Aggregator
Docker Desktop严重漏洞可让攻击者劫持Windows主机
CVE-2025-8662 | OpenAM Consortium Edition 14.0.0/14.0.1 SAML IdP denial of service
CVE-2025-58162 | MobSF Mobile-Security-Framework-MobSF 4.4.0 path traversal (GHSA-9gh8-9r95-3fc3 / EUVD-2025-26368)
CVE-2025-58161 | MobSF Mobile-Security-Framework-MobSF 4.4.0 Download File /download/ os.path.commonprefix path traversal (GHSA-ccc3-fvfx-mw3v / EUVD-2025-26369)
CVE-2025-57808 | ESPHome 2025.8.0 web_server incorrect implementation of authentication algorithm (GHSA-mxh2-ccgj-8635)
CVE-2025-58178 | SonarSource sonarqube-scan-action up to 5.3.0 Scan GitHub Action command injection (GHSA-f79p-9c5r-xg88 / EUVD-2025-26367)
Wireshark 4.4.9 Released With Critical Bug Fixes and Protocol Updates
The Wireshark Foundation today announced the release of Wireshark 4.4.9, delivering critical stability improvements and updates to its protocol dissectors. This incremental release, the ninth maintenance update in the 4.4 series, addresses a high-priority security issue and resolves multiple decoder flaws affecting enterprise and academic users alike. Key Security and Stability Fix The release fixes a […]
The post Wireshark 4.4.9 Released With Critical Bug Fixes and Protocol Updates appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
1 закон для любой науки: осьминоги, русский язык и древние белки эволюционируют одинаково
真是谷歌传统:Pixel 10被发现出现雪花屏或随机彩色条纹 Pixel 5/7都出现过类似问题
Can AI agents catch what your SOC misses?
A new research project called NetMoniAI shows how AI agents might reshape network monitoring and security. Developed by a team at Texas Tech University, the framework brings together two ideas: distributed monitoring at the edge and AI-driven analysis at the center. The work is still research stage, but it gives CISOs a sense of what could be possible if agentic AI systems make their way into enterprise environments. The project is open source, so it … More →
The post Can AI agents catch what your SOC misses? appeared first on Help Net Security.
平安科技(上海)有限公司招聘安全研究员(渗透 / 代码审计 / AI赋能攻防)
Sophisticated Telegram Based Scam Designed to Fool Fragment Users
New TinkyWinkey Trojan Targets Windows Systems With Sophisticated Keylogging
A sophisticated new keylogger malware dubbed “TinkyWinkey” that is targeting Windows systems with advanced stealth capabilities and comprehensive data exfiltration features. First observed in late June 2025, this malware represents a significant evolution in keylogging technology, combining multiple attack vectors to maintain persistence and avoid detection. TinkyWinkey operates through a dual-component architecture that maximizes both […]
The post New TinkyWinkey Trojan Targets Windows Systems With Sophisticated Keylogging appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Zscaler Discloses Data Breach Following Salesforce Instance Compromise
Cybersecurity firm Zscaler has disclosed a data breach affecting customer contact information after unauthorized actors gained access to the company’s Salesforce database through compromised third-party application credentials. The breach originated from a broader campaign targeting Salesloft Drift, a marketing automation platform that integrates with Salesforce databases to manage leads and customer relationships. Cybercriminals successfully stole […]
The post Zscaler Discloses Data Breach Following Salesforce Instance Compromise appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Disable SOPHOS - TAB 9a
Человек решает за секунды, ИИ не справляется годами. ARC-AGI-3 обнажил пропасть между естественным и искусственным интеллектом
Complexity and AI put identity protection to the test
Identity has become a core pillar of cybersecurity strategy. Remote work, cloud-first adoption, and distributed supply chains have moved identity from “a tactical IT consideration to a strategic pillar of cybersecurity,” according to Cisco Duo’s 2025 State of Identity Security report. The study is based on a survey of 650 IT and security leaders across North America and Europe. It points to rising AI-driven threats, weak adoption of phishing-resistant authentication, and growing financial risk as … More →
The post Complexity and AI put identity protection to the test appeared first on Help Net Security.