Aggregator
CVE-2025-7339 | jshttp on-headers up to 1.0.x Response Header response.writeHead unexpected data type (ID 315 / EUVD-2025-21784)
CVE-2025-7338 | expressjs multer up to 2.0.1 Multi-part Upload Request uncaught exception (GHSA-fjgf-rc76-4x9p / EUVD-2025-21776)
CVE-2025-54066 | DIRACGrid diracx-web up to 0.1.0-a7 redirect (GHSA-hfj7-542q-8fvv / EUVD-2025-21778)
CVE-2024-32323 | cnhcit Haichang OA 1.0.0 hcit.project.rte.agents.UploadImages.class if sql injection
CVE-2023-41566 | OA EKP 16 sysUiExtend.do permission
Researchers Uncover on How Hacktivist Groups Gaining Attention and Selecting Targets
The global hacktivist landscape has undergone a dramatic transformation since 2022, evolving from primarily ideologically motivated actors into a complex ecosystem where attention-seeking behavior and monetization strategies drive operational decisions. This shift has fundamentally altered how these groups select targets and conduct campaigns, creating new challenges for cybersecurity professionals and organizations worldwide. Recent analysis reveals […]
The post Researchers Uncover on How Hacktivist Groups Gaining Attention and Selecting Targets appeared first on Cyber Security News.
Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters
Valve сдалась: Steam теперь танцует под дудку банков и платёжных систем
H2Miner Attacking Linux, Windows, and Containers to Mine Monero
The H2Miner botnet, first observed in late 2019, has resurfaced with an expanded arsenal that blurs the line between cryptojacking and ransomware. The latest campaign leverages inexpensive virtual private servers (VPS) and a grab-bag of commodity malware to compromise Linux hosts, Windows workstations, and container workloads simultaneously. By chaining cloud-aware shell scripts, cross-compiled binaries, and […]
The post H2Miner Attacking Linux, Windows, and Containers to Mine Monero appeared first on Cyber Security News.
CVE-2025-25257 | Fortinet FortiWeb up to 7.0.10/7.2.10/7.4.7/7.6.3 HTTP Request sql injection (FG-IR-25-151)
CVE-2025-54064 | rucio helm-charts log file (GHSA-cmfq-f2v2-vj33 / EUVD-2025-21779)
CVE-2025-54061 | LabRedesCefetRJ WeGIA up to 3.4.5 dependente_editarDoc.php idatendido_familiares sql injection (GHSA-g47q-vfpj-g9mr / EUVD-2025-21781)
CVE-2025-54062 | LabRedesCefetRJ WeGIA up to 3.4.5 profile_dependente.php id_dependente sql injection (GHSA-f53c-f6jx-cm56 / EUVD-2025-21780)
Hackers Exploiting DNS Blind Spots to Hide and Deliver Malware
A sophisticated new attack vector where malicious actors are hiding malware inside DNS records, exploiting a critical blind spot in most organizations’ security infrastructure. This technique transforms the Internet’s Domain Name System into an unconventional file storage system, allowing attackers to distribute malware while evading traditional detection methods. Recent investigations using DNSDB Scout, a passive […]
The post Hackers Exploiting DNS Blind Spots to Hide and Deliver Malware appeared first on Cyber Security News.
100 лет гравитация жила по законам Эйнштейна... теперь у неё новые правила
Alleged Multi-Access Sale: RDWeb Accounts Across USA, Canada & Australia
4M+ Internet-Exposed Systems at Risk From Tunneling Protocol Vulnerabilities
Researchers have uncovered critical security vulnerabilities affecting millions of computer servers and routers worldwide, stemming from the insecure implementation of fundamental internet tunneling protocols. The flaws could allow attackers to bypass security controls, spoof their identity, access private networks, and launch powerful denial-of-service attacks. The discovery was made by security researchers Mathy Vanhoef and Angelos […]
The post 4M+ Internet-Exposed Systems at Risk From Tunneling Protocol Vulnerabilities appeared first on Cyber Security News.