Aggregator
Kimsuky Hacked: Hackers Leak 8.9GB of Stolen Data and Tools from North Korean Group
The North Korean cyber-espionage group Kimsuky has unexpectedly found itself in the role of victim after two hackers — identifying themselves as the “antithesis of Kimsuky’s values” — infiltrated its infrastructure and released stolen...
The post Kimsuky Hacked: Hackers Leak 8.9GB of Stolen Data and Tools from North Korean Group appeared first on Penetration Testing Tools.
WinRAR Zero-Day (CVE-2025-8088) Exploited by RomCom Hackers, ESET Warns
The ESET research team has published a detailed analysis revealing how the cyber-espionage group RomCom exploited a previously unknown path-traversal vulnerability in WinRAR (CVE-2025-8088) to stealthily install malicious software on victims’ computers. This flaw...
The post WinRAR Zero-Day (CVE-2025-8088) Exploited by RomCom Hackers, ESET Warns appeared first on Penetration Testing Tools.
Keep SRC双倍赏金它又来了!!
Critical Erlang/OTP Flaw (CVE-2025-32433) Actively Exploited, Poses Major Threat to Industrial Networks
Researchers have determined that a critical flaw in the SSH stack implementation of Erlang/Open Telecom Platform had been actively exploited as early as May 2025, with roughly 70% of detections targeting firewalls safeguarding industrial...
The post Critical Erlang/OTP Flaw (CVE-2025-32433) Actively Exploited, Poses Major Threat to Industrial Networks appeared first on Penetration Testing Tools.
CVE-2025-0818 | Advanced File Manager Plugin on WordPress path traversal
CVE-2025-0818 | File Manager Plugin on WordPress path traversal
CVE-2025-0818 | File Manager Pro Plugin on WordPress path traversal
CVE-2025-8491 | Easy Restaurant Menu Manager Plugin up to 2.0.2 on WordPress nsc_eprm_save_menu cross-site request forgery
CVE-2025-8760 | INSTAR 2K+/4K 3.11.1 Build 1124 fcgi_server base64_decode Authorization buffer overflow (MZ-25-03 / EUVD-2025-24545)
CVE-2025-8761 | INSTAR 2K+/4K 3.11.1 Build 1124 Backend IPC Server denial of service (MZ-25-03 / EUVD-2025-24543)
CVE-2025-8762 | INSTAR 2K+/4K 3.11.1 Build 1124 UART Interface improper physical access control (MZ-25-03 / EUVD-2025-24544)
Phishing to PowerShell RAT: New Fileless Attack Targets Israeli Critical Infrastructure
Analysts from FortiMail Workspace Security have uncovered a targeted campaign against Israeli companies and organizations within critical infrastructure sectors. The attackers exploited a compromised internal email system to send highly convincing messages to regional...
The post Phishing to PowerShell RAT: New Fileless Attack Targets Israeli Critical Infrastructure appeared first on Penetration Testing Tools.
Telegram Fights Back: Platform Purges Channels Used for Extortion and Doxxing
Pavel Durov announced that over the past 20 days, Telegram has received hundreds of reports from users about cases of extortion and doxxing. Based on these complaints, the platform initiated a large-scale purge of...
The post Telegram Fights Back: Platform Purges Channels Used for Extortion and Doxxing appeared first on Penetration Testing Tools.
Saveitforparts: Receiving NOAA-15 One Last Time
AIOps Under Threat: Researchers Demonstrate How to Poison AI to Hack IT Infrastructure
Automation of IT infrastructure management through artificial intelligence, as revealed in a recent study by RSAC Labs and George Mason University, may carry substantial risks. The researchers found that AIOps solutions—systems leveraging models akin...
The post AIOps Under Threat: Researchers Demonstrate How to Poison AI to Hack IT Infrastructure appeared first on Penetration Testing Tools.
GPT-5 Under Fire: OpenAI’s Latest Model Faces Backlash and “Jailbreak” Flaws
No AI product in history has stirred such a tidal wave of anticipation as OpenAI’s long-awaited GPT-5. Yet, following its high-profile launch last week, the model swiftly found itself under fire—a troubling omen for...
The post GPT-5 Under Fire: OpenAI’s Latest Model Faces Backlash and “Jailbreak” Flaws appeared first on Penetration Testing Tools.