Aggregator
Android's pKVM hypervisor earns SESIP Level 5 security certification
ShinyHunters Claims BreachForums Seized by Law Enforcement, Now a Honeypot
The threat actor known as ShinyHunters has publicly disclosed what they claim is a covert seizure of BreachForums, a notorious online platform used for trading stolen data and discussing illicit hacking activities. According to ShinyHunters’ announcement, the forum’s core infrastructure, including its official Pretty Good Privacy (PGP) key used for cryptographic authentication and secure communications, […]
The post ShinyHunters Claims BreachForums Seized by Law Enforcement, Now a Honeypot appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
ANOTHER WinRAR 0-Day: Don’t Patch Now — Uninstall It!
Zero day—zero clue: Old, bug-prone app relies on you to go look for update files.
The post ANOTHER WinRAR 0-Day: Don’t Patch Now — Uninstall It! appeared first on Security Boulevard.
SecWiki News 2025-08-12 Review
更多最新文章,请访问SecWiki
New Charon ransomware targets Middle East public sector, aviation firms
有 133 亿年历史的最古老黑洞
17,000+ VMware ESXi Servers Vulnerable to Critical Integer-Overflow Vulnerability
More than 17,000 VMware ESXi installations worldwide are at risk from a severe integer-overflow vulnerability tracked as CVE-2025-41236 (CVSS 9.3), cybersecurity researchers warn. This critical vulnerability, first flagged in July, has prompted urgent calls for patching, but the latest scan results suggest progress remains slow, with thousands of systems still unpatched. Shadowserver Foundation, in partnership […]
The post 17,000+ VMware ESXi Servers Vulnerable to Critical Integer-Overflow Vulnerability appeared first on Cyber Security News.
DEF CON volunteers step up to help water sector after China, Iran attack utilities
GPT-5 Safeguards Bypassed Using Storytelling-Driven Jailbreak
PureRAT = ResolverRAT = PureHVNC
PureRAT is a Remote Access Trojan, which can be used by an attacker to remotely control someone else's PC. PureRAT provides the following features to an attacker: See the victims user interfaceInteract with the victim PC using mouse and keyboardView the webcamListen to the microphoneRecord keystroke[...]
The post PureRAT = ResolverRAT = PureHVNC appeared first on Security Boulevard.
PureRAT = ResolverRAT = PureHVNC
Нацгвардия вместо айтишников, бумага вместо компьютеров: Interlock взял в заложники целый город
Critical Zoom Clients for Windows Vulnerability Lets Attackers Escalate Privileges
Zoom has disclosed a critical vulnerability affecting multiple Windows-based clients, potentially allowing attackers to escalate privileges and compromise user systems. Designated as CVE-2025-49457 under bulletin ZSB-25030, this flaw carries a CVSS score of 9.6, classifying it as critical due to its high impact on confidentiality, integrity, and availability. The vulnerability stems from an untrusted search […]
The post Critical Zoom Clients for Windows Vulnerability Lets Attackers Escalate Privileges appeared first on Cyber Security News.
Russian-Linked Curly COMrades Deploy MucorAgent Malware in Europe
Hackers Attacking Fortinet SSL VPN Under Attack From 780 unique IPs
An unprecedented surge in brute-force attacks targeting Fortinet SSL VPN infrastructure, with over 780 unique IP addresses participating in coordinated assault campaigns. The August 3rd attack represents the highest single-day volume recorded on GreyNoise’s Fortinet SSL VPN Bruteforcer tag in recent months, raising concerns about potential zero-day vulnerabilities and sophisticated threat actor operations. Key Takeaways1. […]
The post Hackers Attacking Fortinet SSL VPN Under Attack From 780 unique IPs appeared first on Cyber Security News.
Assisted Living Pharmacy Service LLC Falls Victim to Qilin Ransomware
IBM’s Cost of a Data Breach Report 2025
IBM’s 2025 Cost of a Data Breach Report drives home that point: attackers today are often “logging in rather than hacking in".
The post IBM’s Cost of a Data Breach Report 2025 appeared first on Security Boulevard.
前 NSA 局长称美国科技公司难以保持中立
And Now, LLMs Don’t Need Human Intervention to Plan and Execute Large, Complex Attacks
Researchers just proved LLMs can autonomously plan and execute full-scale cyberattacks — turning AI from a tool into an active threat actor.
The post And Now, LLMs Don’t Need Human Intervention to Plan and Execute Large, Complex Attacks appeared first on Security Boulevard.