Aggregator
SparkKitty Malware Attacking iOS and Android Device Users to Steal Photos From Gallery
A sophisticated Trojan malware known as SparkKitty has been actively targeting iOS and Android devices since early 2024, infiltrating both official app stores and untrusted websites to steal images from users’ device galleries. This malware campaign, which appears to be an evolution of the previous SparkCat operation, poses significant threats to users primarily in Southeast […]
The post SparkKitty Malware Attacking iOS and Android Device Users to Steal Photos From Gallery appeared first on Cyber Security News.
NCCA 2025 | 信息系统应用与安全专题会议
XwormRAT Hackers Leverage Code Injection for Sophisticated Malware Deployment
A sophisticated new distribution method for XwormRAT malware that leverages steganography techniques to hide malicious code within legitimate files. This discovery highlights the evolving tactics of cybercriminals who are increasingly using advanced obfuscation methods to bypass security detection systems and deceive unsuspecting users. The latest XwormRAT campaign represents a significant evolution in malware distribution methodology, […]
The post XwormRAT Hackers Leverage Code Injection for Sophisticated Malware Deployment appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Citrix Windows Virtual Delivery Agent Vulnerability Let Attackers Gain SYSTEM Privileges
A critical security vulnerability has been discovered in Citrix Windows Virtual Delivery Agent that allows local attackers to escalate privileges and gain SYSTEM-level access to affected systems. The vulnerability, tracked as CVE-2025-6759, affects multiple versions of Citrix Virtual Apps and Desktops and Citrix DaaS platforms, posing significant risks to enterprise environments relying on these virtualization […]
The post Citrix Windows Virtual Delivery Agent Vulnerability Let Attackers Gain SYSTEM Privileges appeared first on Cyber Security News.
FortiWeb SQL Injection Vulnerability Allows Attacker to Execute Malicious SQL Code
A critical security vulnerability has been discovered in FortiWeb web application firewalls that enables unauthenticated attackers to execute unauthorized SQL commands through specially crafted HTTP and HTTPS requests. This vulnerability, classified as CWE-89 (Improper Neutralization of Special Elements used in an SQL Command), represents a significant threat to organizations relying on FortiWeb for web application […]
The post FortiWeb SQL Injection Vulnerability Allows Attacker to Execute Malicious SQL Code appeared first on Cyber Security News.
一群抹香鲸被拍摄到以站立姿态睡觉
230 万 Chrome 和 Edge 用户安装了会劫持浏览器会话的扩展
知识处理轻松拿捏,360 AI企业知识库助力激活沉睡数据
勒索月报|360独家披露6月勒索软件流行态势,Windows 10成攻击新跳板
Fortinet 修复FortiWeb 中的严重SQL注入漏洞
微软7月补丁星期二值得关注的漏洞
Securing the Frontier - Navigating Security in LLM-Integrated Systems
TapTrap атакует Android: теперь хакерам не нужны ни разрешения, ни согласие
CVE-2025-49826
What is Zero Data Retention and Why it May Be the Future of Secure Automation
Zero Data Retention offers a new path forward. One that enables intelligent automation, deep integrations and real-time workflows — without the baggage of persistent data storage
The post What is Zero Data Retention and Why it May Be the Future of Secure Automation appeared first on Security Boulevard.
【已复现】泛微e-cology 前台SQL注入漏洞
Weekoverzicht Defensieoperaties (video)
MacOS Infostealer AMOS Evolves with Backdoor for Persistent Access
Multiple Apache Tomcat Vulnerabilities Let Attackers Trigger DoS Attacks
Apache Tomcat has addressed three critical denial-of-service (DoS) vulnerabilities that could allow malicious actors to disrupt web applications and services. These security flaws, tracked as CVE-2025-52434, CVE-2025-52520, and CVE-2025-53506, affect all Apache Tomcat versions from 9.0.0.M1 to 9.0.106. The vulnerabilities exploit different attack vectors, including HTTP/2 protocol weaknesses, file upload mechanisms, and stream handling capabilities. […]
The post Multiple Apache Tomcat Vulnerabilities Let Attackers Trigger DoS Attacks appeared first on Cyber Security News.