Aggregator
CVE-2024-39720 | Ollama up to 0.1.45 HTTP Request memory corruption (Nessus ID 210502)
Marks & Spencer Confirms Customer Data Breach in Recent Cyber Attack
British retail giant Marks & Spencer has officially confirmed that customer personal data was compromised during a cyber attack that began three weeks ago. The retailer revealed that the breach affects potentially millions of customers whose information has been stolen, though payment card details remain secure. The company is still struggling to restore its online […]
The post Marks & Spencer Confirms Customer Data Breach in Recent Cyber Attack appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Lenovo intoduces ThinkShield Solutions to secure organizations with limited IT resources
Lenovo introduced ThinkShield Solutions, security offerings tailored to protect small and medium sized business (SMBs), schools, and other organizations with limited IT resources facing significant risks. The new offering is part of Lenovo ThinkShield’s portfolio of enterprise-grade cybersecurity solutions. Cybercriminals target SMBs, schools, and other smaller organizations because they often have less robust security compared to large corporations and other institutions. The majority of reported cyberattacks are directed towards SMBs, with average costs per incident … More →
The post Lenovo intoduces ThinkShield Solutions to secure organizations with limited IT resources appeared first on Help Net Security.
M&S says customer data stolen in cyberattack, forces password resets
Google 测试用 AI Mode 取代 I’m Feeling Lucky 按钮
营收每年翻倍,用户突破 100 万,这可能是最被低估的「AI硬件」
营收每年翻倍,用户突破 100 万,这可能是最被低估的「AI硬件」
Alabama says ‘cybersecurity event’ could disrupt state government services
西部数据投资声称能将数据保存 5000 年的德国公司
CVE-2024-39721 | Ollama up to 0.1.33 HTTP Request CreateModelHandler req.Path denial of service
Zoom Workplace Apps Flaws Allow Hackers to Gain Elevated Access
Zoom has released multiple security bulletins addressing seven newly discovered vulnerabilities in Zoom Workplace Apps, with one rated as high severity. All vulnerabilities were disclosed on May 13, 2025, and could potentially allow attackers to escalate privileges through various attack vectors. The most critical flaw involves a Time-of-check Time-of-use (TOCTOU) vulnerability that could lead to […]
The post Zoom Workplace Apps Flaws Allow Hackers to Gain Elevated Access appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
PoC Exploit Published for macOS Sandbox Escape Vulnerability (CVE-2025-31258)
Security researchers have disclosed a new macOS sandbox escape vulnerability tracked as CVE-2025-31258, accompanied by a proof-of-concept (PoC) exploit demonstrating partial sandbox bypass via Apple’s RemoteViewServices framework. The flaw, discovered by researcher wh1te4ever, exposes weaknesses in macOS’s inter-process communication (IPC) mechanisms that could enable attackers to execute arbitrary code outside application sandbox constraints. With the […]
The post PoC Exploit Published for macOS Sandbox Escape Vulnerability (CVE-2025-31258) appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Product showcase: Go beyond VPNs and Tor with NymVPN
If you care about online privacy, you probably already know: Centralized VPNs and even Tor aren’t enough anymore. Traditional VPNs require you to trust a single company with your internet activity. Even if they promise “no logs,” you’re still handing over the keys to your digital life to a third party. If they’re compromised — or forced by authorities — they can expose your information. And decentralized VPNs? While better, they mostly focus on distributing … More →
The post Product showcase: Go beyond VPNs and Tor with NymVPN appeared first on Help Net Security.
Orca Snaps Up Opus to Spearhead Autonomous Cloud Remediation
Orca Security has acquired Opus, bringing automation and generative AI capabilities into its agentless cloud platform. The move boosts remediation speed and supports Orca’s goal of making cloud security operations more autonomous and helping cloud teams resolve more issues with fewer actions.