Aggregator
CVE-2023-33126 | Microsoft .NET/Visual Studio Local Privilege Escalation (Nessus ID 239977)
CVE-2023-36792 | Microsoft .NET Framework up to 4.8 Remote Code Execution (Nessus ID 239977)
CVE-2023-36793 | Microsoft .NET Framework up to 4.8 Remote Code Execution (Nessus ID 239977)
New Chaos RAT Variants Targeting Windows and Linux Systems to Steal Sensitive Data
The Acronis Threat Research Unit has identified new variants of Chaos RAT, a remote administration tool (RAT) that has evolved from an open-source project first observed in 2022 into a formidable multi-platform malware. These latest iterations of Chaos RAT are now targeting both Windows and Linux systems, showcasing an alarming level of sophistication through phishing-driven […]
The post New Chaos RAT Variants Targeting Windows and Linux Systems to Steal Sensitive Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
FireScorpion вместо Tor, Paranoia вместо паники: Securonis 3.0 в деталях
New Sophisticated Multi-Stage Malware Campaign Uses VBS Files to Execute PowerShell Script
A recently uncovered malware campaign has revealed a highly sophisticated, multi-stage infection process utilizing heavily obfuscated Visual Basic Script (VBS) files to deploy remote access trojans (RATs) such as Remcos, LimeRAT, DCRat, and AsyncRAT. Discovered across a cluster of 16 open directories on various hosts, this campaign relies on a file named “sostener.vbs” (Spanish for […]
The post New Sophisticated Multi-Stage Malware Campaign Uses VBS Files to Execute PowerShell Script appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Evans Pharmacy Falls Victim to Kairos Ransomware
Veeam security advisory (AV25-352)
Самый большой цифровой глаз человечества наводится на космос. Хотите узнать, что он видит?
CVE-2020-26624 | Gila CMS up to 1.15.4 Login Portal ID sql injection (ID 176301 / EUVD-2024-0255)
CVE-2024-0938 | Tongda OA 2017 up to 11.9 delete_webmail.php WEBBODY_ID_STR sql injection (EUVD-2024-16717)
CVE-2023-50120 | GPAC 2.3-DEV-rev636-gfbd7e13aa-master MP4Box media_tools/av_parsers.c av1_uvlc infinite loop (Issue 2698 / EUVD-2023-54947)
CVE-2025-49823 | conda constructor up to 3.11.2 Installation Prefix command injection (GHSA-44q9-rg2q-5g99 / EUVD-2025-18445)
CVE-2025-46398 | xfig fig2dev 3.2.9a read_objects stack-based overflow (ID 191 / EUVD-2025-12157)
CVE-2023-50488 | Blurams Lumi Security Camera 23.0406.435.4120 code injection (EUVD-2023-55271)
BeyondTrust security advisory (AV25-351)
LangSmith Bug Could Expose OpenAI Keys and User Data via Malicious Agents
印度汽车共享公司Zoomcar遭遇数据泄露,影响840万用户
Beware: Weaponized Research Papers Delivering Malware Through Password-Protected Documents
The AhnLab Security Intelligence Center (ASEC) recently made the concerning revelation that the infamous Kimsuky hacking organization was connected to a crafty phishing email campaign that targeted unwary people. Disguised as a seemingly legitimate request for a paper review from a professor, these emails lure recipients into opening a password-protected HWP document embedded with a […]
The post Beware: Weaponized Research Papers Delivering Malware Through Password-Protected Documents appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.