Aggregator
The AI Cyberwar Is Here: CrowdStrike Report Exposes How Attackers Use AI to Automate Vishing, Phishing, & Espionage
Generative AI models are rapidly evolving into fully-fledged instruments within the arsenals of cyber adversaries. This trend is underscored in CrowdStrike’s 2025 annual report, which highlights a sharp increase in the use of artificial...
The post The AI Cyberwar Is Here: CrowdStrike Report Exposes How Attackers Use AI to Automate Vishing, Phishing, & Espionage appeared first on Penetration Testing Tools.
下周一开赛|AI安全产品挑战赛邀你来战!
Что если бесконечности не существует? Это может изменить всё — от физики до смысла истины
The ToolShell Threat Escalates: New 4L4MD4R Ransomware Joins China-Linked APTs in SharePoint Attacks
A large-scale campaign exploiting a chain of vulnerabilities in Microsoft SharePoint continues to escalate—this time with the active involvement of ransomware groups. During an investigation into a series of coordinated attacks, researchers at Palo...
The post The ToolShell Threat Escalates: New 4L4MD4R Ransomware Joins China-Linked APTs in SharePoint Attacks appeared first on Penetration Testing Tools.
EFF 质疑英国《在线安全法案》实效:强制年龄验证威胁用用户隐私
EFF 质疑英国《在线安全法案》实效:强制年龄验证威胁用用户隐私
Volt Boot Attack: New Physical Exploit Bypasses Cold Boot Defenses to Steal Secrets from On-Chip SRAM
At first glance, static RAM (SRAM) appeared to be a reliable sanctuary for sensitive data. Embedded directly within the processor die and incapable of retaining information once power is cut, it was long considered...
The post Volt Boot Attack: New Physical Exploit Bypasses Cold Boot Defenses to Steal Secrets from On-Chip SRAM appeared first on Penetration Testing Tools.
Chanel Client Data Breached in Widespread ShinyHunters Campaign Targeting Salesforce
The French fashion house Chanel has become the latest victim of an ongoing data compromise campaign targeting users of the Salesforce platform, suffering a breach of personal client information in the United States. The...
The post Chanel Client Data Breached in Widespread ShinyHunters Campaign Targeting Salesforce appeared first on Penetration Testing Tools.
CVE-2025-36594 | Dell PowerProtect Data Domain authentication spoofing (dsa-2025-159 / WID-SEC-2025-1714)
CVE-2025-44643 | DrayTek AP903/AP912C/AP918R Setting clients.conf secret weak password
CVE-2025-51536 | Austrian Archaeological Institute OpenAtlas 8.11.0 hard-coded password
CVE-2025-38739 | Dell Digital Delivery up to 5.6.1.0 insufficiently protected credentials (dsa-2025-302)
CVE-2025-44955 | Ruckus Virtual SmartZone/Network Director hard-coded password
CVE-2025-8516 | Kingdee Cloud-Starry-Sky Enterprise Edition up to 8.2 IIS-K3CloudMiniApp FileUploadAction.class filePath path traversal
CVE-2024-52279 | Apache Zeppelin up to 0.11.x JDBC URL Validation input validation (EUVD-2024-54846)
CVE-2024-51775 | Apache Zeppelin up to 0.11.x missing origin validation in websockets (EUVD-2024-54844)
CVE-2025-8494 | code-projects Intern Membership Management System 1.0 delete_student.php ID sql injection (EUVD-2025-23455)
CISA Warns of D-Link Vulnerabilities Actively Exploited in Attacks
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a new alert, adding three vulnerabilities affecting D-Link devices to its Known Exploited Vulnerabilities (KEV) Catalog. The inclusion of these flaws in the catalog signifies that they are being actively exploited by malicious cyber actors in real-world attacks, posing a significant threat to networks. The […]
The post CISA Warns of D-Link Vulnerabilities Actively Exploited in Attacks appeared first on Cyber Security News.