Aggregator
Threat Actors Update Android Droppers to Remain Effective with Even Simple Malware
Threat actors are increasingly refining Android droppers to circumvent enhanced security measures, extending their utility beyond sophisticated banking trojans to simpler malware variants like SMS stealers and basic spyware. Historically, droppers served as innocuous entry points for payloads requiring elevated permissions, such as Accessibility Services, particularly after Android 13’s API restrictions limited direct installations. These […]
The post Threat Actors Update Android Droppers to Remain Effective with Even Simple Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CISA Alerts on Git Arbitrary File Write Flaw Actively Exploited
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding a critical vulnerability in Git (CVE-2025-48384) that enables arbitrary file writes and has already been observed in active exploitation campaigns. The flaw arises from Git’s inconsistent handling of carriage return characters (CR) in its configuration files, potentially allowing threat actors to execute […]
The post CISA Alerts on Git Arbitrary File Write Flaw Actively Exploited appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Major Cyber Attacks in August 2025: 7-Stage Tycoon2FA Phishing, New ClickFix Campaign, and Salty2FA
Phishing kits and stealers didn’t slow down this August, and neither did we. ANY.RUN analysts tracked some of the month’s most dangerous campaigns, from a 7-stage Tycoon2FA phishing chain to Rhadamanthys delivered via ClickFix, and the discovery of Salty2FA, a brand-new PhaaS framework linked to Storm-1575. All were analyzed inside ANY.RUN’s Interactive Sandbox, revealing full […]
The post Major Cyber Attacks in August 2025: 7-Stage Tycoon2FA Phishing, New ClickFix Campaign, and Salty2FA appeared first on ANY.RUN's Cybersecurity Blog.
CVE-2019-7338 | ZoneMinder up to 1.32.3 Stored cross site scripting (Issue 2454 / Nessus ID 255174)
CVE-2017-0374 | Config-Model up to 2.x INC Array lib/Config/Model.pm Directory access control (Nessus ID 255181)
CVE-2019-6956 | Freeware Advanced Audio Decoder 2.8.8 libfaad/ps_dec.c ps_mix_phase out-of-bounds (DLA 1899-1 / Nessus ID 255182)
CVE-2024-31582 | FFmpeg 6.1 vf_codecview.c draw_block_rectangle buffer overflow (Nessus ID 255189)
一图看懂|山石网科2025半年报
CVE-2023-50008 | FFmpeg 6.1-3-g466799d4f5 libavutil/mem.c av_malloc buffer overflow (ID 10701 / Nessus ID 255189)
CVE-2023-50007 | FFmpeg 6.1-3-g466799d4f5 thelibavutil/samplefmt.c theav_samples_set_silence buffer overflow (ID 10700 / Nessus ID 255189)
PhpSpreadsheet Library Vulnerability Lets Attackers Inject Malicious HTML Input
A critical Server-Side Request Forgery (SSRF) vulnerability has been discovered in the popular PhpSpreadsheet library, allowing attackers to inject malicious HTML input when processing spreadsheet documents. The vulnerability, assigned CVE-2025-54370, affects multiple versions of the phpoffice/phpspreadsheet package and carries a high severity rating with CVSS v3.1 score of 7.5 and CVSS v4.0 score of 8.7. Vulnerability Details The security flaw was discovered by Aleksey […]
The post PhpSpreadsheet Library Vulnerability Lets Attackers Inject Malicious HTML Input appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Encryption Backdoor in Military/Police Radios
【安全圈】WarLock勒索软件组织宣称攻击Colt电信公司,数据已被挂售
【安全圈】HOOK 木马进化:银行木马、间谍软件与勒索软件三位一体
【安全圈】Docker Desktop曝高危漏洞:恶意容器可劫持Windows主机
【安全圈】黑客动用上万IP,大规模扫描微软 RDP 服务
Users of WhatsApp Desktop on Windows Face Code Execution Risk Via Python
A critical security risk has emerged for Windows users of WhatsApp Desktop who also have Python installed. Attackers can exploit a flaw in how WhatsApp Desktop handles .pyz (Python archive) files, delivering arbitrary code execution on the victim’s machine with a single click. Researchers have discovered that a maliciously crafted .pyz file—normally used to bundle Python applications—can be disguised […]
The post Users of WhatsApp Desktop on Windows Face Code Execution Risk Via Python appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.