Aggregator
CVE-2025-46627 | Tenda RX2 Pro 16.03.30.14 Telnet Service weak password (EUVD-2025-13232)
CVE-2025-46628 | Tenda RX2 16.03.30.14 UDP Packet ate improper authorization (EUVD-2025-13234)
CVE-2025-46629 | Tenda RX2 Pro 16.03.30.14 UDP ate access control (EUVD-2025-13236)
CVE-2025-46626 | Tenda RX2 Pro 16.03.30.14 hard-coded key (EUVD-2025-13235)
CVE-2025-46625 | Tenda RX2 Pro 16.03.30.14 API Endpoint setLanCfg command injection (EUVD-2025-13260)
CVE-2025-46630 | Tenda RX2 Pro 16.03.30.14 Web Management Portal /goform/ate access control (EUVD-2025-13266)
CVE-2024-27967 | Michael Leithold DSGVO All in One for WP Plugin up to 4.3 on WordPress cross-site request forgery
Threat Actors Use Fake DocuSign Notifications to Steal Corporate Data
DocuSign has emerged as a cornerstone for over 1.6 million customers worldwide, including 95% of Fortune 500 companies, and boasts a user base exceeding one billion. However, this widespread adoption has made DocuSign a prime target for cybercriminals. Leveraging the platform’s trusted reputation, threat actors are increasingly deploying sophisticated phishing campaigns to harvest corporate credentials, […]
The post Threat Actors Use Fake DocuSign Notifications to Steal Corporate Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
The Browser Company 停止开发 Arc 转向 AI 驱动浏览器 Dia
Unsophisticated Actors, Poor Hygiene Prompt CI Alert for Oil & Gas
An alert from CISA, FBI, EPA and DOE came after CISA observed attacks by “unsophisticated” cyber actors leveraging “basic and elementary intrusion techniques” against ICS/SCADA systems.
The post Unsophisticated Actors, Poor Hygiene Prompt CI Alert for Oil & Gas appeared first on Security Boulevard.
DragonForce Ransomware Leveraged in MSP Attack Using RMM Tool
BSidesLV24 – PasswordsCon – Combating Phone Spoofing With STIR/SHAKEN
Author/Presenter: Per Thorsheim
Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel.
The post BSidesLV24 – PasswordsCon – Combating Phone Spoofing With STIR/SHAKEN appeared first on Security Boulevard.
AI 模型出现崩溃迹象
CVE-2010-2438 | Laubrotel G.CMS generator lang sql injection (EDB-13954 / XFDB-59621)
Why Quiet Expertise No Longer Wins Cybersecurity Clients
BGP 系统的 Bug 处理方式导致部分网络故障
CVE-2012-2908 | Viscacha 0.8.1.1 bbcodetag sql injection (EDB-18873 / XFDB-75575)
New Android Malware GhostSpy Let Attacker Take Full Control Over Infected Devices
A sophisticated new Android malware strain called GhostSpy has emerged as a significant threat to mobile device security, demonstrating advanced capabilities that allow cybercriminals to achieve complete control over infected smartphones and tablets. This web-based Remote Access Trojan (RAT) employs a multi-stage infection process, beginning with a seemingly innocuous dropper application that silently escalates privileges […]
The post New Android Malware GhostSpy Let Attacker Take Full Control Over Infected Devices appeared first on Cyber Security News.