Aggregator
CVE-2022-20428 | Google Android out-of-bounds write (A-239555411)
CVE-2022-20460 | Google Android mprot_unmap out-of-bounds write (A-239557547)
CVE-2022-38165 | WithSecure up to 2022-08-10 denial of service
CVE-2022-42903 | Zoho ManageEngine SupportCenter Plus up to 11024 User List information disclosure
CVE-2022-43096 | Media5 Mediatrix 4102 prior 48.5.2718 UART Port Local Privilege Escalation
Researchers Demonstrate How MCP Prompt Injection Can Be Used for Both Attack and Defense
AiTM Phishing Kits Bypass MFA by Hijacking Credentials and Session Tokens
Darktrace’s Security Operations Center (SOC) in late 2024 and early 2025, cybercriminals have been exploiting legitimate Software-as-a-Service (SaaS) platforms like Milanote to orchestrate sophisticated phishing campaigns. These attacks, bolstered by the Tycoon 2FA phishing kit, demonstrate an advanced Adversary-in-the-Middle (AiTM) approach that circumvents multi-factor authentication (MFA) protections. Leveraging Legitimate Services for Stealthy Attacks By abusing […]
The post AiTM Phishing Kits Bypass MFA by Hijacking Credentials and Session Tokens appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
SecWiki News 2025-04-30 Review
撞击月球产生的碎片四分之一掉落到地球
RansomHub Refines Extortion Strategy as RaaS Market Fractures
Driving the Future of Cybersecurity: Highlights from the Horizon3 Global Partner Summit
Tom Sheehan (Hurricane Labs Director of Cybersecurity Consulting and Compliance) attended the inaugural Horizon3 Global Partner summit last week. This event brought together the brightest minds and boldest innovators in cybersecurity for a day of education, collaboration, and vision. Held in Frisco Texas, the event spotlighted Horizon3.ai’s evolving impact on security, showcasing a community [...]
The post Driving the Future of Cybersecurity: Highlights from the Horizon3 Global Partner Summit appeared first on Hurricane Labs.
The post Driving the Future of Cybersecurity: Highlights from the Horizon3 Global Partner Summit appeared first on Security Boulevard.
Nitrogen Ransomware Uses Cobalt Strike and Log Wiping in Targeted Attacks on Organizations
Threat actors have leveraged the Nitrogen ransomware campaign to target organizations through deceptive malvertising strategies. Recent investigations have uncovered a disturbingly effective method involving fake software downloads, such as a counterfeit “WinSCP” installer, propagated through malicious ads on platforms like Bing. One documented case revealed a user searching for “WinSCP download” via Microsoft Edge being […]
The post Nitrogen Ransomware Uses Cobalt Strike and Log Wiping in Targeted Attacks on Organizations appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.