Skip to content

Web Application Security Testing

Auchan Data Breach: Loyalty Program Compromise Exposes Customer Information

In another blow to consumer data privacy, European retail giant Auchan has confirmed a data breach that impacted several hundred thousand of its customers. The breach specifically targeted customer loyalty accounts and resulted in the unauthorized exposure of sensitive personal information. >>Outpace Attackers With AI-Based Automated Penetration Testing What Was Exposed? Auchan’s loyalty program, a… Read More »Auchan Data Breach: Loyalty Program Compromise Exposes Customer Information

CVE-2025-53770 (Microsoft SharePoint)

Description: Deserialization vulnerability enabling unauthenticated RCE via the /_layouts/15/ToolPane.aspx endpoint. Technical Details: CVSS Score: 9.8 (Critical) Exploit: Attackers craft malicious ASPX payloads (spinstall0.aspx) to exploit unsafe deserialization, extracting ValidationKey and DecryptionKey from __VIEWSTATE. Spoofed Referer headers (/layouts/SignOut.aspx) bypass authentication. The exploit chains with CVE-2025-49704 (spoofing, CVSS 8.8) and CVE-2025-49706 (RCE bypass), deploying .dll payloads (SHA256:… Read More »CVE-2025-53770 (Microsoft SharePoint)

Weekly Report: New Hacking Techniques and Critical CVEs July 21-27, 2025

This week’s critical cybersecurity developments (July 21–27, 2025) encompass actively exploited zero-days, industrial control system vulnerabilities, and sophisticated ransomware and APT activity surfacing on underground forums. Microsoft SharePoint servers continue under siege via the “ToolShell” exploit chain (CVE-2025-49706, CVE-2025-49704), while Google Chrome’s V8 engine suffered an in-the-wild type-confusion zero-day (CVE-2025-6554). Multiple high-severity flaws in Honeywell’s… Read More »Weekly Report: New Hacking Techniques and Critical CVEs July 21-27, 2025