Aggregator
CVE-2025-52856
CVE-2025-42957
CVE-2024-30088
Интернет по паспорту и скану лица. Теперь «Великий Файрвол» можно купить как сервис, с доставкой и установкой.
MostereRAT Exploits AnyDesk and TightVNC for Remote Access on Windows Systems
Cybersecurity researchers at FortiGuard Labs have uncovered a sophisticated phishing campaign that deploys the MostereRAT remote access trojan to compromise Windows systems. The malware leverages advanced evasion techniques and installs legitimate remote access tools like AnyDesk and TightVNC to maintain persistent, covert access to infected machines. The attack begins with carefully crafted phishing emails targeting […]
The post MostereRAT Exploits AnyDesk and TightVNC for Remote Access on Windows Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
[他山之石] 2025年国家社会科学基金立项名单——图情档、民族学和考古学
Jaguar Land Rover Halts Operations Longer Due to Cyberattack Impact
Jaguar Land Rover’s UK factories will remain closed until at least Wednesday as the company continues to recover from a cyberattack that struck its systems on 31 August. The carmaker shut down its IT networks in response to the breach, halting production at its Halewood and Solihull plants, Wolverhampton engine facility, and sites in Slovakia, […]
The post Jaguar Land Rover Halts Operations Longer Due to Cyberattack Impact appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Сверхбыстрый интернет, квантовые компьютеры и новые методы меддиагностики - одно открытие объединило будущее этих технологий
New Exploitation Method Discovered for Linux Kernel Use-After-Free Vulnerability
A new exploitation method has been discovered for the Linux kernel use-after-free (UAF) vulnerability tracked as CVE-2024-50264. The vulnerability was awarded the Pwnie Award 2025 for Best Privilege Escalation due to its complexity and impact on major Linux distributions. Researchers developed innovative techniques to bypass kernel slab allocator and race condition protections, making exploitation much more feasible than […]
The post New Exploitation Method Discovered for Linux Kernel Use-After-Free Vulnerability appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
如何有效防范网络钓鱼攻击
Signal adds secure backup option for chat history
Losing a phone can mean losing years of conversations. Signal is rolling out a new secure backup feature to help users keep their messages safe without giving up privacy. The problem with lost chats Signal has long avoided cloud backups because they create privacy risks. Storing chats on a company’s servers can expose personal data if that service is hacked or pressured by governments. Until now, Signal only allowed local backups stored on a user’s … More →
The post Signal adds secure backup option for chat history appeared first on Help Net Security.
CVE-2025-57785 | Hiawatha up to 11.7 XSLT show_index double free
CVE-2025-57784 | Hiawatha up to 11.7 Tomahawk handle_admin improper authentication
CVE-2025-57783 | Hiawatha up to 11.7 fetch_request request smuggling
Link11 European Cyber Report: DDoS attacks reach record levels in the first half of 2025
Link11 European Cyber Report: DDoS attacks reach record levels in the first half of 2025 – 225% more documented DDoS attacks and new attack tactics threaten critical infrastructure: 438 terabytes of attack volume – equivalent to over 7 years of Netflix streaming in 4K Increasingly precise Layer 7 attacks that mimic legitimate traffic Politically motivated […]
The post Link11 European Cyber Report: DDoS attacks reach record levels in the first half of 2025 appeared first on Link11.
CVE-2025-29824 在野 0day 漏洞利用样本研究
Dynatrace Data Breach Exposes Customer Information Stored in Salesforce
Dynatrace has confirmed that customer data stored in Salesforce was exposed following a third-party breach involving Salesloft’s Drift application. The incident, which occurred in August 2025, allowed unauthorized access to Salesforce CRM data across multiple companies. Both Salesloft and Salesforce responded by disabling the compromised integrations and notifying affected customers. Incident Overview The breach stemmed […]
The post Dynatrace Data Breach Exposes Customer Information Stored in Salesforce appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.