Aggregator
CVE-2026-2275 | CrewAI 1.0 SandboxPython routine
CVE-2026-30561 | SourceCodester Sales and Inventory System 1.0 Parameter add_purchase.php msg cross site scripting
CVE-2026-30559 | SourceCodester Sales and Inventory System 1.0 Parameter add_sales.php msg cross site scripting
CVE-2026-30558 | SourceCodester Sales and Inventory System 1.0 Parameter add_customer.php msg cross site scripting
CVE-2026-30562 | SourceCodester Sales and Inventory System 1.0 Parameter add_stock.php msg cross site scripting
CVE-2026-30560 | SourceCodester Sales and Inventory System 1.0 Parameter add_supplier.php msg cross site scripting
CVE-2026-29954 | KubePlus 4.1.4 webhook/kubeconfiggenerator ResourceComposition chartURL injection
CVE-2026-5170 | MongoDB Server up to 7.0.30/8.0.17/8.2.1 assertion
CVE-2026-30556 | SourceCodester Sales and Inventory System 1.0 Parameter index.php msg cross site scripting
CVE-2026-30557 | SourceCodester Sales and Inventory System 1.0 Parameter add_category.php msg cross site scripting
Exposed Server Reveals TheGentlemen Ransomware Toolkit, Victim Credentials, and Ngrok Tokens
A misconfigured server hosted on a Russian bulletproof hosting provider has exposed the complete operational toolkit of a TheGentlemen ransomware affiliate, including harvested victim credentials and plaintext authentication tokens used to establish hidden remote access tunnels. TheGentlemen ransomware group operates as a Ransomware-as-a-Service, or RaaS, operation where affiliates carry out attacks using shared tools and […]
The post Exposed Server Reveals TheGentlemen Ransomware Toolkit, Victim Credentials, and Ngrok Tokens appeared first on Cyber Security News.
The Gentleman
You must login to view this content
The Gentleman
You must login to view this content
15-Year-Old strongSwan Flaw Lets Attackers Crash VPNs via Integer Underflow
Рефлексия, контракты и безопасность памяти. Почему C++26 называют самым сильным релизом после C++11
North Korean IT Worker Allegedly Used Stolen Identity and AI Resume in Job Application Scam
A suspected North Korean operative tried to sneak into a remote job at a cybersecurity firm by using a stolen identity, a fake AI-generated resume, and a VoIP phone number. The case, uncovered in June 2025, shows how North Korea’s state-sponsored IT worker scheme has grown more sophisticated and harder to spot without proper screening. […]
The post North Korean IT Worker Allegedly Used Stolen Identity and AI Resume in Job Application Scam appeared first on Cyber Security News.
RSAC 2026 is back, and the certificate automation gap is impossible to ignore
RSAC 2026 Conference marked a return to form, more vibrant and better attended than any show I can recall over the past decade. The audience was distinctly international, with strong representation from North America, Europe and Latin America, and it was refreshing to see the energy and overall vibe of the show return to what I remember from RSA at its peak. As expected, hot topics centered on how AI is transforming cybersecurity, alongside growing … More →
The post RSAC 2026 is back, and the certificate automation gap is impossible to ignore appeared first on Help Net Security.
CrySome RAT Emerges as Advanced .NET Malware With AV Killer and HVNC Capabilities
A new and dangerous piece of malware has surfaced in the threat landscape, and it is built to stay hidden, stay running, and stay in control of any system it infects. CrySome RAT is written in C# and targets the .NET ecosystem, giving attackers complete remote control over compromised Windows machines. From stealing passwords and […]
The post CrySome RAT Emerges as Advanced .NET Malware With AV Killer and HVNC Capabilities appeared first on Cyber Security News.