<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Hacklido Weekly]]></title><description><![CDATA[A free weekly cybersecurity newsletter.]]></description><link>https://hacklido.substack.com</link><image><url>https://substackcdn.com/image/fetch/$s_!l4g7!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F621abe85-20bb-45d9-af2a-068f2e2fbefe_512x512.png</url><title>Hacklido Weekly</title><link>https://hacklido.substack.com</link></image><generator>Substack</generator><lastBuildDate>Sun, 05 Apr 2026 20:14:10 GMT</lastBuildDate><atom:link href="https://hacklido.substack.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Hacklido]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[hacklido@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[hacklido@substack.com]]></itunes:email><itunes:name><![CDATA[Hacklido]]></itunes:name></itunes:owner><itunes:author><![CDATA[Hacklido]]></itunes:author><googleplay:owner><![CDATA[hacklido@substack.com]]></googleplay:owner><googleplay:email><![CDATA[hacklido@substack.com]]></googleplay:email><googleplay:author><![CDATA[Hacklido]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[HACKLIDO | Cyber Security Weekly Updates]]></title><description><![CDATA[The cyber security world moved fast this week, with major discussions around phishing, incident response, malware campaigns, data breaches, cloud forensics, insider threats, and government-led cyber d]]></description><link>https://hacklido.substack.com/p/hacklido-cyber-security-weekly-updates</link><guid isPermaLink="false">https://hacklido.substack.com/p/hacklido-cyber-security-weekly-updates</guid><dc:creator><![CDATA[Rahul Yadav]]></dc:creator><pubDate>Tue, 24 Mar 2026 04:10:38 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!l4g7!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F621abe85-20bb-45d9-af2a-068f2e2fbefe_512x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>HACKLIDO | Cyber Security Weekly Updates</h1><p>The cyber security world moved fast this week, with major discussions around phishing, incident response, malware campaigns, data breaches, cloud forensics, insider threats, and government-led cyber directives. Alongside technical explainers, several important news stories highlighted how attackers are evolving their methods and how defenders need to respond faster than ever.</p><p>This week&#8217;s updates cover both <strong>practical learning topics</strong> and <strong>important cyber news</strong>, making it useful for students, researchers, SOC analysts, and anyone building a career in cyber security.</p><h2>Training Recommendation</h2><p>If you are looking for <strong>cyber security training with AI-powered learning and AI security-focused concepts</strong> at an affordable price, you can check out:</p><p><strong>Techonquer Diploma Program</strong><br><a href="https://techonquer.org/diploma">https://techonquer.org/diploma</a></p><div><hr></div><h2>1. QR Code Hijacking and Quishing</h2><p>QR-code-based attacks are becoming more common because they feel harmless to users. In quishing attacks, the victim scans a malicious QR code that redirects them to phishing pages, fake payment portals, or credential-harvesting websites. Since people often trust QR codes more than suspicious emails, this method is proving highly effective.</p><p>Read more:<br><a href="https://hacklido.com/blog/1457-qr-code-hijacking-quishing">https://hacklido.com/blog/1457-qr-code-hijacking-quishing</a></p><h2>2. Smart Contract Hacking: Reentrancy Attacks Explained</h2><p>Reentrancy remains one of the most dangerous smart contract vulnerabilities. This attack happens when a malicious contract repeatedly calls back into a vulnerable contract before the original transaction is completed. The result can be unauthorized fund withdrawals or contract manipulation.</p><p>Read more:<br><a href="https://hacklido.com/blog/1458-smart-contract-hacking-reentrancy-attacks-explained">https://hacklido.com/blog/1458-smart-contract-hacking-reentrancy-attacks-explained</a></p><h2>3. Incident Response: The First Hour After a Cyber Attack</h2><p>The first hour after a cyber attack is often the most critical. Decisions taken during this phase can impact evidence preservation, containment, communication, and recovery. A good incident response process focuses on identifying the scope of compromise quickly while avoiding panic-driven mistakes.</p><p>Read more:<br><a href="https://hacklido.com/blog/1459-incident-response-what-happens-in-the-first-hour-after-a-cyber-attack">https://hacklido.com/blog/1459-incident-response-what-happens-in-the-first-hour-after-a-cyber-attack</a></p><h2>4. Breaking Base64: Understanding the Encoding Logic</h2><p>A deep technical breakdown explored how Base64 works from the ground up. Rather than treating it as a simple encoding method, the article walks through the 3-to-4 encoding mechanism and highlights hidden implementation pitfalls that many learners overlook.</p><p>Read more:<br><a href="https://hacklido.com/blog/1460-breaking-base64-rebuilding-the-3-to-4-encoding-logic-from-scratch-and-the-hidden-trap-i-found">https://hacklido.com/blog/1460-breaking-base64-rebuilding-the-3-to-4-encoding-logic-from-scratch-and-the-hidden-trap-i-found</a></p><h2>5. Logs in Cyber Security: Reading Digital Evidence</h2><p>Logs are one of the most important sources of digital evidence during investigations. Whether it is system logs, application logs, authentication records, or network events, investigators rely on logs to reconstruct attacker behavior and identify suspicious activity timelines.</p><p>Read more:<br><a href="https://hacklido.com/blog/1462-logs-in-cybersecurity-how-investigators-read-digital-evidence">https://hacklido.com/blog/1462-logs-in-cybersecurity-how-investigators-read-digital-evidence</a></p><h2>6. Becoming Better at Forensics Challenges</h2><p>Forensics challenges help build practical investigation skills. They train analysts to examine files, metadata, memory artifacts, deleted records, and hidden traces. The featured guide gives a starting point for anyone who wants to improve in solving digital forensics problems.</p><p>Read more:<br><a href="https://hacklido.com/blog/1461-how-to-become-a-pro-in-solving-forensics-challenges-part-1">https://hacklido.com/blog/1461-how-to-become-a-pro-in-solving-forensics-challenges-part-1</a></p><h2>7. Brute Force Attacks and How They Are Detected</h2><p>Brute force attacks remain simple but effective when weak passwords or poor account protections exist. Attackers try repeated credential combinations until they find a match. Investigators usually detect these attacks through abnormal login volumes, repeated failures, source IP patterns, and authentication log anomalies.</p><p>Read more:<br><a href="https://hacklido.com/blog/1463-brute-force-attacks-how-attackers-break-passwords-and-how-investigators-detect-them">https://hacklido.com/blog/1463-brute-force-attacks-how-attackers-break-passwords-and-how-investigators-detect-them</a></p><h2>8. Insider Threats: Risk from Within</h2><p>Not all threats come from outside the organization. Insider threats involve employees, contractors, or trusted users misusing access either intentionally or accidentally. These incidents are dangerous because insiders often already have the permissions needed to access sensitive systems and data.</p><p>Read more:<br><a href="https://hacklido.com/blog/1464-insider-threats-when-the-danger-comes-from-within">https://hacklido.com/blog/1464-insider-threats-when-the-danger-comes-from-within</a></p><h2>9. CISA&#8217;s SharePoint Deadline for CVE-2026-20963</h2><p>A major update this week involved CISA&#8217;s March 21 directive regarding SharePoint vulnerability CVE-2026-20963. Such orders highlight the urgency with which organizations are expected to patch or mitigate serious flaws, especially when the affected software is widely used in enterprise environments.</p><p>Read more:<br><a href="https://hacklido.com/news/deadline-day-cisa-s-march-21-order-for-sharepoint-cve-2026-20963">https://hacklido.com/news/deadline-day-cisa-s-march-21-order-for-sharepoint-cve-2026-20963</a></p><h2>10. India&#8217;s &#8220;3-Hour Rule&#8221; for Platforms</h2><p>India&#8217;s digital ecosystem saw attention around the so-called &#8220;3-hour rule,&#8221; which reportedly places strict expectations on platforms in responding to certain government or compliance-related actions. This reflects the growing intersection between cyber security, digital governance, and platform accountability.</p><p>Read more:<br><a href="https://hacklido.com/news/the-3-hour-rule-india-s-digital-blitz-mandatory-for-platforms">https://hacklido.com/news/the-3-hour-rule-india-s-digital-blitz-mandatory-for-platforms</a></p><h2>11. Data Breaches: How Investigators Find What Was Stolen</h2><p>When a breach happens, one of the first major questions is: what exactly was taken? Investigators examine exfiltration paths, logs, cloud activity, endpoint traces, archive files, and attacker tools to determine what data was accessed or stolen. This process is essential for impact assessment and regulatory reporting.</p><p>Read more:<br><a href="https://hacklido.com/blog/1465-data-breaches-how-investigators-find-out-what-was-stolen">https://hacklido.com/blog/1465-data-breaches-how-investigators-find-out-what-was-stolen</a></p><h2>12. AstraZeneca Data Breach Claim</h2><p>Reports surfaced claiming that the LAPSUS$ group may have gained access to internal AstraZeneca data. Incidents like this remind organizations that reputation damage, data theft, and supply-chain concerns can quickly follow public breach allegations, even before all claims are fully verified.</p><p>Read more:<br><a href="https://hacklido.com/news/astrazeneca-data-breach-lapsus-group-allegedly-claims-access-to-internal-data">https://hacklido.com/news/astrazeneca-data-breach-lapsus-group-allegedly-claims-access-to-internal-data</a></p><h2>13. Crunchyroll Data Breach Reported</h2><p>Another notable report involved Crunchyroll, where cyber security sources claimed a leak of around 100GB of data. Large-scale leaks of this kind can include internal documents, user-related information, operational data, or development assets, depending on the nature of the compromise.</p><p>Read more:<br><a href="https://hacklido.com/news/crunchyroll-data-breach-cybersecurity-sources-report-100gb-leak">https://hacklido.com/news/crunchyroll-data-breach-cybersecurity-sources-report-100gb-leak</a></p><h2>14. IDOR Vulnerability: Adding an Attacker into a Victim Team</h2><p>IDOR, or Insecure Direct Object Reference, remains a common but impactful web security issue. The discussed case shows how an attacker could exploit weak authorization controls to add themselves into another user&#8217;s team, demonstrating why access control validation must happen on the server side every time.</p><p>Read more:<br><a href="https://hacklido.com/blog/1466-idor-allow-the-attacker-to-add-the-user-in-the-victim-team">https://hacklido.com/blog/1466-idor-allow-the-attacker-to-add-the-user-in-the-victim-team</a></p><h2>15. Cloud Forensics in Modern Investigations</h2><p>As organizations shift workloads to cloud environments, investigations also need to adapt. Cloud forensics involves reviewing cloud logs, access records, virtual assets, IAM activity, storage usage, and provider-specific telemetry. It is very different from traditional endpoint-only investigation models.</p><p>Read more:<br><a href="https://hacklido.com/blog/1468-cloud-forensics-how-investigators-analyze-data-in-cloud-environments">https://hacklido.com/blog/1468-cloud-forensics-how-investigators-analyze-data-in-cloud-environments</a></p><h2>16. Digital Evidence Collection and Preservation</h2><p>Collecting digital evidence is not just about finding files. It is about preserving integrity, maintaining chain of custody, and ensuring the evidence remains admissible and trustworthy. This update focused on how investigators gather and protect digital evidence during cyber investigations.</p><p>Read more:<br><a href="https://hacklido.com/blog/1467-digital-evidence-how-its-collected-and-preserved-in-cyber-investigations">https://hacklido.com/blog/1467-digital-evidence-how-its-collected-and-preserved-in-cyber-investigations</a></p><h2>17. North Korean Hackers and VS Code Auto-Run Abuse</h2><p>A concerning malware development showed how North Korean threat actors reportedly abused VS Code auto-run tasks to deploy malware known as StoatWaffle. This is a reminder that developer environments are increasingly being targeted, especially where trust in tooling and automation is high.</p><p>Read more:<br><a href="https://hacklido.com/news/north-korean-hackers-abuse-vs-code-auto-run-tasks-to-deploy-stoatwaffle-malware">https://hacklido.com/news/north-korean-hackers-abuse-vs-code-auto-run-tasks-to-deploy-stoatwaffle-malware</a></p><h2>18. Trivy Hack Spreads Infostealer Through Docker</h2><p>Another major story involved a malicious campaign using a compromised Trivy-related vector to spread an infostealer via Docker, while also triggering worm-like behavior and a Kubernetes wiper. This shows how attacks on cloud-native and DevOps ecosystems are becoming more advanced and destructive.</p><p>Read more:<br><a href="https://hacklido.com/news/trivy-hack-spreads-infostealer-via-docker-triggers-worm-and-kubernetes-wiper">https://hacklido.com/news/trivy-hack-spreads-infostealer-via-docker-triggers-worm-and-kubernetes-wiper</a></p><p>This week&#8217;s cyber security updates show a clear pattern: attackers are becoming more creative, while defenders need stronger visibility, faster response, and deeper technical understanding. From quishing and smart contract flaws to malware delivery through developer tools and cloud-native attack chains, the landscape keeps expanding.</p><p>At the same time, core fundamentals still matter a lot &#8212; proper logging, evidence preservation, access control, incident response, and breach analysis remain the backbone of effective cyber defense.</p><p>Staying updated is not optional anymore. In cyber security, awareness is often the first layer of protection.</p>]]></content:encoded></item><item><title><![CDATA[HACKLIDO WEEKLY UPDATE | Cyber Security Blogs & Hack News]]></title><description><![CDATA[Complete Weekly Round-Up (News + Blogs) This weekly update covers all major cyber security news, data breaches, zero-days, ransomware activity, and expert blogs published during the week &#8212; concise]]></description><link>https://hacklido.substack.com/p/hacklido-weekly-update-cyber-security-011</link><guid isPermaLink="false">https://hacklido.substack.com/p/hacklido-weekly-update-cyber-security-011</guid><dc:creator><![CDATA[Rahul Yadav]]></dc:creator><pubDate>Mon, 16 Mar 2026 07:27:23 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!l4g7!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F621abe85-20bb-45d9-af2a-068f2e2fbefe_512x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>HACKLIDO | Cyber Security:<br>Regulation: Supreme Court of India Issues AI "Misconduct" Warning<br><br><a href="https://hacklido.com/news/regulation-supreme-court-of-india-issues-ai-misconduct-warning">https://hacklido.com/news/regulation-supreme-court-of-india-issues-ai-misconduct-warning</a><br><br>HealthTech: Fujitsu &amp; DT-Axis Launch "One-Stop" SaMD Ecosystem<br><a href="https://hacklido.com/news/healthtech-fujitsu-dt-axis-launch-one-stop-samd-ecosystem">https://hacklido.com/news/healthtech-fujitsu-dt-axis-launch-one-stop-samd-ecosystem</a><br><br>Cybercrime: Europol &amp; FBI Dismantle "LeakBase" Giant in Operation LEAK<br><br><a href="https://hacklido.com/news/cybercrime-europol-fbi-dismantle-leakbase-giant-in-operation-leak">https://hacklido.com/news/cybercrime-europol-fbi-dismantle-leakbase-giant-in-operation-leak</a><br><br>Metadata: The Hidden Clues Inside Your Files<br><a href="https://hacklido.com/blog/1439-metadata-the-hidden-clues-inside-your-files">https://hacklido.com/blog/1439-metadata-the-hidden-clues-inside-your-files</a><br><br>How Investigators Recover Deleted Files: A Beginner&#8217;s Guide to Digital Forensics<br><br><a href="https://hacklido.com/blog/1438-how-investigators-recover-deleted-files-a-beginners-guide-to-digital-forensics">https://hacklido.com/blog/1438-how-investigators-recover-deleted-files-a-beginners-guide-to-digital-forensics</a><br><br>What Happens After a Cyber Attack? Inside a Digital Forensics Investigation<br><br><a href="https://hacklido.com/blog/1437-what-happens-after-a-cyber-attack-inside-a-digital-forensics-investigation">https://hacklido.com/blog/1437-what-happens-after-a-cyber-attack-inside-a-digital-forensics-investigation</a><br><br>Can Deleted WhatsApp Messages Be Recovered? A Digital Forensics Perspective<br><a href="https://hacklido.com/blog/1436-can-deleted-whatsapp-messages-be-recovered-a-digital-forensics-perspective">https://hacklido.com/blog/1436-can-deleted-whatsapp-messages-be-recovered-a-digital-forensics-perspective</a><br><br><a href="https://hacklido.com/blog/1440-your-digital-footprint-how-your-online-activity-leaves-traces-everywhere">https://hacklido.com/blog/1440-your-digital-footprint-how-your-online-activity-leaves-traces-everywhere</a><br><br><a href="https://hacklido.com/blog/1441-5-digital-forensics-tools-every-beginner-should-know">https://hacklido.com/blog/1441-5-digital-forensics-tools-every-beginner-should-know</a><br><br><a href="https://hacklido.com/blog/1446-how-investigators-trace-an-ip-address-in-cybercrime-investigations">https://hacklido.com/blog/1446-how-investigators-trace-an-ip-address-in-cybercrime-investigations</a><br><br><a href="https://hacklido.com/blog/1445-from-rejection-to-rce-how-a-dependency-confusion-finding-came-back-four-months-later-and-earned">https://hacklido.com/blog/1445-from-rejection-to-rce-how-a-dependency-confusion-finding-came-back-four-months-later-and-earned</a><br><br><br>HACKLIDO | Cyber Security:<br><a href="https://hacklido.com/blog/1435-how-to-write-secure-code-practical-guide">https://hacklido.com/blog/1435-how-to-write-secure-code-practical-guide</a><br><br><a href="https://hacklido.com/blog/1436-can-deleted-whatsapp-messages-be-recovered-a-digital-forensics-perspective">https://hacklido.com/blog/1436-can-deleted-whatsapp-messages-be-recovered-a-digital-forensics-perspective</a><br><br><a href="https://hacklido.com/blog/1440-your-digital-footprint-how-your-online-activity-leaves-traces-everywhere">https://hacklido.com/blog/1440-your-digital-footprint-how-your-online-activity-leaves-traces-everywhere</a><br><br><a href="https://hacklido.com/blog/1441-5-digital-forensics-tools-every-beginner-should-know">https://hacklido.com/blog/1441-5-digital-forensics-tools-every-beginner-should-know</a><br><br><a href="https://hacklido.com/blog/1444-cybersecurity-lab-adversary-emulation-remote-access-trojans-rat">https://hacklido.com/blog/1444-cybersecurity-lab-adversary-emulation-remote-access-trojans-rat</a><br><br><a href="https://hacklido.com/blog/1451-detective-and-manipulator">https://hacklido.com/blog/1451-detective-and-manipulator</a><br><br><a href="https://hacklido.com/blog/1450-phishing-attacks-how-investigators-trace-the-source-of-fake-emails">https://hacklido.com/blog/1450-phishing-attacks-how-investigators-trace-the-source-of-fake-emails</a><br><br><a href="https://hacklido.com/blog/1449-ransomware-attacks-how-digital-forensics-helps-track-the-attackers">https://hacklido.com/blog/1449-ransomware-attacks-how-digital-forensics-helps-track-the-attackers</a><br><br><a href="https://hacklido.com/blog/1447-owasp-api-security-top-10-2023">https://hacklido.com/blog/1447-owasp-api-security-top-10-2023</a><br><br><a href="https://hacklido.com/blog/1445-from-rejection-to-rce-how-a-dependency-confusion-finding-came-back-four-months-later-and-earned">https://hacklido.com/blog/1445-from-rejection-to-rce-how-a-dependency-confusion-finding-came-back-four-months-later-and-earned</a><br><br><a href="https://hacklido.com/blog/1444-cybersecurity-lab-adversary-emulation-remote-access-trojans-rat">https://hacklido.com/blog/1444-cybersecurity-lab-adversary-emulation-remote-access-trojans-rat</a><br><br><a href="https://hacklido.com/blog/1453-dark-web-investigations-how-cybercrime-activities-are-tracked-online">https://hacklido.com/blog/1453-dark-web-investigations-how-cybercrime-activities-are-tracked-online</a><br><br><a href="https://hacklido.com/blog/1452-idor-allow-the-attacker-to-add-the-victim-product-in-our-pitch">https://hacklido.com/blog/1452-idor-allow-the-attacker-to-add-the-victim-product-in-our-pitch</a></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://hacklido.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Hacklido Weekly! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Hacklido Weekly Update – WRAP Program]]></title><description><![CDATA[Hacklido Writers Reward Program (WRAP) is Live]]></description><link>https://hacklido.substack.com/p/hacklido-weekly-update-wrap-program-e96</link><guid isPermaLink="false">https://hacklido.substack.com/p/hacklido-weekly-update-wrap-program-e96</guid><dc:creator><![CDATA[Rahul Yadav]]></dc:creator><pubDate>Sun, 08 Mar 2026 11:17:42 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!zPvZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f799c0a-d01a-490f-8b3b-9936702547f2_1080x1350.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This week&#8217;s update is focused on the <strong>Hacklido WRAP (Writers Reward Program)</strong>. The program encourages cybersecurity enthusiasts, researchers, and learners to publish high-quality blogs on Hacklido.</p><p>Writers who contribute more blogs will have <strong>higher chances of winning exciting rewards</strong>, including cash rewards, TryHackMe vouchers, Hack The Box vouchers, and Techonquer&#8217;s OSCP Recorded Course.<br>All writers are encouraged to <strong>start publishing their blogs on Hacklido</strong>. Share your cybersecurity knowledge, learning experiences, and research to participate in the WRAP program and increase your chances of winning rewards.<br>More info :https://hacklido.com/blog/411-writers-reward-program-wrap</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zPvZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f799c0a-d01a-490f-8b3b-9936702547f2_1080x1350.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zPvZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f799c0a-d01a-490f-8b3b-9936702547f2_1080x1350.png 424w, https://substackcdn.com/image/fetch/$s_!zPvZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f799c0a-d01a-490f-8b3b-9936702547f2_1080x1350.png 848w, https://substackcdn.com/image/fetch/$s_!zPvZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f799c0a-d01a-490f-8b3b-9936702547f2_1080x1350.png 1272w, https://substackcdn.com/image/fetch/$s_!zPvZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f799c0a-d01a-490f-8b3b-9936702547f2_1080x1350.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zPvZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f799c0a-d01a-490f-8b3b-9936702547f2_1080x1350.png" width="1080" height="1350" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0f799c0a-d01a-490f-8b3b-9936702547f2_1080x1350.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1350,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:908932,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://hacklido.substack.com/i/190272235?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f799c0a-d01a-490f-8b3b-9936702547f2_1080x1350.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zPvZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f799c0a-d01a-490f-8b3b-9936702547f2_1080x1350.png 424w, https://substackcdn.com/image/fetch/$s_!zPvZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f799c0a-d01a-490f-8b3b-9936702547f2_1080x1350.png 848w, https://substackcdn.com/image/fetch/$s_!zPvZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f799c0a-d01a-490f-8b3b-9936702547f2_1080x1350.png 1272w, https://substackcdn.com/image/fetch/$s_!zPvZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f799c0a-d01a-490f-8b3b-9936702547f2_1080x1350.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div>]]></content:encoded></item><item><title><![CDATA[𝗛𝗮𝗰𝗸𝗹𝗶𝗱𝗼 𝗪𝗥𝗔𝗣 (𝗪𝗿𝗶𝘁𝗲𝗿𝘀 𝗥𝗲𝘄𝗮𝗿𝗱 𝗣𝗿𝗼𝗴𝗿𝗮𝗺) 𝗶𝘀 𝗟𝗶𝘃𝗲!! ]]></title><description><![CDATA[&#120283;&#120302;&#120304;&#120312;&#120313;&#120310;&#120305;&#120316; &#120298;&#120293;&#120276;&#120291; &#120310;&#120320; &#120287;&#120310;&#120323;&#120306;!!]]></description><link>https://hacklido.substack.com/p/aa7</link><guid isPermaLink="false">https://hacklido.substack.com/p/aa7</guid><dc:creator><![CDATA[Rahul Yadav]]></dc:creator><pubDate>Sun, 01 Mar 2026 04:48:34 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!K9ph!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9f821bf-9cc5-41e8-8cfb-de82c4601d7b_1080x1350.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>&#120283;&#120302;&#120304;&#120312;&#120313;&#120310;&#120305;&#120316; &#120298;&#120293;&#120276;&#120291; &#120310;&#120320; &#120287;&#120310;&#120323;&#120306;!! <br>&#120283;&#120302;&#120304;&#120312;&#120313;&#120310;&#120305;&#120316; &#120310;&#120320; &#120306;&#120325;&#120304;&#120310;&#120321;&#120306;&#120305; &#120321;&#120316; &#120313;&#120302;&#120322;&#120315;&#120304;&#120309; &#120321;&#120309;&#120306; &#120298;&#120293;&#120276;&#120291; (&#120298;&#120319;&#120310;&#120321;&#120306;&#120319;&#120320; &#120293;&#120306;&#120324;&#120302;&#120319;&#120305; &#120291;&#120319;&#120316;&#120308;&#120319;&#120302;&#120314;) &#120302;&#120315; &#120310;&#120315;&#120310;&#120321;&#120310;&#120302;&#120321;&#120310;&#120323;&#120306; &#120305;&#120306;&#120320;&#120310;&#120308;&#120315;&#120306;&#120305; &#120321;&#120316; &#120306;&#120314;&#120317;&#120316;&#120324;&#120306;&#120319; &#120304;&#120326;&#120303;&#120306;&#120319;&#120320;&#120306;&#120304;&#120322;&#120319;&#120310;&#120321;&#120326; &#120306;&#120315;&#120321;&#120309;&#120322;&#120320;&#120310;&#120302;&#120320;&#120321;&#120320;, &#120319;&#120306;&#120320;&#120306;&#120302;&#120319;&#120304;&#120309;&#120306;&#120319;&#120320;, &#120302;&#120315;&#120305; &#120313;&#120306;&#120302;&#120319;&#120315;&#120306;&#120319;&#120320; &#120321;&#120316; &#120320;&#120309;&#120302;&#120319;&#120306; &#120321;&#120309;&#120306;&#120310;&#120319; &#120312;&#120315;&#120316;&#120324;&#120313;&#120306;&#120305;&#120308;&#120306; &#120321;&#120309;&#120319;&#120316;&#120322;&#120308;&#120309; &#120309;&#120310;&#120308;&#120309;-&#120318;&#120322;&#120302;&#120313;&#120310;&#120321;&#120326; &#120303;&#120313;&#120316;&#120308;&#120320;.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!K9ph!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9f821bf-9cc5-41e8-8cfb-de82c4601d7b_1080x1350.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!K9ph!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9f821bf-9cc5-41e8-8cfb-de82c4601d7b_1080x1350.png 424w, https://substackcdn.com/image/fetch/$s_!K9ph!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9f821bf-9cc5-41e8-8cfb-de82c4601d7b_1080x1350.png 848w, https://substackcdn.com/image/fetch/$s_!K9ph!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9f821bf-9cc5-41e8-8cfb-de82c4601d7b_1080x1350.png 1272w, https://substackcdn.com/image/fetch/$s_!K9ph!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9f821bf-9cc5-41e8-8cfb-de82c4601d7b_1080x1350.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!K9ph!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9f821bf-9cc5-41e8-8cfb-de82c4601d7b_1080x1350.png" width="1080" height="1350" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a9f821bf-9cc5-41e8-8cfb-de82c4601d7b_1080x1350.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1350,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:894984,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://hacklido.substack.com/i/189523103?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9f821bf-9cc5-41e8-8cfb-de82c4601d7b_1080x1350.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!K9ph!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9f821bf-9cc5-41e8-8cfb-de82c4601d7b_1080x1350.png 424w, https://substackcdn.com/image/fetch/$s_!K9ph!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9f821bf-9cc5-41e8-8cfb-de82c4601d7b_1080x1350.png 848w, https://substackcdn.com/image/fetch/$s_!K9ph!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9f821bf-9cc5-41e8-8cfb-de82c4601d7b_1080x1350.png 1272w, https://substackcdn.com/image/fetch/$s_!K9ph!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9f821bf-9cc5-41e8-8cfb-de82c4601d7b_1080x1350.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><br><br>If you love writing about cybersecurity, networking, ethical hacking, blue teaming, red teaming, CTFs, or real-world attack &amp; defense scenarios this is your stage.<br><br>&#120298;&#120309;&#120302;&#120321;&#8217;&#120320; &#120310;&#120315; &#120310;&#120321; &#120307;&#120316;&#120319; &#120326;&#120316;&#120322;? <br><br>&#120295;&#120316;&#120317; &#120324;&#120319;&#120310;&#120321;&#120306;&#120319;&#120320; &#120324;&#120310;&#120313;&#120313; &#120319;&#120306;&#120304;&#120306;&#120310;&#120323;&#120306;:<br>  &#8226; &#120278;&#120302;&#120320;&#120309; &#120293;&#120306;&#120324;&#120302;&#120319;&#120305;&#120320;  <br>  &#8226; &#120297;&#120316;&#120322;&#120304;&#120309;&#120306;&#120319;&#120320; &#120307;&#120316;&#120319; &#120295;&#120319;&#120326;&#120283;&#120302;&#120304;&#120312;&#120288;&#120306;  <br>  &#8226; &#120297;&#120316;&#120322;&#120304;&#120309;&#120306;&#120319;&#120320; &#120307;&#120316;&#120319; &#120283;&#120302;&#120304;&#120312; &#120295;&#120309;&#120306; &#120277;&#120316;&#120325; <br>  &#8226; &#120295;&#120306;&#120304;&#120309;&#120316;&#120315;&#120318;&#120322;&#120306;&#120319;&#8217;&#120320; &#120290;&#120294;&#120278;&#120291; &#120293;&#120306;&#120304;&#120316;&#120319;&#120305;&#120306;&#120305; &#120278;&#120316;&#120322;&#120319;&#120320;&#120306;  <br><br>&#120281;&#120316;&#120319; &#120314;&#120316;&#120319;&#120306; &#120310;&#120315;&#120307;&#120316; : <a href="https://hacklido.com/blog/411-writers-reward-program-wrap">https://hacklido.com/blog/411-writers-reward-program-wrap</a><br><br>&#120298;&#120309;&#120306;&#120321;&#120309;&#120306;&#120319; &#120326;&#120316;&#120322;&#8217;&#120319;&#120306; &#120302; &#120303;&#120306;&#120308;&#120310;&#120315;&#120315;&#120306;&#120319; &#120320;&#120309;&#120302;&#120319;&#120310;&#120315;&#120308; &#120313;&#120306;&#120302;&#120319;&#120315;&#120310;&#120315;&#120308; &#120315;&#120316;&#120321;&#120306;&#120320; &#120316;&#120319; &#120302; &#120317;&#120319;&#120316;&#120307;&#120306;&#120320;&#120320;&#120310;&#120316;&#120315;&#120302;&#120313; &#120303;&#120319;&#120306;&#120302;&#120312;&#120310;&#120315;&#120308; &#120305;&#120316;&#120324;&#120315; &#120302;&#120305;&#120323;&#120302;&#120315;&#120304;&#120306;&#120305; &#120302;&#120321;&#120321;&#120302;&#120304;&#120312; &#120304;&#120309;&#120302;&#120310;&#120315;&#120320;, <br>&#120300;&#120290;&#120296;&#120293; &#120286;&#120289;&#120290;&#120298;&#120287;&#120280;&#120279;&#120282;&#120280; &#120288;&#120276;&#120295;&#120295;&#120280;&#120293;&#120294;..<br><br>&#120294;&#120321;&#120302;&#120319;&#120321; &#120324;&#120319;&#120310;&#120321;&#120310;&#120315;&#120308;. &#120294;&#120321;&#120302;&#120319;&#120321; &#120320;&#120309;&#120302;&#120319;&#120310;&#120315;&#120308;. &#120294;&#120321;&#120302;&#120319;&#120321; &#120306;&#120302;&#120319;&#120315;&#120310;&#120315;&#120308;.  <br><br>#Hacklido #WRAP #CyberSecurity #EthicalHacking #Blogging #Infosec #WriteToWin</p>]]></content:encoded></item><item><title><![CDATA[HACKLIDO WEEKLY UPDATE | Cyber Security Blogs & Hack News]]></title><description><![CDATA[Complete Weekly Round-Up (News + Blogs) This weekly update covers all major cyber security news, data breaches, zero-days, ransomware activity, and expert blogs published during the week &#8212; concise,]]></description><link>https://hacklido.substack.com/p/hacklido-weekly-update-cyber-security-327</link><guid isPermaLink="false">https://hacklido.substack.com/p/hacklido-weekly-update-cyber-security-327</guid><dc:creator><![CDATA[Rahul Yadav]]></dc:creator><pubDate>Mon, 23 Feb 2026 04:44:19 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!PKdL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb959b6ed-65a6-4cbc-bc13-53af088c9a15_1024x1536.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>&#128240; <strong>Top Cyber Security News &#8211; Weekly Highlights</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PKdL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb959b6ed-65a6-4cbc-bc13-53af088c9a15_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PKdL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb959b6ed-65a6-4cbc-bc13-53af088c9a15_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!PKdL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb959b6ed-65a6-4cbc-bc13-53af088c9a15_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!PKdL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb959b6ed-65a6-4cbc-bc13-53af088c9a15_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!PKdL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb959b6ed-65a6-4cbc-bc13-53af088c9a15_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PKdL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb959b6ed-65a6-4cbc-bc13-53af088c9a15_1024x1536.png" width="1024" height="1536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b959b6ed-65a6-4cbc-bc13-53af088c9a15_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2817455,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://hacklido.substack.com/i/188867265?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb959b6ed-65a6-4cbc-bc13-53af088c9a15_1024x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!PKdL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb959b6ed-65a6-4cbc-bc13-53af088c9a15_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!PKdL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb959b6ed-65a6-4cbc-bc13-53af088c9a15_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!PKdL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb959b6ed-65a6-4cbc-bc13-53af088c9a15_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!PKdL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb959b6ed-65a6-4cbc-bc13-53af088c9a15_1024x1536.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><h3><strong>1. Critical DockerDash Vulnerability Discovered</strong></h3><p>A severe security flaw in DockerDash could allow attackers to compromise containerized environments, raising serious risks for DevOps and cloud infrastructures.<br>&#128279; <a href="https://hacklido.com/news/security-alert-critical-flaw-discovered-in-dockerdash">https://hacklido.com/news/security-alert-critical-flaw-discovered-in-dockerdash</a></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://hacklido.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Hacklido Weekly! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h3><strong>2. MoltBot Malware Escalates Globally</strong></h3><p>What began as a stealth malware campaign has evolved into a widespread infection, targeting systems with persistence and command-and-control capabilities.<br>&#128279; <a href="https://hacklido.com/news/the-rise-and-breach-of-moltbot">https://hacklido.com/news/the-rise-and-breach-of-moltbot</a></p><div><hr></div><h3><strong>3. Qilin Ransomware Targets Tulsa International Airport</strong></h3><p>The <strong>Qilin ransomware group</strong> attacked airport infrastructure, highlighting growing ransomware threats against critical aviation and OT environments.<br>&#128279; <a href="https://hacklido.com/news/qilin-ransomware-group-targets-tulsa-international-airport-tait">https://hacklido.com/news/qilin-ransomware-group-targets-tulsa-international-airport-tait</a></p><div><hr></div><h3><strong>4. Shadow AI &amp; the $670K &#8220;Innovation Tax&#8221;</strong></h3><p>Unapproved AI tools inside enterprises are creating silent breaches, compliance failures, and unexpected financial losses.<br>&#128279; <a href="https://hacklido.com/news/the-silent-breach-shadow-ai-and-the-670k-innovation-tax">https://hacklido.com/news/the-silent-breach-shadow-ai-and-the-670k-innovation-tax</a></p><div><hr></div><h3><strong>5. Alibaba&#8217;s Qwen3-Max-Thinking Challenges GPT-5.2</strong></h3><p>Alibaba introduced a powerful reasoning-focused AI model, intensifying competition in advanced AI capabilities.<br>&#128279; <a href="https://hacklido.com/news/alibaba-s-qwen3-max-thinking-challenges-gpt-5-2-dominance">https://hacklido.com/news/alibaba-s-qwen3-max-thinking-challenges-gpt-5-2-dominance</a></p><div><hr></div><h3><strong>6. Dutch Telecom Odido Suffers Mega Breach</strong></h3><p>A massive data breach exposed <strong>6.2 million customer records</strong>, once again stressing the need for stronger telecom security controls.<br>&#128279; <a href="https://hacklido.com/news/dutch-telecom-giant-odido-hit-by-mega-breach-6-2-million-records-exposed">https://hacklido.com/news/dutch-telecom-giant-odido-hit-by-mega-breach-6-2-million-records-exposed</a></p><div><hr></div><h3><strong>7. Chrome Zero-Day (CVE-2026-2441) Actively Exploited</strong></h3><p>CISA issued emergency directives as attackers exploited a Chrome zero-day in the wild. Immediate patching is critical.<br>&#128279; <a href="https://hacklido.com/news/0-day-season-begins-chrome-patches-first-actively-exploited-flaw-of-2026-cve-2026-2441">https://hacklido.com/news/0-day-season-begins-chrome-patches-first-actively-exploited-flaw-of-2026-cve-2026-2441</a></p><div><hr></div><h3><strong>8. OT Infrastructure Under Coordinated Attacks</strong></h3><p>New threat groups are mapping industrial systems to cause <strong>real-world physical effects</strong>, putting power grids and factories at risk.<br>&#128279; <a href="https://hacklido.com/news/ot-infrastructure-under-fire-new-threat-groups-mapping-physical-effects">https://hacklido.com/news/ot-infrastructure-under-fire-new-threat-groups-mapping-physical-effects</a></p><div><hr></div><h3><strong>9. ShinyHunters&#8217; 2026 Breach Campaign</strong></h3><p>The notorious hacking group continues leaking data and executing large-scale vishing operations across multiple sectors.<br>&#128279; <a href="https://hacklido.com/news/shinyhunters-strikes-again-a-trail-of-high-profile-leaks-and-vishing-chaos-in-2026">https://hacklido.com/news/shinyhunters-strikes-again-a-trail-of-high-profile-leaks-and-vishing-chaos-in-2026</a></p><div><hr></div><h3><strong>10. Fintech Giant Figure Hit by SSO Vishing</strong></h3><p>Nearly <strong>967,000 accounts</strong> were leaked after attackers abused Single Sign-On through social engineering.<br>&#128279; <a href="https://hacklido.com/news/fintech-giant-figure-hit-by-shinyhunters-967k-accounts-leaked-after-sso-vishing-attack-2">https://hacklido.com/news/fintech-giant-figure-hit-by-shinyhunters-967k-accounts-leaked-after-sso-vishing-attack-2</a></p><div><hr></div><h3><strong>11. Microsoft Patch Tuesday Aftermath</strong></h3><p>Microsoft addressed six actively exploited zero-days, including the dangerous &#8220;silent click&#8221; attack vector.<br>&#128279; <a href="https://hacklido.com/news/microsoft-patch-tuesday-aftermath-6-zero-days-under-fire-and-the-silent-click-threat">https://hacklido.com/news/microsoft-patch-tuesday-aftermath-6-zero-days-under-fire-and-the-silent-click-threat</a></p><div><hr></div><h3><strong>12. Roundcube Webmail Exploited by State Actors</strong></h3><p>Emergency patch orders were issued after state-sponsored groups weaponized Roundcube vulnerabilities.<br>&#128279; <a href="https://hacklido.com/news/roundcube-under-fire-cisa-issues-emergency-patch-order-for-state-sponsored-exploits">https://hacklido.com/news/roundcube-under-fire-cisa-issues-emergency-patch-order-for-state-sponsored-exploits</a></p><div><hr></div><h3><strong>13. Grandstream VoIP Phones Vulnerability</strong></h3><p>A no-authentication flaw allowed attackers to gain <strong>root access</strong> on enterprise desk phones (CVE-2026-2329).<br>&#128279; <a href="https://hacklido.com/news/the-desk-phone-is-listening-grandstream-voip-no-auth-root-takeover-cve-2026-2329-">https://hacklido.com/news/the-desk-phone-is-listening-grandstream-voip-no-auth-root-takeover-cve-2026-2329-</a></p><div><hr></div><h3><strong>14. IDMerit Mega-Leak: 3 Billion Records Exposed</strong></h3><p>One of the largest identity leaks ever questions the future of centralized digital identity trust models.<br>&#128279; <a href="https://hacklido.com/news/3-billion-records-exposed-the-idmerit-mega-leak-and-the-death-of-identity-trust-">https://hacklido.com/news/3-billion-records-exposed-the-idmerit-mega-leak-and-the-death-of-identity-trust-</a></p><div><hr></div><h3><strong>15. PayPal Data Exposure Incidents</strong></h3><p>Multiple disclosures revealed long-term data exposure caused by internal software issues and logging failures.<br>&#128279; <a href="https://hacklido.com/news/paypal-discloses-six-month-data-exposure-linked-to-software-glitch">https://hacklido.com/news/paypal-discloses-six-month-data-exposure-linked-to-software-glitch</a><br>&#128279; <a href="https://hacklido.com/news/the-ghost-in-the-ledger-paypal-s-165-day-data-leak-exposed">https://hacklido.com/news/the-ghost-in-the-ledger-paypal-s-165-day-data-leak-exposed</a></p><div><hr></div><h2>&#128218; <strong>Featured Hacklido Blogs &#8211; This Week</strong></h2><h3><strong>1. Cyber Security for Middle-Class Indian Homes</strong></h3><p>Practical guidance on securing home networks, devices, and digital identities on a budget.<br>&#128279; <a href="https://hacklido.com/blog/1410-cyber-security-for-middle-class-indian-homes">https://hacklido.com/blog/1410-cyber-security-for-middle-class-indian-homes</a></p><div><hr></div><h3><strong>2. Complete Guide on Financial Projections</strong></h3><p>A beginner-friendly breakdown of financial forecasting for startups and professionals.