Articles tagged with: #exploit Clear filter
Cybersecurity Newsletter Weekly  -  AWS Outage, WSUS Exploitation, Chrome Flaws, and RDP Attacks

Cybersecurity Newsletter Weekly - AWS Outage, WSUS Exploitation, Chrome Flaws, and RDP Attacks

Cyber Security News cybersecuritynews.com

Welcome to this week's edition of the Cybersecurity Newsletter, where we dissect the latest threats, vulnerabilities, and disruptions shaping the digital landscape. As organizations navigate an increasingly complex threat environment, staying ahead of emerging risks has never been more critical. This week, we're zeroing in on major incidents that underscore the fragility of cloud infrastructure,

Bypassing ASLR and Hijacking Control

Bypassing ASLR and Hijacking Control

Blackhat Library: Hacking techniques and research www.reddit.com

Published an article explaining how to exploit buffer overflow and hijack RIP in a PIE/ASLR binary. https://0x4b1t.github.io/articles/buffer-overflow-to-control-hijacking-in-aslr-enabled-binary/ submitted by /u/Kris3c [link] [comments]

Vault Viper Exploits Online Gambling Websites Using Custom Browser to Install Malicious Program

Vault Viper Exploits Online Gambling Websites Using Custom Browser to Install Malicious Program

Cyber Security News cybersecuritynews.com

Southeast Asia's online gambling ecosystem has become a breeding ground for sophisticated cyber threats, with criminal networks leveraging seemingly legitimate platforms to distribute malicious software to millions of unsuspecting users. A recently uncovered operation demonstrates how threat actors exploit the region's thriving illegal gambling market by deploying a weaponized browser disguised as a privacy tool.

YouTube Ghost Malware Network With 3,000+ Malicious Videos Attacking Users to Deploy Malware

YouTube Ghost Malware Network With 3,000+ Malicious Videos Attacking Users to Deploy Malware

Cyber Security News cybersecuritynews.com

A sophisticated malware distribution campaign leveraging over 3,000 malicious YouTube videos has been uncovered, targeting users seeking pirated software and game cheats. The YouTube Ghost Network represents a coordinated ecosystem of compromised accounts that exploit platform features to distribute information-stealing malware while creating false trust through fabricated engagement. Active since 2021, the network has dramatically

Decoding PIN-Protected BitLocker Through TPM SPI Analysis To Decrypt And Mount The Disks

Decoding PIN-Protected BitLocker Through TPM SPI Analysis To Decrypt And Mount The Disks

Cyber Security News cybersecuritynews.com

BitLocker keys without PIN protection, where attackers could exploit stolen laptops, researchers now delve into PIN-secured setups, targeting insider threats seeking SYSTEM-level access. This technique involves intercepting TPM communications via SPI bus analysis, revealing how even PIN-hardened BitLocker can yield to physical probing with known credentials. While no true bypass occurs, the method unlocks drives

CISA Warns of Hackers Actively Exploiting Windows Server Update Services RCE Vulnerability in the Wild

CISA Warns of Hackers Actively Exploiting Windows Server Update Services RCE Vulnerability in the Wild

Cyber Security News cybersecuritynews.com

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned organizations worldwide about active exploitation of a critical remote code execution (RCE) vulnerability in Microsoft's Windows Server Update Services (WSUS). Tracked as CVE-2025-59287, the flaw carries a CVSS score of 9.8, allowing unauthenticated attackers to execute arbitrary code with system-level privileges over a network, potentially

is binary exploitation still worth it ?

is binary exploitation still worth it ?

cybersecurity www.reddit.com

is binary exploitation still worth it ? the thing is i want to be something like a full-stack hacker , i finished my foundation [C,bash,python,networking & OS] now i want to start cyber-security i saw that binary-exploitation , reverse-engineering & malware development would go well together but seeing the posts , and opinions on you-tube a lot of people would consider binary-exploitation irrelevant lately what are your opinions ? is there any better path that i don't know about that maybe more...

Microsoft Issues Emergency Patch for Actively Exploited Critical WSUS Vulnerability

Microsoft Issues Emergency Patch for Actively Exploited Critical WSUS Vulnerability

The Hacker News thehackernews.com

Microsoft on Thursday released out-of-band security updates to patch a critical-severity Windows Server Update Service (WSUS) vulnerability with a proof-of-concept (Poc) exploit publicly available and has come under active exploitation in the wild. The vulnerability in question is CVE-2025-59287 (CVSS score: 9.8), a remote code execution flaw in WSUS that was originally fixed by the tech giant

WhatsApp Exploit Privately Disclosed To Meta At The Pwn2Own Ireland

WhatsApp Exploit Privately Disclosed To Meta At The Pwn2Own Ireland

Cyber Security News cybersecuritynews.com

At Pwn2Own Ireland 2025 hacking competition, cybersecurity researchers from Team Z3 have withdrawn their high-stakes demonstration of a potential zero-click remote code execution (RCE) vulnerability in WhatsApp, opting instead for a private coordinated disclosure to Meta. The event, held in Cork, Ireland, from October 21-23, featured a record-breaking $1 million bounty for such a WhatsApp

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CISA Adds Two Known Exploited Vulnerabilities to Catalog

All CISA Advisories www.cisa.gov

CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2025-54236 Adobe Commerce and Magento Improper Input Validation Vulnerability CVE-2025-59287 Microsoft Windows Server Update Service (WSUS) Deserialization of Untrusted Data Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and poses significant risks to the federal enterprise. Binding Operational Directive...

Threat Actors Advancing Email Phishing Attacks to Bypass Security Filters

Threat Actors Advancing Email Phishing Attacks to Bypass Security Filters

Cyber Security News cybersecuritynews.com

Email phishing attacks have reached a critical inflection point in 2025, as threat actors deploy increasingly sophisticated evasion techniques to circumvent traditional security infrastructure and user defenses. The threat landscape continues to evolve with the revival and refinement of established tactics that were once considered outdated, combined with novel delivery mechanisms that exploit gaps in