Aggregator
CVE-2025-4634 | JCT Airpointer 2.4.107-2 Web Portal file access
CVE-2025-4635 | JCT Airpointer 2.4.107-2 Diagnostics Module input validation
CVE-2025-4636 | JCT Airpointer 2.4.107-2 privileges management
CVE-2025-48912 | Apache Superset up to 4.1.1 sqlExpression Field sql injection
Submit #585641: FreeFloat FTP Server 1.0 Buffer Overflow [Accepted]
Submit #585639: FreeFloat FTP Server 1.0 Buffer Overflow [Accepted]
Слежка за маткой: как алгоритмы ловят женщин за выбор
This month in security with Tony Anscombe – May 2025 edition
解锁静态分析误报难题:IRify 分级管理策略大揭秘
UK MoD Launches New Cyber Warfare Command
Implementing Identity and Access Management in Cloud Security
As organizations accelerate cloud adoption, securing digital identities has become a cornerstone of cybersecurity strategy. The 2025 Verizon Data Breach Investigations Report reveals that 80% of cyberattacks now leverage identity-based methods, with credential abuse and third-party vulnerabilities driving a 34% surge in breaches. Meanwhile, the global cloud Identity and Access Management (IAM) market is projected to […]
The post Implementing Identity and Access Management in Cloud Security appeared first on Cyber Security News.
CISA Releases Five ICS Advisories Targeting Vulnerabilities and Exploits
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) released five urgent Industrial Control Systems (ICS) advisories on May 29, 2025, addressing critical vulnerabilities across widely deployed industrial automation and infrastructure systems. These advisories highlight severe security flaws affecting Siemens access control systems, fire safety panels, environmental monitoring devices, and medical imaging software that could potentially […]
The post CISA Releases Five ICS Advisories Targeting Vulnerabilities and Exploits appeared first on Cyber Security News.
2025年人工智能测试活动广受关注 众多单位踊跃报名
DeepSeek научился считать лучше, чем OpenAI, но до сих пор не может ответить на единственный вопрос
美国禁止向中国出售半导体设计软件
Critical Cisco IOS XE Flaw Permits Arbitrary File Upload — PoC Released
A critical security vulnerability, tracked as CVE-2025-20188, has been discovered in Cisco IOS XE Wireless LAN Controllers (WLCs), threatening enterprise wireless infrastructures worldwide. This flaw, scoring a maximum 10.0 on the CVSS scale, allows unauthenticated remote attackers to upload arbitrary files and potentially execute commands as root, granting full control over affected devices. The vulnerability […]
The post Critical Cisco IOS XE Flaw Permits Arbitrary File Upload — PoC Released appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
North Korean IT Workers Exploit Legitimate Software and Network Tactics to Evade EDR
A North Korean IT worker, operating under a false identity, was uncovered infiltrating a Western organization with a sophisticated remote-control system. This incident, exposed during a U.S. federal raid on a suspected laptop farm, showcases a chilling trend where adversaries leverage legitimate software and low-level network protocols to evade traditional Endpoint Detection and Response (EDR) […]
The post North Korean IT Workers Exploit Legitimate Software and Network Tactics to Evade EDR appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
New Rust-Based InfoStealer Uses Fake CAPTCHA to Deliver EDDIESTEALER
A newly discovered Rust-based infostealer, dubbed EDDIESTEALER, has been uncovered by Elastic Security Labs, spreading through a sophisticated social engineering tactic involving fake CAPTCHA verification pages. Mimicking legitimate CAPTCHA systems like Google’s reCAPTCHA, these malicious prompts deceive users into executing harmful PowerShell scripts, ultimately deploying the infostealer on Windows systems to harvest sensitive data such […]
The post New Rust-Based InfoStealer Uses Fake CAPTCHA to Deliver EDDIESTEALER appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.