Search
Items tagged with: 1
Weaponized Google Calendar Invites Deliver Malicious Payload Using a Single Character
Security researchers have unearthed a sophisticated malware distribution method leveraging Google Calendar invites to deliver malicious payloads through seemingly innocuous links. The attack, centered around a deceptive npm package named os-info-checker-es6, showcases an unprecedented level of obfuscation that begins with a single, unprintable Unicode character. This character, from the Unicode Private Use Area, serves as […]
The post Weaponized Google Calendar Invites Deliver Malicious Payload Using a Single Character appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
posted by pod_feeder
Weaponized Google Calendar Invites Deliver Malicious Payload Using a Single Character
A sophisticated malware distribution method leveraging Google Calendar invites to deliver malicious payloads through seemingly innocuous links.Aman Mishra (GBHackers Security | #1 Globally Trusted Cyber Security News Platform)
Hackers Bypassed Windows Defender Policies Using WinDbg Preview via Microsoft Store
A newly documented technique reveals how attackers can exploit the WinDbg Preview debugger to bypass even the strictest Windows Defender Application Control (WDAC) policies, raising concerns about a significant gap in enterprise security controls. The exploit, dubbed the “WinDbg Preview Exploit,” leverages the debugger’s advanced capabilities to achieve code execution and remote process injection, effectively […]
The post Hackers Bypassed Windows Defender Policies Using WinDbg Preview via Microsoft Store appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
posted by pod_feeder
Hackers Bypassed Windows Defender Policies Using WinDbg Preview via Microsoft Store
A newly documented technique reveals, exploit the WinDbg Preview debugger to bypass Windows Defender Application Control (WDAC) policies.Divya (GBHackers Security | #1 Globally Trusted Cyber Security News Platform)
Speedify VPN Vulnerability on macOS Exposes Users to System Takeover
A major security flaw in the Speedify VPN application for macOS, tracked as CVE-2025-25364, has exposed millions of users to the risk of complete system compromise. Researchers at SecureLayer7 discovered the vulnerability in Speedify’s privileged helper tool. It could potentially allow local attackers to execute arbitrary commands as root and take total control of affected systems. […]
The post Speedify VPN Vulnerability on macOS Exposes Users to System Takeover appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
posted by pod_feeder
Speedify VPN Vulnerability on macOS Exposes Users to System Takeover
A major security flaw in the Speedify VPN application for macOS, tracked as CVE-2025-25364, has exposed millions of users,Divya (GBHackers Security | #1 Globally Trusted Cyber Security News Platform)
ASUS Router Flaw Allows Hackers to Remotely Execute Malicious Code
ASUS has acknowledged multiple critical vulnerabilities affecting its routers that could allow hackers to remotely execute malicious code, thereby compromising network security and user privacy. These flaws highlight the continuous challenges in securing IoT and networking devices against increasingly sophisticated cyber threats. Overview of the Vulnerability The most pressing concern involves a series of remote […]
The post ASUS Router Flaw Allows Hackers to Remotely Execute Malicious Code appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
posted by pod_feeder
U.S DOGE Allegedly Breached – Whistleblower Leaked Most Sensitive Documents
A federal whistleblower has accused the Department of Government Efficiency (DOGE) of orchestrating a major cybersecurity breach at the National Labor Relations Board (NLRB), involving unauthorized data extraction, disabled security protocols, and attempted logins from a Russian IP address. The whistleblower, a senior DevSecOps architect at the NLRB, has submitted a detailed affidavit to Congress […]
The post U.S DOGE Allegedly Breached – Whistleblower Leaked Most Sensitive Documents appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
posted by pod_feeder
U.S DOGE Allegedly Breached - Whistleblower Leaked Most Sensitive Documents
A federal whistleblower has accused the Department of Government Efficiency (DOGE) of orchestrating a major cybersecurity breach at the National Labor Relations Board (NLRB), involving unauthorized data extraction, disabled security protocols, and at…Gurubaran (GBHackers Security | #1 Globally Trusted Cyber Security News Platform)
Windows NTLM Vulnerability (CVE-2025-24054) Actively Exploit in the Wild to Hack Systems
A critical vulnerability in Microsoft Windows, identified as CVE-2025-24054, has been actively exploited in the wild since March 19, 2025, targets organizations worldwide. The flaw, which enables NTLM hash disclosure through spoofing, allows attackers to harvest sensitive user credentials with minimal interaction, potentially leading to privilege escalation and full network compromise. Despite Microsoft releasing a […]
The post Windows NTLM Vulnerability (CVE-2025-24054) Actively Exploit in the Wild to Hack Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
posted by pod_feeder
Well now strangely on both sites bin/console config
doesn't work anymore.
Both throw the following error message:
rootName@VPShosting:# /../doamincom/bin/console config
PHP Fatal error: Uncaught Error: Undefined constant "CURLE_OPERATION_TIMEOUTED" in /../domaincom/boot.php:229
Stack trace:
#0 /../doamincom//vendor/composer/autoload_real.php(69): require()
#1 /../doamincom//vendor/composer/autoload_real.php(59): composerRequireFriendica()
#2 /../doamincom/vendor/autoload.php(7): ComposerAutoloaderInitFriendica::getLoader()
#3 /../doamincom/bin/console.php(31): require('...')
