iT4iNT SERVER Hackers Exploiting Triofox Flaw to Install Remote Access Tools via Antivirus Feature VDS VPS Cloud #CyberSecurity #Hacking #DataBreach #Vulnerability #Malware
Hackers Exploiting Triofox Flaw to Install Remote Access Tools via Antivirus Feature
Google's Mandiant Threat Defense on Monday said it discovered n-day exploitation of a now-patched security flaw in Gladinet's Triofox file-sharing and remote access platform.
The critical vulnerability, tracked as CVE-2025-12480 (CVSS score: 9.1), allows an attacker to bypass authentication and access the configuration pages, resulting in the upload and execution of arbitrary payloads.
The
dlvr.it
November 11, 2025 at 12:08 AM
iT4iNT SERVER Hackers Exploiting Triofox Flaw to Install Remote Access Tools via Antivirus Feature VDS VPS Cloud #CyberSecurity #Hacking #DataBreach #Vulnerability #Malware
Oops Intoxicator was defeated and enslaved by E:\KL1P53 and now works as a field operative for Redslash Cybergroup. At least he gets a cool new suit he's forced to wear!
Commissioned from @nx42.bsky.social
Commissioned from @nx42.bsky.social
November 10, 2025 at 8:27 PM
Oops Intoxicator was defeated and enslaved by E:\KL1P53 and now works as a field operative for Redslash Cybergroup. At least he gets a cool new suit he's forced to wear!
Commissioned from @nx42.bsky.social
Commissioned from @nx42.bsky.social
Like all these Flok cameras. If cops have the equivalent of a gps tag fixed to your vehicle how do we have a 4A? Oc guns aren’t only part piece (a critical one though) We need a variety of tools & skills like hacking, emergency medicine, mutual aid.
November 10, 2025 at 6:44 PM
Like all these Flok cameras. If cops have the equivalent of a gps tag fixed to your vehicle how do we have a 4A? Oc guns aren’t only part piece (a critical one though) We need a variety of tools & skills like hacking, emergency medicine, mutual aid.
Here are five of the best free ethical hacking tools widely used by professionals and beginners in the cybersecurity community:
1. Nmap
2. Wireshark
3. Metasploit Framework
4. Burp Suite Community Edition
5. John the Ripper
1. Nmap
2. Wireshark
3. Metasploit Framework
4. Burp Suite Community Edition
5. John the Ripper
November 10, 2025 at 4:58 PM
Here are five of the best free ethical hacking tools widely used by professionals and beginners in the cybersecurity community:
1. Nmap
2. Wireshark
3. Metasploit Framework
4. Burp Suite Community Edition
5. John the Ripper
1. Nmap
2. Wireshark
3. Metasploit Framework
4. Burp Suite Community Edition
5. John the Ripper
Python for Ethical Hacking Tools, Libraries, and Real-World Applications
pythonclcoding.gumroad.com/l/bjncjn
pythonclcoding.gumroad.com/l/bjncjn
November 10, 2025 at 4:47 PM
Python for Ethical Hacking Tools, Libraries, and Real-World Applications
pythonclcoding.gumroad.com/l/bjncjn
pythonclcoding.gumroad.com/l/bjncjn
Heaven Burns Red suddenly thinks I have "hacking tools". I've cheated in an online game in my entire life. I hate cheating. There's no fun in it. Wtf
November 10, 2025 at 2:14 PM
Heaven Burns Red suddenly thinks I have "hacking tools". I've cheated in an online game in my entire life. I hate cheating. There's no fun in it. Wtf
I am partial to the pro-hacker position. That tools and machines are often invented by individuals hacking shit and then get corrupted by elites who seek to create power. Language learning models and Markov chains vaguely fit into this.
November 9, 2025 at 7:33 PM
I am partial to the pro-hacker position. That tools and machines are often invented by individuals hacking shit and then get corrupted by elites who seek to create power. Language learning models and Markov chains vaguely fit into this.
Cybersecurity is more than hacking it’s protecting people and information.
You’ll analyze threats, monitor systems, and stay two steps ahead of attackers.
Start by learning network basics and security tools like Wireshark or Splunk.
You’ll analyze threats, monitor systems, and stay two steps ahead of attackers.
Start by learning network basics and security tools like Wireshark or Splunk.
