Aggregator
CVE-2025-9802 | RemoteClinic 2.0 /staff/profile.php ID sql injection (EUVD-2025-26366)
CVE-2025-9806 | Tenda F1202 1.2.0.9/1.2.0.14/1.2.0.20 Administrative Interface /etc_ro/shadow hard-coded credentials (EUVD-2025-26370)
Malicious npm Package nodejs-smtp Mimics Nodemailer, Targets Atomic and Exodus Wallets
Malicious npm Package nodejs-smtp Mimics Nodemailer, Targets Atomic and Exodus Wallets
CVE-2002-1710 | Basilix Webmail 1.1.0 HTTP POST privileges management (Nessus ID 14305 / ID 10805)
CVE-2002-1711 | Basilix Webmail 1.1.0 Attachment /tmp/BasiliX privileges management (Nessus ID 14306 / ID 10804)
CVE-2002-1715 | SSH up to 3 privileges management (EDB-21398 / ID 38097)
What the GitGuardian secrets sprawl report reveals about leaked credentials
In this Help Net Security video, Dwayne McDaniel, Senior Developer Advocate at GitGuardian, presents findings from The State of Secrets Sprawl 2025. McDaniel explains why generic secrets are especially difficult to detect, why private repositories pose an even greater risk, and how collaboration tools and Docker images have become overlooked sources of exposure. He also discusses the impact of AI coding assistants on security practices and the dangers of long-lived secrets and excessive permissions. The … More →
The post What the GitGuardian secrets sprawl report reveals about leaked credentials appeared first on Help Net Security.
Некрасивый — значит добрый? Соцсети негодуют из-за тренда на унизительные свидания
Warning: A New Phishing Campaign Is Targeting Senior Executives
Researchers at Stripe OLT’s SOC have uncovered a large-scale, targeted phishing campaign aimed at senior executives and top
The post Warning: A New Phishing Campaign Is Targeting Senior Executives appeared first on Penetration Testing Tools.
OldGremlin Ransomware Returns to Haunt Russian Businesses
Researchers at Kaspersky Lab have reported the resurgence of ransomware operations by the group OldGremlin, which has once
The post OldGremlin Ransomware Returns to Haunt Russian Businesses appeared first on Penetration Testing Tools.
一张卡片,不仅 AI 了我的工作,还摸清了我的八字和 MBTI?|AI 上新
North Korean Hackers Launch Widespread Cyberespionage Campaign
The North Korean threat group APT37 (also known as ScarCruft, InkySquid, Reaper, and Ricochet Chollima) has launched a
The post North Korean Hackers Launch Widespread Cyberespionage Campaign appeared first on Penetration Testing Tools.
Anatomy of an Attack: Inside a Massive Brute-Force Campaign
Between June and July 2025, researchers recorded hundreds of thousands of password brute-force attempts targeting SSL VPN and
The post Anatomy of an Attack: Inside a Massive Brute-Force Campaign appeared first on Penetration Testing Tools.
China Unveils a New Operating System to Challenge Windows and macOS
On August 26, China hosted the 2025 China Operating System Industry Conference, jointly organized by the China Copyright
The post China Unveils a New Operating System to Challenge Windows and macOS appeared first on Penetration Testing Tools.
Call Me an Idiot: How to Persuade an AI to Break Its Rules
Entrepreneur Dan Shapiro encountered an unexpected obstacle: a popular AI chatbot refused to transcribe business documents, citing copyright
The post Call Me an Idiot: How to Persuade an AI to Break Its Rules appeared first on Penetration Testing Tools.
Austria’s Ministry of the Interior Hit by Targeted Cyberattack
Austria’s Federal Ministry of the Interior (BMI) has fallen victim to a targeted cyberattack, details of which emerged
The post Austria’s Ministry of the Interior Hit by Targeted Cyberattack appeared first on Penetration Testing Tools.
Cybersecurity jobs available right now: September 2, 2025
CISO Shift Technology | France | Remote – View job details As a CISO, you will develop and execute a comprehensive enterprise information security strategy aligned with company goals and risk tolerance. Lead incident response efforts and continuously improve detection, response, and recovery capabilities. Conduct risk assessments and implement appropriate mitigation strategies. CISO Demandbase | USA | On-site – View job details As a CISO, you will establish governance and technical controls to ensure safe … More →
The post Cybersecurity jobs available right now: September 2, 2025 appeared first on Help Net Security.
Lazarus Group’s New Target: How North Korean Hackers Stole $14M from WOO X
On July 24, 2025, the cryptocurrency platform WOO X suffered a sophisticated targeted attack in which $14 million
The post Lazarus Group’s New Target: How North Korean Hackers Stole $14M from WOO X appeared first on Penetration Testing Tools.