Search
Items tagged with: 1
New FileFix Exploit Uses Windows File Explorer to Run Malicious Commands
A newly discovered exploit, dubbed “FileFix,” is raising alarms in the cybersecurity community for its innovative use of Windows File Explorer to execute malicious commands, without ever leaving the web browser. Developed by security researcher mr.d0x, FileFix is a creative evolution of the notorious ClickFix social engineering attack and demonstrates how even trusted system features […]
The post New FileFix Exploit Uses Windows File Explorer to Run Malicious Commands appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
posted by pod_feeder
New FileFix Exploit Uses Windows File Explorer to Run Malicious Commands
A newly discovered exploit, dubbed "FileFix," is raising alarms in the cybersecurity community for its innovative use of Windows File Explorer.Divya (GBHackers Security | #1 Globally Trusted Cyber Security News Platform)
!Anonsys Support !Friendica Support @Tuxi ⁂
Hello
Pls could you help me to understand these apparent anomalies between the #Vier & #Frio display options.
Vier
post compose box includes a handyQuote Share
icon / tool, butFrio
[em]does not[/em].😲 🤯Frio
post compose box allows one to simply paste in an image from one's clipboard, butVier
[em]does not[/em]. 😲 🤯
In many ways i like using Vier
, but item #2 above is a real PITA. Changing back to Frio
ofc solves that nuisance, but then i incomprehensibly incur the annoyance of item #1 above.
Is is "simple", or practically "impossible", to harmonise these features across both aesthetic styles? 🤷♀️
New Rust-Developed InfoStealer Drains Sensitive Data from Chromium-Based Browsers
A newly identified information-stealing malware, crafted in the Rust programming language, has emerged as a significant threat to users of Chromium-based browsers such as Google Chrome, Microsoft Edge, and others. Dubbed “RustStealer” by cybersecurity researchers, this sophisticated malware is designed to extract sensitive data, including login credentials, cookies, and browsing history, from infected systems. Emerging […]
The post New Rust-Developed InfoStealer Drains Sensitive Data from Chromium-Based Browsers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
posted by pod_feeder
New Rust-Developed InfoStealer Drains Sensitive Data from Chromium-Based Browsers
A newly identified information-stealing malware, crafted in the Rust programming language, has emerged as a significant threat.Aman Mishra (GBHackers Security | #1 Globally Trusted Cyber Security News Platform)
Preinstalled Android Apps Found Leaking PINs and Executing Malicious Commands
On May 30, 2025, CERT Polska coordinated the public disclosure of three significant security vulnerabilities affecting preinstalled Android applications on smartphones from Ulefone and Krüger&Matz. These flaws, tracked as CVE-2024-13915, CVE-2024-13916, and CVE-2024-13917, expose users to risks ranging from unauthorized device resets to theft of sensitive PIN codes and privilege escalation by malicious applications. Technical […]
The post Preinstalled Android Apps Found Leaking PINs and Executing Malicious Commands appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
posted by pod_feeder
Threat Actors Exploit Google Apps Script to Host Phishing Sites
The Cofense Phishing Defense Center has uncovered a highly strategic phishing campaign that leverages Google Apps Script a legitimate development platform within Google’s ecosystem to host deceptive phishing pages. This attack, masquerading as an invoice email, exploits the inherent trust users place in Google’s trusted environment to trick recipients into divulging sensitive information. A Sophisticated […]
The post Threat Actors Exploit Google Apps Script to Host Phishing Sites appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
posted by pod_feeder
Threat Actors Exploit Google Apps Script to Host Phishing Sites
The Cofense Phishing Defense Center has uncovered a highly strategic phishing campaign that leverages Google Apps Script.Aman Mishra (GBHackers Security | #1 Globally Trusted Cyber Security News Platform)
Google Reveals Hackers Targeting US Following UK Retailer Attacks
