Aggregator
An unusual "shy z-wasp" phishing, (Mon, Jan 27th)
Blocking Malicious sites with a TLS Firewall
Blocking Malicious sites with a TLS Firewall
CVE-2024-12345 | INW Krbyyyzo 25.2002 Daily Huddle Site /gbo.aspx s resource consumption
SCAVY:自动发现Linux内核中的内存损坏目标以防止权限提升
SCAVY – Framework to Detect Memory Corruption in Linux Kernel for Privilege Escalation
Researchers have unveiled SCAVY, a novel framework designed to automate the discovery of memory corruption targets in the Linux kernel. This discovery aims to address critical gaps in the detection and prevention of privilege escalation exploits, which often leverage memory-corruption vulnerabilities to gain unauthorized access to system resources. Kernel privilege-escalation exploits typically exploit memory corruption […]
The post SCAVY – Framework to Detect Memory Corruption in Linux Kernel for Privilege Escalation appeared first on Cyber Security News.
New Phishing Framework Attack Multiple Brands Login Pages To Steal Credentials
Researchers have identified a sophisticated phishing tactic leveraging Cloudflare’s workers.dev, a free domain name service, to execute credential theft campaigns. The modus operandi involves a generic phishing page that can impersonate any brand, with significant technical ingenuity aimed at deceiving unsuspecting users and evading detection. The phishing page, hosted on the URL “workers-playground-broken-king-d18b.supermissions.workers.dev,” is designed […]
The post New Phishing Framework Attack Multiple Brands Login Pages To Steal Credentials appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-0730 | TP-Link TL-SG108E 1.0.0 Build 20201208 Rel. 40304 HTTP GET Request /usr_account_set.cgi username/password get request method with sensitive query strings
CVE-2025-0729 | TP-Link TL-SG108E 1.0.0 Build 20201208 Rel. 40304 clickjacking
Weaponised XWorm RAT Builder Attacking Script Kiddies To Hack 18,000 Devices
A recent cybersecurity attack involving a Trojanized version of the XWorm Remote Access Trojan (RAT) builder has compromised over 18,000 devices worldwide. This sophisticated malware, primarily distributed via GitHub repositories, Telegram channels, and other platforms, has targeted cybersecurity novices, also known as “script kiddies,” who unknowingly downloaded malicious tools. Trojanized XWorm RAT Builder Exploits Over […]
The post Weaponised XWorm RAT Builder Attacking Script Kiddies To Hack 18,000 Devices appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2005-0709 | Sun MySQL up to 4.1.10 udf_init code injection (EDB-25209 / Nessus ID 21926)
变天!——由一个惊艳例子引发对 DeepSeek 的 10 条思考
超音速民航「全球竞赛」,这家中国公司要「换道赛车」
Submit #478465: tp-link TL-SG108E 1.0.0 Build 20201208 Rel.40304 Use of GET Request Method With Sensitive Query Strings [Accepted]
Submit #478451: tp-link TL-SG108E 1.0.0 Build 20201208 Rel.40304 Clickjacking [Accepted]
Submit #476435: Bigprof Rental Property Manager (ORPM) AppGini 1 Cross Site Scripting [Duplicate]
研究揭示 PM2.5 毒理学机制
研究揭示 PM2.5 毒理学机制
LockBit Ransomware: 11-Day Timeline from Initial Compromise to Deployment
A well-coordinated cyber intrusion, spanning 11 days, culminated in the deployment of LockBit ransomware across a corporate environment. The attack, which began with the execution of a malicious file posing as a Windows Media Configuration Utility, displayed a sophisticated playbook leveraging Cobalt Strike, advanced persistence mechanisms, lateral movement, data exfiltration tools, and an eventual ransomware […]
The post LockBit Ransomware: 11-Day Timeline from Initial Compromise to Deployment appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.