Aggregator
幽灵注入(Ghost Injection)
Полная остановка госуслуг: власти оказались заложниками хакеров
TXOne Networks Stellar 3.2 helps organizations make informed security choices
TXOne Networks announced Version 3.2 of its Stellar solution, further enhancing its capabilities from endpoint protection to more comprehensive detection and response in operational technology (OT) environments. Stellar simplifies the journey into threat hunting and detection while overcoming the limitations of traditional information technology (IT) endpoint detection and response (EDR) solutions, which can disrupt OT operations and productivity. Purpose-built for OT environments, Stellar ensures effective security without compromising system stability. “We have observed that alert … More →
The post TXOne Networks Stellar 3.2 helps organizations make informed security choices appeared first on Help Net Security.
10 из 10: CVE-2024-54085 испепеляет дата-центры удалённой командой
Microsoft Windows File Explorer Vulnerability Let Attackers Perform Network Spoofing – PoC Released
A critical vulnerability in Windows File Explorer, identified as CVE-2025-24071, enables attackers to steal NTLM hashed passwords without any user interaction beyond simply extracting a compressed file. Security researchers have released a proof-of-concept exploit demonstrating this high-severity flaw, which Microsoft patched in its March 2025 updates. Microsoft Windows File Explorer Vulnerability The vulnerability, dubbed “NTLM […]
The post Microsoft Windows File Explorer Vulnerability Let Attackers Perform Network Spoofing – PoC Released appeared first on Cyber Security News.
Hackers Allegedly Selling Firewall Access to Canon Inc on Hacking Forums
Threat actors are allegedly offering root access to Canon Inc.’s internal firewall systems on underground hacking forums. According to security monitoring firm ThreatMon, the advertisement appeared on a popular dark web marketplace, claiming to provide administrator-level access to the Japanese camera giant’s network infrastructure. The threat actor’s listing, verified by multiple security analysts, advertises privileged […]
The post Hackers Allegedly Selling Firewall Access to Canon Inc on Hacking Forums appeared first on Cyber Security News.
CVE-2024-13790 | ThemeMove MinimogWP Plugin up to 3.7.0 on WordPress template filename control
Keysight AI Insight Brokers accelerates threat detection and response
Keysight Technologies announces the expansion of its Keysight Vision Network Packet Brokers (NPBs), with the introduction of AI Insight Brokers. These enhanced NPBs are designed to improve the performance of AI-driven cybersecurity operations such as threat detection, incident response, and forensics. The AI Insight Broker is purpose built to support and leverage the capabilities of AI software, including Keysight’s newly developed AI Stack. As cyber threats continue to evolve, organizations need to look for new … More →
The post Keysight AI Insight Brokers accelerates threat detection and response appeared first on Help Net Security.
331 вирусное приложение: как вредоносный код прошёл через фильтры Google Play
初识网络安全知识-信息收集篇
Hacker Weaponizing Hard Disk Image Files To Deliver VenomRAT
A sophisticated phishing campaign is leveraging virtual hard disk (.vhd) files to distribute the dangerous VenomRAT malware. The attack begins with purchase order-themed emails containing archive attachments that, when extracted, reveal hard disk image files designed to evade traditional security measures. Upon opening, the .vhd file mounts itself as a disk drive containing a heavily […]
The post Hacker Weaponizing Hard Disk Image Files To Deliver VenomRAT appeared first on Cyber Security News.
Outseer introduces Behavioral Biometrics capability
Outseer announced its platform-native Behavioral Biometrics capability. The addition of platformized Behavioral Biometrics introduces another layer of defense that continuously analyzes user interactions to detect anomalies in real time. Building on its rich RSA heritage (formerly RSA Fraud & Risk Intelligence), Outseer has enhanced its platform to counter modern cyber threats. As fraud evolves, spurred by the digitization of payments, the spread of personal data across the dark web, the growing threat of scams and … More →
The post Outseer introduces Behavioral Biometrics capability appeared first on Help Net Security.
От проводов к нейронам: почему 6G нуждается в человеческом интеллекте
CISA Warns of Supply-Chain Attack Exploiting GitHub Action Vulnerability
The Cybersecurity and Infrastructure Security Agency (CISA) has sounded the alarm over a critical supply-chain attack affecting a widely used third-party GitHub Action: tj-actions/changed-files. This action, exploited under CVE-2025-30066, is designed to identify changes in files during pull requests or commits. However, its compromise poses a significant risk to users by allowing unauthorized access to […]
The post CISA Warns of Supply-Chain Attack Exploiting GitHub Action Vulnerability appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
西班牙政治家对女性诉求的回应少于男性
MirrorFace Hackers Modify AsyncRAT Execution for Stealthy Deployment in Windows Sandbox
In a significant development, the China-aligned advanced persistent threat (APT) group known as MirrorFace has been observed employing sophisticated tactics to enhance the stealthiness of its attacks. Recently, MirrorFace modified the execution of AsyncRAT, a publicly available remote access trojan (RAT), to run it inside Windows Sandbox, thereby evading detection by security controls. This approach […]
The post MirrorFace Hackers Modify AsyncRAT Execution for Stealthy Deployment in Windows Sandbox appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.