Aggregator
Outdated Netgear Router & Bitdefender Box V1 Exploited for Full Remote Control
At the inaugural DistrictCon Junkyard competition, analysts from Trail of Bits vividly demonstrated the grave risks posed by outdated networking devices left without updates. During the event, they remotely compromised two discontinued products—the Netgear...
The post Outdated Netgear Router & Bitdefender Box V1 Exploited for Full Remote Control appeared first on Penetration Testing Tools.
Microsoft uncovers macOS flaw allowing bypass TCC protections and exposing sensitive data
Microsoft uncovers macOS flaw allowing bypass TCC protections and exposing sensitive data
Rise of Chaos Ransomware Tied to BlackSuit Group's Exit
An international law enforcement operation has disrupted BlackSuit, a ransomware group tied to hundreds of victims and ransom demands that exceeded half a billion dollars. The takedown occurred as security experts tracked the rise of a new group called Chaos, which may be a BlackSuit rebrand.
Allianz Life Breach Tied to CRM Compromise
A malicious actor breached a customer relationship management platform used by Allianz Life Insurance of North America on July 16 and stole personally identifiable information of most of its 1.4 million U.S. customers, financial professionals and some employees, the company said.
Health System Settles Web Tracker Lawsuit for up to $9.25M
A Missouri healthcare system has agreed to pay up to $9.25 million to settle a proposed class action lawsuit alleging that its use of online tracking tools in its patient portals transmitted sensitive patient information to third-party firms without the patients' knowledge or consent.
Corelight Uses Gen AI to Power Smarter Threat Detection
Corelight's SaaS platform Investigator is designed to bring scalable network detection and response to smaller security teams. CEO Brian Dye says generative AI workflows and enriched network context help defenders identify threats faster and with greater confidence than ever.
Gunra Ransomware Group Unveils Efficient Linux Variant
新版《电力企业涉电应急预案管理办法》修订发布!
NVIDIA Dev Proposes Formal AI Guidelines for Linux Kernel Contributions: “Co-Developed-By” Tag & Configs for Claude, Copilot & More
Veteran Linux kernel developer Sasha Levin, currently at NVIDIA and formerly with Google and Microsoft, has proposed the formal inclusion of guidelines for the use of AI assistants in kernel development within the official...
The post NVIDIA Dev Proposes Formal AI Guidelines for Linux Kernel Contributions: “Co-Developed-By” Tag & Configs for Claude, Copilot & More appeared first on Penetration Testing Tools.
packj: detect malicious/risky open-source software packages
Packj flags malicious/risky open-source packages Packj (pronounced package) is a command-line (CLI) tool to vet open-source software packages for “risky” attributes that make them vulnerable to supply chain attacks. This is the tool behind...
The post packj: detect malicious/risky open-source software packages appeared first on Penetration Testing Tools.