<br>&#128279; <a href="https://hacklido.com/blog/1412-a-complete-guide-on-financial-projections">https://hacklido.com/blog/1412-a-complete-guide-on-financial-projections</a></p><div><hr></div><h3><strong>3. Amazon AIF-C01 Career &amp; Job Role Guide</strong></h3><p>A roadmap for professionals preparing for the Amazon AI Foundational certification exam.<br>&#128279; <a href="https://hacklido.com/blog/1411-job-roles-career-path-guide-amazon-aif-c01-exam">https://hacklido.com/blog/1411-job-roles-career-path-guide-amazon-aif-c01-exam</a></p><div><hr></div><h3><strong>4. Broken Link Hijacking Explained</strong></h3><p>How attackers monetize forgotten URLs &#8212; and why this overlooked bug still pays.<br>&#128279; <a href="https://hacklido.com/blog/1413-broken-link-hijacking-that-one-bug-everyone-ignores-until-it-pays">https://hacklido.com/blog/1413-broken-link-hijacking-that-one-bug-everyone-ignores-until-it-pays</a></p><div><hr></div><h3><strong>5. Blue Teaming Without Illusions</strong></h3><p>A realistic approach to building cyber defense from infrastructure to threat intelligence.<br>&#128279; <a href="https://hacklido.com/blog/1414-blue-teaming-without-illusions-defense-built-from-infrastructure-to-intelligence">https://hacklido.com/blog/1414-blue-teaming-without-illusions-defense-built-from-infrastructure-to-intelligence</a></p><div><hr></div><h3><strong>6. WordPress XML-RPC: Hidden Power &amp; Risk</strong></h3><p>Why <code>/xmlrpc.php</code> remains both powerful and dangerous in modern WordPress environments.<br>&#128279; <a href="https://share.google/XKvahNTz0rBpUCwaE">https://share.google/XKvahNTz0rBpUCwaE</a></p><div><hr></div><h3><strong>7. Evil Twin Attacks Explained</strong></h3><p>A deep dive into rogue Wi-Fi attacks and how attackers silently hijack users.<br>&#128279; <a href="https://hacklido.com/blog/1416-the-phantom-in-the-air-a-guide-to-evil-twin-attacks">https://hacklido.com/blog/1416-the-phantom-in-the-air-a-guide-to-evil-twin-attacks</a></p><div><hr></div><h3><strong>8. IDOR to Arbitrary File Access (Critical)</strong></h3><p>A real-world exploitation guide showing how IDOR can lead to full file compromise.<br>&#128279; <a href="https://hacklido.com/blog/1417-idor-to-arbitrary-file-access-copy-any-users-files-critical">https://hacklido.com/blog/1417-idor-to-arbitrary-file-access-copy-any-users-files-critical</a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://hacklido.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Hacklido Weekly! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[HACKLIDO WEEKLY UPDATE | Cyber Security & Hack News]]></title><description><![CDATA[Announcement]]></description><link>https://hacklido.substack.com/p/hacklido-weekly-update-cyber-security</link><guid isPermaLink="false">https://hacklido.substack.com/p/hacklido-weekly-update-cyber-security</guid><dc:creator><![CDATA[Rahul Yadav]]></dc:creator><pubDate>Sun, 15 Feb 2026 12:26:53 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!YTEV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb16e72fb-7e69-4a01-892b-7f528017268b_800x450.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>Announcement</strong><br>Hacklido officially brings you <strong>Hack News</strong> &#8212; your daily source for cybersecurity, vulnerabilities, and cutting-edge tech updates.<br>Stay informed, stay ahead.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!YTEV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb16e72fb-7e69-4a01-892b-7f528017268b_800x450.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!YTEV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb16e72fb-7e69-4a01-892b-7f528017268b_800x450.jpeg 424w, https://substackcdn.com/image/fetch/$s_!YTEV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb16e72fb-7e69-4a01-892b-7f528017268b_800x450.jpeg 848w, https://substackcdn.com/image/fetch/$s_!YTEV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb16e72fb-7e69-4a01-892b-7f528017268b_800x450.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!YTEV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb16e72fb-7e69-4a01-892b-7f528017268b_800x450.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!YTEV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb16e72fb-7e69-4a01-892b-7f528017268b_800x450.jpeg" width="800" height="450" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b16e72fb-7e69-4a01-892b-7f528017268b_800x450.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:450,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:85638,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://hacklido.substack.com/i/188030331?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb16e72fb-7e69-4a01-892b-7f528017268b_800x450.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!YTEV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb16e72fb-7e69-4a01-892b-7f528017268b_800x450.jpeg 424w, https://substackcdn.com/image/fetch/$s_!YTEV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb16e72fb-7e69-4a01-892b-7f528017268b_800x450.jpeg 848w, https://substackcdn.com/image/fetch/$s_!YTEV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb16e72fb-7e69-4a01-892b-7f528017268b_800x450.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!YTEV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb16e72fb-7e69-4a01-892b-7f528017268b_800x450.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>&#128073; <strong>Join our Telegram channel:</strong> <a href="https://t.me/hacklido">https://t.me/hacklido</a><br>&#128073; <strong>Follow us:</strong> @hacklido<br>&#128073; <strong>Hack News Portal:</strong> <a href="https://hacklido.com/news">https://hacklido.com/news</a></p><div><hr></div><h2><strong>This Week&#8217;s Key Updates</strong></h2><h3><strong>1. iOS Pentesting Introduction</strong></h3><p>A beginner-friendly guide covering fundamentals of iOS pentesting, tools, and attack surface.<br>&#128279; <a href="https://hacklido.com/blog/1405-ios-pentesting-introduction">https://hacklido.com/blog/1405-ios-pentesting-introduction</a></p><div><hr></div><h3><strong>2. Ultimate Cybersecurity Roadmap for 2026</strong></h3><p>Complete roadmap covering skills, certifications, career paths, and future trends in cybersecurity.<br>&#128279; <a href="https://hacklido.com/blog/1408-ultimate-cybersecurity-roadmap-for-2026">https://hacklido.com/blog/1408-ultimate-cybersecurity-roadmap-for-2026</a></p><div><hr></div><h3><strong>3. Directory Traversal via Source Code Review</strong></h3><p>Deep dive into how a directory traversal vulnerability was discovered through source code analysis.<br>&#128279; <a href="https://hacklido.com/blog/1409-breaking-file-security-a-directory-traversal-found-through-source-code-review">https://hacklido.com/blog/1409-breaking-file-security-a-directory-traversal-found-through-source-code-review</a></p><div><hr></div><h3><strong>4. Cyber Security for Middle-Class Indian Homes</strong></h3><p>Practical cybersecurity guidance tailored for Indian households and everyday users.<br>&#128279; <a href="https://hacklido.com/blog/1410-cyber-security-for-middle-class-indian-homes">https://hacklido.com/blog/1410-cyber-security-for-middle-class-indian-homes</a></p><div><hr></div><h2><strong>Hack News Highlights</strong></h2><h3><strong>5. Critical Flaw Discovered in DockerDash</strong></h3><p>A serious vulnerability exposed in DockerDash that could put systems at risk.<br>&#128279; <a href="https://hacklido.com/news/security-alert-critical-flaw-discovered-in-dockerdash">https://hacklido.com/news/security-alert-critical-flaw-discovered-in-dockerdash</a></p><div><hr></div><h3><strong>6. The Rise and Breach of MoltBot Malware</strong></h3><p>Analysis of MoltBot malware and how it&#8217;s rapidly spreading across systems.<br>&#128279; <a href="https://hacklido.com/news/the-rise-and-breach-of-moltbot">https://hacklido.com/news/the-rise-and-breach-of-moltbot</a></p><div><hr></div><h3><strong>7. Hack News Launch Special</strong></h3><ul><li><p>Microsoft Zero-Day Playbook (Feb 2026)</p></li><li><p>India&#8211;Israel collaboration on next-gen security tech</p></li><li><p>AI security race and what lies ahead</p></li></ul><p>&#128279; <a href="https://hacklido.com/news">https://hacklido.com/news</a></p><div><hr></div><p><strong>Stay updated with weekly insights, real-world vulnerabilities, and practical security knowledge.</strong><br>Join the community and never miss an update.</p><p><strong>Hacklido | Learn &#8226; Break &#8226; Secure</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://hacklido.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://hacklido.substack.com/subscribe?"><span>Subscribe now</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[🔐 HACKLIDO | Cyber Security – Weekly Update]]></title><description><![CDATA[From IDOR Exploits to Android Malware Analysis &#8211; Weekly Security Insights]]></description><link>https://hacklido.substack.com/p/hacklido-cyber-security-weekly-update</link><guid isPermaLink="false">https://hacklido.substack.com/p/hacklido-cyber-security-weekly-update</guid><dc:creator><![CDATA[Rahul Yadav]]></dc:creator><pubDate>Sun, 01 Feb 2026 07:17:38 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!l4g7!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F621abe85-20bb-45d9-af2a-068f2e2fbefe_512x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>We are a little late with the weekly update</strong>, but here&#8217;s a power-packed roundup of the latest cyber security blogs published this week &#128640;<br>This <strong>weekly update</strong> covers <strong>IDOR vulnerabilities, Android Malware Analysis, Reverse Engineering, Web Security, and Malware Techniques</strong>.</p><p>&#127881; <strong>Milestone Update:</strong><br>We&#8217;ve crossed <strong>11,000+ followers on our X (Twitter) platform</strong> &#8212; thank you for the amazing support!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://hacklido.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Hacklido Weekly! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>&#128073; <strong>Follow us on X (Twitter):</strong><br><a href="https://x.com/hacklido">https://x.com/hacklido</a></p><p>&#128073; <strong>Join our Telegram channel for fastest updates:</strong><br><a href="https://t.me/hacklido">https://t.me/hacklido</a></p><div><hr></div><h2>&#128218; This Week&#8217;s Published Blogs</h2><h3>1&#65039;&#8419; IDOR Allow the Attacker to Add Our User in Any One Organization as Admin</h3><p>&#128279; <a href="https://hacklido.com/blog/1376-idor-allow-the-attacker-to-add-our-user-in-any-one-organzaition-as-admin-and-takoever-any-one-organization">https://hacklido.com/blog/1376-idor-allow-the-attacker-to-add-our-user-in-any-one-organzaition-as-admin-and-takoever-any-one-organization</a></p><h3>2&#65039;&#8419; Malware Categories in Android | Malware Analysis Series &#8211; Day 3</h3><p>&#128279; <a href="https://hacklido.com/blog/1378-malware-categories-in-android-malware-analysis-series-day-3">https://hacklido.com/blog/1378-malware-categories-in-android-malware-analysis-series-day-3</a></p><h3>3&#65039;&#8419; HAR Files &#8211; What They Are and How They&#8217;re Used</h3><p>&#128279; <a href="https://hacklido.com/blog/1380-har-files">https://hacklido.com/blog/1380-har-files</a></p><h3>4&#65039;&#8419; Android Phases Throughout the Years | Malware Analysis Series &#8211; Day 4</h3><p>&#128279; <a href="https://hacklido.com/blog/1381-android-phas-throughout-the-years-malware-analysis-series-day-4">https://hacklido.com/blog/1381-android-phas-throughout-the-years-malware-analysis-series-day-4</a></p><h3>5&#65039;&#8419; Critical IDOR: Attacker Can Take Over All Users&#8217; Organizations</h3><p>&#128279; <a href="https://hacklido.com/blog/1384-critical-idor-allow-the-attacker-to-takeover-all-users-organizations">https://hacklido.com/blog/1384-critical-idor-allow-the-attacker-to-takeover-all-users-organizations</a></p><h3>6&#65039;&#8419; Steganography: How Malware Hides Inside Images</h3><p>&#128279; <a href="https://hacklido.com/blog/1387-steganography-how-malware-hides-inside-images">https://hacklido.com/blog/1387-steganography-how-malware-hides-inside-images</a></p><h3>7&#65039;&#8419; Android Ransomwares | Malware Analysis Series &#8211; Day 4</h3><p>&#128279; <a href="https://hacklido.com/blog/1390-android-ransomwares-malware-analysis-series-day-4">https://hacklido.com/blog/1390-android-ransomwares-malware-analysis-series-day-4</a></p><h3>8&#65039;&#8419; Critical IDOR: Attacker Can Add Collaborator in Victim Jobs</h3><p>&#128279; <a href="https://hacklido.com/blog/1391-critical-idor-allow-the-attacker-to-add-the-collabrator-in-the-victim-jobs">https://hacklido.com/blog/1391-critical-idor-allow-the-attacker-to-add-the-collabrator-in-the-victim-jobs</a></p><h3>9&#65039;&#8419; Android Trojans | Malware Analysis Series &#8211; Day 5</h3><p>&#128279; <a href="https://hacklido.com/blog/1392-android-trojans-malware-analysis-series-day-5">https://hacklido.com/blog/1392-android-trojans-malware-analysis-series-day-5</a></p><h3>&#128287; IDOR: Fixed Terminal Creation in Another Organization</h3><p>&#128279; <a href="https://hacklido.com/blog/1394-idor-fixed-terminal-creation-in-another-organization">https://hacklido.com/blog/1394-idor-fixed-terminal-creation-in-another-organization</a></p><h3>1&#65039;&#8419;1&#65039;&#8419; Phishing | Malware Analysis Series &#8211; Day 6</h3><p>&#128279; <a href="https://hacklido.com/blog/1395-phishing-malware-analysis-series-day-6">https://hacklido.com/blog/1395-phishing-malware-analysis-series-day-6</a></p><h3>1&#65039;&#8419;2&#65039;&#8419; Android Reverse Engineering: Android Internals &amp; Environment Setup</h3><p>&#128279; <a href="https://hacklido.com/blog/1396-android-reverse-engineering-android-internals-review-setup-environments">https://hacklido.com/blog/1396-android-reverse-engineering-android-internals-review-setup-environments</a></p><h3>1&#65039;&#8419;3&#65039;&#8419; WebView Abuses, Hybrid Malware &amp; Cloaking | Malware Analysis Series &#8211; Day 7</h3><p>&#128279; <a href="https://hacklido.com/blog/1397-webview-abuses-hybrid-malwares-cloaking-malware-analysis-series-day-7">https://hacklido.com/blog/1397-webview-abuses-hybrid-malwares-cloaking-malware-analysis-series-day-7</a></p><h3>1&#65039;&#8419;4&#65039;&#8419; Android Reverse Engineering: Developer Options &amp; Android Debug Bridge (ADB)</h3><p>&#128279; <a href="https://hacklido.com/blog/1398-android-reverse-engineering-developer-options-android-debug-bridge">https://hacklido.com/blog/1398-android-reverse-engineering-developer-options-android-debug-bridge</a></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://hacklido.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Hacklido Weekly! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[HACKLIDO | Cyber Security – Content Highlights]]></title><description><![CDATA[A curated weekly roundup covering cutting-edge attacks, real-world vulnerabilities, AI-driven security operations, and hands-on offensive security research &#8212; all in one place.]]></description><link>https://hacklido.substack.com/p/hacklido-cyber-security-content-highlights</link><guid isPermaLink="false">https://hacklido.substack.com/p/hacklido-cyber-security-content-highlights</guid><dc:creator><![CDATA[Rahul Yadav]]></dc:creator><pubDate>Sun, 04 Jan 2026 10:23:56 GMT</pubDate><enclosure url="https://substackcdn.com/image/youtube/w_728,c_limit/ZxQLbagvyOI" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>&#129302; <strong>Agentic SOCs Explained | The Future of Security Operations</strong></h3><p>A deep dive into how agent-based AI is reshaping SOC workflows, decision-making, and autonomous threat response.<br>&#128073; </p><div id="youtube2-ZxQLbagvyOI" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;ZxQLbagvyOI&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/ZxQLbagvyOI?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3>&#129504; <strong>Complete Agentic SOC Roadmap (Beginner &#8594; Advanced)</strong></h3><p>Structured roadmap covering tools, architectures, and skills needed to build and run an Agentic SOC.<br>&#128073; <a href="https://hacklido.com/blog/1355-agentic-soc-roadmap-from-beginner-to-advanced">https://hacklido.com/blog/1355-agentic-soc-roadmap-from-beginner-to-advanced</a></p><div><hr></div><h3>&#128039; <strong>Package Management &amp; Repositories &#8211; Advanced Linux Mastery (Day 9)</strong></h3><p>Level up your Linux skills with package management and repository workflows.<br>&#128073; <a href="https://hacklido.com/blog/1356-package-management-and-repositories-system-administration-advanced-linux-mastery-from-zero-to-hero-day-9">https://hacklido.com/blog/1356-package-management-and-repositories-system-administration-advanced-linux-mastery-from-zero-to-hero-day-9</a></p><div><hr></div><h3>&#128250; <strong>How I Hacked My Smart TV</strong></h3><p>A real IoT hacking story showing practical device exploitation paths.<br>&#128073; <a href="https://hacklido.com/blog/1357-how-i-hacked-my-smart-tv">https://hacklido.com/blog/1357-how-i-hacked-my-smart-tv</a></p><div><hr></div><h3>&#128373;&#65039; <strong>My Complete Recon Workflow for Bug Bounty (2025 Edition)</strong></h3><p>Updated reconnaissance methodology combining automation and manual discovery.<br>&#128073; <a href="https://hacklido.com/blog/1359-my-complete-recon-workflow-for-bug-bounty-hunting-2025-edition">https://hacklido.com/blog/1359-my-complete-recon-workflow-for-bug-bounty-hunting-2025-edition</a></p><div><hr></div><h3>&#128025; <strong>GitHub Recon &#8211; Where the Real Bugs Quietly Begin</strong></h3><p>How exposure on GitHub leads to vulnerability discoveries.<br>&#128073; <a href="https://hacklido.com/blog/1361-github-recon-where-the-real-bugs-quietly-begin">https://hacklido.com/blog/1361-github-recon-where-the-real-bugs-quietly-begin</a></p><div><hr></div><h3>&#128275; <strong>IDOR: Access Any Server Through Broken Authorization</strong></h3><p>Explains IDOR vulnerabilities enabling unauthorized backend access.<br>&#128073; <a href="https://hacklido.com/blog/1362-idor-allow-the-attacker-to-get-the-access-of-any-one-server">https://hacklido.com/blog/1362-idor-allow-the-attacker-to-get-the-access-of-any-one-server</a></p><div><hr></div><h3>&#127909; <strong>Real-World Security Exploit Walkthrough</strong></h3><p>Detailed video walkthrough demonstrating active exploitation techniques.<br>&#128073; </p><div id="youtube2-WEYmJPe9PJw" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;WEYmJPe9PJw&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/WEYmJPe9PJw?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3>&#128680; <strong>Critical IDOR &#8211; Demoting All Users on the Platform</strong></h3><p>Case study of a severe IDOR that allowed demotion of every user.<br>&#128073; <a href="https://hacklido.com/blog/1364-critical-idor-allow-the-attacker-to-demote-the-all-users-exist-on-the-platform">https://hacklido.com/blog/1364-critical-idor-allow-the-attacker-to-demote-the-all-users-exist-on-the-platform</a></p><div><hr></div><h3>&#129386; <strong>Check Out Today&#8217;s Sandwich &#128588;&#127995;</strong></h3><p>Light-heart break; fun food content from the creator&#8217;s day.<br>&#128073; </p><div id="youtube2-H8CQ7XrCCdg" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;H8CQ7XrCCdg&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/H8CQ7XrCCdg?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3>&#129440; <strong>The Invisible Virus: Understanding OAuth Worms</strong></h3><p>Explores OAuth misconfigurations and self-propagating compromise attacks.<br>&#128073; <a href="https://hacklido.com/blog/1366-the-invisible-virus-understanding-oauth-worms">https://hacklido.com/blog/1366-the-invisible-virus-understanding-oauth-worms</a></p><div><hr></div><h3>&#128273; <strong>Privilege Escalation: Admin Can Delete the Owner</strong></h3><p>Shows how a privilege escalation flaw lets admin delete the platform owner.<br>&#128073; <a href="https://hacklido.com/blog/1367-privilege-escalation-allow-the-admin-to-delete-the-owner">https://hacklido.com/blog/1367-privilege-escalation-allow-the-admin-to-delete-the-owner</a></p><div><hr></div><h3>&#129514; <strong>Malware Analysis Series &#8211; Environment Setup (Day 1)</strong></h3><p>Guide to creating a safe malware analysis environment from scratch.<br>&#128073; <a href="https://hacklido.com/blog/1369-setup-environment-for-malware-analysis-malware-analysis-series-day-1">https://hacklido.com/blog/1369-setup-environment-for-malware-analysis-malware-analysis-series-day-1</a><br><br></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://hacklido.