Aggregator
安全热点周报:黑客劫持企业 XWiki 服务器进行加密货币挖矿
OpenAI安全框架被提示注入攻击背后:AI安全防护需“三位一体”
Hackers Weaponizing Windows LNK 0-Day RCE Vulnerability to Attack European Diplomats
Chinese-affiliated threat actor UNC6384 has been actively leveraging a critical Windows shortcut vulnerability to target European diplomatic entities across Hungary, Belgium, Serbia, Italy, and the Netherlands. Arctic Wolf researchers identified this sophisticated cyber espionage campaign operating throughout September and October 2025, representing a significant evolution in the group’s operational capabilities and geographic reach. The attack […]
The post Hackers Weaponizing Windows LNK 0-Day RCE Vulnerability to Attack European Diplomats appeared first on Cyber Security News.
Dark Reading Confidential: Cyber's Role in the Rapid Rise of Digital Authoritarianism
再获认可!锦行科技入选2025年广州市“四化”赋能重点平台!
【漏洞通告】Docker Compose OCI路径遍历漏洞 CVE-2025-62725
Suspected Chinese actors compromise U.S. Telecom firm Ribbon Communications
BlackShrantac
You must login to view this content
每周勒索威胁摘要
Цена ошибки — рак у будущих поколений. В США перезапускают редактирование эмбрионов
CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
Kimsuky and Lazarus Hacker Groups Unveil New Tools That Enable Backdoor and Remote Access
Threat actors operating under the control of North Korea’s regime have demonstrated continued technical sophistication by introducing advanced malware toolsets designed to establish persistent backdoor access and remote control over compromised systems. Recent findings have revealed that Kimsuky, known for orchestrating espionage campaigns, deployed HttpTroy, while the Lazarus APT group introduced an enhanced variant of […]
The post Kimsuky and Lazarus Hacker Groups Unveil New Tools That Enable Backdoor and Remote Access appeared first on Cyber Security News.
Progress Releases Patch for MOVEit Transfer Resource Consumption Flaw
Progress Software has released security patches to address a high-severity vulnerability in its MOVEit Transfer platform discovered on October 29, 2025. The flaw, tracked as CVE-2025-10932, affects the AS2 module and allows attackers to consume system resources without proper restrictions. Attribute Details CVE ID CVE-2025-10932 Vulnerability Type Uncontrolled Resource Consumption (CWE-400) Affected Component Progress MOVEit Transfer […]
The post Progress Releases Patch for MOVEit Transfer Resource Consumption Flaw appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Windows LNK UI Spoofing Vulnerability Weaponized for Remote Code Execution
A sophisticated cyber espionage campaign targeting European diplomatic institutions has been uncovered, signaling a strategic escalation by Chinese-affiliated threat actor UNC6384. Central to this campaign is the exploitation of the Windows shortcut (LNK) UI misrepresentation vulnerability—ZDI-CAN-25373, first disclosed in March 2025—paired with tailored social engineering schemes mimicking authentic diplomatic conferences. UNC6384, previously documented by Google’s […]
The post Windows LNK UI Spoofing Vulnerability Weaponized for Remote Code Execution appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Intel и AMD старались, а брешь все испортила. Как вытащить данные из самых «неприступных» VM
CVE-2025-6520 | Abis BAPSIS prior 202510271606 sql injection (EUVD-2025-37308)
特朗普命令美国重启核武器试验
Researchers Develop Linux Rootkit That Evades Elastic EDR Protections
Security researchers have unveiled a sophisticated Linux rootkit capable of bypassing Elastic Security’s advanced detection mechanisms, demonstrating critical vulnerabilities in endpoint detection and response solutions. The Singularity rootkit employs multiple obfuscation and evasion techniques to defeat static signature analysis and behavioral monitoring systems that typically identify malicious kernel modules. Elastic Security’s endpoint detection framework typically […]
The post Researchers Develop Linux Rootkit That Evades Elastic EDR Protections appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Threat Actors Using Multilingual ZIP File to Attack Financial and Government Organizations
Sophisticated threat actors have orchestrated a coordinated multilingual phishing campaign targeting financial and government organizations across East and Southeast Asia. The campaign leverages carefully crafted ZIP file lures combined with region-specific web templates to deceive users into downloading staged malware droppers. Recent analysis reveals three interconnected clusters spanning Traditional Chinese, English, and Japanese-language variants, each […]
The post Threat Actors Using Multilingual ZIP File to Attack Financial and Government Organizations appeared first on Cyber Security News.