Aggregator
CVE-2025-55299 | 7ritn VaulTLS up to 0.9.0 weak password (GHSA-pjfr-pj3h-cw8m)
Amazon Q Developer: Secrets Leaked via DNS and Prompt Injection
CVE-2025-55293 | Meshtastic Firmware up to 2.6.2 improper authentication (GHSA-95pq-gj5v-4fg2)
CVE-2025-55300 | komari-monitor komari up to 1.0.4 Terminal Websocket Endpoint cross site scripting (GHSA-q355-h244-969h)
CVE-2025-55288 | MGeurts genealogy up to 4.3.x cross site scripting (GHSA-3h8x-g9xj-rhwg / EUVD-2025-25149)
CVE-2025-55287 | MGeurts genealogy up to 4.3.x cross site scripting (GHSA-j457-9m86-6q5r / EUVD-2025-25150)
«Быстрее и стабильнее». Физики научились совмещать две несовместимые характеристики кубитов
Nebraska man gets 1 year in prison for $3.5M cryptojacking scheme
BSidesSF 2025: Inside The Information Stealer Ecosystem: From Compromise To Countermeasure
Creator, Author and Presenter:
Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held at the lauded CityView / AMC Metreon - certainly a venue like no other; and via the organization's YouTube channel.
Additionally, the organization is welcoming volunteers for the BSidesSF Volunteer Force, as well as their Program Team & Operations roles. See their succinct BSidesSF 'Work With Us' page, in which, the appropriate information is to be had!
The post BSidesSF 2025: Inside The Information Stealer Ecosystem: From Compromise To Countermeasure appeared first on Security Boulevard.
Red Hat security advisory (AV25-527)
Microsoft Edge security advisory (AV25-526)
Fake ChatGPT Desktop App Delivering PipeMagic Backdoor, Microsoft
IBM security advisory (AV25-525)
Casino gaming company Bragg says hackers accessed ‘internal computer environment’
Threat Actors Exploit Microsoft Help Index File to Deploy PipeMagic Malware
Cybersecurity researchers have uncovered a sophisticated campaign where threat actors leverage a Microsoft Help Index File (.mshi) to deploy the PipeMagic backdoor, marking a notable evolution in malware delivery methods. This development ties into the exploitation of CVE-2025-29824, a zero-day elevation of privilege vulnerability in the Windows Common Log File System (CLFS) driver, which Microsoft […]
The post Threat Actors Exploit Microsoft Help Index File to Deploy PipeMagic Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
ERMAC Android malware source code leak exposes banking trojan infrastructure
Akira
You must login to view this content