Aggregator
Advanced Cyber Attack Exploits Booking Websites to Deploy LummaStealer Malware
A sophisticated cyberattack has been uncovered, targeting booking websites to spread the LummaStealer malware. This campaign leverages fake CAPTCHA prompts and social engineering techniques to deceive users into executing malicious commands on their systems. LummaStealer, an info-stealer malware operating under a Malware-as-a-Service (MaaS) model, has been gaining attention for its versatility and global reach. Infection […]
The post Advanced Cyber Attack Exploits Booking Websites to Deploy LummaStealer Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Linux на Android: терминал уже здесь, но десктопа не ждите
Windows File Explorer Spoofing Vulnerability (CVE-2025-24071)
Overview Recently, NSFOCUS CERT detected that Microsoft released a security announcement and fixed the spoofing vulnerability of Windows File Explorer (CVE-2025-24071), with a CVSS score of 7.5. Due to the implicit trust and automatic file parsing behavior of .library-ms files by Windows Explorer, unauthenticated attackers can save files by constructing RAR/ZIP with an embedded malicious […]
The post Windows File Explorer Spoofing Vulnerability (CVE-2025-24071) appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..
The post Windows File Explorer Spoofing Vulnerability (CVE-2025-24071) appeared first on Security Boulevard.
Eric Migicovsky 宣布推出两款运行 PebbleOS 的智能手表产品
Critical Synology Vulnerability Allows Remote Attackers to Execute Arbitrary Code
A critical vulnerability affecting Synology’s DiskStation Manager (DSM) has been disclosed, allowing remote attackers to execute arbitrary code on vulnerable systems. This severe issue, identified as CVE-2024-10441, has been reported in multiple DSM versions, including DSM 6.2, 7.1, 7.2, and 7.2.1, as well as Synology Unified Controller (DSMUC) version 3.1. The vulnerability is classified as […]
The post Critical Synology Vulnerability Allows Remote Attackers to Execute Arbitrary Code appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
ИИ-инструменты для генерации кода тайно внедряют уязвимости в ваши проекты
重大漏洞警示:AMI BMC漏洞可能导致远程认证绕过
密码复用攻击泛滥成灾
总结过去三年软件供应链安全一些非共识核心问题
总结过去三年软件供应链安全一些非共识核心问题
总结过去三年软件供应链安全一些非共识核心问题
总结过去三年软件供应链安全一些非共识核心问题
总结过去三年软件供应链安全一些非共识核心问题
总结过去三年软件供应链安全一些非共识核心问题
总结过去三年软件供应链安全一些非共识核心问题
公安部公布严厉打击侵犯公民个人信息犯罪10起典型案例
警惕!Fortinet防火墙漏洞遭勒索软件利用,多家企业被黑
US DOGE Staffer Sent Unencrypted Treasury Data Over Email
An ex-Department of Government Efficiency staffer violated Treasury rules by sending unencrypted personal data to two senior Trump administration officials without approval, raising concerns about the task force's apparent disregard for or lack of knowledge about critical data security policies.