Latest posts

All
fashion
lifestyle
sports
tech

Trending News

Popular

Nottinghamshire NHS trust used charity funds for leaving party
Cancer patients ‘warned for years’ about hospital water infections
Alzheimer’s finger-prick blood test could transform diagnosis, experts say
19th January – Threat Intelligence Report

19th January – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 19th January, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Spanish energy company Endesa has disclosed a data breach after unauthorized access to a commercial platform used to manage customer information. Media report attackers listed over 1 terabyte of data, including IBANs,…

Read More

The Race to Build the DeepSeek of Europe Is On

Against that backdrop, Europe’s reliance on American-made AI begins to look more and more like a liability. In a worst case scenario, though experts consider the possibility remote, the US could choose to withhold access to AI services and crucial digital infrastructure. More plausibly, the Trump administration could use Europe’s dependence as leverage as the…

Read More

How many states are there in the United States?

I’ve seen many API requests for different LLMs in the honeypot logs. Like this one: The prompt is always the same: “How many states are there in the United States?”. This is recon to find open LLMs. Not necessarily to exploit them, but to use them. Coincidentally, something similar has been reported in the news: “Hackers…

Read More

RPi-Jukebox-RFID 2.8.0 – Remote Command Execution

# Exploit Title: RPi-Jukebox-RFID 2.8.0 – Remote Code Execution # Date: 2025-09-25 # Exploit Author: Beatriz Fresno Naumova # Vendor Homepage: https://github.com/MiczFlor/RPi-Jukebox-RFID # Software Link: https://github.com/MiczFlor/RPi-Jukebox-RFID/releases/tag/v2.8.0 # Version: 2.8.0 # Tested on: Raspberry Pi OS with RPi-Jukebox-RFID v2.8.0 # CVE: CVE-2025-10327 # # Description: # This PoC demonstrates an OS command injection vulnerability in…

Read More

Siklu EtherHaul Series EH-8010 – Arbitrary File Upload

# Exploit Title: Siklu EtherHaul Series – Unauthenticated Arbitrary File Upload # Shodan Dork: “EH-8010” or “EH-1200″ # Date: 2025-08-02 # Exploit Author: semaja2 – Andrew James # Vendor Homepage: https://www.ceragon.com/products/siklu-by-ceragon # Software Link: ftp://ftp.bubakov.net/siklu/ # Version: EH-8010 and EH-1200 Firmware 7.4.0 – 10.7.3 # Tested on: Linux # CVE: CVE-2025-57176 # Blog: https://semaja2.net/2025/08/03/siklu-eh-unauth-arbitrary-file-upload/ …

Read More