Aggregator
Multiple Critical Vulnerabilities in D-Link Routers Let Attackers Execute Arbitrary Code Remotely
Multiple critical vulnerabilities in D-Link router models could allow remote attackers to execute arbitrary code and gain unauthorized access to the network infrastructure. The vulnerabilities affect all hardware revisions and firmware versions of the non-US DIR-816 models, which have now reached their End-of-Life (EOL) status. Buffer Overflow Flaws Enable Remote Code Execution Four of the […]
The post Multiple Critical Vulnerabilities in D-Link Routers Let Attackers Execute Arbitrary Code Remotely appeared first on Cyber Security News.
RIFT – Microsoft’s New Open-Source Tool to Analyze Malware in Rust Binaries
Microsoft has released RIFT (Rust Identification and Function Tagging), a groundbreaking open-source tool designed to help cybersecurity analysts identify and analyze malware concealed within Rust binaries. The cybersecurity community has witnessed a significant shift toward Rust-based malware development over the past five years. Notable examples include the BlackCat ransomware in December 2021, followed by Hive […]
The post RIFT – Microsoft’s New Open-Source Tool to Analyze Malware in Rust Binaries appeared first on Cyber Security News.
US defense firms must ‘remain vigilant’ against Iranian cyber activity, agencies warn
CVE-2023-47310 | MikroTik RouterOS up to 7.13 IPv6 UDP Traceroute Packet access control (EUVD-2023-51437)
CVE-2024-53621 | Tenda AC1206 15.03.06.23_multi_TD01 formSetCfm buffer overflow (EUVD-2024-54717)
CVE-2025-2895 | IBM Cloud Pak System up to 2.3.4.1 iFix1 cross site scripting (EUVD-2025-19539)
Fraudsters behind €460 million crypto scam arrested in Spain
Spanish authorities arrested five members of a criminal network responsible for laundering €460 million stolen through global cryptocurrency investment fraud schemes. Source: Europol The operation, led by the Guardia Civil with support from Europol and law enforcement in Estonia, France, and the United States, uncovered that more than 5,000 victims worldwide were defrauded. The action day led to: 5 arrests (3 on the Canary Islands and 2 in Madrid), and 5 searches (3 on the … More →
The post Fraudsters behind €460 million crypto scam arrested in Spain appeared first on Help Net Security.
CVE-2025-32897
CVE-2025-53392
Europol Dismantles $540 Million Cryptocurrency Fraud Network, Arrests Five Suspects
Weekly Threat Landscape Digest – Week 26
This week’s cyber threat landscape reveals a surge in zero-day exploit activity, advanced phishing schemes, and the active targeting of […]
The post Weekly Threat Landscape Digest – Week 26 appeared first on HawkEye.
服务器 GPU 配备太多的显存会导致 Linux 系统休眠出现问题
Iranian Cyber Threats Persist Despite Ceasefire, US Intelligence Warns
2100+ Citrix Servers Vulnerable to Actively Exploited Bypass Authentication Vulnerability
Over 2,100 vulnerable Citrix NetScaler servers remain exposed to active exploitation, despite patches being available for critical vulnerabilities that allow attackers to bypass authentication mechanisms and steal session tokens. Cybersecurity firm ReliaQuest has issued warnings about active exploitation of two critical vulnerabilities affecting Citrix NetScaler ADC and NetScaler Gateway systems. The vulnerabilities, tracked as CVE-2025-5777 […]
The post 2100+ Citrix Servers Vulnerable to Actively Exploited Bypass Authentication Vulnerability appeared first on Cyber Security News.
Food Retailer Ahold Delhaize Discloses Data Breach Impacting 2.2 Million
Hackers Use .PIF Files and UAC Bypass to Drop Remcos Malware on Windows
A sophisticated new phishing campaign has emerged, leveraging obsolete Windows file formats and advanced evasion techniques to distribute the notorious Remcos Remote Access Trojan. The attack chain employs DBatLoader as its primary delivery mechanism, utilizing a combination of User Account Control bypass methods, obfuscated scripts, and Living Off the Land Binaries abuse to establish persistent […]
The post Hackers Use .PIF Files and UAC Bypass to Drop Remcos Malware on Windows appeared first on Cyber Security News.