Aggregator
CVE-2025-43720 | Headwind MDM up to 5.33.0 Configuration Profile improper authorization
CVE-2025-52374 | hMailServer 5.6.9-beta/5.8.6 Admin Console Encryption.cs hard-coded key
CVE-2025-52373 | hMailServer 5.6.9-beta/5.8.6 BlowFish.cpp hard-coded key
CVE-2025-7717 | File Download up to 1.8.x/2.0.0 on Drupal authorization (trib-2025-089)
CVE-2025-32744 | Dell AppSync 4.6.0.0 unrestricted upload (dsa-2025-277)
CVE-2025-7393 | Mail Login up to 3.1.x/4.1.x on Drupal excessive authentication (trib-2025-088)
CVE-2025-30477 | Dell PowerScale OneFS up to 9.10.1.0 risky encryption (dsa-2025-192)
CVE-2025-54082 | marshmallow-packages nova-tiptap up to 5.6.x disk unrestricted upload (GHSA-96c2-h667-9fxp)
7-Zip 存在两处漏洞,或引发拒绝服务攻击
ToolShell漏洞:全球范围内出现新型SharePoint远程代码执行零日漏洞攻击链
LibreOffice 指责微软借复杂文件格式蓄意 “锁定” 用户
Iran-Linked DCHSpy Android Malware Masquerades as VPN Apps to Spy on Dissidents
IBM security advisory (AV25-436)
[Control systems] CISA ICS security advisories (AV25–435)
KAWA4096 Ransomware Employs WMI Techniques to Delete Backup Snapshots
Trustwave SpiderLabs has played a crucial role in monitoring new ransomware variants in the incredibly unstable ransomware threat landscape of 2025, where dozens of new groups have emerged and caused extensive disruptions across multiple sectors. Among these, the KAWA4096 ransomware has been identified as a notable newcomer, first detected in June 2025. This strain has […]
The post KAWA4096 Ransomware Employs WMI Techniques to Delete Backup Snapshots appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Telegram Scrapper 2.0: A powerful Python script that allows you to scrape messages and media from Telegram channels using the Telethon library
Indian crypto exchange CoinDCX says $44 million stolen from reserves
Phobos атаковал — F6 расшифровал: новая утилита уже на GitHub
AI-Powered Cloaking Tools Help Threat Actors Hide Malicious Domains from Security Scans
Threat actors are increasingly adopting AI-powered cloaking services to obfuscate phishing domains, counterfeit e-commerce sites, and malware distribution endpoints from automated security scanners. This technique, known as cloaking, involves dynamically serving innocuous “white pages” to detection mechanisms while directing legitimate users to malicious “black pages.” Leveraging advancements in JavaScript fingerprinting, machine learning algorithms, and behavioral […]
The post AI-Powered Cloaking Tools Help Threat Actors Hide Malicious Domains from Security Scans appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.