Aggregator
CVE-2025-4294 | HotelRunner B2B up to 03.06.2025 cross site scripting
CVE-2025-51860 | TelegAI 2025-05-26 Chat cross site scripting
CVE-2025-51858 | ChatPlayground.ai up to 2025-05-24 Chat cross site scripting
CVE-2025-51859 | Chaindesk up to 2025-05-26 Agent Chat cross site scripting (EUVD-2025-22327)
行业联盟对正式起诉欧盟 指责欧盟批准博通收购VMware造成不公平
Web 内存远程加载 .NET 文件 ,通过 Sharp4ExecMemory 绕过终端安全防护
.NET 内网攻防实战电子报刊
.NET 2025 年第 82 期实战工具库和资源汇总
Clorox Sues Cognizant for $380M, Alleges Gross Negligence Led to Devastating Cyberattack
Clorox has filed a lawsuit against the global IT services provider Cognizant, accusing the company of gross negligence that allegedly led to a devastating cyberattack in August 2023. According to the complaint, Cognizant—tasked with...
The post Clorox Sues Cognizant for $380M, Alleges Gross Negligence Led to Devastating Cyberattack appeared first on Penetration Testing Tools.
Admin Emails & Passwords Exposed via HTTP Method Change
招聘-安全服务工程师(郑州)
云环境下的PostgreSQL渗透
Arcus Media
You must login to view this content
Michael Ossmann Gives A First Look at the HackRF Pro in YouTube Video
Amazon Q Pulled After Malicious Pull Request Instructs AI to Delete User Files and AWS Resources
Amazon was forced to urgently withdraw a compromised version of its AI-powered programming assistant, Q, after a malicious instruction was covertly embedded into the system. This rogue directive prompted the assistant to exploit command-line...
The post Amazon Q Pulled After Malicious Pull Request Instructs AI to Delete User Files and AWS Resources appeared first on Penetration Testing Tools.
Mimo Strikes Magento & Docker: Evolved Cybercrime Group Unleashes Stealthy Cryptojacking & Proxyjacking
The cybercriminal group known as Mimo, previously recognized for its campaigns deploying cryptocurrency miners, has shifted its tactics, now targeting new vectors — notably the popular e-commerce platform Magento and misconfigured Docker instances. The...
The post Mimo Strikes Magento & Docker: Evolved Cybercrime Group Unleashes Stealthy Cryptojacking & Proxyjacking appeared first on Penetration Testing Tools.
Reverse Engineering for Bugs Part 1 - How I discovered My 1st 0day in Windows.
CVE-2025-53770
Android Malware: New Campaign Blends Click Fraud & Credential Theft via Fake Apps
Amid the growing popularity of Android smartphones in developing regions and the increasing accessibility of third-party app stores, cybercriminals have launched a large-scale campaign that combines two highly dangerous tactics—credential theft and click fraud—for...
The post Android Malware: New Campaign Blends Click Fraud & Credential Theft via Fake Apps appeared first on Penetration Testing Tools.