Aggregator
'ZipLine' Phishers Flip Script as Victims Email First
Critical Zip Slip Bug Enables Malicious File Manipulation on Unzip
Path traversal flaws like Zip Slip, which give hackers the ability to alter file systems while decompressing, remain a serious danger in the ever-changing world of cybersecurity threats. This vulnerability, stemming from inadequate input validation in compression utilities, enables adversaries to embed malicious paths within archive files, leading to unauthorized file creation, overwriting, or execution […]
The post Critical Zip Slip Bug Enables Malicious File Manipulation on Unzip appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Salt Typhoon hacking campaign goes beyond previously disclosed targets, world cyber agencies say
The Chinese government-linked hackers were the subject of an alert from U.S. and international partners.
The post Salt Typhoon hacking campaign goes beyond previously disclosed targets, world cyber agencies say appeared first on CyberScoop.
Nevada's State Agencies Shutter in Wake of Cyberattack
Drupal security advisory (AV25-548)
Scammers Steal $1 Million in Crypto Using Fake Delta and AMC Sites
Cisco security advisory (AV25-547)
FreePBX servers hacked via zero-day, emergency fix released
China Hijacks Captive Portals to Spy on Asian Diplomats
CVE-2025-58050 | PCRE2Project pcre2 10.45 src/pcre2_match.c pcre2_match out-of-bounds
De-identifying test data: K2View’s entity modeling vs Tonic’s native modeling
The process of de-identifying test databases can be approached in a variety of ways, and we’re often asked how our approach differs as compared to others. In this article, we’ll explore how our approach differs from that of “Data Product Platform” K2View, since we’ve discovered that we’ve built our technologies in two very, very different ways. Read on to learn which approach will work best for you.
The post De-identifying test data: K2View’s entity modeling vs Tonic’s native modeling appeared first on Security Boulevard.
Атомы вместо щелей, абсолютный ноль и спор двух гениев. MIT воплотил в жизнь мысленный эксперимент Эйнштейна
Google: Salesforce Attacks Stemmed From Third-Party App
Over 28,000 Citrix instances remain exposed to critical RCE flaw CVE-2025-7775
Storm-0501 Exploits Entra ID to Exfiltrate and Delete Azure Data in Hybrid Cloud Attacks
BSidesSF 2025: Shadow IT Battlefield: The CyberHaven Breach And Defenses That Worked
Creators, Authors and Presenters: Rohit Bansal, Zach Pritchard
Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held at the lauded CityView / AMC Metreon - certainly a venue like no other; and via the organization's YouTube channel.
Additionally, the organization is welcoming volunteers for the BSidesSF Volunteer Force, as well as their Program Team & Operations roles. See their succinct BSidesSF 'Work With Us' page, in which, the appropriate information is to be had!
The post BSidesSF 2025: Shadow IT Battlefield: The CyberHaven Breach And Defenses That Worked appeared first on Security Boulevard.
28,000+ Citrix Instances Exposed to Active 0-Day RCE Vulnerability Exploited in the Wild
A critical zero-day remote code execution (RCE) vulnerability, tracked as CVE-2025-7775, is affecting over 28,000 Citrix instances worldwide. The flaw is being actively exploited in the wild, prompting the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to add it to its Known Exploited Vulnerabilities (KEV) catalog. The Shadowserver Foundation discovered that as of August 26, […]
The post 28,000+ Citrix Instances Exposed to Active 0-Day RCE Vulnerability Exploited in the Wild appeared first on Cyber Security News.