Aggregator
CVE-2024-42089 | Linux Kernel up to 6.9.7 fsl-asoc-card fsl_asoc_card_audmux_init null pointer dereference (Nessus ID 207802 / WID-SEC-2024-1722)
CVE-2024-42090 | Linux Kernel up to 6.9.7 pinctrl create_pinctrl deadlock (Nessus ID 207802 / WID-SEC-2024-1722)
CVE-2024-42086 | Linux Kernel up to 6.9.7 bme680 compensate buffer overflow (Nessus ID 207802 / WID-SEC-2024-1722)
CVE-2024-42087 | Linux Kernel up to 6.9.7 ilitek-ili9881c gpiod_set_value privilege escalation (Nessus ID 207802 / WID-SEC-2024-1722)
Cloudflare Confirms Data Breach – Customer Data Exposed via Salesforce Attack
Cloudflare has disclosed a significant data breach affecting customer information following a sophisticated supply chain attack targeting its Salesforce integration with Salesloft Drift. The incident, which occurred between August 12-17, 2025, resulted in the exposure of customer support case data and potentially sensitive credentials shared through support channels. The Breach Details The cybersecurity company became […]
The post Cloudflare Confirms Data Breach – Customer Data Exposed via Salesforce Attack appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2017-11184 | GLPI up to 9.1.4 devicesoundcard.php Home sql injection (Issue 2449 / Nessus ID 260667)
CVE-2018-1137 | Moodle 3.x Portfolio URL input validation (Nessus ID 260664 / ID 13441)
CVE-2019-9072 | GNU binutils 2.32 libbfd elf.c setup_group resource management (K12541829 / Nessus ID 260666)
CVE-2018-2585 | Oracle MySQL Connectors up to 6.9.9/6.10.4 Connector/Net denial of service (Nessus ID 260668 / BID-102674)
TinyLoader Malware Spreads via Network Shares and Malicious Shortcut Files on Windows
A sophisticated malware operation that combines multiple attack vectors to steal cryptocurrency and deliver additional malicious payloads to Windows systems. A recently discovered TinyLoader malware campaign is actively targeting Windows users through a multi-pronged attack strategy involving network share exploitation, USB propagation, and deceptive shortcut files. The malware, which serves as a delivery mechanism for […]
The post TinyLoader Malware Spreads via Network Shares and Malicious Shortcut Files on Windows appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
The Cloak and the Dagger: How Google and Cloudflare Missed a Global Phishing Empire
Five habits of highly secure development teams
In this Help Net Security video, Brendon Collins, Principal Consultant at Optiv, explores how organizations can embed security and privacy into the software development lifecycle (SDLC) from the very start. He outlines five proactive principles, including default-deny architecture, privacy in the definition of done, privacy threat modeling, infrastructure-as-code scanning, and CI/CD security gates, showing how teams can innovate quickly while reducing risk and protecting users. The goal is to build a culture of security by … More →
The post Five habits of highly secure development teams appeared first on Help Net Security.
JVN: Delta Electronics製EIP BuilderにおけるXML外部エンティティ参照(XXE)の不適切な制限の脆弱性
Миллионы холодильников готовы разморозиться по команде хакеров — и никто не знает когда
JVN: 富士電機製FRENIC-Loader 4における信頼できないデータのデシリアライゼーションの脆弱性
将Zeek和Suricata转换为流式命令行工具的方法
将Zeek和Suricata转换为流式命令行工具的方法
将Zeek和Suricata转换为流式命令行工具的方法
Pyramid: Python scripts to evade EDRs
What is it Pyramid is a set of Python scripts and module dependencies that can be used to
The post Pyramid: Python scripts to evade EDRs appeared first on Penetration Testing Tools.