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://hacklido.substack.com/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[Blue Team & Red Team Weekly Updates|| Hacklido]]></title><description><![CDATA[Your Weekly Summary of Threats, Research, Tools & Real-World Cases]]></description><link>https://hacklido.substack.com/p/blue-team-and-red-team-weekly-updates</link><guid isPermaLink="false">https://hacklido.substack.com/p/blue-team-and-red-team-weekly-updates</guid><dc:creator><![CDATA[Rahul Yadav]]></dc:creator><pubDate>Fri, 05 Dec 2025 03:44:44 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!l4g7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F621abe85-20bb-45d9-af2a-068f2e2fbefe_512x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3><strong>1. LetsDefend Walkthrough | Password Management</strong></h3><p>&#128279; <a href="https://hacklido.com/blog/1312-letsdefend-walkthrough-password-management">https://hacklido.com/blog/1312-letsdefend-walkthrough-password-management</a><br>This walkthrough explains how to investigate and analyze password-related security alerts using the LetsDefend platform. It covers practical incident response steps, account compromise detection, and password security best practices for SOC analysts.</p><div><hr></div><h3><strong>2. IDOR &#8211; Allow the Attacker to Swap the Victim File Content</strong></h3><p>&#128279; <a href="https://hacklido.com/blog/1311-idor-allow-the-attacker-swap-the-victim-file-content">https://hacklido.com/blog/1311-idor-allow-the-attacker-swap-the-victim-file-content</a><br>A practical demonstration of an insecure direct object reference (IDOR) vulnerability that allows an attacker to modify another user&#8217;s file content. The blog explains how the vulnerability occurs, exploitation steps, and methods to mitigate such attacks.</p><div><hr></div><h3><strong>3. Email Analysis / Phishing Investigation</strong></h3><p>&#128279; <a href="https://hacklido.com/blog/1310-email-analysis-phishing-investigation">https://hacklido.com/blog/1310-email-analysis-phishing-investigation</a><br>Learn how to perform real-world phishing email analysis including header inspection, URL verification, attachment examination, and threat hunting techniques to identify malicious emails.</p><div><hr></div><h3><strong>4. How to Find XSS and Its Types &#8211; Complete Guide</strong></h3><p>&#128279; <a href="https://hacklido.com/blog/1314-how-to-find-xss-and-its-types-complete-guide">https://hacklido.com/blog/1314-how-to-find-xss-and-its-types-complete-guide</a><br>A complete guide to Cross-Site Scripting (XSS) vulnerabilities, including stored, reflected, and DOM-based attacks. It also includes payload examples, detection methods, and how to prevent XSS in applications.</p><div><hr></div><h3><strong>5. How to Find Information Using a Mobile Number &#8211; Complete Guide (2025)</strong></h3><p>&#128279; <a href="https://hacklido.com/blog/1313-how-to-find-information-using-a-mobile-number-complete-guide-2025">https://hacklido.com/blog/1313-how-to-find-information-using-a-mobile-number-complete-guide-2025</a><br>This OSINT tutorial teaches how to collect publicly available information using a phone number. It includes legal investigation techniques, tools, lookup methods, and cyber investigation tips.</p><div><hr></div><h3><strong>6. What is Blockchain Technology?</strong></h3><p>&#128279; <a href="https://hacklido.com/blog/1315-what-is-blockchain-technology">https://hacklido.com/blog/1315-what-is-blockchain-technology</a><br>A beginner-friendly explanation of blockchain, decentralization, smart contracts, consensus mechanisms, and how blockchain is transforming cybersecurity and digital systems.</p><div><hr></div><h3><strong>7. User and Process Management &#8211; Linux Mastery Day 5</strong></h3><p>&#128279; <a href="https://hacklido.com/blog/1320-user-and-process-management-linux-mastery-from-zero-to-hero-day-5">https://hacklido.com/blog/1320-user-and-process-management-linux-mastery-from-zero-to-hero-day-5</a><br>A detailed guide on Linux user and process management including user creation, privileges, process control, signals, and system monitoring&#8212;ideal for beginners and administrators.</p><div><hr></div><h3><strong>8. OSINT: Open Source Intelligence and OSINT Life Cycle</strong></h3><p>&#128279; <a href="https://hacklido.com/blog/1321-osint-open-source-intelligence-and-osint-life-cycle">https://hacklido.com/blog/1321-osint-open-source-intelligence-and-osint-life-cycle</a><br>Learn the fundamentals of OSINT, data collection phases, analysis workflow, and real-world intelligence gathering techniques used by investigators, cybersecurity professionals, and ethical hackers.</p><div><hr></div><h3><strong>9. Continuous Pentesting in 2026</strong></h3><p>&#128279; <a href="https://hacklido.com/blog/1325-continuous-pentesting-in-2026-why-on-demand-ai-driven-testing-is-a-must">https://hacklido.com/blog/1325-continuous-pentesting-in-2026-why-on-demand-ai-driven-testing-is-a-must</a><br>An insight into the future of penetration testing, focusing on automation, AI-based security testing, real-time threat detection, and how companies are shifting from traditional pentesting to continuous security cycles.</p><div><hr></div><h3><strong>10. Free VAPT Learning Resources (With Certificates)</strong></h3><p>&#128279; <a href="https://hacklido.com/blog/1326-free-vapt-penetration-testing-learning-resources-with-certificates">https://hacklido.com/blog/1326-free-vapt-penetration-testing-learning-resources-with-certificates</a><br>A curated list of high-quality free courses, labs, platforms, and certifications for learning vulnerability assessment &amp; penetration testing.</p><div><hr></div><h3><strong>11. Bash Scripting Fundamentals &#8211; Linux Mastery Day 6</strong></h3><p>&#128279; <a href="https://hacklido.com/blog/1328-bash-scripting-fundamentals-linux-mastery-from-zero-to-hero-day-6">https://hacklido.com/blog/1328-bash-scripting-fundamentals-linux-mastery-from-zero-to-hero-day-6</a><br>Covers Bash scripting basics, variables, loops, automation, and practical examples to improve technical troubleshooting and system automation skills.</p><div><hr></div><h3><strong>12. Remote Code Execution &#8211; Full Server Takeover via Web Cron Jobs</strong></h3><p>&#128279; <a href="https://hacklido.com/blog/1327-remote-code-execution-full-server-takeover-viaweb-cron-jobs">https://hacklido.com/blog/1327-remote-code-execution-full-server-takeover-viaweb-cron-jobs</a><br>Explains how insecure cron job configurations can lead to remote code execution and complete server compromise. Includes exploitation flow and mitigation strategies.</p><div><hr></div><h3><strong>13. Azure Arsenal &#8211; Fundamentals Track: Cloud Basics</strong></h3><p>&#128279; <a href="https://hacklido.com/blog/1329-azure-arsenal-fundamentals-track-cloud-basics">https://hacklido.com/blog/1329-azure-arsenal-fundamentals-track-cloud-basics</a><br>Introduction to Azure Cloud services for cybersecurity and cloud engineers. Covers core concepts, infrastructure components, and security management fundamentals.</p><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://hacklido.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://hacklido.substack.com/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[HACKLIDO Weekly — Cybersecurity Blogs]]></title><description><![CDATA[HACKLIDO Cyber Security Weekly Updates]]></description><link>https://hacklido.substack.com/p/hacklido-weekly-cybersecurity-blogs</link><guid isPermaLink="false">https://hacklido.substack.com/p/hacklido-weekly-cybersecurity-blogs</guid><dc:creator><![CDATA[Rahul Yadav]]></dc:creator><pubDate>Sat, 08 Nov 2025 12:01:39 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Mxwr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd630bc9e-bc80-4b1d-a475-7128152ccd8e_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Mxwr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd630bc9e-bc80-4b1d-a475-7128152ccd8e_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Mxwr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd630bc9e-bc80-4b1d-a475-7128152ccd8e_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!Mxwr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd630bc9e-bc80-4b1d-a475-7128152ccd8e_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!Mxwr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd630bc9e-bc80-4b1d-a475-7128152ccd8e_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!Mxwr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd630bc9e-bc80-4b1d-a475-7128152ccd8e_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Mxwr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd630bc9e-bc80-4b1d-a475-7128152ccd8e_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d630bc9e-bc80-4b1d-a475-7128152ccd8e_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1429561,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://hacklido.substack.com/i/178343679?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd630bc9e-bc80-4b1d-a475-7128152ccd8e_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Mxwr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd630bc9e-bc80-4b1d-a475-7128152ccd8e_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!Mxwr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd630bc9e-bc80-4b1d-a475-7128152ccd8e_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!Mxwr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd630bc9e-bc80-4b1d-a475-7128152ccd8e_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!Mxwr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd630bc9e-bc80-4b1d-a475-7128152ccd8e_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p></p><p>HACKLIDO | Cyber Security:<br>Linux Mastery: From Zero to Hero || Day 1<br><br><a href="https://hacklido.com/blog/1287-linux-mastery-from-zero-to-hero-day-1">https://hacklido.com/blog/1287-linux-mastery-from-zero-to-hero-day-1</a><br><br>Linux filesystem hierarchy standard (FHS)  Linux Mastery: From Zero to Hero  Day 2<br><br><a href="https://hacklido.com/blog/1287-linux-mastery-from-zero-to-hero-day-1">https://hacklido.com/blog/1287-linux-mastery-from-zero-to-hero-day-1</a><br><br>AD Pentest Blog 1 - Foundation &amp; Basic Enumeration Through DNS and SMB<br><br><a href="https://hacklido.com/blog/1293-ad-pentest-blog-1-foundation-basic-enumeration-through-dns-and-smb#1-Introduc">https://hacklido.com/blog/1293-ad-pentest-blog-1-foundation-basic-enumeration-through-dns-and-smb#1-Introduc</a><br><br><a href="https://hacklido.com/blog/1294-ernst-young-ey-exposes-4tb-database-online-what-went-wrong">https://hacklido.com/blog/1294-ernst-young-ey-exposes-4tb-database-online-what-went-wrong</a><br><br><a href="https://onion.run/">Onion.run</a>: Bridging the Surface Web and the Dark Web<br><br><a href="https://hacklido.com/blog/1296-onionrun-bridging-the-surface-web-and-the-dark-web">https://hacklido.com/blog/1296-onionrun-bridging-the-surface-web-and-the-dark-web</a><br><br><a href="https://hacklido.com/blog/1295-aspnet-core-kestrel-vulnerability">https://hacklido.com/blog/1295-aspnet-core-kestrel-vulnerability</a><br><br>*<a href="https://asp.net/">ASP.NET</a> Core Kestrel Vulnerability<br>No voters*<br><br><a href="https://hacklido.com/blog/1298-idor-allow-the-attacker-to-restrict-the-victim-access-on-the-editorsite">https://hacklido.com/blog/1298-idor-allow-the-attacker-to-restrict-the-victim-access-on-the-editorsite</a><br><br>Idor allow the attacker to restrict the victim site access<br><br>Hands-On SIEM Alert Triage with LetsDefend<br><br><a href="https://hacklido.com/blog/1300-hands-on-siem-alert-triage-with-letsdefend">https://hacklido.com/blog/1300-hands-on-siem-alert-triage-with-letsdefend</a></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://hacklido.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Hacklido Weekly! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Hacklido's writer rewards program is LIVE! ✍️ ]]></title><link>https://hacklido.substack.com/p/hacklidos-writer-rewards-program</link><guid isPermaLink="false">https://hacklido.substack.com/p/hacklidos-writer-rewards-program</guid><dc:creator><![CDATA[Rahul Yadav]]></dc:creator><pubDate>Mon, 03 Nov 2025 02:31:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!EDCO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49f71ca1-311c-4ef7-b7d0-a6761095ed40_640x800.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!EDCO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49f71ca1-311c-4ef7-b7d0-a6761095ed40_640x800.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!EDCO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49f71ca1-311c-4ef7-b7d0-a6761095ed40_640x800.jpeg 424w, https://substackcdn.com/image/fetch/$s_!EDCO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49f71ca1-311c-4ef7-b7d0-a6761095ed40_640x800.jpeg 848w, https://substackcdn.com/image/fetch/$s_!EDCO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49f71ca1-311c-4ef7-b7d0-a6761095ed40_640x800.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!EDCO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49f71ca1-311c-4ef7-b7d0-a6761095ed40_640x800.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!EDCO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49f71ca1-311c-4ef7-b7d0-a6761095ed40_640x800.jpeg" width="640" height="800" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/49f71ca1-311c-4ef7-b7d0-a6761095ed40_640x800.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:800,&quot;width&quot;:640,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:109431,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://hacklido.substack.com/i/177851643?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49f71ca1-311c-4ef7-b7d0-a6761095ed40_640x800.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!EDCO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49f71ca1-311c-4ef7-b7d0-a6761095ed40_640x800.jpeg 424w, https://substackcdn.com/image/fetch/$s_!EDCO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49f71ca1-311c-4ef7-b7d0-a6761095ed40_640x800.jpeg 848w, https://substackcdn.com/image/fetch/$s_!EDCO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49f71ca1-311c-4ef7-b7d0-a6761095ed40_640x800.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!EDCO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49f71ca1-311c-4ef7-b7d0-a6761095ed40_640x800.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>&#128680; <strong>Hacklido &#215; LetsDefend: The Ultimate Writers Challenge is Live!</strong> &#128165;</p><p>Are you passionate about cybersecurity, DFIR, or ethical hacking?<br>This is your chance to <strong>showcase your skills, share your knowledge, and get rewarded for it!</strong></p><p>&#128221; Write in-depth walkthroughs, insightful blogs, or practical guides that help the community learn &#8212; and stand a chance to <strong>win exciting cash prizes and VIP vouchers!</strong></p><p>Whether you&#8217;re a beginner trying to build your name or a pro looking to inspire others, this is your stage. &#127757;</p><p>&#128197; <strong>Challenge Duration:</strong> November 1 &#8211; 30<br>&#128279; <strong>Register Now:</strong> <a href="https://forms.gle/hwGRxFgKercFp17z7">https://forms.gle/hwGRxFgKercFp17z7</a></p><p>&#128293; Don&#8217;t just read about cybersecurity &#8212; become the one others learn from.<br>Join the #HacklidoWritersChallenge and let your words make an impact!</p>]]></content:encoded></item><item><title><![CDATA[Linux Mastery: From Zero to Hero || Day 1]]></title><description><![CDATA[Kickstart your Linux journey from scratch!]]></description><link>https://hacklido.substack.com/p/linux-mastery-from-zero-to-hero-day</link><guid isPermaLink="false">https://hacklido.substack.com/p/linux-mastery-from-zero-to-hero-day</guid><dc:creator><![CDATA[Rahul Yadav]]></dc:creator><pubDate>Thu, 30 Oct 2025 13:07:35 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!wFoI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd62120ac-7c13-4e67-a7a0-85dca400da36_1280x720.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wFoI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd62120ac-7c13-4e67-a7a0-85dca400da36_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wFoI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd62120ac-7c13-4e67-a7a0-85dca400da36_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!wFoI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd62120ac-7c13-4e67-a7a0-85dca400da36_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!wFoI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd62120ac-7c13-4e67-a7a0-85dca400da36_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!wFoI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd62120ac-7c13-4e67-a7a0-85dca400da36_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wFoI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd62120ac-7c13-4e67-a7a0-85dca400da36_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d62120ac-7c13-4e67-a7a0-85dca400da36_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:873786,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://hacklido.substack.com/i/177561832?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd62120ac-7c13-4e67-a7a0-85dca400da36_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!wFoI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd62120ac-7c13-4e67-a7a0-85dca400da36_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!wFoI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd62120ac-7c13-4e67-a7a0-85dca400da36_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!wFoI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd62120ac-7c13-4e67-a7a0-85dca400da36_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!wFoI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd62120ac-7c13-4e67-a7a0-85dca400da36_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Kickstart your Linux journey from scratch! Learn what Linux is, its history, key features, and the best beginner-friendly distributions in our <em>Linux Mastery: From Zero to Hero</em> series.<br>&#128214; Read more: <a href="https://hacklido.com/blog/1287-linux-mastery-from-zero-to-hero-day-1?utm_source=chatgpt.com">https://hacklido.com/blog/1287-linux-mastery-from-zero-to-hero-day-1</a><br>&#127760; Visit us: <a href="https://hacklido.com">https://hacklido.com</a></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://hacklido.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Hacklido Weekly! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[CyberWeekly | Issue #25]]></title><description><![CDATA[fake CAPTCHA phishing, ClickFix malware, Windows LNK exploit, GitHub Actions compromise, supply chain attack, PowerShell phishing attack, state-sponsored cyber threats, CVE-2025-30066]]></description><link>https://hacklido.substack.com/p/cyberweekly-issue-25</link><guid isPermaLink="false">https://hacklido.substack.com/p/cyberweekly-issue-25</guid><dc:creator><![CDATA[Arjun Sampath Kumar]]></dc:creator><pubDate>Sun, 23 Mar 2025 04:47:25 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/987da2ff-ff10-4447-8448-fd3f6ccbc386_1600x900.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mMEO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mMEO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 424w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 848w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 1272w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mMEO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif" width="600" height="75" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:75,&quot;width&quot;:600,&quot;resizeWidth&quot;:600,&quot;bytes&quot;:1138427,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/gif&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mMEO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 424w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 848w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 1272w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption"><strong>Sponsor: <a href="https://GuidedHacking.com">GuidedHacking.com</a></strong></figcaption></figure></div><h3><strong>TL;DR</strong></h3><p>Another day, another set of cyber shenanigans. From fake CAPTCHAs tricking people into compromising their own machines to a decade-old Windows shortcut exploit still being used by state-sponsored hackers, it&#8217;s clear that cybercriminals don&#8217;t take a day off. And in the world of software development, GitHub just got another wake-up call about the fragility of supply chains. Let&#8217;s dive in.</p><div><hr></div><h3><strong>Attackers Use Fake CAPTCHA to Lure Victims</strong></h3><p>CAPTCHAs are supposed to keep bots out, but attackers have found a way to use them as bait. Researchers at HP Wolf Security have uncovered a new phishing technique called "ClickFix," which lures users into copying and running a malicious PowerShell script. The trick? A fake CAPTCHA that exploits user complacency.