Aggregator
Dollar Tree Falls Victim to INC RANSOM Ransomware
Cyberattack shuts down hundreds of Russian pharmacies, disrupts healthcare services
Palo Alto Networks to Acquire CyberArk in $25 Billion Deal
Palo Alto Networks, a leader in cybersecurity, announced today that it has agreed to acquire CyberArk, a company known for identity security, for about $25 billion. This move is expected to change the cybersecurity industry significantly. The deal marks Palo Alto Networks’ strategic entry into the Identity Security market, establishing it as a new core […]
The post Palo Alto Networks to Acquire CyberArk in $25 Billion Deal appeared first on Cyber Security News.
Hackers Deploy Cobalt Strike Beacon Using GitHub and Social Media
A sophisticated cyberattack campaign disrupted the Russian IT industry and entities in several other countries, leveraging advanced evasion techniques to deploy the notorious Cobalt Strike Beacon. Attackers ingeniously concealed payload information within user profiles on platforms like GitHub, Microsoft Learn Challenge, Quora, and Russian social networks, blending malicious data into legitimate user-generated content to bypass […]
The post Hackers Deploy Cobalt Strike Beacon Using GitHub and Social Media appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Opera заявила, что Microsoft прячет Edge в каждую щель Windows и делает уход почти невозможным
CVE-2025-43018 | HP LaserJet Pro Printers Address Book information disclosure
CVE-2025-53357 | glpi up to 10.0.18 authorization (GHSA-x9mj-822q-6cf8)
CVE-2025-53113 | glpi up to 10.0.18 access control (GHSA-r2mm-6499-4m8j)
CVE-2025-53944 | Significant-Gravitas AutoGPT up to 0.6.15 get_graph_execution_results graph_exec_id improper authorization (GHSA-x77j-qg2x-fgg6)
CVE-2025-53008 | glpi up to 10.0.18 insufficiently protected credentials (GHSA-52h8-76ph-4j9q)
CVE-2025-52897 | glpi up to 10.0.18 cross site scripting (GHSA-6whm-q2rp-prqm)
CVE-2025-52567 | glpi up to 10.0.18 RSS Feed server-side request forgery (GHSA-5mp6-mgmh-vrq7)
CVE-2025-53111 | glpi up to 10.0.18 access control (GHSA-p665-mqcr-j96j)
CVE-2025-46811 | SUSE Container Manager missing authentication
CVE-2025-54433 | Bugsink up to 1.4.2/1.5.4/1.6.3/1.7.3 event_id path traversal (GHSA-q78p-g86f-jg6q)
CVE-2025-54572 | SAML-Toolkits ruby-saml up to 1.18.0 resource consumption (GHSA-rrqh-93c8-j966)
CVE-2025-53112 | glpi up to 10.0.18 access control
CVE-2025-54573 | cvat-ai cvat up to 2.41.x improper authentication
5 Email Attacks SOCs Cannot Detect Without A Sandbox
Even with Slack, Teams, and every new communication tool out there, email remains the top attack vector for businesses. Why? Because it’s familiar, trusted, and easy to exploit. One convincing message is all it takes and threats slip right past filters, AVs, and EDRs without making a sound. Below are five real examples of attacks […]
The post 5 Email Attacks SOCs Cannot Detect Without A Sandbox appeared first on Cyber Security News.