Aggregator
CVE-2021-27285 | Inspur ClusterEngine 4.0 getJobsByShell default permission
CVE-2025-48373 | schule111 Schule up to 1.0.0 API Response index.js authorization (GHSA-37h9-qq7c-6mc9)
CVE-2025-48375 | schule111 Schule up to 1.0.0 forgot_password.php allocation of resources (GHSA-h3f2-mc85-67gc)
CVE-2023-6944 | Red Hat Developer Hub Catalog Import information disclosure (EUVD-2024-0292)
CVE-2024-52532 | GNOME libsoup up to 3.6.0 WebSocket Data memory allocation (ID 391 / Nessus ID 210910)
CVE-2024-54679 | CyberPanel restartMySQL denial of service (EUVD-2024-52650)
CVE-2024-55076 | Grocy up to 4.3.0 cross-site request forgery (EUVD-2024-52734)
Threat detection for SharePoint vulnerabilities
TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations
Cybersecurity Landscape 2025 Amid Record Vulnerabilities, Infrastructure Breakdown, and Growing Digital Risks
The year 2025 has unfolded in an environment marked by eroding trust in vulnerability databases, an explosive growth in cyberattacks, and digital overload for businesses. Data breaches have become routine, the number of CVEs continues to break records, and traditional defense approaches no longer work. Cybersecurity expert Ilia Dubov, Head of Information Security and Compliance […]
The post Cybersecurity Landscape 2025 Amid Record Vulnerabilities, Infrastructure Breakdown, and Growing Digital Risks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Don’t let outdated IGA hold back your security, compliance, and growth
Дежавю для 200 млн шахматистов — любимая платформа Chess.com снова сливает их секреты
South Carolina School District Data Breach Affects 31,000 People
Embracing the Next Generation of Cybersecurity Talent
North Korean Threat Actors Reveal Their Tactics in Replacing Infrastructure With New Assets
Over the past year, cybersecurity researchers have observed a surge in activity from North Korean threat actors leveraging military-grade social engineering techniques to target professionals in the cryptocurrency industry. This campaign, dubbed Contagious Interview, employs a deceptively benign job-application process that masks the delivery of sophisticated malware. Victims receive invitations to participate in mock assessments […]
The post North Korean Threat Actors Reveal Their Tactics in Replacing Infrastructure With New Assets appeared first on Cyber Security News.