Aggregator
CVE-2023-43884 | Subrion 4.2.1 Reference ID cross site scripting (EUVD-2023-2460)
ZipLine Campaign: A Sophisticated Phishing Attack Targeting US Companies
Key findings: Introduction Check Point Research (CPR) has been closely monitoring the activity of a highly persistent and sophisticated threat actor who leverages social engineering tactics to gain the trust of targeted U.S.-based organizations. While analyzing the phishing lures used by the actors, we repeatedly noticed an intriguing pattern: in every case, it was the victim who […]
The post ZipLine Campaign: A Sophisticated Phishing Attack Targeting US Companies appeared first on Check Point Research.
Microsoft Launches Tool to Migrate VMware VMs From vCenter to Hyper-V
Microsoft today announced the public preview of a new VM Conversion extension for Windows Admin Center, enabling IT administrators to migrate virtual machines from VMware vCenter to Hyper-V with minimal downtime. Available at no cost during its preview phase, the lightweight tool supports online replication and conversion of both Windows and Linux VMs, streamlining hybrid data center […]
The post Microsoft Launches Tool to Migrate VMware VMs From vCenter to Hyper-V appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
把豪车卖爆了的华为,瞄上了比亚迪们 10 万市场的「大蛋糕」
CVE-2023-41646 | Buttercup 2.20.3 /vaults.json/ information disclosure (EUVD-2023-2455)
CVE-2023-43618 | Croc up to 9.6.5 IPS Message missing encryption (Issue 597 / EUVD-2023-2458)
CVE-2023-43621 | Croc up to 9.6.5 Command Line information disclosure (Issue 598 / EUVD-2023-2457)
CVE-2023-44270 | PostCSS up to 8.4.30 Cascading Style Sheet injection (EUVD-2023-2456 / Nessus ID 213394)
Study Reveals TikTok, Alibaba, Temu Collect Extensive User Data in America
CVE-2015-5467 | Yii Yii2 up to 2.0.4 view path traversal (EUVD-2023-2454)
CVE-2025-29901 | QNAP Systems File Station 5 5.5.6.4741 null pointer dereference (qsa-25-31 / WID-SEC-2025-1907)
CVE-2025-44002 | TeamViewer Full Client/Host prior 15.69 on Windows Symbolic Links toctou (WID-SEC-2025-1908)
Microsoft обращается к каждому: заблокируйте «Выполнить» и PowerShell своим сотрудникам
PoC Exploit Published for Chrome 0-Day Already Under Active Attack
A proof-of-concept exploit for a high-severity Google Chrome zero-day vulnerability has been published publicly, less than three months after the flaw was first disclosed, amid reports of active in-the-wild exploitation. The vulnerability, tracked as CVE-2025-5419, stems from out-of-bounds reads and writes in Chrome’s V8 JavaScript engine, affecting versions prior to 137.0.7151.68 and opening the door […]
The post PoC Exploit Published for Chrome 0-Day Already Under Active Attack appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.