Aggregator
跨链协议分析系列之 THORChain
Российские и зарубежные платформы столкнулись с перебоями на Урале
Kali Linux 2025.1a: свежий интерфейс, новое ядро и автомобильный хакинг
How to Boost Your Career at Cybersecurity Conferences
Conference season is upon us, and there's no better time to work on your career at one or more of the major cybersecurity conferences in the United States this spring and summer. These conferences do cost money, but with a bit of preparation, you can invest in your career.
Rash of Hacks Hits Nursing Homes and Rehab Centers
More than a half dozen nursing homes and rehabilitation centers have reported an assortment of major hacks in the last month affecting a total of more than 130,000 individuals. What makes facilities caring for elderly and disabled patients an attractive and vulnerable target to cybercriminals?
Hackers Exploit Unpatched ChatGPT Bug
Hackers are exploiting a vulnerability in ChatGPT's infrastructure to redirect users to malicious websites, with security researchers recording more than 10,000 exploit attempts in a week from a single malicious IP address. The financial sector has borne the brunt of the attacks.
Tesla Owners Doxxed as Elon Musk and DOGE Fallout Grows
The White House slammed a website that purported to reveal the names, addresses and phone numbers of Tesla owners - unless they showed proof of selling their vehicles made by Elon Musk's car company - amid growing criticism over his efforts to sharply reduce the size of the federal government.
UK NCSC Sets 2035 Deadline for Post-Quantum Migration
The British cybersecurity agency urged critical infrastructure operators to adapt to post-quantum cryptography by 2035 as it and other government agencies prepare for the inevitability of quantum computers capable of breaking current encryption algorithms.
鹦鹉如何模仿人类说话
Утечка SpyX раскрыла методы слежки за Apple и Android
Наноплёнка с амбициями: еще один ключ к суперкомпьютерам, которые не ошибаются
TI Lookup Named Best Threat Intelligence Service at Cybersecurity Excellence Awards
It is with great pleasure and gratitude that we announce our victory at the Cybersecurity Excellence Awards 2025, an annual competition for individuals and companies that stand out in the field of information security held by a major online community Cybersecurity Insiders. Our service, ANY.RUN Threat Intelligence Lookup, was named best among leading threat intelligence […]
The post TI Lookup Named Best Threat Intelligence Service at Cybersecurity Excellence Awards appeared first on ANY.RUN's Cybersecurity Blog.
CVE-2024-37437 | Elementor Website Builder Plugin up to 3.22.1 on WordPress path traversal
CVE-2024-2177 | GitLab Community Edition/Enterprise Edition up to 16.11.4/17.0.2/17.1.0 ui layer
CVE-2024-5492 | Citrix NetScaler ADC/NetScaler Gateway redirect (CTX677944)
CVE-2023-39328 | OpenJPEG File resource consumption (Nessus ID 210667)
CVE-2024-6604 | Mozilla Firefox up to 127.x memory corruption (Nessus ID 207803)
Babuk Ransomware Group Claims Attack on Telecommunication Firm Orange
The Babuk ransomware group has recently claimed responsibility for a sophisticated cyberattack on Orange, a leading global telecommunications company. According to an exclusive interview with SuspectFile.com, Babuk exploited a zero-day vulnerability in Orange’s systems to gain initial access to the company’s network. This vulnerability allowed them to exfiltrate sensitive data, which was later sold to […]
The post Babuk Ransomware Group Claims Attack on Telecommunication Firm Orange appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.