Aggregator
CVE-2025-5889 | juliangruber brace-expansion up to 1.1.11/2.0.1/3.0.0/4.0.0 index.js expand redos (EUVD-2025-17567 / Nessus ID 243467)
Why the Old Ways Are Still the Best for Most Cybercriminals
Google’s August Patch Fixes Two Qualcomm Vulnerabilities Exploited in the Wild
Загрузил «картинку» — открыл SSH. Хакеры манипулируют рынком через «рисованные» панели
APT36 Hackers Attacking Indian Government Entities to Steal Login Credentials
A sophisticated phishing campaign attributed to the Pakistan-linked APT36 group has emerged as a serious threat to Indian government infrastructure. First detected in early August 2025, this operation leverages typo-squatted domains designed to mimic official government login portals. When unsuspecting users enter their email IDs and passwords, they are redirected to counterfeit pages that replicate […]
The post APT36 Hackers Attacking Indian Government Entities to Steal Login Credentials appeared first on Cyber Security News.
Android四大组件常见漏洞
Cisco Discloses Data Breach Exposed User Profiles from Cisco.com
Cisco Systems has disclosed a data breach that compromised basic profile information of users registered on Cisco.com following a successful voice phishing attack targeting one of the company’s representatives. The incident resulted in unauthorized access to a third-party cloud-based Customer Relationship Management (CRM) system used by the networking giant. The breach occurred when a malicious […]
The post Cisco Discloses Data Breach Exposed User Profiles from Cisco.com appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
香港科技大学 | 从大型语言模型中提取专门化代码能力的可行性研究
Amp Code: Arbitrary Command Execution via Prompt Injection Fixed
Один Enter — и Сент-Пол ослеп. Город в режиме ЧС на 90 дней
Cloudflare Accuses Perplexity AI of Bypassing Firewalls with User-Agent Spoofing
Cloudflare has publicly accused Perplexity AI of employing deceptive crawling practices that violate established web crawling protocols and deliberately circumvent website protection mechanisms. The cybersecurity company has documented evidence of Perplexity using undisclosed user agents and rotating IP addresses to access content from websites that have explicitly blocked the AI company’s declared crawlers. Stealth Crawling […]
The post Cloudflare Accuses Perplexity AI of Bypassing Firewalls with User-Agent Spoofing appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Hackers Target SharePoint Flaw to Access IIS Machine Keys
Zero-day exploits against Microsoft SharePoint are enabling attackers to extract IIS machine keys, establishing persistent backdoors that survive patches and reboots. In mid-July 2025, threat actors began abusing two critical SharePoint vulnerabilities—CVE-2025-53770 (deserialization, CVSS 9.8) and CVE-2025-53771 (authentication bypass, CVSS 6.3)—in an attack campaign dubbed “ToolShell”. The campaign’s ultimate goal is harvesting IIS machine keys, which protect ViewState, […]
The post Hackers Target SharePoint Flaw to Access IIS Machine Keys appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
IBM security advisory (AV25-478)
SonicWall Alerts on Surge of Attacks Against Gen 7 Firewalls Over Past 72 Hours
SonicWall has issued an urgent security advisory following a significant escalation in cyberattacks targeting Generation 7 firewalls with enabled SSLVPN functionality over the past three days. The cybersecurity company is actively investigating whether these incidents stem from a previously disclosed vulnerability or represent a new security threat, working closely with prominent threat research organizations including […]
The post SonicWall Alerts on Surge of Attacks Against Gen 7 Firewalls Over Past 72 Hours appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Webinar | Agentic AI Ransomware: What You Need to Know
Senate Confirms Trump's National Cyber Director Nominee
The United States has a new national cyber director after a tense Senate vote ended months of political and procedural delays, allowing the Trump administration to push forward with its sweeping overhaul of federal cybersecurity priorities.
Do We Really Need IT-OT Integration?
One team quotes Shakespeare. The other speaks in Morse Code. Now, imagine forcing them to write a play together. Yet IT and OT organizations are being asked to work as one. Is full integration really possible, or should we keep them at respectful distance for security reasons?
Risks and Rewards for Scaling Up the UK Cybersecurity Market
The United Kingdom has a strong track record of supporting startups and building successful organizations, but U.K. cybersecurity startups still face hurdles, said Dominic Trott, director of strategy and alliances for the U.K. region at Orange Cyberdefense.
Chinese Nation-State Hackers Breach Southeast Asian Telecoms
Chinese nation-state hackers penetrated mobile telecom networks across Southeast Asia likely in order to track individuals' location, say security researchers. One tell about the hackers' intentions was deployment of a custom-made network scanning and packet capture utility tracked as CordScan.