Reconnoitre automates network reconnaissance and service enumeration for penetration testers and red teams using structured, repeatable workflows. This article has been indexed from Darknet – Hacking Tools, Hacker News & Cyber Security Read the original article: Reconnoitre – Open-Source Reconnaissance…
Monsta FTP Remote Code Execution Vulnerability (CVE-2025-34299)
Critical flaw in Monsta FTP (CVE-2025-34299) allows remote code execution without authentication, putting thousands of servers at risk. The post Monsta FTP Remote Code Execution Vulnerability (CVE-2025-34299) appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet…
Android Devices Targeted By KONNI APT in Find Hub Exploitation
A new cyber-attack has been observed exploiting Google Find Hub to remotely wipe Android devices, linked to North Korean APTs This article has been indexed from www.infosecurity-magazine.com Read the original article: Android Devices Targeted By KONNI APT in Find Hub…
IT Security News Hourly Summary 2025-11-11 18h : 5 posts
5 posts were published in the last hour 16:36 : Fortinet Wins 2025 Red Dot Product Design Award for FortiGate Rugged Series 16:36 : Ivanti Endpoint Manager Vulnerabilities Let Attackers Write Arbitrary Files to Disk 16:36 : New VanHelsing Ransomware…
Fortinet Wins 2025 Red Dot Product Design Award for FortiGate Rugged Series
Fortinet has received the 2025 Red Dot Product Design Award for the FortiGate Rugged Series, recognizing its compact, purpose-built design that brings trusted Fortinet security to the industrial edge. This article has been indexed from Industry Trends & Insights…
Ivanti Endpoint Manager Vulnerabilities Let Attackers Write Arbitrary Files to Disk
Ivanti has rolled out security updates for its Endpoint Manager product, addressing three high-severity vulnerabilities that could let authenticated local attackers write arbitrary files anywhere on the system disk. The flaws, if exploited, pose significant risks to enterprise environments by…
New VanHelsing Ransomware RaaS Model Attacking Windows, Linux, BSD, ARM, and ESXi Systems
VanHelsing has emerged as a sophisticated ransomware-as-a-service operation that fundamentally changes the threat landscape for organizations worldwide. First observed on March 7, 2025, this multi-platform locker represents a significant escalation in ransomware deployment strategies by providing affiliates with a streamlined…
Researchers Uncover the Strong Links Between Maverick and Coyote Banking Malwares
Security researchers from CyberProof have discovered significant connections between two advanced banking trojans targeting Brazilian users and financial institutions. The Maverick banking malware, identified through suspicious file downloads via WhatsApp, shares remarkable similarities with the earlier reported Coyote malware campaign.…
North Korean spies turn Google’s Find Hub into remote-wipe weapon
KONNI espionage crew covertly abused Google’s Find My Device feature to remotely factory-reset Android phones North Korean state-backed spies have found a new way to torch evidence of their own cyber-spying – by hijacking Google’s “Find Hub” service to remotely…
Ivanti Endpoint Manager Vulnerabilities Let Attackers Write Files Anywhere on Target Systems
Ivanti has released critical security updates for Ivanti Endpoint Manager to address three high-severity vulnerabilities that could allow authenticated attackers to write arbitrary files to any location on affected systems. The company disclosed the security advisory on November 10, 2025,…
GootLoader Is Back, Using a New Font Trick to Hide Malware on WordPress Sites
The malware known as GootLoader has resurfaced yet again after a brief spike in activity earlier this March, according to new findings from Huntress. The cybersecurity company said it observed three GootLoader infections since October 27, 2025, out of which…
Qilin Ransomware Activity Surges as Attacks Target Small Businesses
Qilin group ransomware incidents have surged in SMBs, exploiting security gaps and collaborating with Scattered Spider threat group This article has been indexed from www.infosecurity-magazine.com Read the original article: Qilin Ransomware Activity Surges as Attacks Target Small Businesses
Decentralized Identity Management: The Future of Privacy and Security
