MeetC2 – A serverless C2 framework that leverages Google Calendar APIs as a communication channel

MeetC2 is a PoC C2 tool using Google Calendar to mimic cloud abuse, helping teams test detection, logging, and response. Background: Modern adversaries increasingly hide command-and-control (C2) traffic inside cloud services. We built this proof of concept (PoC) to study and demonstrate those techniques in a controlled way, emulating those tactics so red and blue teams […]

September 6, 2025
Read More >>

China to Ban Hidden Car Door Handles by 2027

Chinese automotive journalists are discussing a potential 2027 ban on defective door handle designs due to high failure rates. 但是,不管是哪一种全隐藏式门把手其便利性和安全性都不如传统的门把手。根据媒体报道,有SAE论文数据显示,隐藏式门把手对轿车风阻系数改善仅0.005-0.01Cd,远低于车企宣称的0.03Cd。而在成本上,单个电子门把手成本是机械式的3倍,但故障率却是…

September 6, 2025
Read More >>

Critical SAP S/4HANA flaw CVE-2025-42957 under active exploitation

Experts warn of an actively exploited vulnerability, tracked as CVE-2025-42957 (CVSS score: 9.9), in SAP S/4HANA software. A critical command injection vulnerability, tracked as CVE-2025-42957 (CVSS score of 9.9), in SAP S/4HANA is under active exploitation. An attacker can exploit this flaw to fully compromise SAP systems, altering databases, creating superuser accounts, and stealing password hashes. “SAP […]

September 5, 2025
Read More >>