Aggregator
CVE-2025-46625 | Tenda RX2 Pro 16.03.30.14 API Endpoint setLanCfg command injection (EUVD-2025-13260)
CVE-2025-46630 | Tenda RX2 Pro 16.03.30.14 Web Management Portal /goform/ate access control (EUVD-2025-13266)
CVE-2024-27967 | Michael Leithold DSGVO All in One for WP Plugin up to 4.3 on WordPress cross-site request forgery
Threat Actors Use Fake DocuSign Notifications to Steal Corporate Data
DocuSign has emerged as a cornerstone for over 1.6 million customers worldwide, including 95% of Fortune 500 companies, and boasts a user base exceeding one billion. However, this widespread adoption has made DocuSign a prime target for cybercriminals. Leveraging the platform’s trusted reputation, threat actors are increasingly deploying sophisticated phishing campaigns to harvest corporate credentials, […]
The post Threat Actors Use Fake DocuSign Notifications to Steal Corporate Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
The Browser Company 停止开发 Arc 转向 AI 驱动浏览器 Dia
Unsophisticated Actors, Poor Hygiene Prompt CI Alert for Oil & Gas
An alert from CISA, FBI, EPA and DOE came after CISA observed attacks by “unsophisticated” cyber actors leveraging “basic and elementary intrusion techniques” against ICS/SCADA systems.
The post Unsophisticated Actors, Poor Hygiene Prompt CI Alert for Oil & Gas appeared first on Security Boulevard.
DragonForce Ransomware Leveraged in MSP Attack Using RMM Tool
BSidesLV24 – PasswordsCon – Combating Phone Spoofing With STIR/SHAKEN
Author/Presenter: Per Thorsheim
Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel.
The post BSidesLV24 – PasswordsCon – Combating Phone Spoofing With STIR/SHAKEN appeared first on Security Boulevard.
AI 模型出现崩溃迹象
CVE-2010-2438 | Laubrotel G.CMS generator lang sql injection (EDB-13954 / XFDB-59621)
Why Quiet Expertise No Longer Wins Cybersecurity Clients
BGP 系统的 Bug 处理方式导致部分网络故障
CVE-2012-2908 | Viscacha 0.8.1.1 bbcodetag sql injection (EDB-18873 / XFDB-75575)
New Android Malware GhostSpy Let Attacker Take Full Control Over Infected Devices
A sophisticated new Android malware strain called GhostSpy has emerged as a significant threat to mobile device security, demonstrating advanced capabilities that allow cybercriminals to achieve complete control over infected smartphones and tablets. This web-based Remote Access Trojan (RAT) employs a multi-stage infection process, beginning with a seemingly innocuous dropper application that silently escalates privileges […]
The post New Android Malware GhostSpy Let Attacker Take Full Control Over Infected Devices appeared first on Cyber Security News.
Russia-linked APT Laundry Bear linked to 2024 Dutch Police attack
Not Every CVE Deserves a Fire Drill: Focus on What’s Exploitable
CVE-2008-3163 | Regretless Dodos Mail 2.5 dodosmail.php dodosmail_header_file path traversal (EDB-32011 / XFDB-43625)
Nova Ransomware Group Targets Education NGO in El Salvador
You must login to view this content
RALord
You must login to view this content