Aggregator
Submit #630201: itsourcecode Online Tour and Travel Management System V1.0 SQL injection [Accepted]
Submit #630200: itsourcecode Online Tour and Travel Management System V1.0 Unrestricted Upload [Accepted]
CVE-2025-38366 | Linux Kernel up to 6.15.4/6.16-rc3 LoongArch num_cpu privilege escalation (Nessus ID 251310 / WID-SEC-2025-1653)
Обычная камера у подъезда — у вас лотерея на ошибочный арест. Угадайте, где вас задержат
The need for speed: Why organizations are turning to rapid, trustworthy MDR
Python 供应链风险:termncolor 和 colorinal 解析
Australian ISP iiNet Suffers Breach of 280,000+ Records
银狐木马变种难防?天擎“六合”引擎默认内存查杀
New ClickFix Attack Uses Fake BBC News Page and Fraudulent Cloudflare Verification to Trick Users
A sophisticated new cyberthreat campaign has emerged that combines impersonation of trusted news sources with deceptive security verification prompts to trick users into executing malicious commands on their systems. According to a Reddit post, the ClickFix attack masquerades as legitimate BBC news content while employing fake Cloudflare verification screens to deliver malware. How the Attack Works The […]
The post New ClickFix Attack Uses Fake BBC News Page and Fraudulent Cloudflare Verification to Trick Users appeared first on Cyber Security News.
DOJ Seizes $2.8 Million in Crypto from Suspected Zeppelin Ransomware Operator
The U.S. Department of Justice has announced the seizure of more than $2.8 million in cryptocurrency from Yanis Alexandrovich Antroppenko, who stands accused of computer fraud and money laundering. Antroppenko is linked to the...
The post DOJ Seizes $2.8 Million in Crypto from Suspected Zeppelin Ransomware Operator appeared first on Penetration Testing Tools.
Leaked Source Code Exposes ERMAC 3.0: A Dangerous Trojan with Flawed Security
Researchers at Hunt.io have published an in-depth analysis of the Android banking trojan ERMAC 3.0, uncovering not only its enhanced capabilities but also severe flaws within its infrastructure. This iteration expands upon the functionality...
The post Leaked Source Code Exposes ERMAC 3.0: A Dangerous Trojan with Flawed Security appeared first on Penetration Testing Tools.
美澳德加荷新六国联合发布运营技术 (OT) 网络安全指南
泄露上百万患者健康信息,美国医药巨头赔偿2.87亿元
The State of Cybercrime: How C2 Servers Fuel the Global Threat
Experts at Censys have released their State of the Internet 2025 report, focusing on the infrastructure of cybercriminals—specifically Command-and-Control (C2) servers and other tools used to coordinate attacks and maintain access to compromised systems....
The post The State of Cybercrime: How C2 Servers Fuel the Global Threat appeared first on Penetration Testing Tools.
Beyond the Email: How New Mobile Phishing Scams Are Causing a “Ramp-and-Dump” Stock Frenzy
Groups of cybercriminals specializing in mobile phishing have discovered a new way to profit from stolen credentials. Whereas they once focused on transferring compromised cards into digital wallets and selling them for fraudulent transactions,...
The post Beyond the Email: How New Mobile Phishing Scams Are Causing a “Ramp-and-Dump” Stock Frenzy appeared first on Penetration Testing Tools.
Телеграм-аккаунты воруют всё чаще, а стоят дешевле. Что случилось с теневым рынком
The King Is Dead, Long Live the King: A New Cybercrime Forum Rises from the Ashes of XSS
A former moderator of the dark web forum XSS, known by the alias Rehub, has launched his own platform under the name Rehubcom. This move coincides with the arrest of the XSS administrator in...
The post The King Is Dead, Long Live the King: A New Cybercrime Forum Rises from the Ashes of XSS appeared first on Penetration Testing Tools.
Beyond the Firewall: Inside UAT-7237, a Chinese APT Group Targeting Taiwan
The China-linked group UAT-7237 has become the subject of a new report from Cisco Talos. According to researchers, this team has been active since 2022, specializing in long-term persistence within victim infrastructure. In one...
The post Beyond the Firewall: Inside UAT-7237, a Chinese APT Group Targeting Taiwan appeared first on Penetration Testing Tools.
The Invisible Attack: Hidden Characters Can Make Gemini Models Implant Backdoors
Researchers have demonstrated that the latest Gemini models consistently interpret hidden Unicode Tag characters as executable instructions—rendering invisible text within the interface into direct commands for the AI. This flaw endangers all Gemini-based integrations,...
The post The Invisible Attack: Hidden Characters Can Make Gemini Models Implant Backdoors appeared first on Penetration Testing Tools.