RedHunt-OS

A Linux based threat hunting and DFIR operating system built for blue team operations and adversary detection. This article has been indexed from CyberMaterial Read the original article: RedHunt-OS

Apache Airflow Flaws Expose Sensitive Workflow Data to Potential Attackers

Apache Airflow has patched two separate credential-exposure vulnerabilities in versions before 3.1.6.   The flaws could allow attackers to extract sensitive authentication data embedded in proxy configurations and templated workflow fields through log files and the web UI, potentially compromising network infrastructure and…

The Hidden Risk of Orphan Accounts

The Problem: The Identities Left Behind As organizations grow and evolve, employees, contractors, services, and systems come and go – but their accounts often remain. These abandoned or “orphan” accounts sit dormant across applications, platforms, assets, and cloud consoles. The…

Police Bust Thai Based Voice Phishing Ring

Authorities in Seoul recently dismantled a Thailand-based voice phishing organization responsible for stealing approximately 7 billion won from dozens of victims. This article has been indexed from CyberMaterial Read the original article: Police Bust Thai Based Voice Phishing Ring

WPair Scanner Released to Detect WhisperPair Flaw in Google’s Fast Pair Protocol

An open-source Android application designed to identify and test devices vulnerable to CVE-2025-36911, a critical authentication bypass flaw in Google’s Fast Pair Bluetooth protocol. The vulnerability, commonly referred to as WhisperPair, affects millions of Bluetooth audio devices worldwide, enabling unauthorised…

New Study Finds GPT-5.2 Can Reliably Develop Zero-Day Exploits at Scale

Advanced large language models can autonomously develop working exploits for zero-day vulnerabilities, marking a significant shift in the offensive cybersecurity landscape. The research demonstrates that artificial intelligence systems can now perform complex exploit development tasks that previously required specialized human…

Spear-Phishing Campaign Abuses Argentine Federal Court Rulings to Deliver Covert RAT

Seqrite Labs has uncovered a sophisticated spear-phishing campaign targeting Argentina’s judicial sector with a multi-stage infection chain designed to deploy a stealthy Rust-based Remote Access Trojan (RAT). The campaign primarily targets Argentina’s judicial institutions, legal professionals, justice-adjacent government bodies, and…

APT-Grade PDFSider Malware Used by Ransomware Groups

Providing cyberespionage and remote code execution capabilities, the malware is executed via DLL sideloading. The post APT-Grade PDFSider Malware Used by Ransomware Groups appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: APT-Grade PDFSider…