Aggregator
CVE-2026-39644 | Roxnor Wp Ultimate Review Plugin up to 2.3.8 on WordPress authorization
CVE-2026-39610 | Pankaj Kumar WpXmas-Snow Plugin up to 1.1 on WordPress authorization
CVE-2026-39624 | kutethemes Biolife Plugin up to 3.2.3 on WordPress authorization
CVE-2026-39639 | redpixelstudios RPS Include Content Plugin up to 1.2.2 on WordPress authorization
CVE-2026-39622 | acmethemes Education Base Plugin up to 3.0.8 on WordPress authorization
The Invisible Navy: SideWinder’s New Cloud-Based Strategy for Striking South Asian Defense Forces
The SideWinder threat actor has markedly pivoted its strategic methodology, forsaking traditional infrastructure in favor of a clandestine
The post The Invisible Navy: SideWinder’s New Cloud-Based Strategy for Striking South Asian Defense Forces appeared first on Penetration Testing Tools.
Disposable Code: Inside North Korea’s “Burn-on-Detection” Malware Assembly Line
North Korea has long since transmuted its malicious software development into a sophisticated assembly line, where each instrument
The post Disposable Code: Inside North Korea’s “Burn-on-Detection” Malware Assembly Line appeared first on Penetration Testing Tools.
大网威胁研究:塑造网络安全新时代的全球威胁洞察力
Open Gate: How a 9.8 Severity Flaw in Ninja Forms Grants Hackers Total Server Control
A widely utilized WordPress plugin has emerged as a precarious vulnerability for thousands of websites globally. According to
The post Open Gate: How a 9.8 Severity Flaw in Ninja Forms Grants Hackers Total Server Control appeared first on Penetration Testing Tools.
[Tool] Rikune: A reverse-engineering MCP server that turns PE triage, Ghidra analysis, runtime evidence, and source-like reconstruction into reusable tools for any LLM
The Unstoppable Phoenix: How the Phorpiex Botnet Reborn as a P2P Crypto-Thief
An ancient botnet, long relegated to the periphery of collective memory, has re-emerged with a lethality far exceeding
The post The Unstoppable Phoenix: How the Phorpiex Botnet Reborn as a P2P Crypto-Thief appeared first on Penetration Testing Tools.
俄电信巨头被黑致使互联网瘫痪,银行、政务、娱乐等数字服务无法访问
Anthropic新模型让传统网络防御失效,AI主导网络安全的时代正在降临!
俄电信巨头被黑致使互联网瘫痪,银行、政务、娱乐等数字服务无法访问
Anthropic新模型让传统网络防御失效,AI主导网络安全的时代正在降临!
The Podcast Trap: How UNC1069’s AI Deepfakes Are Poisoning the Global npm Registry
What begins as a mundane exchange—an invitation to a podcast or a routine professional briefing—may serve as the
The post The Podcast Trap: How UNC1069’s AI Deepfakes Are Poisoning the Global npm Registry appeared first on Penetration Testing Tools.
Critical Flowise RCE Vulnerability Actively Exploited, Thousands of Systems at Risk
Chaos malware expands from routers to Linux cloud servers
Chaos, Go-based malware first documented by Lumen’s Black Lotus Labs, has historically targeted routers and edge devices. A new variant observed in March 2026 shows the malware operating against misconfigured Linux cloud servers, a category of infrastructure the botnet had not previously prioritized. Darktrace’s malware research team documented the compromise through its CloudyPots program, a global honeypot network the company runs to capture attacker behavior across a range of services and cloud platforms. One honeypot … More →
The post Chaos malware expands from routers to Linux cloud servers appeared first on Help Net Security.