Aggregator
StackHawk Sensitive Data Identification provides visibility into high-risk APIs
StackHawk announced Sensitive Data Identification to give security teams visibility into high-risk APIs across thousands of code repositories within an organization. With most security teams only aware of approximately 10% of their API attack surface, StackHawk illuminates the complete API landscape, including shadow APIs, zombie APIs that are no longer under active development, and ghost APIs that bypass traditional gateways. Leveraging StackHawk’s existing API Discovery platform, which automatically uncovers APIs directly from source code repositories, … More →
The post StackHawk Sensitive Data Identification provides visibility into high-risk APIs appeared first on Help Net Security.
企业级VPN NetExtender任意文件删除到权限提升漏洞剖析
«Во все тяжкие» теперь не просто сериал, а прикрытие для тёмной стороны интернета
Fog Ransomware Actors Exploits Pentesting Tools to Exfiltrate Data and Deploy Ransomware
The Fog ransomware group has evolved beyond conventional attack methods, deploying an unprecedented arsenal of legitimate pentesting tools in a sophisticated May 2025 campaign targeting a financial institution in Asia. This latest operation marks a significant departure from typical ransomware tactics, incorporating employee monitoring software and open-source penetration testing frameworks previously unseen in the ransomware […]
The post Fog Ransomware Actors Exploits Pentesting Tools to Exfiltrate Data and Deploy Ransomware appeared first on Cyber Security News.
Major Outage Hits Google Cloud and Linked Cloudflare Services, Thousands Affected
On June 12, 2025, concurrent infrastructure failures at Cloudflare and Google caused widespread service disruptions, highlighting vulnerabilities in modern cloud dependencies. The outages impacted critical services ranging from authentication systems to AI platforms, underscoring the fragility of interconnected internet ecosystems. Cloudflare Outage: Cloudflare’s outage began at 17:52 UTC when internal monitoring detected failures in device […]
The post Major Outage Hits Google Cloud and Linked Cloudflare Services, Thousands Affected appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
数字供应链安全代表厂商︱悬镜安全领衔安全牛《数字供应链安全技术应用指南(2025版)》
马斯克威胁起诉广告商取得部分成效
CVE-2025-22240 | VMware SALT prior 3006.12/3007.4 find_file permission (EUVD-2025-18250)
CVE-2024-38822 | VMware SALT prior 3006.12/3007.4 a one-way hash with a predictable salt (EUVD-2024-54685)
CVE-2024-38823 | VMware SALT prior 3006.12/3007.4 authentication replay (EUVD-2024-54684)
CVE-2025-4227 | Palo Alto GlobalProtect App up to 6.0.0/6.1.0/6.2.8-h1/6.3.2-565/11.2.6 Endpoint Traffic Policy Enforcement cleartext transmission (EUVD-2025-18244)
CVE-2024-38825 | VMware SALT prior 3006.12/3007.4 salt.auth.pki Password certificate validation (EUVD-2024-54683)
TokenBreak Exploit Tricks AI Models Using Minimal Input Changes
HiddenLayer’s security research team has uncovered TokenBreak, a novel attack technique that bypasses AI text classification models by exploiting tokenization strategies. This vulnerability affects models designed to detect malicious inputs like prompt injection, spam, and toxic content, leaving protected systems exposed to attacks they were meant to prevent. Technical Breakdown of TokenBreak According to the […]
The post TokenBreak Exploit Tricks AI Models Using Minimal Input Changes appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
WebDAV Remote Code Execution 0-Day Actively Exploited — PoC Released
A critical zero-day vulnerability in Microsoft’s Web Distributed Authoring and Versioning (WebDAV) protocol, tracked as CVE-2025-33053, has been actively exploited by the advanced persistent threat (APT) group Stealth Falcon since March 2025. The flaw, patched in June’s Patch Tuesday, enables remote code execution (RCE) via manipulated .url shortcut files and has been linked to attacks […]
The post WebDAV Remote Code Execution 0-Day Actively Exploited — PoC Released appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.