Aggregator
CVE-2024-7694
CVE-2020-7796
CVE-2025-32355
CVE-2025-59793
Red Card 2.0: INTERPOL busts scam networks across Africa, seizes millions
CVE-2026-2848 | SourceCodester Simple Responsive Tourism Website 1.0 Registration Master.php?f=register Username sql injection
Пока Илон Маск обещает – китайцы вживляют. В Шанхае уже вовсю двигают курсоры силой мысли
CVE-2026-2847 | UTT HiPER 520 1.7.7-160105 Web Management Interface formReleaseConnect sub_44EFB4 Isp_Name os command injection
651 arrested, $4.3 million recovered in African cybercrime sweep
Operation Red Card 2.0, supported by INTERPOL and involving law enforcement agencies from 16 African countries, led to 651 arrests and the recovery of more than $4.3 million from online scams. In Nigeria police took down a fraud ring that used phishing, identity theft and social engineering to scam victims (Source: Interpol) Running from 8 December 2025 to 30 January 2026, the operation targeted networks behind high-yield investment fraud, mobile money scams and fraudulent loan … More →
The post 651 arrested, $4.3 million recovered in African cybercrime sweep appeared first on Help Net Security.
Lockbit
You must login to view this content
FBI Reports 1,900 ATM Jackpotting Incidents Since 2020, $20M Lost in 2025
CVE-2026-2846 | UTT HiPER 520 1.7.7-160105 Web Management Interface /goform/formPdbUpConfig sub_44D264 policyNames os command injection
Submit #753967: sourcecodester.com Simple Responsive Tourism Website 1.0 SQL Injection [Accepted]
Hackers Actively Exploiting Critical BeyondTrust Vulnerability to Deploy VShell and SparkRAT
A critical vulnerability in BeyondTrust’s remote support software is being actively exploited by hackers to deliver dangerous backdoors on compromised systems. The flaw, tracked as CVE-2026-1731, carries a CVSS score of 9.9 and lets attackers run system commands with no login required. BeyondTrust released a security advisory on February 6, 2026, confirming that CVE-2026-1731 is […]
The post Hackers Actively Exploiting Critical BeyondTrust Vulnerability to Deploy VShell and SparkRAT appeared first on Cyber Security News.
Submit #753965: UTT HiPER 520 nv520v3v1.7.7-160105 Command Injection [Accepted]
Submit #753964: UTT HiPER 520 nv520v3v1.7.7-160105 Command Injection [Accepted]
Hackers Using OAuth Apps in Microsoft Entra ID to Establish Persistence
Hackers are increasingly abusing OAuth applications in Microsoft Entra ID to gain persistent access, blending in as normal “business integrations” while keeping access even after defenders reset passwords. Recent Wiz research and incident reporting show attackers using fake OAuth apps, deceptive consent prompts, and redirect URLs to steal tokens and maintain long-term footholds in Microsoft 365 environments. […]
The post Hackers Using OAuth Apps in Microsoft Entra ID to Establish Persistence appeared first on Cyber Security News.
PromptSpy abuses Gemini AI to gain persistent access on Android
Security Compass brings policy-driven security and compliance to agentic AI development
Security Compass released SD Elements for Agentic AI Workflow, enabling organizations to stay in control of security and compliance as AI becomes part of software development. AI agents introduce an unprecedented opportunity to accelerate the velocity of software development, but concerns about security and compliance are holding back adoption in regulated industries. Emerging laws like EU Cyber Resilience Act increase the burden of security on software manufacturers. Using the SD Elements Agentic AI workflow, you … More →
The post Security Compass brings policy-driven security and compliance to agentic AI development appeared first on Help Net Security.