Announcements
Anything
AskPoal
Funny
Gaming
Gifs
History
Introductions
News
Pics
Poaldev
Politics
Science
Strange
technology
TheLobby
TIL
Videos
Search is disabled.
You have to level up first.
link
text
poll
JavaScript is disabled or this browser is too old
Are you lost?
JavaScript is disabled or this browser is too old
ALL
cybersecurity
HOT
NEW
POP
TOP
ALL
cybersecurity
HOT
NEW
POP
TOP
Log in
Register
Donate
Welcome
•
User Guide
ToS
•
Privacy
•
Canary
Donate
•
Bugs
•
License
©2025 Poal.co
ᐊ
page 2
ᐅ
1.3K
•
Ex-L3Harris exec guilty of selling cyber exploits to Russian broker
614
•
Any updates on the npm 'supply chain' hack?
2
997
•
Hackers exploit 34 zero-days on first day of Pwn2Own Ireland
503
•
GlassWorm: First Self-Propagating Worm Using Invisible Code Hits OpenVSX Marketplace
177
•
How I Almost Got Hacked By A 'Job Interview'
1.5K
•
F5 says hackers stole undisclosed BIG-IP flaws, source code
234
•
Satellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Data
1.2K
•
Secure Boot bypass risk threatens nearly 200,000 Linux Framework laptops
2
173
•
Hackers leak Qantas data containing 5 million customer records after ransom deadline passes
3
826
•
SonicWall data breach affects all cloud backup customers (All customer configs leaked)
2
447
•
NSFW
File this in the No Shit Category: OpenAI Finds Growing Exploitation of AI Tools by Foreign Threat Groups
3
1.2K
•
Redis warns of critical flaw impacting thousands of instances
893
•
Who Owns Express VPN, Nord, Surfshark? VPN Relationships Explained
1
152
•
October 2025 – CVE-2025-11230: denial of service vulnerability in HAProxy mjson library
218
•
Motion sensors in high-performance mice can be used as a microphone to spy on users, thanks to AI — Mic-E-Mouse technique harnesses mouse sensors, converts acoustic vibrations into speech
302
•
CVE-2025-59489 Unity Runtime before 2025-10-02 on Android, Windows, macOS, Linux (argument injection that can result in loading of library code from an unintended location)
90
•
Ghost in the Cloud: Weaponizing AWS X-Ray for Command & Control
1.0K
•
Red Hat Investigating Breach Impacting as Many as 28,000 Customers, Including the Navy and Congress
289
•
NSFW
DNS Paranoia: Subversive DNS Testing
712
•
'Delightful' root-access bug in Red Hat OpenShift AI allows full cluster takeover
995
•
Broadcom Fails to Disclose Zero-Day Exploitation of VMware Vulnerability
150
•
Button Presses to Wireless RCE: Shell on Flock Safety’s License Plate Cameras Over Wi-Fi
796
•
Zeroday.cloud – the first cloud open-source hacking competition
1.2K
•
Inside the Jaguar Land Rover hack: stalled smart factories, outsourced cybersecurity and supply chain woes
814
•
Supermicro server motherboards can be infected with unremovable malware
3
ᐊ
page 2
ᐅ
/s/cybersecurity
created
ago