Aggregator
「华云安」完成数千万元B+轮融资,加速构建「平台化」+「智能化」安全防御体系
Anubis勒索软件添加擦除器以彻底摧毁目标文件
Cursor 的开源替代 Void IDE 发布 Beta 版本
CVE-2018-5971 | MediaLibrary Free 4.0.12 on Joomla id/mid sql injection (EDB-44122)
Amazon EKS Flaws Expose AWS Credentials and Enable Privilege Escalation
Recent research has uncovered critical security flaws in Amazon Elastic Kubernetes Service (EKS) that could expose sensitive AWS credentials and enable privilege escalation within cloud environments. The vulnerabilities, rooted in misconfigurations and excessive container privileges, highlight the ongoing challenges of securing Kubernetes-based container platforms at scale. Amazon EKS is a managed service that simplifies running […]
The post Amazon EKS Flaws Expose AWS Credentials and Enable Privilege Escalation appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Critical Meshtastic Flaw Allows Attackers to Decrypt Private Messages
A severe cryptographic vulnerability in the popular open-source Meshtastic project allows attackers to decrypt private messages and hijack nodes across LoRa mesh networks. The vulnerability tracked as, CVE-2025-52464, flaw stems from duplicated encryption keys and insufficient randomness during key generation. The issue affects multiple hardware platforms and poses significant risks to users relying on Meshtastic […]
The post Critical Meshtastic Flaw Allows Attackers to Decrypt Private Messages appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2013-3906 | Microsoft Windows Server 2008/Vista TIFF Image code injection (MS13-096 / EDB-30011)
通过源码学习peach的使用
CVE-2025-52926 | spytrap-org spytrap-adb up to 0.3.4 Interactive User Interface scan.rs omission of security-relevant information (EUVD-2025-18859)
Review: Redefining Hacking
Redefining Hacking takes a look at how red teaming and bug bounty hunting are changing, especially now that AI is becoming a bigger part of the job. About the authors Omar Santos is a Distinguished Engineer at Cisco focusing on AI security, research, incident response, and vulnerability disclosure. Savannah Lazzara is a Security Engineer at Amazon, and co-lead of Red Team Village. Wesley Thurner is a Principal Security Engineer at Intuit. Inside the book The … More →
The post Review: Redefining Hacking appeared first on Help Net Security.
CVE-2014-9312 | Photo Gallery 1.2.5 File Upload unrestricted upload (ID 130104 / EDB-35916)
CVE-2025-52926 | spytrap-org spytrap-adb up to 0.3.4 Interactive User Interface scan.rs omission of security-relevant information (EUVD-2025-18859)
午夜之锤行动复盘与评估:解构美国对伊朗核设施精确打击的情报战
CVE-2025-47957 | Microsoft Word use after free (EDB-52337 / Nessus ID 240113)
CoinMarketCap Doodle Image Vulnerability Lets Attackers Run Malicious Code via API Call
CoinMarketCap, the globally recognized cryptocurrency data aggregator, experienced a significant security incident when a vulnerability in its homepage doodle image was exploited to inject malicious code, leading to a phishing campaign targeting user wallets. Incident Overview The breach originated from a seemingly innocuous doodle image featured on CoinMarketCap’s homepage. Threat actors manipulated the backend API […]
The post CoinMarketCap Doodle Image Vulnerability Lets Attackers Run Malicious Code via API Call appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
有经验 FPS 玩家的瞄准优势在于其更快的执行时间
CVE-2025-6502 | code-projects Inventory Management System 1.0 changePassword.php user_id sql injection (EUVD-2025-18864)
CVE-2025-6503 | code-projects Inventory Management System 1.0 fetchSelectedCategories.php categoriesId sql injection (EUVD-2025-18863)
Quantum risk is already changing cybersecurity
A new report from the Cyber Threat Alliance warns that the era of quantum risk is already underway, and security teams need to stop treating it like a problem for tomorrow. The report, Approaching Quantum Dawn: Closing the Cybersecurity Readiness Gap Before It’s Too Late, urges companies to prepare for a world where today’s encryption could be broken by quantum computers. But it’s not all doom and gloom. The report focuses on what can be … More →
The post Quantum risk is already changing cybersecurity appeared first on Help Net Security.