Topic: security research
-
fiddleitm: Detect Malicious Web Traffic with Open-Source MITM Proxy
Fiddleitm is an open-source MITM proxy tool that detects malware, phishing, and cyber threats by analyzing HTTP traffic in real time. It features a rule-based detection system with customizable patterns, alerting users to threats via mitmproxy's console and logs. Key capabilities include modifyin...
Read More » -
Critical Docker Desktop Flaw Exposes Windows Hosts to Hijacking
A critical vulnerability (CVE-2025-9074) in Docker Desktop for Windows and macOS allows attackers to compromise the host system by executing malicious containers, bypassing the Enhanced Container Isolation feature. The flaw enables unauthorized access to host files and services via the Docker Eng...
Read More » -
Google’s Gemini AI Hacked via Poisoned Calendar Invite to Control Smart Homes
Security researchers found a vulnerability in Google's Gemini AI, where malicious calendar invites can hijack smart home systems using hidden plain English commands. The attack exploits delayed automatic tool invocation, lying dormant until triggered by casual user interactions like saying "thank...
Read More »