Toute l'actualité de la Cybersécurité
Velvet Chollima APT Hackers Attacking Government Officials With Weaponized PDF
2025-05-28 06:20:56
A sophisticated cyber espionage campaign attributed to the North Korean advanced persistent threat (APT) group Velvet Chollima has emerged, targeting South Korean government officials and organizations...
Silver RAT Malware With New Anti-virus Bypass Techniques Executes Malicious Activities
2025-05-28 05:36:11
A sophisticated new remote access trojan known as Silver RAT v1.0 has emerged in the cyberthreat landscape, demonstrating advanced anti-virus bypass capabilities and an array of destructive functionalities...
Security Trends Analysis – Emerging Risks for 2025
2025-05-28 05:03:17
As the digital landscape continues to evolve at breakneck speed, organizations worldwide are bracing for a new wave of security challenges in 2025. The convergence of artificial intelligence, geopolitical...
0 Bounty: Shopify Referrer Leak: Hijacking Storefront Access with a Single Token
2025-05-28 04:55:38
Referrer Header Leaks + Iframe Injection = Storefront Password BypassContinue reading on InfoSec Write-ups »
Extracting saved passwords in Chrome using python
2025-05-28 04:54:45
Source: https://www.metacompliance.com/cyber-security-terminology/malwareIntroductionIn the evolving landscape of cybersecurity threats, information-stealing malware (infostealers) have increased in popularity....
Profiler: Your Digital Detective Platform
2025-05-28 04:54:26
Have you ever wanted to know more about a strange email or phone number? Or maybe check if someone online is who they claim to be? In today's world, having the skills to find information online is super...
Hacking Insights: Gaining Access to University of Hyderabad Ganglia Dashboard
2025-05-28 04:53:55
Welcome Everyone to Another WriteupRecently while surfing the Infosec Twitter I came across a Post which mentioned Ganglia Dashboard . Had no Idea what it is so curiosity peaked in as usual :)What...
Part 3: How to Become a Pentester in 2025: Programming & Scripting Foundations for pentester
2025-05-28 04:53:18
Learn Python, Bash, and C Sharp fundamentals for pentesters in 2025: step-by-step knowledge maps, YouTube channel recommendations, pro tips for CPTS & OSCP prep.LOST IN THE CODESI used to believe...
0 Bounty: for HTTP Reset Password Link in Mattermost
2025-05-28 04:51:27
How an Unsecured Protocol in a Critical Workflow Opened the Door for Network-Based Account TakeoversContinue reading on InfoSec Write-ups »
Day 5: DOM XSS in jQuery anchor href attribute sink using location.search
2025-05-28 04:51:12
Day 5: DOM XSS in jQuery anchor href attribute sink using location.search source: Zero to Hero Series — PortswiggerHi, my fellow hackers. This is Rayofhope. I have over 5 years of experience and...
Exploiting Web Cache Poisoning with X-Host Header Using Param Miner
2025-05-28 04:50:53
[Write-up] Web Cache Poisoning Using an Unknown Header.Continue reading on InfoSec Write-ups »
Header Injection to Hero: How I Hijacked Emails and Made the Server Sing
2025-05-28 04:50:31
Hey there!😁Continue reading on InfoSec Write-ups »
Indian Police Arrest Cybercrime Gang Copycats of Myanmar Biz Model
2025-05-28 03:30:00
The region offers attractive conditions: a large pool of tech workers, economic disparity, and weak enforcement of cybercrime laws — all of which attract businesses legitimate and shady.
Chrome Security Update – High-Severity Vulnerabilities Lead to Code Execution
2025-05-28 03:18:02
Google has officially promoted Chrome 137 to the stable channel for Windows, Mac, and Linux platforms, marking a significant milestone in browser security and artificial intelligence integration. The...