cookie

We use cookies to improve your browsing experience. By clicking «Accept all», you agree to the use of cookies.

avatar

Pentesting News

🥷🏼 → Cybersecurity → Pentesting → ReadTeam → OSINT → Offensive Security → Reverse → Malware Analisys 🎥 Video t.me/HackerVideos ❣️Donate t.me/PentestingNews/25159

Show more
Advertising posts
7 333Subscribers
+5724 hours
+3407 days
+1 35930 days

Data loading in progress...

Subscriber growth rate

Data loading in progress...

Suspected CoralRaider continues to expand victimology using three information stealers https://blog.talosintelligence.com/suspected-coralraider-continues-to-expand-victimology-using-three-information-stealers/
Show all...
Suspected CoralRaider continues to expand victimology using three information stealers

Talos also discovered a new PowerShell command-line argument embedded in the LNK file to bypass anti-virus products and download the final payload into the victims’ host.

UnitedHealth Group Ransomware Attack : Hackers Stolen Patients Data https://cybersecuritynews.com/unitedhealth-ransomware-attack/
Show all...
UnitedHealth Group Ransomware Attack : Hackers Stolen Patients Data

The global American health insurance and services corporation UnitedHealth Group has announced that its health IT subsidiary Change

Russia-linked APT28 used post-compromise tool GooseEgg to exploit CVE-2022-38028 Windows flaw https://securityaffairs.com/162154/apt/apt28-gooseegg-tool-win-bug.html
Show all...
Russia-linked APT28 used tool GooseEgg for to exploit Win bug

Russia-linked APT28 group used a previously unknown tool, dubbed GooseEgg, to exploit Windows Print Spooler service flaw.

Show all...
Mastering Shodan Search Engine

Shodan Dorking lets you find many things — servers, webcams, washing machines, etc. It could be a true gold mine in your Bug Bounty…

Show all...
Exploiting Symlinks: A Deep Dive into CVE-2024–28185 and CVE-2024–28189 of Judge0 Sandboxes

Explore the intricate vulnerabilities CVE-2024–28185 and CVE-2024–28189 in Judge0, focusing on symlink attacks that enable code execution…

Show all...
Email Verification Bypass via Remember Me

Today I will tell you my finding of email verification that I found accidently.

Show all...
Typo Trouble: Exploring the Telegram Python RCE Vulnerability

Telegram’s Windows application was recently updated to address a critical zero-day flaw that permitted the execution of Python scripts…

Show all...
Information Disclosure: Story of 500€ + 400$ Bounty

Hi, Fellow Hunters, Ram Ram Bhyi Sarya Ne,

Show all...
Demystifying Password Cracking: Attacks and Defence Strategies

How passwords can get hacked and ways to stop them

Show all...
Active DNS Recon using AXIOM

Are you interested in getting a lot of subdomains of big targets? You will learn how you can do active DNS bruteforce using puredns.