Aggregator
$89 Million Gone: How Social Engineering Stole a Fortune in Bitcoin
A massive cryptocurrency theft has once again revealed how vulnerable users remain to the manipulations of social engineering. On August 19, an anonymous Bitcoin holder was stripped of 783 BTC — roughly $89 million...
The post $89 Million Gone: How Social Engineering Stole a Fortune in Bitcoin appeared first on Penetration Testing Tools.
How a scam hunter got scammed (Lock and Code S06E17)
A New macOS Malware Is Using “ClickFix” to Steal Passwords and Crypto Wallets
Researchers at CrowdStrike have identified a new macOS infection campaign deploying a malware strain known as Shamos. This trojan is a variant of Atomic macOS Stealer (AMOS), a notorious Mac infostealer, and is being...
The post A New macOS Malware Is Using “ClickFix” to Steal Passwords and Crypto Wallets appeared first on Penetration Testing Tools.
俄企高管手机遭仿冒杀毒软件实时监控,间谍程序伪装安全局工具窃密
俄企高管手机遭仿冒杀毒软件实时监控,间谍程序伪装安全局工具窃密
Weaponizing Filenames: Trellix Uncovers Stealthy Linux Malware Delivering VShell Backdoor
Researchers at Trellix have uncovered an unusual attack scheme targeting Linux systems, where the key element is not a malicious payload hidden within a file, but the file name itself inside an archive. The...
The post Weaponizing Filenames: Trellix Uncovers Stealthy Linux Malware Delivering VShell Backdoor appeared first on Penetration Testing Tools.
Windows 11 Update Brings Android App Continuity and New Lock Screen Features
Microsoft has released a new test build of Windows 11, Insider Preview Build 26200.5761 (KB5064093), for participants in the Windows Insider Program on the Dev Channel. The update introduces several notable features and improvements...
The post Windows 11 Update Brings Android App Continuity and New Lock Screen Features appeared first on Penetration Testing Tools.
Revenge of the Coder: Ex-Employee Jailed for Digital Sabotage and a Malicious “Kill Switch”
A former employee has been convicted of deliberately orchestrating digital sabotage against his own company. The U.S. Department of Justice announced that 55-year-old Davis Lu, a Chinese national residing in Houston, was sentenced to...
The post Revenge of the Coder: Ex-Employee Jailed for Digital Sabotage and a Malicious “Kill Switch” appeared first on Penetration Testing Tools.
ISC Stormcast For Monday, August 25th, 2025 https://isc.sans.edu/podcastdetail/9584, (Mon, Aug 25th)
美国 CISA 警告:苹果零日漏洞正被用于针对性网络攻击
美国 CISA 警告:苹果零日漏洞正被用于针对性网络攻击
Fraudsters Evolve: How Money Mules Are Using Starlink and AI to Launder Funds
Over the past two years, the banking sector across the Middle East, Turkey, and Africa has witnessed a marked evolution in cash-out schemes driven by so-called “money mules.” According to Group-IB, drawing on data...
The post Fraudsters Evolve: How Money Mules Are Using Starlink and AI to Launder Funds appeared first on Penetration Testing Tools.
The Marshal Madness: A Decade of Futile Patches for a Ruby Vulnerability
Since the introduction of serialization through the Marshal module in the Ruby programming language, developers and security experts have been drawn into a protracted game of “bypass and patch.” The history of these vulnerabilities...
The post The Marshal Madness: A Decade of Futile Patches for a Ruby Vulnerability appeared first on Penetration Testing Tools.
Scoring Insecurity: Study Reveals Chaos in Vulnerability Ranking Systems
Against the backdrop of the rapidly growing number of vulnerabilities confronting companies worldwide, researchers from the Rochester Institute of Technology, the University of Hawaiʻi, and Leidos have conducted the most extensive comparative study to...
The post Scoring Insecurity: Study Reveals Chaos in Vulnerability Ranking Systems appeared first on Penetration Testing Tools.
美国警告科技公司勿遵守欧洲和英国的“审查”法律
美国警告科技公司勿遵守欧洲和英国的“审查”法律
Silent Access: Critical Flaw in Microsoft Copilot Bypasses All Audit Logs
While Microsoft has been vigorously promoting its Copilot AI product line, promising users greater convenience and productivity, a troubling flaw has been uncovered in the M365 ecosystem—one that undermines the very foundations of security...
The post Silent Access: Critical Flaw in Microsoft Copilot Bypasses All Audit Logs appeared first on Penetration Testing Tools.
Fake Bounty on Notorious Ransomware Gang Exposed in Hoax Campaign
In recent days, Telegram channels and news outlets have been actively circulating reports of an alleged Europol bounty of $50,000 for information leading to the capture of two leaders of the notorious ransomware group...
The post Fake Bounty on Notorious Ransomware Gang Exposed in Hoax Campaign appeared first on Penetration Testing Tools.