Aggregator
CVE-2022-25687 | Google Android buffer overflow (A-238106629)
CVE-2022-25736 | Google Android out-of-bounds (A-238214356)
Scattered Spider Malware Targets Klaviyo, HubSpot, and Pure Storage Platforms
Silent Push researchers have identified that the notorious hacker collective Scattered Spider, also known as UNC3944 or Octo Tempest, continues to actively target prominent services in 2025, including Klaviyo, HubSpot, and Pure Storage. This group, active since at least 2022, has built a reputation for executing sophisticated social engineering attacks to harvest usernames, login credentials, […]
The post Scattered Spider Malware Targets Klaviyo, HubSpot, and Pure Storage Platforms appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
【通知】四川警察学院2025年公开招聘博士等高层次人才的公告
【资料】论人工智能的毁灭风险
【通知】四川警察学院2025年公开招聘博士等高层次人才的公告
【资料】论人工智能的毁灭风险
ColorTokens + Nozomi Networks: A Partnership That’s Built for the Trenches of OT and IoT Security
Discover how ColorTokens and Nozomi Networks deliver real-time OT/IoT threat detection and Zero Trust microsegmentation.
The post ColorTokens + Nozomi Networks: A Partnership That’s Built for the Trenches of OT and IoT Security appeared first on ColorTokens.
The post ColorTokens + Nozomi Networks: A Partnership That’s Built for the Trenches of OT and IoT Security appeared first on Security Boulevard.
CVE-2009-0585 | Joe Shaw libsoup 2.1/2.23.1/2.23.6/2.23.91/2.23.92 soup-misc.c soup_base64_encode numeric error (Nessus ID 67822 / ID 155953)
CVE-2009-0586 | gstreamer gst-plugins-base 0.10.22 gst_vorbis_tag_add_coverart numeric error (Nessus ID 67824 / ID 116350)
CVE-2009-0629 | Cisco IOS 12.4jda denial of service (Nessus ID 49034 / ID 43156)
CVE-2009-0630 | Cisco IOS up to 12.3jea Authentication Proxy denial of service (Nessus ID 49030 / ID 43153)
CVE-2009-0631 | Cisco IOS up to 12.3jea Session Initiation Protocol denial of service (Nessus ID 49035 / ID 43155)
Alleged Leak of 1.1 Million Records of Center of Aviation Medicine, Russia
CVE-2004-2297 | Francisco Burzi PHP-Nuke up to 7.3 score memory allocation (EDB-24193 / XFDB-16409)
Germany takes down eXch cryptocurrency exchange, seizes servers
New Supply Chain Attack Targets Legitimate npm Package with 45,000 Weekly Downloads
A sophisticated supply chain attack targeting the popular npm package ‘rand-user-agent’ was discovered on May 5, 2025. The compromise affects a legitimate JavaScript library used to generate randomized user-agent strings for web scraping operations, inserting malicious code that establishes remote access capabilities on infected systems. Security researchers detected suspicious code in version 1.0.110 of the […]
The post New Supply Chain Attack Targets Legitimate npm Package with 45,000 Weekly Downloads appeared first on Cyber Security News.
Alleged Leak Exposes 5.59M Paraguay Citizen Records
BSidesLV24 – Proving Ground – Intel-Driven Adversary Simulation For A Holistic Approach To Cybersecurity
Author/Presenter: Carlos Gonçalves
Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel.
The post BSidesLV24 – Proving Ground – Intel-Driven Adversary Simulation For A Holistic Approach To Cybersecurity appeared first on Security Boulevard.