Aggregator
微软MSRC的漏洞情报“剽窃”策略
CVE-2006-0002 | Microsoft Outlook 2000/2002/2003 TNEF MIME Attachment integer coercion (MS06-003 / VU#252146)
CVE-2006-0002 | Microsoft Exchange 5/5.5/2000 Email NEF MIME Attachment memory corruption (MS06-003 / VU#252146)
CVE-2006-0005 | Microsoft Windows 2000/Server 2003/XP Media Player EMBED Tag memory corruption (MS06-006 / VU#692060)
CVE-2006-0004 | Microsoft PowerPoint 2000 HTML Rendering information disclosure (MS06-010 / VU#963628)
CVE-2006-0003 | Microsoft Data Access Components 2.7 memory corruption (VU#234812 / EDB-2052)
CVE-2006-0006 | Microsoft Windows up to 10 Media Player BMP Image memory corruption (MS06-005 / VU#291396)
CVE-2006-0033 | Microsoft Office 2000/2003/Xp memory corruption (VU#459388 / Nessus ID 22033)
CVE-2014-8810 | WP Symposium up to 14.9 tray sql injection (EDB-35505 / SA62643)
1969 объявил войну 2025-му. Telnet против TikTok
Companies negotiate their way to lower ransom payments
Nearly 50% of companies paid the ransom to recover their data, the second-highest rate in six years, according to Sophos. How actual payments stack up with the initial demand Ransom payments and recovery costs are on the decline Despite the high percentage of companies that paid the ransom, 53% paid less than the original demand. In 71% of cases where the companies paid less, they did so through negotiation, either through their own negotiations or … More →
The post Companies negotiate their way to lower ransom payments appeared first on Help Net Security.
马里兰大学 | 对俄罗斯中转网络审查的全面理解
CVE-2009-4651 | Onnogroen Com Webeecomment 2.0 cross site scripting (EDB-33638 / BID-38204)
Hollowise: New Windows Tool Enables Stealthy Code Execution via Process Hollowing & PPID Spoofing
Hollowise is a Windows-based tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques. It allows for stealth execution of debuggers and code and network analizers by replacing the memory of a suspended process (e.g. calc.exe) with...
The post Hollowise: New Windows Tool Enables Stealthy Code Execution via Process Hollowing & PPID Spoofing appeared first on Penetration Testing Tools.
APT36 Unleashes Advanced Phishing Against Indian Defense Personnel: New Anti-Analysis Malware & NIC Impersonation
The Pakistani cyber-espionage group APT36, also known as Transparent Tribe, has launched a sophisticated new phishing campaign targeting personnel within India’s defense sector. Experts at CYFIRMA have uncovered that the threat actors are employing...
The post APT36 Unleashes Advanced Phishing Against Indian Defense Personnel: New Anti-Analysis Malware & NIC Impersonation appeared first on Penetration Testing Tools.
CVE-2018-7316 | Proclaim 9.1.1 on Joomla File Upload mediafileform unrestricted upload (EDB-44164)
RapperBot Unleashed: Sophisticated Mirai Variant Targets DVRs, Launches HTTPS DDoS Attacks
At the international Botconf conference held in May 2025 in Angers, France, experts from NICT CSRI unveiled the findings of their three-year investigation into the RapperBot malware. Their conclusions were alarming: this evolved variant...
The post RapperBot Unleashed: Sophisticated Mirai Variant Targets DVRs, Launches HTTPS DDoS Attacks appeared first on Penetration Testing Tools.
“Echo Chamber” Attack Uncovered: New Jailbreak Bypasses LLM Safeguards with Subtle Context Manipulation
Experts at NeuralTrust have reported a newly identified and dangerous method of bypassing neural network safeguards, dubbed Echo Chamber. This technique enables bad actors to subtly coax large language models (LLMs)—such as ChatGPT and...
The post “Echo Chamber” Attack Uncovered: New Jailbreak Bypasses LLM Safeguards with Subtle Context Manipulation appeared first on Penetration Testing Tools.
UK Retail Cyberattacks Cost Up to £440M: Cyber Monitoring Centre Unveils First Damage Assessment
The British Cyber Monitoring Centre (CMC) has released its first official assessment of the damage caused by recent cyberattacks that disrupted major retail chains across the country. According to estimates, total financial losses range...
The post UK Retail Cyberattacks Cost Up to £440M: Cyber Monitoring Centre Unveils First Damage Assessment appeared first on Penetration Testing Tools.