November 9, 2025 at 10:56 AM
Cybersecurity is more than hacking it’s protecting people and information.
You’ll analyze threats, monitor systems, and stay two steps ahead of attackers.
Start by learning network basics and security tools like Wireshark or Splunk.
You’ll analyze threats, monitor systems, and stay two steps ahead of attackers.
Start by learning network basics and security tools like Wireshark or Splunk.
The Agentic Uprising: How Autonomous Browsers Are Hacking Your Job and Your Security
Introduction: The digital landscape is shifting beneath our feet with the emergence of agentic browsers, AI-driven tools that autonomously execute complex tasks online. While promising unprecedented efficiency,…
Introduction: The digital landscape is shifting beneath our feet with the emergence of agentic browsers, AI-driven tools that autonomously execute complex tasks online. While promising unprecedented efficiency,…
The Agentic Uprising: How Autonomous Browsers Are Hacking Your Job and Your Security
Introduction: The digital landscape is shifting beneath our feet with the emergence of agentic browsers, AI-driven tools that autonomously execute complex tasks online. While promising unprecedented efficiency, these agents introduce a new frontier of cybersecurity risks, from automated data exfiltration to credential theft on an industrial scale. Understanding and securing against this new wave of non-human traffic is no longer optional; it's a critical imperative for every IT and security professional.
undercodetesting.com
November 8, 2025 at 10:18 PM
The Agentic Uprising: How Autonomous Browsers Are Hacking Your Job and Your Security
Introduction: The digital landscape is shifting beneath our feet with the emergence of agentic browsers, AI-driven tools that autonomously execute complex tasks online. While promising unprecedented efficiency,…
Introduction: The digital landscape is shifting beneath our feet with the emergence of agentic browsers, AI-driven tools that autonomously execute complex tasks online. While promising unprecedented efficiency,…
From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools #cybersecurity #hacking #news #infosec #security #technology #privacy thehackernews.com/20...
November 8, 2025 at 9:31 PM
From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools #cybersecurity #hacking #news #infosec #security #technology #privacy thehackernews.com/20...
Advanced 2.5 Million-Year-Old Tools May Rewrite Human History #cybersecurity #hacking #news #infosec #security #technology #privacy www.404media.co/adva...
November 8, 2025 at 10:27 AM
Advanced 2.5 Million-Year-Old Tools May Rewrite Human History #cybersecurity #hacking #news #infosec #security #technology #privacy www.404media.co/adva...
Atroposia Malware Offers Attackers Built-In Tools to Spy, Steal, and Scan Systems #Atroposia #DNSHijacking #Hacking
Atroposia Malware Offers Attackers Built-In Tools to Spy, Steal, and Scan Systems
Cybersecurity researchers have recently discovered a new malware platform known as Atroposia, which is being promoted on dark web forums as a subscription-based hacking toolkit. The platform offers cybercriminals a remote access trojan (RAT) that can secretly control computers, steal sensitive data, and even scan the infected system for security flaws, all for a monthly payment.
Researchers from Varonis, a data protection firm, explained that Atroposia is the latest example of a growing trend where ready-to-use malware services make advanced hacking tools affordable and accessible, even to attackers with little technical expertise.
How Atroposia Works
Atroposia operates as a modular program, meaning its users can turn individual features on or off depending on what they want to achieve. Once installed on a device, it connects back to the attacker’s command-and-control (C2) server using encrypted communication, making it difficult for defenders to detect its activity.
The malware can also bypass User Account Control (UAC), a security layer in Windows designed to prevent unauthorized changes, allowing it to gain full system privileges and remain active in the background.
Those who purchase access, reportedly priced at around $200 per month unlock a wide set of tools. These include the ability to open a hidden remote desktop, steal files, exfiltrate data, capture copied text, harvest credentials, and even interfere with internet settings through DNS hijacking.
One of the most distinctive parts of Atroposia is its HRDP Connect module, which secretly creates a secondary desktop session. Through this, attackers can explore a victim’s computer, read emails, open apps, or view documents without the user noticing anything unusual. Because the interaction happens invisibly, traditional monitoring systems often fail to recognize it as remote access.
