Aggregator
CVE-2026-1948 | webaways NEX-Forms Plugin up to 9.1.9 on WordPress deactivate_license authorization (EUVD-2026-12182)
CVE-2026-4163 | Wavlink WL-WN579A3 220323 POST Request /cgi-bin/wireless.cgi SetName/GuestWifi command injection (EUVD-2026-12192)
Interpol – Operation Synergia III leads to 45,000 malicious IPs dismantled and 94 arrests worldwide
Submit #765328: Wavlink WL-WN579A3 V220323 Command Injection [Duplicate]
Submit #765327: Wavlink WL-WN579A3 V220323 Command Injection [Accepted]
Malicious npm Packages Posing as Solara Executor Target Discord, Browsers, and Crypto Wallets
JFrog security researchers Guy Korolevski and Meitar Palas uncovered a sophisticated supply chain attack on the npm ecosystem on March 12, 2026, in which threat actors disguised an information-stealing malware as a legitimate Roblox script executor. The campaign, self-named Cipher stealer, used two malicious packages bluelite-bot-manager and test-logsmodule-v-zisko, to deliver a Windows executable capable of harvesting Discord credentials, […]
The post Malicious npm Packages Posing as Solara Executor Target Discord, Browsers, and Crypto Wallets appeared first on Cyber Security News.
Bulletproof-хостинги — ВСЁ. Нидерланды будут изымать серверы, замеченные в обслуживании злоумышленников
9 块 9 交个朋友,字节的 ArkClaw 可能更适合普通人 |AI 上新
GlassWorm Campaign Uses 72 Malicious Open VSX Extensions to Broaden Reach
In a major escalation of supply chain attacks, the GlassWorm malware campaign has evolved to infect developer environments using transitive dependencies. On March 13, 2026, the Socket Research Team reported identifying at least 72 new malicious Open VSX extensions linked to this campaign. Instead of placing the malicious payload directly into an initial extension, threat […]
The post GlassWorm Campaign Uses 72 Malicious Open VSX Extensions to Broaden Reach appeared first on Cyber Security News.
Bug Bounty Reconnaissance Framework: help you coordinate your reconnaissance workflows across multiple devices
Bug Bounty Reconnaissance Framework The Bug Bounty Reconnaissance Framework (BBRF) can be used to coordinate your reconnaissance workflows
The post Bug Bounty Reconnaissance Framework: help you coordinate your reconnaissance workflows across multiple devices appeared first on Penetration Testing Tools.
Sloppy but Swift: How Hive0163’s AI-Generated “Slopoly” Malware is Reshaping Ransomware
According to a report promulgated by IBM, ransomware syndicates have commenced experimenting with artificial intelligence. Specialists have unearthed
The post Sloppy but Swift: How Hive0163’s AI-Generated “Slopoly” Malware is Reshaping Ransomware appeared first on Penetration Testing Tools.
The Epstein Files Breach: How an FBI “Human Error” Let a Hacker Into the Vault
An enigmatic foreign hacker successfully infiltrated a United States Federal Bureau of Investigation server, gaining access to sensitive
The post The Epstein Files Breach: How an FBI “Human Error” Let a Hacker Into the Vault appeared first on Penetration Testing Tools.
Echoes of Xagent: How the Sednit Collective is Weaponizing Legacy Code for 2026 Espionage
The Sednit collective, renowned for a series of high-profile cyber-espionage incursions in preceding years, has once again resurfaced,
The post Echoes of Xagent: How the Sednit Collective is Weaponizing Legacy Code for 2026 Espionage appeared first on Penetration Testing Tools.
The Silent Hijack: How AI-Powered Android Trojans Are Intercepting Real-Time Payments
A diverse array of nascent Android malware lineages has emerged, aggressively pursuing user financial assets, banking applications, and
The post The Silent Hijack: How AI-Powered Android Trojans Are Intercepting Real-Time Payments appeared first on Penetration Testing Tools.
The Invisible Thread: Inside the Multi-Stage Python Injection Powering VioletRAT
Security vanguards at SonicWall have unmasked a nascent campaign disseminating the VioletRAT malware. This offensive orchestrates a multi-tiered
The post The Invisible Thread: Inside the Multi-Stage Python Injection Powering VioletRAT appeared first on Penetration Testing Tools.
The Kill Switch: How Handala Hacked Microsoft Intune to Wipe 200,000 Stryker Devices
The workday at the Irish headquarters of medical equipment titan Stryker culminated with jarring abruptness. Over 5,000 employees
The post The Kill Switch: How Handala Hacked Microsoft Intune to Wipe 200,000 Stryker Devices appeared first on Penetration Testing Tools.