Aggregator
CVE-2012-10029 | Nagios XI Graph Explorer up to 1.2 visApi.php host os command injection (EUVD-2012-6575 / EDB-23227)
CVE-2025-8436 | projectworlds Online Admission System 1.0 /viewdoc.php ID sql injection
CVE-2025-51503 | Microweber CMS 2.0 User Profile cross site scripting (EUVD-2025-23298)
CVE-2025-8426 | Marvell QConvergeConsole 5.5.0.78 compressConfigFiles path traversal (ZDI-25-733 / EUVD-2025-23297)
Legitimate Tools, Malicious Intent: How Attackers Weaponize RMM Software
Trust in familiar IT tools is increasingly being weaponized by malicious actors: remote monitoring and management (RMM) solutions—originally designed for administration and support—are now leveraged for attacks, covert control, and data exfiltration. Security professionals...
The post Legitimate Tools, Malicious Intent: How Attackers Weaponize RMM Software appeared first on Penetration Testing Tools.
[修复指南] 谷歌Chrome v139.0更新翻车 部分用户遇到黑屏/灰屏/白屏
Urgent: Google Patches Actively Exploited Flaws in Android Devices
Google has released a series of urgent security updates for Android, addressing multiple critical vulnerabilities, including two actively exploited flaws within Qualcomm components. This round of patches places particular emphasis on CVE-2025-21479 (rated 8.6...
The post Urgent: Google Patches Actively Exploited Flaws in Android Devices appeared first on Penetration Testing Tools.
Flipper Zero DarkWeb Firmware Bypasses Rolling Code Security
Your Best Defense: New Study Shows Humans Can Spot Malware With Minimal Training
Although humans have traditionally been regarded as the weakest link in the cybersecurity chain, a new study by Canadian researchers reveals that even untrained individuals can effectively detect malicious software when provided with minimal...
The post Your Best Defense: New Study Shows Humans Can Spot Malware With Minimal Training appeared first on Penetration Testing Tools.
ClickFix: The Evolving Social Engineering Trick That’s Replacing Fake Updates
Over the past year, a social engineering technique known as ClickFix has witnessed a meteoric rise, propelled by a fusion of unique delivery methods, persuasive narratives, and sophisticated evasion tactics. According to analysts at...
The post ClickFix: The Evolving Social Engineering Trick That’s Replacing Fake Updates appeared first on Penetration Testing Tools.
AI Code Editor Vulnerability: A ‘Trusted’ Flaw Led to Remote Code Execution
The AI-powered code editor Cursor was recently found vulnerable to an attack technique dubbed “MCPoison” by the Check Point research team. This flaw enabled remote execution of arbitrary code on a developer’s machine, provided...
The post AI Code Editor Vulnerability: A ‘Trusted’ Flaw Led to Remote Code Execution appeared first on Penetration Testing Tools.
Tails vs Arch
工信部通报:23款APP及SDK存在侵害用户权益行为!内附举报攻略&防护六招
工信部通报:23款APP及SDK存在侵害用户权益行为!内附举报攻略&防护六招
根据中央网信办、工业和信息化部、公安部、市场监管总局等四部门联合发布的《关于开展2025年个人信息保护系列专项行动的公告》,依据《个人信息保护法》《网络安全法》《电信条例》《电信和互联网用户个人信息保护规定》等法律法规,工信部对APP、SDK违法违规收集使用个人信息等问题开展治理。近期,经组织第三方检测机构进行抽查,共发现23款APP及SDK存在侵害用户权益行为(详见附件),现予以通报。
在遇到侵害用户权益APP时,我们如何举报?日常使用APP过程中,如何防范个人信息泄露?小编为大家送上实用“防身术”,共筑个人信息安全防线,遇到侵权APP不用忍,可以这样举报:
一、记录侵权行为:准确记录APP的侵权行为、方式。
二、记录侵权APP信息:包括名字、版本号、下载平台等基本信息。
三、通过官方平台进行举报:举报方式可从以下任选其一。
① “工信微报”微信公众号:底部服务栏→我要投诉→手机应用软件↓↓
② “12321受理中心”微信公众号:底部服务栏→其他投诉→手机应用↓↓
③ 通过“平台商店”进行举报:
安卓用户:打开应用商店→选择要举报的应用→选择“举报”功能。
苹果用户:打开APP Store→选择要举报的应用→下拉找到“报告问题”。
鸿蒙用户:打开应用商店→选择要举报的应用→下拉选择“内容举报”。
防范个人信息泄露,这六招要牢记:
① 下载APP认准“正规超市”
避免通过第三方链接或非正规渠道下载APP,优先选择应用商店内经过安全认证的APP,以降低恶意软件或钓鱼程序的风险,更好地保护个人信息安全。
② 谨慎授权APP应用权限
安装或使用APP时,避免授予非必要的权限(如通讯录、定位、麦克风等)。建议开放与功能相关的基础权限,并定期在系统设置中检查权限管理,关闭冗余授权。
③ 警惕陌生链接与虚假弹窗
不随意点击APP内推送的广告、陌生链接,尤其是涉及“领现金”“中奖”等诱导性内容,防止误入钓鱼网站。
④ 定期给手机“做体检”
进入手机的隐私设置页面,查看APP隐私数据访问行为记录,对存在异常访问的APP予以清除,可以有效地防止个人隐私泄露的风险。
⑤ 使用高强度密码并开启双重验证
为账号设置包含大小写字母、数字及符号的复杂密码,避免重复使用同一密码。同时,开启短信验证、人脸识别等验证功能,增强账户安全性。
⑥ 及时更新应用与系统版本
定期更新APP至最新版本,修复已知漏洞。同时保持手机操作系统处于最新状态,以获取最新的安全补丁和防护措施。
来源:工业和信息化部政务新媒体“工信微报”
此次通报涉及的违规收集个人信息、信息窗口乱跳转/无法关闭、SDK信息公示不到位等问题,严重侵害用户隐私与合法权益。梆梆安全作为深耕个人信息保护领域多年的网络安全践行者,依托技术创新提供合规检测工具与服务,助力企业构建全生命周期风险防控体系,守护公众个人信息安全,推动移动应用生态在安全合规中稳健发展。