</p><p><strong>Here&#8217;s how it works:</strong> A victim lands on a phishing site that looks convincingly real, often impersonating trusted brands like Booking.com. Before proceeding, they are presented with what appears to be a standard CAPTCHA verification &#8212; something most users complete without a second thought. But unlike a real CAPTCHA, this one doesn&#8217;t just verify human presence &#8212; it tricks users into copying and pasting a malicious PowerShell command into the Windows "Run" prompt.</p><p>Once executed, the script downloads malware directly onto the system, often from a legitimate cloud hosting service. This clever move helps attackers bypass traditional security defenses, as many security tools trust traffic coming from reputable cloud providers.</p><p>The scam has already hit major platforms, with Microsoft spotting a fake CAPTCHA overlay on a counterfeit Booking.com site. Sekoia&#8217;s research found similar attacks using Google reCAPTCHA and Cloudflare Turnstile as disguises, while Arctic Wolf warned that a widely used physical therapy site, HEP2go, was compromised to target the healthcare sector.</p><p>The malware, often downloaded from legitimate cloud hosting services, bypasses security alerts by leveraging trusted IP addresses. Suggested defenses? User awareness training, restricting clipboard access, and locking down the Windows "Run" command. Because if a CAPTCHA asks you to copy and paste something into your terminal, it&#8217;s not security &#8212; it&#8217;s a trap.</p><div><hr></div><h3><strong>The 8-Year-Old Windows Shortcut Vulnerability That Won&#8217;t Die</strong></h3><p>A vulnerability in Windows shortcut (.LNK) files has been silently exploited for nearly a decade by hacking groups tied to North Korea, Russia, Iran, and China. Trend Micro&#8217;s Zero Day Initiative (ZDI) found that this flaw, tracked as ZDI-CAN-25373, allows attackers to hide malicious commands inside .LNK files, making them appear harmless.</p><p>The exploit has been used to target governments, financial institutions, telecom providers, and defense agencies, with nearly 70% of attacks focused on espionage. The catch? Microsoft doesn&#8217;t see it as a security issue, so don&#8217;t expect an emergency patch anytime soon.</p><p>Defenders are advised to scan for indicators of compromise (IOCs) and be wary of unexpected shortcut files. Meanwhile, security researchers are left shaking their heads, as this is just another example of an old technique being repurposed for modern attacks.</p><div><hr></div><h3><strong>Supply Chain Attack through GitHub Actions</strong></h3><p>Developers relying on GitHub Actions may want to double-check their security settings. Security firm Wiz has uncovered a second attack on GitHub&#8217;s CI/CD workflows, potentially part of a cascading supply chain compromise. The attack impacted the popular <code>tj-actions/changed-files</code> action, leaking CI/CD secrets from up to 23,000 repositories.</p><p>It all started with the compromise of <code>reviewdog/action-setup</code>, which was then used as a stepping stone to infect other repositories. The attack was severe enough to catch the attention of the US Cybersecurity and Infrastructure Security Agency (CISA), which added the flaw (CVE-2025-30066) to its Known Exploited Vulnerabilities catalog.</p><p>Developers are urged to pin GitHub Actions to specific commit hashes, rotate exposed credentials, and audit logs for any suspicious activity. The attack highlights just how vulnerable the modern software supply chain can be &#8212; and why organizations need to treat third-party integrations as potential security risks.</p><div class="pullquote"><p><strong>Liked this post or want to chat about cybersecurity? Have suggestions? Reach out to the</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.linkedin.com/in/admiralarjun/&quot;,&quot;text&quot;:&quot;Author's LinkedIn!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.linkedin.com/in/admiralarjun/"><span>Author's LinkedIn!</span></a></p><div><hr></div><p><strong>Sponsored</strong></p><p><a href="https://guidedhacking.com/forums/java-reverse-engineering-course-jre100.538/">https://guidedhacking.com/forums/java-reverse-engineering-course-jre100.538/ </a></p><p>In the GH Java Reverse Engineering Course we're going to teach you everything there is to know about Java hacking. From decompilation and bytecode patching to remote debugging and JVM native interfaces, if you want to learn Java hacking you're in the right place. At the end of this course you'll know everything there is to know about Java reverse engineering.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://guidedhacking.com/forums/java-reverse-engineering-course-jre100.538/&quot;,&quot;text&quot;:&quot;Read More&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://guidedhacking.com/forums/java-reverse-engineering-course-jre100.538/"><span>Read More</span></a></p></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://hacklido.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><em><strong>Thank you for reading till here. If you loved the newsletter, don't forget to subscribe for getting such newsletter straight into your inbox. Share and spread &#129293; hacklido.com &#128153;</strong></em></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[CyberWeekly | Issue #24]]></title><description><![CDATA[Microsoft, cybersecurity, rural hospitals, encryption, Apple, UK government, backdoor access, CISA, cyber incident reporting, financial sector, ransomware, data privacy, end-to-end encryption]]></description><link>https://hacklido.substack.com/p/cyberweekly-issue-24</link><guid isPermaLink="false">https://hacklido.substack.com/p/cyberweekly-issue-24</guid><dc:creator><![CDATA[Arjun Sampath Kumar]]></dc:creator><pubDate>Sun, 09 Mar 2025 06:09:48 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/fb419b51-d38f-4a36-b365-074ffb5c2efc_1600x900.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mMEO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mMEO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 424w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 848w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 1272w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mMEO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif" width="600" height="75" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:75,&quot;width&quot;:600,&quot;resizeWidth&quot;:600,&quot;bytes&quot;:1138427,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/gif&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mMEO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 424w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 848w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 1272w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption"><strong>Sponsor: <a href="https://GuidedHacking.com">GuidedHacking.com</a></strong></figcaption></figure></div><p></p><h3><strong>TL;DR</strong></h3><p>Microsoft warns that US rural hospitals need at least $75 million to meet basic cybersecurity standards, as cyberattacks on these facilities have been linked to increased patient mortality. Apple is taking the UK government to court over a reported order demanding encryption backdoors, arguing that such a move would weaken global digital security. Meanwhile, US financial organizations are pushing back against CISA&#8217;s proposed cyber incident reporting rule, claiming it would place undue burdens on companies without improving security. Across industries, the battle between regulation, security, and financial constraints is heating up.</p><div><hr></div><h3><strong>Microsoft Sounds the Alarm on Rural Hospital Cybersecurity</strong></h3><p>Microsoft has revealed a stark cybersecurity gap in US rural hospitals, estimating that at least $75 million is needed to bring these facilities up to basic security standards. Of the 2,100 rural hospitals nationwide, nearly 1,000 operate independently, without the financial support of larger networks. These hospitals struggle to implement even the most fundamental cybersecurity measures, such as multi-factor authentication (MFA) and unified identity management, leaving them vulnerable to attacks.</p><p>Last year, Microsoft launched its Cybersecurity for Rural Hospitals Program, offering free security assessments, training, and discounts on Microsoft security products. A recent report from the company highlights a dire consequence of cyberattacks: a 20% increase in patient mortality rates when hospitals experience system disruptions. Beyond the immediate dangers of ransomware and data breaches, these attacks force patients to travel farther for care, increasing risks for those in critical condition. While Microsoft&#8217;s initiative is a step forward, the funding gap remains staggering. The proposed $75 million investment amounts to less than three hours of Microsoft&#8217;s annual revenue, raising questions about whether major tech firms and policymakers will step up to protect these vital healthcare institutions before another crisis hits.</p><div><hr></div><h3><strong>Apple Challenges UK&#8217;s Encryption Backdoor Order</strong></h3><p>Apple is taking the UK government to court over a reported demand that would force the company to weaken its end-to-end encryption protections. The case, filed with the UK&#8217;s Investigatory Powers Tribunal (IPT), follows Apple&#8217;s recent decision to withdraw its Advanced Data Protection (ADP) feature from the UK market. While the UK government has not officially acknowledged the existence of such an order, it is widely suspected to be a Technical Capability Notice (TCN) issued under the Investigatory Powers Act of 2016&#8212;often called the &#8220;Snooper&#8217;s Charter.&#8221;</p><p>Apple&#8217;s legal battle highlights a broader concern over digital privacy. If forced to comply, Apple would not only have to provide UK authorities with access to encrypted iCloud data but could also set a precedent that other governments might follow. Critics argue that any encryption backdoor&#8212;regardless of intent&#8212;creates a systemic weakness that could be exploited by malicious actors. Security experts warn that such a move would break encryption in a fundamental way, as no government can guarantee exclusive access to these vulnerabilities. Apple&#8217;s fight isn&#8217;t just about the UK; it&#8217;s about defending encryption standards worldwide. Whether the IPT will rule in Apple&#8217;s favor remains uncertain, but the case is shaping up to be a critical test for global digital security.</p><div><hr></div><h3><strong>US Financial Sector Pushes Back on CISA Cyber Incident Rule</strong></h3><p>Leading financial organizations are urging the Cybersecurity and Infrastructure Security Agency (CISA) to rethink its proposed cyber incident reporting rule, arguing that it could create unnecessary burdens without improving security. The rule, part of the Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA), would require financial institutions to report significant cyber incidents within 72 hours and ransomware payments within 24. With CIRCIA set to take effect in October 2025, industry leaders warn that the regulation could force companies to divert critical resources away from responding to attacks and toward compliance paperwork.</p><p>While regulators argue that real-time reporting will improve national cybersecurity resilience, financial institutions see it differently. Some claim the rule exceeds its intended scope, creating overlapping obligations with existing SEC regulations. Others suggest that the 24-hour ransomware payment reporting requirement could inadvertently expose companies to scrutiny under the Treasury Department&#8217;s Office of Foreign Assets Control (OFAC), which prohibits payments to sanctioned entities. At its core, this debate pits regulatory oversight against corporate autonomy, with financial firms seeking to minimize government intervention while CISA pushes for greater transparency. With time running out before the rule takes effect, negotiations between industry and regulators could determine whether CISA adjusts its approach or doubles down on enforcement.</p><div class="pullquote"><p><strong>Liked this post or want to chat about cybersecurity? Have suggestions? Reach out to the</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.linkedin.com/in/admiralarjun/&quot;,&quot;text&quot;:&quot;Author's LinkedIn!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.linkedin.com/in/admiralarjun/"><span>Author's LinkedIn!</span></a></p><div><hr></div><p><strong>Sponsored</strong></p><p><a href="https://guidedhacking.com/threads/nemi-roblox-byfron-anticheat-guided-hacking-podcast-3.20826/">https://guidedhacking.com/threads/nemi-roblox-byfron-anticheat-guided-hacking-podcast-3.20826/ </a></p><p>In this episode of the Guided Hacking Podcast, we learn about Nemi's journey&#8212;from how he got started, to building his anti-cheat solutions, and working at top gaming firms. We discuss the anti-cheat industry, the future of anti-cheat, and game integrity. During the episode, Nemi shares practical tips on professionally pursuing a career as a game hacker and answers some community questions. This episode is full with valuable insights and actionable advice for game hackers.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://guidedhacking.com/threads/nemi-roblox-byfron-anticheat-guided-hacking-podcast-3.20826/&quot;,&quot;text&quot;:&quot;Read&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://guidedhacking.com/threads/nemi-roblox-byfron-anticheat-guided-hacking-podcast-3.20826/"><span>Read</span></a></p></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://hacklido.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><em><strong>Thank you for reading till here. If you loved the newsletter, don't forget to subscribe for getting such newsletter straight into your inbox. Share and spread &#129293; hacklido.com &#128153;</strong></em></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p><strong>Without the community partners, hacklido wouldn't be where it is now, So we would like to thank them.</strong></p><ul><li><p><strong><a href="https://t.me/Cyber_Security_Channel">Cyber Security News</a></strong></p></li><li><p><strong><a href="http://sysxplore.com">Sysxplore</a></strong></p></li></ul><blockquote><p><strong>If you wish to Sponsor / Partner with hacklido and get benefitted? Reach out to us via </strong><em><strong>maalolan@hacklido.com / <a href="https://hacklido.com/discord">discord</a> / <a href="https://t.me/hacklidocom">telegram group</a> / <a href="https://www.linkedin.com/in/admiralarjun/">Author&#8217;s LinkedIn</a></strong></em><strong> to discuss with us!</strong></p></blockquote>]]></content:encoded></item><item><title><![CDATA[CyberWeekly | Issue #23]]></title><description><![CDATA[Encryption, cybersecurity, surveillance, vulnerability, Signal, ransomware, backdoor, privacy, government, resilience, MITRE Caldera, remote code execution, cyberattack, law enforcement, data security]]></description><link>https://hacklido.substack.com/p/cyberweekly-issue-23</link><guid isPermaLink="false">https://hacklido.substack.com/p/cyberweekly-issue-23</guid><dc:creator><![CDATA[Arjun Sampath Kumar]]></dc:creator><pubDate>Sat, 01 Mar 2025 08:55:57 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/6075622a-b709-4c4d-97a3-bf86169c8e78_1600x900.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mMEO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mMEO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 424w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 848w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 1272w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mMEO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif" width="600" height="75" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:75,&quot;width&quot;:600,&quot;resizeWidth&quot;:600,&quot;bytes&quot;:1138427,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/gif&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mMEO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 424w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 848w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 1272w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption"><strong>Sponsor: <a href="https://GuidedHacking.com">GuidedHacking.com</a></strong></figcaption></figure></div><p></p><h3><strong>TL;DR</strong></h3><p>Sweden is pushing for an encryption backdoor law, but Signal refuses to comply and may exit the country rather than compromise user privacy. Meanwhile, a critical vulnerability in MITRE Caldera&#8212;a widely used cybersecurity tool&#8212;has been exposed, allowing remote code execution with a severity score of 10.0. And in Maryland, a cyberattack forced Anne Arundel County offices to shut down for a day, highlighting the ongoing threats facing local governments.</p><div><hr></div><h3><strong>Signal vs. Sweden &#8211; A Battle Over Privacy</strong></h3><p>Sweden is pushing forward with a legislative proposal that has sent shockwaves through the cybersecurity and privacy communities. The proposed law would require messaging services using end-to-end encryption (E2EE), including Signal and WhatsApp, to store user messages for up to two years and make them accessible to law enforcement upon request. The reaction from Signal has been swift and unequivocal: it will leave the Swedish market before complying with any regulation that undermines its core mission of providing secure and private communication.</p><p>Meredith Whittaker, president of the Signal Foundation, has been a vocal advocate for privacy and strongly opposed to any form of encryption backdoor. Speaking to Swedish media outlet SVT Nyheter, she characterized the proposed legislation as a &#8220;catastrophic&#8221; attack on fundamental rights. Her concerns are well-founded. The essence of E2EE is that only the sender and recipient can access a message&#8212;service providers themselves do not hold the keys. Any attempt to create an exception, even for law enforcement, inherently weakens encryption for all users and opens the door to exploitation by malicious actors.</p><p>Interestingly, the Swedish military has also raised alarms about the proposal, warning the government that weakening encrypted communication would pose national security risks. This highlights a paradox: governments seek access to encrypted messages for investigative purposes, yet their own security agencies rely on the same encryption to protect sensitive information. If Signal follows through on its threat to exit Sweden, it won&#8217;t be the first company to take such a stand. Apple recently withdrew key services from the UK rather than comply with similar legal demands.</p><p>The larger concern is that this isn&#8217;t an isolated case. Governments around the world are increasingly demanding backdoor access to encrypted communications, often citing crime prevention and national security as justifications. But history has shown that such measures don&#8217;t deter criminals&#8212;they adapt. If mainstream platforms like Signal and WhatsApp are forced to compromise their encryption, sophisticated threat actors will simply migrate to private, decentralized alternatives, leaving ordinary users exposed to government surveillance and cybercriminal threats alike.</p><p>The coming months will determine whether Sweden backs down in the face of mounting resistance or pushes forward, potentially setting a precedent that other nations might follow. If the law is passed, Sweden may not only lose access to Signal but could also trigger a wider exodus of secure communication providers&#8212;leaving citizens and even government agencies with fewer reliable options for privacy-focused messaging.</p><div><hr></div><h3><strong>MITRE Caldera&#8217;s Critical Vulnerability</strong></h3><p>In an unsettling turn of events, a critical vulnerability has been discovered in MITRE Caldera, an open-source adversary emulation platform widely used by security teams to test defenses and simulate cyberattacks. This isn&#8217;t just another routine bug&#8212;it&#8217;s a command injection vulnerability with a CVSS score of 10.0, the highest possible severity rating.</p><p>The issue, identified by security researcher Dawid Kulikowski, allows remote code execution under default configurations. This means an attacker can gain full control over the system running Caldera, executing arbitrary commands with potentially devastating consequences. The vulnerability affects all versions of the software and is particularly dangerous because its exploitation requires no special conditions&#8212;just the presence of Go, Python, and GCC, which are already required for Caldera&#8217;s normal operation.</p><p>The discovery raises serious concerns about security practices even within organizations dedicated to cybersecurity research. How did such a severe flaw go undetected before release? Was it a failure of automated security testing, a gap in manual code reviews, or an oversight in QA processes? These are the kinds of questions the cybersecurity community is asking. While a patch has been released, the incident highlights a troubling reality: even the tools designed to strengthen security can themselves become attack vectors if vulnerabilities are not properly managed.