Aggregator
お知らせ:JPCERT/CC インターネット定点観測レポート[2025年7月1日~2025年9月30日]
お知らせ:JPCERT/CC インターネット定点観測レポート[2025年10月1日~2025年12月31日]
Некроманты из Кремниевой долины: почему Grammarly решила, что мертвые ученые — лучшие советчики
ZDI-CAN-28935: MSI
From CVE to Kill Chain: Visualize Your Threat Landscape with the Open Source CVE2CAPEC Tool
CVE2CAPEC CVE2CAPEC is a free and open source MITRE ATT&CK Navigator generator. Give it a list of CVEs,
The post From CVE to Kill Chain: Visualize Your Threat Landscape with the Open Source CVE2CAPEC Tool appeared first on Penetration Testing Tools.
2023 год — дело Эпштейна, 2025 год — системы прослушки. Хронология инцидентов показывает, что даже ФБР остается уязвимой целью
The “GitHub-io” Trap: How BoryptGrab Uses SEO Lures and SSH Tunnels to Hijack Your PC
A nascent strain of malicious software is proliferating beneath the guise of game enhancements and illicitly cracked iterations
The post The “GitHub-io” Trap: How BoryptGrab Uses SEO Lures and SSH Tunnels to Hijack Your PC appeared first on Penetration Testing Tools.
Badge for Sale: How Hackers are Using Hijacked Police Portals to Steal Your Private Data
A particularly insidious commodity has surfaced upon clandestine subterranean forums: unfettered access to the verified electronic mail repositories
The post Badge for Sale: How Hackers are Using Hijacked Police Portals to Steal Your Private Data appeared first on Penetration Testing Tools.
Digital Aftershocks: How “Operation Epic Fury” Ignited a Global Hacktivist Firestorm Across 16 Nations
The kinetic military bombardment of Iran functioned as a near-instantaneous catalyst for a secondary, devastating shockwave—this time, manifesting
The post Digital Aftershocks: How “Operation Epic Fury” Ignited a Global Hacktivist Firestorm Across 16 Nations appeared first on Penetration Testing Tools.
Medusa Blog
You must login to view this content
The Copilot Cage: Why Microsoft is Trapping Your Web Links Inside Its New AI Sidebar
Microsoft has resolved to prevent Copilot patrons from escaping to their customary browsers. In the nascent test iteration,
The post The Copilot Cage: Why Microsoft is Trapping Your Web Links Inside Its New AI Sidebar appeared first on Penetration Testing Tools.
The Root of the Backbone: Unmasking the Critical Flaw in Juniper’s PTX Core Routers
A critical vulnerability, chronicled as CVE-2026-21902, has been unearthed within Juniper PTX routers anchored by the Junos OS
The post The Root of the Backbone: Unmasking the Critical Flaw in Juniper’s PTX Core Routers appeared first on Penetration Testing Tools.
The Silent Script: How a “Slumbering” Worm Paralyzed Wikimedia and Defaced Meta-Wiki
The Wikimedia Foundation endured a profoundly distressing day. A self-propagating JavaScript worm was triggered across Wikimedia projects, commencing
The post The Silent Script: How a “Slumbering” Worm Paralyzed Wikimedia and Defaced Meta-Wiki appeared first on Penetration Testing Tools.
Breaking the Encryption Trend: Why TikTok is Saying “No” to End-to-End Private Messaging
TikTok has definitively eschewed the implementation of end-to-end encryption for direct messaging, citing profound security imperatives as the
The post Breaking the Encryption Trend: Why TikTok is Saying “No” to End-to-End Private Messaging appeared first on Penetration Testing Tools.
Zero Tolerance for Malicious Intrusions—NSFOCUS’s Full-Chain WEB Security Protection System
As regional military conflicts escalate, cyberspace has become a critical battleground, with core WEB application systems frequently targeted by adversaries. Attackers tamper with application content and inject anti-social or anti-government rhetoric, disrupting cyberspace order and inciting public panic, severely damaging institutional credibility. WEB services serve as key platforms for information dissemination and core operations across […]
The post Zero Tolerance for Malicious Intrusions—NSFOCUS’s Full-Chain WEB Security Protection System appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..
The post Zero Tolerance for Malicious Intrusions—NSFOCUS’s Full-Chain WEB Security Protection System appeared first on Security Boulevard.
新窃密技术预警:现代光学鼠标窃密
Breaking the Monopoly: Google Unveils Radical Play Store Overhaul and “Registered App Stores” Program
Google has heralded sweeping metamorphoses within the Android ecosystem and the regulatory framework of the Google Play emporium.
The post Breaking the Monopoly: Google Unveils Radical Play Store Overhaul and “Registered App Stores” Program appeared first on Penetration Testing Tools.
The Fall of a Giant: How Taiwan and the US Dismantled the Prince Group’s Global Fraud Empire
Taiwanese prosecutors have dismantled a colossal cyber-fraud syndicate inextricably linked to the Prince Group enterprise. The sweeping investigation
The post The Fall of a Giant: How Taiwan and the US Dismantled the Prince Group’s Global Fraud Empire appeared first on Penetration Testing Tools.
The SYSTEM Sovereignty: How Three “Antiviral” Flaws in Avira Grant Total Windows Control
Within the architecture of Avira Internet Security, researchers have unearthed a formidable triad of vulnerabilities embedded in modules
The post The SYSTEM Sovereignty: How Three “Antiviral” Flaws in Avira Grant Total Windows Control appeared first on Penetration Testing Tools.