Aggregator
DuckDuckGo enables AI voice chat without saving voice data
DuckDuckGo has added voice chat to Duck.ai, allowing users to speak to an AI assistant while keeping audio private, unrecorded, and excluded from AI training. Voice chat is available in the DuckDuckGo browser and most third-party browsers, with support for Mozilla listed as coming soon. According to the company’s help page, “DuckDuckGo limits access to audio streams and voice data so they are available only to OpenAI, the model provider for voice chats, and only … More →
The post DuckDuckGo enables AI voice chat without saving voice data appeared first on Help Net Security.
CVE-2025-11242 | Teknolist Okulistik up to 21102025 server-side request forgery
YouTube Music 限制免费用户查看歌词
European Governments Breached in Zero-Day Attacks Targeting Ivanti
Open Source, Open Access: 5 Million Servers Expose Critical Git Metadata and Credentials
Approximately five million web servers globally have been identified as misconfigured, exposing sensitive Git administrative metadata and precipitating
The post Open Source, Open Access: 5 Million Servers Expose Critical Git Metadata and Credentials appeared first on Penetration Testing Tools.
黑客利用 SolarWinds WHD 漏洞部署数字取证与应急响应工具并实施攻击
塞内加尔证实国家身份证部门遭勒索软件入侵
Virtual Sabotage: How Attackers Weaponized SolarWinds Help Desks to Hide Malware Inside QEMU
The Microsoft Defender threat intelligence team has documented a series of substantiated offensives targeting internet-facing SolarWinds Web Help
The post Virtual Sabotage: How Attackers Weaponized SolarWinds Help Desks to Hide Malware Inside QEMU appeared first on Penetration Testing Tools.
Digital Siege: The “Pre-Positioning” Strategy Fueling 2.6 Million Daily Attacks on Taiwan
In 2025, adversarial syndicates orchestrated a global offensive spanning 178 nations, primarily preying upon governmental architectures, financial institutions,
The post Digital Siege: The “Pre-Positioning” Strategy Fueling 2.6 Million Daily Attacks on Taiwan appeared first on Penetration Testing Tools.
Phishing for Fortunes: APT-C-28 Unveils “MiradorShell” in Surgical Strikes on Web3 Teams
The adversarial collective APT-C-28, recognized alternatively as ScarCruft or Konni, has broadened its operational horizons by orchestrating surgical
The post Phishing for Fortunes: APT-C-28 Unveils “MiradorShell” in Surgical Strikes on Web3 Teams appeared first on Penetration Testing Tools.
Surgical Strike on DeFi: How Hijacked dYdX Packages Drained Wallets via npm and PyPI
Security analysts at Socket have unmasked a surgical supply chain incursion targeting the libraries associated with the dYdX
The post Surgical Strike on DeFi: How Hijacked dYdX Packages Drained Wallets via npm and PyPI appeared first on Penetration Testing Tools.
警惕!约10%OpenClaw Skills被投毒,微步云沙箱S已上线AI滥用检测
Root via DDNS: The Multi-Stage Exploit Dissecting the TP-Link Omada ER605
A critical vulnerability chain has been unearthed within the TP-Link Omada ER605 router, facilitating unauthenticated remote code execution.
The post Root via DDNS: The Multi-Stage Exploit Dissecting the TP-Link Omada ER605 appeared first on Penetration Testing Tools.
Нефть течет, а сайт – нет. Хакеры решили проверить на прочность трубопроводы Румынии
Lens on Liability: Flickr Warns 35 Million Users of Data Exposure via Third-Party Email Leak
The ubiquitous photo-hosting platform Flickr has disseminated notifications to its clientele regarding a potential data breach precipitated by
The post Lens on Liability: Flickr Warns 35 Million Users of Data Exposure via Third-Party Email Leak appeared first on Penetration Testing Tools.
Shadows in the Server: How the Warlock Group Weaponized a “Forgotten” VM to Breach SmarterTools
SmarterTools has disclosed a comprehensive retrospective regarding a recent infiltration of its infrastructure, meticulously delineating the adversaries’ entry
The post Shadows in the Server: How the Warlock Group Weaponized a “Forgotten” VM to Breach SmarterTools appeared first on Penetration Testing Tools.
Sleeper Agents in the Weights: Microsoft’s New Scanner Unmasks Hidden Backdoors in Open-Weight LLMs
Microsoft has disseminated a nascent technical treatise regarding the detection of backdoors within open-weight Large Language Models (LLMs)—specifically
The post Sleeper Agents in the Weights: Microsoft’s New Scanner Unmasks Hidden Backdoors in Open-Weight LLMs appeared first on Penetration Testing Tools.