Aggregator
Dropserver 漏洞可致攻击者绕过身份验证并获得完全控制权
Pocket Card Users Under Attack Via Sophisticated Phishing Campaign
A highly targeted phishing campaign is currently exploiting Pocket Card users through elaborately crafted emails that appear to originate from the legitimate financial service provider. The campaign, active since early March 2025, has already compromised an estimated 3,000 accounts, resulting in unauthorized transactions and credential theft. The malicious actors behind this attack employ convincing Pocket […]
The post Pocket Card Users Under Attack Via Sophisticated Phishing Campaign appeared first on Cyber Security News.
Keeping Secrets Out of Logs: Strategies That Work
tl;dr: There's no silver bullet for keeping secrets out of logs, but if we put several "lead bullets" in the right places, we have a good chance of success.
The post Keeping Secrets Out of Logs: Strategies That Work appeared first on Security Boulevard.
Operation Red Card – 300+ Cyber Criminals Arrested Linking to Multiple Hacking Activities
INTERPOL led a multi-national law enforcement operation dubbed “Operation Red Card,” which has resulted in the arrest of over 300 suspected cyber criminals. Operation Red Card, conducted from November 2024 to February 2025, targeted cross-border criminal syndicates responsible for mobile banking fraud, investment scams, and messaging app exploitation. The operation involved law enforcement agencies from […]
The post Operation Red Card – 300+ Cyber Criminals Arrested Linking to Multiple Hacking Activities appeared first on Cyber Security News.
CVE-2017-17090 | Digium Asterisk chan_skinny Channel Driver chan_skinny.c Request resource management (DLA 1225-1 / EDB-43992)
波音将为美国空军制造下一代隐形战斗机 F-47
VMware 漏洞被恶意利用以绕过安全控制并部署勒索软件
Medusa ransomware uses malicious Windows driver ABYSSWORKER to disable security tools
Defensie werkt aan een schaalbare krijgsmacht met meer reservisten
CVE-2025-2744 | zhijiantianya ruoyi-vue-pro 2.4.1 Material Upload Interface upload-news-image File path traversal
CVE-2025-2743 | zhijiantianya ruoyi-vue-pro 2.4.1 Material Upload Interface upload-temporary File path traversal
CVE-2025-2742 | zhijiantianya ruoyi-vue-pro 2.4.1 Material Upload Interface upload-permanent File path traversal
Hackers Could Drop Teams Malware via Browser’s Cache Smuggling
A novel attack vector combining browser cache exploitation and DLL proxying has emerged as a significant threat to organizations using Microsoft Teams and OneDrive. Dubbed Browser Cache Smuggling, this technique allows attackers to bypass traditional security defenses by leveraging browsers’ caching mechanisms to deliver malware disguised as benign files. Modern browsers cache static files (e.g., images, […]
The post Hackers Could Drop Teams Malware via Browser’s Cache Smuggling appeared first on Cyber Security News.