menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Hacking News

Hacking News

source image

Securityaffairs

2w

read

236

img
dot

Image Credit: Securityaffairs

Experts warn of a second wave of attacks targeting SAP NetWeaver bug CVE-2025-31324

  • Threat actors are launching a second wave of attacks on SAP NetWeaver by exploiting webshells from a recent zero-day vulnerability (CVE-2025-31324).
  • A critical flaw in SAP NetWeaver Visual Composer Metadata Uploader allows unauthenticated attackers to upload malicious executable files, potentially leading to a full compromise of SAP environments.
  • Researchers from ReliaQuest discovered the vulnerability and reported it to SAP, leading to a patch release to address the issue.
  • Onapsis researchers observed a second wave of attacks using the same vulnerability, prompting the release of an open-source scanner to detect exploitation attempts.

Read Full Article

like

14 Likes

source image

Securityaffairs

2w

read

340

img
dot

Image Credit: Securityaffairs

U.S. CISA adds Langflow flaw to its Known Exploited Vulnerabilities catalog

  • The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a Langflow flaw, tracked as CVE-2025-3248 (CVSS score of 9.8), to its Known Exploited Vulnerabilities (KEV) catalog.
  • Langflow, a popular tool for building agentic AI workflows, is impacted by a code injection vulnerability in the /api/v1/validate/code endpoint (CVE-2025-3248), allowing remote attackers to execute arbitrary code.
  • Researchers from cybersecurity firm Horizon3.ai discovered this easily exploitable flaw, with a post showing how remote code execution can be achieved through a Python reverse shell.
  • Users of Langflow are advised to upgrade to version 1.3.0+ or restrict access, as more than 500 instances are exposed on the Internet, and addressing these vulnerabilities is crucial according to CISA directives.

Read Full Article

like

20 Likes

source image

Kitploit

2w

read

163

img
dot

Image Credit: Kitploit

Firecrawl-Mcp-Server - Official Firecrawl MCP Server - Adds Powerful Web Scraping To Cursor, Claude And Any Other LLM Clients

  • Firecrawl-Mcp-Server is an official Firecrawl MCP Server that enhances web scraping capabilities for Cursor, Claude, and other LLM clients.
  • Features of the server include web scraping, JS rendering, URL discovery, crawling, search, extraction, deep research, batch support, and more.
  • Installation can be done with npm and configurations differ based on the Cursor version being used.
  • For Windows users encountering issues, a specific command is provided for successful implementation.
  • Environment variables like FIRECRAWL_API_KEY and FIRECRAWL_API_URL are required for cloud API usage or self-hosted instances.
  • Configurations for retry attempts, credit usage monitoring, and rate limiting can be set as needed.
  • The server includes tools for scraping, batch scraping, searching, crawling, extracting, deep research, LLM generation, and logging.
  • Each tool comes with specific arguments and options for customized web interaction and data extraction.
  • Development guidelines include installing dependencies, building, running tests, and contributing through pull requests.
  • The Firecrawl-Mcp-Server operates with configurable parameters to ensure efficient web interactions and data extraction processes.

Read Full Article

like

9 Likes

source image

Securityaffairs

2w

read

159

img
dot

Image Credit: Securityaffairs

Google fixed actively exploited Android flaw CVE-2025-27363

  • Google addressed 46 Android security vulnerabilities, including CVE-2025-27363, a high-severity flaw exploited in attacks.
  • CVE-2025-27363 resides in the System component and can lead to local code execution without additional privileges.
  • No details were provided on the attackers or the scale of exploitation, but Google indicated it may be under limited, targeted exploitation.
  • Users are advised to update to the latest Android version to mitigate potential risks posed by these vulnerabilities.

Read Full Article

like

9 Likes

source image

Securityaffairs

2w

read

133

img
dot

Image Credit: Securityaffairs

New ‘Bring Your Own Installer (BYOI)’ technique allows to bypass EDR

  • A new BYOI technique discovered by Aon’s Stroz Friedberg allows attackers to bypass SentinelOne EDR, disable protection, and deploy Babuk ransomware by exploiting the agent upgrade process.
  • The technique exploits a flaw in SentinelOne's upgrade process to bypass its anti-tamper protections, leaving endpoints unprotected without using any malicious driver files.
  • Stroz Friedberg found that the bypass was possible due to disabled local upgrade/downgrade authorization, allowing threat actors to disable the EDR agent and deploy ransomware.
  • SentinelOne has issued guidance on mitigating the issue by enabling the 'Online authorization' feature, which removes the ability to perform local upgrades and downgrades by default.

