Aggregator
Google patches actively exploited Chrome (CVE‑2025‑6554)
Google has released a security update for Chrome to address a zero‑day vulnerability (CVE-2025-6554) that its Threat Analysis Group (TAG) discovered and reported last week. “Google is aware that an exploit for CVE-2025-6554 exists in the wild,” the company said. About CVE-2025-6554 CVE-2025-6554 is a type confusion vulnerability in V8, the JavaScript and WebAssembly engine at the heart of Chrome and Chromium-based browsers. Remote, unauthenticated attackers can exploit this flaw by serving crafted HTML pages … More →
The post Google patches actively exploited Chrome (CVE‑2025‑6554) appeared first on Help Net Security.
Пароль 1234? Спасибо, теперь ваш завод — наш
Europol dismantles €460M crypto scam targeting 5,000 victims worldwide
Content Independence Day: no AI crawl without compensation!
Android 未来可能会警告用户手机连接了假基站
Message Signatures are now part of our Verified Bots Program, simplifying bot authentication
From Googlebot to GPTBot: who’s crawling your site in 2025
Introducing pay per crawl: Enabling content owners to charge AI crawlers for access
Control content use for AI training with Cloudflare’s managed robots.txt and blocking for monetized content
The crawl before the fall… of referrals: understanding AI’s impact on content providers
从「千万随想」到AI智能体——网络安全的智能化转型之路
安卓开发+逆向分析实战课:从底层开发到 AI 融合,附赠2本PDF算法书、源码包
Linux Sudo 曝重大漏洞可提权至root并绕过主机限制,速更新!
某日游mmap模块化保护简单分析
案例分享 | 行业标准落地先锋:某上市区域性银行开源治理实战解析
Django App Vulnerabilities Chained to Execute Arbitrary Code Remotely
A critical remote code execution (RCE) vulnerability affecting Django web applications, demonstrating how seemingly benign CSV file upload functionality can be weaponized for complete server compromise. Summary1. Django RCE exploit chains directory traversal with CSV parser abuse to compromise servers through file uploads.2. Attackers use unsanitized username input (../../../../../../app/backend/backend/) to target Django's wsgi.py file.3. Malicious […]
The post Django App Vulnerabilities Chained to Execute Arbitrary Code Remotely appeared first on Cyber Security News.
Blind Eagle Hackers Leverage Open-Source RATs and Ciphers to Evade Static Detection
Trustwave SpiderLabs has uncovered a chilling cyber threat targeting Latin American organizations, particularly in the financial sector, with a focus on Colombian institutions. The threat cluster, linked to the notorious Proton66 OOO infrastructure, employs a cunning mix of open-source Remote Access Trojans (RATs) and advanced obfuscation techniques to bypass static detection mechanisms. Unmasking a Sophisticated […]
The post Blind Eagle Hackers Leverage Open-Source RATs and Ciphers to Evade Static Detection appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
DEVMAN Ransomware: Analysis of New DragonForce Variant
Editor’s note: The current article is authored by Mauro Eldritch, offensive security expert and threat intelligence analyst. You can find Mauro on X. New ransomware strains continue to surface frequently, and many of them are loosely built on or repackaged from existing families. One such case involves a sample resembling DragonForce ransomware, yet bearing several […]
The post DEVMAN Ransomware: Analysis of New DragonForce Variant appeared first on ANY.RUN's Cybersecurity Blog.