Aggregator
Threat Actors Leverage YouTubers to Attack Windows Systems Via SilentCryptoMiner
Security researchers have uncovered a sophisticated malware campaign where threat actors are coercing popular YouTubers to distribute SilentCryptoMiner malware disguised as restriction bypass tools. This campaign has already affected more than 2,000 victims in Russia, with the actual number potentially much higher. The malware leverages Windows Packet Divert drivers, a technology increasingly used in utilities […]
The post Threat Actors Leverage YouTubers to Attack Windows Systems Via SilentCryptoMiner appeared first on Cyber Security News.
CVE-2024-56830 | Perl always uses Perl Net::EasyTCP Package up to 0.26 rand weak prng (ID 184 / Nessus ID 231868)
CVE-2025-21661 | Linux Kernel up to 6.12.9 virtuser platform_device_register_full memory leak (Nessus ID 231865)
CVE-2024-5841 | Google Chrome up to 125.0.6422.141 V8 use after free (ID 326765 / Nessus ID 231872)
CVE-2024-8986 | grafana-plugin-sdk-go Grafana Plugin SDK up to 0.249.0 insufficiently protected credentials (Nessus ID 231875)
CVE-2025-22870 | Google Go up to 1.23.6/1.24.0 IPv6 Zone ID Privilege Escalation (Nessus ID 232161)
CVE-2025-27826 | Bootstrap Lite Theme prior 1.x-1.4.5 on Backdrop cross site scripting (core-2025-005)
CVE-2025-27825 | Bootstrap 5 Lite Theme prior 1.x-1.0.3 on Backdrop cross site scripting (trib-2025-004)
CVE-2025-27823 | Mail Disguise Module prior 1.x-1.0.5 on Backdrop cross site scripting (trib-2025-007)
CVE-2024-42733 | Docmosis Tornado up to 2.9.7 UNC Path Privilege Escalation (Issue 14)
CVE-2025-27824 | Link iframe Formatter Module prior 1.x-1.1.1 on Backdrop iFrame Field cross site scripting (trib-2025-003)
CVE-2025-27822 | Masquerade Module prior 1.x-1.0.1 on Backdrop authorization (trib-2025-006)
Getting Access to Internal Networks Via Physical Pentest – Case Study
Physical penetration testing provides crucial insights into real-world security vulnerabilities that might be overlooked in purely digital assessments. A recent case study conducted by Hackmosphere for a furniture retailer, referred to as ExCorp, revealed how physical access to facilities could compromise internal networks despite robust cybersecurity measures. The penetration test identified four critical vulnerabilities that […]
The post Getting Access to Internal Networks Via Physical Pentest – Case Study appeared first on Cyber Security News.