Aggregator
深入解析eBPF TC层防火墙:无状态检测漏洞与TCP分段、HTTP Range双向绕过
Greek police arrest scammers using fake cell tower hidden in car trunk
Zoom and GitLab Release Security Updates Fixing RCE, DoS, and 2FA Bypass Flaws
«Отдай мастер-пароль, или всё удалим!». Как хакеры берут на мушку пользователей LastPass
New Magecart Attack Inject Malicious JavaScript to Skim Payment Data
A new Magecart-style campaign has emerged, targeting online shoppers through malicious JavaScript code designed to steal payment information directly from ecommerce websites. The attack works by injecting hidden scripts into compromised shopping sites, allowing attackers to intercept sensitive data when customers enter their credit card details during checkout. Magecart attacks represent a significant threat to […]
The post New Magecart Attack Inject Malicious JavaScript to Skim Payment Data appeared first on Cyber Security News.
Alleged Ransomware Attack on Apple’s Second-Largest Manufacturer Luxshare – Confidential Data Exposed
A ransomware attack has reportedly exposed confidential internal documents at a major electronics manufacturer. The breach compromises the company’s critical role in Apple’s global supply chain, including AirPods manufacturing, iPhone production, and Vision Pro assembly. Threat actors have published internal documents revealing sensitive operational intelligence, including production workflows, security procedures, and supply chain protocols. Luxshare […]
The post Alleged Ransomware Attack on Apple’s Second-Largest Manufacturer Luxshare – Confidential Data Exposed appeared first on Cyber Security News.
Microsoft shares workaround for Outlook freezes after Windows update
CVE-2025-67851 | Moodle Data Export injection
CVE-2025-13878 | ISC BIND prior 9.18.44/9.20.18/9.21.17 BRID/HHIT assertion
ACME flaw in Cloudflare allowed attackers to reach origin servers
Открыл README — потерял сервер. В Anthropic хотели упростить жизнь разработчикам, но случайно дали взломщикам ключи от их систем
Peruvian Loan Scam Harvests Cards and PINs via Fake Applications
ErrTraffic Fueling ClickFix by Breaking the Page Visually and Turns Attack to GlitchFix
A new social engineering technique called GlitchFix has emerged, powered by ErrTraffic—a specialized traffic distribution system designed to trick website visitors into downloading malware through visually broken web pages. The attack platform costs around $800 and offers cybercriminals a complete solution for running deceptive campaigns across multiple operating systems. ErrTraffic extends the traditional ClickFix approach […]
The post ErrTraffic Fueling ClickFix by Breaking the Page Visually and Turns Attack to GlitchFix appeared first on Cyber Security News.
Multiple GitLab Vulnerabilities Enables 2FA Bypass and DoS Attacks
Critical security patches addressing five vulnerabilities across versions 18.8.2, 18.7.2, and 18.6.4 for both Community Edition (CE) and Enterprise Edition (EE). The patches resolve issues ranging from high-severity authentication flaws to denial-of-service conditions affecting core platform functionality. Critical 2FA Bypass Vulnerability The most severe vulnerability is CVE-2026-0723, an unchecked return value issue in authentication services […]
The post Multiple GitLab Vulnerabilities Enables 2FA Bypass and DoS Attacks appeared first on Cyber Security News.
Check Point Exposure Management unifies threat intelligence, context, and remediation
Check Point announced Check Point Exposure Management, a new approach designed to help organizations defend against attacks by turning fragmented exposure data into prioritized, actionable, and safe remediation. Exposure Management delivers real-time situational awareness by unifying threat intelligence, dark-web insights, attack surface visibility, exploitability context, and automated remediation, at a time when attackers increasingly use automation and AI to move faster than traditional security operations can respond. “Security teams are flooded with intelligence but still … More →
The post Check Point Exposure Management unifies threat intelligence, context, and remediation appeared first on Help Net Security.
Complex VoidLink Linux Malware Created by AI
LastPass Warns of Fake Maintenance Message Tracking Users to Steal Master Passwords
A critical security alert regarding an active phishing campaign that commenced on January 19, 2026. The malicious actors are impersonating LastPass support staff and sending fraudulent emails claiming urgent vault backup requirements to harvest master passwords from unsuspecting users. The phishing emails employ social engineering tactics by creating artificial urgency, falsely claiming that LastPass maintenance […]
The post LastPass Warns of Fake Maintenance Message Tracking Users to Steal Master Passwords appeared first on Cyber Security News.
Ваш компьютер ведет двойную жизнь. Как домашние IP становятся инструментом в руках хакеров
Cohesity enhances identity resilience with ITDR capabilities
Cohesity has unveiled Identity Threat Detection and Response (ITDR) capabilities that expand its Identity Resilience portfolio, providing a more comprehensive approach to securing and recovering critical identity systems such as Active Directory (AD) and Microsoft Entra ID. Identity is foundational to enterprise security, underpinning all access. Without it, operations grind to a halt, and organizations are at risk. Attackers constantly seek to exploit misconfigurations, privilege escalation paths, and weak controls to gain access to sensitive … More →
The post Cohesity enhances identity resilience with ITDR capabilities appeared first on Help Net Security.