Aggregator
CVE-2025-41647 | Lenze PLC Designer V4 up to 4.0.0 cleartext storage (VDE-2025-043 / EUVD-2025-19082)
Threat Actors Manipulate Search Results, Exploit ChatGPT and Luma AI Popularity to Deliver Malicious Payloads
Threat actors are leveraging the soaring popularity of AI tools like ChatGPT and Luma AI to distribute malware through deceptive websites. Zscaler ThreatLabz researchers have uncovered a network of malicious AI-themed sites, often hosted on platforms like WordPress, that exploit Black Hat SEO techniques to poison search engine rankings. These sites appear prominently in search […]
The post Threat Actors Manipulate Search Results, Exploit ChatGPT and Luma AI Popularity to Deliver Malicious Payloads appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2007-3182 | Vincent Hor Calendarix 0.7.2007-03-07 calendar.php ycyear cross site scripting (EDB-30232 / XFDB-35045)
【安全圈】Microsoft Exchange 邮件服务器遭大规模键盘记录攻击,全球逾 70 台被入侵
【安全圈】TeamViewer 高危漏洞通报(CVE-2025-36537)
【安全圈】WordPress 结账页出现高隐匿性恶意插件:伪装成 Cloudflare 窃取用户信息
【安全圈】“银狐”木马新变种席卷全国:数千企业员工遭网络钓鱼诈骗
Скачал VPN для защиты — получил троян для слива паролей: безопасность наоборот
Ransomware Attacks Dip in May Despite Persistent Retail Targeting
Pro-Iranian Hacktivist Group Leaks Personal Records from the 2024 Saudi Games
CVE-2002-1143 | Microsoft Word/Excel 98 Field Code information disclosure (VU#899713 / EDB-21812)
Kubernetes NodeRestriction Flaw Lets Nodes Bypass Resource Authorization
A critical security vulnerability (CVE-2025-4563) in Kubernetes allows nodes to bypass authorization checks for dynamic resource allocation, potentially enabling privilege escalation in affected clusters. The flaw resides in the NodeRestriction admission controller, which fails to validate resource claim statuses during pod creation when the DynamicResourceAllocation feature is enabled. This oversight permits compromised nodes to create […]
The post Kubernetes NodeRestriction Flaw Lets Nodes Bypass Resource Authorization appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Mainline Health Systems data breach impacted over 100,000 individuals
CVE-2007-2290 | CafeLog B2 0.6.1 b2archives.php b2inc file inclusion (EDB-29904 / XFDB-33884)
Как банкоматы превращаются в автоматы по выдаче денег без карты и ПИН-кода
NetNerve: AI-Powered Tool for Deep PCAP Threat Detection
As cyber threats evolve in sophistication and volume, traditional packet capture (PCAP) analysis tools are struggling to keep pace. Enter NetNerve, an AI-powered platform designed to revolutionize how security professionals, researchers, and students analyze network traffic and detect threats hidden within PCAP and CAP files. AI at the Core of Packet Analysis NetNerve leverages advanced […]
The post NetNerve: AI-Powered Tool for Deep PCAP Threat Detection appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Mastercard adds secure on-chain access to crypto
Mastercard and Chainlink are teaming up to power Swapper Finance, a new way to buy crypto directly from decentralized exchanges (DEXs) using any Mastercard. Holders of Mastercard’s 3.5 billion cards around the world will now be able to directly purchase crypto on Uniswap, through instant and secure crypto-to-fiat conversion, intrinsically connecting DeFi and the financial mainstream. Swapper is powered by XSwap, an DEX built out of the Chainlink ecosystem. Swapper uses the Chainlink standard for … More →
The post Mastercard adds secure on-chain access to crypto appeared first on Help Net Security.
Akamai Reveals New Strategies for Defenders to Combat Cryptominer Attacks
Akamai has unveiled two proactive strategies to disrupt malicious cryptominer operations, as detailed in the final installment of their Cryptominers’ Anatomy blog series. These techniques exploit the inherent design of common mining topologies, focusing on the Stratum protocol and pool policies to effectively halt botnet-driven cryptomining campaigns. Innovative Techniques Target Mining Topologies While the methods […]
The post Akamai Reveals New Strategies for Defenders to Combat Cryptominer Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.