11/17

Dutch police seizes 250 servers used by “bulletproof hosting” service

https://www.bleepingcomputer.com/news/security/dutch-police-seizes-250-servers-used-by-bulletproof-hosting-service/
Dutch police seizes 250 servers used by “bulletproof hosting” service

Indeterminism

https://www.computer.org/csdl/magazine/sp/2025/05/11204774/2aPD9aCBSyQ
Indeterminism

Microsoft: Windows bug blocks Microsoft 365 desktop app installs

https://www.bleepingcomputer.com/news/microsoft/microsoft-windows-bug-blocks-microsoft-365-desktop-app-installs/
Microsoft: Windows bug blocks Microsoft 365 desktop app installs

Dragon Breath Uses RONINGLOADER to Disable Security Tools and Deploy Gh0st RAT

https://thehackernews.com/2025/11/dragon-breath-uses-roningloader-to.html
Dragon Breath Uses RONINGLOADER to Disable Security Tools and Deploy Gh0st RAT

Binary Ninja - Binary Ninja 5.2 (Io)

https://binary.ninja/2025/11/13/binary-ninja-5.2-io.html
Binary Ninja - Binary Ninja 5.2 (Io)

New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT

https://thehackernews.com/2025/11/new-evalusion-clickfix-campaign.html
New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT

Unremovable Spyware on Samsung Devices Comes Pre-installed on Galaxy Series Devices

https://cybersecuritynews.com/spyware-on-samsung-devices/
Unremovable Spyware on Samsung Devices Comes Pre-installed on Galaxy Series Devices

ITOA: Image to ASCII Converter

https://itoa.hex.dance/
ITOA: Image to ASCII Converter

Microsoft: Azure hit by 15 Tbps DDoS attack using 500,000 IP addresses

https://www.bleepingcomputer.com/news/microsoft/microsoft-aisuru-botnet-used-500-000-ips-in-15-tbps-azure-ddos-attack/
Microsoft: Azure hit by 15 Tbps DDoS attack using 500,000 IP addresses

AI pentest scoping playbook | devansh

https://devansh.bearblog.dev/ai-pentest-scoping/
AI pentest scoping playbook | devansh

Pennsylvania AG confirms data breach after INC Ransom attack

https://www.bleepingcomputer.com/news/security/pennsylvania-ag-confirms-data-breach-after-inc-ransom-attack/
Pennsylvania AG confirms data breach after INC Ransom attack

Exploit Development: Building Your Own Fuzzer with BASH - Hackers Arise

https://hackers-arise.com/post/exploit-development-building-your-own-fuzzer-with-bash
Exploit Development: Building Your Own Fuzzer with BASH - Hackers Arise