Aggregator
Palo Alto Networks PAN-OS Vulnerability Let Attacker Run Arbitrary Commands as Root User
A newly disclosed command injection vulnerability in Palo Alto Networks’ PAN-OS operating system poses significant security risks to enterprise firewall infrastructures worldwide. The vulnerability, catalogued as CVE-2025-4230, enables authenticated administrators with command-line interface (CLI) access to execute arbitrary commands with root-level privileges, potentially compromising entire network security architectures. Published on June 11, 2025, the security […]
The post Palo Alto Networks PAN-OS Vulnerability Let Attacker Run Arbitrary Commands as Root User appeared first on Cyber Security News.
Cybercriminals Advertise Advanced MaaS Botnet with Blockchain C2 on Hacking Forums
Cybersecurity researchers have uncovered the alleged sale of a sophisticated Malware-as-a-Service (MaaS) botnet that combines legitimate development frameworks with cutting-edge evasion techniques. The threat actor is reportedly offering the complete source code of a botnet that leverages Node.js runtime, blockchain-based command and control infrastructure, and modern web technologies to create a highly resilient and scalable […]
The post Cybercriminals Advertise Advanced MaaS Botnet with Blockchain C2 on Hacking Forums appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
US Tops List of Unsecured Cameras Exposing Homes and Offices
Windows 11 24H2 emergency update fixes Easy Anti-Cheat BSOD issue
盘点 | 《利用AI生成类谣言辟谣典型案例》发布
通知 | 网安标委下达2项网络安全推荐性国家标准计划
专家解读 | 赵鹏:推进政务数据依法共享 全面建设数字法治政府
关注 | 依法惩治人被“挂”、脸被“卖”……最高法发布利用网络、信息技术侵害人格权典型案例
NIST Publishes New Zero Trust Implementation Guidance
Gen Z уже шантажируют. Остальных — пока просто обманывают
新加坡国立大学 | 大型语言模型引导的协议模糊测试
1997年,乔布斯在WWDC闭幕环节做了唯一一场即兴问答:我们要做“更好的产品”,而非“不同的产品”,十年后,iPhone发布
1997年WWDC是乔布斯回归苹果仅6个月后举办的特殊会议,当时苹果正处于生死存亡关键时刻。在闭幕环节,乔布斯进行了WWDC历史上唯一一次即兴问答,持续70分钟,完全开放式且未事先筛选问题,被誉为"传奇问答"。这场对话涵盖了苹果战略转型的核心议题:从痛苦的产品线精简(如砍掉OpenDoc)到网络计算时代的前瞻思考,从重新定位与微软的关系到重建开发者生态规划。乔布斯阐述了三个核心方法论:聚焦不是对要做的事说"是",而是说"不";成功企业最大威胁不是外部竞争而是内部傲慢;产品开发必须从用户体验出发倒推到技术,而非相反。面对现场开发者的直接批评和质疑,乔布斯展现了教科书式的危机应对能力。这场对话基本奠定了苹果未来的战略方向,体现了他标志性的产品哲学——"从用户体验出发,而非从技术出发",为后来iPhone等革命性产品的成功奠定了理念基础。查看全文
Hackers Attacking Apache Tomcat Manager From 400 Unique IPs
A significant coordinated attack campaign targeting Apache Tomcat Manager interfaces, with threat actors leveraging approximately 400 unique IP addresses in a concentrated attack that peaked on June 5, 2025. The attack represents a substantial increase in malicious activity, with observed volumes reaching 10-20 times above normal baseline levels, indicating a sophisticated and deliberate attempt to […]
The post Hackers Attacking Apache Tomcat Manager From 400 Unique IPs appeared first on Cyber Security News.
Windows SMB Client Zero-Day Vulnerability Exploited Using Reflective Kerberos Relay Attack
A critical zero-day vulnerability affecting Windows systems that allows attackers to achieve privilege escalation through a novel Reflective Kerberos Relay Attack. The vulnerability, designated CVE-2025-33073, was patched by Microsoft on June 10, 2025, as part of their monthly Patch Tuesday security updates. Microsoft has assigned this vulnerability a CVSS score of 9.8 (Critical) due to […]
The post Windows SMB Client Zero-Day Vulnerability Exploited Using Reflective Kerberos Relay Attack appeared first on Cyber Security News.
Побег из зала суда, фишинг в Teams и $600 тысяч наличными — всё, что осталось от Black Basta
Тысячи незащищенных камер в спальнях, больницах и цехах — и никто не знает, кто следит через них за вами
Threat Actors Weaponizing Bat Files to Deliver Quasar RAT
Cybersecurity researchers have identified a sophisticated new campaign where threat actors are leveraging Windows batch files to deliver the notorious Quasar Remote Access Trojan (RAT). This attack vector represents a concerning evolution in malware distribution tactics, as attackers continue to refine their methods to evade traditional security measures and establish persistent access to victim systems. […]
The post Threat Actors Weaponizing Bat Files to Deliver Quasar RAT appeared first on Cyber Security News.