Aggregator
CVE-2025-6967 | Sarman CMS up to 10022026 Technology Service redirect
APT36 Hacker Group Attacking Linux Systems with New Tools to Disturb Services
APT36, also known as Transparent Tribe, has escalated its espionage campaigns against Indian defense and government targets with cross-platform malware, including new Linux tools. Aryaka Threat Research Labs detailed these attacks in a recent report, highlighting stealthy RATs designed for persistence and data theft. Transparent Tribe (APT36) and linked SideCopy actors rely on spear-phishing with […]
The post APT36 Hacker Group Attacking Linux Systems with New Tools to Disturb Services appeared first on Cyber Security News.
BloodHound Scentry helps organizations reduce identity risk and close attack paths
SpecterOps has announced BloodHound Scentry, a new service designed to help customers accelerate their APM practice and reduce identity risk. BloodHound Scentry combines the power of BloodHound Enterprise with SpecterOps tradecraft experts and practitioners to provide customers with tailored guidance for attack path remediation, advanced analysis for emerging threats, and privilege zone design to protect critical assets. The 2024 Verizon Data Breach Investigations Report found that around 80% of breaches involve compromised identity credentials, highlighting … More →
The post BloodHound Scentry helps organizations reduce identity risk and close attack paths appeared first on Help Net Security.
CVE-2026-24427 | Tenda AC7 up to 03.03.03.01_cn Web Management Interface insertion of sensitive information into sent data
CVE-2026-24426 | Tenda AC7 up to 03.03.03.01_cn Web Management Interface cross site scripting
CVE-2026-24441 | Tenda AC7 up to 03.03.03.01_cn cleartext transmission (EUVD-2026-5164)
CVE-2026-24434 | Tenda AC7 up to 03.03.03.01_cn cross-site request forgery (EUVD-2026-5154)
CVE-2025-67186 | TOTOLINK A950RG 4.1.2cu.5204_B20210112 Firewall.so seturlFilterRules url buffer overflow
CVE-2025-67188 | TOTOLINK A950RG 4.1.2cu.5204_B20210112 ipv6.so radvdinterfacename stack-based overflow
CVE-2025-67187 | TOTOLINK A950RG 4.1.2cu.5204_B20210112 Firewall.so setIpQosRules Comment stack-based overflow
CVE-2025-71179 | Creativeitem Academy LMS 7.0 /academy/blogs cross site scripting (EDB-51654)
CVE-2026-2116 | itsourcecode Society Management System 1.0 /admin/edit_expenses.php expenses_id sql injection (CNNVD-202602-1246)
CVE-2026-2117 | itsourcecode Society Management System 1.0 /admin/edit_activity.php activity_id sql injection (CNNVD-202602-1245)
CVE-2026-2089 | SourceCodester Online Class Record System 1.0 controller.php ID sql injection (EUVD-2026-5724)
CVE-2026-2090 | SourceCodester Online Class Record System 1.0 search.php term sql injection (EUVD-2026-5723)
Trojanized 7-Zip downloads turn home computers into proxy nodes
A trojanized version of the popular 7-Zip software is quietly turning home computers into residential proxy nodes, Malwarebytes warns. Spurred by a Reddit post in which a user complained about getting infected with malware after downloading 7-Zip from 7zip[.]com instead of the legitimate 7-zip.org, Malwarebytes researchers looked into the matter and found that the malicious installer functions as 7-zip, but also silently drops additional payloads onto the system. Further analysis showed the malware’s primary role … More →
The post Trojanized 7-Zip downloads turn home computers into proxy nodes appeared first on Help Net Security.
Germany warns of state-linked phishing campaign targeting journalists, government officials
Armis Centrix brings unified, AI-driven application security to the SDLC
Armis has announced Armis Centrix for Application Security, which unifies application security across an organization’s software development lifecycle. The technology helps security teams secure code as a next-generation attack vector to fortify organizations’ defenses and protect against cyber threats. “To effectively manage risk, it’s essential to get to the root cause of the problem and weed it out,” said Nadir Izrael, CTO of Armis. “Code-based vulnerabilities are being embedded into organizational infrastructure, and AI-generated code … More →
The post Armis Centrix brings unified, AI-driven application security to the SDLC appeared first on Help Net Security.