Aggregator
CVE-2025-64164 | Dataease up to 2.10.14 JNDI deserialization (GHSA-q754-4pc2-wjqw)
CMMC Subcontractors and Service Providers
OCI признала FreeBSD. Спустя годы неофициального использования FreeBSD стала полноценным стандартом для контейнеров
Apache взломали? Группировка Akira сделала громкое заявление
清华大学 | ScannerGrouper:面向开放世界通用有效的扫描组织识别系统
Binary Architect: ELFSPIRIT Framework Analyzes, Patches, and Camouflages ELF Files
ELFSPIRIT is a comprehensive static analysis and injection framework designed to parse, manipulate, patch, and camouflage ELF files.
The post Binary Architect: ELFSPIRIT Framework Analyzes, Patches, and Camouflages ELF Files appeared first on Penetration Testing Tools.
Convenience or Risk? Chrome Adds Autofill for Passports & Driver’s Licenses
Google is expanding the autofill capabilities of its Chrome browser, adding support for sensitive personal data such as
The post Convenience or Risk? Chrome Adds Autofill for Passports & Driver’s Licenses appeared first on Penetration Testing Tools.
Beyond Checkboxes: Google reCAPTCHA Updates to Risk-Based Scoring & Flexible Security Policies
Google has unveiled an updated version of its reCAPTCHA system — now markedly more flexible and intelligent in
The post Beyond Checkboxes: Google reCAPTCHA Updates to Risk-Based Scoring & Flexible Security Policies appeared first on Penetration Testing Tools.
Blackmail Ring Busted: Gang Stole Client Data to Threaten Victims with Fake Tapes
The South Korean police have uncovered an organized extortion ring that stole the personal data of massage parlor
The post Blackmail Ring Busted: Gang Stole Client Data to Threaten Victims with Fake Tapes appeared first on Penetration Testing Tools.
Paywall Problem: AI Browsers Bypass Content Walls by Mimicking Human Users
The emergence of new AI-powered “smart browsers” is challenging the very foundations of how online content is protected.
The post Paywall Problem: AI Browsers Bypass Content Walls by Mimicking Human Users appeared first on Penetration Testing Tools.
Пластырь, который перезапускает сердце. В MIT создали устройство, восстанавливающее миокард после инфаркта
Critical Crypto Flaw: AMD Zen 5 Bug Risks Predictable Encryption Keys (CVE-2025-62626)
A serious vulnerability has been discovered in AMD processors based on the Zen 5 architecture, posing a potential
The post Critical Crypto Flaw: AMD Zen 5 Bug Risks Predictable Encryption Keys (CVE-2025-62626) appeared first on Penetration Testing Tools.
极客公园创新大会 2026 首批嘉宾揭晓!
Hidden Bias Exposed: Simple Conversational Prompts Can Fool ChatGPT & Gemini
Researchers at the University of Pennsylvania have discovered that bypassing built-in safeguards in AI-powered chatbots such as ChatGPT
The post Hidden Bias Exposed: Simple Conversational Prompts Can Fool ChatGPT & Gemini appeared first on Penetration Testing Tools.
国外Agentic SOC平台落地实践经验
National Security Risk: Commercial Brokers Selling Location Data of EU & NATO Officials
Millions of mobile phones across the European Union leave behind digital footprints every day that can be purchased
The post National Security Risk: Commercial Brokers Selling Location Data of EU & NATO Officials appeared first on Penetration Testing Tools.
Starting Over in Cybersecurity: Advice I Wish I'd Had
New to cybersecurity? Start by learning how organizations work - their people, processes and priorities - before diving deep into technical stacks. Understanding how to translate technical findings into business risk differentiates a professional from a technician.