Aggregator
LF Networking объявило о выходе Essedum Release 1.0 для сетевого ИИ
Blind Eagle’s Expanding Cyber Campaigns: Five Clusters Targeting Colombia’s Government and Beyond
Researchers at Recorded Future’s Insikt Group documented five distinct clusters of activity attributed to the persistent threat actor Blind Eagle (also tracked as TAG-144) between May 2024 and July 2025. The primary focus of...
The post Blind Eagle’s Expanding Cyber Campaigns: Five Clusters Targeting Colombia’s Government and Beyond appeared first on Penetration Testing Tools.
ShadowSilk: The Hybrid Espionage Group Targeting Central Asian Governments
The group ShadowSilk has been identified as the orchestrator of a new wave of cyberattacks against government institutions across Central Asia and the Asia-Pacific region. According to Group-IB, the number of victims is approaching...
The post ShadowSilk: The Hybrid Espionage Group Targeting Central Asian Governments appeared first on Penetration Testing Tools.
Supply Chain Attack on a Popular Dev Tool Is Stealing Crypto, Keys, and Tokens
The NPM ecosystem has been struck by a new supply chain attack, this time targeting the Nx project, into whose repository several malicious package versions were uploaded late Tuesday evening. According to researchers at...
The post Supply Chain Attack on a Popular Dev Tool Is Stealing Crypto, Keys, and Tokens appeared first on Penetration Testing Tools.
Criminals Are Weaponizing AI to Automate Cyberattacks at Scale
Anthropic has published a report revealing how malicious actors are increasingly exploiting AI models for attacks and fraud, bypassing existing security measures. The document provides concrete examples showing that agent-based AI systems are no...
The post Criminals Are Weaponizing AI to Automate Cyberattacks at Scale appeared first on Penetration Testing Tools.
Мыши стали прозрачными ради науки — первый 3D атлас всех нервных дорог в теле
Ransomware Attack on Swedish Provider Paralyzes 200 Municipalities
A cyberattack on the Swedish company Miljödata, a provider of software solutions for workforce management and occupational safety, has paralyzed operations across roughly 200 municipalities and regions in the country. The disruption affected systems...
The post Ransomware Attack on Swedish Provider Paralyzes 200 Municipalities appeared first on Penetration Testing Tools.
AI can’t deliver without trusted, well-governed information
While enterprise IT leaders recognize the transformative potential of AI, a gap in information readiness is causing their organizations to struggle in securing, governing, and aligning AI initiatives across business, according to a survey conducted by the Ponemon Institute. Who is the final authority for setting your organization’s AI strategy? (Source: Ponemon Institute) 73% of CIOs, CISOs, and other IT leaders believe reducing information complexity is key to AI readiness. “Without trusted, well-governed information, AI … More →
The post AI can’t deliver without trusted, well-governed information appeared first on Help Net Security.
WOW@Home: A Global Network of RTL-SDR Based Radio Telescopes Looking for Alien Technosignatures
AI Is Now a Linux Kernel Assistant, Helping Maintainers Backport Patches
Generative AI is now assisting in selecting patches for backporting into the stable branches of Linux, including long-term support (LTS) releases. Sasha Levin, the LTS maintainer, recently advanced updates to kernel documentation regarding the...
The post AI Is Now a Linux Kernel Assistant, Helping Maintainers Backport Patches appeared first on Penetration Testing Tools.
Cyber Privateers? A New Bill Revives a Historic Law to Fight Cybercrime
Congressman David Schweikert (Republican, Arizona, District AZ-01) has introduced the Cybercrime Marque and Reprisal Authorization Act of 2025 (H.R. 4988) in the House of Representatives. The bill, registered on August 15, 2025, has been...
The post Cyber Privateers? A New Bill Revives a Historic Law to Fight Cybercrime appeared first on Penetration Testing Tools.
Sangoma Issues Warning: Zero-Day Vulnerability Actively Exploited in FreePBX
Sangoma has issued an urgent alert regarding an actively exploited zero-day vulnerability in FreePBX installations where the Administrator Control Panel (ACP) is exposed to the internet. FreePBX, an open-source IP-PBX built on Asterisk, is...
The post Sangoma Issues Warning: Zero-Day Vulnerability Actively Exploited in FreePBX appeared first on Penetration Testing Tools.
How Storm-0501 is Pivoting to Cloud-Native Attacks
According to a report by Microsoft Threat Intelligence, the group Storm-0501 has shifted its focus from traditional on-premises ransomware campaigns to tactics centered on cloud services. Whereas in the past attackers deployed encryptors onto...
The post How Storm-0501 is Pivoting to Cloud-Native Attacks appeared first on Penetration Testing Tools.
TamperedChef Malware Disguised as Fake PDF Editors Steals Credentials and Cookies
TamperedChef Malware Disguised as Fake PDF Editors Steals Credentials and Cookies
NSA, CISA, & Partners Expose Chinese APT Groups
The U.S. National Security Agency, the U.K.’s National Cyber Security Centre, and partners from more than ten countries have attributed the global Salt Typhoon operations to three Chinese technology companies. Now, the FBI and...
The post NSA, CISA, & Partners Expose Chinese APT Groups appeared first on Penetration Testing Tools.