Aggregator
Секретная карта Tesla уже в сети. Теперь воры знают, когда вас нет дома
IQgistics Corporation Falls Victim to BEAST Ransomware
CVE-2025-9119 | Netis WF2419 1.2.29433 Wireless Settings Page /index.htm SSID cross site scripting (EUVD-2025-25152)
Workday Latest Company Hit by Third-Party CRM Platform Breach
Workday, a high-profile HR and finance software solutions maker, is the latest victim of a string of data breaches orchestrated by the resurgent ShinyHunters threat group through Salesforce's CRM solution, joining a lineup of targets that includes Google, Qantas, Pandora, and Adidas.
The post Workday Latest Company Hit by Third-Party CRM Platform Breach appeared first on Security Boulevard.
Submit #628410: Netis WF2419 V1.2.29433 Cross Site Scripting [Accepted]
The AI Memory Wars: Why One System Crushed the Competition (And It’s Not OpenAI)
Most AI agents forget everything very soon. I benchmarked OpenAI Memory, LangMem, MemGPT, and Mem0 in real production environments. One system delivered 26% better accuracy and 91% faster performance. Here's which memory solution actually works for long-term AI agent deployments.
The post The AI Memory Wars: Why One System Crushed the Competition (And It’s Not OpenAI) appeared first on Security Boulevard.
"If you have knowledge, let others light their candles in it."
Proton переносит стратегические вложения в ЕС: Швейцария теряет 100 млн франков на фоне споров о надзоре
Popular npm Package Compromised in Phishing Attack
Technical Details of SAP 0-Day Exploitation Script for RCE Revealed
Cybersecurity researchers have unveiled the inner workings of an exploit script targeting a critical zero-day vulnerability in SAP NetWeaver’s Visual Composer Metadata Uploader, now designated as CVE-2025–31324. This flaw stems from a missing authorization check on the HTTP endpoint /developmentserver/metadatauploader, enabling unauthenticated file uploads that can lead to remote code execution (RCE) under the SAP […]
The post Technical Details of SAP 0-Day Exploitation Script for RCE Revealed appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Manpower Data Breach Hits 144K, Workday Confirms 3rd-Party CRM Hack
CRHC CTF 2025
Date: Aug. 16, 2025, 9 a.m. — 18 Aug. 2025, 09:00 UTC [add to calendar]
Format: Jeopardy
On-line
Offical URL: https://ctfd.crhc.club/
Rating weight: 0
Event organizers: CRHC-CTF
Accelerating Secure Enterprise Kubernetes Adoption
Dissecting PipeMagic: Inside the architecture of a modular backdoor framework
A comprehensive technical deep dive on PipeMagic, a highly modular backdoor used by Storm-2460 masquerading as a legitimate open-source ChatGPT Desktop Application. Beneath its disguise, PipeMagic is a sophisticated malware framework designed for flexibility and persistence. Once deployed, it can dynamically execute payloads while maintaining robust command and control (C2) communication via a dedicated networking module.
The post Dissecting PipeMagic: Inside the architecture of a modular backdoor framework appeared first on Microsoft Security Blog.
[Control systems] CISA ICS security advisories (AV25-523)
Cryptomining group Kinsing expands operations to Russia, researchers warn
Dell security advisory (AV25-522)
USB Malware Campaign Spreads Cryptominer Worldwide
New NIST guide explains how to detect morphed images
Face morphing software can blend two people’s photos into one image, making it possible for someone to fool identity checks at buildings, airports, borders, and other secure places. These morphed images can trick face recognition systems into linking the photo to both people, allowing one person to pass as the other. Face morphing software can blend photos of different people’s faces into a single synthesized image (Source: NIST) This kind of software is easy to … More →
The post New NIST guide explains how to detect morphed images appeared first on Help Net Security.