Angry CPU (@angrycpu) 's Twitter Profile
Angry CPU

@angrycpu

Computer Information Technology Geek; Networking and Security, IT Admin. Forensics are most interesting; unique.Malware St4lk3r

ID: 84235436

calendar_today22-10-2009 03:59:15

40,40K Tweet

7,7K Followers

8,8K Following

BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

Chinese hackers target Russian govt with upgraded RAT malware - Sergiu Gatlan bleepingcomputer.com/news/security/… bleepingcomputer.com/news/security/…

DEF CON (@defcon) 's Twitter Profile Photo

We sense a disturbance in the force…registration is open for #DEFCONTraining Las Vegas 2025! Whether you’re a Rebel Red Teamer or a True Blue Defender, there is training for all, from any world in the galaxy! Pack up your droids and join us in Vegas! Register today and take

0b1d1 (@_0b1d1) 's Twitter Profile Photo

🔍 NetScan Pro - Network Discovery & Security Tool NetScan Pro is a Bash-based network scanning tool for admins, security pros, and IT enthusiasts, offering interactive, color-coded, and user-friendly command-line reconnaissance features. ⤵️⤵️

The Hacker News (@thehackersnews) 's Twitter Profile Photo

🚨 Zero-click. Wormable. Network-spreading. New flaws in Apple’s AirPlay protocol (🔓 AirBorne) could let hackers hijack your device without a click—then ride your Wi-Fi into corporate networks. CVE-2025-24252 + CVE-2025-24132 = silent RCE across Macs, TVs, speakers. Just being

🚨 Zero-click. Wormable. Network-spreading.

New flaws in Apple’s AirPlay protocol (🔓 AirBorne) could let hackers hijack your device without a click—then ride your Wi-Fi into corporate networks.

CVE-2025-24252 + CVE-2025-24132 = silent RCE across Macs, TVs, speakers. Just being
BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

Education giant Pearson hit by cyberattack exposing customer data - Lawrence Abrams bleepingcomputer.com/news/security/… bleepingcomputer.com/news/security/…

BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

FBI: End-of-life routers hacked for cybercrime proxy networks - Bill Toulas bleepingcomputer.com/news/security/… bleepingcomputer.com/news/security/…

BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

New Intel CPU flaws leak sensitive data from privileged memory - Bill Toulas bleepingcomputer.com/news/security/… bleepingcomputer.com/news/security/…

BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

Hackers behind UK retail attacks now targeting US companies - Sergiu Gatlan bleepingcomputer.com/news/security/… bleepingcomputer.com/news/security/…

BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

New Linux udisks flaw lets attackers get root on major Linux distros - Sergiu Gatlan bleepingcomputer.com/news/linux/new… bleepingcomputer.com/news/linux/new…

Linux Inside: The Ideal Blog for Sysadmins & Geeks (@tecmint) 's Twitter Profile Photo

Google’s Gemini CLI is here, and it’s a game-changer for DevOps, sysadmins, and #Linux pros. → 1,000 free AI requests per day → Directly in your terminal Use it to debug code, automate tasks, generate content, and more without leaving the CLI. pro.tecmint.com/blog/install-g…

BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

Malicious extensions with 1.7M installs found on Chrome Web Store - Bill Toulas bleepingcomputer.com/news/security/… bleepingcomputer.com/news/security/…

Linux Inside: The Ideal Blog for Sysadmins & Geeks (@tecmint) 's Twitter Profile Photo

Master Nmap for Network Security with 24 Practical Commands! From scanning open ports to detecting firewalls, this guide has you covered. 👉 tecmint.com/nmap-command-e… Follow Linux Inside: The Ideal Blog for Sysadmins & Geeks for more #Linux tips.

LetsDefend (@letsdefendio) 's Twitter Profile Photo

Mandrake Spyware Mandrake spyware is a sophisticated Android malware that infiltrates devices via disguised apps, then stealthily collects data, tracks location, intercepts SMS/calls, and evades detection using advanced obfuscation and environment checks 🛠️ Type: DFIR 💪

Mandrake Spyware

Mandrake spyware is a sophisticated Android malware that infiltrates devices via disguised apps, then stealthily collects data, tracks location, intercepts SMS/calls, and evades detection using advanced obfuscation and environment checks 

🛠️ Type: DFIR
💪