Aggregator
Meta Offers $1M bounty at Pwn2Own Ireland 2025 for WhatsApp exploits
Lazarus Hackers Weaponize 234 npm and PyPI Packages to Infect Developers
Sonatype’s automated detection systems have uncovered an expansive and ongoing infiltration of the global open-source ecosystem by the notorious Lazarus Group, a threat actor believed to be backed by North Korea’s Reconnaissance General Bureau. Between January and July 2025, Sonatype identified and blocked 234 malicious software packages deployed through both the npm and PyPI open-source […]
The post Lazarus Hackers Weaponize 234 npm and PyPI Packages to Infect Developers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Koske Marks a Significant Step in AI-Created Malware: Aqua Security
Aqua Security detected "Koske," a cryptomining malware that brings malicious code closer to being as good or better than malware created by humans and includes indicators that it was developed with the use of a large language model.
The post Koske Marks a Significant Step in AI-Created Malware: Aqua Security appeared first on Security Boulevard.
CVE-2024-20278 | Cisco IOS XE up to 17.12.1w NETCONF incomplete blacklist (cisco-sa-iosxe-priv-esc-seAx6NLX)
CVE-2024-20478 | Cisco Application Policy Infrastructure Controller (APIC) Software Upgrade unnecessary privileges (cisco-sa-capic-priv-esc-uYQJjnuU)
CVE-2024-58104 | Trend Micro Apex One/Apex One as a Service Plug-in User Interface Manager privileges management
CVE-2025-27404 | Icinga icingaweb2 up to 2.11.4/2.12.2 Setting cross site scripting (GHSA-c6pg-h955-wf66)
CVE-2024-58105 | Trend Micro Apex One/Apex One as a Service Plug-in User Interface Manager incorrect user management
Cursor AI Code Editor Fixed Flaw Allowing Attackers to Run Commands via Prompt Injection
Hackers leak purported Aeroflot data as Russia denies breach
Железный занавес для Excel: Microsoft перекрывает хакерам кислород
CVE-2022-20920 | Cisco IOS/IOS XE SSH exceptional condition (cisco-sa-ssh-excpt-dos-FzOBQTnk)
CVE-2025-27405 | Icinga icingaweb2 up to 2.11.4/2.12.2 Setting cross site scripting
CVE-2025-27609 | Icinga icingaweb2 up to 2.11.4/2.12.2 cross site scripting
CVE-2025-20256 | Cisco Secure Network Analytics 7.4.1/7.4.2/7.5.0/7.5.1/7.5.2 Web-based Management Interface injection (cisco-sa-sna-ssti-dPuLqSmZ / EUVD-2025-16019)
CVE-2025-20129 | Cisco SocialMiner/Unified Contact Center Express Web-based Chat Interface information disclosure (cisco-sa-ccp-info-disc-ZyGerQpd / EUVD-2025-16892)
Storm-2603 Deploys Custom Malware Using BYOVD to Bypass Endpoint Protections
Check Point Research (CPR) has delved into the operations of Storm-2603, a recently identified threat actor linked to Chinese advanced persistent threat (APT) groups, amid widespread exploitation of Microsoft SharePoint Server vulnerabilities known as “ToolShell.” This campaign exploits four critical CVEs CVE-2025-49704, CVE-2025-49706, CVE-2025-53770, and CVE-2025-53771 to facilitate intrusions, with Storm-2603 deploying a custom command-and-control […]
The post Storm-2603 Deploys Custom Malware Using BYOVD to Bypass Endpoint Protections appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.