Aggregator
CVE-2017-15012 | EMC OpenText Documentum Content Server up to 7.3 RPC Command input validation (EDB-43003 / BID-101639)
Indian Police Raid Tech Support Scam Call Center
一张屋顶照片,开源情报如何锁定它的秘密坐标
美国全球开源情报合作体系全解析
Sarcoma
You must login to view this content
KongTuke Campaign Deploys Modified Interlock RAT Using FileFix Method Against Windows Environments
Researchers from The DFIR Report, collaborating with Proofpoint, have uncovered a resilient PHP-based variant of the Interlock ransomware group’s remote access trojan (RAT), marking a significant evolution from the previously documented JavaScript-driven NodeSnake. This adaptation, observed in campaigns linked to the LandUpdate808 threat cluster also known as KongTuke has been active since May 2025, exploiting […]
The post KongTuke Campaign Deploys Modified Interlock RAT Using FileFix Method Against Windows Environments appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
开源!腾讯联合顶级高校,助力开发者选择更安全的AI编程伙伴!
CVE-2012-1744 | Oracle Fusion Middleware 8.3.5/8.3.7 Outside In Technology denial of service (EDB-19960 / XFDB-77012)
Hackers Allegedly Selling WinRAR 0-day Exploit on Dark Web Forums for $80,000
A threat actor using the handle “zeroplayer” advertised a previously unknown remote-code-execution (RCE) exploit for WinRAR on an underground forum. The post, titled “WINRAR RCE 0DAY – 80,000$,” claims the flaw works “fully on the latest version of WinRAR and below,” is not related to the recently patched CVE-2025-6218, and is available exclusively through the […]
The post Hackers Allegedly Selling WinRAR 0-day Exploit on Dark Web Forums for $80,000 appeared first on Cyber Security News.
$APP_KEY — и вы root: Laravel снова можно взломать одной строкой
CVE-2025-50124 | Schneider Electric EcoStruxure IT Data Center Expert privileges management (SEVD-2025-189-01 / EUVD-2025-21132)
CVE-2025-50125 | Schneider Electric EcoStruxure IT Data Center Expert Header Host server-side request forgery (SEVD-2025-189-01 / EUVD-2025-21133)
CVE-2025-6788 | Schneider Electric EcoStruxure Power Monitoring Expert TGML Diagram exposure of resource (SEVD-2025-189-04 / EUVD-2025-21131)
反弹Shell执行pty泄露黑客命令记录?
CVE-2025-47161 | Microsoft Defender for Endpoint prior 101.25022.0002 on Linux access control (EUVD-2025-15199 / EDB-52355)
10 Best Cloud VPN Providers – 2025
Cloud VPNs have become essential for both businesses and individuals seeking secure, private, and reliable internet access in 2025. As cyber threats evolve and remote work becomes the norm, choosing the right cloud VPN provider is crucial for safeguarding sensitive data and ensuring seamless connectivity across the globe. This comprehensive guide reviews the 10 best […]
The post 10 Best Cloud VPN Providers – 2025 appeared first on Cyber Security News.
Cybersecurity Isn’t Just For Experts Anymore: Why You Should Care
Let’s face it cybersecurity used to sound like a topic only for programmers in hoodies or government agencies trying to fend off foreign hackers. But in the current day and age, everyone is affected. If you are a gamer, a business owner, or casually browsing on Instagram, you are continuously at the risk of losing […]
The post Cybersecurity Isn’t Just For Experts Anymore: Why You Should Care appeared first on Cyber Security News.