Aggregator
«Кошачьи кубиты» против квантового шума. Как Alice & Bob нашли способ сделать магические состояния в 10 раз дешевле
Google Confirms Potential Compromise of All Salesloft Drift Customer Authentication Tokens
Google has confirmed that a security breach involving the Salesloft Drift platform is more extensive than initially reported, potentially compromising all authentication tokens connected to the service. The new findings from the Google Threat Intelligence Group (GTIG) indicate that the incident, previously thought to be limited to Salesforce integrations, affects all third-party applications connected to […]
The post Google Confirms Potential Compromise of All Salesloft Drift Customer Authentication Tokens appeared first on Cyber Security News.
F-35’s in Polen paraat voor NAVO-luchtruimbewaking
Critical Hikvision Vulnerabilities Allow Remote Command Injection
On August 28, 2025, the Hikvision Security Response Center (HSRC) issued Security Advisory SN No. HSRC-202508-01, detailing three critical vulnerabilities affecting various HikCentral products. Collectively assigned CVE identifiers CVE-2025-39245, CVE-2025-39246, and CVE-2025-39247, these vulnerabilities range in severity from moderate to high and could enable attackers to execute unauthorized commands, escalate privileges, or obtain administrative access. […]
The post Critical Hikvision Vulnerabilities Allow Remote Command Injection appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Ransomware gang takedowns causing explosion of new, smaller groups
INC
You must login to view this content
INC
You must login to view this content
Akira
You must login to view this content
Akira
You must login to view this content
VirusTotal Launches Endpoint That Explains Code Functionality for Malware Analysts
Virustotal today unveiled a powerful addition to its Code Insight suite: a dedicated API endpoint that accepts code snippets—either disassembled or decompiled—and returns succinct summaries and detailed descriptions tailored for malware analysts. Launched over two years after the debut of Code Insight at RSA 2023, this endpoint represents a significant step toward automating reverse engineering […]
The post VirusTotal Launches Endpoint That Explains Code Functionality for Malware Analysts appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
安卓智能体:Droidrun分析及体验
Удалили расширение — украли имя, подложили вирус. Хакеры массово атакуют разработчиков VS Code Marketplace
Lynx
You must login to view this content
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CVE-2025-57819 Sangoma FreePBX Authentication Bypass Vulnerability
This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.