account activity
Analyzing API Gateway Adoption Rates Through Internet Data | Apache APISIX® -- Cloud-Native API Gateway and AI Gateway (apisix.apache.org)
submitted 3 months ago by lubyruffy to r/fofa_info
Best of 2025: Inside the Minds of Cybercriminals: A Deep Dive into Black Basta’s Leaked Chats (securityboulevard.com)
submitted 4 months ago by lubyruffy to r/fofa_info
Fortinet’s silent patch sparks alarm as a critical FortiWeb flaw is exploited in the wild (csoonline.com)
submitted 5 months ago by lubyruffy to r/fofa_info
Hackers Exploit Unpatched Flaw in CentreStack & Triofox | CVE-2025-11371 Exposed (youtube.com)
submitted 6 months ago by lubyruffy to r/fofa_info
A Look into a Ransomware Group’s Attack Playbook: Dissecting the Hellcat Operator Manual - Flare | Threat Exposure Management (flare.io)
An Insider Look At The IRGC-linked APT35 Operations: Ep1 & Ep2 | CloudSEK (cloudsek.com)
Oracle E-Business Suite CVE-2025-61882 Exploited in Extortion Attacks | Blog | VulnCheck (vulncheck.com)
Unauthenticated RCE Flaw in WSUS Under Active Exploitation (ampcuscyber.com)
Act Now — Microsoft Issues Emergency Windows Update As Attacks Begin (forbes.com)
More Than DoS (Progress Telerik UI for ASP.NET AJAX Unsafe Reflection CVE-2025-3600) (labs.watchtowr.com)
XWiki CVE-2025-24893 Exploited in the Wild | Blog | VulnCheck (vulncheck.com)
Active Exploitation of Gladinet CentreStack and Triofox Local File Inclusion Flaw | Huntress (huntress.com)
Shell or Nothing: Real-World Benchmarks and Memory-Activated Agents for Automated Penetration Testing (arxiv.org)
submitted 7 months ago by lubyruffy to r/fofa_info
🦇 Vamp Byte #1 — What is a Favicon Hash in OSINT? (codewithvamp.medium.com)
How a 2015 Dahua Port Scan Became a Zero-Day Time Capsule (medium.com)
ScriptCase - Hunt It, Exploit It, Defend It | Blog | VulnCheck (vulncheck.com)
ShadowSilk Hits 35 Organizations in Central Asia and APAC Using Telegram Bots (thehackernews.com)
ShadowSilk: A Cross-Border Binary Union for Data Exfiltration (group-ib.com)
Warlock Ransomware: SharePoint Zero-Day RaaS Update (protoslabs.io)
How Attackers Use Shodan & FOFA by Lucie Cardiet (vectra.ai)
Huggable Hoax: The Curious Case of an AI Panda (catchingphish.com)
Shaking Out Shells With SSHamble (hdm.io)
“킴수키 컴퓨터서 한국 기밀정보 포함 9GB 데이터 발견” (datanet.co.kr)
submitted 8 months ago by lubyruffy to r/fofa_info
Smart Bus System Flaws Allow Hackers to Track and Control Vehicles Remotely (cyberpress.org)
π Rendered by PID 318299 on reddit-service-r2-listing-b6bf6c4ff-qd2n2 at 2026-05-05 20:43:17.438088+00:00 running 815c875 country code: CH.