Aggregator
SDC2025 精彩议题预告 | 跨向无人之境:智能架构的支付宝安全风险扫描实践
GitLab security advisory (AV25-689)
Chinese Threat Actors Exploit ToolShell SharePoint Flaw Weeks After Microsoft's July Patch
Ivanti enhances its solutions portfolio to drive secure, scalable, and streamlined IT operations
Ivanti announced product enhancements across its solution pillars, empowering our customers to accelerate cloud adoption, strengthen security posture and streamline IT operations. Distributed workforce requires seamless and secure access to the applications, endpoints and data essential to every role. Ivanti’s latest product updates equip IT and security teams with the power to scale operations at their own pace, modernize security and simplify management. With these advancements, organizations can adapt to evolving threats and drive productivity … More →
The post Ivanti enhances its solutions portfolio to drive secure, scalable, and streamlined IT operations appeared first on Help Net Security.
Threat Actors Exploiting Azure Blob Storage to Breach Organizational Repositories
Threat actors are increasingly targeting Azure Blob Storage, Microsoft’s flagship object storage solution, to infiltrate organizational repositories and disrupt critical workloads. With its capacity to handle exabytes of unstructured data for AI, high performance computing, analytics, media streaming, enterprise backup, and IoT ingestion, Blob Storage has become an attractive vector for sophisticated campaigns aiming to […]
The post Threat Actors Exploiting Azure Blob Storage to Breach Organizational Repositories appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-62701 | Wikistories Extension up to 1.43 on Mediawiki cross site scripting (EUVD-2025-35136 / WID-SEC-2025-2381)
CVE-2025-62661 | Thanks Extension/Growth Experiments Extension 1.43 on Mediawiki default permission (WID-SEC-2025-2381)
CVE-2025-5496 | Zoho ManageEngine Endpoint Central prior 11.4.2508.14/11.4.2516.06/11.4.2518.01 Agent Setup privileges management (WID-SEC-2025-2383)
CVE-2025-62763 | Zimbra Collaboration Suite up to 10.1.11 Configuration server-side request forgery (WID-SEC-2025-2382)
CVE-2025-11086 | Academy LMS Plugin up to 3.3.7 on WordPress Social Login Addon privileges management (EUVD-2025-35359)
Триллион — это не предел. Wayback Machine от Internet Archive празднует 1 000 000 000 000 сохраненных веб-страниц
Attackers turn trusted OAuth apps into cloud backdoors
Attackers are increasingly abusing internal OAuth-based applications to gain persistent access to cloud environments, Proofpoint researchers warn. These apps often remain unnoticed for quite some time and allow attackers to maintain access to high-privileged accounts even after passwords are reset or multifactor authentication (MFA) is enforced. What is OAuth and how do attackers exploit it? OAuth is an authorization protocol that lets apps connect to your account (e.g., M365) safely by using special access tokens … More →
The post Attackers turn trusted OAuth apps into cloud backdoors appeared first on Help Net Security.
CVE-2023-24511 | Arista EOS SNMP memory leak (EUVD-2023-28529)
CVE-2023-24510 | Arista EOS DHCP Packet denial of service (EUVD-2023-28528)
CVE-2023-24509 | Arista EOS Redundancy privileges management (EUVD-2023-28527)
Rubrik Agent Cloud speeds enterprise AI with built-in security and guardrails
Rubrik announced the launch of the Rubrik Agent Cloud to accelerate enterprise AI agent adoption while managing risk of AI deployments. AI transformation is now mandatory for most organizations. However, IT leaders are constrained because agentic AI has significant risks including hallucination as well as compromise by threat actors. Rubrik Agent Cloud is designed to monitor and audit agentic actions, enforce real-time guardrails for agentic changes, fine-tune agents for accuracy and, undo agent mistakes. Built … More →
The post Rubrik Agent Cloud speeds enterprise AI with built-in security and guardrails appeared first on Help Net Security.
G.O.S.S.I.P 阅读推荐 2025-10-22 寻找海光内存加密之墙的隙罅
SharkStealer Adopts EtherHiding Technique for C2 Communication Evasion
SharkStealer, a Golang-based information stealer, has been observed leveraging the Binance Smart Chain (BSC) Testnet as a covert dead-drop mechanism for command-and-control (C2) communications. By adopting an “EtherHiding” pattern, the malware retrieves encrypted C2 details from smart contracts through Ethereum RPC calls, decrypts the payload in memory, and initiates contact—all while blending in with legitimate […]
The post SharkStealer Adopts EtherHiding Technique for C2 Communication Evasion appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.