Day: February 12, 2025
Cuando los usuarios se den cuenta del poder que tienen se acabarán muchas tonterías
— BrigadaOsint (@BrigadaOsint) February 13, 2025
The post Cuando los usuarios se den cuenta del poder que tienen se acabarán muchas tonterías first appeared on JOSSICA – jossica.com.
.SF is not capable of healing. Either it gets taken over by the equally incompetent State of California or crumbles into a walled off & lawless zone. If the dregs from all over the world continue to stream in it will happen in a matter of months not years pic.twitter.com/5uUwqPpa94
— OSINT with a splash of good takes and a few bad 1s (@supersean415) February 13, 2025
The post @joffemd .SF is not capable of healing. Either it gets taken over by the equally incompetent State of California or crumbles into a walled off & lawless zone. If the dregs from all over the world continue to stream in it will happen in a matter of months not years first appeared on JOSSICA – jossica.com.
Landmine explosions continue in Syria #Syria #OSINT #GEOINT https://t.co/lofLlmgp8b
— Geopolitical Report (@GeoPioneerInc) February 13, 2025
The post Landmine explosions continue in Syria #Syria #OSINT #GEOINT geopolitical.report/landmine-explo… first appeared on JOSSICA – jossica.com.
Newsreel footage from 1943 of bombing and strafing runs in North Africa by American P-39 Airacobras and P-38 Lightings. pic.twitter.com/ziNF7dcQwc
— Military History Now (@MilHistNow) February 13, 2025
The post Newsreel footage from 1943 of bombing and strafing runs in North Africa by American P-39 Airacobras and P-38 Lightings. first appeared on JOSSICA – jossica.com.
@MotherJones Not our problem
Not our problem
— OSINT with a splash of good takes and a few bad 1s (@supersean415) February 13, 2025
The post @MotherJones Not our problem first appeared on JOSSICA – jossica.com.
DeepSeek’s rising popularity has led to cyber attackers exploiting it by creating phishing sites that distribute malware, highlighting the need for vigilance and tools like Criminal IP to detect threats. #DeepSeek #CyberSecurity https://t.co/73IC2SVgHw
— Cyber_OSINT (@Cyber_O51NT) February 13, 2025
The post DeepSeek’s rising popularity has led to cyber attackers exploiting it by creating phishing sites that distribute malware, highlighting the need for vigilance and tools like Criminal IP to detect threats. #DeepSeek #CyberSecurity ift.tt/5rSa3ex first appeared on JOSSICA – jossica.com.
Netskope Threat Labs reports a phishing campaign exploiting Webflow CDN and fake CAPTCHAs to steal credit card info, targeting users searching for documents on search engines since late 2024. #Phishing #CyberSecurity https://t.co/wDtsFpz6lu
— Cyber_OSINT (@Cyber_O51NT) February 13, 2025
The post Netskope Threat Labs reports a phishing campaign exploiting Webflow CDN and fake CAPTCHAs to steal credit card info, targeting users searching for documents on search engines since late 2024. #Phishing #CyberSecurity ift.tt/QMU6HoS first appeared on JOSSICA – jossica.com.
A security analysis of RedNote revealed that all versions fetch images over HTTP, exposing user content to eavesdroppers, while some Android versions allow attackers to access files, and device metadata is transmitted with weak encryption. #RedNote #Cybe… https://t.co/yVyc3VL1Z7
— Cyber_OSINT (@Cyber_O51NT) February 13, 2025
The post A security analysis of RedNote revealed that all versions fetch images over HTTP, exposing user content to eavesdroppers, while some Android versions allow attackers to access files, and device metadata is transmitted with weak encryption. #RedNote #Cybe… ift.tt/lWQm7ut first appeared on JOSSICA – jossica.com.