Aggregator
SecWiki News 2025-08-06 Review
更多最新文章,请访问SecWiki
UAC-0099 Hackers Weaponize HTA Files to Deploy MATCHBOIL Loader Malware
UAC-0099 is a threat actor organization that has been targeting state officials, defense forces, and defense-industrial firms in a series of sophisticated cyberattacks that Ukraine’s CERT-UA has been investigating. The attacks typically initiate with phishing emails from UKR.NET addresses, featuring subjects like “court summons” and links to legitimate file-sharing services, often shortened via URL shorteners. […]
The post UAC-0099 Hackers Weaponize HTA Files to Deploy MATCHBOIL Loader Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
#BHUSA: OpenAI Launches Red Teaming Challenge for New Open-Weight LLMs
Trend Micro security advisory (AV25-487)
CVE-2025-27835 | Artifex Ghostscript up to 10.04.0 Glyphs Converter psi/zbfont.c buffer overflow (Nessus ID 233372 / WID-SEC-2025-0556)
CVE-2025-27836 | Artifex Ghostscript up to 10.04.0 BJ10V Device gdev10v.c buffer overflow (Nessus ID 233372 / WID-SEC-2025-0556)
CVE-2025-27830 | Artifex Ghostscript up to 10.04.0 base/write_t1.c buffer overflow (Nessus ID 233372 / WID-SEC-2025-0556)
CVE-2025-27832 | Artifex Ghostscript up to 10.04.0 NPDL Device gdevnpdl.c buffer overflow (Nessus ID 233372 / WID-SEC-2025-0556)
CVE-2025-27831 | Artifex Ghostscript up to 10.04.0 DOCXWRITE TXTWRITE Device doc_common.c buffer overflow (Nessus ID 233372 / WID-SEC-2025-0556)
CVE-2025-27833 | Artifex Ghostscript up to 10.04.0 TTF Font Name pdf/pdf_fmap.c buffer overflow (Nessus ID 233372 / WID-SEC-2025-0556)
CVE-2025-27834 | Artifex Ghostscript up to 10.04.0 PDF Document pdf/pdf_func.c buffer overflow (Nessus ID 233372 / WID-SEC-2025-0556)
Threat Actors Weaponize Smart Contracts to Drain User Crypto Wallets of More Than $900k
In a sophisticated campaign uncovered in early 2024, cybercriminals have begun distributing malicious Ethereum smart contracts masquerading as lucrative trading bots. These weaponized contracts leverage Web3 development platforms such as Remix to entice victims into deploying code that appears to execute arbitrage strategies, only to siphon deposited funds into attacker-controlled wallets. Instead of conducting legitimate […]
The post Threat Actors Weaponize Smart Contracts to Drain User Crypto Wallets of More Than $900k appeared first on Cyber Security News.
Alleged Data Breach of Hotel Ca’ dei Conti in Venice, Italy
Black Nevas
You must login to view this content
Black Nevas
You must login to view this content
Black Nevas
You must login to view this content
Black Nevas New Threat Actor
You must login to view this content
Black Nevas
You must login to view this content
Black Nevas
You must login to view this content