Aggregator
CVE-2025-26399
CVE-2025-43300
Rust в квадрате. ОС Redox научилась собирать Rust-приложения внутри самой себя
Qilin
You must login to view this content
从隐蔽流转异常到跨源关联分析,保旺达构建跨域缓慢漂移行为智能识别方案
谷歌高管警告:AI 驱动的网络攻击工具包“只是时间问题”
Qilin
You must login to view this content
Locking the Locks: How “RansomWhen” Unmasks the Identities Hijacking Your AWS S3 Buckets
RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as
The post Locking the Locks: How “RansomWhen” Unmasks the Identities Hijacking Your AWS S3 Buckets appeared first on Penetration Testing Tools.
Socelars Malware Attacking Windows Systems to Steal Sensitive Business Data
A dangerous information-stealing malware called Socelars is actively targeting Windows systems to collect sensitive authentication data, with particular focus on Facebook Ads Manager accounts and session cookies. Unlike traditional malware that causes immediate system damage, Socelars operates silently in the background, turning infected machines into gateways for account takeover and financial fraud. Socelars is sophisticated […]
The post Socelars Malware Attacking Windows Systems to Steal Sensitive Business Data appeared first on Cyber Security News.
The Hunter Becomes the Hunted: “Evil AI” WormGPT Suffers Massive Leak of 19,000 User Accounts
The WormGPT platform, notoriously recognized as an AI-augmented instrument for orchestrating cyber-offensives and infiltrations, has purportedly suffered a
The post The Hunter Becomes the Hunted: “Evil AI” WormGPT Suffers Massive Leak of 19,000 User Accounts appeared first on Penetration Testing Tools.
Under Siege: Microsoft Unveils “Valentine’s Day” Fixes for 6 Actively Exploited Zero-Days
Microsoft has disseminated its February Patch Tuesday security ensemble, a particularly dense release that addresses a staggering 58
The post Under Siege: Microsoft Unveils “Valentine’s Day” Fixes for 6 Actively Exploited Zero-Days appeared first on Penetration Testing Tools.
Emerging Ransomware BQTLock & GREENBLOOD Disrupt Businesses in Minutes
How long would it take your team to realize ransomware is already running? The newly identified ransomware families are already causing real business disruption. These threats can disrupt operations fast while also reducing visibility through stealth or cleanup activity, shrinking the time teams have to detect and contain the attack. Here’s what you should know about BQTLock and GREENBLOOD, and how your team can detect and contain them before […]
The post Emerging Ransomware BQTLock & GREENBLOOD Disrupt Businesses in Minutes appeared first on ANY.RUN's Cybersecurity Blog.
Digital Siege: How Singapore Thwarted UNC3886’s Surgical Strike on its Telecom Backbone
Singapore’s preeminent telecommunications providers have fallen prey to a sophisticated cyber espionage campaign orchestrated by the formidable adversarial
The post Digital Siege: How Singapore Thwarted UNC3886’s Surgical Strike on its Telecom Backbone appeared first on Penetration Testing Tools.
Sovereignty in Flux: Python’s Grip Loosens as Specialized “Security” Languages Surge in 2026
Python continues to command the zenith of the global programming hierarchy, yet its formidable margin of dominance has
The post Sovereignty in Flux: Python’s Grip Loosens as Specialized “Security” Languages Surge in 2026 appeared first on Penetration Testing Tools.
The Quantum Countdown: Why Google is Racing to Patch the Future of Global Encryption
Quantum computing, once relegated to the realm of speculative science fiction, is rapidly approaching practical manifestation. While promising
The post The Quantum Countdown: Why Google is Racing to Patch the Future of Global Encryption appeared first on Penetration Testing Tools.
U.S. CISA adds Microsoft Office and Microsoft Windows flaws to its Known Exploited Vulnerabilities catalog
Сетевой монстр на 102 терабита. Cisco показала, на чём на самом деле будет работать ИИ будущего
美国经济的巨量资金流向资本而不是劳工
Windows Shell Security Feature 0-Day Vulnerability Let Attackers Bypass Authentication
Microsoft released Microsoft Patch Tuesday updates to address a critical zero-day vulnerability in Windows Shell that is currently being actively exploited in the wild. Tracked as CVE-2026-21510, this security flaw allows remote attackers to bypass essential protection mechanisms, putting millions of Windows users at risk. The vulnerability is classified as a “Security Feature Bypass” with a […]
The post Windows Shell Security Feature 0-Day Vulnerability Let Attackers Bypass Authentication appeared first on Cyber Security News.