Aggregator
CVE-2025-54072 | yt-dlp up to 2025.06.25 on Windows Command Line --exec os command injection (GHSA-45hg-7f49-5h56)
CVE-2025-54139 | haxtheweb haxcms up to 11.0.12 ui layer (GHSA-54vw-f4xf-f92j)
阿里巴巴发布 Qwen3-Coder
CVE-2025-54140 | pyLoad 0.5.0b3.dev89 Uploaded File Name /json/upload path traversal (GHSA-xqpg-92fq-grfg)
Kali Linux Unveils Two New Tools to Boost Wi-Fi Performance for Raspberry Pi Users
Kali Linux has announced the release of two groundbreaking packages that significantly enhance wireless penetration testing capabilities for Raspberry Pi users. The new brcmfmac-nexmon-dkms and firmware-nexmon packages, introduced in Kali Linux 2025.1, enable the onboard Wi-Fi interface on supported Raspberry Pi models to perform monitor mode operations and frame injection without requiring external USB adapters. […]
The post Kali Linux Unveils Two New Tools to Boost Wi-Fi Performance for Raspberry Pi Users appeared first on Cyber Security News.
微软称Windows 11 24H2是目前可靠性最好的版本 死机概率降低24%
关键信息基础设施商用密码使用管理规定
新型Android TapTrap攻击用不可见的UI对用户进行引导性欺骗
新型Android TapTrap攻击用不可见的UI对用户进行引导性欺骗
关键信息基础设施商用密码使用管理规定
Chinese Hackers Actively Exploiting SharePoint Servers 0-Day Flaw in the Wild
Microsoft has confirmed that Chinese state-sponsored threat actors are actively exploiting critical zero-day vulnerabilities in on-premises SharePoint servers, prompting urgent security warnings for organizations worldwide. The tech giant’s Security Response Center reported coordinated attacks targeting internet-facing SharePoint installations using newly disclosed vulnerabilities that enable authentication bypass and remote code execution. Key Takeaways1. CVE-2025-53770/53771 in on-premises […]
The post Chinese Hackers Actively Exploiting SharePoint Servers 0-Day Flaw in the Wild appeared first on Cyber Security News.
甲骨文云计算的超大客户原来是OpenAI 每年支付300亿美元使用云基础设施
Cervantes: Open-source, collaborative platform for pentesters and red teams
Cervantes is an open-source collaborative platform built for pentesters and red teams. It offers a centralized workspace to manage projects, clients, vulnerabilities, and reports, all in one place. By streamlining data organization and team coordination, it helps reduce the time and complexity involved in planning and executing penetration tests. As an open-source solution under the OWASP umbrella, it understands the specific needs of penetration testers from managing targets to organizing vulnerabilities, proof-of-concepts and remediation recommendations. … More →
The post Cervantes: Open-source, collaborative platform for pentesters and red teams appeared first on Help Net Security.
Госдума лишила мошенников любимого трюка. Новый закон превращает SIM с украденными деньгами в мёртвый номер
万物皆可人工智能!威联通(QNAP)为NAS推出外置边缘AI加速器提供3 TOPS算力
Coyote in the Wild: First-Ever Malware That Abuses UI Automation
JVN: DuraComm製SPM-500 DP-10iN-100-MUにおける複数の脆弱性
JVN: Lantronix製Provisioning ManagerにおけるXML外部エンティティ参照(XXE)の不適切な制限の脆弱性
Phishing simulations: What works and what doesn’t
Phishing is one of the oldest and most effective technique used by cybercriminals. No one is immune to them, not even internet security experts, as seen in the case of Troy Hunt, who recently fell for a phishing email. Before AI became mainstream, phishing emails often gave themselves away. They were full of grammar mistakes and awkward wording, making them easier to spot. That’s changed. Today’s phishing attacks are much more convincing, often looking just … More →
The post Phishing simulations: What works and what doesn’t appeared first on Help Net Security.