Toute l'actualité de la Cybersécurité


Velvet Chollima APT Hackers Attacking Government Officials With Weaponized PDF

2025-05-28 06:20:56
A sophisticated cyber espionage campaign attributed to the North Korean advanced persistent threat (APT) group Velvet Chollima has emerged, targeting South Korean government officials and organizations...

Lire la suite »

Silver RAT Malware With New Anti-virus Bypass Techniques Executes Malicious Activities

2025-05-28 05:36:11
A sophisticated new remote access trojan known as Silver RAT v1.0 has emerged in the cyberthreat landscape, demonstrating advanced anti-virus bypass capabilities and an array of destructive functionalities...

Lire la suite »

Security Trends Analysis – Emerging Risks for 2025

2025-05-28 05:03:17
As the digital landscape continues to evolve at breakneck speed, organizations worldwide are bracing for a new wave of security challenges in 2025. The convergence of artificial intelligence, geopolitical...

Lire la suite »

0 Bounty: Shopify Referrer Leak: Hijacking Storefront Access with a Single Token

2025-05-28 04:55:38
Referrer Header Leaks + Iframe Injection = Storefront Password BypassContinue reading on InfoSec Write-ups »

Lire la suite »

Extracting saved passwords in Chrome using python

2025-05-28 04:54:45
Source: https://www.metacompliance.com/cyber-security-terminology/malwareIntroductionIn the evolving landscape of cybersecurity threats, information-stealing malware (infostealers) have increased in popularity....

Lire la suite »

Profiler: Your Digital Detective Platform

2025-05-28 04:54:26
Have you ever wanted to know more about a strange email or phone number? Or maybe check if someone online is who they claim to be? In today's world, having the skills to find information online is super...

Lire la suite »

Hacking Insights: Gaining Access to University of Hyderabad Ganglia Dashboard

2025-05-28 04:53:55
Welcome Everyone to Another WriteupRecently while surfing the Infosec Twitter I came across a Post which mentioned Ganglia Dashboard . Had no Idea what it is so curiosity peaked in as usual :)What...

Lire la suite »

Part 3: How to Become a Pentester in 2025: Programming & Scripting Foundations for pentester

2025-05-28 04:53:18
Learn Python, Bash, and C Sharp fundamentals for pentesters in 2025: step-by-step knowledge maps, YouTube channel recommendations, pro tips for CPTS & OSCP prep.LOST IN THE CODESI used to believe...

Lire la suite »

0 Bounty: for HTTP Reset Password Link in Mattermost

2025-05-28 04:51:27
How an Unsecured Protocol in a Critical Workflow Opened the Door for Network-Based Account TakeoversContinue reading on InfoSec Write-ups »

Lire la suite »

Day 5: DOM XSS in jQuery anchor href attribute sink using location.search

2025-05-28 04:51:12
Day 5: DOM XSS in jQuery anchor href attribute sink using location.search source: Zero to Hero Series — PortswiggerHi, my fellow hackers. This is Rayofhope. I have over 5 years of experience and...

Lire la suite »

Exploiting Web Cache Poisoning with X-Host Header Using Param Miner

2025-05-28 04:50:53
[Write-up] Web Cache Poisoning Using an Unknown Header.Continue reading on InfoSec Write-ups »

Lire la suite »

Header Injection to Hero: How I Hijacked Emails and Made the Server Sing

2025-05-28 04:50:31
Hey there!😁Continue reading on InfoSec Write-ups »

Lire la suite »

Indian Police Arrest Cybercrime Gang Copycats of Myanmar Biz Model

2025-05-28 03:30:00
The region offers attractive conditions: a large pool of tech workers, economic disparity, and weak enforcement of cybercrime laws — all of which attract businesses legitimate and shady.

Lire la suite »

Chrome Security Update – High-Severity Vulnerabilities Lead to Code Execution

2025-05-28 03:18:02
Google has officially promoted Chrome 137 to the stable channel for Windows, Mac, and Linux platforms, marking a significant milestone in browser security and artificial intelligence integration. The...

Lire la suite »