Aggregator
CVE-2025-11334 | Campcodes Online Apartment Visitor Management System 1.0 /visitor-detail.php editid sql injection (EUVD-2025-32530)
CVE-2025-11333 | langleyfcu Online Banking System up to 57437e6400ce0ae240e692c24e6346b8d0c17d7a Add Customer Page /customer_add_action.php First Name cross site scripting (EUVD-2025-32531)
CVE-2025-58578 | SICK Enterprise Analytics API Endpoint allocation of resources (EUVD-2025-32501)
CVE-2025-58580 | SICK Enterprise Analytics POST Request neutralization for logs (EUVD-2025-32499)
CVE-2025-58581 | SICK Enterprise Analytics information exposure (EUVD-2025-32498)
CVE-2025-58582 | SICK Enterprise Analytics POST Request allocation of resources (EUVD-2025-32497)
Threat Actors Claim Breach Of Huawei Technologies Source Code and Internal Tools
A threat actor has claimed responsibility for a significant data breach at Huawei Technologies, a multinational technology corporation based in China. The actor is reportedly attempting to sell what they allege is the company’s internal source code and development tools on a dark web forum. The post, which appeared in early October 2025, asserts that […]
The post Threat Actors Claim Breach Of Huawei Technologies Source Code and Internal Tools appeared first on Cyber Security News.
Inside the Hacker’s Playbook—Adversarial AI Up Close
Jamie Levy, director of adversary tactics at Huntress, highlights a rare and revealing incident: a cybercriminal downloaded Huntress’ software, inadvertently giving defenders a front-row seat into how attackers are experimenting with artificial intelligence. For years, the industry has speculated that threat actors were using AI—but speculation is not proof. This time, there was evidence. By..
The post Inside the Hacker’s Playbook—Adversarial AI Up Close appeared first on Security Boulevard.
Kecy Metal Technologies Falls Victim to Qilin Ransomware
FSF отметил 40-летие и представила LibrePhone — попытку вырвать мобильные вычисления из-под проприетарного контроля
Alleged Sale of Access to UU Slots Website
Alleged Data Leak of Gujarat Bank
Hackers launch data leak site to extort 39 victims, or Salesforce
Scattered Lapsus$ Hunters launched a data leak site over the weekend, aiming to pressure organizations whose Salesforce databases they have plundered into paying to prevent the stolen data from being released. Screenshot of Scattered Lapsus$ Hunters data leak site (Source: Help Net Security) The group’s victims Scattered Lapsus$ Hunters is a hacker collective that reportedly brings together members of the Scattered Spider, Lapsus$, and ShinyHunters cybercrime groups. The dark web data leak site currently lists … More →
The post Hackers launch data leak site to extort 39 victims, or Salesforce appeared first on Help Net Security.
Rainwalk Pet Insurance Exposes 158 GB of US Customer and Pet Data
如果 AI 泡沫破裂?
Suspected Chinese cyber spies targeted Serbian aviation agency
Chinese Gov't Fronts Trick the West to Obtain Cyber Tech
Иммунитет, который не ест сам себя. За что два американца и японец получили Нобелевскую премию и как это поможет лечить рак.
Akira
You must login to view this content