AutoIT3 Compiled Scripts Dropping Shellcodes

AutoIT3[1] is a powerful language that helps to built nice applications for Windows environments, mainly to automate tasks. If it looks pretty old, the latest version was released last September and it remains popular amongst developers, for the good… or the bad! Malware written in AutoIt3 has existed since the late 2000s, when attackers realized…

Read More

Active Exploitation of 7-Zip RCE Vulnerability Shows Why Manual Patching is No Longer an Option

A critical remote code execution (RCE) vulnerability in 7-Zip (CVE-2025-11001) is now being actively exploited. The issue stems from improper handling of symbolic links within crafted ZIP files. When a malicious archive is extracted, 7-Zip may write files outside the intended directory, allowing an attacker to overwrite system files or execute arbitrary code with the…

Read More

From Policy to Practice: Why Cyber Resilience Needs a Reboot

In cybersecurity today, regulation is everywhere, but resilience isn’t keeping pace. In this episode of Experts on Experts: Commanding Perspectives, Craig Adams chats with Sabeen Malik, VP of Public Policy & Government Affairs at Rapid7, about what’s broken (and what’s promising) in today’s regulatory landscape. Sabeen pulls from her experience across diplomacy, operations, and government…

Read More

phpMyFAQ 2.9.8 – Cross-Site Request Forgery (CSRF)

# Exploit Title: phpMyFAQ 2.9.8 Cross-Site Request Forgery (CSRF) # Date: 2024-10-26 # Exploit Author: CodeSecLab # Vendor Homepage: https://github.com/thorsten/phpMyFAQ # Software Link: https://github.com/thorsten/phpMyFAQ # Version: 2.9.8 # Tested on: Ubuntu Windows # CVE : CVE-2017-15735 PoC: While still logged in, open another browser window: …

Read More

phpMyFAQ 2.9.8 – Cross-Site Request Forgery(CSRF)

# Exploit Title: phpMyFAQ 2.9.8 – Cross-Site Request Forgery(CSRF) # Date: 2024-10-26 # Exploit Author: CodeSecLab # Vendor Homepage: https://github.com/thorsten/phpMyFAQ # Software Link: https://github.com/thorsten/phpMyFAQ # Version: 2.9.8 # Tested on: Ubuntu Windows # CVE : CVE-2017-15734 PoC: Get http://phpmyfaq/admin/index.php?action=clear-visits Reproduction: While still logged in, open another browser window to access the link. …

Read More

Staying ahead of censors in 2025: What we’ve learned from fighting censorship in Iran and Russia

From internet blackouts in Iran to Russia’s evolving censorship tactics, 2025 has tested Tor’s anti-censorship tools like never before. These are the moments where the work of Tor’s anti-censorship team is more important than ever, to fulfill our mission of preserving connectivity between users in affected regions and the rest of the world. In this…

Read More