Aggregator
CVE-2025-32988 | GnuTLS SAN Entry Export asn1_delete_structure double free (EUVD-2025-20928 / Nessus ID 242043)
Alleged Data Sale of ProtectHealth Corporation
Q-Day всё ближе. Шифры, которые мир создавал десятилетиями могут рассыпаться за ночь
Payoutsking
You must login to view this content
CVE-2024-3736 | cym1102 nginxWebUI up to 3.9.9 /adminPage/main/upload unrestricted upload (Issue 138)
CVE-2024-3737 | cym1102 nginxWebUI up to 3.9.9 /adminPage/www/addOver findCountByQuery dir path traversal (Issue 138)
CVE-2024-25015 | IBM MQ 9.2/9.3 Internet Pass-Thru amplification (XFDB-281278)
CVE-2025-23364 | Siemens TIA Administrator prior 3.0.6 signature verification (ssa-573669)
CVE-2025-40735 | Siemens SINEC NMS up to 3.x sql injection (ssa-078892)
CVE-2025-40593 | Siemens SIMATIC CN 4100 up to 3.x SFTP Folder denial of service (ssa-626991)
CVE-2025-40736 | Siemens SINEC NMS up to 3.x missing authentication (ssa-078892)
CVE-2025-40737 | Siemens SINEC NMS up to 3.x ZIP File path traversal (ssa-078892)
CVE-2025-40738 | Siemens SINEC NMS up to 3.x ZIP File path traversal (ssa-078892)
CVE-2025-40739 | Siemens Solid Edge SE2025 up to 225.0 Update 4 PAR File Parser out-of-bounds (ssa-091753 / Nessus ID 241712)
CVE-2025-40740 | Siemens Solid Edge SE2025 up to 225.0 Update 5 PAR File Parser out-of-bounds (ssa-091753 / Nessus ID 241712)
CVE-2025-40741 | Siemens Solid Edge SE2025 up to 225.0 Update 4 CFG File Parser stack-based overflow (ssa-091753 / Nessus ID 241712)
MuddyWater APT Targets CFOs via OpenSSH; Enables RDP and Scheduled Tasks
A sophisticated spear-phishing campaign attributed to the Iranian-linked APT group MuddyWater is actively compromising CFOs and finance executives across Europe, North America, South America, Africa, and Asia. The attackers impersonate recruiters from Rothschild & Co, deploying Firebase-hosted phishing pages that incorporate custom math-based CAPTCHA challenges to evade detection and lend legitimacy. These lures lead victims […]
The post MuddyWater APT Targets CFOs via OpenSSH; Enables RDP and Scheduled Tasks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Paper Werewolf Exploits WinRAR Zero-Day Vulnerability to Deliver Malware
Cyber spies associated with the threat actor group Paper Werewolf have demonstrated advanced capabilities in bypassing email security filters by delivering malware through seemingly legitimate archive files, a tactic that exploits the commonality of such attachments in business correspondence. Despite their sophistication, these attackers continue to rely on detectable tactics, techniques, and procedures (TTPs), underscoring […]
The post Paper Werewolf Exploits WinRAR Zero-Day Vulnerability to Deliver Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Threat Actors Gaining Access to Victims’ Machines and Monetizing Access to Their Bandwidth
A stealthy campaign emerged in early March 2025 that capitalized on a critical remote code execution flaw in GeoServer (CVE-2024-36401) to compromise publicly exposed geospatial servers. Attackers exploited JXPath query injection within Apache Commons libraries, allowing arbitrary code execution through crafted XML requests. This vector enabled the silent deployment of customized executables that leveraged legitimate […]
The post Threat Actors Gaining Access to Victims’ Machines and Monetizing Access to Their Bandwidth appeared first on Cyber Security News.