Aggregator
APT41’s New Frontier: Chinese Cyberespionage Group Targets African Governments
The China-linked cyber-espionage group APT41 has launched a new surveillance campaign targeting government IT services in Africa—an unexpected turn for a region previously considered an unlikely target. Researchers at Kaspersky Lab uncovered the operation...
The post APT41’s New Frontier: Chinese Cyberespionage Group Targets African Governments appeared first on Penetration Testing Tools.
Silent Scourge: Over 3,500 Websites Infected by New Covert Browser Cryptominer
Cybersecurity specialists at cside have uncovered a vast and covert cryptocurrency mining campaign that has compromised over 3,500 websites—marking the largest incident of its kind in recent years and signaling the resurgence of tactics...
The post Silent Scourge: Over 3,500 Websites Infected by New Covert Browser Cryptominer appeared first on Penetration Testing Tools.
Snake Keylogger Strikes Turkish Aerospace & Defense, Evades Detection with Stealthy Tactics
Turkish cybersecurity experts at Malwation have uncovered a large-scale phishing campaign targeting enterprises in the defense and aerospace sectors. Threat actors are disguising malicious attachments as official documents purportedly issued by TUSAŞ, Turkey’s state-owned...
The post Snake Keylogger Strikes Turkish Aerospace & Defense, Evades Detection with Stealthy Tactics appeared first on Penetration Testing Tools.
Исторический приговор Гааги: государства обязаны спасать планету или платить миллиарды
UNG0002: Stealthy South Asian APT Group Unleashes New Malware in Broad Cyberespionage Campaigns Across Asia
Cyber espionage in Asia is intensifying: researchers at Seqrite Labs have unveiled new insights into the operations of the group UNG0002, also known as Unknown Group 0002. This obscure yet technically adept entity is...
The post UNG0002: Stealthy South Asian APT Group Unleashes New Malware in Broad Cyberespionage Campaigns Across Asia appeared first on Penetration Testing Tools.
Identity Threats Target Small Businesses in MFA Workarounds
Cybercriminals are bypassing MFA using session tokens and rogue app access, with shadow workflows enabling persistent inbox theft against SMBs. Huntress offers behavioral training and managed identity response to SMBs for real protection not just more alerts, says CEO Kyle Hanslovan.
Chinese Hackers' Evolution From Vandals to Strategists
There's a reason why many of the same tools appear time and time again in Chinese nation-state hacking: A first-generation of hackers who grew up together online and continue to swap techniques to this day. A report shows the influence of the so-called "Red 40".
Another Medical Practice Closes Its Doors After Cyberattack
Another small medical care provider has shut its doors forever as the result of a recent "devastating" cyberattack. Georgia-based Alpha Wellness & Alpha Medical Centre has permanently pulled the plug on its operations following a data theft attack by cybercriminal gang RansomHub.
US Infrastructure Remains Vulnerable 15 Years After Stuxnet
Panelists told the House subcommittee on cybersecurity and infrastructure protection that U.S. critical infrastructure sectors have made few cyber improvements over the last 15 years despite fears of retaliation following digital and physical attacks on Iranian nuclear sites.
CVE-2025-25254 | Fortinet FortiWeb up to 7.0.11/7.2.11/7.4.6/7.6.2 path traversal (FG-IR-24-474 / Nessus ID 234005)
CVE-2024-45329 | Fortinet FortiPortal up to 7.0.8/7.2.5/7.4.0 authorization (FG-IR-24-274)
CVE-2025-24471 | Fortinet FortiOS up to 7.4.7/7.6.1 certificate validation (FG-IR-24-544 / Nessus ID 238112)
CVE-2025-24474 | Fortinet FortiManager/FortiAnalyzer up to 6.4.15/7.0.14/7.2.10/7.4.6/7.6.1 sql injection (FG-IR-24-437 / Nessus ID 241983)
CVE-2025-21195 | Microsoft Azure Service Fabric Runtime link following
CVE-2025-46959 | Adobe Experience Manager up to 6.5.22 cross site scripting (apsb25-48 / EUVD-2025-21727)
CVE-2024-52965 | Fortinet FortiOS/FortiProxy API missing critical step in authentication (FG-IR-24-511 / EUVD-2024-54757)
CVE-2025-22254 | Fortinet FortiWeb/FortiOS/FortiProxy Node.js Websocket Module privileges management (FG-IR-25-006 / EUVD-2025-17796)
CVE-2025-25250 | Fortinet FortiOS up to 6.4.16/7.0.17/7.2.11/7.4.7/7.6.0 SSL-VPN information disclosure (FG-IR-24-257 / Nessus ID 238104)
Cursor AI’s “YOLO Mode” Exposed: Security Firm Warns of Easy Bypasses, Data Deletion, and RCE Risks
AI-powered programming tools are rapidly gaining popularity, and one of the most prominent—Cursor—has introduced a new YOLO mode (short for “you only live once”) that enables its agent to execute complex sequences of actions...
The post Cursor AI’s “YOLO Mode” Exposed: Security Firm Warns of Easy Bypasses, Data Deletion, and RCE Risks appeared first on Penetration Testing Tools.