Aggregator
SecWiki News 2025-03-19 Review
更多最新文章,请访问SecWiki
CVE-2025-26485 | Beta80 Life 1st Identity Manager 1.5.2.14234 REST API information disclosure
CVE-2025-30154 | reviewdog action-setup malicious code
CVE-2025-23382 | Dell Secure Connect Gateway Appliance 5.26.00.20 exposure.c exposure of sensitive system information to an unauthorized control sphere
CVE-2025-26475 | Dell Secure Connect Gateway Appliance 5.26.00.20 Live-Restore Setting improper authentication
CVE-2025-29401 | Emlog Pro 2.5.7 PHP File /views/plugin.php unrestricted upload
CVE-2025-29783 | vLLM up to 0.7.x ZMQ/TCP deserialization
Hackers Exploit Severe PHP Flaw to Deploy Quasar RAT and XMRig Miners
量子注入(Quantum Injection)
Cybercriminals Taking Advantage of 'Shadow' Alliances, AI
VanHelsing
mySCADA myPRO Manager RCE Vulnerabilities Allow Remote Attackers to Take Control of ICS Devices
In a significant discovery, PRODAFT’s security research team has identified two critical vulnerabilities in the mySCADA myPRO Manager, a widely used Supervisory Control and Data Acquisition (SCADA) management solution. These vulnerabilities, if exploited, could grant unauthorized access to industrial control networks, potentially leading to severe operational disruptions and financial losses. The vulnerabilities are classified as […]
The post mySCADA myPRO Manager RCE Vulnerabilities Allow Remote Attackers to Take Control of ICS Devices appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Identity Attack Surface Management (IASM): The Convergence of Identity Security Frameworks
As cyber threats evolve, Identity Attack Surface Management (IASM) emerges as a critical approach that unifies existing security frameworks to protect digital identities. Discover how this convergence strengthens your security posture against unauthorized access and credential theft.
The post Identity Attack Surface Management (IASM): The Convergence of Identity Security Frameworks appeared first on Security Boulevard.
Hackers Use RMM Tools to Maintain Persistence and Navigate Networks Undetected
Threat actors have increasingly been leveraging legitimate remote monitoring and management (RMM) software to infiltrate and navigate through networks undetected. RMM tools, such as AnyDesk, Atera Agent, MeshAgent, NetSupport Manager, Quick Assist, ScreenConnect, Splashtop, and TeamViewer, are widely used by organizations for essential IT tasks like system updates, asset management, and endpoint troubleshooting. However, their […]
The post Hackers Use RMM Tools to Maintain Persistence and Navigate Networks Undetected appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Gemini 2.0 Flash 让任何人都能 PS
Threat Actors Leverage Legacy Drivers to Circumvent TLS Certificate Validation
Threat actors have recently been exploiting legacy drivers to bypass certificate validation, leveraging a technique known as “Legacy Driver Exploitation.” This method involves using vulnerable drivers to evade security measures and distribute malware, as highlighted in a recent security advisory. The attack primarily utilizes the Gh0stRAT malware to remotely control infected systems and cause further […]
The post Threat Actors Leverage Legacy Drivers to Circumvent TLS Certificate Validation appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Threat Actors Steal 3.2 Billion Login Credentials and Infect 23 Million Devices Worldwide
In a stark revelation of the escalating cyber threat landscape, Flashpoint’s latest intelligence report highlights the alarming rise in compromised credentials and malware infections. In 2024, threat actors managed to steal an unprecedented 3.2 billion login credentials, marking a 33% increase from the previous year. This staggering figure underscores the growing reliance of cybercriminals on […]
The post Threat Actors Steal 3.2 Billion Login Credentials and Infect 23 Million Devices Worldwide appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.