The malware also provides an Explorer-style file manager, which lets attackers browse, copy, or delete files remotely. It includes a “grabber” feature that can search for specific file types or keywords, automatically compress the selected items into password-protected ZIP archives, and transmit them directly from memory leaving little trace on the device.
Theft and Manipulation Features
Atroposia’s data-theft tools are extensive. Its stealer module targets saved logins from browsers, chat records, and even cryptocurrency wallets. A clipboard monitor records everything a user copies, such as passwords, private keys, or wallet addresses, storing them in an easily accessible list for the attacker.
The RAT also uses DNS hijacking at the local machine level. This technique silently redirects web traffic to malicious sites controlled by the attacker, making it possible to trick victims into entering credentials on fake websites, download malware updates, or expose their data through man-in-the-middle attacks.
A Built-In Vulnerability Scanner
Unlike typical RATs, Atroposia comes with a local vulnerability scanner that automatically checks the system for weak spots, such as missing security patches, outdated software, or unsafe configurations. It generates a score to show which issues are easiest to exploit.
Researchers have warned that this function poses a major threat to corporate networks, since it can reveal unpatched VPN clients or privilege escalation flaws that allow attackers to deepen their access or spread across connected systems.
Security experts view Atroposia as part of a larger movement in the cybercrime ecosystem. Services like SpamGPT and MatrixPDF have already shown how subscription-based hacking tools lower the technical barrier for attackers. Atroposia extends that trend by bundling reconnaissance, exploitation, and data theft into one easy-to-use toolkit.
How Users Can Stay Protected
Analysts recommend taking preventive steps to reduce exposure to such threats.
Users should:
• Keep all software and operating systems updated.
• Download programs only from verified and official sources.
• Avoid pirated or torrent-based software.
• Be cautious of unfamiliar commands or links found online.
Companies are also urged to monitor for signs such as hidden desktop sessions, unusual DNS modifications, and data being sent directly from memory, as these can indicate the presence of sophisticated RATs like Atroposia.
Atroposia’s discovery highlights the growing ease with which advanced hacking tools are becoming available. What once required high-level expertise can now be rented online, posing a serious challenge to both individual users and large organizations trying to protect their digital environments.
dlvr.it
November 8, 2025 at 4:05 AM
Atroposia Malware Offers Attackers Built-In Tools to Spy, Steal, and Scan Systems #Atroposia #DNSHijacking #Hacking
November 8, 2025 at 2:52 AM
We should constantly remind ourselves that the password to NSA hacking tools repository was "password".
November 7, 2025 at 7:43 AM
We should constantly remind ourselves that the password to NSA hacking tools repository was "password".
ThreatsDay Bulletin: AI Tools in Malware, Botnets, GDI Flaws, Election Attacks & More #cybersecurity #hacking #news #infosec #security #technology #privacy thehackernews.com/20...
November 6, 2025 at 6:09 PM
ThreatsDay Bulletin: AI Tools in Malware, Botnets, GDI Flaws, Election Attacks & More #cybersecurity #hacking #news #infosec #security #technology #privacy thehackernews.com/20...
El lado del mal - Red Code Agent: Un Agentic AI para doblegar tus Code Agents y crear Red-Team Tools www.elladodelmal.com/2025/11/red-... #RedTeam #Agentic #AI #IA #hacking #Jailbreak #PromptInjection #LLM #Cursor #Codeium #OCI #MetaGPT #ReAct #Developer #pentest
Red Code Agent: Un Agentic AI para doblegar tus Code Agents y crear Red-Team Tools
Blog personal de Chema Alonso ( https://MyPublicInbox.com/ChemaAlonso ): Ciberseguridad, IA, Innovación, Tecnología, Cómics & Cosas Personasles.
www.elladodelmal.com
November 6, 2025 at 10:24 AM
El lado del mal - Red Code Agent: Un Agentic AI para doblegar tus Code Agents y crear Red-Team Tools www.elladodelmal.com/2025/11/red-... #RedTeam #Agentic #AI #IA #hacking #Jailbreak #PromptInjection #LLM #Cursor #Codeium #OCI #MetaGPT #ReAct #Developer #pentest
Our list tomorrow involves sharp power tools hacking trees. The Rosemary hedge and the lilipilli ones have gone berserk. And a lawn mower session.
November 6, 2025 at 7:08 AM
Our list tomorrow involves sharp power tools hacking trees. The Rosemary hedge and the lilipilli ones have gone berserk. And a lawn mower session.
