Aggregator
The King Is Dead, Long Live the King: A New Cybercrime Forum Rises from the Ashes of XSS
A former moderator of the dark web forum XSS, known by the alias Rehub, has launched his own platform under the name Rehubcom. This move coincides with the arrest of the XSS administrator in...
The post The King Is Dead, Long Live the King: A New Cybercrime Forum Rises from the Ashes of XSS appeared first on Penetration Testing Tools.
Beyond the Firewall: Inside UAT-7237, a Chinese APT Group Targeting Taiwan
The China-linked group UAT-7237 has become the subject of a new report from Cisco Talos. According to researchers, this team has been active since 2022, specializing in long-term persistence within victim infrastructure. In one...
The post Beyond the Firewall: Inside UAT-7237, a Chinese APT Group Targeting Taiwan appeared first on Penetration Testing Tools.
The Invisible Attack: Hidden Characters Can Make Gemini Models Implant Backdoors
Researchers have demonstrated that the latest Gemini models consistently interpret hidden Unicode Tag characters as executable instructions—rendering invisible text within the interface into direct commands for the AI. This flaw endangers all Gemini-based integrations,...
The post The Invisible Attack: Hidden Characters Can Make Gemini Models Implant Backdoors appeared first on Penetration Testing Tools.
Lockbit Linux ESXi Ransomware Variant Reveals Evasion Techniques and File Encryption Process
A recent reverse engineering analysis of a Lockbit ransomware variant targeting Linux-based ESXi servers has uncovered several sophisticated evasion techniques and operational details. The malware, first documented in 2022, employs the ptrace system call to detect debugging environments by attempting to attach to its parent process. If this fails typically due to an existing tracer […]
The post Lockbit Linux ESXi Ransomware Variant Reveals Evasion Techniques and File Encryption Process appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
SNI5GECT: A New Framework Exposes Major Vulnerabilities in 5G Networks
A team of researchers has unveiled a new framework, SNI5GECT, which exposes vulnerabilities in fifth-generation mobile networks at the very earliest stages of connection establishment. Unlike attacks that rely on counterfeit base stations—complex to...
The post SNI5GECT: A New Framework Exposes Major Vulnerabilities in 5G Networks appeared first on Penetration Testing Tools.
Allianz Life security breach impacted 1.1 million customers
New Tool Bypasses Windows 11 PatchGuard, Opening a New Debate on Security
A security researcher named Wayne has unveiled a new tool for Windows 11 that circumvents the PatchGuard protection mechanism in the system’s latest release (24H2). The project, called Kurasagi, has already been published on...
The post New Tool Bypasses Windows 11 PatchGuard, Opening a New Debate on Security appeared first on Penetration Testing Tools.
CVE-2025-9092 | Bouncy Castle for Java up to 2.1.0 API Module resource consumption (WID-SEC-2025-1852)
CVE-2025-38524 | Linux Kernel up to 6.6.99/6.12.39/6.15.7 net/rxrpc/recvmsg.c user_mutex race condition
CVE-2025-38526 | Linux Kernel up to 6.6.99/6.12.39/6.15.7 ice_lag_is_switchdev_running null pointer dereference
CVE-2025-38527 | Linux Kernel up to 6.1.146/6.6.99/6.12.39/6.15.7 smb cifs_oplock_break use after free
CVE-2025-38520 | Linux Kernel up to 6.1.147/6.6.100/6.12.38/6.15.6 amdkfd exit_mmap deadlock (EUVD-2025-25078)
CVE-2025-38517 | Linux Kernel up to 6.12.38/6.15.6 alloc_tag_top_users initialization (EUVD-2025-25081)
The Patch Isn’t a Fix: New Flaw Lets Attackers Steal NTLM Hashes from Windows
Researchers at Cymulate Research Labs have disclosed a new vulnerability in Windows that allows attackers to bypass Microsoft’s recent patch and once again exfiltrate NTLM hashes without any user interaction. The flaw, tracked as...
The post The Patch Isn’t a Fix: New Flaw Lets Attackers Steal NTLM Hashes from Windows appeared first on Penetration Testing Tools.
Nested App Authentication: Microsoft’s New Feature Is a Double-Edged Sword for Azure Security
Microsoft has introduced a new mechanism known as Nested App Authentication (NAA), which is steadily becoming a key component of the company’s cloud ecosystem. The concept is straightforward: if a user has already signed...
The post Nested App Authentication: Microsoft’s New Feature Is a Double-Edged Sword for Azure Security appeared first on Penetration Testing Tools.