Pentesting News
🥷🏼 → Cybersecurity → Pentesting → ReadTeam → OSINT → Offensive Security → Reverse → Malware Analisys 🎥 Video t.me/HackerVideos ❣️Donate t.me/PentestingNews/25159
Show moreData loading in progress...
Find out who reads your channel
This graph will show you who besides your subscribers reads your channel and learn about other sources of traffic.Posts | Views | Shares | Views dynamics |
01 What can we learn from the passwords used in brute-force attacks?
https://blog.talosintelligence.com/threat-source-newsletter-may-2-2024/ | 342 | 1 | Loading... |
02 Cuttlefish 0-click Malware Hijacks Routers & Captures Data
https://gbhackers.com/cuttlefish-malware-zero-click-data-capture/ | 151 | 0 | Loading... |
03 LayerX Security Raises $24M for its Browser Security Platform, Enabling Employees to Work Securely from Any Browser, Anywhere
https://cybersecuritynews.com/layerx-security-raises-24m-for-its-browser-security-platform/ | 202 | 0 | Loading... |
04 Introducing Artifact Attestations–now in public beta
https://github.blog/2024-05-02-introducing-artifact-attestations-now-in-public-beta/ | 311 | 0 | Loading... |
05 Path Traversal Vulnerability In Popular Android Apps Let Attackers Overwrite Files
https://cybersecuritynews.com/path-traversal-android-apps-vulnerability/ | 106 | 0 | Loading... |
06 ArcaneDoor Hackers Who Exploited Cisco Firewall Zero-Days Linked To China
https://cybersecuritynews.com/arcanedoor-cisco-hackers-china/ | 90 | 0 | Loading... |
07 ArubaOS Critical Vulnerability Let Attackers Execute Remote Code
https://gbhackers.com/arubaos-critical-vulnerability-remote-code-execution/ | 82 | 0 | Loading... |
08 CISA Warns Of Hackers Actively Attacking GitLab Password Reset Vulnerability
https://cybersecuritynews.com/cisa-gitlab-password-reset-warning/ | 86 | 0 | Loading... |
09 VNC Is The Hacker’s New Remote Desktop Tool For Cyber Attacks
https://gbhackers.com/vnc-cyber-attacks-remote-desktop-security/ | 78 | 0 | Loading... |
10 Threat actors hacked the Dropbox Sign production environment
https://securityaffairs.com/162654/hacking/dropbox-sign-production-environment-hacked.html | 74 | 0 | Loading... |
11 Hackers Claiming Breach of UAE Government Servers
https://gbhackers.com/hackers-claiming-breach-2/ | 71 | 0 | Loading... |
12 NCSC Warns of Russian Hackers Attacking Critical National Infrastructure
https://cybersecuritynews.com/ncsc-warns-russian-hackers/ | 73 | 0 | Loading... |
13 Microsoft introduces passkeys for consumer accounts
https://www.microsoft.com/en-us/security/blog/2024/05/02/microsoft-introduces-passkeys-for-consumer-accounts/ | 74 | 0 | Loading... |
14 CISA adds GitLab flaw to its Known Exploited Vulnerabilities catalog
https://securityaffairs.com/162646/security/gitlab-known-exploited-vulnerabilities-catalog.html | 72 | 0 | Loading... |
15 Horizon3.ai Appoints Matt Hartley as Chief Revenue Officer to Spearhead Growth Initiatives
https://www.businesswire.com/news/home/20240502283399/en/Horizon3.ai-Appoints-Matt-Hartley-as-Chief-Revenue-Officer-to-Spearhead-Growth-Initiatives#new_tab | 72 | 0 | Loading... |
16 Russian Hackers Actively Attacking Small-scale Infrastructure Sectors
https://gbhackers.com/hackers-attacking-infrastructure-sectors/ | 81 | 0 | Loading... |
17 New macOS Adload Malware Bypasses Built-in macOS Antivirus Detection
https://cybersecuritynews.com/new-macos-adload/ | 64 | 0 | Loading... |
18 Threat Actors Attacking MS-SQL Servers to Deploy Ransomware
https://gbhackers.com/ms-sql-deploy-ransomware/ | 66 | 0 | Loading... |
19 Termo-Kali : A Guide To Installing Kali Linux On Android via Termux
https://kalilinuxtutorials.com/termo-kali/ | 79 | 0 | Loading... |
20 LiCo-Extrator : Revolutionizing Icon Extraction Across Platforms
https://kalilinuxtutorials.com/lico-extrator/ | 71 | 1 | Loading... |
21 CVE-2024-4439: Unauthenticated Stored Cross-Site Scripting Vulnerability in WordPress Core
https://securityonline.info/cve-2024-4439-unauthenticated-stored-cross-site-scripting-vulnerability-in-wordpress-core/ | 94 | 1 | Loading... |
22 Microsoft Researcher to Unveil 4 OpenVPN Zero-Day Vulnerabilities at Black Hat USA 2024
https://securityonline.info/microsoft-researcher-to-unveil-4-openvpn-zero-day-vulnerabilities-at-black-hat-usa-2024/ | 91 | 0 | Loading... |
23 CVE-2024-30251: Denial of Service Vulnerability in aiohttp Threatens Web Services
https://securityonline.info/cve-2024-30251-denial-of-service-vulnerability-in-aiohttp-threatens-web-services/ | 78 | 0 | Loading... |
24 CVE-2024-33530: Jitsi Meet Flaw Leaks Meeting Passwords, Exposing Calls to Intruders
