Aggregator
CVE-2026-41035 | Samba rsync up to 3.4.1 Qsort Call receive_xattr length length parameter (EUVD-2026-23215)
CVE-2024-2374 | WSO2 API Manager XML Parser xml external entity reference (EUVD-2024-27327)
CVE-2026-3995 | faridsaniee OPEN-BRAIN Plugin up to 0.5.0 on WordPress Setting sanitize_text_field API key cross site scripting (EUVD-2026-23213)
Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks
Beyond the Legacy: OpenSSL 4.0.0 Arrives with Encrypted Client Hello and Post-Quantum Prep
The OpenSSL Project has inaugurated a seminal update that profoundly reshapes both its internal architecture and its repertoire
The post Beyond the Legacy: OpenSSL 4.0.0 Arrives with Encrypted Client Hello and Post-Quantum Prep appeared first on Penetration Testing Tools.
Cargo theft malware actor spent a month inside a decoy network before researchers pulled the plug
Proofpoint researchers executed a malicious payload from a threat actor known to target trucking and logistics companies in late February 2026, doing so inside a decoy environment. The environment stayed compromised for more than 30 days, long enough for researchers to watch the actor work through their tools, scripts, and decisions beyond the initial break-in. The attacker had previously been documented targeting transportation carriers through compromised load board platforms, which are online marketplaces connecting shippers … More →
The post Cargo theft malware actor spent a month inside a decoy network before researchers pulled the plug appeared first on Help Net Security.
Sunk by a Script: How a Fuel System Breach Exposed the Global NYK Line Network
A Japanese maritime transport conglomerate has encountered a significant data breach following the compromise of its internal fuel
The post Sunk by a Script: How a Fuel System Breach Exposed the Global NYK Line Network appeared first on Penetration Testing Tools.
The Kernel Ghost: How Predator Spyware Hijacks iPhone NEON Registers to Vanish into iOS
The commercial spyware Predator has proven far more ingenious than previously surmised. Rather than merely infiltrating the iPhone’s
The post The Kernel Ghost: How Predator Spyware Hijacks iPhone NEON Registers to Vanish into iOS appeared first on Penetration Testing Tools.
国内首个!360推出Wmansvcs勒索软件专用解密服务
已遭活跃利用的 nginx-ui 漏洞可导致 Nginx 服务器遭完全接管
More than pretty pictures: Wendy Bishop on visual storytelling in tech
PowMix botnet targets Czech workforce
成果分享|[IEEE S&P 2025] HouseFuzz: 让模糊测试真正理解固件网络服务
ShadowLink Exposed: How Your Home Router Became a Puppet for Corporate Supply Chain Attacks
The compromise of a residential router may initially appear as a localized grievance, while the manipulation of code
The post ShadowLink Exposed: How Your Home Router Became a Puppet for Corporate Supply Chain Attacks appeared first on Penetration Testing Tools.
Hackers Abuse n8n AI Workflow Automation to Deliver Malware Through Trusted Webhooks
Cybercriminals have found a new way to sneak malware past traditional security filters by hijacking a legitimate AI workflow automation tool called n8n. Rather than building their own infrastructure from scratch, these threat actors are turning a productivity platform into a weapon, using it to send phishing emails and deliver dangerous payloads directly to victims’ […]
The post Hackers Abuse n8n AI Workflow Automation to Deliver Malware Through Trusted Webhooks appeared first on Cyber Security News.
Next-Gen Performance: NGINX 1.30.0 Stable Arrives with HTTP/2 Backend & Early Hints
Nginx has inaugurated the stable 1.30.0 release, successfully concluding an extensive developmental cycle within the 1.29.x branch. This
The post Next-Gen Performance: NGINX 1.30.0 Stable Arrives with HTTP/2 Backend & Early Hints appeared first on Penetration Testing Tools.