BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Exploits, Technical Details Released for CitrixBleed2 Vulnerability
/in General NewsResearchers released technical information and exploit code targeting a critical vulnerability (CVE-2025-5777) in Citrix NetScaler.
The post Exploits, Technical Details Released for CitrixBleed2 Vulnerability appeared first on SecurityWeek.
SecurityWeek – Read More
Pakistan’s Transparent Tribe Hits Indian Defence with Linux Malware
/in General NewsPakistan’s APT36 Transparent Tribe uses phishing and Linux malware to target Indian defence systems running BOSS Linux says Cyfirma.
Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto – Read More
Researchers Uncover Batavia Windows Spyware Stealing Documents from Russian Firms
/in General NewsRussian organizations have been targeted as part of an ongoing campaign that delivers a previously undocumented Windows spyware called Batavia.
The activity, per cybersecurity vendor Kaspersky, has been active since July 2024.
“The targeted attack begins with bait emails containing malicious links, sent under the pretext of signing a contract,” the Russian company said. “The main goal of the
The Hacker News – Read More
xvulnhuntr
/in General NewsIn 2024 we looked at the possibility of leveraging open weights LLMs for source code analysis.
The answer was clearly negative, as a small code base could easily take 200K tokens, more than any context window offered by open weights models.
The table below summarizes the top LLMs by context window as of today. Context windows significantly increased, compared to an average of 32.000 tokens last year. However, we are still a few orders of magnitude away from being able to feed entire code bases to LLMs.
Later in the year a tool named vulnhuntr was published (https://github.com/protectai/vulnhuntr). The tool approached limited context windows by performing source code analysis from source to sink and providing code blocks of the call chains iteratively in a multi-step process. Initially the LLM is fed code blocks for a set of files (e.g. sources where API entry points are defined). Then it literally asks for code blocks of functions and classes which are required for the analysis.
In addition to the clever approach, a track record of discovered vulnerabilities was published, making the tool even more appealing.
There is one relevant limitation though: only python code bases are supported. It is in fact very difficult to statically determine the call chain from source to sink for non-typed languages.
We decided that it was worth extending the tool to support additional languages. Therefore we created xvulnhuntr (https://github.com/CompassSecurity/xvulnhuntr), a fork of the original project where the ‘x’ stands for extended.
Xvulnuhntr also supports C#, Java and Go. For each language, there is a dedicated tool developed in the corresponding language. Given a repository path and a class or function name in input, the tool returns a json with the file name for the match and the source code of the code block matching the function/class name. This modular approach allows to easily extend support to other typed languages.
In addition, we intentionally put additional effort into making xvulnhuntr easier for developers to contribute to. Compared to the original project, it is possible to run xvulnhuntr against a local test suite, mocking API responses. This provides multiple advantages:
Next Steps
We primarily focused on the development of the tool. We expect refinements and bugs to come up as the tool is used against a variety of code bases. We are also interested in evaluating how analysis from different LLM providers compare to each other. Finally, we welcome and encourage contributions. Until then, happy LLM-powered hacking!
Compass Security Blog – Read More
PayPal’s AI-powered scam alert system might intercept your transactions now – here’s why
/in General NewsEXCLUSIVE: As scams get smarter, so does PayPal’s fraud-fighting AI model.
Latest stories for ZDNET in Security – Read More
CISA Adds Four Critical Vulnerabilities to KEV Catalog Due to Active Exploitation
/in General NewsThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added four security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild.
The list of flaws is as follows –
CVE-2014-3931 (CVSS score: 9.8) – A buffer overflow vulnerability in Multi-Router Looking Glass (MRLG) that could allow remote attackers to cause an
The Hacker News – Read More
TAG-140 Targets Indian Government Via ‘ClickFix-Style’ Lure
/in General NewsThe threat actors trick victims into opening a malicious script, leading to the execution of the BroaderAspect .NET loader.
darkreading – Read More
Why CISOs are making the SASE switch: Fewer vendors, smarter security, better AI guardrails
/in General NewsAI attacks are exposing gaps in multivendor stacks. CISOs are shifting to single-vendor SASE to consolidate, reduce risk and regain control.Read More
Security News | VentureBeat – Read More
Brazilian police arrest IT worker over $100 million cyber theft
/in General NewsPolice in Brazil arrested an employee of C&M Software, who allegedly told them he had sold his login credentials to the hackers behind a massive theft via the PIX instant payment system.
The Record from Recorded Future News – Read More
Bert Blitzes Linux & Windows Systems
/in General NewsThe new ransomware strain’s aggressive multithreading and cross-platform capabilities make it a potent threat to enterprise environments.
darkreading – Read More