Aggregator
CVE-2025-22482 | QNAP Qsync Central 4.3.0.11/4.4.0.15/4.4.0.16_20240819 format string (qsa-25-10 / EUVD-2025-17341)
CVE-2025-5748 | WOLFBOX Level 2 EV Charger Tuya Communications Module routine (ZDI-25-327 / EUVD-2025-17312)
New Rust-Developed InfoStealer Drains Sensitive Data from Chromium-Based Browsers
A newly identified information-stealing malware, crafted in the Rust programming language, has emerged as a significant threat to users of Chromium-based browsers such as Google Chrome, Microsoft Edge, and others. Dubbed “RustStealer” by cybersecurity researchers, this sophisticated malware is designed to extract sensitive data, including login credentials, cookies, and browsing history, from infected systems. Emerging […]
The post New Rust-Developed InfoStealer Drains Sensitive Data from Chromium-Based Browsers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-5747 | WOLFBOX Level 2 EV Charger MCU Command Parser interpretation input (ZDI-25-326 / EUVD-2025-17326)
CVE-2025-29872 | QNAP File Station 5.5.6.4847 allocation of resources (qsa-25-16 / EUVD-2025-17336)
CVE-2025-22484 | QNAP File Station 5.5.6.4847 allocation of resources (qsa-25-16 / EUVD-2025-17339)
CVE-2025-22481 | QNAP QTS/QuTS hero prior 5.2.4.3079 Build 20250321 command injection (qsa-25-12 / EUVD-2025-17340)
CVE-2024-56805 | QNAP QTS/QuTS hero prior 5.2.4.3079 Build 20250321 buffer overflow (qsa-25-12 / EUVD-2024-54653)
Threat Actors Using ViperSoftX Malware to Exfiltrate Sensitive Details
Korean cybersecurity researchers have uncovered a sophisticated malware campaign targeting cryptocurrency users worldwide, with ViperSoftX emerging as a persistent threat that continues to evolve its attack methodologies. First identified by Fortinet in 2020, this malware has demonstrated remarkable longevity and adaptability, consistently updating its techniques to bypass security measures while maintaining its core objective of […]
The post Threat Actors Using ViperSoftX Malware to Exfiltrate Sensitive Details appeared first on Cyber Security News.
Wireshark Filters
Hackers Leverage New ClickFix Tactic to Exploit Human Error with Deceptive Prompts
A sophisticated social engineering technique known as ClickFix baiting has gained traction among cybercriminals, ranging from individual hackers to state-sponsored Advanced Persistent Threat (APT) groups like Russia-linked APT28 and Iran-affiliated MuddyWater. This method targets human end users as the weakest link in cybersecurity defenses, tricking them into executing malicious commands through seemingly benign prompts. A […]
The post Hackers Leverage New ClickFix Tactic to Exploit Human Error with Deceptive Prompts appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
New Atomic macOS Stealer Campaign Exploits ClickFix to Target Apple Users
抗日战争在总参谋部
Hundreds of Malicious GitHub Repos Targeting Novice Cybercriminals Traced to Single User
Sophos X-Ops researchers have identified over 140 GitHub repositories laced with malicious backdoors, orchestrated by a single threat actor associated with the email address ischhfd83[at]rambler[.]ru. Initially sparked by a customer inquiry into the Sakura RAT, a supposed open-source malware touted for its “sophisticated anti-detection capabilities,” the investigation revealed a much broader and more insidious campaign. […]
The post Hundreds of Malicious GitHub Repos Targeting Novice Cybercriminals Traced to Single User appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
SecWiki News 2025-06-06 Review
IP也有“身份”:揭秘IP背后隐藏的组织真相 by ourren
基于大模型的威胁情报分析与知识图谱构建 by ourren
证券公司互联网终端一体化安全实践探索 by ourren
更多最新文章,请访问SecWiki