Aggregator
Хакеры нашли в Windows лазейку, которую считали безопасной — теперь она открывает им доступ ко всему
Synology BeeDrive for Desktop on Windows Vulnerabilities Let Hackers Run Malicious Code
Synology has issued an urgent security advisory addressing critical vulnerabilities in its BeeDrive desktop application for Windows that could allow attackers to execute malicious code and delete arbitrary files. The company disclosed three separate Common Vulnerabilities and Exposures (CVE) identifiers on July 22, 2025, all classified with “Important” severity ratings, prompting immediate user action to […]
The post Synology BeeDrive for Desktop on Windows Vulnerabilities Let Hackers Run Malicious Code appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Ransomware Gangs Leveraging RMM Tools to Attack Organizations and Exfiltrate Data
Remote Monitoring and Management (RMM) software has long been the silent partner of help-desk engineers, automating patch cycles and troubleshooting sessions across sprawling enterprises. Over the past year, however, the same remote consoles have been quietly repurposed by ransomware gangs that crave the built-in trust, elevated privileges, and encrypted tunnels these tools provide. By masquerading […]
The post Ransomware Gangs Leveraging RMM Tools to Attack Organizations and Exfiltrate Data appeared first on Cyber Security News.
Боитесь звонить в поликлинику? Google выкатила ИИ-слугу, который всё сделает за вас
New ZuRu Malware Variant Targets macOS via Termius SSH Exploit
A sophisticated new variant of the macOS.ZuRu malware, originally identified in 2021, has resurfaced, employing a trojanized version of the Termius SSH client to deploy a modified Khepri command-and-control (C2) beacon. This iteration, detected in late May 2025, demonstrates advanced evasion techniques aimed at developers and IT professionals, facilitating persistent remote access while circumventing macOS […]
The post New ZuRu Malware Variant Targets macOS via Termius SSH Exploit appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Beating Supply Chain Attacks: DHL Impersonation Case Study
ANY.RUN’s services processes data on current threats daily, including attacks affecting supply chains. In this case study, we analyze examples of DHL brand abuse. The company is a leading global logistic operator, and attackers exploit its recognition to send phishing emails, potentially targeting its partners. We will demonstrate how ANY.RUN’s solutions can be used to […]
The post Beating Supply Chain Attacks: DHL Impersonation Case Study appeared first on ANY.RUN's Cybersecurity Blog.
Clorox Sues IT Provider Cognizant For Simply Giving Employee Password to Hackers
The Clorox Company, a leading household goods manufacturer, has filed a $380 million lawsuit against IT services provider Cognizant Technology Solutions. The lawsuit accuses Cognizant’s help-desk agents of inadvertently providing hackers with access to Clorox’s network during a security breach in August 2023. This intrusion severely disrupted operations and led to months of product shortages. […]
The post Clorox Sues IT Provider Cognizant For Simply Giving Employee Password to Hackers appeared first on Cyber Security News.
Suspected XSS Forum Admin Arrested in Ukraine
New York unveils new cyber regulations, $2.5 million grant program for water systems
Maximum severity Cisco ISE vulnerabilities exploited by attackers
One or more vulnerabilities affecting Cisco Identity Services Engine (ISE) are being exploited in the wild, Cisco has confirmed by updating the security advisory for the flaws. About the vulnerabilities The three vulnerabilities affect Cisco’s Identity Services Engine (ISE) – a network security policy and access control system for enterprises – and Cisco ISE Passive Identity Connector (ISE-PIC), which is a lightweight identity service that allows Cisco ISE to passively gather user identity information. CVE-2025-20281 … More →
The post Maximum severity Cisco ISE vulnerabilities exploited by attackers appeared first on Help Net Security.