#4 {main}
thrown in /../doamincom/boot.php on line 229
Can't recall doing anything at all, accept trying to get the php imap module to work.
Anyone else seeing these errors?
Is anyone else seeing these errors in their logs? I see these too often.
Uncaught Exception ValueError: "DOMDocument::loadHTML(): Argument #1 ($source) must not be empty" at /var/www/html/src/Model/Item.php line 3558Friendica\Addon\s3_storage\src\S3Client:😛ut(): Argument #1 ($data) must be of type string, null given, called in /var/www/html/src/Model/Photo.php on line 446
Google Secretly Tracks Android Devices Even Without User-Opened Apps
A recent technical study conducted by researchers at Trinity College Dublin has revealed that Google collects and stores extensive user data on Android devices, even when pre-installed Google apps are never opened. The findings indicate that cookies, device identifiers, and tracking links are downloaded and stored without user consent, raising significant privacy concerns. Persistent Tracking […]
The post Google Secretly Tracks Android Devices Even Without User-Opened Apps appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
posted by pod_feeder
Google Secretly Tracks Android Devices Even Without User-Opened Apps
A recent technical study conducted by researchers at Trinity College Dublin has revealed that Google collects and stores extensive user data.Aman Mishra (GBHackers Security | #1 Globally Trusted Cyber Security News Platform)
Google, Meta, and Apple Power the World’s Biggest Surveillance System
Imagine a government that tracks your daily movements, monitors your communications, and catalogs your digital habits. While this conjures images of authoritarian regimes, a parallel reality exists in the United States, where law enforcement agencies leverage the vast data reservoirs of Big Tech companies to construct intrusive profiles of citizens. Over the past decade, Google, […]
The post Google, Meta, and Apple Power the World’s Biggest Surveillance System appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
posted by pod_feeder
Google, Meta, and Apple Power the World's Biggest Surveillance System
U.S. agencies submitted nearly 500,000 data requests to Google and Meta — surpassing the combined total of all 14 Eyes Alliance nations.Divya (GBHackers Security | #1 Globally Trusted Cyber Security News Platform)
Update Alert: Google Warns of Critical Android Vulnerabilities Under Exploit
Google’s March 2025 Android Security Bulletin has unveiled two critical vulnerabilities—CVE-2024-43093 and CVE-2024-50302—currently under limited, targeted exploitation. These flaws, impacting Android versions 12 through 15, underscore escalating risks for billions of devices. The bulletin mandates the immediate installation of the 2025-03-05 security patch, which resolves remote code execution and privilege escalation threats. Critical System Vulnerability: […]
The post Update Alert: Google Warns of Critical Android Vulnerabilities Under Exploit appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
posted by pod_feeder
Hackers Abused Google and PayPal’s Infrastructure to Steal Users Personal Data
Cybersecurity researchers have uncovered a sophisticated phishing campaign leveraging Google Ads and PayPal’s infrastructure to deceive users and steal sensitive personal data. The attackers exploited vulnerabilities in Google’s ad policies and PayPal’s “no-code checkout” feature to create fraudulent payment links that appeared legitimate, tricking victims into engaging with fake customer support agents. Exploitation of Google […]
The post Hackers Abused Google and PayPal’s Infrastructure to Steal Users Personal Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
posted by pod_feeder
Hackers Abused Google and PayPal’s Infrastructure to Steal Users Personal Data
Cybersecurity researchers have uncovered a sophisticated phishing campaign leveraging Google Ads and PayPal’s infrastructure.Mandvi (GBHackers Security | #1 Globally Trusted Cyber Security News Platform)
U.S. Suspends Cyberattacks Against Russia
The United States has suspended offensive cyber operations against Russia under an order issued by Defense Secretary Pete Hegseth, according to multiple confirmed reports. The directive, first revealed by The Record and corroborated by The New York Times and The Washington Post, marks a notable shift in the Pentagon’s cyber strategy amid escalating global tensions. While U.S. Cyber Command—tasked with […]
The post U.S. Suspends Cyberattacks Against Russia appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
posted by pod_feeder
Russian Hackers Target Signal Messenger Users to Steal Sensitive Data
Russian state-aligned threat actors have intensified their efforts to compromise Signal Messenger accounts, targeting individuals of strategic interest, according to the Google Threat Intelligence Group (GTIG). These campaigns, primarily linked to Russia’s ongoing military operations in Ukraine, aim to intercept sensitive communications from military personnel, politicians, journalists, and activists. The attackers are exploiting Signal’s “linked […]
The post Russian Hackers Target Signal Messenger Users to Steal Sensitive Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
posted by pod_feeder
Russian Hackers Target Signal Messenger Users to Steal Sensitive Data
Russian state-aligned threat actors have intensified their efforts to compromise Signal Messenger accounts, targeting individuals of strategic interest.Aman Mishra (GBHackers Security | #1 Globally Trusted Cyber Security News Platform)
Friends, for something to be open source, we need to see
1. The data it was trained and evaluated on
2. The code
3. The model architecture
4. The model weights.
DeepSeek only gives 3, 4. And I'll see the day that anyone gives us #1 without being forced to do so, because all of them are stealing data.
