Aggregator
CVE-2025-49259 | thembay Hara Plugin up to 1.2.10 on WordPress filename control (EUVD-2025-18649)
CVE-2025-48443 | Trend Micro Password Manager link following (EUVD-2025-18565)
У Маска — орбитальная армия из тысяч спутников. У Китая — один лазер. Угадайте, кто выигрывает
AWS Extends Scope of Cybersecurity Alliance with CrowdStrike
Amazon Web Services (AWS) and CrowdStrike this week expanded their alliance to include an incident response that is now available on the Amazon Web Services (AWS) marketplace. Announced at the AWS re:Inforce 2025 conference, the Falcon for AWS Security Incident Response is a managed hosted service running on the AWS cloud that makes extensive use..
The post AWS Extends Scope of Cybersecurity Alliance with CrowdStrike appeared first on Security Boulevard.
Halo Security Honored with 2025 MSP Today Product of the Year Award
Miami, Florida, 18th June 2025, CyberNewsWire
The post Halo Security Honored with 2025 MSP Today Product of the Year Award appeared first on Security Boulevard.
Halo Security Honored with 2025 MSP Today Product of the Year Award
Unusually patient suspected Russian hackers pose as State Department in ‘sophisticated’ attacks on researchers
They weren’t in any hurry, according to Citizen Lab, and used an interesting attack vector. Google Threat Intelligence Group also provided details on the attacks.
The post Unusually patient suspected Russian hackers pose as State Department in ‘sophisticated’ attacks on researchers appeared first on CyberScoop.
Famous Chollima Hackers Attacking Windows and MacOS Users With GolangGhost RAT
North Korean-aligned threat actors from the infamous Famous Chollima group have escalated their cyber operations by deploying a sophisticated new Python-based remote access trojan targeting Windows and macOS users in the cryptocurrency and blockchain sectors. The malware campaign represents a significant evolution of their previously documented GolangGhost RAT, demonstrating the group’s continued adaptation and technical […]
The post Famous Chollima Hackers Attacking Windows and MacOS Users With GolangGhost RAT appeared first on Cyber Security News.
Alleged Leak of Montgomery County, Maryland Government Data
More than 5 million affected by data breach at healthcare tech firm Episource
Ты не сдавал кровь, не резал кожу, не жаловался. А пластырь уже всё понял
Alleged Sale of GitLab Access to Government Entities Across Multiple Countries
Cyber Jihad Movement Targeted the Website of Bezeq International
Insecure GitHub Actions in Open Source Projects MITRE and Splunk Exposes Critical Vulnerabilities
A comprehensive security investigation has revealed widespread vulnerabilities in GitHub Actions workflows across major open source repositories, including those maintained by prestigious organizations such as MITRE and Splunk. The discovery highlights a concerning pattern of insecure continuous integration and continuous delivery (CI/CD) configurations that expose these projects to potential supply chain attacks and unauthorized access […]
The post Insecure GitHub Actions in Open Source Projects MITRE and Splunk Exposes Critical Vulnerabilities appeared first on Cyber Security News.
Trump’s TikTok Tarry — Yet Again, Ban-Can Kicked Down the Road
PAFACA Pause Persists: Won’t somebody PLEASE think of the children?
The post Trump’s TikTok Tarry — Yet Again, Ban-Can Kicked Down the Road appeared first on Security Boulevard.
Amazon превратил офис в полигон для испытаний. Кто не справится — заменят скриптом
AgentSmith Flaw in LangSmith’s Prompt Hub Exposed User API Keys, Data
New SuperCard Malware Using Hacked Android Phones to Relay Data from Users Payment Cards to Attackers Device
In a concerning development for mobile payment security, cybersecurity experts have identified a sophisticated new malware strain named “SuperCard” that exploits Android devices to steal payment card data. This malicious application, a modified version of the legitimate NFCGate program, intercepts Near Field Communication (NFC) traffic during contactless payments, effectively turning compromised phones into relay devices […]
The post New SuperCard Malware Using Hacked Android Phones to Relay Data from Users Payment Cards to Attackers Device appeared first on Cyber Security News.