Aggregator
ZDI-CAN-29369: Hong Kong University Data Intelligence Lab
ZDI-CAN-29226: n8n
ZDI-CAN-29225: n8n
Портрет по капле крови. Новый алгоритм вычисляет рост преступника по обрывкам ДНК
The 500ms Slumber: How a One-Line Patch Unleashed 10x Throughput in QEMU
Occasionally, the most profound escalations in computational performance manifest almost as a whimsical irony. Jens Axboe, the esteemed
The post The 500ms Slumber: How a One-Line Patch Unleashed 10x Throughput in QEMU appeared first on Penetration Testing Tools.
Fly, Eagle, Fly: The U.S. “Freedom Portal” Designed to Bypass European Content Bans
The United States Department of State is meticulously developing an online portal designed to empower residents of Europe
The post Fly, Eagle, Fly: The U.S. “Freedom Portal” Designed to Bypass European Content Bans appeared first on Penetration Testing Tools.
Uptime Kuma: Open-source monitoring tool
Service availability monitoring remains a daily operational requirement across IT teams, SaaS providers, and internal infrastructure groups. Many environments rely on automated checks and alerting to track outages, latency issues, and service degradation across web applications and network endpoints. Uptime Kuma is an open-source uptime monitoring project that supports this type of operational monitoring through a self-hosted deployment model. The tool is designed to monitor a wide range of service types, including websites, APIs, network … More →
The post Uptime Kuma: Open-source monitoring tool appeared first on Help Net Security.
Cellebrite в Кении, Predator в Анголе, жертвы в Иордании. Citizen Lab собрала новую географию коммерческой слежки за гражданским обществом
The Digital Trap: How CRESCENTHARVEST Malware Weaponizes Protest News to Silence Dissent
Cybersecurity specialists from Acronis have unmasked a nascent espionage offensive dubbed CRESCENTHARVEST, which they evaluate as a surgical
The post The Digital Trap: How CRESCENTHARVEST Malware Weaponizes Protest News to Silence Dissent appeared first on Penetration Testing Tools.
The Invisible Skeleton Key: Critical CVSS 9.8 Flaw in Honeywell Cameras Allows Full Admin Takeover
A critical vulnerability has been unearthed within ubiquitous Honeywell surveillance cameras, enabling unauthorized actors to gain illicit access
The post The Invisible Skeleton Key: Critical CVSS 9.8 Flaw in Honeywell Cameras Allows Full Admin Takeover appeared first on Penetration Testing Tools.
Routers as “Modern Weapons”: Texas Sues TP-Link Over Alleged State-Sponsored Backdoors
Authorities in Texas have leveled allegations against the network hardware manufacturer TP-Link Systems, asserting that its devices may
The post Routers as “Modern Weapons”: Texas Sues TP-Link Over Alleged State-Sponsored Backdoors appeared first on Penetration Testing Tools.
Former Google Engineers Indicted Over Trade Secret Transfers to Iran
Почему бегуны умнее лентяев? Их печень штампует фермент GPLD1, который латает протечки в сосудах мозга
JVN: EnOcean製SmartServer IoTにおける複数の脆弱性
JVN: Valmet DNA Engineering Web Toolsおけるパストラバーサルの脆弱性
JVN: Jinan USR IOT Technology製USR-W610における複数の脆弱性
New infosec products of the week: February 20, 2026
Here’s a look at the most interesting products from the past week, featuring releases from Compliance Scorecard, Impart Security, Redpanda, and Virtana. Impart enables safe, in-app enforcement against AI-powered bots Impart Security has launched Programmable Bot Protection, a runtime approach to bot defense that brings detection and enforcement together within the application. Impart makes enforcement operational by enabling teams to see what would be blocked before turning it on. Compliance Scorecard v10 delivers context-driven AI … More →
The post New infosec products of the week: February 20, 2026 appeared first on Help Net Security.
JVN: Welker製OdorEyes EcoSystem Pulse Bypass System with XL4 Controllerにおける重要な機能に対する認証の欠如の脆弱性
The Invisible Switch: North Korean Hackers Use “Contagious Interviews” to Trojanize Your MetaMask
North Korean cyber-adversaries are endeavoring to surreptitiously supplant the MetaMask cryptocurrency wallet extension directly upon a victim’s workstation—an
The post The Invisible Switch: North Korean Hackers Use “Contagious Interviews” to Trojanize Your MetaMask appeared first on Penetration Testing Tools.