Aggregator
Threat Actors Hacking SAP Critical Zero-Day
Threat actors are exploiting a zero-day flaw in a partially deprecated SAP tool still widely used by governments and businesses. On Friday, SAP's security division, Onapsis, disclosed that CVE-2025-31324 is "actively exploited in the wild."
Employee Benefits Firm Says 4 Million Affected by 2024 Hack
Employee benefits administrator Verisource Services Inc. has told regulators that a hack discovered in February 2024 has affected 4 million individuals, up significantly from initial estimates reported last summer. The company already faces several lawsuits involving its earlier lowball estimates.
ISMG Editors: Day 1 Overview of RSAC Conference 2025
ISMG Editors convened in San Francisco for coverage of RSAC Conference. Panelists shared an overview of opening-day speakers and hot topics, including the growth of AI, uncertainties in the global threat landscape, the Innovation Sandbox contest and Cryptographers' Panel session.
HHS Fines Neurology Practice $25K for Ransomware Attack
Federal regulators fined a New York neurology practice $25,000 following an investigation into a 2020 ransomware breach affecting nearly 7,000 individuals. Comprehensive Neurology failed to conduct an accurate and thorough risk analysis, regulators said.
新型Android恶意软件会窃取用户信用卡信息以实施NFC中继攻击
新型Android恶意软件会窃取用户信用卡信息以实施NFC中继攻击
Massive Attack: 4,800+ IPs Used to Target Git Configuration Files
A recent surge in cyber reconnaissance has put thousands of organizations at risk after GreyNoise, a global threat intelligence platform, detected an alarming spike in attempts to access sensitive Git configuration files. Between April 20 and 21, GreyNoise observed the daily count of unique IPs targeting these files soar past 4,800-a record-breaking figure and a […]
The post Massive Attack: 4,800+ IPs Used to Target Git Configuration Files appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-4080 | PHPGurukul Online Nurse Hiring System 1.0 /admin/view-request.php viewid sql injection
feicong-env下载,Ubuntu、macOS开箱即用的虚拟机环境,适用软件开发与逆向分析
feicong-env下载,Ubuntu、macOS开箱即用的虚拟机环境,适用软件开发与逆向分析
CVE-2025-4079 | PCMan FTP Server up to 2.0.7 RENAME Command buffer overflow
CVE-2025-4078 | Wangshen SecGate 3600 2400 ?g=log_export_file file_name path traversal
CVE-2025-4077 | code-projects School Billing System 1.0 searchrec Name stack-based overflow
Submit #560558: PHPGurukul Online Nurse Hiring System V1.0 SQL Injection [Accepted]
Why B2B Leaders Must Rethink Cybersecurity Strategies With AI at the Core
There must be a fundamental shift in strategy for B2B leaders, one that places artificial intelligence (AI) threat detection at the core of cyberdefense.
The post Why B2B Leaders Must Rethink Cybersecurity Strategies With AI at the Core appeared first on Security Boulevard.