Aggregator
CVE-2005-3054 | PHP 4.4.0 curl/gd information disclosure (Nessus ID 20624 / ID 12201)
RemoteMonologue: New Windows Technique Weaponizes DCOM for NTLM Credential Harvesting
RemoteMonologue is a Windows credential harvesting technique that enables remote user compromise by leveraging the Interactive User RunAs key and coercing NTLM authentications via DCOM. Features 🔹 Authentication Coercion via DCOM (-dcom) Targets three DCOM...
The post RemoteMonologue: New Windows Technique Weaponizes DCOM for NTLM Credential Harvesting appeared first on Penetration Testing Tools.
Week in review: Backdoor found in SOHO devices running Linux, high-risk WinRAR RCE flaw patched
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Stealthy backdoor found hiding in SOHO devices running Linux SecurityScorecard’s STRIKE team has uncovered a network of compromised small office and home office (SOHO) devices they’re calling LapDogs. High-risk WinRAR RCE vulnerability patched, update quickly! (CVE-2025-6218) A recently patched directory traversal vulnerability (CVE-2025-6218) in WinRAR could be leveraged by remote attackers to execute arbitrary code on affected installations. Breaking the … More →
The post Week in review: Backdoor found in SOHO devices running Linux, high-risk WinRAR RCE flaw patched appeared first on Help Net Security.
“LapDogs” Unmasked: China-Linked Actors Build Covert ORB Network on 1,000+ SOHO Devices for Espionage
In a sweeping espionage campaign dubbed LapDogs, over a thousand small office and home office devices were compromised. Researchers from the STRIKE team at SecurityScorecard reported that the attack was linked to Chinese threat...
The post “LapDogs” Unmasked: China-Linked Actors Build Covert ORB Network on 1,000+ SOHO Devices for Espionage appeared first on Penetration Testing Tools.
CISA, FBI, NSA Urge Software Industry: Adopt Memory-Safe Languages to Drastically Cut Vulnerabilities
The leading cybersecurity agencies in the United States—CISA and the NSA—have issued a joint report urging software developers to adopt so-called memory-safe programming languages. These are technologies inherently designed to protect against critical memory-related...
The post CISA, FBI, NSA Urge Software Industry: Adopt Memory-Safe Languages to Drastically Cut Vulnerabilities appeared first on Penetration Testing Tools.
Linux Gains “Tyr”: New Rust-Written Graphics Driver for Arm Mali GPUs Unveiled
On Friday evening, a surprising announcement introduced Tyr—a new graphics driver for the Linux kernel, written in Rust. Designed to support modern Arm Mali GPUs, the driver interfaces with the Direct Rendering Manager. Despite...
The post Linux Gains “Tyr”: New Rust-Written Graphics Driver for Arm Mali GPUs Unveiled appeared first on Penetration Testing Tools.
Windows 11 24H2 Preview (KB5060829) Unveils Seamless PC Migration & Taskbar Improvements
Microsoft has released the preview update KB5060829 for Windows 11 version 24H2, encompassing 38 technical enhancements, including refinements to the taskbar and a new tool for seamless data migration between devices. Classified as an...
The post Windows 11 24H2 Preview (KB5060829) Unveils Seamless PC Migration & Taskbar Improvements appeared first on Penetration Testing Tools.
African Financial Institutions Targeted: “CL-CRI-1014” IAB Uses Open-Source Tools & Forged Signatures for Covert Access
For nearly a year, a hacker collective has been orchestrating a large-scale campaign targeting the financial sector across Africa. Experts from Unit 42 at Palo Alto Networks have sounded the alarm, tracking this operation...
The post African Financial Institutions Targeted: “CL-CRI-1014” IAB Uses Open-Source Tools & Forged Signatures for Covert Access appeared first on Penetration Testing Tools.
Флешка, которая растворится в воде. Экологи аплодируют, криминал — в полном восторге
Microsoft 365 “Direct Send” Abused: Phishing Campaign Spoofs Internal Users, Bypasses Security
Researchers at Varonis Threat Labs have uncovered a new phishing campaign in which attackers exploit a little-known Microsoft 365 feature known as Direct Send. Originally intended for sending emails from internal devices such as...
The post Microsoft 365 “Direct Send” Abused: Phishing Campaign Spoofs Internal Users, Bypasses Security appeared first on Penetration Testing Tools.
Urgent Cisco ISE/ISE-PIC Alert: Two Critical RCE Flaws (CVSS 10.0) Allow Unauthenticated Root Access
Cisco has released critical security updates to address two severe vulnerabilities in its network security products. Both issues affect Cisco Identity Services Engine (ISE) and its associated component, the ISE Passive Identity Connector (ISE-PIC)....
The post Urgent Cisco ISE/ISE-PIC Alert: Two Critical RCE Flaws (CVSS 10.0) Allow Unauthenticated Root Access appeared first on Penetration Testing Tools.
Rhysida
You must login to view this content