Aggregator
CVE-2025-52239 | ZKEACMS 4.1 unrestricted upload
CVE-2025-51390 | TOTOLINK N600R 4.3.0cu.7647_B20210106 setWiFiWpsConfig pin command injection
CVE-2025-26476 | Dell ECS/ObjectScale hard-coded key (dsa-2025-154)
CVE-2025-53395 | Paramount Macrium Reflect up to 2025-06-26 ReflectMonitor.exe untrusted search path
CVE-2013-10052 | ZPanel /etc/sudoers privileges management (EDB-26451)
CVE-2025-53394 | Paramount Macrium Reflect up to 2025-06-26 Backup File Local Privilege Escalation
CVE-2025-38741 | Dell Enterprise SONiC OS up to 4.5.0 SSH hard-coded key (dsa-2025-275)
CVE-2025-21120 | Dell Avamar Data Store Gen4T trusting http permission methods on the server side (dsa-2025-271)
CVE-2025-34147 | Shenzhen Aitemi M300 Wi-Fi Repeater MT02 extap2g SSID os command injection
CVE-2013-10054 | LibrettoCMS 1.1.7 File Manager Plugin upload.php unrestricted upload (EDB-26213)
Modular Malware Suite Sold by Threat Actors Through Public Storefront Domains
A threat actor operating under the moniker Cyber Products has established a public-facing storefront at cyberproducts[.]io to distribute their modular malware suite, dubbed Cyber Stealer. This development marks a shift toward overt commercialization of malicious tools, with additional promotion occurring in clandestine online communities such as Hackforums. The malware, alternatively branded as Cyber Botnet & […]
The post Modular Malware Suite Sold by Threat Actors Through Public Storefront Domains appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Threat Actors Increasingly Leaning on GenAI Tools
Hackers Abuse Microsoft 365 Direct Send to Deliver Internal Phishing Emails
Elevate Your Influence: Building a Personal Brand in Tech 2025
why building a personal brand in tech is crucial for career success in 2025. Start your journey today and stand out in the competitive landscape!
The post Elevate Your Influence: Building a Personal Brand in Tech 2025 appeared first on Security Boulevard.
New Malware Attack Uses LNK Files to Deploy REMCOS Backdoor on Windows Systems
The investigation began with the detection of two scanning IP addresses, 91.238.181[.]225 and 5.188.86[.]169 sharing a common Secure Shell (SSH) fingerprint (b5:4c:ce:68:9e:91:39:e8:24:b6:e5:1a:84:a7:a1:03). Cybersecurity researchers have uncovered a sophisticated multi-stage malware campaign that leverages malicious Windows LNK shortcut files to deploy the REMCOS backdoor, a potent remote access trojan capable of full system compromise. This fingerprint […]
The post New Malware Attack Uses LNK Files to Deploy REMCOS Backdoor on Windows Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.