Read Full Article

like

8 Likes

source image

Securityaffairs

2w

read

155

img
dot

Image Credit: Securityaffairs

Smishing on a Massive Scale: ‘Panda Shop’ Chinese Carding Syndicate

  • Resecurity discovered a new smishing kit called 'Panda Shop,' similar to tactics used by the Smishing Triad but with enhanced features and templates.
  • The Chinese cybercriminal group, known as the Smishing Triad, has evolved its operations, becoming more sophisticated in targeting consumers globally.
  • The 'Panda Shop' smishing kit identified by Resecurity is being used to steal credit card and personal information via Google Wallet and Apple Pay.
  • Chinese cybercriminals exploit various delivery methods like Google RCS, Apple iMessage, and SMS gateways to send up to 2,000,000 smishing messages daily, raising concerns about the scale of potential victims.

Read Full Article

like

9 Likes

source image

Hackers-Arise

2w

read

202

img
dot

Image Credit: Hackers-Arise

Mr Robot Hacks: Building a Deadman’s Switch in Python

  • In the TV show Mr. Robot, the protagonist Elliot creates a digital deadman’s switch as a safety mechanism against his enemy Vera.
  • A deadman’s switch triggers an action if no user action is detected, ensuring safety or executing a specified task.
  • Elliot uses Python to build a digital deadman’s switch, a common concept in various industrial applications.
  • The script uses threading in Python to allow concurrent operations within the same process.
  • The requests module is used to send an SMS message through textbelt.com in case of trigger.
  • The main function prompts the user to set a timeout period for the deadman’s switch to activate.
  • If user action (pressing Enter) is not detected within the set time, the action function sends an SMS message.
  • The script provides a customizable solution for executing critical tasks if the user fails to act within the specified time frame.
  • This tutorial showcases using Python to implement a Deadman’s Switch for safety and automated actions.
  • Python's flexibility and simplicity make it a suitable language for cybersecurity and AI applications.

Read Full Article

like

12 Likes

source image

Medium

2w

read

301

img
dot

Image Credit: Medium

The Importance of Cybersecurity in the Digital Age

  • Cybersecurity is essential in protecting systems, networks, and data from threats like malware, ransomware, phishing attacks, and data breaches.
  • Common cyber threats include ransomware attacks, phishing scams, data breaches, and IoT vulnerabilities, posing risks to individuals and organizations.
  • To enhance cybersecurity, best practices include regular software updates, strong password policies, multi-factor authentication, employee training, regular backups, and implementing firewalls and antivirus software.
  • Emerging technologies like artificial intelligence and machine learning are being leveraged to advance cybersecurity efforts and address evolving digital vulnerabilities.

Read Full Article

like

17 Likes

source image

Securityaffairs

2w

read

112

img
dot

Image Credit: Securityaffairs

Kelly Benefits December data breach impacted over 400,000 individuals

  • Kelly Benefits data breach impact larger than initially believed.
  • Initially estimated to impact nearly 264,000 individuals, the breach now affects over 400,000.
  • Sensitive personal data such as names, SSNs, medical, and financial data stolen.
  • Kelly Benefits notifying impacted individuals, investigation ongoing.

Read Full Article

like

6 Likes

source image

Kitploit

2w

read

302

img
dot

Image Credit: Kitploit

Deep-Live-Cam - Real Time Face Swap And One-Click Video Deepfake With Only A Single Image

  • Deep-Live-Cam offers real-time face swap and video deepfake capabilities with just a single click and a single image.
  • The software is intended for AI-generated media industry productivity, assisting artists in various creative tasks.
  • There are precautions in place to prevent unethical use, such as not processing inappropriate content.
  • Users are responsible for ethical and legal use, including obtaining consent when using real people's faces.
  • Installation of the software requires technical skills and various dependencies like Python, Git, and more.
  • Deep-Live-Cam offers features like real-time face mapping, live show capabilities, creating memes, and more.
  • Users can run the software in different modes, such as image/video mode or webcam mode for live performance.
  • The software also provides tips and tricks for better results, including quality enhancement without sacrificing speed.
  • Reviews of Deep-Live-Cam praise its ability to transform faces in real-time and its potential for various applications.
  • Credits are given to various contributors and acknowledgments to open-source projects that supported the development of Deep-Live-Cam.

