Aggregator
VEH异常调用链控制程序流程原理及分析
WMCTF2025 Web部分题解
PEB 和 EAT ,检测syscall stub
安卓逆向-frida hook Native层
N1CTF Junior re pyramid
基于动态SSN检索的间接系统调用加载器实现与绕过EDR初探
腾讯云安全挑战赛第一期wp
高版本fastjson 为何畸形 payload 能够实现探测解析
基于解析jsp流程构造的webshell 绕过阿里云附魔检测
У вас крутая геймерская мышь? Поздравляем, кто угодно может подслушать ваш разговор. И микрофон не нужен
Zimbra users targeted in zero-day exploit using iCalendar attachments
Zimbra users targeted in zero-day exploit using iCalendar attachments
Redis Server Vulnerability use-after-free Vulnerability Enables Remote Code Execution
A critical use-after-free vulnerability, identified as CVE-2025-49844, has been discovered in Redis servers, enabling authenticated attackers to achieve remote code execution. This high-severity flaw affects all versions of Redis that utilize the Lua scripting engine, presenting a significant threat to a wide range of deployments that rely on the popular in-memory data store. The core […]
The post Redis Server Vulnerability use-after-free Vulnerability Enables Remote Code Execution appeared first on Cyber Security News.
Ransomware Gangs Exploit Remote Access Tools to Stay Hidden and Maintain Control
Modern ransomware operations have evolved far beyond simple opportunistic attacks into sophisticated, multi-stage campaigns that exploit legitimate Remote Access Tools (RATs) to maintain stealth and persistence while systematically dismantling organizational defenses. Ransomware is one of the most disruptive cyber threats, encrypting critical organizational data and demanding ransom payments for restoration. While early campaigns relied on […]
The post Ransomware Gangs Exploit Remote Access Tools to Stay Hidden and Maintain Control appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Steam и Microsoft экстренно реагируют на уязвимость Unity. Valve блокирует параметры запуска, Microsoft рекомендует удалять игры
Hackers Weaponize AWS X-Ray Service to Work as Covert Command & Control Server
A sophisticated technique uncovered where threat actors abuse Amazon Web Services‘ X-Ray distributed tracing service to establish covert command and control (C2) communications, demonstrating how legitimate cloud infrastructure can be weaponized for malicious purposes. AWS X-Ray, designed to help developers analyze application performance through distributed tracing, has been repurposed by red team researchers into a […]
The post Hackers Weaponize AWS X-Ray Service to Work as Covert Command & Control Server appeared first on Cyber Security News.