Aggregator
Link11 European Cyber Report: DDoS attacks reach record levels in the first half of 2025
Link11 European Cyber Report: DDoS attacks reach record levels in the first half of 2025 – 225% more documented DDoS attacks and new attack tactics threaten critical infrastructure: 438 terabytes of attack volume – equivalent to over 7 years of Netflix streaming in 4K Increasingly precise Layer 7 attacks that mimic legitimate traffic Politically motivated […]
The post Link11 European Cyber Report: DDoS attacks reach record levels in the first half of 2025 appeared first on Link11.
CVE-2025-29824 在野 0day 漏洞利用样本研究
Dynatrace Data Breach Exposes Customer Information Stored in Salesforce
Dynatrace has confirmed that customer data stored in Salesforce was exposed following a third-party breach involving Salesloft’s Drift application. The incident, which occurred in August 2025, allowed unauthorized access to Salesforce CRM data across multiple companies. Both Salesloft and Salesforce responded by disabling the compromised integrations and notifying affected customers. Incident Overview The breach stemmed […]
The post Dynatrace Data Breach Exposes Customer Information Stored in Salesforce appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-49461 | Zoom Workplace Desktop up to 6.4.x cross site scripting
CVE-2025-58131 | Zoom Workplace VDI Plugin prior 6.4.10 on macOS Universal Installer for VMware Horizon race condition
CVE-2025-49459 | Zoom Workplace up to 6.4.x on Windows authorization
CVE-2025-49460 | Zoom Workplace Desktop up to 6.4.x argument injection
CVE-2025-58134 | Zoom Workplace Desktop up to 6.4.x on Windows improper authorization
CVE-2025-58135 | Zoom Workplace Desktop up to 6.4.x on Windows information disclosure
CVE-2025-49458 | Zoom Workplace up to 6.4.x buffer overflow
Windows Defender Vulnerability Lets Hackers Hijack and Disable Services Using Symbolic Links
A newly demonstrated attack technique has revealed a flaw in how Windows Defender manages its update and execution mechanism. By exploiting symbolic links, attackers can hijack Defender’s service folders, gain full control over its executables, and even disable the antivirus entirely. How the Exploit Works Windows Defender stores its executables inside versioned folders under ProgramData\Microsoft\Windows Defender\Platform. […]
The post Windows Defender Vulnerability Lets Hackers Hijack and Disable Services Using Symbolic Links appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Scattered Lapsus$ Hunter Continues Aggressive Campaigns via Telegram
You must login to view this content
第九届“强网杯”全国网络安全挑战赛正式启动
Nearly 500 researchers urge EU to rethink controversial CSAM scanning proposal
Nearly 500 scientists and researchers have signed an open letter warning that the latest version of the EU’s Chat Control Proposal would weaken digital security while failing to deliver meaningful protection for children. The signatories represent 34 countries and include well-known cryptographer Bart Preneel of KU Leuven, along with researchers from leading institutions such as ETH Zurich, Johns Hopkins University, and the Max Planck Institute for Security and Privacy. The letter responds to a revised … More →
The post Nearly 500 researchers urge EU to rethink controversial CSAM scanning proposal appeared first on Help Net Security.
APT37 Deploys New Rust and Python Malware Targeting Windows Systems
The North Korean-aligned threat group APT37, also known as ScarCruft, Ruby Sleet, and Velvet Chollima, has evolved its cyber warfare capabilities by deploying sophisticated Rust and Python-based malware in recent campaigns targeting Windows systems. Active since 2012, this advanced persistent threat group continues to focus on South Korean individuals connected to the North Korean regime […]
The post APT37 Deploys New Rust and Python Malware Targeting Windows Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
【Web逆向】极验4代 九宫格协议分析
Kill
You must login to view this content
Kill
You must login to view this content