The average person juggles accounts with varying levels of security. Login fatigue may lead us to recycle passwords or trust personal information to dubious companies. There is also the ever-looming threat of data breaches, social engineering attacks, and brute force…
Fantasy Hub: Russian-sold Android RAT boasts full device espionage as MaaS
Researchers found Fantasy Hub, a Russian MaaS Android RAT that lets attackers spy, steal data, and control devices via Telegram. Zimperium researchers uncovered Fantasy Hub, a Russian-sold Android RAT offered as Malware-as-a-Service, enabling spying, device control, and data theft via…
Android Remote Data-Wipe Malware Attacking Users Leveraging Google’s Find Hub
A sophisticated remote data-wipe attack targeting Android devices has emerged, exploiting Google’s Find Hub service to execute destructive operations on smartphones and tablets across South Korea. This campaign represents the first documented case where state-sponsored threat actors weaponized a legitimate…
Critical Triofox Vulnerability Exploited in the Wild
A threat actor has exploited the issue to create a new administrator account and then used the account to execute remote access tools. The post Critical Triofox Vulnerability Exploited in the Wild appeared first on SecurityWeek. This article has been…
CISA: Patch Samsung flaw exploited to deliver spyware (CVE-2025-21042)
CISA has added CVE-2025-21042, a vulnerability affecting Samsung mobile devices, to its Known Exploited Vulnerabilities (KEV) catalog, and has ordered US federal civilian agencies to address it by the start of December. “This type of vulnerability is a frequent attack…
Lost Your iPhone? Beware Fake ‘Find My’ Messages Aiming to Steal Your Apple ID
Switzerland’s NCSC warns iPhone users of a new scam exploiting lost devices to steal Apple ID credentials through fake Find My messages. The post Lost Your iPhone? Beware Fake ‘Find My’ Messages Aiming to Steal Your Apple ID appeared first…
Devolutions Server Vulnerability Let Attackers Impersonate Users Using Pre-MFA Cookie
A critical vulnerability in Devolutions Server could allow attackers with low-level access to impersonate other user accounts by exploiting how the application handles authentication cookies before multi-factor authentication is completed. The security flaw, tracked as CVE-2025-12485, stems from improper privilege management…
Zoom Workplace for Windows Vulnerability Allow Users to Escalate Privilege
A security vulnerability has been discovered in Zoom Workplace VDI Client for Windows that could allow attackers to gain elevated privileges on affected systems. The flaw, tracked as CVE-2025-64740, has been assigned a high severity rating with a CVSS score…
Weaponized NuGet Packages Inject Time-Delayed Destructive Payloads to Attack ICS Systems
A sophisticated supply chain attack has emerged, targeting industrial control systems through compromised .NET packages. The threat landscape shifted on November 5, 2025, when researchers identified nine malicious NuGet packages designed to inject destructive payloads into critical infrastructure environments. Published…
Hackers Weaponizing Calendar Files as New Attack Vector Bypassing Traditional Email Defenses
A surge in attacks exploiting iCalendar (.ics) files as a sophisticated threat vector that bypasses traditional email security defenses. These attacks leverage the trusted, plain-text nature of calendar invitations to deliver credential phishing campaigns, malware payloads, and zero-day exploits. Over…
Synology BeeStation 0-Day Vulnerability Let Remote Attackers Execute Arbitrary Code
Synology has released an urgent security update addressing a critical remote code execution vulnerability in BeeStation OS that allows unauthenticated attackers to execute arbitrary code on affected devices. The vulnerability, tracked as CVE-2025-12686 and identified by ZDI-CAN-28275, carries a critical…
Patch now: Samsung zero-day lets attackers take over your phone
A critical vulnerability that affects Samsung mobile devices was exploited in the wild to distribute LANDFALL spyware. This article has been indexed from Malwarebytes Read the original article: Patch now: Samsung zero-day lets attackers take over your phone