Announcements
Anything
AskPoal
Funny
Gaming
Gifs
History
Introductions
News
Pics
Poaldev
Politics
Science
Strange
technology
TheLobby
TIL
Videos
Search is disabled.
You have to level up first.
link
text
poll
JavaScript is disabled or this browser is too old
Motivation & a lot of coffee
JavaScript is disabled or this browser is too old
ALL
cybersecurity
HOT
NEW
POP
TOP
ALL
cybersecurity
HOT
NEW
POP
TOP
Log in
Register
Donate
Welcome
•
User Guide
ToS
•
Privacy
•
Canary
Donate
•
Bugs
•
License
©2025 Poal.co
ᐊ
page 2
ᐅ
982
•
Ex-L3Harris exec guilty of selling cyber exploits to Russian broker
1.1K
•
Any updates on the npm 'supply chain' hack?
2
652
•
Hackers exploit 34 zero-days on first day of Pwn2Own Ireland
950
•
GlassWorm: First Self-Propagating Worm Using Invisible Code Hits OpenVSX Marketplace
1.4K
•
F5 says hackers stole undisclosed BIG-IP flaws, source code
1.2K
•
How I Almost Got Hacked By A 'Job Interview'
393
•
Secure Boot bypass risk threatens nearly 200,000 Linux Framework laptops
2
239
•
Satellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Data
749
•
Hackers leak Qantas data containing 5 million customer records after ransom deadline passes
3
926
•
SonicWall data breach affects all cloud backup customers (All customer configs leaked)
2
558
•
NSFW
File this in the No Shit Category: OpenAI Finds Growing Exploitation of AI Tools by Foreign Threat Groups
3
332
•
Redis warns of critical flaw impacting thousands of instances
376
•
Who Owns Express VPN, Nord, Surfshark? VPN Relationships Explained
1
1.2K
•
October 2025 – CVE-2025-11230: denial of service vulnerability in HAProxy mjson library
455
•
Motion sensors in high-performance mice can be used as a microphone to spy on users, thanks to AI — Mic-E-Mouse technique harnesses mouse sensors, converts acoustic vibrations into speech
320
•
Ghost in the Cloud: Weaponizing AWS X-Ray for Command & Control
210
•
CVE-2025-59489 Unity Runtime before 2025-10-02 on Android, Windows, macOS, Linux (argument injection that can result in loading of library code from an unintended location)
793
•
Red Hat Investigating Breach Impacting as Many as 28,000 Customers, Including the Navy and Congress
498
•
NSFW
DNS Paranoia: Subversive DNS Testing
1.0K
•
'Delightful' root-access bug in Red Hat OpenShift AI allows full cluster takeover
162
•
Broadcom Fails to Disclose Zero-Day Exploitation of VMware Vulnerability
472
•
Zeroday.cloud – the first cloud open-source hacking competition
431
•
Button Presses to Wireless RCE: Shell on Flock Safety’s License Plate Cameras Over Wi-Fi
1.0K
•
Inside the Jaguar Land Rover hack: stalled smart factories, outsourced cybersecurity and supply chain woes
778
•
Supermicro server motherboards can be infected with unremovable malware
3
ᐊ
page 2
ᐅ
/s/cybersecurity
created
ago