Aggregator
Windows 10: How to get security updates for free until 2026
Users who want to stick with Windows 10 beyond its planned end-of-support date but still receive security updates, can enroll into the Windows 10 Extended Security Updates (ESU) program, Microsoft has confirmed on Tuesday. Microsoft’s (self-evident) long-term goal is to push all users to upgrade to Windows 11, but the company understands that not everybody can do it immediately or even in the next couple of years. ESU for home users “Windows 10 launched in … More →
The post Windows 10: How to get security updates for free until 2026 appeared first on Help Net Security.
Критическая уязвимость в Notepad++: публичный PoC уже в сети — счёт пошёл на часы
CISA Publishes Guide to Address Memory Safety Vulnerabilities in Modern Software Development
The Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with the National Security Agency (NSA), has released a comprehensive guide titled “Memory Safe Languages: Reducing Vulnerabilities in Modern Software Development.” Published in June 2025, this report underscores the critical need to adopt Memory Safe Languages (MSLs) to combat pervasive memory safety vulnerabilities that have long […]
The post CISA Publishes Guide to Address Memory Safety Vulnerabilities in Modern Software Development appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2013-3148 | Microsoft Internet Explorer 6/7/8/9/10 code injection (ms13-jul / MS13-JUL)
В мире, где каждый пиксель следит — появился браузер-призрак
CVE-2025-41647 | Lenze PLC Designer V4 up to 4.0.0 cleartext storage (VDE-2025-043 / EUVD-2025-19082)
Threat Actors Manipulate Search Results, Exploit ChatGPT and Luma AI Popularity to Deliver Malicious Payloads
Threat actors are leveraging the soaring popularity of AI tools like ChatGPT and Luma AI to distribute malware through deceptive websites. Zscaler ThreatLabz researchers have uncovered a network of malicious AI-themed sites, often hosted on platforms like WordPress, that exploit Black Hat SEO techniques to poison search engine rankings. These sites appear prominently in search […]
The post Threat Actors Manipulate Search Results, Exploit ChatGPT and Luma AI Popularity to Deliver Malicious Payloads appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2007-3182 | Vincent Hor Calendarix 0.7.2007-03-07 calendar.php ycyear cross site scripting (EDB-30232 / XFDB-35045)
【安全圈】Microsoft Exchange 邮件服务器遭大规模键盘记录攻击,全球逾 70 台被入侵
【安全圈】TeamViewer 高危漏洞通报(CVE-2025-36537)
【安全圈】WordPress 结账页出现高隐匿性恶意插件:伪装成 Cloudflare 窃取用户信息
【安全圈】“银狐”木马新变种席卷全国:数千企业员工遭网络钓鱼诈骗
Скачал VPN для защиты — получил троян для слива паролей: безопасность наоборот
Ransomware Attacks Dip in May Despite Persistent Retail Targeting
Pro-Iranian Hacktivist Group Leaks Personal Records from the 2024 Saudi Games
CVE-2002-1143 | Microsoft Word/Excel 98 Field Code information disclosure (VU#899713 / EDB-21812)
Kubernetes NodeRestriction Flaw Lets Nodes Bypass Resource Authorization
A critical security vulnerability (CVE-2025-4563) in Kubernetes allows nodes to bypass authorization checks for dynamic resource allocation, potentially enabling privilege escalation in affected clusters. The flaw resides in the NodeRestriction admission controller, which fails to validate resource claim statuses during pod creation when the DynamicResourceAllocation feature is enabled. This oversight permits compromised nodes to create […]
The post Kubernetes NodeRestriction Flaw Lets Nodes Bypass Resource Authorization appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.