Aggregator
红队轻松越狱 GPT-5,警告CSO请不要直接用于工作环境
Microsoft’s August Security Update High-Risk Vulnerability Notice for Multiple Products
Overview On August 13, NSFOCUS CERT detected that Microsoft released the August Security Update patch, which fixed 111 security issues involving widely used products such as Windows, Microsoft Office, Microsoft SQL Server, Visual Studio, and Microsoft Exchange Server. These include high-risk vulnerability types such as privilege escalation and remote code execution. Among the vulnerabilities fixed […]
The post Microsoft’s August Security Update High-Risk Vulnerability Notice for Multiple Products appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..
The post Microsoft’s August Security Update High-Risk Vulnerability Notice for Multiple Products appeared first on Security Boulevard.
CVE-2025-55168 | LabRedesCefetRJ WeGIA up to 3.4.7 aplicar_medicamento.php id_fichamedica sql injection (ID 245)
CVE-2025-55169 | LabRedesCefetRJ WeGIA up to 3.4.7 download_remessa.php improper authentication (ID 177)
CVE-2025-49560 | Adobe Substance3D Viewer up to 0.25 heap-based overflow (apsb25-72)
CVE-2025-49569 | Adobe Substance3D Viewer up to 0.25 out-of-bounds write (apsb25-72)
CVE-2025-54205 | Adobe Substance3D Sampler up to 5.0.3 out-of-bounds (apsb25-78)
CVE-2025-49570 | Adobe Photoshop Desktop up to 25.12.3/26.8 out-of-bounds write (apsb25-75)
CVE-2025-49561 | Adobe Animate up to 23.0.12/24.0.9 use after free (apsb25-73 / WID-SEC-2025-1783)
CVE-2025-49562 | Adobe Animate up to 23.0.12/24.0.9 use after free (apsb25-73 / WID-SEC-2025-1783)
“AI-Induced Destruction” – New Attack Vector Where Helpful Tools Become Accidental Weapons
Artificial intelligence coding assistants, designed to boost developer productivity, are inadvertently causing massive system destruction. Researchers report a significant spike in what they term “AI-induced destruction” incidents, where helpful AI tools become accidental weapons against the very systems they’re meant to improve. Key Takeaways1. AI assistants accidentally destroy systems when given vague commands with excessive […]
The post “AI-Induced Destruction” – New Attack Vector Where Helpful Tools Become Accidental Weapons appeared first on Cyber Security News.
研究认为社交媒体的问题无法得到修正
Time to Update: Windows 11 23H2 Home and Pro Editions Are Losing Support Soon
Microsoft has announced that in three months, devices running Windows 11 version 23H2 in the Home and Pro editions will cease to receive updates. Support for Enterprise and Education editions will continue until November...
The post Time to Update: Windows 11 23H2 Home and Pro Editions Are Losing Support Soon appeared first on Penetration Testing Tools.
Heracles: New Attack Exploits AMD SEV-SNP to Steal Data from Protected VMs
Researchers at ETH Zurich have unveiled a novel attack against AMD’s SEV-SNP hardware isolation mechanism, enabling a hypervisor-level adversary to extract sensitive data from protected virtual machines. Dubbed Heracles, the attack demonstrates how to...
The post Heracles: New Attack Exploits AMD SEV-SNP to Steal Data from Protected VMs appeared first on Penetration Testing Tools.
Microsoft fixes Windows 11 24H2 updates failing with 0x80240069 error
The Alliance of Chaos: How ShinyHunters and Scattered Spider Merged to Target Salesforce
The hacker groups ShinyHunters and Scattered Spider, once operating independently, now appear to have joined forces in a coordinated campaign to extort data from Salesforce’s corporate clients. As noted by ReliaQuest, ShinyHunters has undergone...
The post The Alliance of Chaos: How ShinyHunters and Scattered Spider Merged to Target Salesforce appeared first on Penetration Testing Tools.
国内知名厂商网络摄像头存在新漏洞,可被远程利用进行攻击
Tor, AppArmor и двойная изоляция — Whonix 17.4 закрывает IP даже при взломе браузера
Curly COMrades: The Stealthy Cyber-Espionage Group You Haven’t Heard Of
Bitdefender researchers have identified a previously unknown cyber-espionage group, provisionally dubbed Curly COMrades. According to the report, the threat actors are focused on maintaining long-term, covert access to the infrastructure of Georgian governmental and...
The post Curly COMrades: The Stealthy Cyber-Espionage Group You Haven’t Heard Of appeared first on Penetration Testing Tools.