PROTECTSTAR ✪ (@protectstar) 's Twitter Profile
PROTECTSTAR ✪

@protectstar

Empower your digital freedom with Protectstar: AV-TEST & DEKRA certified. 8M+ trust iShredder™, Anti Spy, Antivirus AI. AI Excellence Award. #ShapingSecurity

ID: 80857634

linkhttps://www.protectstar.com calendar_today08-10-2009 14:14:20

17,17K Tweet

3,3K Takipçi

1,1K Takip Edilen

The Hacker News (@thehackersnews) 's Twitter Profile Photo

🚨 Hackers found a new way to phish — through browser notifications. A new tool called Matrix Push C2 lets attackers send fake alerts that look like real ones from PayPal, Netflix, or TikTok. No downloads. No malware file. Just one click — and your data’s theirs. Learn more ↓

🚨 Hackers found a new way to phish — through browser notifications.

A new tool called Matrix Push C2 lets attackers send fake alerts that look like real ones from PayPal, Netflix, or TikTok.

No downloads. No malware file. Just one click — and your data’s theirs.

Learn more ↓
The Hacker News (@thehackersnews) 's Twitter Profile Photo

🚨 China’s hacker group APT31 broke into Russia’s IT companies — and stayed hidden for almost two years. They used Yandex Cloud, OneDrive, and even social media to steal data without raising alarms. Some attacks ran on holidays when no one was watching. Details ↓

🚨 China’s hacker group APT31 broke into Russia’s IT companies — and stayed hidden for almost two years.

They used Yandex Cloud, OneDrive, and even social media to steal data without raising alarms.

Some attacks ran on holidays when no one was watching.

Details ↓
Cyber Security News (@the_cyber_news) 's Twitter Profile Photo

🚨 Hackers Leveraging WhatsApp to Silently Install Malware to Steal Logs and Contact Details Source: cybersecuritynews.com/hackers-levera… A new malware campaign targeting Brazilian users has emerged, using WhatsApp as its primary distribution channel to spread banking trojans and harvest

🚨 Hackers Leveraging WhatsApp to Silently Install Malware to Steal Logs and Contact Details 

Source: cybersecuritynews.com/hackers-levera…

A new malware campaign targeting Brazilian users has emerged, using WhatsApp as its primary distribution channel to spread banking trojans and harvest
The Hacker News (@thehackersnews) 's Twitter Profile Photo

🚨 WARNING: Over 80,000 files with passwords and keys from governments, banks, and tech firms were found online — all pasted into public code tools like JSONFormatter and CodeBeautify. Hackers are already scraping and using the data. And yes — it’s still live. Details here →

🚨 WARNING: Over 80,000 files with passwords and keys from governments, banks, and tech firms were found online — all pasted into public code tools like JSONFormatter and CodeBeautify.

Hackers are already scraping and using the data.
And yes — it’s still live.

Details here →
International Cyber Digest (@intcyberdigest) 's Twitter Profile Photo

‼️ Secret Chinese documents have been leaked, revealing their internal cyberwarfare training program. The documents show a focus on products from Cisco, Fortinet, WatchGuard, and Juniper as primary operational targets. China has built digital cyber ranges that allow operatives

‼️ Secret Chinese documents have been leaked, revealing their internal cyberwarfare training program.

The documents show a focus on products from Cisco, Fortinet, WatchGuard, and Juniper as primary operational targets.

China has built digital cyber ranges that allow operatives
Cyber Security News (@the_cyber_news) 's Twitter Profile Photo

⚠️ CISA Warns of Hackers Leveraging Commercial Spyware to Target Users of Signal & WhatsApp Source: cybersecuritynews.com/cisa-warns-of-… CISA warns of multiple cyber threat actors actively deploying this sophisticated malware to compromise users’ smartphones, using methods designed to

⚠️ CISA Warns of Hackers Leveraging Commercial Spyware to Target Users of Signal & WhatsApp 

Source: cybersecuritynews.com/cisa-warns-of-…

CISA warns of multiple cyber threat actors actively deploying this sophisticated malware to compromise users’ smartphones, using methods designed to
International Cyber Digest (@intcyberdigest) 's Twitter Profile Photo

‼️ A very important announcement from the GrapheneOS devs: GrapheneOS is being heavily targeted by the French state because we provide highly secure devices and won't include backdoors for law enforcement access. They're conflating us with companies selling closed source

‼️ A very important announcement from the GrapheneOS devs:

GrapheneOS is being heavily targeted by the French state because we provide highly secure devices and won't include backdoors for law enforcement access. They're conflating us with companies selling closed source
Cyber Security News (@the_cyber_news) 's Twitter Profile Photo

🚨 PoC Exploit Released For Outlook 0-Click Remote Code Execution Vulnerability Source: cybersecuritynews.com/outlook-remote… A Proof-of-Concept (PoC) exploit code has been released for a critical remote code execution (RCE) vulnerability in Microsoft Outlook, identified as CVE-2024-21413.

