Aggregator
Proton переносит стратегические вложения в ЕС: Швейцария теряет 100 млн франков на фоне споров о надзоре
Popular npm Package Compromised in Phishing Attack
Technical Details of SAP 0-Day Exploitation Script for RCE Revealed
Cybersecurity researchers have unveiled the inner workings of an exploit script targeting a critical zero-day vulnerability in SAP NetWeaver’s Visual Composer Metadata Uploader, now designated as CVE-2025–31324. This flaw stems from a missing authorization check on the HTTP endpoint /developmentserver/metadatauploader, enabling unauthenticated file uploads that can lead to remote code execution (RCE) under the SAP […]
The post Technical Details of SAP 0-Day Exploitation Script for RCE Revealed appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Manpower Data Breach Hits 144K, Workday Confirms 3rd-Party CRM Hack
CRHC CTF 2025
Date: Aug. 16, 2025, 9 a.m. — 18 Aug. 2025, 09:00 UTC [add to calendar]
Format: Jeopardy
On-line
Offical URL: https://ctfd.crhc.club/
Rating weight: 0
Event organizers: CRHC-CTF
Accelerating Secure Enterprise Kubernetes Adoption
Dissecting PipeMagic: Inside the architecture of a modular backdoor framework
A comprehensive technical deep dive on PipeMagic, a highly modular backdoor used by Storm-2460 masquerading as a legitimate open-source ChatGPT Desktop Application. Beneath its disguise, PipeMagic is a sophisticated malware framework designed for flexibility and persistence. Once deployed, it can dynamically execute payloads while maintaining robust command and control (C2) communication via a dedicated networking module.
The post Dissecting PipeMagic: Inside the architecture of a modular backdoor framework appeared first on Microsoft Security Blog.
[Control systems] CISA ICS security advisories (AV25-523)
Cryptomining group Kinsing expands operations to Russia, researchers warn
Dell security advisory (AV25-522)
USB Malware Campaign Spreads Cryptominer Worldwide
New NIST guide explains how to detect morphed images
Face morphing software can blend two people’s photos into one image, making it possible for someone to fool identity checks at buildings, airports, borders, and other secure places. These morphed images can trick face recognition systems into linking the photo to both people, allowing one person to pass as the other. Face morphing software can blend photos of different people’s faces into a single synthesized image (Source: NIST) This kind of software is easy to … More →
The post New NIST guide explains how to detect morphed images appeared first on Help Net Security.
Миллионы в крипте не спасли. Глава Zeppelin прятал активы по всему миру — но его всё равно достали
CVE-2025-1759 | IBM Concert Software up to 1.1.0 heap inspection
CVE-2025-33100 | IBM Concert Software up to 1.1.0 hard-coded credentials
CVE-2025-33090 | IBM Concert Software up to 1.1.0 redos
CVE-2025-27909 | IBM Concert Software up to 1.1.0 Trusted Domain cross-domain policy
The latest cyber threats: What should you do next?
Bragg Confirms Cyber Attack – Hackers Accessed Internal IT Systems
Bragg Gaming Group has confirmed a significant cybersecurity incident that compromised the company’s internal IT infrastructure early Saturday morning, August 16, 2025. The online gaming technology provider discovered unauthorized network intrusion attempts that successfully breached their security perimeter, prompting immediate activation of incident response protocols. Key Takeaways1. Bragg Gaming Group experienced a cybersecurity breach with […]
The post Bragg Confirms Cyber Attack – Hackers Accessed Internal IT Systems appeared first on Cyber Security News.