Aggregator
Вместо допинга — иголка с ниткой: как лыжники пытались сшить себе победу… и провалились
RansomHub Ransomware Deploys Malware to Breach Corporate Networks
The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging SocGholish malware, also known as FakeUpdates, was uncovered targeting corporate networks. This attack, orchestrated by affiliates of RansomHub-a notorious Ransomware-as-a-Service (RaaS) group emerging in 2024-demonstrates a calculated approach to infiltrate high-profile organizations. SocGholish Malware as Initial Vector RansomHub markets its illicit […]
The post RansomHub Ransomware Deploys Malware to Breach Corporate Networks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email
The NSFOCUS Fuying Laboratory’s global threat hunting system identified 19 sophisticated Advanced Persistent Threat (APT) attack campaigns, predominantly targeting regions across South Asia, East Asia, Eastern Europe, and South America. These incursions highlighted a continuation of targeted cyber espionage and sabotage activities, primarily focusing on government agencies, critical infrastructure, and prominent industry sectors through a […]
The post 19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Blackpoint Cyber Extends MDR Service to Improve Cyber Resiliency
Blackpoint Cyber today at the 2025 RSA Conference unveiled a unified security posture and response platform that is based on the company’s managed detection and response (MDR) service. Company CTO Manoj Srivastava said the CompassOne platform provides organizations the tool to discover assets along with the guidance needed to improve their security posture. The overall..
The post Blackpoint Cyber Extends MDR Service to Improve Cyber Resiliency appeared first on Security Boulevard.
渗透测试手记:从矛盾现象到Oracle注入漏洞的发现之旅
CVE-2022-39369 | phpCAS up to 1.5.x phpCAS::setUrl resource injection (GHSA-8q72-6qq8-xv64 / Nessus ID 211181)
CVE-2022-3786 | OpenSSL up to 3.0.6 x.509 Certificate buffer overflow (News 169687 / Nessus ID 209848)
CVE-2022-3723 | Google Chrome up to 107.0.5304.62 V8 type confusion
CVE-2022-26122 | Fortinet FortiClient/FortiMail/FortiOS up to 6.2.168/6.4.274 AV Engine data authenticity (Nessus ID 209739)
CVE-2022-43046 | oretnom23 Food Ordering Management System 1.0 /foms/place-order.php cross site scripting
FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023
The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6 billion (approximately ₹1.38 lakh crore) due to cyber-enabled crimes in 2024, marking a staggering 33% increase from the previous year. Established 25 years ago, IC3 has evolved into the primary hub for reporting cyber fraud and threats, processing over 9 million […]
The post FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Fog Ransomware Reveals Active Directory Exploitation Tools and Scripts
Cybersecurity researchers from The DFIR Report’s Threat Intel Group uncovered an open directory hosted at 194.48.154.79:80, believed to be operated by an affiliate of the Fog ransomware group, which emerged in mid-2024. This publicly accessible server revealed a sophisticated arsenal of tools and scripts tailored for reconnaissance, exploitation, credential theft, lateral movement, and persistence. The […]
The post Fog Ransomware Reveals Active Directory Exploitation Tools and Scripts appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Randall Munroe’s XKCD ‘PhD Timeline’
CVE-2014-9558 | SmartCMS v.2 sql injection (ID 130075 / EDB-12507)
Over 1,200 SAP NetWeaver servers vulnerable to actively exploited flaw
Python-Based Discord RAT Enables Remote Control and Disruption Through a Simple Interface
A newly analyzed Python-based Remote Access Trojan (RAT) has emerged as a significant cybersecurity threat, utilizing Discord as its command-and-control (C2) platform. Disguised as a benign script, this malware transforms the popular communication tool into a hub for malicious operations, allowing attackers to remotely control infected systems with alarming ease. By exploiting Discord’s encrypted traffic […]
The post Python-Based Discord RAT Enables Remote Control and Disruption Through a Simple Interface appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Точка, где законы физики берут выходной: в алмазе обнаружили феномен, ускользавший от науки целый век
Kali Linux warns of update failures after losing repo signing key
RSAC 2025 Begins: Live Updates & Insights from ColorTokens
The energy is electric in San Francisco as RSAC 2025 kicks off today, and we’re thrilled to bring you live updates straight from the floor. Each day, we’ll capture the cream of the conversations, the breakthrough insights, and the pivotal moments from our booth and beyond. Stay with us as we show you how ColorTokens […]
The post RSAC 2025 Begins: Live Updates & Insights from ColorTokens appeared first on ColorTokens.
The post RSAC 2025 Begins: Live Updates & Insights from ColorTokens appeared first on Security Boulevard.