Aggregator
CVE-2023-20604 | MediaTek MT6735 ged out-of-bounds write (ALPS07494067)
Snow White — Beware the Bad Apple in the Torrent
As the new Snow White movie arrives in theaters with lackluster audience attendance (source), the absence of streaming options on platforms like Disney+ has nudged many users to seek pirated versions online. From our perspective, this kind of consumer behavior isn’t new, every high-profile movie release without a digital option becomes an opportunity for attackers […]
The post Snow White — Beware the Bad Apple in the Torrent appeared first on VERITI.
The post Snow White — Beware the Bad Apple in the Torrent appeared first on Security Boulevard.
StreamElements discloses third-party data breach after hacker leaks data
Сократ против ChatGPT: ИИ стирает границы человеческого мышления
CVE-2025-2825: Unauthenticated HTTP(S) port access on CrushFTPv10/v11
Anonymous Italia Defaced the Website of Zoo Salon FOX
Прощание с суперсимметрией: любимая теория физиков оказалась миражом
Z-PENTEST ALLIANCE Targeted the Website of ALYN Hospital
New Atlantis AIO platform automates credential stuffing on 140 services
bincrypter: A Linux Binary Runtime Crypter
bincrypter – Pack/Encrypt/Obfuscate ELF + SHELL scripts A Linux Binary Runtime Crypter – in BASH! Features Obfuscates & encrypts any ELF binary or #!-script AV/EDR death: Morphing + different signature every time 100% in-memory. No temporary...
The post bincrypter: A Linux Binary Runtime Crypter appeared first on Penetration Testing Tools.
GitLab security advisory (AV25-166)
Threat Actors Use “Atlantis AIO” Tool to Automate Credential Stuffing Attacks
In a concerning development for cybersecurity professionals, threat actors are increasingly utilizing a powerful tool called Atlantis AIO to automate and scale credential stuffing attacks across more than 140 platforms. This multi-checker tool, designed to exploit stolen user credentials, has emerged as a formidable weapon in the cybercriminal arsenal, enabling attackers to test millions of […]
The post Threat Actors Use “Atlantis AIO” Tool to Automate Credential Stuffing Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Hackers Exploit COM Objects for Fileless Malware and Lateral Movement
Security researchers Dylan Tran and Jimmy Bayne have unveiled a new fileless lateral movement technique that exploits trapped Component Object Model (COM) objects in Windows systems. This method, based on research by James Forshaw of Google Project Zero, allows attackers to execute .NET managed code in the context of a server-side Distributed COM (DCOM) process. […]
The post Hackers Exploit COM Objects for Fileless Malware and Lateral Movement appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2024-12695
Defensie gaat samenwerking aan met zorgreservisten
B1ack’s Stash Marketplace Actors Set to Release 4 Million Stolen Credit Card Records for Free
In a significant escalation of illicit activities, B1ack’s Stash, a notorious dark web carding marketplace, has announced plans to release an additional 4 million stolen credit card records for free. This move is part of a broader strategy to attract cybercriminals and establish credibility within the underground economy. The marketplace first gained attention in April […]
The post B1ack’s Stash Marketplace Actors Set to Release 4 Million Stolen Credit Card Records for Free appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Алмазное сердце квантового компьютера: достигнут исторический минимум ошибок
The Rise of Mobile Phishing and How to Prevent Mobile Phishing
The post The Rise of Mobile Phishing and How to Prevent Mobile Phishing appeared first on AI Security Automation.
The post The Rise of Mobile Phishing and How to Prevent Mobile Phishing appeared first on Security Boulevard.
Pakistan APT Hackers Weaponize malicious IndiaPost Site to Target Windows and Android Users
A Pakistan-based Advanced Persistent Threat (APT) group, likely APT36, has launched a multi-platform cyberattack campaign targeting Indian users through a fraudulent website impersonating the Indian Post Office. The attack, discovered by CYFIRMA researchers, exploits both Windows and Android vulnerabilities, demonstrating a significant evolution in the group’s tactics. Sophisticated Attack Leverages Youth Laptop Scheme The malicious […]
The post Pakistan APT Hackers Weaponize malicious IndiaPost Site to Target Windows and Android Users appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.