Aggregator
CVE-2025-63709 | SourceCodester Simple To-Do List System 1.0 Add Tasks cross site scripting
CVE-2025-46430 | Dell Display and Peripheral Manager up to 2.1.2.12 unnecessary privileges (dsa-2025-411)
CVE-2025-63712 | SourceCodester Product Expiry Management System delete-user.php cross-site request forgery
CVE-2025-63710 | SourceCodester Simple Public Chat Room 1.0 send_message.php cross-site request forgery
Why Organizations Can’t Ignore Vendor Risk Assessment in Today’s Cyber-Threat Landscape
MAD-CAT: Simulating Data Corruption Attacks on MongoDB, Elasticsearch, & More
MAD-CAT (Meow Attack Data Corruption Automation Tool) is a comprehensive security tool designed to simulate data corruption attacks
The post MAD-CAT: Simulating Data Corruption Attacks on MongoDB, Elasticsearch, & More appeared first on Penetration Testing Tools.
Akira
You must login to view this content
IncusOS — это ОС, которая всегда работает? Новая система обещает атомарные откаты и еженедельные патчи. Верим?
China-Aligned UTA0388 Uses AI Tools in Global Phishing Campaigns
SecWiki News 2025-11-10 Review
利用大模型辅助自动化 BYOVD 驱动漏洞挖掘 by ourren
SecWiki周刊(第610期) by ourren
social-analyzer: API, CLI, and Web App for a person's profile by ourren
第八届浙江省大学生网络与信息安全竞赛技能赛初赛题解 by ourren
更多最新文章,请访问SecWiki
AI, Adaptability, & Ease: What’s New in DataDome’s Q3 2025 Platform Updates
Discover DataDome’s Q3 2025 product & platform updates, including AI-driven fraud defense, adaptive protection, and new tools to control, monetize, and secure evolving AI traffic.
The post AI, Adaptability, & Ease: What’s New in DataDome’s Q3 2025 Platform Updates appeared first on Security Boulevard.
Chinese Cybersecurity Firm Data Breach Exposes State-Sponsored Hackers Cyber Weapons and Target List
In early November 2025, Knownsec, one of China’s largest cybersecurity firms with direct government ties, experienced a catastrophic data breach that exposed over 12,000 classified documents. The incident revealed the scale and sophistication of state-sponsored cyber operations, including detailed information about cyber weapons, internal hacking tools, and a comprehensive global surveillance target list. This breach […]
The post Chinese Cybersecurity Firm Data Breach Exposes State-Sponsored Hackers Cyber Weapons and Target List appeared first on Cyber Security News.