Aggregator
Critical Flaw in Wix’s Base44 AI Platform Allowed Access to Private Enterprise Apps
Base44, a widely used platform for AI-assisted application development, was recently found to be critically vulnerable due to a glaring misconfiguration in its authentication system. The flaw allowed malicious actors to gain unrestricted access...
The post Critical Flaw in Wix’s Base44 AI Platform Allowed Access to Private Enterprise Apps appeared first on Penetration Testing Tools.
Linux Kernel 6.16 Released: Packed with Performance Boosts, New Features, and Core Improvements
This past weekend marked the release of the final version of the Linux 6.16 kernel, traditionally announced by Linus Torvalds himself. The development process was calm and steady, though it lacked headline-grabbing features—making the...
The post Linux Kernel 6.16 Released: Packed with Performance Boosts, New Features, and Core Improvements appeared first on Penetration Testing Tools.
Silver Fox Hackers Using Weaponized Google Translate Tools to Deploy Windows Malware
A sophisticated malware campaign has emerged targeting unsuspecting users through weaponized versions of popular online tools, particularly Google Translate interfaces. The Silver Fox threat actors have developed an intricate attack chain that leverages social engineering tactics to deliver the notorious Winos Trojan, representing a significant evolution in malware distribution techniques that exploit users’ trust in […]
The post Silver Fox Hackers Using Weaponized Google Translate Tools to Deploy Windows Malware appeared first on Cyber Security News.
Kaspersky Uncovers Stealthy Cyberespionage: Cobalt Strike Beacon Delivered Via Social Media Profiles
Kaspersky Lab has reported a renewed wave of cyberattacks leveraging Cobalt Strike Beacon—a legitimate remote administration tool frequently repurposed for system compromise and data exfiltration. The malware is disseminated through encrypted code embedded within...
The post Kaspersky Uncovers Stealthy Cyberespionage: Cobalt Strike Beacon Delivered Via Social Media Profiles appeared first on Penetration Testing Tools.
CVE-2025-20140 | Cisco IOS XE up to 17.14.1a wncd memory allocation (cisco-sa-wlc-wncd-p6Gvt6HL)
CVE-2025-20154 | Cisco IOS XR up to 24.3.1 TWAMP Server ipsla_ippm_server denial of service (cisco-sa-twamp-kV4FHugn)
CVE-2025-20190 | Cisco IOS XE up to 17.15.1x Lobby Ambassador Web Interface access control (cisco-sa-ewlc-user-del-hQxMpUDj)
CVE-2025-1252 | RTI Connext Professional up to 7.4.x Core Libraries heap-based overflow
CVE-2025-1253 | RTI Connext Professional up to 7.4.x Core Libraries buffer overflow (EUVD-2025-13972)
CVE-2025-20278 | Cisco Finesse CLI command command injection (cisco-sa-vos-command-inject-65s2UCYy / EUVD-2025-16884)
CVE-2025-20155 | Cisco IOS XE up to 17.14.1a Bootstrap Loading improper validation of specified type of input (cisco-sa-bootstrap-KfgxYgdh / Nessus ID 235488)
CVE-2025-20147 | Cisco Catalyst SD-WAN Manager up to 20.12.401 Web-based Management Interface cross site scripting (cisco-sa-vmanage-xss-xhN8M5jt / Nessus ID 235486)
科技爱好者周刊(第 359 期):Palantir 值得关注
OnDemand | Practical Playbook for OT: 3 CISO Techniques for AI, Compliance and Controls
Breach Roundup: Did China Have a Sneak Peek Into ToolShell?
This week: Did China sneak a peek into ToolShell? ToolShell hacking in South Africa, Cisco flaws, an Arizona woman sentenced for aiding North Korea. Most Americans scammed online, a NASCAR data breach and a claimed data leak at France's Naval Group. Orange telecom disrupted. Dating app Tea breach.
Wallarm Secures $55M to Safeguard API-Driven Business Logic
With AI now outpacing cloud in enterprise adoption, Wallarm is evolving its API security platform to safeguard not just endpoints, but the business logic that drives digital revenue. With $55 million in new funding, the company is targeting CIOs and expanding globally to meet demand across sectors.
Cryptohack Roundup: WOO X Probes $14M Breach
HHS Data Plan Aims to 'Make Health Technology Great Again'
The Trump administration launched an initiative to improve patient data interoperability, exchange and accessibility throughout the healthcare ecosystem. The effort asks tech firms, healthcare providers and insurers to voluntarily comply with standards and data sharing criteria. Sounds like déjà vu?