Aggregator
U.S. CISA adds Cisco ISE and PaperCut NG/MF flaws to its Known Exploited Vulnerabilities catalog
ArmouryLoader Bypasses Security Protections to Inject Malicious Code
ArmouryLoader and other malicious code loaders have become essential tools for introducing Trojan-type payloads into hacked systems in the ever-changing world of cyberattacks. First identified in 2024, ArmouryLoader exploits the ASUS Armoury Crate software by hijacking its export functions, such as freeBuffer in ArmouryA.dll, to initiate multi-stage execution chains. This loader facilitates privilege escalation, persistence, […]
The post ArmouryLoader Bypasses Security Protections to Inject Malicious Code appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Laundry Bear Infrastructure, Key Tactics and Procedures Uncovered
A sophisticated Russian state-sponsored advanced persistent threat (APT) group known as Laundry Bear has emerged as a significant cybersecurity concern, targeting NATO countries and Ukraine through an extensive campaign of espionage and intelligence gathering. Also tracked as Void Blizzard by Microsoft Threat Intelligence, this threat actor has been actively operating since at least April 2024, […]
The post Laundry Bear Infrastructure, Key Tactics and Procedures Uncovered appeared first on Cyber Security News.
Chaos Ransomware Rises as BlackSuit Gang Falls
Nile Gives Your Campus Network More Than Just a Password
For decades, network security followed a simple model: the castle and moat design philosophy. We built strong perimeters with firewalls and relied on Network Access Control (NAC) to act as a guardian, checking credentials at the door. Once inside, users and devices were assumed to be trusted. Today, the assumptions have all changed. Thanks to..
The post Nile Gives Your Campus Network More Than Just a Password appeared first on Security Boulevard.
ToolShell: Uncovering Five Critical Vulnerabilities in Microsoft SharePoint
Security researchers from Kaspersky have detailed a sophisticated exploit chain dubbed “ToolShell,” actively targeting on-premise Microsoft SharePoint servers worldwide. The campaign, which began widespread exploitation leverages an unauthenticated remote code execution (RCE) chain involving CVE-2025-49704 and CVE-2025-49706, enabling attackers to seize full control of vulnerable systems. Alerts from various security firms and national CERTs highlight […]
The post ToolShell: Uncovering Five Critical Vulnerabilities in Microsoft SharePoint appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
12,6 лет в антарктическом льду: детектор IceCube не поймал ни одного "призрака Вселенной"
Ghost Students Drain Money, Resources From Educational Sector
WorldLeaks
You must login to view this content
Endgame Gear mouse config tool infected users with malware
ROBINSON Falls Victim to Qilin Ransomware
Oyster Backdoor Disguised as PuTTY and KeyPass Targets IT Admins via SEO Poisoning
Threat actors have been using trojanized versions of well-known IT tools like PuTTY and WinSCP to spread the Oyster backdoor, also known as Broomstick or CleanupLoader, in a sophisticated malvertising and SEO poisoning campaign that Arctic Wolf researchers first noticed in early June 2025. There have also been hints that KeyPass has been involved in […]
The post Oyster Backdoor Disguised as PuTTY and KeyPass Targets IT Admins via SEO Poisoning appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.