Aggregator
Fog Ransomware Actors Exploits Pentesting Tools to Exfiltrate Data and Deploy Ransomware
The Fog ransomware group has evolved beyond conventional attack methods, deploying an unprecedented arsenal of legitimate pentesting tools in a sophisticated May 2025 campaign targeting a financial institution in Asia. This latest operation marks a significant departure from typical ransomware tactics, incorporating employee monitoring software and open-source penetration testing frameworks previously unseen in the ransomware […]
The post Fog Ransomware Actors Exploits Pentesting Tools to Exfiltrate Data and Deploy Ransomware appeared first on Cyber Security News.
Major Outage Hits Google Cloud and Linked Cloudflare Services, Thousands Affected
On June 12, 2025, concurrent infrastructure failures at Cloudflare and Google caused widespread service disruptions, highlighting vulnerabilities in modern cloud dependencies. The outages impacted critical services ranging from authentication systems to AI platforms, underscoring the fragility of interconnected internet ecosystems. Cloudflare Outage: Cloudflare’s outage began at 17:52 UTC when internal monitoring detected failures in device […]
The post Major Outage Hits Google Cloud and Linked Cloudflare Services, Thousands Affected appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
数字供应链安全代表厂商︱悬镜安全领衔安全牛《数字供应链安全技术应用指南(2025版)》
马斯克威胁起诉广告商取得部分成效
CVE-2025-22240 | VMware SALT prior 3006.12/3007.4 find_file permission (EUVD-2025-18250)
CVE-2024-38822 | VMware SALT prior 3006.12/3007.4 a one-way hash with a predictable salt (EUVD-2024-54685)
CVE-2024-38823 | VMware SALT prior 3006.12/3007.4 authentication replay (EUVD-2024-54684)
CVE-2025-4227 | Palo Alto GlobalProtect App up to 6.0.0/6.1.0/6.2.8-h1/6.3.2-565/11.2.6 Endpoint Traffic Policy Enforcement cleartext transmission (EUVD-2025-18244)
CVE-2024-38825 | VMware SALT prior 3006.12/3007.4 salt.auth.pki Password certificate validation (EUVD-2024-54683)
TokenBreak Exploit Tricks AI Models Using Minimal Input Changes
HiddenLayer’s security research team has uncovered TokenBreak, a novel attack technique that bypasses AI text classification models by exploiting tokenization strategies. This vulnerability affects models designed to detect malicious inputs like prompt injection, spam, and toxic content, leaving protected systems exposed to attacks they were meant to prevent. Technical Breakdown of TokenBreak According to the […]
The post TokenBreak Exploit Tricks AI Models Using Minimal Input Changes appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
WebDAV Remote Code Execution 0-Day Actively Exploited — PoC Released
A critical zero-day vulnerability in Microsoft’s Web Distributed Authoring and Versioning (WebDAV) protocol, tracked as CVE-2025-33053, has been actively exploited by the advanced persistent threat (APT) group Stealth Falcon since March 2025. The flaw, patched in June’s Patch Tuesday, enables remote code execution (RCE) via manipulated .url shortcut files and has been linked to attacks […]
The post WebDAV Remote Code Execution 0-Day Actively Exploited — PoC Released appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.