Aggregator
The Zero-Click Ghost: How an Incomplete Patch Left Windows Open to Fancy Bear’s Credential Theft
An oversight within a security remediation has inadvertently carved a novel path for exploitation. While the developers successfully
The post The Zero-Click Ghost: How an Incomplete Patch Left Windows Open to Fancy Bear’s Credential Theft appeared first on Penetration Testing Tools.
CVE-2026-7214 | eghuzefa engineer-your-data up to 0.1.3 src/server.py read_file/write_file/list_files/file_inf WORKSPACE_PATH path traversal
Легальный сайт не открылся? А виновата «защита». Как сервисы операторов фильтруют трафик и где грань между безопасностью и цензурой
Italy extradites alleged Chinese state hacker to US
The “Unpatchable” Ghost: How PhantomRPC Turns Windows Architecture Against Itself for SYSTEM Control
Security researchers at Kaspersky Lab have identified a surreptitious methodology within Windows to obtain absolute systemic hegemony—a vulnerability
The post The “Unpatchable” Ghost: How PhantomRPC Turns Windows Architecture Against Itself for SYSTEM Control appeared first on Penetration Testing Tools.
CVE-2026-30350 | aegra Agent Protocol Server /store/items/search denial of service
Critical Gemini CLI Vulnerability Enables Remote Code Execution Attacks
Google has fixed a critical security flaw in the Gemini CLI that could allow attackers to execute remote code in certain automated workflows. The issue affects the npm package @google/gemini-cli and the google-github-actions/run-gemini-cli GitHub Action, especially when they are used in headless environments such as CI/CD pipelines. According to the security advisory, the vulnerability comes from two related weaknesses: […]
The post Critical Gemini CLI Vulnerability Enables Remote Code Execution Attacks appeared first on Cyber Security News.
CVE-2026-32688 | elixir-plug plug_cowboy up to 2.8.0 lib/plug/cowboy/conn.ex allocation of resources (GHSA-q8x4-x7mp-5vg2)
CVE-2026-6357 | pip up to 26.0 Self-update Check Local Privilege Escalation
CVE-2026-40514 | SmarterTools SmarterMail up to 100.0.9609 Attachment Download Endpoint weak prng
CVE-2026-7213 | ef10007 MLOps_MCP 1.0.0 save_file Tool fastmcp_server.py filename/destination path traversal
Hidden in the Cloud: Harvester’s New Linux Malware Abuses Microsoft Graph API for Invisible Espionage
The Harvester threat collective has re-emerged, wielding a sophisticated instrument designed to elude conventional defensive parameters. Security researchers
The post Hidden in the Cloud: Harvester’s New Linux Malware Abuses Microsoft Graph API for Invisible Espionage appeared first on Penetration Testing Tools.