Aggregator
CVE-2025-71264 | Mumble up to 1.6.869 out-of-bounds
CVE-2026-4255 | thermalright TR-VISION HOME up to 2.0.4 on Windows inclusion of functionality from untrusted control sphere (EUVD-2026-12363)
CVE-2025-52458 | OpenHarmony up to 5.1.0.x Pre-installed Apps out-of-bounds write (EUVD-2025-208681)
CVE-2025-41432 | OpenHarmony up to 5.1.0.x Pre-installed Apps out-of-bounds write
CVE-2025-25277 | OpenHarmony up to 5.1.0.x type confusion
CVE-2026-25083 | GROWI up to 7.4.5 OpenAI API Endpoint authorization
RSAC 2026创新沙盒 | Geordie AI:企业 AI Agent 安全治理体系的构建者
Manual Malice: How Handala Hack Weaponizes AI Wipers and NetBird for Rapid Network Annihilation
The Iranian syndicate designated “Handala Hack”—a collective inextricably intertwined with the Void Manticore cluster and the Iranian Ministry
The post Manual Malice: How Handala Hack Weaponizes AI Wipers and NetBird for Rapid Network Annihilation appeared first on Penetration Testing Tools.
CVE-2026-32775 | libexif up to 0.6.25 MakerNotes Decoder exif_mnote_data_get_value integer underflow (EUVD-2026-12345)
DiceCTF 2026 Quals - cornelslop: Turning an RCU Double Free into a Cross-Cache Kerel Exploit
The 30 Tbps Barrier: How AI-Powered Botnets Shattered DDoS Records in Late 2025
In the latter half of 2025, the globe endured in excess of 8 million DDoS incursions. Yet, beneath
The post The 30 Tbps Barrier: How AI-Powered Botnets Shattered DDoS Records in Late 2025 appeared first on Penetration Testing Tools.
Zero Hosting, Zero Setup: The Rise of the Browser-Native WordPress Revolution
WordPress has unveiled a novel paradigm for engaging with its platform: the my.WordPress.net service, an innovation that empowers
The post Zero Hosting, Zero Setup: The Rise of the Browser-Native WordPress Revolution appeared first on Penetration Testing Tools.
Google Looker Studio Vulnerabilities Allow Attackers to Exfiltrate Data from Google Services
A set of nine novel cross-tenant vulnerabilities in Google Looker Studio, collectively dubbed “LeakyLooker,” that could have allowed attackers to run arbitrary SQL queries, exfiltrate sensitive data, and even modify or delete records across Google Cloud environments, all without victims granting explicit permission. Google has since fully remediated all identified issues following responsible disclosure. Google […]
The post Google Looker Studio Vulnerabilities Allow Attackers to Exfiltrate Data from Google Services appeared first on Cyber Security News.
Привет, мир и прощай, зарплата. Одна команда в консоли лишает разработчика всех уровней доступа
45,000 malicious IP addresses taken down, 94 suspects arrested
An international law enforcement operation has taken down more than 45,000 malicious IP addresses and servers linked to phishing, malware, and ransomware activity. The action was carried out as part of Operation Synergia III, an investigation that ran from July 18, 2025 to January 31, 2026. According to INTERPOL, the operation resulted in 94 arrests, while 110 additional suspects remain under investigation. Authorities also seized 212 electronic devices and servers linked to the criminal networks. … More →
The post 45,000 malicious IP addresses taken down, 94 suspects arrested appeared first on Help Net Security.
JSOC IT’s AUTOPSY platform puts security stacks under live API verification
JSOC IT has announced the launch of AUTOPSY, a security verification platform that investigates an organization’s security stack through live API integrations before a breach occurs, rather than after one forces the conversation. The platform’s flagship product, READY, is a security assessment that replaces self-reported questionnaires with API-verified telemetry across an organization’s security stack, including endpoint detection, identity and access management, backup and recovery, vulnerability management, and more than 24 integrated security platforms. The launch … More →
The post JSOC IT’s AUTOPSY platform puts security stacks under live API verification appeared first on Help Net Security.