</p><p>The fact that proof-of-concept exploits have already been made public only adds urgency to the situation. Organizations using Caldera must immediately update their installations and ensure their instances are not exposed to the internet. While the overall impact may seem limited&#8212;after all, Caldera is not a mainstream consumer product&#8212;it serves as a stark reminder that security teams must continuously scrutinize their own tools just as they would any other potential attack surface. The irony here is undeniable: in the process of simulating threats, security professionals may have unwittingly introduced an actual threat into their own environments.</p><div><hr></div><h3><strong>Cyberattack Shuts Down Maryland County Offices</strong></h3><p>Anne Arundel County, Maryland, was forced to temporarily shut down its government offices after a cyberattack disrupted its systems. While officials have provided few details, early reports suggest that internet access was deliberately restricted as a precautionary measure&#8212;an indication that the county may have been dealing with ransomware or another form of malicious intrusion.</p><p>County buildings reopened the next day, but online services remained partially limited, and employees were encouraged to work remotely if possible. This highlights a crucial issue: even as some organizations scale back remote work policies, the ability to shift quickly to secure telework remains vital during unexpected disruptions. Whether due to cyberattacks, natural disasters, or other emergencies, organizations must maintain reliable and resilient IT infrastructure that allows for operational continuity.</p><p>The incident also underscores the ongoing vulnerability of local governments to cyber threats. Municipalities often lack the robust cybersecurity budgets of large corporations, making them attractive targets for ransomware groups and other attackers. While Anne Arundel County appears to have mitigated the immediate impact, the attack serves as a reminder that proactive defense strategies&#8212;including strong network segmentation, regular security audits, and comprehensive incident response plans&#8212;are non-negotiable in today&#8217;s threat landscape.</p><p>One question that remains unanswered is the scope of the attack. Was this a targeted effort, or part of a larger campaign affecting multiple local governments? In recent years, we&#8217;ve seen cybercriminal groups increasingly targeting state and municipal agencies, knowing that they provide essential services and may feel pressured to pay ransoms quickly.</p><p>For now, county officials have promised updates as they assess the damage and restore full functionality. But the bigger lesson here is clear: preparedness isn&#8217;t optional. Cyber resilience must be built into every organization&#8217;s DNA, because the next attack is only a matter of time.</p><div class="pullquote"><p><strong>Liked this post or want to chat about cybersecurity? Have suggestions? Reach out to the</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.linkedin.com/in/admiralarjun/&quot;,&quot;text&quot;:&quot;Author's LinkedIn!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.linkedin.com/in/admiralarjun/"><span>Author's LinkedIn!</span></a></p><div><hr></div><p><strong>Sponsored</strong></p><p><a href="https://guidedhacking.com/forums/the-game-hacking-bible-learn-how-to-hack-games.469/">https://guidedhacking.com/forums/the-game-hacking-bible-learn-how-to-hack-games.469/</a></p><p>The Game Hacking Bible is an intricate and multifaceted guide to the art of game hacking. It contains quite literally, all the skills and knowledge required to hack modern PC video games. Its contents cover a vast array of techniques and strategies used by skilled hackers to manipulate and modify game code in order to achieve their desired outcomes. Bursting with detailed examples and step-by-step instructions, this manual is a treasure trove of knowledge for software developers looking to up their game. Whether you're a seasoned hacker or just starting out, the Game Hacking Bible is an essential resource for anyone looking to hone their skills in this exciting and naturally dynamic field. So why not dive in and discover the world of game hacking for yourself? With this guide as your companion, the possibilities are endless. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://guidedhacking.com/forums/the-game-hacking-bible-learn-how-to-hack-games.469/&quot;,&quot;text&quot;:&quot;Read&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://guidedhacking.com/forums/the-game-hacking-bible-learn-how-to-hack-games.469/"><span>Read</span></a></p></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://hacklido.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><em><strong>Thank you for reading till here. If you loved the newsletter, don't forget to subscribe for getting such newsletter straight into your inbox. Share and spread &#129293; hacklido.com &#128153;</strong></em></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p><strong>Without the community partners, hacklido wouldn't be where it is now, So we would like to thank them.</strong></p><ul><li><p><strong><a href="https://t.me/Cyber_Security_Channel">Cyber Security News</a></strong></p></li><li><p><strong><a href="http://sysxplore.com">Sysxplore</a></strong></p></li></ul><blockquote><p><strong>If you wish to Sponsor / Partner with hacklido and get benefitted? Reach out to us via </strong><em><strong>maalolan@hacklido.com / <a href="https://hacklido.com/discord">discord</a> / <a href="https://t.me/hacklidocom">telegram group</a> / <a href="https://www.linkedin.com/in/admiralarjun/">Author&#8217;s LinkedIn</a></strong></em><strong> to discuss with us!</strong></p></blockquote>]]></content:encoded></item><item><title><![CDATA[CyberWeekly 22' Feb | Issue #22]]></title><description><![CDATA[Microsoft Majorana 1, Quantum computing, Signal phishing, Russian cyber threats, OpenSSH vulns, MitM attack, DoS attack, Cybersecurity updates, Encrypted messaging, Quantum crypto]]></description><link>https://hacklido.substack.com/p/cyberweekly-22-feb-issue-22</link><guid isPermaLink="false">https://hacklido.substack.com/p/cyberweekly-22-feb-issue-22</guid><dc:creator><![CDATA[Arjun Sampath Kumar]]></dc:creator><pubDate>Sat, 22 Feb 2025 06:33:39 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/73a7715d-8cbd-475f-b837-72b2af00fb75_1600x900.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mMEO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mMEO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 424w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 848w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 1272w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mMEO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif" width="600" height="75" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:75,&quot;width&quot;:600,&quot;resizeWidth&quot;:600,&quot;bytes&quot;:1138427,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/gif&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mMEO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 424w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 848w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 1272w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption"><strong>Sponsor: <a href="https://GuidedHacking.com">GuidedHacking.com</a></strong></figcaption></figure></div><p></p><h3><strong>TL;DR</strong></h3><p>Microsoft has unveiled <strong>Majorana 1</strong>, a breakthrough quantum processor leveraging topoconductors to create scalable, error-resistant qubits, pushing quantum computing closer to real-world applications. Meanwhile, <strong>Russian hackers</strong> are exploiting Signal&#8217;s "Linked Devices" feature through phishing attacks, prompting Signal to introduce new security measures. Lastly, <strong>OpenSSH</strong> has patched two critical vulnerabilities that could enable <strong>Man-in-the-Middle (MitM) and Denial-of-Service (DoS) attacks</strong>, urging users to update immediately.</p><div><hr></div><h2><strong>Microsoft&#8217;s Quantum Leap - Majorana 1 Chip Breakthrough</strong></h2><p>Microsoft has just made a bold move in the quantum computing race with the unveiling of its <strong>Majorana 1</strong> chip, a potential game-changer that could bring quantum computing out of the lab and into real-world applications. The key to this breakthrough? <strong>Topoconductors</strong>&#8212;a new class of materials that form the foundation for Microsoft&#8217;s topological qubits, which aim to be more stable and scalable than existing quantum bits.</p><p>At the heart of the challenge with quantum computing lies error correction. Qubits, unlike classical bits, are highly sensitive to environmental noise, leading to computational errors. Microsoft&#8217;s new design, leveraging <strong>tetrons</strong> as logical qubits for error correction, claims to drastically reduce these errors&#8212;bringing the error rate down to a manageable <strong>1%</strong>. If successful, this would make quantum computing truly viable for real-world applications, from cryptography to AI and complex simulations.</p><p>Perhaps most impressive is the scale Microsoft is aiming for: a <strong>million-qubit quantum processor</strong>&#8212;all within a chip roughly the size of a standard CPU. That&#8217;s a staggering leap from today&#8217;s state-of-the-art quantum machines, which operate with only a few hundred qubits. If realized, this could put Microsoft ahead in the race toward <strong>practical, large-scale quantum computing</strong>.</p><p>The implications? Enormous. The U.S. government&#8217;s <strong>"Quantum Crypto Deadline" of 2035</strong> suddenly seems much more realistic. Organizations must start <strong>preparing for a post-quantum world</strong>, ensuring cryptographic agility and adopting flexible security measures that can adapt to quantum-resistant algorithms.</p><p>While Majorana 1 is still in development and requires <strong>absolute zero temperatures</strong> to function, the roadmap for scalable quantum computing has never looked clearer. Keep your eyes on this space&#8212;because when this tech matures, the computing world as we know it will change forever.</p><div><hr></div><h2><strong>Signal&#8217;s Linked Devices Feature Hijacked by Russian Hackers</strong></h2><p>Encrypted messaging apps like Signal are often hailed as the last bastion of privacy&#8212;but even the best security measures can be undermined by <strong>social engineering</strong>. Google&#8217;s Threat Intelligence Group (GTIG) has flagged a <strong>Russian state-backed phishing campaign</strong> exploiting Signal&#8217;s "Linked Devices" feature, allowing attackers to silently eavesdrop on messages in real-time.</p><p>Here&#8217;s how it works: Victims are tricked into scanning a <strong>malicious QR code or clicking a phishing link</strong>, believing it to be a legitimate security alert or group invite. Instead, they unknowingly grant attackers access to their Signal account, syncing their conversations across devices controlled by the threat actor. This means every message sent and received is intercepted <strong>without the user realizing it</strong>.</p><p>In response, Signal has rolled out <strong>new security measures</strong>, requiring additional authentication when linking devices and implementing real-time warnings for suspicious connections. But the attack underscores a deeper issue: <strong>user interface vulnerabilities</strong> can be just as dangerous as traditional software exploits. Many users struggle to distinguish between benign QR codes and <strong>phishing traps</strong>, making them easy targets for sophisticated cyberattacks.</p><p>Security experts warn that these tactics <strong>aren&#8217;t limited to Signal</strong>&#8212;other messaging platforms like WhatsApp and Telegram are also in the crosshairs. The best defenses? <strong>Use complex passwords, enable Lockdown Mode on iPhones, check your "linked devices" list regularly, and never scan QR codes from untrusted sources</strong>. As threats against encrypted communication intensify, vigilance is key.</p><div><hr></div><h2><strong>OpenSSH Patches Flaws That Could Expose Millions to MitM and DoS Attacks</strong></h2><p>If your systems rely on OpenSSH, it&#8217;s time to patch&#8212;<strong>now</strong>. Researchers at Qualys Threat Research Unit (TRU) have uncovered two critical vulnerabilities that could put millions of SSH servers at risk, including those used by tech giants like Facebook, Netflix, and Morgan Stanley.</p><p>The first flaw, <strong>CVE-2025-26465</strong>, allows attackers to launch <strong>Man-in-the-Middle (MitM) attacks</strong> by exploiting OpenSSH&#8217;s <code>VerifyHostKeysDNS</code> option. Ironically, this setting&#8212;designed to <strong>verify</strong> a server&#8217;s authenticity&#8212;has been found to actually <strong>compromise</strong> security, leaving connections vulnerable to interception. What&#8217;s worse? This flaw has been present in OpenSSH since <strong>2014</strong> and was <strong>enabled by default in FreeBSD until 2023</strong>.</p><p>The second flaw, <strong>CVE-2025-26466</strong>, enables <strong>pre-authentication Denial-of-Service (DoS) attacks</strong>, which could allow malicious actors to crash OpenSSH servers before authentication even takes place.</p><p>Both issues have been patched in <strong>OpenSSH 9.9p2</strong>, and if your organization uses OpenSSH, updating immediately is non-negotiable. Beyond patching, <strong>tighten access controls</strong>&#8212;exposing SSH services unnecessarily can lead to <strong>massive security headaches</strong>. And if you&#8217;re still relying on DNS-based host key verification, it&#8217;s time to rethink your security strategy.</p><p>The bigger picture? OpenSSH underpins secure remote access for <strong>millions of systems worldwide</strong>. These flaws, while now patched, serve as a stark reminder that even foundational security tools can harbor vulnerabilities for years before they&#8217;re discovered. <strong>Regular updates and proactive security measures aren&#8217;t optional&#8212;they&#8217;re essential.</strong></p><div class="pullquote"><p><strong>Liked this post or want to chat about cybersecurity? Have suggestions? Reach out to the</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.linkedin.com/in/admiralarjun/&quot;,&quot;text&quot;:&quot;Author's LinkedIn!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.linkedin.com/in/admiralarjun/"><span>Author's LinkedIn!</span></a></p><div><hr></div><p><strong>Sponsored</strong></p><p><a href="https://guidedhacking.com/forums/the-game-hacking-bible-learn-how-to-hack-games.469/">https://guidedhacking.com/forums/the-game-hacking-bible-learn-how-to-hack-games.469/</a></p><p>The Game Hacking Bible is an intricate and multifaceted guide to the art of game hacking. It contains quite literally, all the skills and knowledge required to hack modern PC video games. Its contents cover a vast array of techniques and strategies used by skilled hackers to manipulate and modify game code in order to achieve their desired outcomes. Bursting with detailed examples and step-by-step instructions, this manual is a treasure trove of knowledge for software developers looking to up their game. Whether you're a seasoned hacker or just starting out, the Game Hacking Bible is an essential resource for anyone looking to hone their skills in this exciting and naturally dynamic field. So why not dive in and discover the world of game hacking for yourself? With this guide as your companion, the possibilities are endless. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://guidedhacking.com/forums/the-game-hacking-bible-learn-how-to-hack-games.469/&quot;,&quot;text&quot;:&quot;Read&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://guidedhacking.com/forums/the-game-hacking-bible-learn-how-to-hack-games.469/"><span>Read</span></a></p></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://hacklido.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><em><strong>Thank you for reading till here. If you loved the newsletter, don't forget to subscribe for getting such newsletter straight into your inbox. Share and spread &#129293; hacklido.com &#128153;</strong></em></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p><strong>Without the community partners, hacklido wouldn't be where it is now, So we would like to thank them.</strong></p><ul><li><p><strong><a href="https://t.me/Cyber_Security_Channel">Cyber Security News</a></strong></p></li><li><p><strong><a href="http://sysxplore.com">Sysxplore</a></strong></p></li></ul><blockquote><p><strong>If you wish to Sponsor / Partner with hacklido and get benefitted? Reach out to us via </strong><em><strong>maalolan@hacklido.com / <a href="https://hacklido.com/discord">discord</a> / <a href="https://t.me/hacklidocom">telegram group</a> / <a href="https://www.linkedin.com/in/admiralarjun/">Author&#8217;s LinkedIn</a></strong></em><strong> to discuss with us!</strong></p></blockquote>]]></content:encoded></item><item><title><![CDATA[CyberWeekly 16' Feb | Issue #21]]></title><description><![CDATA[Zero-day, WinSock, PrisEsc, LDAP RCE, Ransomware, 8Base ransomware, Phobos ransomware, Cybercrime extradition, Cisco, Salt Typhoon (RedMike), Chinese APT, Threat intelligence]]></description><link>https://hacklido.substack.com/p/cyberweekly-16-feb-issue-21</link><guid isPermaLink="false">https://hacklido.substack.com/p/cyberweekly-16-feb-issue-21</guid><dc:creator><![CDATA[Arjun Sampath Kumar]]></dc:creator><pubDate>Sun, 16 Feb 2025 07:31:02 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/286c00ef-c78d-452b-9249-40a37c51fac6_1600x900.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mMEO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mMEO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 424w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 848w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 1272w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mMEO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif" width="600" height="75" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:75,&quot;width&quot;:600,&quot;resizeWidth&quot;:600,&quot;bytes&quot;:1138427,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/gif&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mMEO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 424w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 848w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 1272w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption"><strong>Sponsor: <a href="https://GuidedHacking.com">GuidedHacking.com</a></strong></figcaption></figure></div><p></p><h3><strong>TL;DR</strong></h3><p>Cybersecurity never takes a break, and neither should your defenses. This week, Microsoft&#8217;s Patch Tuesday reveals actively exploited vulnerabilities, a global law enforcement effort takes down a major ransomware gang, and China-linked hackers target unpatched Cisco devices. Let&#8217;s break it all down.</p><div><hr></div><h2><strong>Microsoft Patch Tuesday: Two Zero-Days Actively Exploited</strong></h2><p>Microsoft&#8217;s <strong>February 2025 Patch Tuesday</strong> fixes <strong>63 vulnerabilities</strong>, including <strong>four critical flaws</strong> and <strong>four zero-days</strong>, two of which <strong>are already being exploited in the wild</strong>.</p><h3><strong>The Actively Exploited Zero-Days</strong></h3><p><strong>&#128680; CVE-2025-21418 (CVSS 7.8) &#8211; WinSock Elevation of Privilege Vulnerability</strong></p><ul><li><p>Affects the <strong>Windows Ancillary Function Driver for WinSock - </strong>primarily responsible for handling network-related functions..</p></li><li><p>Allows an attacker to <strong>gain SYSTEM-level privileges</strong>&#8212;giving them full control over the affected machine via heap-based buffer overflow.</p></li><li><p><strong>No user interaction required</strong>, making exploitation relatively simple.</p></li><li><p><strong>Context:</strong> This is the <strong>ninth</strong> WinSock-related privilege escalation vulnerability since 2022. A similar flaw (<strong>CVE-2024-38193</strong>) was previously exploited by <strong>North Korea&#8217;s Lazarus Group</strong> to deploy rootkits.</p></li></ul><p><strong>&#128680; CVE-2025-21391 (CVSS 7.1) &#8211; Windows Storage Elevation of Privilege Vulnerability - </strong>Lets attackers <strong>delete specific files</strong>, which could be used to <strong>disrupt services</strong> or <strong>erase evidence</strong> of other malicious activity.