https://securityonline.info/cve-2024-33530-jitsi-meet-flaw-leaks-meeting-passwords-exposing-calls-to-intruders/ | 75 | 0 | Loading... |
25 Compromised Routers: Tool of Choice for Crime & Espionage
https://securityonline.info/compromised-routers-tool-of-choice-for-crime-espionage/ | 83 | 0 | Loading... |
26 NTLM Relay Gat: automate the exploitation of NTLM relays
https://securityonline.info/ntlm-relay-gat-automate-the-exploitation-of-ntlm-relays/ | 101 | 1 | Loading... |
27 Mal.Metrica Malware Exploits WordPress Vulnerabilities: 17,000+ Sites Hit
https://securityonline.info/mal-metrica-malware-exploits-wordpress-vulnerabilities-17000-sites-hit/ | 99 | 0 | Loading... |
28 Microsoft Graph API Exploited for Stealthy Attacks
https://securityonline.info/microsoft-graph-api-exploited-for-stealthy-attacks/ | 73 | 1 | Loading... |
29 CEO who sold fake Cisco devices to US military gets 6 years in prison
https://www.bleepingcomputer.com/news/security/ceo-who-sold-fake-cisco-devices-to-us-military-gets-6-years-in-prison/ | 74 | 0 | Loading... |
30 Bitwarden launches new MFA Authenticator app for iOS, Android
https://www.bleepingcomputer.com/news/software/bitwarden-launches-new-mfa-authenticator-app-for-ios-android/ | 77 | 0 | Loading... |
31 LayerX Security Raises $26M for its Browser Security Platform, Enabling Employees to Work Securely from Any Browser, Anywhere
https://latesthackingnews.com/2024/05/02/layerx-security-raises-26m-for-its-browser-security-platform-enabling-employees-to-work-securely-from-any-browser-anywhere/ | 84 | 0 | Loading... |
32 Police shuts down 12 fraud call centres, arrests 21 suspects
https://www.bleepingcomputer.com/news/security/police-shuts-down-12-fraud-call-centres-arrests-21-suspects/ | 81 | 0 | Loading... |
33 CISA urges software devs to weed out path traversal vulnerabilities
https://www.bleepingcomputer.com/news/security/cisa-urges-software-devs-to-weed-out-path-traversal-vulnerabilities/ | 162 | 0 | Loading... |
34 Bitwarden Launches Authenticator App for iOS and Android
https://restoreprivacy.com/bitwarden-launches-authenticator-app-for-ios-and-android/ | 84 | 0 | Loading... |
35 Microsoft warns of "Dirty Stream" attack impacting Android apps
https://www.bleepingcomputer.com/news/security/microsoft-warns-of-dirty-stream-attack-impacting-android-apps/ | 94 | 0 | Loading... |
36 CVE-2024-2887: A Pwn2Own Winning Bug in Google Chrome
https://www.thezdi.com/blog/2024/5/2/cve-2024-2887-a-pwn2own-winning-bug-in-google-chrome | 91 | 0 | Loading... |
37 Dropbox Sign e-signature service hacked | Kaspersky official blog
https://www.kaspersky.com/blog/dropbox-sign-breach/51159/ | 102 | 0 | Loading... |
38 REvil hacker behind Kaseya ransomware attack gets 13 years in prison
https://www.bleepingcomputer.com/news/security/revil-hacker-behind-kaseya-ransomware-attack-gets-13-years-in-prison/ | 123 | 0 | Loading... |
39 Microsoft won't fix Windows 0x80070643 errors, manual fix required
https://www.bleepingcomputer.com/news/microsoft/microsoft-wont-fix-windows-0x80070643-errors-manual-fix-required/ | 191 | 0 | Loading... |
40 Cybersecurity consultant arrested after allegedly extorting IT firm
https://www.bleepingcomputer.com/news/legal/cybersecurity-consultant-arrested-after-allegedly-extorting-it-firm/ | 206 | 0 | Loading... |
There are some classics on this list — the ever-present “Password” password, Passw0rd (with a zero, not an “O”) and “123456.”
Cuttlefish is a new malware platform that has been identified to be active since at least July 2023.This malware platform specifically
“We’ve transformed workforce protection for organizations without requiring the transition to a dedicated secure browser.
Generate and verify signed attestations for anything you make with GitHub Actions.
The reason why hackers aim at well-known Android applications is that many people use them, and this means that when they attack it can impact
Hackers target Cisco Firewalls due to their widespread use and the potential to exploit vulnerabilities to gain unauthorized access, steal
Multiple vulnerabilities have been discovered in ArubaOS that affects HPE Aruba Networking devices including Mobility Conductor,
Washington, D.C., May 1, 2024 – The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert concerning a newly
Remote desktop software, while facilitating remote work, presents security challenges for IT teams due to the use of various tools and ports
Threat actors breached the Dropbox Sign production environment and accessed customer email addresses and hashed passwords