Aggregator
Is Spacecoin on a Mission to Save The World?! - Introducing Internet Decentralization
Embedding Large Language Models as OS-Level APIs: An Overlooked Gateway to AI Safety and Privacy
AI Isn’t a Magical Genius or a Friendly Sidekick — It’s a Supercharged Autocomplete
CVE-2024-42092 | Linux Kernel up to 6.9.7 davinci_gpio_probe array index (Nessus ID 207802 / WID-SEC-2024-1722)
CVE-2024-42091 | Linux Kernel up to 6.9.7 Setting random values (583ce246c7ff/a918e771e6fb / Nessus ID 210060)
CVE-2024-42088 | Linux Kernel up to 6.9.7 mt8195 mtk-soundcard-driver.c out-of-bounds (42b9ab7a4d7e/282a4482e198 / Nessus ID 210060)
CVE-2024-42089 | Linux Kernel up to 6.9.7 fsl-asoc-card fsl_asoc_card_audmux_init null pointer dereference (Nessus ID 207802 / WID-SEC-2024-1722)
CVE-2024-42090 | Linux Kernel up to 6.9.7 pinctrl create_pinctrl deadlock (Nessus ID 207802 / WID-SEC-2024-1722)
CVE-2024-42086 | Linux Kernel up to 6.9.7 bme680 compensate buffer overflow (Nessus ID 207802 / WID-SEC-2024-1722)
CVE-2024-42087 | Linux Kernel up to 6.9.7 ilitek-ili9881c gpiod_set_value privilege escalation (Nessus ID 207802 / WID-SEC-2024-1722)
Cloudflare Confirms Data Breach – Customer Data Exposed via Salesforce Attack
Cloudflare has disclosed a significant data breach affecting customer information following a sophisticated supply chain attack targeting its Salesforce integration with Salesloft Drift. The incident, which occurred between August 12-17, 2025, resulted in the exposure of customer support case data and potentially sensitive credentials shared through support channels. The Breach Details The cybersecurity company became […]
The post Cloudflare Confirms Data Breach – Customer Data Exposed via Salesforce Attack appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2017-11184 | GLPI up to 9.1.4 devicesoundcard.php Home sql injection (Issue 2449 / Nessus ID 260667)
CVE-2018-1137 | Moodle 3.x Portfolio URL input validation (Nessus ID 260664 / ID 13441)
CVE-2019-9072 | GNU binutils 2.32 libbfd elf.c setup_group resource management (K12541829 / Nessus ID 260666)
CVE-2018-2585 | Oracle MySQL Connectors up to 6.9.9/6.10.4 Connector/Net denial of service (Nessus ID 260668 / BID-102674)
TinyLoader Malware Spreads via Network Shares and Malicious Shortcut Files on Windows
A sophisticated malware operation that combines multiple attack vectors to steal cryptocurrency and deliver additional malicious payloads to Windows systems. A recently discovered TinyLoader malware campaign is actively targeting Windows users through a multi-pronged attack strategy involving network share exploitation, USB propagation, and deceptive shortcut files. The malware, which serves as a delivery mechanism for […]
The post TinyLoader Malware Spreads via Network Shares and Malicious Shortcut Files on Windows appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
The Cloak and the Dagger: How Google and Cloudflare Missed a Global Phishing Empire
Five habits of highly secure development teams
In this Help Net Security video, Brendon Collins, Principal Consultant at Optiv, explores how organizations can embed security and privacy into the software development lifecycle (SDLC) from the very start. He outlines five proactive principles, including default-deny architecture, privacy in the definition of done, privacy threat modeling, infrastructure-as-code scanning, and CI/CD security gates, showing how teams can innovate quickly while reducing risk and protecting users. The goal is to build a culture of security by … More →
The post Five habits of highly secure development teams appeared first on Help Net Security.