Aggregator
Новая эра вымогательства — это когда хакеры больше не требуют деньги, а шантажируют нейросетью
Over 1,100 Ollama AI Servers Found Online, 20% at Risk
More than 1,100 instances of Ollama—a popular framework for running large language models (LLMs) locally—were discovered directly accessible on the public internet, with approximately 20% actively hosting vulnerable models that could be exploited by unauthorized parties. Cisco Talos specialists made the alarming finding during a rapid Shodan scan, underscoring negligent security practices in AI deployments […]
The post Over 1,100 Ollama AI Servers Found Online, 20% at Risk appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Major IPTV Piracy Network Uncovered Spanning 1100 Domains
Threat Actors Weaponize HexStrike AI to Exploit Citrix Flaws Within a Week of Disclosure
Dire Wolf Ransomware Targets Windows, Wipes Logs and Backups
The recently emerged DireWolf ransomware group has launched a sophisticated new campaign targeting Windows systems worldwide, employing ruthless tactics to delete event logs, erase backup-related data, and thwart recovery efforts. First sighted in May 2025, DireWolf has rapidly escalated its operations, infecting 16 organizations across 16 regions—including the United States, Thailand, Taiwan, Australia, and Italy—and […]
The post Dire Wolf Ransomware Targets Windows, Wipes Logs and Backups appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
U.S. CISA adds WhatsApp, and TP-link flaws to its Known Exploited Vulnerabilities catalog
Одни «забытые» домены, другие — «сознательное игнорирование». Google и Cloudflare помогают хакерам годами
Qilin
You must login to view this content
Varonis Acquires Email Security Provider SlashNext to Enhance BEC Defenses
CISA Adds Two Known Exploited Vulnerabilities to Catalog
CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CVE-2023-50224 TP-Link TL-WR841N Authentication Bypass by Spoofing Vulnerability
- CVE-2025-9377 TP-Link Archer C7(EU) and TL-WR841N/ND(MS) OS Command Injection Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
CISA, NSA, and Global Partners Release a Shared Vision of Software Bill of Materials (SBOM) Guidance
CISA, in collaboration with NSA and 19 international partners, released joint guidance outlining A Shared Vision of Software Bill of Materials (SBOM) for Cybersecurity. This marks a significant step forward in strengthening software supply chain transparency and security worldwide.
An SBOM is a formal record detailing the components and supply chain relationships used in building software. SBOMs act as a software “ingredients list” providing organizations with essential visibility into software dependencies, enabling them to identify components, assess risks, and take proactive measures to mitigate vulnerabilities.
The guidance highlights the benefits of SBOM adoption for software producers, purchasers, operators, and national security organizations. Key advantages include reducing risks, improving vulnerability management, and enhancing overall software security practices.
By promoting transparency, aligning technical approaches, and leveraging automation, SBOM adoption strengthens the resilience of the global software ecosystem. This guidance urges organizations worldwide to integrate SBOM practices into their security frameworks to collaboratively address supply chain risks and enhance cybersecurity resilience.
For more information on SBOM, visit: https://www.cisa.gov/sbom.
For leadership statements from co-authoring organizations, visit: Statements of Support on A Shared Vision of SBOM for Cybersecurity.
CVE-2025-9942 | CodeAstro Real Estate Management System 1.0 /submitproperty.php unrestricted upload
CVE-2025-9941 | CodeAstro Real Estate Management System 1.0 /register.php uimage unrestricted upload
CVE-2025-9940 | CodeAstro Real Estate Management System 1.0 /feature.php msg cross site scripting
CVE-2025-9939 | CodeAstro Real Estate Management System 1.0 /propertyview.php msg cross site scripting
Apache DolphinScheduler Vulnerability Patched — Update Immediately
A low-severity security issue in Apache DolphinScheduler has been addressed in the latest release. Identified as CVE-2024-43166 and classified under CWE-276: Incorrect Default Permissions, this vulnerability affects all DolphinScheduler versions prior to 3.2.2. Users are strongly advised to upgrade to version 3.3.1 as soon as possible to mitigate potential risks. Apache DolphinScheduler is an open-source, […]
The post Apache DolphinScheduler Vulnerability Patched — Update Immediately appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.