Aggregator
13 000 роутеров MikroTik превращены в хакерскую сеть
Hackers Exploiting California Wildfire Sparks to Launching Phishing Attacks
As California grapples with devastating wildfires, communities are rallying to protect lives and property. Unfortunately, these disasters have also created an opportunity for cybercriminals to exploit the chaos and uncertainty. Veriti Research has identified alarming trends in phishing scams linked to the ongoing wildfire disaster, highlighting an urgent need for heightened cybersecurity awareness during these […]
The post Hackers Exploiting California Wildfire Sparks to Launching Phishing Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Symfony Security Best Practices, Vulnerabilities and Attacks
Sarcoma
The $10 Cyber Threat Responsible for the Biggest Breaches of 2024
Unveiling the GRIT 2025 Ransomware and Cyber Threat Report
360年度勒索软件报告请查收:AI“催生”天价赎金危机
Contrast Security AVM identifies application and API vulnerabilities in production
Contrast Security released Application Vulnerability Monitoring (AVM), a new capability of Application Detection and Response (ADR). AVM works within applications to find application and API vulnerabilities in production and correlate those vulnerabilities with attacks. Accurately identifying the issues in production with AVM results in lower overall cyber risk. Currently, companies are missing vulnerabilities in production because they are using traditional technologies like DAST, SCA, and SAST. AVM provides an alternative, allowing SecOps and DevOps teams … More →
The post Contrast Security AVM identifies application and API vulnerabilities in production appeared first on Help Net Security.
New UEFI Secure Boot Vulnerability Could Allow Attackers to Load Malicious Bootkits
CVE-2024-9042:在 Kubernetes Windows 节点中发现代码执行漏洞
Researchers Find Exploit Allowing NTLMv1 Despite Active Directory Restrictions
CVE-2025-23042 (CVSS 9.1): Gradio 修补了流行机器学习平台中的关键 ACL 旁路漏洞
16-31 October 2024 Cyber Attacks Timeline
Hackers Hide Malware in Images to Deploy VIP Keylogger and 0bj3ctivity Stealer
超过 66 万台 Rsync 服务器受到代码执行攻击
网传支付宝出现P0级事故 任意类型付款甚至转账都自动叠加国补优惠20%
【漏洞通告】Rsync缓冲区溢出与信息泄露漏洞(CVE-2024-12084/CVE-2024-12085)通告
AIRASHI Botnet Exploiting 0-Day Vulnerabilities In Large Scale DDoS Attacks
AISURU botnet launched a DDoS attack targeting Black Myth: Wukong distribution platforms in August 2024 that leveraged a 0DAY vulnerability on cnPilot routers and used RC4 encryption for sample strings. After a brief pause in September, the botnet reappeared in October with the name kitty and was updated again in November as AIRASHI. The current […]
The post AIRASHI Botnet Exploiting 0-Day Vulnerabilities In Large Scale DDoS Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.