Aggregator
The Unusual Suspect: Git Repos
CVE-2025-5394 | Alone Plugin up to 7.8.3 on WordPress alone_import_pack_install_plugin authorization
CVE-2025-5393 | Alone Plugin up to 7.8.3 on WordPress alone_import_pack_restore_data authorization
CVE-2024-42646 | NanoMQ 0.21.10 Message memory corruption (EUVD-2024-54786)
CVE-2024-42649 | NanoMQ 0.22.10 PUBLISH Message memory leak (EUVD-2024-54785)
CVE-2024-42648 | NanoMQ 0.22.10 CONNECT Message denial of service (EUVD-2024-54784)
CVE-2025-50756 | Wavlink WN535K3 20191010 set_sys_adm newpass command injection (EUVD-2025-21351)
Dedicated Proxies: A Key Tool for Online Privacy, Security and Speed
Threat Actors Attacking Gen Z Gamers With Weaponized Versions of Popular Games
A sophisticated malware campaign targeting Generation Z gamers has emerged, leveraging weaponized versions of popular games to infiltrate gaming communities and steal sensitive information. The campaign, which has recorded over 19 million malware distribution attempts in a single year, demonstrates how cybercriminals are increasingly exploiting the digital native generation’s passion for gaming to execute large-scale […]
The post Threat Actors Attacking Gen Z Gamers With Weaponized Versions of Popular Games appeared first on Cyber Security News.
New PHP-Based Interlock RAT Variant Uses FileFix Delivery Mechanism to Target Multiple Industries
Хотели на юг? Попали на «Мамонта». Пока мечтали о море — кормили хакеров
Gigabyte UEFI Firmware Vulnerability Let Attackers Execute Arbitrary Code in the SMM Environment
Critical security vulnerabilities have been discovered in Gigabyte UEFI firmware that could allow attackers to execute arbitrary code in System Management Mode (SMM), one of the most privileged execution environments in modern processors. The vulnerabilities, disclosed by the Software Engineering Institute’s CERT Coordination Center on July 11, 2025, affect multiple Gigabyte systems and could enable […]
The post Gigabyte UEFI Firmware Vulnerability Let Attackers Execute Arbitrary Code in the SMM Environment appeared first on Cyber Security News.
Gigabyte motherboards vulnerable to UEFI malware bypassing Secure Boot
Microsoft Details on Fixing Error “Identify Which Process Is Blocking a File in Windows” With Built-in Tools
Microsoft has provided comprehensive guidance for resolving the common Windows error “The process cannot access the file because it is being used by another process.” This technical issue, which frequently frustrates users attempting to delete, move, or modify files, can now be systematically diagnosed and resolved using several built-in Windows utilities and free Microsoft tools. […]
The post Microsoft Details on Fixing Error “Identify Which Process Is Blocking a File in Windows” With Built-in Tools appeared first on Cyber Security News.
Global
You must login to view this content