Aggregator
MITRE Unveils AADAPT: A New Cybersecurity Framework to Combat Digital Asset Threats
MITRE has unveiled a new cybersecurity framework titled AAD APT (Adversarial Actions in Digital Asset Payment Technologies), specifically designed to counter vulnerabilities within digital financial systems, including cryptocurrencies. This initiative extends the principles established...
The post MITRE Unveils AADAPT: A New Cybersecurity Framework to Combat Digital Asset Threats appeared first on Penetration Testing Tools.
Они объединили четыре элемента таблицы Менделеева — и создали нечто, что может изменить квантовую эпоху
The Password Crisis: 98.5% of Corporate Passwords Are Insecure, Leaving Networks Vulnerable
In a recent analysis based on the examination of 10 million real-world compromised passwords, researchers at Specops have laid bare the ongoing vulnerability of corporate networks stemming from human error. The passwords were drawn...
The post The Password Crisis: 98.5% of Corporate Passwords Are Insecure, Leaving Networks Vulnerable appeared first on Penetration Testing Tools.
CVE-2025-41237
CVE-2025-47812
Meta AI Chatbot Exposed: Critical Flaw Leaked Private Prompts and Responses
Meta has addressed a security vulnerability in its Meta AI chatbot that allowed users to access private prompts and AI-generated responses intended for other individuals. The issue was responsibly disclosed by security researcher Sandeep...
The post Meta AI Chatbot Exposed: Critical Flaw Leaked Private Prompts and Responses appeared first on Penetration Testing Tools.
Konfety Malware Evolves: New Android Variant Uses Malformed ZIPs & Encrypted Code to Evade Detection
The latest iteration of the Android malware known as Konfety has grown even more insidious. Researchers at Zimperium zLabs have uncovered a refined variant that employs unconventional ZIP archive structures and encrypted, runtime-loaded code....
The post Konfety Malware Evolves: New Android Variant Uses Malformed ZIPs & Encrypted Code to Evade Detection appeared first on Penetration Testing Tools.
Abacus Market Vanishes: Was it a $300M+ Crypto Exit Scam or Covert Law Enforcement Takedown?
Abacus Market, once the largest Western darknet marketplace supporting Bitcoin transactions, has vanished from the internet without warning. All signs suggest a classic “exit scam,” where platform administrators abscond with users’ funds. An alternative...
The post Abacus Market Vanishes: Was it a $300M+ Crypto Exit Scam or Covert Law Enforcement Takedown? appeared first on Penetration Testing Tools.
UNFI 重大网络攻击事件预计损失高达 4 亿美元
GLOBAL GROUP: AI-Powered Ransomware Threatens Global Critical Infrastructure
A cybercriminal collective has launched a new Ransomware-as-a-Service (RaaS) platform known as GLOBAL GROUP, actively targeting organizations across Australia, Brazil, Europe, and the United States since early June 2025. According to EclecticIQ, the operation...
The post GLOBAL GROUP: AI-Powered Ransomware Threatens Global Critical Infrastructure appeared first on Penetration Testing Tools.
HazyBeacon: New Windows Backdoor Uses AWS Lambda for Stealthy Cyber-Espionage in Southeast Asia
Government institutions across Southeast Asia have found themselves at the center of a new cyber-espionage campaign aimed at harvesting sensitive information through a previously unknown Windows malware tool known as HazyBeacon. Tracked by Palo...
The post HazyBeacon: New Windows Backdoor Uses AWS Lambda for Stealthy Cyber-Espionage in Southeast Asia appeared first on Penetration Testing Tools.
AsyncRAT’s Dark Evolution: How Open-Source Code Fuels a Growing Malware Empire
AsyncRAT, first introduced on GitHub in January 2019, has evolved into one of the most formidable tools in the cybercriminal arsenal. Its open-source architecture, written in C#, has laid the foundation for a multitude...
The post AsyncRAT’s Dark Evolution: How Open-Source Code Fuels a Growing Malware Empire appeared first on Penetration Testing Tools.
英国零售巨头 Co-op 证实 650 万会员数据在网络攻击中被盗
Ex-US Army Soldier “kiberphant0m” Pleads Guilty to $1M Telecom Hacking & Extortion
A former U.S. Army servicemember has pleaded guilty to orchestrating an extensive scheme involving the hacking of telecommunications companies, extortion, and the sale of stolen data. Cameron John Wagenius, 21, who last served in...
The post Ex-US Army Soldier “kiberphant0m” Pleads Guilty to $1M Telecom Hacking & Extortion appeared first on Penetration Testing Tools.
Cloudflare Q2 2025: DDoS Attack Volume Drops, But Hyper-Volumetric Assaults Skyrocket
Cloudflare recorded a dramatic decline in the number of DDoS attacks during the second quarter of 2025, mitigating 7.3 million incidents—down sharply from the 20.5 million reported in the first quarter. However, despite the...
The post Cloudflare Q2 2025: DDoS Attack Volume Drops, But Hyper-Volumetric Assaults Skyrocket appeared first on Penetration Testing Tools.
Hidden in Plain Sight: Hackers Conceal Malware and AI Prompts in DNS Records
Hackers have devised a method to conceal malware in places where detection is nearly impossible—in DNS records that map domain names to IP addresses. This technique enables the delivery of malicious binaries without relying...
The post Hidden in Plain Sight: Hackers Conceal Malware and AI Prompts in DNS Records appeared first on Penetration Testing Tools.