Aggregator
Trojanized SonicWall NetExtender app exfiltrates VPN credentials
Unknown attackers have trojanized SonicWall’s SSL-VPN NetExtender application, the company has warned on Monday, and have been tricking users into downloading it from a lookalike site(s?). The trojanized SonicWall NetExtender installer SonicWall NetExtender is an SSL‑VPN client used by companies to give remote employees secure access to their internal networks. SonicWall does not mention how prospective victims were lured to the lookalike sites impersonating the company and offering the compromised version of NetExtender, but said that … More →
The post Trojanized SonicWall NetExtender app exfiltrates VPN credentials appeared first on Help Net Security.
NATO Summit in The Hague hit by potential sabotage as rail cables set on fire
Telegram победил рынок фрода на $35 млрд… но всего на пару дней
Reported Impersonation Scams Surge 148% as AI Takes Hold
Weaponized DMV-Themed Phishing Attacking U.S. Citizens to Harvest Personal and Financial Data
A sophisticated phishing campaign emerged in May 2025, targeting U.S. citizens through a coordinated impersonation of state Department of Motor Vehicles (DMV) agencies. This large-scale operation utilized SMS phishing techniques combined with deceptive web infrastructure to harvest personal and financial information from unsuspecting victims across multiple states. The attackers employed alarming messages about unpaid toll […]
The post Weaponized DMV-Themed Phishing Attacking U.S. Citizens to Harvest Personal and Financial Data appeared first on Cyber Security News.
Ты привык считать роботов слугами? Очень скоро они сами решат — кто тут хозяин
Critical Convoy Flaw Allows Remote Code Execution on Servers
A critical vulnerability (CVE-2025-52562) in Performave Convoy—a KVM server management panel widely used by hosting providers—enables unauthenticated attackers to execute arbitrary code on affected systems. Rated the maximum CVSS score of 10.0, this flaw exposes servers to complete compromise without requiring authentication. Vulnerability Summary According to the Github report, the flaw resides in Convoy’s LocaleController component, where […]
The post Critical Convoy Flaw Allows Remote Code Execution on Servers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
NCSC Warns of SHOE RACK Malware Targeting Fortinet Firewalls via DOH & SSH Protocols
The National Cyber Security Centre (NCSC) has issued a critical alert regarding a newly identified malware, dubbed SHOE RACK, which has been observed targeting Fortinet firewalls and other perimeter devices. Developed using the Go 1.18 programming language, this malicious software demonstrates a high level of sophistication by leveraging DNS-over-HTTPS (DoH) for command and control (C2) […]
The post NCSC Warns of SHOE RACK Malware Targeting Fortinet Firewalls via DOH & SSH Protocols appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-4275
Злой близнец ChatGPT за 100 евро — теперь каждый может стать киберпреступником
一次情报更新引发的DNSLOG告警排查
Fortifying Retail Security: Practical Steps to Prevent Cyberattacks
Threats to retailers will intensify with more ransomware attacks, combined with the security implications of new technologies.
The post Fortifying Retail Security: Practical Steps to Prevent Cyberattacks appeared first on Security Boulevard.
Google Cloud Donates A2A Protocol to Linux Foundation for Smarter, Secure Communication
In a landmark move for the artificial intelligence industry, Google Cloud has donated its Agent2Agent (A2A) protocol to the Linux Foundation, marking a significant step toward open, secure, and interoperable communication between AI agents. The announcement was made at the Open Source Summit North America, where the Linux Foundation unveiled the formation of the Agent2Agent […]
The post Google Cloud Donates A2A Protocol to Linux Foundation for Smarter, Secure Communication appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.