Aggregator
CVE-2025-8971 | itsourcecode Online Tour and Travel Management System 1.0 travellers.php val-username sql injection
CVE-2025-8972 | itsourcecode Online Tour and Travel Management System 1.0 /admin/page-login.php email sql injection
CVE-2025-8955 | PHPGurukul Hospital Management System 4.0 /admin/edit-doctor.php docfees sql injection
Fighting fraud with AI: The new identity security playbook
In this Help Net Security video, Hal Lonas, CTO at Trulioo, talks about the rise of synthetic identity fraud and how it’s quickly becoming one of the biggest threats in financial crime. He breaks down how fraudsters are using generative AI to create fake but convincing documents and deepfakes that can fool both people and machines. Lonas also shares practical tips for fighting back, including smarter identity checks, AI-powered detection tools, and strategies that help … More →
The post Fighting fraud with AI: The new identity security playbook appeared first on Help Net Security.
JVN: Güralp Systems製Güralp FMUS SeriesおよびGüralp MIN Seriesにおける重要な機能に対する認証の欠如の脆弱性
CVE-2025-31961 | HCL Connections 8.0 insufficient granularity of access control (KB0123268)
CVE-2025-31987 | HCL Connections Docs 2.0.2 amplification (KB0123272)
CVE-2025-50861 | Lotus Cars App 1.2.8 on Android com.lotus.carsdomestic.intl improper authentication
CVE-2025-50862 | Lotus Cars App 1.2.8 on Android com.lotus.carsdomestic.intl missing access control
CVE-2025-51965 | OURPHP up to 8.6.1 My User Center Page Name cross site scripting
CVE-2024-51473 | IBM DB2/DB2 Connect Server up to 10.5.0.11/11.1.4.7/11.5.9/12.1.2 Query stack-based overflow (Nessus ID 243291 / WID-SEC-2025-1675)
A New Wave of EncryptHub Attacks: How a Microsoft Vulnerability and Social Engineering Collide
The Trustwave SpiderLabs research team has documented a fresh wave of EncryptHub attacks, in which the human element and the exploitation of a Microsoft Management Console (MMC) vulnerability converge into a single, cohesive campaign....
The post A New Wave of EncryptHub Attacks: How a Microsoft Vulnerability and Social Engineering Collide appeared first on Penetration Testing Tools.
“MadeYouReset”: A New HTTP/2 DDoS Attack Bypasses Rapid Reset Defenses
A newly discovered attack on the HTTP/2 protocol, dubbed MadeYouReset, has been unveiled by researchers from Tel Aviv University and disclosed following coordinated reporting through Akamai’s bug bounty program. Although Akamai’s own HTTP/2 implementation...
The post “MadeYouReset”: A New HTTP/2 DDoS Attack Bypasses Rapid Reset Defenses appeared first on Penetration Testing Tools.
Muddled Libra: The Evolving Cybercrime Collective That is a “Fool’s Errand” to Predict
The Muddled Libra network—also known as Scattered Spider or Octo Tempest—lacks the rigid hierarchy and centralized control typical of many cybercriminal organizations. Instead, it resembles a loosely connected community of individual threat actors, bound...
The post Muddled Libra: The Evolving Cybercrime Collective That is a “Fool’s Errand” to Predict appeared first on Penetration Testing Tools.
AI Browser Assistants Secretly Harvest Your Data, Study Finds
Researchers from University College London and the University of the Mediterranean in Reggio Calabria, Italy, have conducted the first large-scale investigation into privacy practices among generative AI assistants for web browsers, revealing that even...
The post AI Browser Assistants Secretly Harvest Your Data, Study Finds appeared first on Penetration Testing Tools.
每周勒索威胁摘要
Microsoft Azure Used to Store Vast Trove of Palestinian Surveillance Data, Investigation Reveals
Israel’s military intelligence unit, Unit 8200—specializing in cyber-espionage and electronic surveillance—has been using Microsoft’s cloud servers to store a vast archive of data on residents of Gaza and the West Bank. This trove, leveraged...
The post Microsoft Azure Used to Store Vast Trove of Palestinian Surveillance Data, Investigation Reveals appeared first on Penetration Testing Tools.
Google’s Android Hypervisor Achieves Highest Security Certification for Consumer Electronics
Google has announced that the protected KVM (pKVM) hypervisor, used within the Android Virtualization Framework, has become the world’s first software component for mass-market consumer electronics to achieve the SESIP Level 5 security certification....
The post Google’s Android Hypervisor Achieves Highest Security Certification for Consumer Electronics appeared first on Penetration Testing Tools.