Aggregator
【通知】第三届全国大学生开源情报数据采集与分析大赛开始报名啦!提供免费培训
【情报】湾湾的雷达站(含经纬度)
monkey365: conduct Microsoft 365, Azure subscriptions and Azure Active Directory security configuration reviews
monkey365 Monkey365 is an Open Source security tool that can be used to easily conduct not only Microsoft 365 but also Azure subscriptions and Azure Active Directory security configuration reviews without the significant overhead...
The post monkey365: conduct Microsoft 365, Azure subscriptions and Azure Active Directory security configuration reviews appeared first on Penetration Testing Tools.
SQLiDetector: detect SQL injection Error based
SQLiDetector Simple python script supported with BurpBouty profile that helps you to detect SQL injection “Error based” by sending multiple requests with 14 payloads and checking for 152 regex patterns for different databases. The...
The post SQLiDetector: detect SQL injection Error based appeared first on Penetration Testing Tools.
Beyond Phishing: A Closer Look at Blind Eagle’s New, More Stealthy Attacks
The APT-C-36 group (Blind Eagle) intensified its operations in May 2025, focusing attacks on Colombian government institutions and major corporations, as well as on organizations in other South American countries, including Ecuador, Chile, and...
The post Beyond Phishing: A Closer Look at Blind Eagle’s New, More Stealthy Attacks appeared first on Penetration Testing Tools.
Zero-Day Attack Takes Down Stock in the Channel, Disrupting IT Supply Chain
The British company Stock in the Channel (STIC), which provides a digital platform for monitoring the availability and pricing of IT equipment, has reported a cyberattack that caused a large-scale disruption of its services....
The post Zero-Day Attack Takes Down Stock in the Channel, Disrupting IT Supply Chain appeared first on Penetration Testing Tools.
The “Human Factor”: Why a Next-Gen Linux Filesystem Is on the Ropes
The first release of the Linux 6.17 kernel has arrived—yet it contains no updates related to the bcachefs file system. And the reason lies not in technical shortcomings. On August 10, Linus Torvalds announced...
The post The “Human Factor”: Why a Next-Gen Linux Filesystem Is on the Ropes appeared first on Penetration Testing Tools.
Всё ещё бездумно сканируете QR-коды? Есть 4,2 миллиона причин дважды подумать в следующий раз
Cybersecurity jobs available right now: August 19, 2025
Senior Cybersecurity Analyst DOT Security | USA | On-site – View job details As a Senior Cybersecurity Analyst, you will lead the investigation of real-time alerts from SIEM platforms and other security tools, ensuring timely identification of potential threats. You will also perform in-depth forensic analysis of firewall logs, IDS/IPS alerts, and packet captures to validate or dismiss security events Principal Security Engineer Punt | Canada | On-site – View job details As a Principal … More →
The post Cybersecurity jobs available right now: August 19, 2025 appeared first on Help Net Security.
CMMC Level and Assessment Requirements for Defense Contractors
柯尔特电信遭遇WarLock勒索软件团伙攻击 被盗数据正出售
英国电信公司Colt Technology Services正遭遇网络攻击,已导致该公司部分业务中断多日,涉及托管、端口服务、Colt在线平台以及语音应用程序接口(Voice API)平台等。该公司透露,攻击始于8月12日,目前中断情况仍在持续,其IT工作人员正全天候工作以减轻攻击造成的影响。
据悉,柯尔特公司成立于1992年,最初名为伦敦金融城电信公司(简称COLT),2015年被富达投资(Fidelity Investments)收购。作为主要的电信服务提供商,它在欧洲、亚洲和北美洲的30个国家均开展业务,拥有7.5万公里的光纤网络,连接着900个数据中心。
业务仍处于离线状态
起初,该公司仅宣布出现“技术问题”,并未确认是网络安全事件。不过,在后续的状态更新中,说明了事件的性质。
为规避风险,该公司不得不让特定系统下线,这影响到了包括柯尔特在线平台和Voice API平台在内支持服务的运营。目前,柯尔特在线平台已无法运用,公司建议客户通过电子邮件或电话联系柯尔特,但需注意回复速度会比平时慢。
该公司强调,受影响的是支持服务系统,而非核心的客户网络基础设施。柯尔特表示已就该事件通知了有关部门,但未提供关于攻击者身份或攻击类型的任何细节。
WarLock声称实施了此次攻击
一名化名为“cnkjasdfgd”的网络犯罪分子自称是勒索软件团伙“WarLock”成员,声称实施了此次攻击,并以20万美元的价格出售据称从柯尔特窃取的100万份文件。
该威胁者还公布了几份数据样本以证明文件的真实性。据其称,被盗文件包括财务数据、员工信息、客户资料、高管相关数据、内部电子邮件以及软件开发信息等。
威胁者在黑客论坛上的帖子
尽管该公司未透露此次数据泄露的原因,但安全研究员表示,黑客可能是通过利用微软SharePoint中的一个远程代码执行漏洞(编号为CVE-2025-53770)获得了初始访问权限。
该安全漏洞至少从7月18日起就被当作零日漏洞利用,其严重程度被定为“危急”。微软已于7月21日通过安全更新修复了该漏洞。
据了解,黑客窃取了数百GB包含客户数据和相关文件的资料。有媒体就此事联系了柯尔特,对这些说法进行核实,该公司发言人表示“目前正在对这些说法进行调查。”