Luca Bongiorni
@cyberantani
Need a seasoned ๐ฎ๐น#Hacker to setup a #CyberLab or #HackersDreamTeam for conducting Applied Security R&D or ProdSec activitiesโ๐๐Also on BSKY๐๐
ID: 495744568
http://cyberantani.bsky.social 18-02-2012 08:26:11
11,11K Tweet
6,6K Takipรงi
2 Takip Edilen
๐น๐๐๐๐๐ ๐ฌ๐๐๐๐๐๐๐๐๐๐๐ ๐๐ ๐ต๐๐๐๐๐ ๐ณ๐๐๐: ๐ช๐๐๐๐๐๐๐๐๐๐ ๐ช๐๐๐๐๐๐๐ ๐ฉ๐๐ ๐ ๐ฌ๐๐๐๐๐๐๐ ๐๐๐๐ ๐๐๐ ๐ฐ๐๐๐๐๐๐๐ ๐ Electric cars arenโt silent to hackers! At Black Hat Asia 2025 the PCA Cyber Security crew showed how 30
๐ธ๐๐๐๐๐บ๐๐๐๐: ๐บ๐๐๐๐๐๐ ๐๐ ๐ช๐๐๐๐๐ ๐๐๐๐๐ ๐๐ ๐น๐ช๐ฌ ๐จ๐๐๐๐๐ ๐ช๐๐๐๐ ๐๐ ๐ธ๐๐๐๐ ๐บ๐๐๐๐ ๐ 10 logic-flaws โ 1 click RCE! SafeBreach researchers dug into Googleโs new Quick Share file-transfer and found 10 vulnerabilities โ from silent
๐พ๐๐๐๐๐๐๐ ๐ฐ ๐ด๐๐ ๐น๐๐๐: ๐บ๐๐๐๐๐๐๐ ๐ฐ๐๐๐๐๐๐๐๐๐๐๐ ๐๐๐ ๐ฐ๐๐๐๐๐๐๐๐ ๐จ๐๐๐๐๐๐ ๐๐๐๐๐๐๐ ๐น๐๐๐๐๐๐ ๐จ๐๐๐๐๐๐๐๐๐ ๐ก What if a rogue base station could impersonate your trusted mobile networkโeven while roamingโand youโd
๐ด๐๐๐๐ ๐๐๐๐๐๐๐๐ ๐๐๐๐ ๐ช๐๐๐๐๐๐+: ๐จ๐๐๐๐๐๐๐๐ ๐๐๐ ๐ฌ๐๐๐๐๐๐๐๐๐ ๐พ๐๐๐ ๐๐๐ ๐ต๐ท๐ผ ๐ซ๐๐๐๐๐๐ ๐ง ๐ค AI PCs = New Attack Surface โ Copilot-ready laptops ship with dedicated NPUs and an all-new MCDM driver stack. Nicola Stauffer & Gรผrkan
๐ณ๐ณ๐ด4๐บ๐๐๐๐: ๐ซ๐๐๐๐๐๐๐๐๐๐ ๐๐๐ ๐ฌ๐๐๐๐๐๐๐๐๐ ๐น๐ช๐ฌ ๐ฝ๐๐๐๐๐๐๐๐๐๐๐๐๐๐ ๐๐ ๐น๐๐๐-๐พ๐๐๐๐ ๐ณ๐ณ๐ด-๐ฐ๐๐๐๐๐๐๐๐๐ ๐ญ๐๐๐๐๐๐๐๐๐ ๐๐๐ ๐จ๐๐๐ ๐ค Prompt injection โก๏ธ Remote Code Execution?! Tong Liu & Yuekang Li show that
๐บ๐๐๐๐๐๐๐๐๐: ๐ฉ๐๐๐๐๐๐๐ ๐ฉ๐๐๐๐๐๐๐๐ ๐บ๐๐๐๐๐๐๐ ๐จ๐๐๐๐๐๐ ๐บ๐๐๐๐๐ ๐จ๐๐๐๐๐๐๐๐ ๐ท๐๐๐๐๐๐ ๐ Silent takeover alert! - Stealtooth shows how an attacker can overwrite a deviceโs Bluetooth link-key without any pop-ups or PIN