The Google Threat Intelligence Group (GTIG) recently revealed that the well-known hacker collective UNC3944, which also overlaps with the widely publicized Scattered Spider, is a persistent and dynamic cyberthreat. Initially focused on telecommunications for SIM swap operations, UNC3944 has since pivoted to ransomware and data theft extortion tactics since early 2023, casting a wider net […]
The post Google Reveals Hackers Targeting US Following UK Retailer Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
posted by pod_feeder
Google Reveals Hackers Targeting US Following UK Retailer Attacks
The GTIG recently revealed that the well-known hacker collective UNC3944, which also overlaps with the widely publicized Scattered Spider.Aman Mishra (GBHackers Security | #1 Globally Trusted Cyber Security News Platform)
Weaponized Google Calendar Invites Deliver Malicious Payload Using a Single Character
Security researchers have unearthed a sophisticated malware distribution method leveraging Google Calendar invites to deliver malicious payloads through seemingly innocuous links. The attack, centered around a deceptive npm package named os-info-checker-es6, showcases an unprecedented level of obfuscation that begins with a single, unprintable Unicode character. This character, from the Unicode Private Use Area, serves as […]
The post Weaponized Google Calendar Invites Deliver Malicious Payload Using a Single Character appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
posted by pod_feeder
Weaponized Google Calendar Invites Deliver Malicious Payload Using a Single Character
A sophisticated malware distribution method leveraging Google Calendar invites to deliver malicious payloads through seemingly innocuous links.Aman Mishra (GBHackers Security | #1 Globally Trusted Cyber Security News Platform)
Hackers Bypassed Windows Defender Policies Using WinDbg Preview via Microsoft Store
A newly documented technique reveals how attackers can exploit the WinDbg Preview debugger to bypass even the strictest Windows Defender Application Control (WDAC) policies, raising concerns about a significant gap in enterprise security controls. The exploit, dubbed the “WinDbg Preview Exploit,” leverages the debugger’s advanced capabilities to achieve code execution and remote process injection, effectively […]
The post Hackers Bypassed Windows Defender Policies Using WinDbg Preview via Microsoft Store appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
posted by pod_feeder
Hackers Bypassed Windows Defender Policies Using WinDbg Preview via Microsoft Store
A newly documented technique reveals, exploit the WinDbg Preview debugger to bypass Windows Defender Application Control (WDAC) policies.Divya (GBHackers Security | #1 Globally Trusted Cyber Security News Platform)
Speedify VPN Vulnerability on macOS Exposes Users to System Takeover
A major security flaw in the Speedify VPN application for macOS, tracked as CVE-2025-25364, has exposed millions of users to the risk of complete system compromise. Researchers at SecureLayer7 discovered the vulnerability in Speedify’s privileged helper tool. It could potentially allow local attackers to execute arbitrary commands as root and take total control of affected systems. […]
The post Speedify VPN Vulnerability on macOS Exposes Users to System Takeover appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
posted by pod_feeder
Speedify VPN Vulnerability on macOS Exposes Users to System Takeover
A major security flaw in the Speedify VPN application for macOS, tracked as CVE-2025-25364, has exposed millions of users,Divya (GBHackers Security | #1 Globally Trusted Cyber Security News Platform)
ASUS Router Flaw Allows Hackers to Remotely Execute Malicious Code
ASUS has acknowledged multiple critical vulnerabilities affecting its routers that could allow hackers to remotely execute malicious code, thereby compromising network security and user privacy. These flaws highlight the continuous challenges in securing IoT and networking devices against increasingly sophisticated cyber threats. Overview of the Vulnerability The most pressing concern involves a series of remote […]
The post ASUS Router Flaw Allows Hackers to Remotely Execute Malicious Code appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
posted by pod_feeder
