Aggregator
CVE-2025-48331 | Vanquish WooCommerce Orders & Customers Exporter Plugin up to 5.0 on WordPress insertion of sensitive information into sent data
CVE-2025-4985 | Dassault Systèmes Project Portfolio Manager cross site scripting
Cloudflare named a Strong Performer in Email Security by Forrester
CVE-2025-40909 | Perl up to 5.41.12 race condition (Patch 10387)
CVE-2025-1484 | Hitachi Energy Asset Suite up to 9.6.4.4 Media Upload incomplete blacklist
CVE-2025-2500 | Hitachi Energy Asset Suite 9.6.4.4/9.7 SOAP Web Services credentials storage
Pure Crypter Uses Multiple Evasion Methods to Bypass Windows 11 24H2 Security Features
Pure Crypter, a well-known malware-as-a-service (MaaS) loader, has been recognized as a crucial tool for threat actors targeting Windows-based systems in a thorough technical research carried out by eSentire’s Threat Response Unit (TRU) during 2024 and 2025. This loader, favored for deploying information stealers like Lumma and Rhadamanthys via the ClickFix initial access vector, has […]
The post Pure Crypter Uses Multiple Evasion Methods to Bypass Windows 11 24H2 Security Features appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-4971 | Broadcom Automic Automation up to 21.0.13/24.3.0 HF3 untrusted search path (EUVD-2025-15812 / EDB-52309)
Приняли все cookie? Тогда держитесь: вот что с вами делают
Alleged data breach of Deloitte – Internal GitHub Credentials and Source Code Leaked
Deloitte Data Breach: Alleged Leak of Source Code & GitHub Credentials
A threat actor using the alias “303” allegedly claimed to have breached the company’s systems and leaked sensitive internal data on a dark web forum. The alleged breach reportedly involves GitHub credentials and source code from internal project repositories belonging to Deloitte’s U.S. consulting division. According to reports emerging from cybersecurity monitoring services, the threat […]
The post Deloitte Data Breach: Alleged Leak of Source Code & GitHub Credentials appeared first on Cyber Security News.
New EDDIESTEALER Malware Bypasses Chrome's App-Bound Encryption to Steal Browser Data
Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges
A recent discovery by security researchers at BeyondTrust has revealed a critical, yet by-design, security gap in Microsoft Entra ID that could allow external guest users to gain powerful control over Azure environments. Contrary to common assumptions, Entra B2B guest accounts—typically used for collaboration with external partners—can leverage specific billing roles to create and transfer […]
The post Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Why Investigation Is the SOC’s New Bottleneck, and How to Fix It
Understanding MSHTA: A Classic Windows Attack Still Used Today | Red Canary
Meta says it disrupted influence operations linked to China, Iran, Romania
Implementing Post-Quantum Cryptography for Future-Proof Security
The race to secure global digital infrastructure against quantum computing threats has entered a critical phase. Recent advancements in quantum hardware and cryptographic standardization are driving unprecedented collaboration between governments, tech giants, and cybersecurity experts. As quantum processors like Atom Computing’s 1180-qubit system demonstrate rapid scaling and Google’s Willow chip achieves exponential error reduction, organizations […]
The post Implementing Post-Quantum Cryptography for Future-Proof Security appeared first on Cyber Security News.