Aggregator
Один клик — и паспорт, и госуслуги, и реклама: Россия создаёт мессенджер-государство
新黑客组织利用 LockBit 勒索软件变种攻击俄罗斯公司
Hackers Persist in Using ConnectWise ScreenConnect Tool to Distribute Malware
Hackers continue to exploit the ConnectWise ScreenConnect remote management and monitoring (RMM) tool to deploy malicious payloads, with a focus on financial organizations. An independent researcher first reported a potential critical vulnerability in ScreenConnect versions 23.9.7 and prior through the ConnectWise Trust Center’s vulnerability disclosure program. Malicious Campaigns Targeting Financial Organizations This flaw has since […]
The post Hackers Persist in Using ConnectWise ScreenConnect Tool to Distribute Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
重要的 Wazuh RCE (CVE-2025-24016) 被 Mirai 僵尸网络积极利用
中国 AI 公司在高考期间短暂禁用了部分功能以防止考试作弊
A large learning model: Red Canary’s AI journey
OpenAI working to fix ChatGPT outage affecting users worldwide
Severe SAP NetWeaver Vulnerability Allows Attackers to Bypass Authorization Checks
SAP has released nineteen security patches in its June Patch Day, addressing critical vulnerabilities that could allow attackers to bypass authorization controls and escalate privileges across multiple enterprise systems. The update includes two HotNews Notes and seven High Priority Notes, with immediate action recommended for organizations running affected SAP environments. The most severe vulnerability, tracked […]
The post Severe SAP NetWeaver Vulnerability Allows Attackers to Bypass Authorization Checks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
假冒验证码基础架构 HelloTDS 使数百万设备感染恶意软件
2025 RSAC热点研讨会 | AI重塑安全运营,智能体引领未来发展
欧洲需要数字主权
ИИ, сколько мне дадут по 158-й? — От 6 до 15 лет. Минцифры обновит УК
How Azul Identifies Java Security Vulnerabilities with 1,000 Times Greater Accuracy
Azul identifies and prioritizes known Java security vulnerabilities with 1,000 times greater accuracy than traditional APM or AppSec tools.
The post How Azul Identifies Java Security Vulnerabilities with 1,000 Times Greater Accuracy appeared first on Azul | Better Java Performance, Superior Java Support.
The post How Azul Identifies Java Security Vulnerabilities with 1,000 Times Greater Accuracy appeared first on Security Boulevard.
Webinar: Cloud security made easy with CIS Hardened Images
This webinar is designed for leadership and management professionals looking to enhance their organization’s security posture in the cloud. The authors explore CIS Hardened Images: how they work, the security benefits they offer, and why they’re especially valuable for public sector organizations. Throughout the discussion, you’ll gain a clear understanding of how these pre-configured security solutions align with the CIS Benchmarks to help mitigate risks and ensure compliance with critical frameworks. The webinar breaks down … More →
The post Webinar: Cloud security made easy with CIS Hardened Images appeared first on Help Net Security.
Secure mobile applications with Dart, Flutter, and Sonatype
The Dart coding language and the Flutter framework architecture are gaining traction among developers looking to build fast, reliable, cross-platform applications.
The post Secure mobile applications with Dart, Flutter, and Sonatype appeared first on Security Boulevard.
Mozilla 又关闭了两项服务
New SharePoint Phishing Campaigns Employing Deceptive Lick Techniques
Security analysts at CyberProof’s Security Operations Center (SOC) have identified a sharp rise in phishing campaigns leveraging Microsoft SharePoint to bypass modern detection systems. Unlike traditional phishing attempts that rely on embedded malicious links, these sophisticated attacks exploit the inherent trust users place in SharePoint, a widely adopted collaboration platform within enterprises. By disguising phishing […]
The post New SharePoint Phishing Campaigns Employing Deceptive Lick Techniques appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
ISPConfig Vulnerability Allows Privilege Escalation to Superadmin and PHP Code Injection Exploit
A critical security vulnerability has been identified in ISPConfig version 3.2.12p1, a widely used open-source web hosting control panel. The vulnerability allows authenticated attackers to escalate their privileges to that of a superadmin and execute arbitrary PHP code remotely, posing a serious risk to affected systems. The vulnerability primarily originates from design Vulnerability in ISPConfig’s […]
The post ISPConfig Vulnerability Allows Privilege Escalation to Superadmin and PHP Code Injection Exploit appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
AU10TIX AnyDoc Authentication identifies tampered or forged documents
AU10TIX is enhancing its product suite with the launch of AnyDoc Authentication, a capability that exposes forged, tampered, or synthetic non-ID documents that may bypass traditional identity verification methods. AnyDoc harnesses advanced AI, forensic forgery detection, and metadata analysis to empower businesses to detect document fraud, maintain regulatory compliance, and scale secure onboarding. This critical layer of protection supports a diverse range of document types, including utility bills, bank statements, tax filings, business licenses, and … More →
The post AU10TIX AnyDoc Authentication identifies tampered or forged documents appeared first on Help Net Security.