Aggregator
Swiss Government Confirms Radix Ransomware Attack Leaked Federal Data
The Swiss government has confirmed that sensitive federal data has been leaked onto the dark web following a ransomware attack on Radix, a non-profit health promotion foundation serving multiple federal offices. The breach, attributed to the Sarcoma ransomware group, has raised fresh concerns about the security of government contractors and the ripple effects of cyberattacks […]
The post Swiss Government Confirms Radix Ransomware Attack Leaked Federal Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Cloudflare blocks AI crawlers by default, letting sites choose what gets scraped
Cloudflare is now the first major internet infrastructure company to block AI crawlers by default when they try to access website content without permission or payment. Starting today, website owners can choose whether to allow AI crawlers and set rules for how their content is used. “Original content is what makes the Internet one of the greatest inventions in the last century, and it’s essential that creators continue making it. AI crawlers have been scraping … More →
The post Cloudflare blocks AI crawlers by default, letting sites choose what gets scraped appeared first on Help Net Security.
Никакого шума. Никаких взрывов. Только мрак и хаос. Одна бомба выключает целые города
CISA Releases Seven Industrial Control Systems Advisories
CISA released seven Industrial Control Systems (ICS) advisories on July 1, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
- ICSA-25-182-01 FESTO Didactic CP, MPS 200, and MPS 400 Firmware
- ICSA-25-182-02 FESTO Automation Suite, FluidDraw, and Festo Didactic Products
- ICSA-25-182-03 FESTO CODESYS
- ICSA-25-182-04 FESTO Hardware Controller, Hardware Servo Press Kit
- ICSA-25-182-05 Voltronic Power and PowerShield UPS Monitoring Software
- ICSA-25-182-06 Hitachi Energy Relion 670/650 and SAM600-IO Series
- ICSA-25-182-07 Hitachi Energy MSM
CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.
CISA Adds Two Known Exploited Vulnerabilities to Catalog
CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CVE-2025-48927 TeleMessage TM SGNL Initialization of a Resource with an Insecure Default Vulnerability
- CVE-2025-48928 TeleMessage TM SGNL Exposure of Core Dump File to an Unauthorized Control Sphere Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
Europe’s EUVD could shake up the vulnerability database ecosystem
The post Europe’s EUVD could shake up the vulnerability database ecosystem appeared first on Security Boulevard.
Commitment to Powering Europe’s Digital Sovereignty and Competitiveness
Spanish police arrest five over $542 million crypto investment scheme
GDPR violations prompt Germany to push Google and Apple to ban DeepSeek AI
How OTP Works (Step-by-Step) — What Really Happens Behind Those One-Time Codes
Introduction You’ve probably seen those little one-time codes pop up when you’re logging into your bank, email, or some app […]
The post How OTP Works (Step-by-Step) — What Really Happens Behind Those One-Time Codes appeared first on Security Boulevard.
IBM Cloud Pak Vulnerabilities Allow HTML Injection by Remote Attackers
Multiple security vulnerabilities in IBM Cloud Pak System enable remote attackers to execute HTML injection attacks, potentially compromising user data and system integrity. These flaws, detailed in recent IBM security bulletins, affect various versions of the platform and expose organizations to cross-site scripting (XSS) and prototype pollution attacks. CVE ID Description CVSS Score CVE-2025-2895 HTML […]
The post IBM Cloud Pak Vulnerabilities Allow HTML Injection by Remote Attackers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
ESET Threat Report H1 2025: Key findings
International Criminal Court targeted by new ‘sophisticated’ attack
Johnson Controls starts notifying people affected by 2023 breach
Apple загоняет всех под контроль — Proton говорит “Хватит!”
为什么情报分析很难?
以色列军事情报局——阿曼(Aman)
Microsoft Teams Enables In‑Chat Bot & Agent Integration
Microsoft Teams is set to revolutionize workplace collaboration once again, rolling out a highly anticipated feature that enables users to add bots and agents directly within Chats and Channels, without disrupting their ongoing conversations. The update, announced under Message ID MC1093236, marks a significant step towards a more fluid and productive Teams experience. Starting in […]
The post Microsoft Teams Enables In‑Chat Bot & Agent Integration appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Pakistani Threat Actors Created 300+ Cracking Sites to Distribute Info-Stealing Malware
A recent in-depth investigation by Intrinsec has exposed a sprawling network of over 300 cracking websites, orchestrated by Pakistani freelancers, designed to distribute info-stealing malware. These sites, often masquerading as legitimate sources for cracked software, have been identified as a primary vector for stealer compromises, impacting numerous corporate clients worldwide. Unveiling a Vast Network of […]
The post Pakistani Threat Actors Created 300+ Cracking Sites to Distribute Info-Stealing Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.