Aggregator
Вселенная существовала всегда: физики исправили уравнения Эйнштейна квантовой механикой
CVE-2022-38482 | Mega HOPEX prior 15.2.0.6110 V5CP4 Link information disclosure
CVE-2022-38490 | EasyVista 2020.2.125.3/2022.1.109.0.03 sql injection
CVE-2022-38492 | EasyVista 2020.2.125.3/2022.1.109.0.03 sql injection
CVE-2022-38481 | Mega HOPEX cross site scripting
CVE-2022-38489 | EasyVista 2020.2.125.3 cross site scripting
CVE-2022-36442 | Zebra Enterprise Home Screen 4.1.19 Embedded Google Chrome Application privilege escalation
SideCopy APT Hackers Impersonate Government Officials to Deploy Open-Source XenoRAT Tool
The Pakistan-linked Advanced Persistent Threat (APT) group known as SideCopy has significantly expanded its targeting scope since late December 2024. Initially, the group focused on infiltrating India’s government, defense, maritime sectors, and university students. Recent developments indicate an inclusion of crucial sectors like railways, oil & gas, and external affairs ministries into their cyber activities. […]
The post SideCopy APT Hackers Impersonate Government Officials to Deploy Open-Source XenoRAT Tool appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Industrial-strength April Patch Tuesday covers 135 CVEs
Akira
Qilin
Qilin
National Social Security Fund of Morocco Suffers Data Breach
China-Linked Hackers Continue Harassing Ethnic Groups With Spyware
Qilin
Cicada3301
NightSpire
Emulating the Misleading CatB Ransomware
AttackIQ has released a new attack graph designed to emulate the Tactics, Techniques, and Procedures (TTPs) associated with CatB ransomware observed in its most recent activities, enabling defenders to test and validate their detection and response capabilities.
The post Emulating the Misleading CatB Ransomware appeared first on AttackIQ.
The post Emulating the Misleading CatB Ransomware appeared first on Security Boulevard.
Russian APT Hackers Use Device Code Phishing Technique to Bypass MFA
Russian state-backed advanced persistent threat (APT) group Storm-2372 has exploited device code phishing to bypass multi-factor authentication (MFA) and infiltrate high-value targets across governments, NGOs, and critical industries. Since August 2024, this group has weaponized the OAuth device authorization flow—a legitimate authentication mechanism—to hijack user sessions and exfiltrate sensitive data. Microsoft Threat Intelligence researchers, alongside […]
The post Russian APT Hackers Use Device Code Phishing Technique to Bypass MFA appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.