Aggregator
U.S. CISA adds Citrix Session Recording, and Git flaws to its Known Exploited Vulnerabilities catalog
U.S. CISA adds Citrix Session Recording, and Git flaws to its Known Exploited Vulnerabilities catalog
Weaponized PuTTY Via Bing Ads Exploit Kerberos and Attack Active Directory Services
A malvertising campaign using sponsored results on Microsoft’s search platform delivered a weaponized PuTTY that established persistence, enabled hands-on keyboard control, and executed Kerberoasting to target Active Directory service accounts. According to an investigation published by LevelBlue’s MDR SOC and corroborated by independent research tracking Oyster/Broomstick backdoor activity tied to trojanized admin tools distributed via […]
The post Weaponized PuTTY Via Bing Ads Exploit Kerberos and Attack Active Directory Services appeared first on Cyber Security News.
Думали, программа лояльности — это бонусы? Поздравляем, вы только что спонсировали чью-то базу данных для фишинга
CVE-2025-26497 | Salesforce Tableau Server up to 2023.3.18/2024.2.11/2025.1.2 Flow Editor unrestricted upload
CVE-2025-26498 | Salesforce Tableau Server up to 2023.3.18/2024.2.11/2025.1.2 establish-connection-no-undo unrestricted upload
CVE-2025-9422 | oitcode samarium up to 0.9.6 Team Image /dashboard/team cross site scripting
CVE-2025-9424 | Ruijie WS7204-A 2017.06.15 branch_import.php?a=branch_list province os command injection (EUVD-2025-25762)
CVE-2025-9425 | itsourcecode Online Tour and Travel Management System 1.0 /enquiry.php pid sql injection
CVE-2025-9426 | itsourcecode Online Tour and Travel Management System 1.0 /package.php subcatid sql injection
CVE-2025-57809 | mlc-ai xgrammar up to 0.1.20 recursion (ID 250)
CVE-2025-57814 | azu request-filtering-agent up to 1.x server-side request forgery (GHSA-pw25-c82r-75mm)
【通知】第三届全国大学生开源情报数据采集与分析大赛开始报名啦!提供免费培训
【资料】开源情报(OSINT)与徽章学:揭秘俄罗斯联邦安全局(FSB)第16中心的信号情报(SIGINT)能力
EByte-AMSI-ProxyInjector: A New Tool Exposes a Critical Bypass Technique
EByte-AMSI-ProxyInjector A lightweight tool that injects a custom assembly proxy into a target process to silently bypass AMSI scanning by redirecting AmsiScanBuffer calls. It suspends the target’s threads, patches the function to always return...
The post EByte-AMSI-ProxyInjector: A New Tool Exposes a Critical Bypass Technique appeared first on Penetration Testing Tools.