Can someone explain this phenomenon to me, it makes no sense to me
I make a song, in one day, I'll spend 6 hours on it, very actively.
I finish working on it (for the day being)
Until the last minute before falling asleep that same day, i will hear that song in my head non stop.
Now mystery #1: i wake up, and i don't know what the song was. I cannot recall a single note, section, instrument sound, as part of the song. Nothing. Until i physically hear it again.
Now mystery #2: after hearing it once on any day after the first day, and then sleeping after that, i wake up the following day and i CAN recall the song
This has now happened consistently like 50 times
What is this brain thing
Forbes and CNBC have both compiled lists of “business-friendly states” and these look similar, with North Carolina at #1 and red and purple states dominating the top 10 of both lists.
The problem? Being “business-friendly” on one of these lists has no correlation with real GDP per capita. By that metric, the 5 most economically productive states are DC, NY, Massachusetts, Washington, and California — the bluest of the blue.
“Business-friendly” policy isn’t even good for making money.
https://tupambae.org/admin/themes/frio
Service Unavailable
unable to create directory /var/www/html/view/smarty3/compiled/90/4f/52
Exception thrown in /var/www/html/src/Core/Renderer.php:90
Stack trace:
#0 /var/www/html/view/theme/frio/config.php(199): Friendica\Core\Renderer::replaceMacros()
#1 /var/www/html/view/theme/frio/config.php(141): frio_form()
#2 /var/www/html/src/Module/Admin/Themes/Embed.php(89): theme_admin()
#3 /var/www/html/src/BaseModule.php(244): Friendica\Module\Admin\Themes\Embed->content()
#4 /var/www/html/src/App.php(703): Friendica\BaseModule->run()
#5 /var/www/html/index.php(52): Friendica\App->runFrontend()
#6 {main}
Throughout this fiasco I've tried to calm things down by saying "this isn't a reflection of the entire project, it doesn't mean Rust is bad" etc.
But at this point I'm just no longer comfortable with the #1 Rust dependency being maintained by someone who behaves like that.
Lemmy.world officially has 33k users! 3000 users away from becoming the #1 lemmy instance.
To take the #1 spot from lemmy.ml (36185 users and no longer growing), lemmy.world just needs about 3000 new users. Given the current growth rate, that should only be another day or two.
We’re building something here! Kudos to lemmy.world admin @ruud@lemmy.world for all of his hard work keeping this site running smoothly.
To track lemmy’s growth: https://lemmy.fediverse.observer/list
He wants to be the best Ravioli chef in the US, not #1 most wanted man
Ok fixed that
Executable: /home/anubis2814/mywebsite/bin/console.php
Arguments: array (
0 => 'autoinstall',
)
Options: array (
'v' => 1,
)
Command: autoinstall
Initializing setup...
Complete!
Checking environment...
NOTICE: Not checking .htaccess/URL-Rewrite during CLI installation.
[Error] --------
GNU Multiple Precision PHP module: Error: GNU Multiple Precision PHP module required but not installed.
[Backtrace]:
#0 /home/anubis2814/mywebsite/vendor/asika/simple-console/src/Console.php(108): Friendica\Console\AutomaticInstallation->doExecute()
#1 /home/anubis2814/mywebsite/src/Core/Console.php(163): Asika\SimpleConsole\Console->execute()
#2 /home/anubis2814/mywebsite/vendor/asika/simple-console/src/Console.php(108): Friendica\Core\Console->doExecute()
#3 /home/anubis2814/mywebsite/bin/console.php(41): Asika\SimpleConsole\Console->execute()
#4 {main}
Is this error an issue?
https://www.currentaffairs.org/2021/07/the-dangerous-ideas-of-longtermism-and-existential-risk
The Dangerous Ideas of “Longtermism” and “Existential Risk” ❧ Current Affairs
Current AffairsSo-called rationalists have created a disturbing secular religion that looks like it addresses humanity’s deepest problems, but actually justifies pursuing the social preferences of elites.
PHP Fatal error: Uncaught Error: Class "Friendica\Core\Logger\Util\Introspection" not found in /var/www/html/static/dependencies.config.php:192
Stack trace:
#0 /var/www/html/index.php(32): include()
#1 {main}
thrown in /var/www/html/static/dependencies.config.php on line 192
I have a sudden burning desire to learn basic physics. are there any great online tools for this, particularly for someone who actually learns really well via textbooks and quizzes, but doesn't have much ability to "book" free time in advance?
also, what level of math would I need to brush up on, and where might you suggest I do that?
I'm up for unusual suggestions, but I don't have a lot of money and the #1 thing I don't want (the reason I abandoned the library-book approach) is some high-level philosophical bullshit about space. I do not care about the origins of life right now, I care about being able to comprehend energy and mass and various forces so I can then later find out why that was three levels of oversimplification. :blobcatmaths: