Aggregator
CVE-2023-41521 | Student Attendance Management System 1.0 createSessionTerm.php sessionName sql injection
CVE-2023-41520 | Student Attendance Management System 1.0 createClassArms.php classArmName sql injection
CVE-2025-55077 | Tyler ERP Pro 9 SaaS prior 2025-08-01 unnecessary privileges
OpenAI GPT-5 发布:模型能力全面「屠榜」,构建「超级智能」第一步
ChatGPT's GPT-5 models released: everything you need to know
BSidesSF 2025: Effective Handling of Third-Party Supplier Incidents
Creator/Author/Presenter: Kasturi Puramwar
Our deep appreciation to Security BSides - San Francisco and the Creators/Authors/Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held at the lauded CityView / AMC Metreon - certainly a venue like no other; and via the organization's YouTube channel.
Additionally, the organization is welcoming volunteers for the BSidesSF Volunteer Force, as well as their Program Team & Operations roles. See their succinct BSidesSF 'Work With Us' page, in which, the appropriate information is to be had!
The post BSidesSF 2025: Effective Handling of Third-Party Supplier Incidents appeared first on Security Boulevard.
HashiCorp Vault 0-Day Flaws Enable Remote Code Execution Attacks
Researchers at Cyata have disclosed nine previously unknown zero-day vulnerabilities in HashiCorp Vault, a widely adopted open-source secrets management platform, enabling attackers to bypass authentication, escalate privileges, and achieve remote code execution (RCE). These flaws, assigned CVEs through responsible disclosure and patched in collaboration with HashiCorp, stem from subtle logic errors in core components like […]
The post HashiCorp Vault 0-Day Flaws Enable Remote Code Execution Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
'Samourai' Cryptomixer Founders Plead Guilty to Money Laundering
SocGholish Malware Spread via Ad Tools; Delivers Access to LockBit, Evil Corp, and Others
Splunk Unveils PLoB Tool to Detect Compromised Credential Usage
Splunk has introduced PLoB (Post-Logon Behaviour Fingerprinting and Detection) in a world where compromised credentials remain the primary vector for initial access in more than half of cybersecurity incidents, as noted in the Cisco Talos IR Trends report for Q1 2025 and supported by the Verizon Data Breach Investigations Report, which shows 22% of breaches […]
The post Splunk Unveils PLoB Tool to Detect Compromised Credential Usage appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
TheFatRat: An exploiting tool which compiles a malware with famous payload, and then the compiled malware can be executed on Linux , Windows , Mac and Android
Qilin
You must login to view this content
Citizen Lab Founder Flags Rise of US Authoritarianism
Фейковый “антивирус” LunaSpy следит за россиянами: троянец записывает звук, экран и крадёт коды 2FA
PH03N1X V1P3R N0V4 CTF
Date: Aug. 2, 2025, 7:56 a.m. — 02 Aug. 2025, 07:56 UTC [add to calendar]
Format: Jeopardy
On-site
Location: Timisoara, Romania
Offical URL: http://platform.pwnctf.ro/
Rating weight: 0.00
Event organizers: PH03N1X V1P3R N0V4 CTF
«Эксперт с дипломом PhD»: OpenAI называет GPT-5 самым умным ИИ в истории
New EDR killer tool used by eight different ransomware groups
What GPT‑5 means for IT teams, devs, and the future of AI at work
OpenAI has released GPT‑5, the newest version of its large language model. It’s now available to developers and ChatGPT users, and it brings some real changes to how AI can be used in business and IT environments. GPT‑5 (with thinking) performs better than OpenAI o3 with 50-80% less output tokens across capabilities, including visual reasoning, agentic coding, and graduate-level scientific problem solving (Source: Open AI) Unlike previous versions, GPT‑5 uses a new approach behind the … More →
The post What GPT‑5 means for IT teams, devs, and the future of AI at work appeared first on Help Net Security.
Hackers Exploit SVG Files with Embedded JavaScript to Deploy Malware on Windows Systems
Threat actors are increasingly using Scalable Vector Graphics (SVG) files to get beyond traditional defenses in the quickly developing field of cybersecurity. Unlike raster formats such as JPEG or PNG, which store pixel-based data, SVGs are XML-structured documents that define vector shapes, paths, and text, enabling seamless scalability. This inherent flexibility, however, permits the embedding […]
The post Hackers Exploit SVG Files with Embedded JavaScript to Deploy Malware on Windows Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.