Read Full Article

like

18 Likes

source image

Securityaffairs

2w

read

276

img
dot

Image Credit: Securityaffairs

Sansec uncovered a supply chain attack via 21 backdoored Magento extensions

  • Supply chain attack via 21 backdoored Magento extensions affected 500–1,000 e-stores, including a $40B multinational e-store.
  • Researchers at Sansec uncovered a coordinated supply chain attack where a backdoor was hidden in 21 applications, lingering undiscovered for 6 years.
  • The malicious code injection was recently discovered after threat actors compromised e-commerce servers through the backdoored extensions.
  • Impacted vendors include Tigren, Magesolution (MGS), and Meetanshi, with varied responses received when contacted by Sansec.

Read Full Article

like

16 Likes

source image

Hackingblogs

2w

read

112

img
dot

Image Credit: Hackingblogs

New Microsoft Accounts Is Passwordless by Default in 2025 : Here’s What It Means

  • Microsoft is making new accounts passwordless by default starting on May 1, 2025, to enhance security and user experience, using methods like passkeys, biometrics, and device-based authentication.
  • World Password Day has been renamed World Passkey Day by Microsoft to reflect their commitment to a passwordless future.
  • The passwordless initiative aims to reduce phishing, credential stuffing, and brute-force attacks by eliminating traditional passwords for new Microsoft accounts.
  • Existing Microsoft account holders are encouraged to switch to a passkey-based sign-in for faster and more secure logins.

Read Full Article

like

6 Likes

source image

Securityaffairs

2w

read

199

img
dot

Image Credit: Securityaffairs

US authorities have indicted Black Kingdom ransomware admin

  • 36-year-old Yemeni man indicted in the U.S. for 1,500 attacks on Microsoft Exchange servers as an admin of Black Kingdom ransomware.
  • FBI investigating the case with the help of the New Zealand Police.
  • The man demanded ransom payments of $10,000 in Bitcoin from the victims and is believed to be residing in Yemen.
  • If convicted, the man faces up to five years in federal prison for each charge related to deploying Black Kingdom ransomware on vulnerable Exchange mail servers.

Read Full Article

like

11 Likes

source image

Securityaffairs

2w

read

324

img
dot

Image Credit: Securityaffairs

Malicious Go Modules designed to wipe Linux systems

  • Researchers discovered 3 malicious Go modules containing hidden code to wipe a Linux system's main disk, making it unbootable.
  • The malware-laced modules fetch destructive payloads to execute a shell script, permanently destroying data on the primary disk.
  • Attackers exploit Go ecosystem's decentralized nature to create confusion, making it hard for developers to distinguish between legitimate and malicious modules.
  • Experts emphasize the importance of strong supply chain security and recommend proactive code audits and continuous monitoring to combat such sophisticated threats.

Read Full Article

like

19 Likes

source image

Kitploit

2w

read

173

img
dot

Image Credit: Kitploit

CAMEL - The First And The Best Multi-Agent Framework. Finding The Scaling Law Of Agents

  • CAMEL is a community dedicated to exploring the scaling laws of agents, providing insights into their behaviors and risks.
  • Key design principles of the CAMEL framework include evolvability, scalability, and statefulness for efficient multi-agent systems.
  • Benefits of using CAMEL for research include simulating large-scale agent systems, dynamic communication, and support for various agent types.
  • CAMEL offers features like data generation, tool integration, and support for different benchmarks in multi-agent systems research.
  • Researchers can build data generation tools, automate tasks, and simulate worlds using CAMEL, enhancing multi-agent system capabilities.
  • The installation process for CAMEL is straightforward, with examples like creating a ChatAgent for various tasks using the framework.
  • CAMEL Tech Stack includes modules for agents, agent societies, data generation, models, tools, benchmarks, interpreters, and more.
  • Research projects at CAMEL focus on the behaviors, capabilities, and risks of large-scale agents, inviting collaboration and impactful research.
  • Tools like models documentation, cookbooks for specific functionalities, and synthetic datasets support researchers in exploring multi-agent systems.
  • The community-driven initiative of CAMEL welcomes contributors and supporters, offering guidelines for code contributions and community engagement.

Read Full Article

like

10 Likes

For uninterrupted reading, download the app