U.S DOGE Allegedly Breached – Whistleblower Leaked Most Sensitive Documents
A federal whistleblower has accused the Department of Government Efficiency (DOGE) of orchestrating a major cybersecurity breach at the National Labor Relations Board (NLRB), involving unauthorized data extraction, disabled security protocols, and attempted logins from a Russian IP address. The whistleblower, a senior DevSecOps architect at the NLRB, has submitted a detailed affidavit to Congress […]
The post U.S DOGE Allegedly Breached – Whistleblower Leaked Most Sensitive Documents appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
posted by pod_feeder
U.S DOGE Allegedly Breached - Whistleblower Leaked Most Sensitive Documents
A federal whistleblower has accused the Department of Government Efficiency (DOGE) of orchestrating a major cybersecurity breach at the National Labor Relations Board (NLRB), involving unauthorized data extraction, disabled security protocols, and at…Gurubaran (GBHackers Security | #1 Globally Trusted Cyber Security News Platform)
Windows NTLM Vulnerability (CVE-2025-24054) Actively Exploit in the Wild to Hack Systems
A critical vulnerability in Microsoft Windows, identified as CVE-2025-24054, has been actively exploited in the wild since March 19, 2025, targets organizations worldwide. The flaw, which enables NTLM hash disclosure through spoofing, allows attackers to harvest sensitive user credentials with minimal interaction, potentially leading to privilege escalation and full network compromise. Despite Microsoft releasing a […]
The post Windows NTLM Vulnerability (CVE-2025-24054) Actively Exploit in the Wild to Hack Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
posted by pod_feeder
Well now strangely on both sites bin/console config
doesn't work anymore.
Both throw the following error message:
rootName@VPShosting:# /../doamincom/bin/console config
PHP Fatal error: Uncaught Error: Undefined constant "CURLE_OPERATION_TIMEOUTED" in /../domaincom/boot.php:229
Stack trace:
#0 /../doamincom//vendor/composer/autoload_real.php(69): require()
#1 /../doamincom//vendor/composer/autoload_real.php(59): composerRequireFriendica()
#2 /../doamincom/vendor/autoload.php(7): ComposerAutoloaderInitFriendica::getLoader()
#3 /../doamincom/bin/console.php(31): require('...')
#4 {main}
thrown in /../doamincom/boot.php on line 229
Can't recall doing anything at all, accept trying to get the php imap module to work.
Anyone else seeing these errors?
Is anyone else seeing these errors in their logs? I see these too often.
Uncaught Exception ValueError: "DOMDocument::loadHTML(): Argument #1 ($source) must not be empty" at /var/www/html/src/Model/Item.php line 3558Friendica\Addon\s3_storage\src\S3Client:😛ut(): Argument #1 ($data) must be of type string, null given, called in /var/www/html/src/Model/Photo.php on line 446
Friends, for something to be open source, we need to see
1. The data it was trained and evaluated on
2. The code
3. The model architecture
4. The model weights.
DeepSeek only gives 3, 4. And I'll see the day that anyone gives us #1 without being forced to do so, because all of them are stealing data.
Can someone explain this phenomenon to me, it makes no sense to me
I make a song, in one day, I'll spend 6 hours on it, very actively.
I finish working on it (for the day being)
Until the last minute before falling asleep that same day, i will hear that song in my head non stop.
Now mystery #1: i wake up, and i don't know what the song was. I cannot recall a single note, section, instrument sound, as part of the song. Nothing. Until i physically hear it again.
Now mystery #2: after hearing it once on any day after the first day, and then sleeping after that, i wake up the following day and i CAN recall the song
This has now happened consistently like 50 times
What is this brain thing
Forbes and CNBC have both compiled lists of “business-friendly states” and these look similar, with North Carolina at #1 and red and purple states dominating the top 10 of both lists.
The problem? Being “business-friendly” on one of these lists has no correlation with real GDP per capita. By that metric, the 5 most economically productive states are DC, NY, Massachusetts, Washington, and California — the bluest of the blue.
