Topic: network pivoting
-
Russian Hackers Hide Malware in Linux VMs Using Hyper-V
The Russian cyber-espionage group Curly COMrades uses Microsoft's Hyper-V to hide malware in concealed Linux virtual machines, evading standard security measures and targeting entities aligned with Russian interests. Attackers deploy a minimal Alpine Linux VM hosting custom tools like CurlyShell ...
Read More » -
NVIDIA Triton Server Exposes Critical Security Vulnerabilities
Security researchers discovered high-risk vulnerabilities in NVIDIA's Triton Inference Server, allowing attackers to remotely take control of systems without authentication. The flaws (CVE-2025-23319, CVE-2025-23320, CVE-2025-23334) could lead to model theft, data breaches, response manipulation,...
Read More » -
Kali Linux 2025.3: 10 New Hacking Tools & Wi-Fi Upgrades
Kali Linux 2025.3 has been released, introducing ten new hacking tools and major enhancements to its wireless and mobile frameworks, including the official integration of the Nexmon firmware patching framework. The update expands the toolkit with tools for web security auditing, AI integration in...
Read More » -
Critical Server Vulnerability Actively Exploited - Patch Now!
A critical 10/10 severity vulnerability in AMI MegaRAC firmware (CVE-2024-54085) allows attackers to bypass authentication and gain full server control via BMCs, putting thousands of systems at risk. Exploits are now active in the wild, enabling attackers to pivot across networks, comprom...
Read More »