Aggregator
Hg Purchases A-Lign to Accelerate Cyber Compliance Growth
Cybersecurity compliance firm A-LIGN has received a majority investment from Hg, a top tech-focused private equity firm. The deal supports A-LIGN's global ambitions to deliver SOC 2 and other compliance audits and leverages Hg’s expertise in scaling data and AI-driven services.
Chinese Data Leak Reveals Salt Typhoon Contractors
The Chinese nation-state threat actor tracked as Salt Typhoon is operated by a clutch of private firms whose clients include multiple Chinese government agencies, finds analysis of leaked data by Spy Cloud. Researchers found a spreadsheet listing buyers, sellers and financial transaction details.
How To Automate Ticket Creation, Device Identification and Threat Triage With Tines
Chinese State-Sponsored Hacker Charged Over COVID-19 Research Theft
Iranian State-Linked Hackers Claim Deep Intrusion into Iran International
You must login to view this content
13 секунд. 100 метров. Робот Black Panther II с позором вычеркнул Boston Dynamics из книги рекордов
SparkKitty Malware Attacking iOS and Android Device Users to Steal Photos From Gallery
A sophisticated Trojan malware known as SparkKitty has been actively targeting iOS and Android devices since early 2024, infiltrating both official app stores and untrusted websites to steal images from users’ device galleries. This malware campaign, which appears to be an evolution of the previous SparkCat operation, poses significant threats to users primarily in Southeast […]
The post SparkKitty Malware Attacking iOS and Android Device Users to Steal Photos From Gallery appeared first on Cyber Security News.
NCCA 2025 | 信息系统应用与安全专题会议
XwormRAT Hackers Leverage Code Injection for Sophisticated Malware Deployment
A sophisticated new distribution method for XwormRAT malware that leverages steganography techniques to hide malicious code within legitimate files. This discovery highlights the evolving tactics of cybercriminals who are increasingly using advanced obfuscation methods to bypass security detection systems and deceive unsuspecting users. The latest XwormRAT campaign represents a significant evolution in malware distribution methodology, […]
The post XwormRAT Hackers Leverage Code Injection for Sophisticated Malware Deployment appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Citrix Windows Virtual Delivery Agent Vulnerability Let Attackers Gain SYSTEM Privileges
A critical security vulnerability has been discovered in Citrix Windows Virtual Delivery Agent that allows local attackers to escalate privileges and gain SYSTEM-level access to affected systems. The vulnerability, tracked as CVE-2025-6759, affects multiple versions of Citrix Virtual Apps and Desktops and Citrix DaaS platforms, posing significant risks to enterprise environments relying on these virtualization […]
The post Citrix Windows Virtual Delivery Agent Vulnerability Let Attackers Gain SYSTEM Privileges appeared first on Cyber Security News.
FortiWeb SQL Injection Vulnerability Allows Attacker to Execute Malicious SQL Code
A critical security vulnerability has been discovered in FortiWeb web application firewalls that enables unauthenticated attackers to execute unauthorized SQL commands through specially crafted HTTP and HTTPS requests. This vulnerability, classified as CWE-89 (Improper Neutralization of Special Elements used in an SQL Command), represents a significant threat to organizations relying on FortiWeb for web application […]
The post FortiWeb SQL Injection Vulnerability Allows Attacker to Execute Malicious SQL Code appeared first on Cyber Security News.