</p><h3><strong>The Other Zero-Days</strong> (Not Yet Exploited)</h3><p>&#128312; <strong>CVE-2025-21194 (CVSS 7.1) &#8211; Microsoft Surface Security Feature Bypass</strong></p><ul><li><p>A high-complexity attack targeting <strong>Microsoft Surface devices</strong>.</p></li><li><p>Could allow an attacker to circumvent <strong>security controls</strong>, though details remain scarce.</p></li></ul><p>&#128312; <strong>CVE-2025-21377 (CVSS 6.5) &#8211; NTLM Hash Disclosure Spoofing Vulnerability</strong></p><ul><li><p>Could result in a <strong>total loss of confidentiality</strong> with <strong>minimal user interaction</strong>.</p></li><li><p>NTLM-related vulnerabilities are especially concerning because <strong>they enable credential theft</strong>, which can be used for <strong>lateral movement within networks</strong>.</p></li></ul><div><hr></div><h2><strong>8Base Ransomware Takedown: Four Russian Nationals Arrested</strong></h2><p>A massive <strong>international law enforcement operation</strong> has led to the <strong>arrest of four Russian nationals in Thailand</strong>, suspected of running the <strong>8Base ransomware gang</strong>. The <strong>operation spanned 14 countries</strong>, and authorities <strong>seized the group&#8217;s dark web leak site</strong>, replacing it with a law enforcement notice.</p><h3><strong>Who is 8Base?</strong></h3><ul><li><p>8Base specializes in <strong>double extortion ransomware</strong>, encrypting victims&#8217; data and threatening to publish it unless a ransom is paid.</p></li><li><p>The group <strong>uses a variant of Phobos ransomware</strong>, a <strong>Ransomware-as-a-Service (RaaS)</strong> model.</p></li><li><p><strong>Victims:</strong> Over <strong>1,000 organizations worldwide</strong>.</p></li><li><p><strong>Estimated ransom profits:</strong> At least <strong>$16 million</strong>.</p></li></ul><h3><strong>Legal Consequences for the Arrested Individuals</strong></h3><p>&#128204; <strong>U.S. extradition request </strong>- They face charges of <strong>wire fraud</strong> and <strong>conspiracy to commit cybercrime</strong>.<br>&#128204; <strong>Swiss extradition request -</strong> They allegedly <strong>attacked 17 Swiss companies</strong>, laundering ransom payments through <strong>cryptocurrency mixing services</strong>.</p><h3><strong>Why This Matters</strong></h3><p>&#9989; <strong>Tactical win for law enforcement</strong> - Cybercriminals can no longer travel freely without fearing arrest.<br>&#9989; <strong>Will this stop 8Base?</strong> The <strong>Phobos ransomware family is still active</strong>, meaning new operators could step in.<br>&#9989; <strong>8Base victims may still be at risk</strong> - Stolen data may be resurfacing on <strong>other leak sites</strong>.</p><div><hr></div><h2><strong>Chinese Hackers Exploiting Unpatched Cisco Devices</strong></h2><p>A <strong>Chinese state-sponsored hacking group, Salt Typhoon (aka RedMike)</strong>, has been exploiting <strong>unpatched Cisco routers</strong> belonging to <strong>telecommunications providers and universities worldwide</strong>.</p><h3><strong>How the Attack Worked</strong></h3><ul><li><p><strong>Target:</strong> Internet-facing <strong>Cisco network devices</strong>.</p></li><li><p>Vulnerability: Allowed attackers to <strong>gain elevated privileges</strong> and <strong>alter device configurations</strong>. </p></li><li><p><strong>Goal:</strong> Likely <strong>cyber-espionage</strong> and <strong>persistent access</strong> for long-term surveillance.</p></li></ul><h3><strong>The Bigger Problem is Unpatched Critical Infrastructure</strong></h3><p>&#128680; <strong>Unpatched, internet-facing network devices</strong> are a prime target for hackers.<br>&#128680; <strong>Telnet-enabled Cisco routers</strong> remain <strong>shockingly common</strong>, making remote exploitation easier.</p><h3><strong>Who&#8217;s Responsible?</strong></h3><p>&#128204; Many of the affected organizations <strong>failed to patch their routers</strong>, despite known vulnerabilities.<br>&#128204; This represents a <strong>&#8220;standard duty of care&#8221; failure</strong>&#8212;large enterprises <strong>must prioritize security updates</strong>.</p><h3><strong>How to Protect Your Network</strong></h3><p>&#10004; <strong>Patch immediately:</strong> Keeping Cisco devices up to date is <strong>non-negotiable</strong>.<br>&#10004; <strong>Lock down remote access:</strong> Disable <strong>Telnet</strong> and enable <strong>SSH-only administration</strong>.<br>&#10004; <strong>Deploy network monitoring:</strong> Watch for <strong>unauthorized configuration changes</strong>.</p><h3><strong>Why It Matters</strong></h3><p>&#128204; <strong>This isn&#8217;t just about Cisco</strong>&#8212;every organization with <strong>internet-facing network appliances</strong> should take this as a warning.<br>&#128204; <strong>Nation-state actors are getting more aggressive</strong>, and <strong>defenders need to step up their game</strong>.</p><div class="pullquote"><p><strong>Liked this post or want to chat about cybersecurity? Have suggestions? Reach out to the</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.linkedin.com/in/admiralarjun/&quot;,&quot;text&quot;:&quot;Author's LinkedIn!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.linkedin.com/in/admiralarjun/"><span>Author's LinkedIn!</span></a></p><div><hr></div><p><strong>Sponsored</strong></p><p><a href="https://guidedhacking.com/forums/the-game-hacking-bible-learn-how-to-hack-games.469/">https://guidedhacking.com/forums/the-game-hacking-bible-learn-how-to-hack-games.469/</a></p><p>The Game Hacking Bible is an intricate and multifaceted guide to the art of game hacking. It contains quite literally, all the skills and knowledge required to hack modern PC video games. Its contents cover a vast array of techniques and strategies used by skilled hackers to manipulate and modify game code in order to achieve their desired outcomes. Bursting with detailed examples and step-by-step instructions, this manual is a treasure trove of knowledge for software developers looking to up their game. Whether you're a seasoned hacker or just starting out, the Game Hacking Bible is an essential resource for anyone looking to hone their skills in this exciting and naturally dynamic field. So why not dive in and discover the world of game hacking for yourself? With this guide as your companion, the possibilities are endless. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://guidedhacking.com/forums/the-game-hacking-bible-learn-how-to-hack-games.469/&quot;,&quot;text&quot;:&quot;Read&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://guidedhacking.com/forums/the-game-hacking-bible-learn-how-to-hack-games.469/"><span>Read</span></a></p></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://hacklido.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><em><strong>Thank you for reading till here. If you loved the newsletter, don't forget to subscribe for getting such newsletter straight into your inbox. Share and spread &#129293; hacklido.com &#128153;</strong></em></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p><strong>Without the community partners, hacklido wouldn't be where it is now, So we would like to thank them.</strong></p><ul><li><p><strong><a href="https://t.me/Cyber_Security_Channel">Cyber Security News</a></strong></p></li><li><p><strong><a href="http://sysxplore.com">Sysxplore</a></strong></p></li></ul><blockquote><p><strong>If you wish to Sponsor / Partner with hacklido and get benefitted? Reach out to us via </strong><em><strong>maalolan@hacklido.com / <a href="https://hacklido.com/discord">discord</a> / <a href="https://t.me/hacklidocom">telegram group</a> / <a href="https://www.linkedin.com/in/admiralarjun/">Author&#8217;s LinkedIn</a></strong></em><strong> to discuss with us!</strong></p></blockquote>]]></content:encoded></item><item><title><![CDATA[CyberWeekly 09' Feb | Issue #20]]></title><description><![CDATA[AWS security, AI regulation, facial recognition flaw, cloud security, EU AI Act, Microsoft Azure, ethical AI, deepfake threats, S3 bucket vulnerability]]></description><link>https://hacklido.substack.com/p/cyberweekly-09-feb-issue-20</link><guid isPermaLink="false">https://hacklido.substack.com/p/cyberweekly-09-feb-issue-20</guid><dc:creator><![CDATA[Arjun Sampath Kumar]]></dc:creator><pubDate>Sun, 09 Feb 2025 05:35:13 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/8125bd6a-210d-4d3a-990e-213728279959_1600x900.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mMEO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mMEO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 424w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 848w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 1272w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mMEO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif" width="600" height="75" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:75,&quot;width&quot;:600,&quot;resizeWidth&quot;:600,&quot;bytes&quot;:1138427,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/gif&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mMEO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 424w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 848w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 1272w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption"><strong>Sponsor: <a href="https://GuidedHacking.com">GuidedHacking.com</a></strong></figcaption></figure></div><p></p><h3><strong>TL;DR</strong></h3><p>This week, tech security took some major hits. Researchers discovered that abandoned AWS storage buckets could&#8217;ve led to <strong>one of the biggest cyberattacks ever</strong>, Microsoft had to fix a <strong>huge facial recognition flaw</strong>, and the EU officially banned <strong>AI practices that cross ethical lines</strong> (think social scoring and real-time biometric tracking). The takeaway? <strong>Tech is advancing fast, but security and regulation are still playing catch-up.</strong></p><div><hr></div><h2><strong>Hackers Could&#8217;ve Stolen the Internet for $420</strong></h2><p>Imagine waking up to find out that some random person has taken control of your entire software update system. Your network is now downloading fake updates, your security has been completely bypassed, and worst of all&#8212;you don&#8217;t even know it&#8217;s happening. That&#8217;s exactly the kind of catastrophe that nearly unfolded in the cloud.</p><p>Cybersecurity researchers at <strong>Watchtowr Labs</strong> discovered that over <strong>150 abandoned AWS S3 buckets</strong>&#8212;essentially cloud storage lockers used by companies, software providers, and government agencies&#8212;were still actively receiving update requests. These buckets were once critical for <strong>deploying software updates, distributing security patches, and managing cloud infrastructure</strong>, but when the original owners stopped using them, <strong>nobody shut down the pipelines still feeding into them.</strong></p><p>So what did the researchers do? They bought these abandoned buckets for <strong>just $420.85</strong> and sat back as <strong>8 million requests</strong> flooded in over two months. These weren&#8217;t just random pings&#8212;requests were coming from:</p><ul><li><p><strong>Government agencies</strong> (yep, state secrets could&#8217;ve been at risk)</p></li><li><p><strong>Military networks</strong> (national security, anyone?)</p></li><li><p><strong>Financial institutions</strong> (nothing to worry about&#8212;just your bank&#8217;s security updates!)</p></li><li><p><strong>Fortune 500 companies</strong> (hello, corporate espionage)</p></li><li><p><strong>Universities, casinos, and cybersecurity firms</strong> (basically, the entire internet)</p></li></ul><p>If cybercriminals had gotten there first, they could&#8217;ve <strong>hijacked these requests to send out malicious updates</strong>&#8212;installing malware, stealing sensitive data, or launching large-scale cyberattacks. Experts say this could&#8217;ve been <strong>worse than SolarWinds</strong>, the 2020 attack that compromised U.S. government agencies and major companies.</p><p>AWS has since <strong>sinkholed</strong> the affected buckets to prevent attacks, but there&#8217;s still one major problem: <strong>Amazon allows old bucket names to be reused.</strong> That means this isn&#8217;t just a one-time fluke&#8212;it&#8217;s an ongoing risk.</p><p>&#128269; <strong>The takeaway:</strong> If your company ever shuts down an AWS bucket, <strong>make sure its name can&#8217;t be reused</strong>&#8212;otherwise, someone else might pick it up, along with all your sensitive traffic.</p><div><hr></div><h2><strong>The EU Just Declared War on Creepy AI</strong></h2><p>Artificial intelligence has been advancing at breakneck speed, but who&#8217;s keeping it in check? In Europe, the answer is now <strong>the law.</strong></p><p>The <strong>EU AI Act</strong>, which officially took effect in August 2024, just reached its first major enforcement milestone: <strong>banning AI practices deemed &#8220;unacceptably risky.&#8221;</strong> The goal? <strong>To prevent AI from crossing ethical and societal red lines.</strong></p><p>What&#8217;s now <strong>100% illegal</strong> in the EU?<br>&#128683; <strong>Social scoring</strong>&#8212;No, governments can&#8217;t rate you based on your behavior like in a Black Mirror episode.<br>&#128683; <strong>Predicting crime based on appearance</strong>&#8212;Because profiling people before they commit a crime is some real dystopian nonsense.<br>&#128683; <strong>Emotion detection in workplaces and schools</strong>&#8212;Your boss won&#8217;t be able to track how &#8220;engaged&#8221; you look during meetings.<br>&#128683; <strong>Real-time biometric tracking in public spaces</strong>&#8212;Law enforcement can&#8217;t just scan crowds and build facial recognition databases without consent.<br>&#128683; <strong>Manipulating people subliminally</strong>&#8212;AI ads can be creepy, but they can&#8217;t hijack your subconscious.</p><p>Companies that break these rules? They&#8217;re looking at fines of up to <strong>&#8364;35 million or 7% of global revenue</strong> (whichever hurts more).</p><p>The law is already making waves. Some companies are <strong>rethinking their AI strategies</strong>, while others argue the regulations are <strong>too broad and will be difficult to enforce.</strong> Tech leaders are also watching closely&#8212;if this law influences regulations in the U.S. or elsewhere, it could change the way AI is developed <strong>globally.</strong></p><p>&#128204; <strong>What this means for you:</strong> The AI industry just hit a regulatory speed bump, but for consumers, this could be a win&#8212;especially if you&#8217;re tired of AI being used in ways that feel more like sci-fi horror than progress.</p><div><hr></div><h2><strong>Microsoft&#8217;s Facial Recognition Flaw Could&#8217;ve Been a Hacker&#8217;s Dream</strong></h2><p>Facial recognition technology is supposed to be the <strong>gold standard for security</strong>&#8212;after all, your face is unique, right? Well, Microsoft just learned the hard way that uniqueness doesn&#8217;t mean invincibility.</p><p>The company recently patched a <strong>CVSS 9.9 vulnerability</strong> (for context, 10 is the worst possible score) in its <strong>Azure AI Face Service</strong>, a tool used for:<br>&#10004;&#65039; Verifying identity (think airport check-ins or secure logins)<br>&#10004;&#65039; Detecting &#8220;liveness&#8221; (making sure a real person is present, not a photo or deepfake)<br>&#10004;&#65039; Redacting faces in media (for privacy protection)</p><p>The flaw allowed <strong>attackers to bypass authentication and gain unauthorized access to sensitive data</strong>. That&#8217;s the cybersecurity equivalent of finding out that your house&#8217;s high-tech fingerprint lock <strong>opens for literally anyone.</strong></p><p>Microsoft insists there&#8217;s <strong>no evidence that hackers exploited the flaw</strong> before it was patched, but security experts aren&#8217;t convinced. Given how valuable facial recognition data is, this kind of vulnerability could have been a <strong>gold mine</strong> for cybercriminals.</p><p>&#128269; <strong>The lesson here?</strong> AI-powered security <strong>isn&#8217;t foolproof</strong>&#8212;and if your company relies on facial recognition, you should be asking:<br>&#10067; <strong>How is my provider handling deepfake threats?</strong><br>&#10067; <strong>What security measures are in place to prevent future exploits?</strong><br>&#10067; <strong>What happens if facial recognition gets bypassed?</strong></p><p>With AI-driven authentication becoming the norm, these aren&#8217;t just theoretical questions&#8212;they&#8217;re <strong>the difference between security and disaster.</strong></p><div class="pullquote"><p><strong>Liked this post or want to chat about cybersecurity? Have suggestions? Reach out to the</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.linkedin.com/in/admiralarjun/&quot;,&quot;text&quot;:&quot;Author's LinkedIn!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.linkedin.com/in/admiralarjun/"><span>Author's LinkedIn!</span></a></p><div><hr></div><p><strong>Sponsored</strong></p><div id="youtube2-GFjLIN0Nljo" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;GFjLIN0Nljo&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/GFjLIN0Nljo?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.youtube.com/watch?v=GFjLIN0Nljo&quot;,&quot;text&quot;:&quot;Watch On YouTube&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.youtube.com/watch?v=GFjLIN0Nljo"><span>Watch On YouTube</span></a></p><p>In the 2nd episode of this reverse engineering podcast, we will interviewing Stigward, a vulnerability researcher. During the episode, stigward talks us through how he got started in his career and how he made the shift to hacking professionally. He also gives advice on becoming a vulnerability researcher. He discusses interesting research and projects he works on, his favorite vulnerability research setup &amp; more. The episode is full of tips and tricks that you can directly apply and learn from. This will serve as a gold mine for anyone experienced or just getting started in their security or game hacking career. </p></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://hacklido.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><em><strong>Thank you for reading till here. If you loved the newsletter, don't forget to subscribe for getting such newsletter straight into your inbox. Share and spread &#129293; hacklido.com &#128153;</strong></em></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p><strong>Without the community partners, hacklido wouldn't be where it is now, So we would like to thank them.</strong></p><ul><li><p><strong><a href="https://t.me/Cyber_Security_Channel">Cyber Security News</a></strong></p></li><li><p><strong><a href="http://sysxplore.com">Sysxplore</a></strong></p></li></ul><blockquote><p><strong>If you wish to Sponsor / Partner with hacklido and get benefitted? Reach out to us via </strong><em><strong>maalolan@hacklido.com / <a href="https://hacklido.com/discord">discord</a> / <a href="https://t.me/hacklidocom">telegram group</a> / <a href="https://www.linkedin.com/in/admiralarjun/">Author&#8217;s LinkedIn</a></strong></em><strong> to discuss with us!</strong></p></blockquote>]]></content:encoded></item><item><title><![CDATA[CyberWeekly 01' Feb | Issue #19]]></title><description><![CDATA[DeepSeek R1, AI jailbreak, ransomware attack, ENGlobal outage, Chinese data collection, National Cyber Security Centre, unforgivable vulnerabilities, OpenAI employee doxxing, cyberattack recovery,]]></description><link>https://hacklido.substack.com/p/cyberweekly-01-feb-issue-19</link><guid isPermaLink="false">https://hacklido.substack.com/p/cyberweekly-01-feb-issue-19</guid><dc:creator><![CDATA[Arjun Sampath Kumar]]></dc:creator><pubDate>Sat, 01 Feb 2025 12:39:31 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/d73ad59e-b44c-4ada-9e50-d24c5032c86a_1600x900.