Aggregator
CVE-2025-54567 | QEMU up to 10.0.3 VF Enable Bit write Mask hw/pci/pcie_sriov.c incorrect provision of specified functionality (Nessus ID 254417 / WID-SEC-2025-1644)
Unmasked by a Blunder: Chinese Hackers Exposed in Massive Vietnam Espionage Campaign
Researchers from Ctrl-Alt-Int3l have published a detailed analysis of a large-scale operation targeting Vietnamese universities. Their investigation was made possible thanks to open directories where attackers, through a critical oversight, had left behind a...
The post Unmasked by a Blunder: Chinese Hackers Exposed in Massive Vietnam Espionage Campaign appeared first on Penetration Testing Tools.
Trust Betrayed: A Malicious Go Package Is a Brute-Force Tool and a Data Thief
Experts at Socket have uncovered a malicious Go package named golang-random-ip-ssh-bruteforce, which masquerades as a tool for brute-forcing SSH credentials but in reality exfiltrates them to its author via Telegram. The module’s logic is...
The post Trust Betrayed: A Malicious Go Package Is a Brute-Force Tool and a Data Thief appeared first on Penetration Testing Tools.
Security Culture: When Are We Really Creating Change? with Marisa Fagan
Beyond the Breach: A New Malware-as-a-Service Campaign Deploys Stealthy Payloads
A new campaign has been observed within the malware-as-a-service (MaaS) ecosystem, where attackers employ a multi-stage delivery chain using PowerShell scripts hosted on external web servers. This technique conceals the final executables, delays investigations,...
The post Beyond the Breach: A New Malware-as-a-Service Campaign Deploys Stealthy Payloads appeared first on Penetration Testing Tools.
APT-C-08 Expands Its Arsenal with a Stealthy New Remote Access Trojan
The hacking collective APT-C-08, also known as TA397 and Bitter, continues to expand its cyber arsenal. Chinese researchers have uncovered a new malicious component belonging to the family of remote access trojans, previously unseen...
The post APT-C-08 Expands Its Arsenal with a Stealthy New Remote Access Trojan appeared first on Penetration Testing Tools.
诚邀渠道合作伙伴共启新征程
远控服务器孕育Node.js恶意脚本,依托以太坊完成远程操控
诚邀渠道合作伙伴共启新征程
远控服务器孕育Node.js恶意脚本,依托以太坊完成远程操控
APT36 Launches New Cyber-Espionage Campaign on Indian Govt
APT36, also known as Transparent Tribe, has launched a new espionage campaign targeting government and defense institutions in India. This Pakistan-linked group, active since at least 2013, has long relied on phishing campaigns and...
The post APT36 Launches New Cyber-Espionage Campaign on Indian Govt appeared first on Penetration Testing Tools.
A Single Photo Can Hijack Your Apple Device: Inside a Critical 0-Click Exploit
The recent vulnerability in Apple’s ecosystem — CVE-2025-43300 — has emerged as one of the most dangerous threats to the company’s users. The flaw was identified in the RawCamera.bundle module, responsible for handling Adobe’s...
The post A Single Photo Can Hijack Your Apple Device: Inside a Critical 0-Click Exploit appeared first on Penetration Testing Tools.
2025年中国数据安全企业全景图征集启动
Detection Engineering: Practicing Detection-as-Code – Documentation – Part 4
2025年中国数据安全企业全景图征集启动
A ‘Legal’ Department for a Ransomware Gang? Inside the Bizarre World of Qilin’s Extortion Tactics
The Qilin group, notorious for its ruthless methods of digital extortion, has announced the creation of a so-called “legal department.” The very phrase sounds paradoxical: can one truly speak of a legal mechanism within...
The post A ‘Legal’ Department for a Ransomware Gang? Inside the Bizarre World of Qilin’s Extortion Tactics appeared first on Penetration Testing Tools.
The Phantom Attack: A New NTLM Relay Method Evades EDR to Hijack Networks
Logan Goins, a researcher at SpecterOps, has unveiled a novel technique for exploiting NTLM authentication that enables adversaries to bypass low-level access restrictions in corporate networks and offload tool execution from an infected workstation....
The post The Phantom Attack: A New NTLM Relay Method Evades EDR to Hijack Networks appeared first on Penetration Testing Tools.
SpAIware: The Stealthy Attack That Hides Malware in Your AI’s Memory
In the Windsurf Cascade development environment, designed for AI-driven code automation and programmer assistance, a vulnerability has been uncovered, dubbed SpAIware. This flaw allows malicious commands to be implanted into the AI system, stored...
The post SpAIware: The Stealthy Attack That Hides Malware in Your AI’s Memory appeared first on Penetration Testing Tools.