Aggregator
CVE-2025-52996 | filebrowser up to 2.32.0 Password Protected Link authentication bypass (EUVD-2025-19579)
CVE-2020-25412 | Gnuplot 5.4 command.c com_line code injection (Nessus ID 240563)
CVE-2025-20298 | Splunk Universal Forwarder up to 9.1.8/9.2.5/9.3.3/9.4.1 on Windows SplunkUniversalForwarder permission assignment (SVD-2025-0602 / EUVD-2025-16672)
CVE-2024-52597 | Bubka 2FAuth up to 5.4.0 SVG File cross site scripting (GHSA-q5p4-6q4v-gqg3)
‘Highly evasive’ Vietnamese-speaking hackers stealing data from thousands of victims in 62+ nations
SentinelOne and Beazley Security say the group has been evolving its techniques of late, all with the goal of making money off stolen data.
The post ‘Highly evasive’ Vietnamese-speaking hackers stealing data from thousands of victims in 62+ nations appeared first on CyberScoop.
Surge in Threat Actor Exploitation Attempts Serves as Early Warning of Emerging Cyber Vulnerabilities
Researchers have discovered a continuous relationship between increases in threat actor activity and the eventual disclosure of new Common Vulnerabilities and Exposures (CVEs) in corporate edge technologies, according to a groundbreaking report published by GreyNoise, Inc. The study, spanning data from September 2024 onward, leverages GreyNoise’s Global Observation Grid (GOG) to monitor daily unique IP […]
The post Surge in Threat Actor Exploitation Attempts Serves as Early Warning of Emerging Cyber Vulnerabilities appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Red Canary CFP tracker: August 2025
16 000 + 35 000 + 1 000 000 = 0: как считают мошенники в Telegram
Play
You must login to view this content
Play
You must login to view this content
Play
You must login to view this content
Play
You must login to view this content
Ransomware Attack on Phone Repair and Insurance Company Cause Millions in Damage
The sudden emergence of the Royal ransomware in early 2023 marked a significant escalation in cyber threats targeting service providers across Europe. Exploiting unpatched VPN and remote-desktop gateways, attackers initiated brute-force and credential-stuffing campaigns to breach perimeter defenses. Once inside, the malware deployed a custom encryption engine that leveraged AES-256 for file encryption and RSA-4096 […]
The post Ransomware Attack on Phone Repair and Insurance Company Cause Millions in Damage appeared first on Cyber Security News.
Alleged Data Sale of Legiit
Qilin
You must login to view this content
Китай создаёт дронов, которые уворачиваются от ракет — и выживают в 87% случаев
Claude Vulnerabilities Let Attackers Execute Unauthorized Commands With its Own Help
Two high-severity vulnerabilities in Anthropic’s Claude Code could allow attackers to escape restrictions and execute unauthorized commands. Most remarkably, Claude itself unwittingly assisted in developing the exploits used against its own security mechanisms. The vulnerabilities uncovered by Elad Beber from Cymulate, CVE-2025-54794 and CVE-2025-54795, demonstrate how AI systems’ analytical capabilities can be turned against their […]
The post Claude Vulnerabilities Let Attackers Execute Unauthorized Commands With its Own Help appeared first on Cyber Security News.