Aggregator
PipeMagic Malware Mimic as ChatGPT App Exploits Windows Vulnerability to Deploy Ransomware
A sophisticated malware campaign has been identified, utilizing PipeMagic, a highly modular backdoor deployed by the financially motivated threat actor Storm-2460. This advanced malware masquerades as a legitimate open-source ChatGPT Desktop Application while exploiting the zero-day vulnerability CVE-2025-29824 in Windows Common Log File System (CLFS) to deploy ransomware across multiple sectors globally. Key Takeaways1. PipeMagic […]
The post PipeMagic Malware Mimic as ChatGPT App Exploits Windows Vulnerability to Deploy Ransomware appeared first on Cyber Security News.
Submit #628912: CodePhiliaX Chat2DB 0.3.7 JDBC Connection Remote Code Execution [Accepted]
基因改变果蝇的求爱方式
CVE-2025-9147 | jasonclark getsemantic up to 040c96eb8cf9947488bd01b8de99b607b0519f7d /index.php view cross site scripting
印尼军事扩张与普拉博沃军改对我利益的系统影响分析
模因战争,一种新型认知战武器
SSH Keys Are Crucial for Secure Remote Access but Often Remain a Blind Spot in Enterprise Security
Enterprise security strategies have evolved dramatically to address modern threats, yet SSH keys—critical cryptographic credentials that provide direct access to mission-critical systems—remain largely ungoverned and poorly managed across organizations. Despite their fundamental role in securing remote access to servers, cloud infrastructure, and automated processes, SSH keys represent one of the most significant blind spots in […]
The post SSH Keys Are Crucial for Secure Remote Access but Often Remain a Blind Spot in Enterprise Security appeared first on Cyber Security News.
卫星捕捉到 8.8 级地震所引发海啸的细节
Submit #628786: jasonclark getsemantic Master xss [Accepted]
CVE-2025-9146 | Linksys E5600 1.1.0.26 Firmware checkFw.sh verify_gemtek_header risky encryption
Хакеры против «РЕД СОФТ»: компания выставила свою СУБД на проверку багбаунти-охотников
Crypto Developers Attacked With Malicious npm Packages to Steal Login Details
A sophisticated new threat campaign has emerged targeting cryptocurrency developers through malicious npm packages designed to steal sensitive credentials and wallet information. The attack, dubbed “Solana-Scan” by researchers, specifically targets the Solana cryptocurrency ecosystem by masquerading as legitimate software development kits and scanning tools. The campaign centers around multiple malicious npm packages, including “solana-pump-test” and […]
The post Crypto Developers Attacked With Malicious npm Packages to Steal Login Details appeared first on Cyber Security News.