Aggregator
【安全圈】国际刑警在非洲多国打掉网络犯罪团伙
【安全圈】“跨平台渗透!APT36黑客组织疑似攻破印度政府网络”
【安全圈】北京警方破获2000万美元比特币洗钱案
国家级认可 百度大模型安全护栏获工信部等十四部门正式授牌
How Prompt Injection Exposes Manus' VS Code Server to the Internet
Today we will cover a powerful, easy to use, autonomous agent called Manus. Manus is developed by the Chinese startup Butterfly Effect, headquartered in Singapore.
This post demonstrates an end-to-end indirect prompt injection attack leading to a compromise of Manus’ dev box.
This is achieved by tricking Manus to expose it’s internal VS Code Server to the Internet, and then sharing the URL and password with the atacker. Specifically, this post demonstrates that:
Хакеры запустили MLM-пирамиду из вредоносов — и превратили 10000 сайтов в саморазвивающиеся машины для взломов
Threat Actors Exploit Windows Scheduled Tasks for Stealthy Persistence Without Additional Tools
Threat actors continue to use Scheduled Tasks and other built-in Windows features to create persistence in the ever-changing world of cybersecurity threats, frequently avoiding the need of external tools or complex zero-day exploits. As of 2025, despite advancements in attack techniques such as rootkits and dead-drop command-and-control (C2) mechanisms, traditional methods remain prevalent due to […]
The post Threat Actors Exploit Windows Scheduled Tasks for Stealthy Persistence Without Additional Tools appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.