eating lobster souls Part II: the supply chain (aka - backdooring the #1 downloaded clawdhub skill)
http://x.com/i/article/2015865556126367744
Courk's Blog – Breaking the Flash Encryption Feature of Espressif's Parts
https://courk.cc/breaking-flash-encryption-of-espressif-parts#breaking-flash-encryption-of-espressif-parts
HoneyMyte updates CoolClient backdoor, uses new data stealing tools | Securelist
https://securelist.com/honeymyte-updates-coolclient-uses-browser-stealers-and-scripts/118664/
Log in to X / X
https://x.com/iok
Known Exploited Vulnerabilities Catalog | CISA
https://go.dhs.gov/Z3Q
Rooting the TP-Link Tapo C200 Rev.5 | QTNKSR
https://quentinkaiser.be/security/2025/07/25/rooting-tapo-c200/
GitHub - allthingsida/idasql: IDA SQL - Interface with IDA in SQL via live virtual tables
https://github.com/allthingsida/idasql
hacking clawdbot and eating lobster souls
http://x.com/i/article/2015345595687583744
Nike investigates data breach after extortion gang leaks files
https://www.bleepingcomputer.com/news/security/nike-investigates-data-breach-after-extortion-gang-leaks-files/
Fortinet blocks exploited FortiCloud SSO zero day until patch is ready
https://www.bleepingcomputer.com/news/security/fortinet-blocks-exploited-forticloud-sso-zero-day-until-patch-is-ready/
Meta Is Blocking Links To ICE List on Facebook, Instagram, and Threads | WIRED
https://www.wired.com/story/meta-is-blocking-links-to-ice-list-on-facebook-instagram-and-threads/
Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for Active Exploitation
https://thehackernews.com/2026/01/microsoft-issues-emergency-patch-for.html
Bypassing Windows Administrator Protection - Project Zero
https://projectzero.google/2026/26/windows-administrator-protection.html
WinRAR path traversal flaw still exploited by numerous hackers
https://www.bleepingcomputer.com/news/security/winrar-path-traversal-flaw-still-exploited-by-numerous-hackers/
Microsoft Office Zero-day Vulnerability Actively Exploited in Attacks
https://cybersecuritynews.com/microsoft-office-zero-day-vulnerability-2/