Announcements
Anything
AskPoal
Funny
Gaming
Gifs
History
Introductions
News
Pics
Poaldev
Politics
Science
Strange
technology
TheLobby
TIL
Videos
Search is disabled.
You have to level up first.
link
text
poll
JavaScript is disabled or this browser is too old
Nice Crocs!
JavaScript is disabled or this browser is too old
ALL
cybersecurity
HOT
NEW
POP
TOP
ALL
cybersecurity
HOT
NEW
POP
TOP
Log in
Register
Donate
Welcome
•
User Guide
ToS
•
Privacy
•
Canary
Donate
•
Bugs
•
License
©2025 Poal.co
ᐊ
page 2
ᐅ
453
•
Malware Now Uses AI During Execution to Mutate and Collect Data, Google Warns
649
•
Leaker reveals which Pixels are vulnerable to Cellebrite phone hacking
509
•
Ex-L3Harris exec guilty of selling cyber exploits to Russian broker
98
•
Any updates on the npm 'supply chain' hack?
2
528
•
Hackers exploit 34 zero-days on first day of Pwn2Own Ireland
1.4K
•
GlassWorm: First Self-Propagating Worm Using Invisible Code Hits OpenVSX Marketplace
921
•
How I Almost Got Hacked By A 'Job Interview'
1.5K
•
F5 says hackers stole undisclosed BIG-IP flaws, source code
413
•
Satellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Data
168
•
Secure Boot bypass risk threatens nearly 200,000 Linux Framework laptops
2
1.1K
•
Hackers leak Qantas data containing 5 million customer records after ransom deadline passes
3
896
•
SonicWall data breach affects all cloud backup customers (All customer configs leaked)
2
1.1K
•
NSFW
File this in the No Shit Category: OpenAI Finds Growing Exploitation of AI Tools by Foreign Threat Groups
3
101
•
Redis warns of critical flaw impacting thousands of instances
1.5K
•
Who Owns Express VPN, Nord, Surfshark? VPN Relationships Explained
1
1.1K
•
October 2025 – CVE-2025-11230: denial of service vulnerability in HAProxy mjson library
790
•
Motion sensors in high-performance mice can be used as a microphone to spy on users, thanks to AI — Mic-E-Mouse technique harnesses mouse sensors, converts acoustic vibrations into speech
107
•
CVE-2025-59489 Unity Runtime before 2025-10-02 on Android, Windows, macOS, Linux (argument injection that can result in loading of library code from an unintended location)
987
•
Ghost in the Cloud: Weaponizing AWS X-Ray for Command & Control
103
•
Red Hat Investigating Breach Impacting as Many as 28,000 Customers, Including the Navy and Congress
667
•
NSFW
DNS Paranoia: Subversive DNS Testing
1.4K
•
'Delightful' root-access bug in Red Hat OpenShift AI allows full cluster takeover
304
•
Broadcom Fails to Disclose Zero-Day Exploitation of VMware Vulnerability
534
•
Button Presses to Wireless RCE: Shell on Flock Safety’s License Plate Cameras Over Wi-Fi
561
•
Zeroday.cloud – the first cloud open-source hacking competition
ᐊ
page 2
ᐅ
/s/cybersecurity
created
ago