Announcements
Anything
AskPoal
Funny
Gaming
Gifs
History
Introductions
News
Pics
Poaldev
Politics
Science
Strange
technology
TheLobby
TIL
Videos
Search is disabled.
You have to level up first.
link
text
poll
JavaScript is disabled or this browser is too old
Have your say
JavaScript is disabled or this browser is too old
ALL
cybersecurity
HOT
NEW
POP
TOP
ALL
cybersecurity
HOT
NEW
POP
TOP
Log in
Register
Donate
Welcome
•
User Guide
ToS
•
Privacy
•
Canary
Donate
•
Bugs
•
License
©2026 Poal.co
ᐊ
page 5
ᐅ
995
•
Ex-L3Harris exec guilty of selling cyber exploits to Russian broker
1.0K
•
Any updates on the npm 'supply chain' hack?
2
342
•
Hackers exploit 34 zero-days on first day of Pwn2Own Ireland
779
•
GlassWorm: First Self-Propagating Worm Using Invisible Code Hits OpenVSX Marketplace
674
•
How I Almost Got Hacked By A 'Job Interview'
954
•
F5 says hackers stole undisclosed BIG-IP flaws, source code
266
•
Satellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Data
918
•
Secure Boot bypass risk threatens nearly 200,000 Linux Framework laptops
2
792
•
Hackers leak Qantas data containing 5 million customer records after ransom deadline passes
3
685
•
SonicWall data breach affects all cloud backup customers (All customer configs leaked)
2
767
•
NSFW
File this in the No Shit Category: OpenAI Finds Growing Exploitation of AI Tools by Foreign Threat Groups
3
1.0K
•
Redis warns of critical flaw impacting thousands of instances
551
•
Who Owns Express VPN, Nord, Surfshark? VPN Relationships Explained
1
715
•
October 2025 – CVE-2025-11230: denial of service vulnerability in HAProxy mjson library
1.4K
•
Motion sensors in high-performance mice can be used as a microphone to spy on users, thanks to AI — Mic-E-Mouse technique harnesses mouse sensors, converts acoustic vibrations into speech
1.1K
•
CVE-2025-59489 Unity Runtime before 2025-10-02 on Android, Windows, macOS, Linux (argument injection that can result in loading of library code from an unintended location)
1.2K
•
Ghost in the Cloud: Weaponizing AWS X-Ray for Command & Control
794
•
Red Hat Investigating Breach Impacting as Many as 28,000 Customers, Including the Navy and Congress
844
•
NSFW
DNS Paranoia: Subversive DNS Testing
1.1K
•
'Delightful' root-access bug in Red Hat OpenShift AI allows full cluster takeover
882
•
Broadcom Fails to Disclose Zero-Day Exploitation of VMware Vulnerability
1.0K
•
Button Presses to Wireless RCE: Shell on Flock Safety’s License Plate Cameras Over Wi-Fi
637
•
Zeroday.cloud – the first cloud open-source hacking competition
544
•
Inside the Jaguar Land Rover hack: stalled smart factories, outsourced cybersecurity and supply chain woes
296
•
Supermicro server motherboards can be infected with unremovable malware
3
ᐊ
page 5
ᐅ
/s/cybersecurity
created
ago