Aggregator
CVE-2024-27061 | Linux Kernel up to 6.6.23/6.7.11 Virtual Address sun8i_ce_cipher_unprepare null pointer dereference (dc60b25540c8/51a7d338c212/183420038444 / WID-SEC-2024-1008)
CVE-2024-27062 | Linux Kernel up to 6.6.23/6.7.11 nouveau allocation of resources (6887314f5356/96c875184417/b7cc4ff787a5 / Nessus ID 209785)
2025 Let's GoSSIP 软件安全暑期学校预告第五弹——CADO-NFS
Wireless Penetration Testing Cheatsheet
Labubu-бум выходит из-под контроля: потасовки, подделки и миллионы конфискатов
Кофе кипит — процессор охлаждается. Хакер собрал ПК в кофемашине и запитал его эспрессо
Critical Flaw in Cursor AI: Prompt Injection Allows Remote Code Execution
A critical vulnerability has been discovered in the Cursor source code editor, an AI-powered tool designed to assist programmers. The flaw, identified as CVE-2025-54135 and dubbed CurXecute, affects nearly all versions of the IDE...
The post Critical Flaw in Cursor AI: Prompt Injection Allows Remote Code Execution appeared first on Penetration Testing Tools.
Weekly Update 463
I've listened to a few industry podcasts discussing the Tea app breach since recording, and the thing that really struck me was the lack of discussion around the privacy implications of the service before the breach. Here was a tool where people were non-consensually uploading photos of others
Weekly Update 463
CobaltStrike Beacon C++ 源码开源分享
New Akira Ransomware Wave Hits SonicWall Devices, Zero-Day Vulnerability Suspected
Since mid-July, a surge in ransomware attacks leveraging the Akira strain has been observed, specifically targeting SonicWall devices. According to cybersecurity firm Arctic Wolf, threat actors have been actively exploiting SSL VPN connections on...
The post New Akira Ransomware Wave Hits SonicWall Devices, Zero-Day Vulnerability Suspected appeared first on Penetration Testing Tools.
Phishing Attacks Weaponize Security Tools by Abusing Proofpoint & Intermedia Link Wrapping
Email protection mechanisms, originally conceived as a bulwark against malicious links, have ironically become unwitting allies to cybercriminals. Researchers have uncovered a troubling trend: threat actors are increasingly exploiting “link wrappers” provided by platforms...
The post Phishing Attacks Weaponize Security Tools by Abusing Proofpoint & Intermedia Link Wrapping appeared first on Penetration Testing Tools.
МКС теряет воздух, а стыковочный порт могут закрыть навсегда
10 Best Dark Web Monitoring Tools in 2025
Choosing the right dark web monitoring tool is a critical decision for both individuals and organizations seeking to protect their digital assets and identity. With the dark web serving as a hub for illegal data trading, from leaked credentials to intellectual property, a robust monitoring solution is essential for proactive defense. The best tool for […]
The post 10 Best Dark Web Monitoring Tools in 2025 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
The Pwn2Own Exploit That Never Was: A Format String Flaw in Synology IP Cameras Allowed Remote Code Execution
In the autumn of 2024, the InfoSect bug hunting team prepared a remote code execution attack targeting the Synology TC500 IP camera for entry in the Pwn2Own Ireland competition. The exploitation hinged on a...
The post The Pwn2Own Exploit That Never Was: A Format String Flaw in Synology IP Cameras Allowed Remote Code Execution appeared first on Penetration Testing Tools.
Week in review: Food sector cybersecurity risks, cyber threats to space infrastructure
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Review: LLM Engineer’s Handbook For all the excitement around LLMs, practical, engineering-focused guidance remains surprisingly hard to find. LLM Engineer’s Handbook aims to fill that gap. Vulnhuntr: Open-source tool to identify remotely exploitable vulnerabilities Vulnhuntr is an open-source tool that finds remotely exploitable vulnerabilities. It uses LLMs and static code analysis to trace how data moves through an application, from … More →
The post Week in review: Food sector cybersecurity risks, cyber threats to space infrastructure appeared first on Help Net Security.