Aggregator
PureHVNC RAT Developers Leverage GitHub Host Source Code
The PureHVNC remote administration tool (RAT) has emerged as a sophisticated component of the Pure malware family, gaining prominence in mid-2025 amid an uptick in targeted intrusion campaigns. Originating from underground forums and Telegram channels, PureHVNC is marketed by its author, known as PureCoder, alongside companion tools such as PureCrypter, PureLogs, and PureMiner. Its adoption […]
The post PureHVNC RAT Developers Leverage GitHub Host Source Code appeared first on Cyber Security News.
CVE-2024-40974 | Linux Kernel up to 6.9.6 on LLVM plpar_hcall array index (Nessus ID 207802)
CVE-2024-40979 | Linux Kernel up to 6.9.6 ath12k_qmi_msg_mem_request_cb allocation of resources (bb50a4e711ff/303c017821d8)
CVE-2024-40993 | Linux Kernel up to 6.1.95/6.6.35/6.9.6/6.10-rc3/6.10-rc4 ipset rcu_dereference_protected null pointer dereference (Nessus ID 213470)
CVE-2024-40978 | Linux Kernel up to 6.9.6 qedi_dbg_do_not_recover_cmd_read stack-based overflow (Nessus ID 207802)
CVE-2024-40940 | Linux Kernel up to 6.1.94/6.6.34/6.9.5 mlx5_lag_create_port_sel_table double free (Nessus ID 209512)
CVE-2024-40943 | Linux Kernel up to 6.9.5 ocfs2_remove_extent allocation of resources (Nessus ID 207802)
CVE-2025-1087 | Kong Insomnia Desktop Application up to 11.0.2 Template cross site scripting (EUVD-2025-14165)
CVE-2024-40953 | Linux Kernel up to 6.1.95/6.6.35/6.9.6 kvm_vcpu_on_spin out-of-bounds (Nessus ID 210654)
CVE-2024-40968 | Linux Kernel up to 6.9.6 Octeon denial of service (Nessus ID 207802)
CVE-2024-40942 | Linux Kernel up to 6.9.5 mesh_path_flush_pending information disclosure (Nessus ID 207802)
Many networking devices are still vulnerable to pixie dust attack
Despite having been discovered and reported in 2014, the vulnerability that allows pixie dust attacks still impacts consumer and SOHO networking equipment around the world, NetRise researchers have confirmed. WPS and the pixie dust attack Wi-Fi Protected Setup (WPS) allows users to connect to their network by using an eight-digit pin instead of a password. “[A pixie dust attack] targets weaknesses in the Wi-Fi Protected Setup protocol, exploiting poor entropy in key generation,” the company … More →
The post Many networking devices are still vulnerable to pixie dust attack appeared first on Help Net Security.
CVE-2025-55904 | Open5GS up to 2.7.5 lib/sbi/message.c parse_multipart null pointer dereference (ID 3942 / EUVD-2025-29720)
CVE-2025-50709 | Perplexity AI GPT-4 GET Parameter information disclosure (EUVD-2025-29718)
Qilin
You must login to view this content
Windows Screenshot Utility Greenshot Vulnerability Enable Malicious code execution – PoC Released
A critical security flaw has been discovered in Greenshot, a popular open-source screenshot utility for Windows. The vulnerability allows a local attacker to execute arbitrary code within the Greenshot process, potentially enabling them to bypass security measures and carry out further attacks. A proof-of-concept (PoC) exploit has been released, demonstrating the severity of the issue. […]
The post Windows Screenshot Utility Greenshot Vulnerability Enable Malicious code execution – PoC Released appeared first on Cyber Security News.
DEF CON 33: Andra Lezza On Being A DC Speake
Creators, Authors and Presenters: Helvetigoth interviews Andra Lezza
Our sincere appreciation to DEF CON, and the Creators/Presenters/Authors for publishing their timely DEF CON 33 outstanding content. Originating from the conference's events located at the Las Vegas Convention Center; and via the organizations YouTube channel.
The post DEF CON 33: Andra Lezza On Being A DC Speake appeared first on Security Boulevard.