Aggregator
CVE-2025-5012 | Workreap Plugin up to 3.3.2 on WordPress workreap_temp_upload_to_media unrestricted upload (EUVD-2025-18160)
Linux Malware Authors Targeting Cloud Environments with ELF Binaries
Unit 42, Palo Alto Networks’ threat intelligence division, has recently conducted investigations that have revealed a worrying trend: threat actors are increasingly creating and modifying Linux Executable and Linkable Format (ELF) malware to attack cloud infrastructure. With cloud adoption skyrocketing and Linux-based systems underpinning the vast majority of cloud workloads estimates suggest between 70% and […]
The post Linux Malware Authors Targeting Cloud Environments with ELF Binaries appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CIS Benchmarks June 2025 Update
Радиотрюк тайно превращает ноутбук в шпионский динамик, который разговаривает сквозь стены
Qilin
You must login to view this content
Qilin
You must login to view this content
Qilin
You must login to view this content
Zero-click AI data leak flaw uncovered in Microsoft 365 Copilot
CVE-2025-5687 | Mozilla VPN up to 2.27.x on macOS Local Privilege Escalation (EUVD-2025-18102)
CVE-2023-4246 | GiveWP Plugin up to 2.33.3 on WordPress Plugin Installation cross-site request forgery (EUVD-2023-54117)
CVE-2025-35941 | mySCADA myPRO 1.3/1.4 information disclosure (EUVD-2025-18113)
CVE-2025-0163 | IBM Security Verify Access up to 10.0.8 observable response discrepancy (EUVD-2025-18121)
CVE-2025-3473 | IBM Security Guardium 12.1 insecure inherited permissions (EUVD-2025-18122)
CVE-2024-0922 | Tenda AC10U 15.03.06.49_multi_TDE01 formQuickIndex PPPOEPassword stack-based overflow (EUVD-2024-16703)
Midnight-Sun-CTF-2025-WEB
Former Black Basta Members Use Microsoft Teams and Python Scripts in 2025 Attacks
Infostealer crackdown: Operation Secure takes down 20,000 malicious IPs and domains
More than 20,000 malicious IP addresses and domains used by information-stealing malware were taken down during an international cybercrime crackdown led by INTERPOL. Called Operation Secure, the effort ran from January to April 2025 and involved law enforcement from 26 countries. Teams tracked down servers, mapped physical networks, and carried out targeted takedowns. Law enforcement seizing equipment (Source: INTERPOL) Before the operation began, INTERPOL worked with cybersecurity companies Group-IB, Kaspersky, and Trend Micro to create … More →
The post Infostealer crackdown: Operation Secure takes down 20,000 malicious IPs and domains appeared first on Help Net Security.