Aggregator
Measuring characteristics of TCP connections at Internet scale
CVE-2025-12461 | Grupo Castilla Epsilon RH 3.03.36.0185 About.aspx insufficiently protected credentials
CVE-2025-12142 | ABB Terra AC Wallbox up to 1.8.33 buffer overflow
New ‘Gentlemen’ RaaS Appears on Hacking Forums, Targeting Windows, Linux and ESXi
Threat intelligence researchers have identified a new ransomware-as-a-service (RaaS) operation called The Gentlemen’s RaaS, being actively recruited on underground hacking forums by an operator using the handle zeta88. The cross-platform threat represents a significant evolution in ransomware capabilities, offering attackers specialized encryption lockers for Windows, Linux, and ESXi systems coded in both Go and C […]
The post New ‘Gentlemen’ RaaS Appears on Hacking Forums, Targeting Windows, Linux and ESXi appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Chrome to Alert Users “Always Use Secure Connections” While Opening Public HTTP Sites
Google has announced a significant security initiative that will fundamentally change how Chrome handles unsecured web connections. Beginning with Chrome 154’s release in October 2026, the browser will enable the “Always Use Secure Connections” feature by default, requiring users to approve access to any public website lacking HTTPS encryption before proceeding. This strategic shift represents […]
The post Chrome to Alert Users “Always Use Secure Connections” While Opening Public HTTP Sites appeared first on Cyber Security News.
New Zscaler ZDX features strengthen zero trust and streamline performance monitoring
Zscaler unveiled new Zscaler Digital Experience (ZDX) innovations that help enterprises monitor and fix performance issues faster, achieving real-time insights across the internet and endpoint, cutting issue detection by 98%, and resolving issues in minutes to strengthen SLAs and minimize downtime. These enhancements deliver visibility that helps to ensure a seamless zero trust experience and optimal productivity for users everywhere. Troubleshooting user issues is complex; isolating the device, network, or application is challenging. Siloed teams … More →
The post New Zscaler ZDX features strengthen zero trust and streamline performance monitoring appeared first on Help Net Security.
Acronis Cyber Protect Local brings unified cyber protection to cloud-restricted environments
Acronis announced the launch of Acronis Cyber Protect Local, a solution that delivers natively integrated cyber resilience for on-premises, sovereign private cloud, and air-gapped IT and OT environments. Designed for organizations where cloud deployment is not an option, the solution combines backup, recovery, cybersecurity, and endpoint management in a single platform, enabling agile, resilient, and compliant IT and OT operations while reducing costs and operational complexity. Acronis Cyber Protect Local keeps the data securely within … More →
The post Acronis Cyber Protect Local brings unified cyber protection to cloud-restricted environments appeared first on Help Net Security.
Google Wear OS Flaw Lets Any App Send Texts on Behalf of Users
A critical vulnerability discovered in Google Messages for Wear OS has exposed millions of smartwatch users to a significant security risk. Identified as CVE-2025-12080, the flaw allows any installed application to send text messages on behalf of the user without requiring permissions, confirmation, or user interaction. Security researcher Gabriele Digregorio discovered the vulnerability in March […]
The post Google Wear OS Flaw Lets Any App Send Texts on Behalf of Users appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Чем умнее ИИ, тем глупее человек. Чат-бот теперь — официально признанная замена думающей головы
《网络空间安全科学学报》第二届青年编委招募
Cybercriminals Launch Flood of Fake Forex Platforms to Harvest Logins
Fraudulent investment platforms impersonating legitimate cryptocurrency and forex exchanges have emerged as the primary financial threat across Asia, with organized crime groups operating at unprecedented scale. These sophisticated scams leverage social engineering tactics to deceive victims into transferring funds to attacker-controlled systems, blurring the lines between legitimate trading and criminal enterprise. The threat extends far […]
The post Cybercriminals Launch Flood of Fake Forex Platforms to Harvest Logins appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.