“Business-friendly” policy isn’t even good for making money.
https://tupambae.org/admin/themes/frio
Service Unavailable
unable to create directory /var/www/html/view/smarty3/compiled/90/4f/52
Exception thrown in /var/www/html/src/Core/Renderer.php:90
Stack trace:
#0 /var/www/html/view/theme/frio/config.php(199): Friendica\Core\Renderer::replaceMacros()
#1 /var/www/html/view/theme/frio/config.php(141): frio_form()
#2 /var/www/html/src/Module/Admin/Themes/Embed.php(89): theme_admin()
#3 /var/www/html/src/BaseModule.php(244): Friendica\Module\Admin\Themes\Embed->content()
#4 /var/www/html/src/App.php(703): Friendica\BaseModule->run()
#5 /var/www/html/index.php(52): Friendica\App->runFrontend()
#6 {main}
Throughout this fiasco I've tried to calm things down by saying "this isn't a reflection of the entire project, it doesn't mean Rust is bad" etc.
But at this point I'm just no longer comfortable with the #1 Rust dependency being maintained by someone who behaves like that.
Lemmy.world officially has 33k users! 3000 users away from becoming the #1 lemmy instance.
To take the #1 spot from lemmy.ml (36185 users and no longer growing), lemmy.world just needs about 3000 new users. Given the current growth rate, that should only be another day or two.
We’re building something here! Kudos to lemmy.world admin @ruud@lemmy.world for all of his hard work keeping this site running smoothly.
To track lemmy’s growth: https://lemmy.fediverse.observer/list
He wants to be the best Ravioli chef in the US, not #1 most wanted man
Ok fixed that
Executable: /home/anubis2814/mywebsite/bin/console.php
Arguments: array (
0 => 'autoinstall',
)
Options: array (
'v' => 1,
)
Command: autoinstall
Initializing setup...
Complete!
Checking environment...
NOTICE: Not checking .htaccess/URL-Rewrite during CLI installation.
[Error] --------
GNU Multiple Precision PHP module: Error: GNU Multiple Precision PHP module required but not installed.
[Backtrace]:
#0 /home/anubis2814/mywebsite/vendor/asika/simple-console/src/Console.php(108): Friendica\Console\AutomaticInstallation->doExecute()
#1 /home/anubis2814/mywebsite/src/Core/Console.php(163): Asika\SimpleConsole\Console->execute()
#2 /home/anubis2814/mywebsite/vendor/asika/simple-console/src/Console.php(108): Friendica\Core\Console->doExecute()
#3 /home/anubis2814/mywebsite/bin/console.php(41): Asika\SimpleConsole\Console->execute()
#4 {main}
Is this error an issue?
https://www.currentaffairs.org/2021/07/the-dangerous-ideas-of-longtermism-and-existential-risk
The Dangerous Ideas of “Longtermism” and “Existential Risk” ❧ Current Affairs
Current AffairsSo-called rationalists have created a disturbing secular religion that looks like it addresses humanity’s deepest problems, but actually justifies pursuing the social preferences of elites.
PHP Fatal error: Uncaught Error: Class "Friendica\Core\Logger\Util\Introspection" not found in /var/www/html/static/dependencies.config.php:192
Stack trace:
#0 /var/www/html/index.php(32): include()
#1 {main}
thrown in /var/www/html/static/dependencies.config.php on line 192
I have a sudden burning desire to learn basic physics. are there any great online tools for this, particularly for someone who actually learns really well via textbooks and quizzes, but doesn't have much ability to "book" free time in advance?
also, what level of math would I need to brush up on, and where might you suggest I do that?
I'm up for unusual suggestions, but I don't have a lot of money and the #1 thing I don't want (the reason I abandoned the library-book approach) is some high-level philosophical bullshit about space. I do not care about the origins of life right now, I care about being able to comprehend energy and mass and various forces so I can then later find out why that was three levels of oversimplification. :blobcatmaths: