleaks-a-new-open-source-secrets-scanner-to-replace-gitleaks

    #cybersecurity #aisecurity #vulnerability

    Uncategorized cybersecurity aisecurity vulnerability

  • How Hackers Practice: Building Your Own Vulnerable AD Environment with Vulnerable-AD 2026
    hackerworkspace@infosec.exchangeH hackerworkspace@infosec.exchange

    How Hackers Practice: Building Your Own Vulnerable AD Environment with Vulnerable-AD 2026

    - YouTube

    Auf YouTube findest du die angesagtesten Videos und Tracks. Außerdem kannst du eigene Inhalte hochladen und mit Freunden oder gleich der ganzen Welt teilen.

    favicon

    (www.youtube.com)

    #cybersecurity #vulnerability #penetrationtesting

    Uncategorized cybersecurity vulnerability penetrationtest

  • Build your own AI Malware Analysis Lab with Remnux
    hackerworkspace@infosec.exchangeH hackerworkspace@infosec.exchange

    Build your own AI Malware Analysis Lab with Remnux

    https://www.youtube.com/watch?v=YOduz8VIvvw

    #malware #cybersecurity

    Uncategorized malware cybersecurity
  • Login

  • Login or register to search.
  • First post
    Last post
0
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups