Aggregator
15 стран — единый стандарт. Google вводит лицензирование криптоприложений
CVE-2023-20015 | Cisco Firepower 4100/Firepower 9300/UCS CLI command injection (cisco-sa-nxfp-cmdinj-XXBZjtR / EUVD-2023-24194)
CVE-2025-8013 | Quttera Web Malware Scanner Plugin up to 3.5.1.41 on WordPress RunExternalScan server-side request forgery
‘Blue Locker’ Ransomware Targeting Oil & Gas Sector in Pakistan
CVE-2023-20012 | Cisco Nexus 9300-FX3 improper authentication (cisco-sa-elyfex-dos-gfvcByx / EUVD-2023-24191)
2025 年新兴网络威胁瞄准医疗与工业领域
10 Best Managed Detection And Response (MDR) Companies in 2025
Organizations of all sizes face an unrelenting barrage of sophisticated cyber threats, from highly evolved ransomware strains and stealthy advanced persistent threats (APTs) to cunning social engineering campaigns—challenges that increasingly drive the adoption of MDR Services to enhance detection and response capabilities. The sheer volume and complexity of security alerts, coupled with a severe global […]
The post 10 Best Managed Detection And Response (MDR) Companies in 2025 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Cisco Secure Firewall Snort 3 Detection Engine Vulnerability Enables DoS Attacks
Critical security flaw CVE-2025-20217 allows unauthenticated attackers to trigger denial-of-service conditions in Cisco’s widely deployed firewall systems Cisco has disclosed a high-severity vulnerability in its Secure Firewall Threat Defense (FTD) Software that could allow remote attackers to cause denial-of-service conditions through the Snort 3 Detection Engine. The vulnerability, tracked as CVE-2025-20217 with a CVSS score […]
The post Cisco Secure Firewall Snort 3 Detection Engine Vulnerability Enables DoS Attacks appeared first on Cyber Security News.
10 Best Deception Tools in 2025
The goal of deception technology, which uses some of the best deception tools, is to trick attackers by dispersing a variety of traps and dummy assets throughout a system’s infrastructure to mimic real assets. There is always a possibility that cybercriminals will breach your network, regardless of how effective your perimeter defenses. You’ll lure them […]
The post 10 Best Deception Tools in 2025 appeared first on Cyber Security News.
Карта в кармане, а деньги у хакеров: как PhantomCard эксплуатирует NFC для кражи денежных средств
一氧化碳新解毒剂能在数分钟内清理血液
CVE-2025-9003 | D-Link DIR-818LW 1.04 DHCP Reserved Address /bsc_lan.php Name cross site scripting
CVE-2025-9004 | mtons mblog up to 3.5.0 /settings/password excessive authentication (ICPMIR)
CVE-2025-9005 | mtons mblog up to 3.5.0 /register information exposure (ICPMJO)
CVE-2025-9006 | Tenda CH22 1.0.0.1 /goform/delFileName formdelFileName buffer overflow
CVE-2025-9007 | Tenda CH22 1.0.0.1 /goform/editFileName formeditFileName buffer overflow
CVE-2025-9009 | itsourcecode Online Tour and Travel Management System 1.0 /admin/email_setup.php Name sql injection
CVE-2025-9010 | itsourcecode Online Tour and Travel Management System 1.0 booking_report.php from_date sql injection
CVE-2025-8088 – WinRAR 0-Day Path Traversal Vulnerability Exploited to Execute Malware
A zero-day vulnerability in WinRAR allows malware to be deployed on unsuspecting users’ systems, highlighting the ongoing threats to popular software. Tracked as CVE-2025-8088, this path traversal flaw affects the Windows version of the widely used file archiving tool, enabling attackers to execute arbitrary code through specially crafted archives. The vulnerability, discovered in mid-July 2025, […]
The post CVE-2025-8088 – WinRAR 0-Day Path Traversal Vulnerability Exploited to Execute Malware appeared first on Cyber Security News.