Apache Tomcat 10.1.39 – Denial of Service (DoS)

# Exploit Title: Apache Tomcat 10.1.39 – Denial of Service (DOS) # Author: Abdualhadi khalifa # CVE: CVE-2025-31650 import httpx import asyncio import random import urllib.parse import sys import socket from colorama import init, Fore, Style init() class TomcatKiller: def __init__(self): self.success_count = 0 self.error_count = 0 self.invalid_priorities = [ \\\”u=-1, q=2\\\”, …

Read More

New Release: Tails 6.15.1 | The Tor Project

This release is an emergency release to fix important security vulnerabilities in Tor Browser. Changes and updates Fixed problems Fix the Unsafe Browser appearing in the window list with the Tor Browser icon. (#20934) Make reporting an error using WhisperBack more robust. (#20921) Fix USB tethering. (#20940) For more details, read our changelog. Get Tails…

Read More

ABB Cylon Aspect 3.08.04 DeploySource – Remote Code Execution (RCE)

ABB Cylon Aspect 3.08.04 DeploySource – Remote Code Execution (RCE) Vendor: ABB Ltd. Product web page: https://www.global.abb Affected version: NEXUS Series, MATRIX-2 Series, ASPECT-Enterprise, ASPECT-Studio Firmware: <=3.08.04 Summary: ASPECT is an award-winning scalable building energy management and control solution designed to allow users seamless access to their building data through standard building…

Read More

Fileless Execution: PowerShell Based Shellcode Loader Executes Remcos RAT

Cybercriminals are progressively turning PowerShell to launch stealthy attacks that evade traditional antivirus and endpoint defenses. By running code directly in memory, these threats leave minimal evidence on disk, making them particularly challenging to detect. A recent example is Remcos RAT, a well-known remote access trojan recognized for its persistence and stealth. It provides attackers…

Read More

TightVNC 2.8.83 – Control Pipe Manipulation

# Exploit Title: TightVNC 2.8.83 – Control Pipe Manipulation # Date: 06/09/2025 # Exploit Author: Ionut Zevedei (mail@izvd.eu) # Exploit Repository: https://github.com/zeved/CVE-2024-42049-PoC # Vendor Homepage: https://www.tightvnc.com/ # Software Link: https://www.tightvnc.com/download.php # Version: 2.8.83 # Tested on: Windows 10 x64 – TightVNC 2.5.10, 2.8.81 # CVE : CVE-2024-42049 #include =20 #include #include #include…

Read More

Simplifying DORA Compliance with the Qualys Enterprise TruRisk™ Platform

Strengthening Resilience for the Financial Sector The Digital Operational Resilience Act (DORA) is a landmark EU regulation that establishes a unified framework for managing technology risk in the financial sector. It’s designed to ensure that banks, insurers, investment firms, and other financial entities can withstand, respond to, and recover from all types of ICT-related disruptions—from…

Read More

9th June – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 9th June, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES American tax company, Optima Tax Relief, has disclosed a ransomware attack that resulted in the theft of 69GB of sensitive data, including corporate records and customer case files containing personal information such…

Read More