Aggregator
CVE-2024-50265 | Linux Kernel up to 6.11.7 ocfs2_xa_remove null pointer dereference (Nessus ID 211777 / WID-SEC-2024-3497)
Google’s AI ‘Big Sleep’ Detects Critical SQLite 0-Day, Halts Ongoing Attacks
Google’s artificial intelligence agent “Big Sleep” has made cybersecurity history by discovering and stopping the exploitation of a critical zero-day vulnerability in SQLite, marking the first time an AI system has directly foiled real-world cyberattacks. The AI agent, developed by Google DeepMind and Project Zero, identified the SQLite vulnerability (CVE-2025-6965) based on threat intelligence indicating […]
The post Google’s AI ‘Big Sleep’ Detects Critical SQLite 0-Day, Halts Ongoing Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Diskstation парализовала бизнесы в Италии на сотни тысяч евро. Всему виной NAS, который просто стоял в углу
NIST Releases Trove of Genetic Data to Spur Cancer Research
21-year-old former US soldier pleads guilty to hacking, extorting telecoms
Critical Golden dMSA Attack in Windows Server 2025 Enables Cross-Domain Attacks and Persistent Access
Async BOFs – “Wake Me Up, Before You Go Go”
CVE-2021-47584 | Linux Kernel up to 5.10.87/5.15.10 block/blk-iocost.c divide by zero (a7c80674538f/3a1a4eb57417/edaa26334c11 / WID-SEC-2024-1418)
CVE-2021-47583 | Linux Kernel up to 4.19.221/5.4.167/5.10.87/5.15.10 mxl111sf mutex_init uninitialized pointer (WID-SEC-2024-1418)
CVE-2021-47582 | Linux Kernel up to 5.15.10 USB Core hung_task_timeout_secs do_proc_control missing initialization (403716741c6c/ae8709b296d8 / Nessus ID 207773)
CVE-2021-47578 | Linux Kernel up to 5.10.87/5.15.10 scsi fortify-string.h kcalloc null pointer dereference (aa1f912712a1/47d11d35203b/3344b58b53a7 / WID-SEC-2024-1418)
CVE-2021-47580 | Linux Kernel up to 5.10.87/5.15.10 scsi_debug fortify-string.h min_t out-of-bounds (bdb854f134b9/308514764593/36e07d7ede88 / WID-SEC-2024-1418)
CVE-2021-47577 | Linux Kernel up to 5.15.10 io-wq task_work privilege escalation (4b4e5bbf9386/71a85387546e / WID-SEC-2024-1418)
CVE-2021-47573 | Linux Kernel up to 5.15.10 blkfront resource consumption (WID-SEC-2024-1418)
CVE-2021-47574 | Linux Kernel up to 5.15.10 xen xennet_set_rx_rsp_cons resource consumption (WID-SEC-2024-1418)
CVE-2021-47575 | Linux Kernel up to 5.15.10 xen bind_evtchn_to_irq_lateeoi resource consumption (WID-SEC-2024-1418)
CVE-2021-47576 | Linux Kernel up to 5.15.10 scsi_debug resp_mode_select use after free (Nessus ID 214406 / WID-SEC-2024-1418)
Dark Partners Hacker Group Drains Crypto Wallets Using Fake AI Tools and VPN Services
The financially driven organization known as Dark Partners has been planning massive cryptocurrency theft since at least May 2025, using a complex network of more than 250 malicious domains that pose as AI tools, VPN services, cryptocurrency wallets, and well-known software brands. This is part of a rapidly developing cybercrime operation. These fake websites, distributed […]
The post Dark Partners Hacker Group Drains Crypto Wallets Using Fake AI Tools and VPN Services appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.