Aggregator
85 секунд ада для металла. Двигатель Typhoon рвётся в космос — и в конкуренты SpaceX
CVE-2024-27066 | Linux Kernel up to 6.6.22/6.7.10/6.8.1 virtio use_dma_api memory leak (WID-SEC-2024-1008)
CVE-2024-27063 | Linux Kernel up to 6.6.23/6.7.11/6.8.2 netdev get_device_state denial of service (WID-SEC-2024-1008)
CVE-2024-27064 | Linux Kernel up to 6.6.22/6.7.10/6.8.1 Netfilter nft_netdev_register_hooks memory leak (WID-SEC-2024-1008)
CVE-2024-27065 | Linux Kernel up to 6.8.1 nf_tables comparison (Nessus ID 209785 / WID-SEC-2024-1008)
CVE-2024-27061 | Linux Kernel up to 6.6.23/6.7.11 Virtual Address sun8i_ce_cipher_unprepare null pointer dereference (dc60b25540c8/51a7d338c212/183420038444 / WID-SEC-2024-1008)
CVE-2024-27062 | Linux Kernel up to 6.6.23/6.7.11 nouveau allocation of resources (6887314f5356/96c875184417/b7cc4ff787a5 / Nessus ID 209785)
2025 Let's GoSSIP 软件安全暑期学校预告第五弹——CADO-NFS
Wireless Penetration Testing Cheatsheet
Labubu-бум выходит из-под контроля: потасовки, подделки и миллионы конфискатов
Кофе кипит — процессор охлаждается. Хакер собрал ПК в кофемашине и запитал его эспрессо
Critical Flaw in Cursor AI: Prompt Injection Allows Remote Code Execution
A critical vulnerability has been discovered in the Cursor source code editor, an AI-powered tool designed to assist programmers. The flaw, identified as CVE-2025-54135 and dubbed CurXecute, affects nearly all versions of the IDE...
The post Critical Flaw in Cursor AI: Prompt Injection Allows Remote Code Execution appeared first on Penetration Testing Tools.
Weekly Update 463
I've listened to a few industry podcasts discussing the Tea app breach since recording, and the thing that really struck me was the lack of discussion around the privacy implications of the service before the breach. Here was a tool where people were non-consensually uploading photos of others
Weekly Update 463
CobaltStrike Beacon C++ 源码开源分享
New Akira Ransomware Wave Hits SonicWall Devices, Zero-Day Vulnerability Suspected
Since mid-July, a surge in ransomware attacks leveraging the Akira strain has been observed, specifically targeting SonicWall devices. According to cybersecurity firm Arctic Wolf, threat actors have been actively exploiting SSL VPN connections on...
The post New Akira Ransomware Wave Hits SonicWall Devices, Zero-Day Vulnerability Suspected appeared first on Penetration Testing Tools.
Phishing Attacks Weaponize Security Tools by Abusing Proofpoint & Intermedia Link Wrapping
Email protection mechanisms, originally conceived as a bulwark against malicious links, have ironically become unwitting allies to cybercriminals. Researchers have uncovered a troubling trend: threat actors are increasingly exploiting “link wrappers” provided by platforms...
The post Phishing Attacks Weaponize Security Tools by Abusing Proofpoint & Intermedia Link Wrapping appeared first on Penetration Testing Tools.
МКС теряет воздух, а стыковочный порт могут закрыть навсегда
10 Best Dark Web Monitoring Tools in 2025
Choosing the right dark web monitoring tool is a critical decision for both individuals and organizations seeking to protect their digital assets and identity. With the dark web serving as a hub for illegal data trading, from leaked credentials to intellectual property, a robust monitoring solution is essential for proactive defense. The best tool for […]
The post 10 Best Dark Web Monitoring Tools in 2025 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.