Telegram Web Link
⚠️Uno de los dominios de BreaxhForums fue tomado por los amigos del FBI :

https://breachforums.st
Please open Telegram to view this post
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
⚠️Se cree que quien está (o estaba secuestrado) este video es "kidnapped", administrador de Doxbin . com, en el cual muestran acceso al panel de administración así cómo una fuerte cantidad de dinero que poseían.
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
🔊Síguenos por Twitter !!

https://x.com/tpx_security 🙏
Please open Telegram to view this post
VIEW IN TELEGRAM
Con la novedad que ya es gratis … pero creo que siempre ha sido gratis no ? 👀

https://blogs.vmware.com/teamfusion/2024/05/fusion-pro-now-available-free-for-personal-use.html
Please open Telegram to view this post
VIEW IN TELEGRAM
Hace unos días estaba ala venta este 0Day, si esto es real, vamos a ver un notable incremento de ataques como ransomware 👀 !!

https://x.com/tpx_security/status/1790479471780495553
tpx Security ⠠⠵
Please open Telegram to view this post
VIEW IN TELEGRAM
Bueno … pues quien quiere ver si la receta de la cochinita pibil … está ahí ? #Lockbit
⚡️DNSBomb amplifica el tráfico DNS inicial hasta 20.000x su tamaño inicial

CVE-2024-33655
📣Descubren un keylogger para robar contraseñas en servidores Microsoft Exchange en más de 30 empresas, incluidos bancos

https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/positive-technologies-detects-a-series-of-attacks-via-microsoft-exchange-server/
Please open Telegram to view this post
VIEW IN TELEGRAM
⚠️CVE-2024-29849 (CVSS 9.8): Veeam’s Backup Nightmare, Full System Access Exposed


CVE-2024-29849 (CVSS 9.8): The most severe of the vulnerabilities, this flaw allows unauthenticated attackers to bypass authentication measures and log in to the Enterprise Manager web interface as any user, granting them full control over the system.

⚠️CVE-2024-29850 (CVSS 8.8): This vulnerability enables a sophisticated attack known as NTLM relay, where attackers can capture and reuse authentication credentials, effectively hijacking user accounts.
⚠️CVE-2024-29851 (CVSS 7.2): In certain configurations, this flaw permits high-privileged users to steal the NTLM hash (a type of password representation) of the Enterprise Manager service account, potentially leading to further compromise of the system.
⚠️CVE-2024-29852 (CVSS 2.7): This vulnerability allows high-privileged users to gain unauthorized access to backup session logs, potentially exposing sensitive information about backup configurations and data.
Please open Telegram to view this post
VIEW IN TELEGRAM
🚨CVE-2024-21683(CVSS 8.3):RCE (Remote Code Execution) in Confluence Data Center and Server

⚠️It allows an authenticated attacker to execute arbitrary code which has a high impact on confidentiality, integrity, and availability, and requires no user interaction.
Please open Telegram to view this post
VIEW IN TELEGRAM
2025/07/06 19:43:03
Back to Top
HTML Embed Code: