Aggregator
CVE-2025-53526 | LabRedesCefetRJ WeGIA up to 3.4.2 novo_memorando.php cross site scripting (GHSA-46fm-hx2r-69fg / EUVD-2025-20291)
CVE-2025-1351 | IBM Storage Virtualize 8.5/8.6/8.7 Login race condition
'Hunters International' RaaS Group Closes Its Doors
CVE-2024-43190 | IBM Engineering Requirements Management DOORS 9.7.2.9 password recovery (EUVD-2024-54752)
CVE-2025-53529 | LabRedesCefetRJ WeGIA up to 3.4.2 profile_funcionario.php id_funcionario sql injection (GHSA-rrj6-pj6w-8j2r / EUVD-2025-20288)
CVE-2025-53527 | LabRedesCefetRJ WeGIA up to 3.4.0 relatorio_geracao.php almox sql injection (GHSA-43xw-c4g6-jgff)
CVE-2024-37656 | GNU gnuboard5 5.5.16 URL Parameter bbs/logout.php redirect (EUVD-2024-54753)
CVE-2020-9895 | Apple iTunes up to 12.10.7 on Windows WebKit use after free (HT211293 / Nessus ID 241427)
CVE-2020-9895 | Apple Safari up to 13.1.1 WebKit use after free (HT211292 / Nessus ID 241427)
CVE-2020-9894 | Apple iCloud up to 11.2 on Windows WebKit memory corruption (HT211294 / Nessus ID 241427)
Beware of Bert: New ransomware group targets healthcare, tech firms
Abusing Trust: Threat Actors Leverage Signed Drivers for Stealthy Windows Kernel Exploits
Cybercriminals continue to use kernel-level malware as a preferred weapon against Windows systems amid a terrifying increase in cyberthreats. Operating at ring 0 the highest privilege level in the operating system such malware grants attackers unparalleled access to disable security defenses, maintain persistence, and operate undetected. Despite Microsoft’s robust countermeasures like PatchGuard, Driver Signature Enforcement […]
The post Abusing Trust: Threat Actors Leverage Signed Drivers for Stealthy Windows Kernel Exploits appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
[Control systems] CISA ICS security advisories (AV25-400)
Частица-убийца теории струн готовится нанести удар на БАК
Parrot Security OS 6.4 Released – What’s New!
The Parrot Security team has released Parrot Security OS 6.4, a robust update featuring community-driven enhancements and contributions. As the probable final chapter of the 6.x series, this release refines the security-focused OS and sets the stage for the upcoming Parrot 7. Parrot Security OS is an Ethical Hacking and Cybersecurity Professional dedicated Distribution, explicitly […]
The post Parrot Security OS 6.4 Released – What’s New! appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Dell security advisory (AV25-399)
Scattered Spider weaves web of social-engineered destruction
The cybercrime ring has infiltrated more than 100 businesses since 2022, including more than a dozen since it regrouped earlier this year.
The post Scattered Spider weaves web of social-engineered destruction appeared first on CyberScoop.
Shadow AI Is Exploding, Governance Needs to Catch Up
Generative AI (GenAI) is already deeply embedded in enterprises, whether managers realize it or not. Sales teams use it to craft emails, engineers run agents that generate and test code, and marketers rely on it for copywriting and campaign ideation. And much of this is happening without formal approval, oversight, or control. This is known..
The post Shadow AI Is Exploding, Governance Needs to Catch Up appeared first on Security Boulevard.
Parrot OS 6.4 Released With Update For Popular Penetration Testing Tools
Debian-based penetration testing distribution delivers enhanced tools and prepares for next-generation release. Parrot Security has announced the release of Parrot OS 6.4, marking a significant milestone for the Debian-based penetration testing and cybersecurity distribution. This latest version brings substantial updates to core security tools, including Metasploit Framework 6.4.71, Sliver C2 framework, Caido web security toolkit, […]
The post Parrot OS 6.4 Released With Update For Popular Penetration Testing Tools appeared first on Cyber Security News.