Aggregator
HEVD – Race Condition – Windows 10 Pro – SMEP, kCFG, kASLR protections
British Man Sentenced for Network Rail Wi-Fi Hack
Securing Data in the AI Era
Securing Data in the AI Era
New eSIM Hack Lets Attackers Clone Profiles and Hijack Phone Identities
A critical vulnerability in eSIM technology enables attackers to clone mobile subscriber profiles and hijack phone identities. AG Security Research revealed they broke the security of Kigen eUICC cards with GSMA consumer certificates, marking what they claim is the first successful public hack against consumer GSMA eUICC and EAL-certified GSMA security chips. The research team […]
The post New eSIM Hack Lets Attackers Clone Profiles and Hijack Phone Identities appeared first on Cyber Security News.
Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild
Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild
Akira
You must login to view this content
DragonForce
You must login to view this content
Wing FTP Server RCE Vulnerability Under Active Exploitation
Security researchers at Huntress have confirmed active exploitation of a critical remote code execution vulnerability in Wing FTP Server, designated CVE-2025-47812, with the first observed attack occurring just one day after the vulnerability’s public disclosure. The flaw affects versions before 7.4.4 and can lead to root or SYSTEM-level remote code execution, prompting urgent calls for […]
The post Wing FTP Server RCE Vulnerability Under Active Exploitation appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
开源项目mcp-remote 中存在严重漏洞可导致RCE
蓝牙漏洞PerfektBlue 可用于实现RCE,影响多家汽车厂商
Critical D-Link 0-click Vulnerability Allows Remote Attackers to Crash the Server
A critical stack-based buffer overflow in the D-Link DIR-825 Rev.B 2.10 router firmware allows unauthenticated, zero-click remote attackers to crash the device’s HTTP server. Tracked as CVE-2025-7206, the flaw resides in the router’s httpd binary and stems from improper handling of the language parameter in the switch_language.cgi endpoint. Exploitation requires no valid credentials or user […]
The post Critical D-Link 0-click Vulnerability Allows Remote Attackers to Crash the Server appeared first on Cyber Security News.
DragonForce
You must login to view this content