Aggregator
CVE-2025-50121 | Schneider Electric EcoStruxure IT Data Center Expert Web Interface os command injection (SEVD-2025-189-01 / EUVD-2025-21128)
CVE-2025-3933 | huggingface transformers up to 4.52.0 API Service token2json redos (EUVD-2025-21126)
Сюрприз от Вселенной: 100 новых галактик, которых «не должно быть». Тёмная материя хихикает в углу
【安全圈】俄罗斯篮球运动员在法国被捕 涉嫌参与大规模勒索软件攻击
【安全圈】Microsoft Exchange Online 全球宕机,数百万用户无法访问邮箱
【安全圈】巴基斯坦黑客组织“透明部族”对印度国防部门发起基于 Linux 的网络攻击
【安全圈】ChatGPT 被绕过守护机制,泄露 Windows 产品密钥事件概述
HEVD – Race Condition – Windows 10 Pro – SMEP, kCFG, kASLR protections
British Man Sentenced for Network Rail Wi-Fi Hack
Securing Data in the AI Era
Securing Data in the AI Era
New eSIM Hack Lets Attackers Clone Profiles and Hijack Phone Identities
A critical vulnerability in eSIM technology enables attackers to clone mobile subscriber profiles and hijack phone identities. AG Security Research revealed they broke the security of Kigen eUICC cards with GSMA consumer certificates, marking what they claim is the first successful public hack against consumer GSMA eUICC and EAL-certified GSMA security chips. The research team […]
The post New eSIM Hack Lets Attackers Clone Profiles and Hijack Phone Identities appeared first on Cyber Security News.
Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild
Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild
Akira
You must login to view this content
DragonForce
You must login to view this content
Wing FTP Server RCE Vulnerability Under Active Exploitation
Security researchers at Huntress have confirmed active exploitation of a critical remote code execution vulnerability in Wing FTP Server, designated CVE-2025-47812, with the first observed attack occurring just one day after the vulnerability’s public disclosure. The flaw affects versions before 7.4.4 and can lead to root or SYSTEM-level remote code execution, prompting urgent calls for […]
The post Wing FTP Server RCE Vulnerability Under Active Exploitation appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.