Aggregator
发布 | 6项网络安全国家标准获批发布(附清单)
CNNVD | 关于微软多个安全漏洞的通报
权威解答来了!国家网信办就数据出境安全管理相关问题进行答复
CISA Alerts on Active Exploitation of CentreStack Hard-Coded Key Vulnerability
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an alert highlighting a critical vulnerability in Gladinet CentreStack, a cloud-based enterprise file-sharing platform. The issue, tracked as CVE-2025-30406, involves the use of a hard-coded cryptographic key that could enable attackers to execute remote code on compromised systems, posing a major security risk to organizations relying on […]
The post CISA Alerts on Active Exploitation of CentreStack Hard-Coded Key Vulnerability appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
警惕!Vidar Stealer 利用新骗术窃取浏览器 Cookie 和存储凭据
Windows Kerberos Vulnerability Enables Security Feature Bypass
Microsoft has disclosed a new security vulnerability in Windows operating systems, tracked as CVE-2025-29809. This flaw, classified with Important severity, impacts the Kerberos authentication protocol, potentially enabling attackers to bypass critical security features. The vulnerability stems from weaknesses described under CWE-922: Insecure Storage of Sensitive Information, making it a pressing concern for organizations relying on Kerberos for secure authentication. […]
The post Windows Kerberos Vulnerability Enables Security Feature Bypass appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
SourceForge 危机:威胁行为者利用 Microsoft Office 破解版传播恶意软件
Crypto24 New Threat Actor
New Double-Edged Email Attack Steals Office 365 Credentials and Delivers Malware
Cybersecurity experts have uncovered a sophisticated phishing campaign that employs a double-edged tactic to compromise Office 365 credentials and deliver malware, posing significant risks to organizations worldwide. The campaign, identified by the Cofense Phishing Defense Center (PDC), uses a file deletion reminder as a pretext to trick victims into engaging with what appears to be […]
The post New Double-Edged Email Attack Steals Office 365 Credentials and Delivers Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Ransomware Groups Target Organizations to Exfiltrate Data and Blackmail via Leak Site Posts
Ransomware attacks have continued their relentless assault on organizations worldwide, with a focus on data exfiltration and subsequent blackmail through leak site posts. Rapid7 Labs’ analysis of internal and public data provides insights into the evolving landscape of ransomware threats. Evolving Tactics in Ransomware Operations The ransomware ecosystem has seen a shift where established and […]
The post Ransomware Groups Target Organizations to Exfiltrate Data and Blackmail via Leak Site Posts appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
【安全圈】假冒 Microsoft Office 插件工具通过 SourceForge 推送恶意软件
【安全圈】Adobe 修复了 11 个 ColdFusion 严重漏洞,共发现 30 个漏洞
【安全圈】谷歌紧急发布4月安全更新 修复62个Android漏洞含两大零日漏洞
Gcore Super Transit Brings Advanced DDoS Protection and Acceleration for Superior Enterprise Security and Speed
Luxembourg, Luxembourg, 9th April 2025, CyberNewsWire
The post Gcore Super Transit Brings Advanced DDoS Protection and Acceleration for Superior Enterprise Security and Speed appeared first on Security Boulevard.
Hellcat Ransomware Upgrades Arsenal to Target Government, Education, and Energy Sectors
The cybersecurity community has raised alarms over the rapid evolution of the Hellcat ransomware group, which has escalated its tactics to target critical sectors. Hellcat, which emerged in mid-2024, now employs a sophisticated blend of psychological manipulation, zero-day vulnerabilities, and Ransomware-as-a-Service (RaaS) to expand its influence. Spear Phishing and Zero-day Exploits Hellcat operators initiate attacks […]
The post Hellcat Ransomware Upgrades Arsenal to Target Government, Education, and Energy Sectors appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Four Tips for Optimizing Data Backup and Recovery Costs
By taking simple steps like choosing a cost-effective backup storage strategy and minimizing recovery infrastructure costs, you can protect your business without bloating your budget.
The post Four Tips for Optimizing Data Backup and Recovery Costs appeared first on Security Boulevard.