Aggregator
tabby从入门到新链挖掘
Chrome Type Confusion 0-Day Vulnerability Code Analysis Released
Google Chrome’s V8 JavaScript engine has been compromised by a critical type confusion zero-day vulnerability, designated CVE-2025-10585, marking the sixth actively exploited Chrome zero-day discovered in 2025. This high-severity flaw, with an estimated CVSS 3.1 score of 8.8, enables remote code execution through sophisticated memory corruption techniques that bypass Chrome’s sandbox protections. The vulnerability exploits […]
The post Chrome Type Confusion 0-Day Vulnerability Code Analysis Released appeared first on Cyber Security News.
2025年湾区杯网络安全大赛web题解
Inboxfuscation Tool Bypasses Exchange Inbox Rules and Evades Detection
Advanced persistent threat actors increasingly target Microsoft Exchange inbox rules to maintain persistence and siphon sensitive data without raising alarms. The newly released Inboxfuscation tool delivers a Unicode-based obfuscation framework capable of generating malicious inbox rules that slip past conventional monitoring solutions. By exploiting Exchange’s handling of diverse Unicode character sets, Inboxfuscation crafts visually deceptive […]
The post Inboxfuscation Tool Bypasses Exchange Inbox Rules and Evades Detection appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
⚡ Weekly Recap: Chrome 0-Day, AI Hacking Tools, DDR5 Bit-Flips, npm Worm & More
⚡ Weekly Recap: Chrome 0-Day, AI Hacking Tools, DDR5 Bit-Flips, npm Worm & More
CVE-2025-1594 | FFmpeg up to 7.1 AAC Encoder libavcodec/aacenc_tns.c ff_aac_search_for_tns stack-based overflow (Nessus ID 265685 / WID-SEC-2025-0429)
CVE-2002-0142 | John Roy Pi3Web 2.0 Request privileges management (EDB-21225 / Nessus ID 11099)
CVE-2002-0147 | Microsoft IIS 4.0/5.0/5.1 ASP Data Transfer memory corruption (VU#669779 / Nessus ID 10935)
CVE-2002-0149 | Microsoft IIS 4.0/5.0/5.1 ASP Server-Side Include memory corruption (VU#721963 / Nessus ID 10935)
CVE-2002-0150 | Microsoft IIS 4.0/5.0/5.1 HTTP Header memory corruption (VU#454091 / Nessus ID 10936)
CVE-2002-0159 | Cisco Secure Access Control Server up to 3.01 CSAdmin format string (ID 38193 / XFDB-8742)
CVE-2002-0151 | Microsoft Windows NT 4.0 Multiple UNC Provider memory corruption (MS02-017 / Nessus ID 10944)
Code Analysis Published for Chrome Type Confusion 0-Day Vulnerability
Google Chrome’s V8 JavaScript engine has long balanced speed and security for billions of users worldwide. On September 16, 2025, Google’s Threat Analysis Group discovered a critical zero-day flaw in the TurboFan compiler component of V8. Now tracked as CVE-2025-10585, the vulnerability allows attackers to trigger a type confusion condition, corrupt memory in the browser […]
The post Code Analysis Published for Chrome Type Confusion 0-Day Vulnerability appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
The Compliance Automation Mirage: Why Vendors Keep Failing and Where AI Finally Gets It Right
The Compliance Automation Mirage: Why Vendors Keep Failing and Where AI Finally Gets It Right
If you’ve been in the trenches of enterprise risk and compliance for any length of time, you’ve heard the pitch: “Automate your compliance and save your team hours.” Dozens of vendors have said it. Most have meant well. And nearly all of them have failed to deliver at the scale that enterprises require.
The post The Compliance Automation Mirage: Why Vendors Keep Failing and Where AI Finally Gets It Right appeared first on Security Boulevard.
Canada Police Dismantles TradeOgre Platform That Stolen 56 Million Dollars in Cryptocurrency
Canada’s law enforcement community has achieved a landmark victory in the fight against illicit finance with the dismantling of TradeOgre, a Tor-based cryptocurrency exchange that facilitated the theft and laundering of over 56 million dollars in digital assets. Emerging in early 2023, TradeOgre operated entirely as a hidden service, leveraging the anonymity of the Tor […]
The post Canada Police Dismantles TradeOgre Platform That Stolen 56 Million Dollars in Cryptocurrency appeared first on Cyber Security News.
Subtle Snail Impersonation Tactics: How HR Representatives Can Engage Employees to Steal Login Credentials
Subtle Snail, an Iran-linked espionage group also tracked as UNC1549 under the Unyielding Wasp (Tortoiseshell) umbrella of the Charming Kitten network, has shifted its focus to European telecom, aerospace, and defense firms since June 2022. In a recent wave of attacks, the group compromised 34 devices across 11 organizations by masquerading as human resources representatives […]
The post Subtle Snail Impersonation Tactics: How HR Representatives Can Engage Employees to Steal Login Credentials appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.