Aggregator
SmolVLA даёт старт open-source роботам: запускай с дивана, управляй в реале
Alleged admin access sale to multiple FinTech Companies in South America
CVE-2025-39472 | WPWeb WooCommerce Social Login Plugin up to 2.8.2 on WordPress cross-site request forgery (EUVD-2025-11383)
CVE-2025-5763 | Tenda CP3 11.10.00.2311090948 apollo sub_F3C8C command injection (EUVD-2025-17119)
CVE-2025-3501 | Red Hat Keycloak/Single Sign-On Verification Policy certificate validation (EUVD-2025-12660)
CVE-2025-5732 | code-projects Traffic Offense Reporting System 1.0 cross-site request forgery (EUVD-2025-17097)
CVE-2025-5734 | TOTOLINK X15 1.0.0-B20230714.1105 HTTP POST Request /boafrm/formWlanRedirect redirect-url buffer overflow (EUVD-2025-17096)
OffensiveCon25 – Entrysign: Create Your Own x86 Microcode for Fun and Profit
Authors/Presenters: Matteo Rizzo, Kristoffer `spq` Janke, Eduardo Vela Nava and Josh Eads
Our sincere appreciation to OffensiveCon by Binary Gecko, and the Presenters/Authors for publishing their outstanding OffensiveCon 2025 video content. Originating from the conference’s events located at the Hilton Berlin; and via the organizations YouTube channel.
Thanks and a Tip O' The Hat to Verification Labs :: Penetration Testing Specialists :: Trey Blalock GCTI, GWAPT, GCFA, GPEN, GPCS, GCPN, CRISC, CISA, CISM, CISSP, SSCP, CDPSE for recommending the OffensiveCon 25 conference.
The post OffensiveCon25 – Entrysign: Create Your Own x86 Microcode for Fun and Profit appeared first on Security Boulevard.
New Wiper Malware Targets Ukrainian Infrastructure
Internet infamy drives The Com’s crime sprees
Unit 221B’s Allison Nixon said crackdowns have effectively shown the group that their actions carry real consequences.
The post Internet infamy drives The Com’s crime sprees appeared first on CyberScoop.
Google Warns of Surge in Cyberattacks Targeting US Users to Steal Login Credentials
Google has highlighted a significant uptick in cyberattacks and scams targeting US consumers, with a particular focus on stealing login credentials. The FBI reports that online scams generated a staggering $16.6 billion in losses last year, reflecting a 33% increase over the previous year. Over 60% of Americans have perceived a rise in scam attempts […]
The post Google Warns of Surge in Cyberattacks Targeting US Users to Steal Login Credentials appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Dell security advisory (AV25-325)
Two Distinct Botnets Exploit Wazuh Server Vulnerability to Launch Mirai-Based Attacks
МФТИ — 330 тыс., МГУ — 290: как меняется рейтинг зарплат в IT
Alleged sale of 0-day SonicWall SRA 4600 Preauth RCE
Meta Bypassed Privacy Protections to Track Android Users
A recent investigation by cybersecurity researchers has revealed that tech giants Meta (formerly Facebook) and Yandex have been exploiting a fundamental design feature of the Android operating system—the ability for apps to listen on localhost ports—to covertly track users’ web activity and link it to their real identities. The discovery has raised significant privacy concerns […]
The post Meta Bypassed Privacy Protections to Track Android Users appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
U.S. Targets $7.7M in Crypto Tied to North Korean IT Worker Scam
On June 5, 2025, the United States Department of Justice (DOJ) filed a verified civil forfeiture complaint in the US District Court for the District of Columbia, seeking to permanently seize over $7.7 million in cryptocurrency, non-fungible tokens (NFTs), and digital assets linked to a sophisticated global laundering operation orchestrated by North Korea. The assets […]
The post U.S. Targets $7.7M in Crypto Tied to North Korean IT Worker Scam appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
APT41 Hackers Leverage Google Calendar for Malware C2 in Attacks on Government Entities
The Chinese state-sponsored threat actor APT41, also known as BARIUM, Wicked Panda, and Brass Typhoon, has been reported to exploit Google Calendar as a command-and-control (C2) mechanism in a recent campaign targeting a Taiwanese government website. This sophisticated group, active since at least 2012, is notorious for blending cyber espionage with financially motivated cybercrime, hitting […]
The post APT41 Hackers Leverage Google Calendar for Malware C2 in Attacks on Government Entities appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.