Aggregator
A Browser Extension Risk Guide After the ShadyPanda Campaign
New Clickfix Attack Exploits finger.exe Tool to Trick Users into Execute Malicious Code
A novel social engineering campaign, dubbed ClickFix, has been identified, which cleverly employs an old Windows command-line tool, finger.exe, to install malware on victims’ systems. This attack begins with a deceptive CAPTCHA verification page, tricking users into running a script that initiates the infection process. The technique has been in use since at least November […]
The post New Clickfix Attack Exploits finger.exe Tool to Trick Users into Execute Malicious Code appeared first on Cyber Security News.
CVE-2025-11670 | Zoho ManageEngine ADManager Plus up to 8024 NTLM Hash information disclosure (EUVD-2025-203359)
Закон Мура устал, но выход есть. В США представили первый коммерческий 3D чип
CVE-2025-37731 | Elastic Elasticsearch up to 7.17.29/8.19.7/9.1.7/9.2.1 PKI Realm improper authentication (EUVD-2025-203360)
CVE-2025-14714 | LibreOffice up to 25.2.3 on macOS authentication bypass (EUVD-2025-203361 / WID-SEC-2025-2845)
U.S. fintech and data services firm 700Credit suffered a data breach impacting at least 5.6 million people
Coupang CEO Steps Down After Data Breach Hits 33.7 Million Users
Asahi to Launch Cybersecurity Overhaul After Crippling Cyber-Attack
French Interior Ministry confirms cyberattack on email servers
看点揭晓 | Agent全生命周期安全如何打造?
【安全圈】19 款 Visual Studio Code 扩展中发现恶意软件
【安全圈】美国华盛顿州大型县图书馆遭网络攻击,超34万人受影响
【安全圈】航天骨干炒股亏空向间谍泄密获刑 !
Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)
Apple has issued security updates with fixes for two WebKit vulnerabilities (CVE-2025-14174, CVE-2025-43529) that have been exploited as zero-days. Several days before the release of these updates, Google fixed CVE-2025-14174 in the desktop version of Chrome, though at the time the issue did not have a CVE number nor a description. In the meantime, CVE-2025-14174 was revealed to be an “out of bounds memory access [flaw] in ANGLE in Google Chrome on Mac prior to … More →
The post Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529) appeared first on Help Net Security.
LW ROUNDTABLE: Part 3, Cyber resilience faltered in 2025 — recalibration now under way
This is the third installment in our four-part 2025 Year-End Roundtable. In Part One, we explored how accountability got personal. In Part Two, we examined how regulatory mandates clashed with operational complexity.
Part three of a four-part series.Now … (more…)
The post LW ROUNDTABLE: Part 3, Cyber resilience faltered in 2025 — recalibration now under way first appeared on The Last Watchdog.
The post LW ROUNDTABLE: Part 3, Cyber resilience faltered in 2025 — recalibration now under way appeared first on Security Boulevard.
Маскировка вместо Tor: stillepost или как превратить Chrome в невидимый прокси, который не боится фаерволов
Pear
You must login to view this content
Shannon – AI Pentesting Tool that Autonomously Checks for Code Vulnerabilities and Executes Real Exploits
Shannon is a fully autonomous AI pentesting tool for web applications that identifies attack vectors via code analysis and validates them with live browser exploits. Unlike traditional static analysis tools that merely flag potential issues, Shannon operates as a fully autonomous penetration tester that identifies attack vectors and actively executes real-world exploits to validate them. […]
The post Shannon – AI Pentesting Tool that Autonomously Checks for Code Vulnerabilities and Executes Real Exploits appeared first on Cyber Security News.