Aggregator
CVE-2025-5734 | TOTOLINK X15 1.0.0-B20230714.1105 HTTP POST Request /boafrm/formWlanRedirect redirect-url buffer overflow (EUVD-2025-17096)
OffensiveCon25 – Entrysign: Create Your Own x86 Microcode for Fun and Profit
Authors/Presenters: Matteo Rizzo, Kristoffer `spq` Janke, Eduardo Vela Nava and Josh Eads
Our sincere appreciation to OffensiveCon by Binary Gecko, and the Presenters/Authors for publishing their outstanding OffensiveCon 2025 video content. Originating from the conference’s events located at the Hilton Berlin; and via the organizations YouTube channel.
Thanks and a Tip O' The Hat to Verification Labs :: Penetration Testing Specialists :: Trey Blalock GCTI, GWAPT, GCFA, GPEN, GPCS, GCPN, CRISC, CISA, CISM, CISSP, SSCP, CDPSE for recommending the OffensiveCon 25 conference.
The post OffensiveCon25 – Entrysign: Create Your Own x86 Microcode for Fun and Profit appeared first on Security Boulevard.
New Wiper Malware Targets Ukrainian Infrastructure
Internet infamy drives The Com’s crime sprees
Unit 221B’s Allison Nixon said crackdowns have effectively shown the group that their actions carry real consequences.
The post Internet infamy drives The Com’s crime sprees appeared first on CyberScoop.
Google Warns of Surge in Cyberattacks Targeting US Users to Steal Login Credentials
Google has highlighted a significant uptick in cyberattacks and scams targeting US consumers, with a particular focus on stealing login credentials. The FBI reports that online scams generated a staggering $16.6 billion in losses last year, reflecting a 33% increase over the previous year. Over 60% of Americans have perceived a rise in scam attempts […]
The post Google Warns of Surge in Cyberattacks Targeting US Users to Steal Login Credentials appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2024-21762 | Fortinet FortiOS up to 7.4.2 SSL-VPN out-of-bounds write (FG-IR-24-015 / Nessus ID 236788)
Dell security advisory (AV25-325)
Two Distinct Botnets Exploit Wazuh Server Vulnerability to Launch Mirai-Based Attacks
МФТИ — 330 тыс., МГУ — 290: как меняется рейтинг зарплат в IT
Alleged sale of 0-day SonicWall SRA 4600 Preauth RCE
Meta Bypassed Privacy Protections to Track Android Users
A recent investigation by cybersecurity researchers has revealed that tech giants Meta (formerly Facebook) and Yandex have been exploiting a fundamental design feature of the Android operating system—the ability for apps to listen on localhost ports—to covertly track users’ web activity and link it to their real identities. The discovery has raised significant privacy concerns […]
The post Meta Bypassed Privacy Protections to Track Android Users appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
U.S. Targets $7.7M in Crypto Tied to North Korean IT Worker Scam
On June 5, 2025, the United States Department of Justice (DOJ) filed a verified civil forfeiture complaint in the US District Court for the District of Columbia, seeking to permanently seize over $7.7 million in cryptocurrency, non-fungible tokens (NFTs), and digital assets linked to a sophisticated global laundering operation orchestrated by North Korea. The assets […]
The post U.S. Targets $7.7M in Crypto Tied to North Korean IT Worker Scam appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
APT41 Hackers Leverage Google Calendar for Malware C2 in Attacks on Government Entities
The Chinese state-sponsored threat actor APT41, also known as BARIUM, Wicked Panda, and Brass Typhoon, has been reported to exploit Google Calendar as a command-and-control (C2) mechanism in a recent campaign targeting a Taiwanese government website. This sophisticated group, active since at least 2012, is notorious for blending cyber espionage with financially motivated cybercrime, hitting […]
The post APT41 Hackers Leverage Google Calendar for Malware C2 in Attacks on Government Entities appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Designing Blue Team playbooks with Wazuh for proactive incident response
New hacker group uses LockBit ransomware variant to target Russian companies
Detecting PureLogs traffic with CapLoader
EU launches EU-based, privacy-focused DNS resolution service
DNS4EU, an EU-based DNS resolution service created to strengthen European Union’s digital sovereignty, has become reality. What is DNS? The Domain Name System (DNS) “translates” human-readable domain names into IP addresses and back, and is essential for accessing websites. Most users use DNS resolver services provided by their internet service provider (because they are automatically configured) or a public DNS provider like Google or Cloudflare. DNS4EU is meant to be a resilient, fast, reliable, secure, … More →
The post EU launches EU-based, privacy-focused DNS resolution service appeared first on Help Net Security.