Aggregator
Chinese ‘Web Shell Whisperer’ Leverages Shells and Tunnels to Establish Stealthy Persistence
A recent cyber espionage operation by a China-nexus threat actor, dubbed “Weaver Ant,” has been uncovered by Sygnia, a cybersecurity firm. This sophisticated threat actor targeted a major telecommunications company in Asia, utilizing web shells and tunneling techniques to maintain persistent access and facilitate espionage. The operation highlights the evolving tactics of state-sponsored groups in […]
The post Chinese ‘Web Shell Whisperer’ Leverages Shells and Tunnels to Establish Stealthy Persistence appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2024-5687 | Mozilla Firefox up to 126 on Android Header
CVE-2024-5695 | Mozilla Firefox up to 126 Probabilistic Heap Checker memory corruption
CVE-2024-5694 | Mozilla Firefox up to 126 Javascript Engine use after free
Разные зарплаты ‒ одна работа: Google выложит $28 млн за дискриминацию сотрудников
24th March – Threat Intelligence Report
For the latest discoveries in cyber research for the week of 24th March, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Municipalities in four US states experienced cyberattacks that disrupted services for county offices, courts, and schools. Cleveland Municipal Court was hit by Qilin ransomware attack, forcing employees offline and delaying trials, while […]
The post 24th March – Threat Intelligence Report appeared first on Check Point Research.
Prevent, Detect, Contain: A Guide Against Black Basta Affiliates’ Attacks
Guidance to help organizations reduce their attack surface, implement a stronger defense-in-depth security model, as well as more quickly detect and contain an intrusion by this ever-prevalent threat.
The post Prevent, Detect, Contain: A Guide Against Black Basta Affiliates’ Attacks appeared first on Security Boulevard.
FCC Investigates Chinese Entities on US Government’s Prohibited List
The Federal Communications Commission (FCC) has initiated a new investigation into Chinese entities previously identified as national security risks to ensure these companies are not circumventing U.S. regulations. FCC Chairman Brendan Carr announced the move today as the first major initiative led by the newly established Council on National Security within the FCC. The investigation […]
The post FCC Investigates Chinese Entities on US Government’s Prohibited List appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
VanHelsingRaaS Emerges, Targeting Linux, BSD, ARM, and ESXi Systems
VanHelsingRaaS, a newly launched ransomware-as-a-service (RaaS) program, has quickly gained traction in the cybercrime ecosystem. Introduced on March 7, 2025, this RaaS platform offers affiliates a cross-platform ransomware tool capable of targeting diverse systems, including Linux, BSD, ARM architectures, and VMware ESXi environments. Its rapid adoption underscores its appeal to both seasoned cybercriminals and newcomers. […]
The post VanHelsingRaaS Emerges, Targeting Linux, BSD, ARM, and ESXi Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
EU Cyber Resilience Act: What You Need to Know
What is the Cyber Resilience Act? The Cyber Resilience Act is a comprehensive regulatory framework introduced by the EU to enhance cybersecurity resilience. Its primary focus is on minimizing vulnerabilities in digital products and ensuring robust cybersecurity measures are implemented throughout their lifecycle. The act applies to both manufacturers and suppliers of software and hardware […]
The post EU Cyber Resilience Act: What You Need to Know appeared first on Centraleyes.
The post EU Cyber Resilience Act: What You Need to Know appeared first on Security Boulevard.
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.
- CVE-2025-30154 reviewdog action-setup GitHub Action Embedded Malicious Code Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.