Aggregator
CVE-2025-8364 | Mozilla Firefox up to 140 on Android blob URL ui layer (EUVD-2025-25231)
CVE-2025-8041 | Mozilla Firefox up to 140 on Android Address Bar clickjacking (EUVD-2025-25233)
CVE-2025-8042 | Mozilla Firefox up to 140 on Android iFrame access control (EUVD-2025-25232)
Google fixed Chrome flaw found by Big Sleep AI
CodeRabbit’s Production Servers RCE Vulnerability Enables Write Access on 1M Repositories
A critical remote code execution (RCE) vulnerability in CodeRabbit’s production infrastructure that provided unauthorized access to over one million code repositories, including private ones. The vulnerability, discovered in December 2024 and responsibly disclosed in January 2025, exploited the platform’s static analysis tool integration to leak sensitive API credentials and gain write access to GitHub repositories […]
The post CodeRabbit’s Production Servers RCE Vulnerability Enables Write Access on 1M Repositories appeared first on Cyber Security News.
New Salty 2FA PhaaS Platform Targets Microsoft 365 Users to Steal Login Credentials
The majority of events globally are caused by phishing, which continues to be the most common vector for cyberattacks in the constantly changing world of cyber threats. The proliferation of affordable Phishing-as-a-Service (PhaaS) platforms such as Tycoon2FA, EvilProxy, and Sneaky2FA has exacerbated this issue, enabling even novice attackers to deploy sophisticated campaigns. These services are […]
The post New Salty 2FA PhaaS Platform Targets Microsoft 365 Users to Steal Login Credentials appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-55733 | ThinkInAIXYZ deepchat up to 0.3.0 URL code injection (GHSA-hqr4-4gfc-5p2j)
CVE-2025-52337 | LogicData eCommerce Framework 5.0.9.7000 Content Explorer Feature unrestricted upload
CVE-2025-51543 | Cicool 3.4.4 reset_password password recovery
CVE-2025-54143 | Mozilla Firefox up to 140 on iOS iFrame access control (EUVD-2025-25230)
CVE-2025-5262 | Mozilla Firefox up to 138 WebRTC vpx_codec_enc_init_multi memory corruption (EUVD-2025-25234 / Nessus ID 237301)
Взлом Lykke: «Мы просто хотели, чтобы у наших ракет было что-то новое и блестящее» — заявила КНДР
Agentic AI是否能化解网络安全危机?
Microsoft fixes Windows upgrades failing with 0x8007007F error
BARK: BloodHound Attack Research Kit
BloodHound Attack Research Kit BARK stands for BloodHound Attack Research Kit. It is a PowerShell script built to assist the BloodHound Enterprise team with researching and continuously validating abuse primitives. BARK currently focuses on...
The post BARK: BloodHound Attack Research Kit appeared first on Penetration Testing Tools.
Pharmaceutical firm Inotiv discloses ransomware attack. Qilin group claims responsibility for the hack
Privacy Sandbox: когда 'защита приватности' превращается в инструмент тотальной слежки
Legitimate Chrome VPN With 100,000+ Installs Silently Captures Screenshots and Exfiltrate Sensitive Data
A Chrome VPN extension with over 100,000 installations and verified badge status has been discovered operating as sophisticated spyware, continuously capturing user screenshots and exfiltrating sensitive data without consent. The extension, known as FreeVPN.One, masqueraded as a legitimate privacy tool while secretly implementing comprehensive surveillance capabilities that directly contradict its stated privacy promises. The malicious […]
The post Legitimate Chrome VPN With 100,000+ Installs Silently Captures Screenshots and Exfiltrate Sensitive Data appeared first on Cyber Security News.
AWSGoat: Damn Vulnerable AWS Infrastructure
Compromising an organization’s cloud infrastructure is like sitting on a gold mine for attackers. And sometimes, a simple misconfiguration or a vulnerability in web applications, is all an attacker needs to compromise the entire...
The post AWSGoat: Damn Vulnerable AWS Infrastructure appeared first on Penetration Testing Tools.