🚨 PoC Exploit Released For Outlook 0-Click Remote Code Execution Vulnerability 

Source: cybersecuritynews.com/outlook-remote…

A Proof-of-Concept (PoC) exploit code has been released for a critical remote code execution (RCE) vulnerability in Microsoft Outlook, identified as CVE-2024-21413.
PROTECTSTAR ✪ (@protectstar) 's Twitter Profile Photo

Mysteriöse Panne in RusslandPorsche-Autos bleiben wie "Ziegelsteine" liegen In Russland verzweifeln Hunderte Porsche-Besitzer: Ihre Autos springen plötzlich nicht mehr an. Werden sie gezielt per Satellit blockiert? t-online.de/nachrichten/pa…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

💻 ⚠️ Hackers are hiding inside Google Drive. Researchers found a Windows backdoor called NANOREMOTE that uses the Google Drive API to steal files and run commands. It even pretends to be Bitdefender software so it looks safe. Experts say it’s linked to a Chinese hacking group

💻 ⚠️ Hackers are hiding inside Google Drive.

Researchers found a Windows backdoor called NANOREMOTE that uses the Google Drive API to steal files and run commands.

It even pretends to be Bitdefender software so it looks safe.

Experts say it’s linked to a Chinese hacking group
Zero Day Engineering (@zerodaytraining) 's Twitter Profile Photo

🚨 0-Day Alert: Full-chain exploit for Apple Safari/WebKit in the wild (just patched) CVE-2025-43529: UaF in JSC Escape Analysis (RCE) CVE-2025-14174: Buffer Overflow in ANGLE (Sandbox Escape) ⚠️The sandbox escape bug is same as reported in Chrome last week

🚨 0-Day Alert: Full-chain exploit for Apple Safari/WebKit in the wild (just patched)

CVE-2025-43529: UaF in JSC Escape Analysis (RCE)
CVE-2025-14174: Buffer Overflow in ANGLE (Sandbox Escape)

⚠️The sandbox escape bug is same as reported in Chrome last week
The Hacker News (@thehackersnews) 's Twitter Profile Photo

🚨 WARNING: A “Featured” Chrome extension was silently copying everything users typed into ChatGPT and other AI tools. Prompts. Responses. Sent off-device by default after an auto-update. It even warned users about sharing sensitive info, while exporting the full chats itself.

🚨 WARNING: A “Featured” Chrome extension was silently copying everything users typed into ChatGPT and other AI tools.

Prompts. Responses. Sent off-device by default after an auto-update.

It even warned users about sharing sensitive info, while exporting the full chats itself.
PROTECTSTAR ✪ (@protectstar) 's Twitter Profile Photo

WhatsApp und Signal: Privatsphäre angreifbar, Tracker-Software verfügbar Die WhatsApp- und Signal-Messenger verraten Informationen über Nutzer durch Bestätigungs-Laufzeiten. Eine Einstellung hilft. heise.de/news/WhatsApp-…

PROTECTSTAR ✪ (@protectstar) 's Twitter Profile Photo

Pornhub-Premium-Nutzer: Cyberbande ShinyHunters droht mit Veröffentlichung Cyberkriminelle haben Daten von Pornhub-Premium-Nutzern gestohlen. Nun droht die Ransomware-Gang ShinyHunters mit Veröffentlichung. heise.de/news/Pornhub-P…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

🛑 WARNING: CVE-2025-20393 is rated 10.0, with no patch available. Cisco confirmed active exploitation of an AsyncOS zero-day by a China-linked APT. The flaw allows root-level command execution on affected email security appliances and enables attackers to establish

🛑 WARNING: CVE-2025-20393 is rated 10.0, with no patch available.

Cisco confirmed active exploitation of an AsyncOS zero-day by a China-linked APT.

The flaw allows root-level command execution on affected email security appliances and enables attackers to establish
Cyber Security News (@the_cyber_news) 's Twitter Profile Photo

🚨 Hackers Using PuTTY for Both Lateral Movement and Data Exfiltration Source: cybersecuritynews.com/putty-lateral-… Hackers are increasingly abusing the popular PuTTY SSH client for stealthy lateral movement and data exfiltration in compromised networks, leaving subtle forensic traces that

🚨 Hackers Using PuTTY for Both Lateral Movement and Data Exfiltration 

Source: cybersecuritynews.com/putty-lateral-…

Hackers are increasingly abusing the popular PuTTY SSH client for stealthy lateral movement and data exfiltration in compromised networks, leaving subtle forensic traces that
The Hacker News (@thehackersnews) 's Twitter Profile Photo

Fortinet confirms active exploitation of a FortiOS SSL VPN flaw that bypasses 2FA. CVE-2020-12812 lets attackers log in by changing the case of a username when LDAP is misconfigured. The bug can allow admin or VPN access without second-factor checks. 🔗 Read →

Fortinet confirms active exploitation of a FortiOS SSL VPN flaw that bypasses 2FA.

CVE-2020-12812 lets attackers log in by changing the case of a username when LDAP is misconfigured.

The bug can allow admin or VPN access without second-factor checks.

🔗 Read →
The Hacker News (@thehackersnews) 's Twitter Profile Photo

🛑 European hotels are facing a phishing campaign abusing Booking-com cancellation emails. Victims hit a fake site, see a fake blue screen, and are told to run a PowerShell “fix.” That installs DCRat via MSBuild.exe, sets Defender exclusions, and persists on the system. 🔗

🛑 European hotels are facing a phishing campaign abusing Booking-com cancellation emails.

Victims hit a fake site, see a fake blue screen, and are told to run a PowerShell “fix.” That installs DCRat via MSBuild.exe, sets Defender exclusions, and persists on the system.

🔗