Aggregator
Netherlands Confirms China's Salt Typhoon Targeted Small Dutch Telcos
CVE-2025-58123 | BGP Monitoring on Checkmk certificate validation
CVE-2025-48316 | ItayXD Responsive Mobile-Friendly Tooltip Plugin up to 1.6.6 on WordPress cross site scripting
CVE-2025-48314 | salubrio Add Code To Head Plugin up to 1.17 on WordPress cross site scripting
CVE-2025-48313 | Kevin Heath Tripadvisor Shortcode Plugin up to 2.2 on WordPress cross site scripting
CVE-2025-48312 | 文派翻译 WPAvatar Plugin up to 1.9.3 on WordPress cross site scripting
CVE-2025-48305 | vikingjs Goal Tracker for Patreon Plugin up to 0.4.6 on WordPress cross site scripting
CVE-2025-48110 | mibuthu Link View Plugin up to 0.8.0 on WordPress cross site scripting
Lazarus Group Targets Windows 11 with ClickFix Tactics and Fake Job Offers
The notorious Lazarus advanced persistent threat (APT) organization, which Qi’anxin internally tracks as APT-Q-1, has been seen using the ClickFix technique to penetrate Windows 11 and macOS systems in a sophisticated progression of social engineering attacks. Known for high-profile incidents like the 2014 Sony Pictures hack, Lazarus has shifted from intelligence theft to financial asset […]
The post Lazarus Group Targets Windows 11 with ClickFix Tactics and Fake Job Offers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-58126 | VMware vSAN on Checkmk certificate validation
CVE-2025-48315 | stanton119 HTML Plugin up to 0.51 on WordPress cross site scripting
CVE-2025-48100 | extremeidea bidorbuy Store Integrator Plugin up to 2.12.0 on WordPress code injection
ShadowSilk Leveraging Penetration-Testing Tools, Public Exploits to Attack Organizations
ShadowSilk first surfaced in late 2023 as a sophisticated threat cluster targeting government entities across Central Asia and the broader APAC region. Exploiting known public vulnerabilities and widely available penetration-testing frameworks, the group orchestrates data exfiltration campaigns with a high degree of automation and stealth. Initial deliveries were achieved via phishing emails containing password-protected archives; […]
The post ShadowSilk Leveraging Penetration-Testing Tools, Public Exploits to Attack Organizations appeared first on Cyber Security News.
犹他大学 | 探索深度学习模型中的固有后门
Zoom превращается в ловушку: у бизнесменов крадут аккаунты в Google и Telegram прямо во время «встречи»
UK and US Blame Three Chinese Tech Firms for Global Cyberattacks
Stay Ahead of Ransomware – Proper Incident Containment… and Horror Stories
GitLab security advisory (AV25-549)
ShadowSilk Targets Penetration-Testing Tools and Public Exploits to Breach Organizations
Cybersecurity experts discovered an advanced persistent threat (APT) cluster called ShadowSilk in a thorough research published by Group-IB. Since at least 2023, this group has been actively breaching government institutions in Central Asia and the Asia-Pacific area. The group’s operations, ongoing as of July 2025, focus primarily on data exfiltration, leveraging a sophisticated blend of […]
The post ShadowSilk Targets Penetration-Testing Tools and Public Exploits to Breach Organizations appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.