Aggregator
Eight Countries Face EU Action Over NIS2 Deadline Failings
Report Reveals Tool Overload Driving Fatigue and Missed Threats in MSPs
Update WinRAR tools now: RomCom and others exploiting zero-day vulnerability
安全热点周报:AI 编辑器 Cursor 漏洞致远程代码执行,软件供应链面临威胁
Just Two Flaws in a Car Manufacturer’s Portal Allowed a Researcher to Unlock Cars and Expose Data
A vulnerability was discovered in the online access system for auto dealers of one of the world’s largest car manufacturers—uncovered simply by examining the page’s code. Security researcher Eitan Zwer of Harness reported that...
The post Just Two Flaws in a Car Manufacturer’s Portal Allowed a Researcher to Unlock Cars and Expose Data appeared first on Penetration Testing Tools.
CVE-2025-8661 | Broadcom Symantec PGP Encryption 11.0.1 cross site scripting
CVE-2025-8660 | Broadcom Symantec PGP Encryption 11.0.1 privilege escalation
CVE-2025-8747 | Google Keras up to 3.10.0 Model.load_model deserialization
New ‘Odyssey Stealer’ Malware Hijacks macOS, Steals Crypto with ClickFix
Researchers at Forcepoint X-Labs have identified a new malware campaign targeting macOS users. The attack employs an enhanced ClickFix technique—combining phishing with social engineering—to steal data from cryptocurrency wallets, browser accounts, and confidential files....
The post New ‘Odyssey Stealer’ Malware Hijacks macOS, Steals Crypto with ClickFix appeared first on Penetration Testing Tools.
New ‘Win-DDoS’ Attack Turns Windows Servers Into a Global Botnet
At DEF CON 33, researchers from SafeBreach unveiled a new attack technique dubbed Win-DDoS, capable of transforming thousands of publicly accessible domain controllers (DCs) worldwide into a powerful botnet for large-scale DDoS attacks. The...
The post New ‘Win-DDoS’ Attack Turns Windows Servers Into a Global Botnet appeared first on Penetration Testing Tools.
Your Webcam Can Be a Hacker’s Weapon: New ‘BadCam’ Attack Hijacks Lenovo Devices
Researchers at Eclypsium have uncovered critical vulnerabilities in the Lenovo 510 FHD and Lenovo Performance FHD webcams that allow them to be transformed into BadUSB-style attack devices. The issue, dubbed BadCam, was presented at...
The post Your Webcam Can Be a Hacker’s Weapon: New ‘BadCam’ Attack Hijacks Lenovo Devices appeared first on Penetration Testing Tools.
Smart Buses flaws expose vehicles to tracking, control, and spying
Минцифры представляет «детскую» SIM-карту, которая навсегда изменит доступ к интернету
Linus Torvalds Rejects ‘Garbage’ RISC-V Code, Delays It for Linux 6.17
Linus Torvalds delivered a sharp rebuke to the initial batch of RISC-V patches proposed for inclusion in Linux 6.17, citing both their untimely submission and the presence of what he called “garbage” changes unrelated...
The post Linus Torvalds Rejects ‘Garbage’ RISC-V Code, Delays It for Linux 6.17 appeared first on Penetration Testing Tools.
Debian 13 ‘trixie’ Is Here: What’s New in the Universal Operating System
After more than two years of development, the Debian Project has unveiled a new stable release of its operating system—Debian 13, codenamed trixie. It will receive updates and security fixes for five years, thanks...
The post Debian 13 ‘trixie’ Is Here: What’s New in the Universal Operating System appeared first on Penetration Testing Tools.
Record-Breaking Fraud: Older Americans Lost $700 Million to Scams in 2024
In 2024, Americans over the age of 60 lost an astronomical $700 million to online fraud—a record high in the entire history of monitoring by the U.S. Federal Trade Commission (FTC). The latest Consumer...
The post Record-Breaking Fraud: Older Americans Lost $700 Million to Scams in 2024 appeared first on Penetration Testing Tools.
GPT-5 Hacked in 24 Hours: Researchers Expose Critical Flaws in OpenAI’s New Model
After Grok-4 was compromised in just two days, GPT-5 fell within a mere 24 hours to the same group of researchers. Almost simultaneously, the SPLX testing team (formerly SplxAI) declared: “Out-of-the-box GPT-5 is practically...
The post GPT-5 Hacked in 24 Hours: Researchers Expose Critical Flaws in OpenAI’s New Model appeared first on Penetration Testing Tools.
Hackers Exploited a New WinRAR Flaw Before It Was Patched
A recently patched vulnerability in WinRAR, identified as CVE-2025-8088, was exploited in targeted phishing attacks even before a fix became available. The flaw, classified as a Directory Traversal vulnerability and addressed only in WinRAR...
The post Hackers Exploited a New WinRAR Flaw Before It Was Patched appeared first on Penetration Testing Tools.