Aggregator
GitLab security advisory (AV25-228)
Hackers Exploit NFC Technology to Steal Money from ATMs and POS Terminals
In a disturbing trend, cybercriminals, predominantly from Chinese underground networks, are exploiting Near Field Communication (NFC) technology to perpetrate large-scale fraud at ATMs and Point-of-Sale (POS) terminals. According to cyber threat intelligence analysts at Resecurity, numerous banks, FinTech companies, and credit unions have reported a surge in NFC-related fraud in Q1 2025, with damages exceeding […]
The post Hackers Exploit NFC Technology to Steal Money from ATMs and POS Terminals appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-3435 | Mang Board WP Plugin up to 1.8.6 on WordPress board_header/board_footer cross site scripting
CVE-2025-46393 | ImageMagick up to 7.1.1-43 MIFF Image packet_size buffer size
CVE-2025-43965 | ImageMagick up to 7.1.1-43 MIFF Image SetQuantumFormat buffer size
CVE-2025-45429 | Tenda AC9 15.03.05.14_multi /goform/WifiWpsStart stack-based overflow
CVE-2025-45428 | Tenda AC9 15.03.05.14_multi SetSysAutoRebbotCfg rebootTime stack-based overflow
CVE-2025-45427 | Tenda AC9 1.0/15.03.05.14 /goform/WifiBasicSet Security stack-based overflow
Asian Scam Farms: ‘Industrial Scale,’ Warns UN Report
Bacon Redux: Pig butchering and other serious scams still thriving, despite crackdowns in Dubai and Myanmar
The post Asian Scam Farms: ‘Industrial Scale,’ Warns UN Report appeared first on Security Boulevard.
CVE-2025-32434
CVE-2025-2492
CVE-2024-53104
FBI: US lost record $16.6 billion to cybercrime in 2024
Threat Actors Leverage TAG-124 Infrastructure to Deliver Malicious Payloads
In a concerning trend for cybersecurity, multiple threat actors, including ransomware groups and state-sponsored entities, are utilizing a malicious traffic distribution system (TDS) known as TAG-124 to optimize the delivery of malware payloads to high-value targets. According to research by Insikt Group from Recorded Future, TAG-124 operates similarly to legitimate TDSs used in online advertising, […]
The post Threat Actors Leverage TAG-124 Infrastructure to Deliver Malicious Payloads appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Ransomware Actors Ramp Up Attacks Organizations with Emerging Extortion Trends
Unit 42’s 2025 Global Incident Response Report, ransomware actors are intensifying their cyberattacks, with 86% of incidents causing significant business disruptions such as operational downtime and reputational damage. Cybercriminals are adopting increasingly sophisticated and deceptive strategies to maximize the impact of their attacks and coerce organizations into paying hefty ransoms. A notable trend includes threat […]
The post Ransomware Actors Ramp Up Attacks Organizations with Emerging Extortion Trends appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Verizon's DBIR Reveals 34% Jump in Vulnerability Exploitation
New SMS Phishing Attack Weaponizes Google AMP Links to Evade Detection
Group-IB’s High-Tech Crime Trends Report 2025 reveals a sharp 22% surge in phishing websites, with over 80,000 detected in 2024. Among the most concerning discoveries is a sophisticated SMS phishing campaign targeting users of a toll road service provider, active since late 2023. This operation, uncovered by Group-IB researchers, employs advanced technical strategies to deceive […]
The post New SMS Phishing Attack Weaponizes Google AMP Links to Evade Detection appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
How Script-based Malware Attacks Work: Modern Examples
Script-based malware is malicious software written in scripting languages like JavaScript, Python, PowerShell, or VBScript. Unlike traditional malware that relies on compiled executables, script-based malware leverages scripts that execute as human-readable code interpreted at runtime Scripts have become increasingly popular in recent years: they effectively evade traditional endpoint detection and are easy to modify and […]
The post How Script-based Malware Attacks Work: Modern Examples appeared first on Cyber Security News.
Russian Hackers Exploit Microsoft OAuth 2.0 to Target Organizations
Cybersecurity firm Volexity has tracked a series of highly targeted attacks by suspected Russian threat actors, identified as UTA0352 and UTA0355. It exploits Microsoft 365 (M365) OAuth 2.0 authentication workflows to compromise accounts of individuals at non-governmental organizations (NGOs), think tanks, and human rights groups, particularly those focused on Ukraine. Sophisticated Social Engineering Tactics Unveiled […]
The post Russian Hackers Exploit Microsoft OAuth 2.0 to Target Organizations appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.