12144
News of cybersecurity / information security, information technology, data leaks / breaches, cve, hacks, tools, trainings * Multilingual (En, Ru). * Forum - forum.sys-adm.in * Chat - @sysadm_in * Job - @sysadm_in_job * ? - @sysadminkz
The Forgotten Bug: How a Node.js Core Design Flaw Enables HTTP Request Splitting
https://r3verii.github.io/cve/2026/02/27/nodejs-toctou.html
Refund scam impersonates Avast to harvest credit card details
https://www.malwarebytes.com/blog/threat-intel/2026/02/refund-scam-impersonates-avast-to-harvest-credit-card-details
AI in the Middle: Turning Web-Based AI Services into C2 Proxies & The Future Of AI Driven Attacks
https://research.checkpoint.com/2026/ai-in-the-middle-turning-web-based-ai-services-into-c2-proxies-the-future-of-ai-driven-attacks/
Fake 7-Zip downloads are turning home PCs into proxy nodes
https://www.malwarebytes.com/blog/threat-intel/2026/02/fake-7-zip-downloads-are-turning-home-pcs-into-proxy-nodes
LookOut: Discovering RCE and Internal Access on Looker (Google Cloud & On-Prem)
https://www.tenable.com/blog/google-looker-vulnerabilities-rce-internal-access-lookout
PeckBirdy: A Versatile Script Framework for LOLBins Exploitation
https://www.trendmicro.com/en_us/research/26/a/peckbirdy-script-framework.html
Microsoft mishandling example.comMicrosoft's Autodiscover service has incorrectly routed the IANA-reserved example.com to Sumitomo Electric Industries' mail servers at sei.co.jp, potentially sending test credentials there.
https://tinyapps.org/blog/microsoft-mishandling-example-com.html
Threat Actors Expand Abuse of Microsoft Visual Studio Code
This activity involved the deployment of a backdoor implant that provides remote code execution capabilities on the victim system:
https://www.jamf.com/blog/threat-actors-expand-abuse-of-visual-studio-code/
7 ваучеров на 100% скидку The Linux Foundation
+ 7 доступов к видеокурсу Kubernetes База
Ваучеры применимы к любому:
— онлайн-курсу
— сертификационному экзамену (CKA, CKS, CKAD и не только)
— или пакету (курс + сертификация)
29 января подведем итоги и выберем 7 победителей. Каждый победитель получит ваучер + доступ к курсу от Slurm.
Актививация активна до 07.01.2027, после будет 1 год и 2 попытки, чтобы завершить обучение и сдать экзамен.
Детали здесь - https://core247.kz/cncf
Malware Peddlers Are Now Hijacking Snap Publisher Domains
There’s a relentless campaign by scammers to publish malware in the Canonical Snap Store. Some gets caught by automated filters, but plenty slips through. Recently, these miscreants have changed tactics - they’re now registering expired domains belonging to legitimate snap publishers, taking over their accounts, and pushing malicious updates to previously trustworthy applications..:
https://blog.popey.com/2026/01/malware-purveyors-taking-over-published-snap-email-domains/
UNVEILING VOIDLINK – A STEALTHY, CLOUD-NATIVE LINUX MALWARE FRAMEWORK
https://research.checkpoint.com/2026/voidlink-the-cloud-native-malware-framework/
VVS Discord Stealer Using Pyarmor for Obfuscation and Detection Evasion
https://unit42.paloaltonetworks.com/vvs-stealer/
Time Nist Gov Incorrect Time
The affected servers are:time-a-b.nist.govtime-b-b.nist.govtime-c-b.nist.govtime-d-b.nist.govtime-e-b.nist.govntp-b.nist.gov (authenticated NTP)
https://groups.google.com/a/list.nist.gov/g/internet-time-service/c/o0dDDcr1a8I
Inside GhostPoster: How a PNG Icon Infected 50,000 Firefox Users
https://www.koi.ai/blog/inside-ghostposter-how-a-png-icon-infected-50-000-firefox-browser-users
December 2025 Security Updates
This release consists of the following 57 Microsoft CVEs:
https://msrc.microsoft.com/update-guide/releaseNote/2025-Dec
Taming Agentic Browsers: Vulnerability in Chrome Allowed Extensions to Hijack New Gemini Panel
https://unit42.paloaltonetworks.com/gemini-live-in-chrome-hijacking/
PromptSpy ushers in the era of Android threats using GenAI
https://www.welivesecurity.com/en/eset-research/promptspy-ushers-in-era-android-threats-using-genai/
Old-School IRC, New Victims: Inside The Newly Discovered SSHStalker Linux Botnet
https://flare.io/learn/resources/blog/old-school-irc-new-victims-inside-the-newly-discovered-sshstalker-linux-botnet
Web Traffic Hijacking: When Your Nginx Configuration Turns Malicious
https://securitylabs.datadoghq.com/articles/web-traffic-hijacking-nginx-configuration-malicious/
Notepad++ Hijacked by State-Sponsored Hackers
https://notepad-plus-plus.org/news/hijacked-incident-info-update/
Love? Actually: Fake dating app used as lure in targeted spyware campaign
https://www.welivesecurity.com/en/eset-research/love-actually-fake-dating-app-used-lure-targeted-spyware-campaign-pakistan/
Open-Source Python Script Drives Social Media Phishing Campaign
..In this particular campaign, attackers abused LinkedIn’s professional context to establish trust and familiarity, increasing their chances of success by targeting high-value individuals in corporate environments. This tactic, however, could be applied to any social media platform commonly accessed on business devices..:
https://reliaquest.com/blog/threat-spotlight-open-source-python-script-drives-social-media-phishing-campaign
UNO reverse card: stealing cookies from cookie stealers
https://www.cyberark.com/resources/threat-research-blog/uno-reverse-card-stealing-cookies-from-cookie-stealers
P.S. реклама даже в панели управления малвари присутствует 😁
Cloudflare Zero-day: Accessing Any Host Globally
https://fearsoff.org/research/cloudflare-acme
StackWarp is a security vulnerability that exploits a synchronization bug present in all AMD Zen 1–5 processors. In the context of SEV-SNP, this flaw allows malicious VM hosts to manipulate the guest VM’s stack pointer
https://stackwarpattack.com/
deVixor: An Evolving Android Banking RAT with Ransomware
https://cyble.com/blog/devixor-an-evolving-android-banking-rat-with-ransomware-capabilities-targeting-iran/
Bluetooth Headphone Jacking: Full Disclosure of Airoha RACE Vulnerabilities
https://insinuator.net/2025/12/bluetooth-headphone-jacking-full-disclosure-of-airoha-race-vulnerabilities/
Nezha: The Monitoring Tool That’s Also a Perfect RAT
https://www.ontinue.com/resource/nezha-the-monitoring-tool-thats-also-a-perfect-rat/
CyberVolk Returns | Flawed VolkLocker Brings New Features With Growing Pains
https://www.sentinelone.com/blog/cybervolk-returns-flawed-volklocker-brings-new-features-with-growing-pains/
Windows Stealers: How Modern Infostealers Harvest Credentials
https://deceptiq.com/blog/windows-stealers-technical-analysis