Aggregator
CVE-2025-34076 | Microweber CMS up to 1.2.11 Backup Management API /api/BackupV2/upload src path traversal (EUVD-2025-19754)
CVE-2025-6765 | Intelbras InControl 2.21.60.9 HTTP PUT Request /v1/operador/ permission (EUVD-2025-19327)
A “15.8 Million” Account Leak? Hackers Claim New PayPal Data Dump, Company Denies Breach
On a well-known data leak forum, a post has surfaced advertising the sale of a database allegedly containing 15.8 million PayPal accounts, complete with email addresses and plaintext passwords. The seller claims the information...
The post A “15.8 Million” Account Leak? Hackers Claim New PayPal Data Dump, Company Denies Breach appeared first on Penetration Testing Tools.
UK Government Drops Demand for iCloud Backdoor
Washington and London have at last managed to reach an accord on an issue that threatened to escalate into a serious diplomatic and technological conflict. U.S. Director of National Intelligence Tulsi Gabbard announced that...
The post UK Government Drops Demand for iCloud Backdoor appeared first on Penetration Testing Tools.
XZ Utils 后门安全事件后续:持续潜伏的供应链威胁
A Single Prompt Is All It Takes: Lenovo Chatbot Vulnerability Exposes Customers and Staff
A serious incident was recently uncovered on Lenovo’s website involving its corporate chatbot, Lena, designed to assist customers. Cybernews researchers revealed that Lena was vulnerable to an XSS-based attack chain, enabling attackers—through nothing more...
The post A Single Prompt Is All It Takes: Lenovo Chatbot Vulnerability Exposes Customers and Staff appeared first on Penetration Testing Tools.
Why CISOs in business services must close the edge security gap
Cloud adoption is speeding ahead in the business services sector, but security for remote and edge environments is falling behind. At the same time, generative AI is moving into daily workflows faster than most IT teams are prepared for. Those are the key takeaways from a new Aryaka survey of more than 100 North American IT and infrastructure leaders in finance, legal, consulting, and HR services. The report found that most firms have embraced hybrid … More →
The post Why CISOs in business services must close the edge security gap appeared first on Help Net Security.
Inside Kimsuky’s GitHub-Powered Cyber-Espionage Campaign
At the beginning of 2025, Trellix specialists uncovered a sweeping cyber-espionage campaign targeting diplomatic missions in Seoul. Between March and July, at least nineteen phishing attacks were recorded, in which North Korean–linked actors impersonated...
The post Inside Kimsuky’s GitHub-Powered Cyber-Espionage Campaign appeared first on Penetration Testing Tools.
智谱推出 AutoGLM 2.0:手机 Agent 的「Manus 时刻」?
对话小米 AI 眼镜负责人:20 天卖光库存,但属于产品的「长跑」才刚开始
TikTok Shop Is Selling GPS Trackers and Audio Recorders for Stalking Partners
TikTok has found itself at the center of a new scandal following an investigation by 404 Media: through TikTok Shop, vast numbers of GPS trackers and covert audio devices are being sold, brazenly advertised...
The post TikTok Shop Is Selling GPS Trackers and Audio Recorders for Stalking Partners appeared first on Penetration Testing Tools.
“Automated and Dangerous”: A New AI Framework Can Run 150+ Hacking Tools Autonomously
The HexStrike AI repository has released HexStrike AI MCP Agents v6.0—a powerful framework for automating penetration tests. The system integrates more than 150 security tools and 12 autonomous AI agents operating through the FastMCP...
The post “Automated and Dangerous”: A New AI Framework Can Run 150+ Hacking Tools Autonomously appeared first on Penetration Testing Tools.
“A True Nightmare”: Leaked Archive Reveals a Highly Sophisticated Linux Rootkit
In the latest issue of the hacker magazine Phrack, a vast archive has been published detailing the operations of North Korean cybercriminal groups. The leak includes exploitation techniques, information on compromised systems, and a...
The post “A True Nightmare”: Leaked Archive Reveals a Highly Sophisticated Linux Rootkit appeared first on Penetration Testing Tools.
DOJ Charges 22-Year-Old for Running RapperBot Botnet Behind 370,000 DDoS Attacks
The Ultimate Betrayal: How Attackers Are Weaponizing Cisco’s Own Safe Links to Phish Users
Cybercriminals have discovered a way to weaponize Cisco’s own security mechanisms against its users. Researchers at Raven have documented a credential theft campaign in which attackers learned to exploit Cisco’s Safe Links technology—a tool...
The post The Ultimate Betrayal: How Attackers Are Weaponizing Cisco’s Own Safe Links to Phish Users appeared first on Penetration Testing Tools.
LLM推理能力进化:自我反思和策略优化
Anna’s Archive: цифровая Александрийская библиотека горит снова — но теперь в сети. Удастся ли сохранить наследие человечества?
iOS security features you should use to protect your privacy
iOS 18 comes with several privacy and security features that many iPhone users overlook. Knowing how to use them can help you protect your personal information and control which apps can access your data. USB Accessories Lock iOS 18 allows you to control whether accessories can connect to your iPhone, iPad, or iPod touch while it’s locked. By default, this setting is off, which helps prevent unauthorized access to your device through USB or other … More →
The post iOS security features you should use to protect your privacy appeared first on Help Net Security.