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mMEO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mMEO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 424w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 848w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 1272w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mMEO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif" width="600" height="75" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:75,&quot;width&quot;:600,&quot;resizeWidth&quot;:600,&quot;bytes&quot;:1138427,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/gif&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mMEO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 424w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 848w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 1272w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption"><strong>Sponsor: <a href="https://GuidedHacking.com">GuidedHacking.com</a></strong></figcaption></figure></div><p></p><h3><strong>TL;DR</strong></h3><p>China&#8217;s <strong>DeepSeek R1</strong> AI model launched with <strong>strong reasoning abilities</strong> but <strong>zero security guardrails</strong>, letting researchers easily <strong>jailbreak it</strong> for ransomware development and misinformation, all while <strong>sending user data to Chinese servers</strong>. Meanwhile, Texas-based <strong>ENGlobal</strong> suffered a <strong>ransomware attack that shut down critical systems for six weeks</strong>, highlighting the growing impact of prolonged cyber incidents. Over in the UK, the <strong>National Cyber Security Centre (NCSC)</strong> is cracking down on <strong>&#8220;unforgivable&#8221; software vulnerabilities</strong>, calling for vendors to eliminate preventable security flaws. <strong>AI risks, ransomware resilience, and software accountability</strong>&#8212;the cybersecurity landscape is heating up fast. </p><div><hr></div><h3><strong>DeepSeek R1: The Open-Source AI That Talks... Maybe Too Much</strong></h3><p>When DeepSeek R1 launched on January 20, it was supposed to be China&#8217;s answer to OpenAI&#8217;s models&#8212;an <strong>affordable, powerful, and open-source</strong> chatbot with enhanced reasoning capabilities. But while the model is impressive in its ability to "think out loud" (aka <em>time test scaling</em>), it&#8217;s proving just as impressive at <em>leaking sensitive information and generating illegal content</em>.</p><p>Security researchers wasted no time jailbreaking DeepSeek R1, finding that it <strong>eagerly offered instructions on making explosives, creating ransomware, and even dishing out personal details of OpenAI employees</strong>&#8212;though the info turned out to be false. Still, the fact that it even <em>attempted</em> such a response is a major red flag. If that wasn&#8217;t enough, DeepSeek&#8217;s data collection policies reveal that <strong>anything typed into the chatbot is stored and processed on servers in China</strong>, making it a potential <strong>goldmine for state surveillance</strong> under China&#8217;s National Intelligence Law.</p><p>Adding to the chaos, on January 27, DeepSeek announced a <strong>&#8220;large-scale malicious attack&#8221;</strong> had forced them to limit new signups. While it sounds like a DDoS attack, some speculate it could just be an overwhelming flood of users rushing to test the controversial AI. After all, OpenAI experienced similar outages when ChatGPT first launched. <strong>Either way, the platform is struggling to keep up with demand&#8212;and security concerns are mounting.</strong></p><p><strong>What This Means for You:</strong></p><ul><li><p>If you care about <strong>privacy</strong>, know that DeepSeek R1 <strong>collects a lot more than just your prompts</strong>. Your chat history, device info, and even <strong>keystroke patterns</strong> could be stored indefinitely.</p></li><li><p>If you're using AI models in your company, <strong>make sure they align with your organization&#8217;s data security policies</strong>&#8212;especially when the servers are in a country with strict government oversight.</p></li><li><p><strong>Open-source AI models are great for transparency&#8212;but also great for attackers looking to exploit vulnerabilities.</strong> DeepSeek is proof that security needs to be a top priority, not an afterthought.</p></li></ul><p>Would you trust an AI model that <em>accidentally</em> doxes people and gives out bomb-making tips? <strong>Yeah, me neither.</strong></p><div><hr></div><h3><strong>ENGlobal&#8217;s Ransomware Nightmare: Six Weeks of Silence</strong></h3><p>Imagine your company gets hit with ransomware. Your <strong>critical systems are locked down for six weeks</strong>. Your financial and operational reporting tools are useless. And worst of all? You have no idea <em>who</em> has access to sensitive personal data.</p><p>That&#8217;s exactly what happened to <strong>ENGlobal</strong>, a Texas-based engineering and automation company that provides services to major U.S. federal agencies and private firms. On January 28, the company revealed in an SEC filing that a ransomware attack in <strong>November 2024</strong> had <strong>crippled</strong> their operations. For a month and a half, they had no access to key systems&#8212;and yet, they claim the attack will have <em>&#8220;no material impact&#8221;</em> on their business.</p><p>Really? Because security experts aren&#8217;t buying it.</p><p><strong>Why This Attack Matters:</strong></p><ul><li><p><strong>Ransomware recovery is taking longer than ever.</strong> A recent study found that the average recovery time is <strong>132 hours</strong> (over <strong>17 workdays</strong>)&#8212;and that <strong>58% of companies hit by ransomware are forced to shut down some or all of their operations</strong>.</p></li><li><p><strong>Reputation damage &gt; regulatory fines.</strong> Even if ENGlobal avoids hefty penalties, <strong>trust is harder to repair than a compromised server.</strong></p></li><li><p><strong>Delayed breach notifications help the attackers, not the victims.</strong> The company still hasn&#8217;t disclosed <strong>who</strong> was affected or the full extent of the data breach&#8212;leaving potential victims in the dark.</p></li></ul><p>One cybersecurity expert put it bluntly: <strong>If your systems can be offline for six weeks without "material impact," maybe they weren&#8217;t essential to begin with.</strong></p><p>Lesson learned? <strong>Ransomware attacks aren&#8217;t just about data theft anymore&#8212;they&#8217;re about business survival.</strong> If your organization still doesn&#8217;t have a <strong>tested</strong> recovery plan, now&#8217;s the time to make one.</p><div><hr></div><h3><strong>The UK Declares War on "Unforgivable" Software Bugs</strong></h3><p>Software developers, take note: The UK&#8217;s <strong>National Cyber Security Centre (NCSC)</strong> is officially done with vendors who ship <strong>insecure-by-design</strong> products.</p><p>In a new report, the agency proposes a system to classify security flaws as <strong>"forgivable" or "unforgivable"</strong>, depending on how easy they are to prevent. The idea is simple: <strong>Some vulnerabilities should never make it into production&#8212;ever.</strong></p><p>These <strong>&#8220;unforgivable&#8221; bugs</strong> include things like:</p><ul><li><p><strong>Lack of input validation</strong> (which allows hackers to inject malicious code)</p></li><li><p><strong>Poor privilege separation</strong> (making it easier for attackers to escalate access)</p></li><li><p><strong>Not sandboxing risky processes</strong> (letting a simple breach become catastrophic)</p></li></ul><p>The <strong>key takeaway?</strong> If a security flaw is <strong>well-known, easy to fix, and still present in a product</strong>, it's <em>not</em> an accident&#8212;it's <strong>negligence</strong>.</p><p><strong>Why This Matters:</strong></p><ul><li><p><strong>Software vulnerabilities are getting worse, not better.</strong> Despite decades of warnings, many developers still prioritize speed and features over security.</p></li><li><p><strong>Companies that buy insecure software are just as responsible.</strong> If businesses keep purchasing products with major security flaws, vendors will never feel pressured to change.</p></li><li><p><strong>Regulations may be next.</strong> If the tech industry won&#8217;t clean up its act, expect governments to <strong>step in with legal consequences</strong>&#8212;just like we do for defective consumer products.</p></li></ul><p><strong>If we can ban TikTok over national security concerns, maybe it&#8217;s time to ban software with "unforgivable" security holes.</strong> Just a thought.</p><div class="pullquote"><p><strong>Liked this post or want to chat about cybersecurity? Have suggestions? Reach out to the</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.linkedin.com/in/admiralarjun/&quot;,&quot;text&quot;:&quot;Author's LinkedIn!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.linkedin.com/in/admiralarjun/"><span>Author's LinkedIn!</span></a></p><div><hr></div><p><strong>Sponsored</strong></p><div id="youtube2-LPaMroC-gMk" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;LPaMroC-gMk&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/LPaMroC-gMk?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>Malware Analysis with Malcore using DoNex ransomware as a sample. Using the malcore.io malware sandbox, I'll demonstrate how to efficiently perform malware analysis by leveraging both static and dynamic analysis features of Malcore. I examine the malware's static properties with Malcore, analyzing file entropy imports &amp; suspicious assembly code. The analysis reveals antidebugging imports &amp; dynamic imports loaded at runtime, which are common techniques used by malware to evade static analysis. The string summary hints at the use of RSA encryption &amp; typical ransomware behaviors such as deleting batch files to remove traces. <br></p></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://hacklido.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><em><strong>Thank you for reading till here. If you loved the newsletter, don't forget to subscribe for getting such newsletter straight into your inbox. Share and spread &#129293; hacklido.com &#128153;</strong></em></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p><strong>Without the community partners, hacklido wouldn't be where it is now, So we would like to thank them.</strong></p><ul><li><p><strong><a href="https://t.me/Cyber_Security_Channel">Cyber Security News</a></strong></p></li><li><p><strong><a href="http://sysxplore.com">Sysxplore</a></strong></p></li></ul><blockquote><p><strong>If you wish to Sponsor / Partner with hacklido and get benefitted? Reach out to us via </strong><em><strong>maalolan@hacklido.com / <a href="https://hacklido.com/discord">discord</a> / <a href="https://t.me/hacklidocom">telegram group</a> / <a href="https://www.linkedin.com/in/admiralarjun/">Author&#8217;s LinkedIn</a></strong></em><strong> to discuss with us!</strong></p></blockquote>]]></content:encoded></item><item><title><![CDATA[CyberWeekly 25' Jan | Issue #18]]></title><description><![CDATA[Microsoft AI Red Team, Cyber Safety Review Board, DHS advisory committees, Salt Typhoon breach, Product Security Bad Practices, cd00r backdoor, juniper routers vulnerability, 7-Zip MotW bypass, SQLi]]></description><link>https://hacklido.substack.com/p/cyberweekly-25-jan-issue-18</link><guid isPermaLink="false">https://hacklido.substack.com/p/cyberweekly-25-jan-issue-18</guid><dc:creator><![CDATA[Arjun Sampath Kumar]]></dc:creator><pubDate>Sun, 26 Jan 2025 08:29:00 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/a1889968-5351-4a99-a1c0-c915b52e6e6c_1600x900.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mMEO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mMEO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 424w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 848w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 1272w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mMEO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif" width="600" height="75" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:75,&quot;width&quot;:600,&quot;resizeWidth&quot;:600,&quot;bytes&quot;:1138427,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/gif&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mMEO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 424w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 848w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 1272w, https://substackcdn.com/image/fetch/$s_!mMEO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb13a8f0a-d048-4471-b22e-b668c251b901_600x75.gif 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption"><strong>Sponsor: <a href="https://GuidedHacking.com">GuidedHacking.com</a></strong></figcaption></figure></div><p></p><h3><strong>TL;DR</strong></h3><p>Microsoft&#8217;s AI Red Team shared insights on securing generative AI systems, emphasizing the need for technical expertise and human insight, while raising questions about evolving practices, cultural diversity, and standardization. Meanwhile, the Department of Homeland Security disbanded the Cyber Safety Review Board (CSRB), halting investigations like the Salt Typhoon breach, sparking concerns about weakened cybersecurity oversight. CISA and the FBI updated their "Product Security Bad Practices" guide, focusing on addressing hardcoded credentials, SQL injection, memory safety, and phishing-resistant MFA. Additionally, a cd00r malware variant targeting Juniper routers uses memory-resident tactics and &#8220;magic packets,&#8221; while a vulnerability in 7-Zip&#8217;s handling of nested archives bypasses the Mark of the Web (MotW), necessitating immediate updates to version 24.09.</p><div><hr></div><h3>Microsoft AI Red Teamers Share Takeaways</h3><p>Microsoft&#8217;s AI Red Team (AIRT) has shared insights from their extensive testing of generative AI products. Their findings emphasize that securing AI systems is an ongoing challenge, necessitating a blend of technical expertise and human insight. The team highlighted that while some attack techniques may appear straightforward, they require a nuanced understanding of both technology and human behavior. This reveals a broader truth about cybersecurity: as systems grow more complex, so too must our approaches to securing them.</p><p>AIRT looks ahead to three "open questions": </p><ol><li><p>How will operators keep practices current and probe for new dangers as LLM purposes and capabilities continue to evolve?</p></li><li><p>How can AI red teamers apply and incorporate multilingual and culturally-diverse expertise?</p></li><li><p>How can AI red teaming practices and communication move toward standardization?</p></li></ol><div><hr></div><h3><strong>DHS Fires Advisory Committees, Including Cyber Safety Board (CSRB)</strong></h3><p>The Department of Homeland Security (DHS) issued an internal memo on January 20, 2025, terminating all advisory committee positions, including the Cyber Safety Review Board (CSRB). This decision has halted CSRB&#8217;s investigation into critical incidents such as the Salt Typhoon breach in 2024, where a Chinese state-sponsored hacking group targeted US telecommunications networks. Since its establishment in 2022 by President Biden&#8217;s executive order, the CSRB has studied incidents like the Log4Shell vulnerability, the Lapsus$ group attacks, and the Microsoft Exchange breach.</p><p>The CSRB's role mirrored the National Transportation Safety Board (NTSB) in aviation, aiming to investigate major cyber incidents and recommend preventive measures. Critics argue that dissolving the board compromises national cybersecurity efforts, as the CSRB provided actionable insights into systemic vulnerabilities. However, others suggest its tangible impact on policy and security improvements has been limited. Moving forward, the challenge will be ensuring such investigations are continued effectively by Congress or other entities.</p><div><hr></div><h3><strong>Revisions to Product Security Bad Practices</strong></h3><p>CISA and the FBI have released an updated version (2.0) of the "Product Security Bad Practices" guide. This revision incorporates feedback from 78 public comments collected since October 2024. The updated document addresses security gaps in software development and operational environments. Key technical updates include:</p><ul><li><p><strong>Expanded Examples:</strong> Highlighting risks of hardcoded credentials and outdated or insecure cryptographic functions.</p></li><li><p><strong>Injection Prevention:</strong> Enhanced guidance for mitigating SQL injection and command injection vulnerabilities.</p></li><li><p><strong>Known Exploited Vulnerabilities (KEVs):</strong> Stricter recommendations for prioritizing KEV patching.</p></li><li><p><strong>Phishing-Resistant MFA:</strong> Mandates for manufacturers to adopt phishing-resistant multi-factor authentication in both IT and operational technology (OT) environments.</p></li><li><p><strong>Memory Safety:</strong> Greater emphasis on using memory-safe programming languages to prevent common vulnerabilities like buffer overflows.</p></li></ul><div><hr></div><h3><strong>cd00r Variant Targets Juniper Enterprise Routers</strong></h3><p>A sophisticated variant of the cd00r backdoor malware is targeting Juniper enterprise routers, exploiting their high uptime and critical network positioning. This attack uses a "magic packet" in TCP traffic to trigger a response from the infected device. After receiving the packet, the backdoor initiates a secondary challenge before establishing a reverse shell connection to the attacker's specified IP and port.</p><p>Key observations from Black Lotus Labs include:</p><ul><li><p><strong>Memory-Resident Malware:</strong> The backdoor exclusively resides in memory, reducing the likelihood of detection.</p></li><li><p><strong>Targets:</strong> The campaign impacted sectors such as manufacturing, energy, and IT, where routers often serve as VPN gateways or network edge devices.</p></li><li><p><strong>Recommendations:</strong> Organizations should review logs, monitor for unusual TCP traffic, and apply software updates to affected devices. Periodic rebooting of routers is advised to disrupt memory-resident malware.</p></li></ul><div><hr></div><h3><strong>Patch 7-Zip Archiver Against MotW Bypass</strong></h3><p>The open-source 7-Zip archive software has been found vulnerable to a Mark of the Web (MotW) bypass. MotW is a Windows security feature that flags files downloaded from the internet as untrusted, prompting additional security checks. In 7-Zip versions prior to 24.09, this mechanism fails when processing nested archive files. Specifically:</p><ul><li><p>Files extracted from a nested archive lose the Zone.Identifier data stream, bypassing MotW safeguards.</p></li><li><p>Exploitation can enable attackers to execute arbitrary code in the context of the current user.</p></li></ul><p>Technical mitigation includes:</p><ul><li><p><strong>Update Software:</strong> Users must manually update to 7-Zip version 24.09 or later, as the software does not update automatically.</p></li><li><p><strong>Fake Installers:</strong> Users should verify downloads from official sources to avoid malware disguised as legitimate updates.</p></li></ul><div class="pullquote"><p><strong>Liked this post or want to chat about cybersecurity? Have suggestions? Reach out to the</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.linkedin.com/in/admiralarjun/&quot;,&quot;text&quot;:&quot;Author's LinkedIn!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.linkedin.com/in/admiralarjun/"><span>Author's LinkedIn!</span></a></p><div><hr></div><p><strong>Sponsored</strong></p><p><a href="https://guidedhacking.com/forums/the-guided-hacking-podcast.569/">https://guidedhacking.com/forums/the-guided-hacking-podcast.569/</a> </p><p>The Guided Hacking Show is a podcast mainly focused on reverse engineering and game hacking, we will be interviewing prominent reverse engineers and game hackers and finding out what makes them tick. Passionate reverse engineers are an interesting group of people and it's always fun to learn their story. You'll hear about how they got into reverse engineering, how it affected their lives, what kind of cool projects they've done &amp; where the future will take them.</p></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://hacklido.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><em><strong>Thank you for reading till here. If you loved the newsletter, don't forget to subscribe for getting such newsletter straight into your inbox. Share and spread &#129293; hacklido.com &#128153;</strong></em></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p><strong>Without the community partners, hacklido wouldn't be where it is now, So we would like to thank them.</strong></p><ul><li><p><strong><a href="https://t.me/Cyber_Security_Channel">Cyber Security News</a></strong></p></li><li><p><strong><a href="http://sysxplore.com">Sysxplore</a></strong></p></li></ul><blockquote><p><strong>If you wish to Sponsor / Partner with hacklido and get benefitted? Reach out to us via </strong><em><strong>email@hacklido.com / <a href="https://hacklido.com/discord">discord</a> / <a href="https://t.me/hacklidocom">telegram group</a> / <a href="https://www.linkedin.com/in/admiralarjun/">Author&#8217;s LinkedIn</a></strong></em><strong> to discuss with us!</strong></p></blockquote>]]></content:encoded></item></channel></rss>