They're resistance grifters from X who think they can immediately parlay a few interlinked starter packs and automated following tools into a 1:1 replacement for past Twitter popularity. It's sophomoric growth-hacking stuff.
November 6, 2025 at 12:59 AM
They're resistance grifters from X who think they can immediately parlay a few interlinked starter packs and automated following tools into a 1:1 replacement for past Twitter popularity. It's sophomoric growth-hacking stuff.
The Top 3 Browser Sandbox Threats That Slip Past Modern Security Tools #cybersecurity #hacking #news #infosec #security #technology #privacy
The Top 3 Browser Sandbox Threats That Slip Past Modern Security Tools
Attackers exploit web browsers' built-in behaviors to steal credentials, abuse extensions, and move laterall, slipping past traditional defenses. Learn from Keep Aware how browser-layer visibility and policy enforcement stop these hidden threats in real time.
www.bleepingcomputer.com
November 5, 2025 at 11:33 PM
The Top 3 Browser Sandbox Threats That Slip Past Modern Security Tools #cybersecurity #hacking #news #infosec #security #technology #privacy
Part of the UAE's national strategy and global vision in AI is to use AI tools to conduct mass surveillance, hacking, and censorship to engage in political suppression of its own population... and to export these tools to fascist governments worldwide.
Are you grateful to be promoting that vision?
Are you grateful to be promoting that vision?
November 5, 2025 at 4:28 PM
Part of the UAE's national strategy and global vision in AI is to use AI tools to conduct mass surveillance, hacking, and censorship to engage in political suppression of its own population... and to export these tools to fascist governments worldwide.
Are you grateful to be promoting that vision?
Are you grateful to be promoting that vision?
G42 has been implicated in multiple incidents of espionage against Americans, and aiding the totalitarian rulers of the UAE with AI tools of surveillance and hacking to crack down on political dissent.
G42 is an opponent of democracy.
Microsoft should be ashamed to be working with this company.
G42 is an opponent of democracy.
Microsoft should be ashamed to be working with this company.
November 5, 2025 at 4:25 PM
G42 has been implicated in multiple incidents of espionage against Americans, and aiding the totalitarian rulers of the UAE with AI tools of surveillance and hacking to crack down on political dissent.
G42 is an opponent of democracy.
Microsoft should be ashamed to be working with this company.
G42 is an opponent of democracy.
Microsoft should be ashamed to be working with this company.
In a statement on Nov 5, police said: “All three accused persons were found in possession of sophisticated hacking tools and malware, including PlugX-related malware and tools.
November 5, 2025 at 3:27 PM
In a statement on Nov 5, police said: “All three accused persons were found in possession of sophisticated hacking tools and malware, including PlugX-related malware and tools.
HydraPWK Penetration Testing OS With Necessary Hacking Tools and Simplified Interface
HydraPWK Penetration Testing OS With Necessary Hacking Tools and Simplified Interface
cybersecuritynews.com
November 5, 2025 at 6:24 AM
HydraPWK Penetration Testing OS With Necessary Hacking Tools and Simplified Interface
Russian group Curly COMrades hides malware in Hyper-V Linux VMs on Windows, using CurlyShell and CurlCat tools to evade EDR detection.
Via @bleepingcomputer.com
#hacking #infosec #cybersecurity
www.bleepingcomputer.com/news/securit...
Via @bleepingcomputer.com
#hacking #infosec #cybersecurity
www.bleepingcomputer.com/news/securit...
Russian hackers abuse Hyper-V to hide malware in Linux VMs
The Russian hacker group Curly COMrades is abusing Microsoft Hyper-V in Windows to bypass endpoint detection and response solutions by creating a hidden Alpine Linux-based virtual machine to run malwa...
www.bleepingcomputer.com
November 4, 2025 at 6:16 PM
Russian group Curly COMrades hides malware in Hyper-V Linux VMs on Windows, using CurlyShell and CurlCat tools to evade EDR detection.
Via @bleepingcomputer.com
#hacking #infosec #cybersecurity
www.bleepingcomputer.com/news/securit...
Via @bleepingcomputer.com
#hacking #infosec #cybersecurity
www.bleepingcomputer.com/news/securit...