Aggregator
CVE-2025-5647 | Radare2 5.9.9 radiff2 /libr/cons/cons.c r_cons_context_break_pop -T memory corruption (Issue 24237)
Submit #586929: radare2 radiff2 5.9.9 and master branch Memory corruption [Accepted]
CVE-2025-5646 | Radare2 5.9.9 radiff2 /libr/cons/pal.c r_cons_rainbow_free -T memory corruption (Issue 24235)
Submit #586928: radare2 radiff2 5.9.9 and master branch Memory corruption [Accepted]
CVE-2025-5645 | Radare2 5.9.9 radiff2 /libr/cons/pal.c r_cons_pal_init -T memory corruption (Issue 24234)
Submit #586923: radare2 radiff2 5.9.9 and master branch Memory corruption [Accepted]
Windows Authentication Coercion Attacks Present Major Risks to Enterprise Networks
Authentication coercion remains a potent attack vector in Windows environments, enabling attackers with even low-privileged domain accounts to force targeted systems, often high-value servers or domain controllers, to authenticate to attacker-controlled hosts. This technique is closely tied to NTLM and Kerberos relay attacks, where the coerced authentication session is intercepted and relayed to other services, […]
The post Windows Authentication Coercion Attacks Present Major Risks to Enterprise Networks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-5644 | Radare2 5.9.9 radiff2 /libr/cons/cons.c r_cons_flush -T use after free (Issue 24233)
Submit #586922: radare2 radiff2 5.9.9 and master branch Memory corruption [Accepted]
CVE-2025-5643 | Radare2 5.9.9 radiff2 /libr/cons/cons.c cons_stack_load -T memory corruption (Issue 24232)
诚邀渠道合作伙伴共启新征程
预警 : 病毒“黑吃黑”,GitHub开源远控项目暗藏后门
Submit #586921: radare2 radiff2 5.9.9 and master branch Memory corruption [Accepted]
Your SaaS Data Isn't Safe: Why Traditional DLP Solutions Fail in the Browser Era
Cobalt improves pentest transparency, automation, and risk prioritization
Cobalt announced a set of product enhancements within the Cobalt Offensive Security Platform aimed at helping customers scale security testing with greater clarity, automation, and control. These innovations further the company’s commitment to deliver expert-driven, fast-to-launch pentesting, now with even richer data and streamlined workflows. The Cobalt Platform centralizes access to security services from a team of expert pentesters, making it easier to find and fix vulnerabilities across an organization’s environments. By enabling faster pentest … More →
The post Cobalt improves pentest transparency, automation, and risk prioritization appeared first on Help Net Security.
Submit #586912: radare2 radiff2 5.9.9 and master branch Memory corruption [Accepted]
CVE-2025-5642 | Radare2 5.9.9 radiff2 /libr/cons/pal.c r_cons_pal_init memory corruption (Issue 24231)
INC
You must login to view this content
Hackers Weaponize Ruby Gems To Exfiltrate Telegram Tokens and Messages
A sophisticated supply chain attack has emerged targeting the RubyGems ecosystem, exploiting geopolitical tensions surrounding Vietnam’s recent Telegram ban to steal sensitive developer credentials and communications. The malicious campaign involves two typosquatted Ruby gems designed to impersonate legitimate Fastlane plugins, silently redirecting Telegram API traffic through attacker-controlled infrastructure to harvest bot tokens, message content, and […]
The post Hackers Weaponize Ruby Gems To Exfiltrate Telegram Tokens and Messages appeared first on Cyber Security News.