Image 1 The United States Has Gone Full Idiocracy

Posted: 2025/02/11
Source: Gizmodo
Tag(s): Backdoor, Government, USA, Headline, Twitter
Image 1 Alabama Man Pleads Guilty to Hacking SEC's X Account

Posted: 2025/02/11
Source: Security Week
Tag(s): Government, Hacker, USA, Headline, Twitter
Image 1 8base Ransomware Site Seized, 4 Suspects Arrested

Posted: 2025/02/11
Source: SC Magazine
Tag(s): Cryptography, Cybercrime, Hacker, Malware, Headline, Germany
Image 1 Next-Level Brute Force Attack Uses 2 Million IPs to Target VPNs

Posted: 2025/02/11
Source: SC Magazine
Tag(s): Cryptography, Hacker, Password, Headline, Flaw
Image 1 Revelations of Israeil Spyware Abuse Raise Fears over Possible Use by Trump

Posted: 2025/02/11
Source: The Guardian
Tag(s): Fraud, Government, Israel, Malware, Phone, Privacy, Spyware, USA, Headline, Apple
Image 1 Apple Warns Extremely Sophisticated Attack May Be Targeting iThings

Posted: 2025/02/11
Source: The Register
Tag(s): Apple, Flaw, Headline, Patch
Image 1 Russian Military Hackers Deploy Malicious Windows Activators in Ukraine

Posted: 2025/02/11
Source: Bleeping Computer
Tag(s): Cyberwar, Government, Military, Russia, Ukraine, Headline, Malware
Image 1 Cyberattacks Targeting Medical Organizations up 32% in 2024

Posted: 2025/02/11
Source: SC Magazine
Tag(s): Data Loss, Hacker, Malware, Privacy, Headline, Denial of Service
Image 1 Intel Patched 374 Vulnerabilities in 2024

Posted: 2025/02/11
Source: Security Week
Tag(s): Flaw, Patch, Headline, Intel
Image 1 HPE Says Personal Information Stolen in 2023 Russian Hack

Posted: 2025/02/10
Source: Security Week
Tag(s): Data Loss, Hacker, Privacy, Headline, Russia
Image 1 The United States Has Gone Full Idiocracy

Posted: 2025/02/11
Source: Gizmodo
Tag(s): Backdoor, Government, USA, Headline, Twitter
Image 1 Alabama Man Pleads Guilty to Hacking SEC's X Account

Posted: 2025/02/11
Source: Security Week
Tag(s): Government, Hacker, USA, Headline, Twitter
Image 1 8base Ransomware Site Seized, 4 Suspects Arrested

Posted: 2025/02/11
Source: SC Magazine
Tag(s): Cryptography, Cybercrime, Hacker, Malware, Headline, Germany
Image 1 Next-Level Brute Force Attack Uses 2 Million IPs to Target VPNs

Posted: 2025/02/11
Source: SC Magazine
Tag(s): Cryptography, Hacker, Password, Headline, Flaw
Image 1 Revelations of Israeil Spyware Abuse Raise Fears over Possible Use by Trump

Posted: 2025/02/11
Source: The Guardian
Tag(s): Fraud, Government, Israel, Malware, Phone, Privacy, Spyware, USA, Headline, Apple
Image 1 Apple Warns Extremely Sophisticated Attack May Be Targeting iThings

Posted: 2025/02/11
Source: The Register
Tag(s): Apple, Flaw, Headline, Patch
Image 1 Russian Military Hackers Deploy Malicious Windows Activators in Ukraine

Posted: 2025/02/11
Source: Bleeping Computer
Tag(s): Cyberwar, Government, Military, Russia, Ukraine, Headline, Malware
Image 1 Cyberattacks Targeting Medical Organizations up 32% in 2024

Posted: 2025/02/11
Source: SC Magazine
Tag(s): Data Loss, Hacker, Malware, Privacy, Headline, Denial of Service
Image 1 Intel Patched 374 Vulnerabilities in 2024

Posted: 2025/02/11
Source: Security Week
Tag(s): Flaw, Patch, Headline, Intel
Image 1 HPE Says Personal Information Stolen in 2023 Russian Hack

Posted: 2025/02/10
Source: Security Week
Tag(s): Data Loss, Hacker, Privacy, Headline, Russia

Storm Watch ()

2025-02-11: 9 news articles added
2025-02-11: 74 files added
2025-01-22: 1 voting poll added

2025-02-05 (1738713600)

Popularity can be a curse. Currently debugging a memory leak of about 750 bytes per request on average which leads to many gigs of ram leaking over about 12 hours. You may see 404s occasionally as the daemons are restarted while debugging. Yay overly complicated massive dependency-requiring frameworks with a million moving layers. Maybe a rewrite of the code base in awk tied to a raw openssl binding on tcp/443 will calm the nerves. It certainly would be easier to debug.


2025-01-29 (1738108800)

Thanks to sizzles for pointing out a few minor error conditions based on forms. They have been addressed.

...
[ View Full Changelog ]


Polls ()

The security industry loves labeling people with hats as though life and security is black and white. Packet Storm feels this is a bit silly but some people take their hat very seriously.


What sort of hat do you wear most?

AnswersResults
White hat - I only hack for the good of humanity.20%
Gray hat - I understand there's a balance to learning.50%
Black hat - I enjoy crime and the prospect of prison.0%
Red hat - I'm just a Linux System Administrator.0%
Top hat - Why don't we bring back top hats? They used to be a thing.10%
I don't wear hats because my hair rocks.20%
Storm Watch ()

2025-02-11: 9 news articles added
2025-02-11: 74 files added
2025-01-22: 1 voting poll added

2025-02-05 (1738713600)

Popularity can be a curse. Currently debugging a memory leak of about 750 bytes per request on average which leads to many gigs of ram leaking over about 12 hours. You may see 404s occasionally as the daemons are restarted while debugging. Yay overly complicated massive dependency-requiring frameworks with a million moving layers. Maybe a rewrite of the code base in awk tied to a raw openssl binding on tcp/443 will calm the nerves. It certainly would be easier to debug.


2025-01-29 (1738108800)

Thanks to sizzles for pointing out a few minor error conditions based on forms. They have been addressed.

...
[ View Full Changelog ]
Polls ()

The security industry loves labeling people with hats as though life and security is black and white. Packet Storm feels this is a bit silly but some people take their hat very seriously.


What sort of hat do you wear most?

AnswersResults
White hat - I only hack for the good of humanity.20%
Gray hat - I understand there's a balance to learning.50%
Black hat - I enjoy crime and the prospect of prison.0%
Red hat - I'm just a Linux System Administrator.0%
Top hat - Why don't we bring back top hats? They used to be a thing.10%
I don't wear hats because my hair rocks.20%
 About | Terms | Copyright | Privacy | BlueSky | X | Mastodon
 © 2024 - 2025
All Rights Reserved Packet Storm Security, LLC
Hosting provided by: RokaSecurity