Aggregator
Ransomware Attack on Pennsylvania’s AG Office Disrupts Court Cases
Hackers Threaten Google Following Data Exposure
A recent breach involving a third-party Salesforce system used by Google has sparked an unusual escalation. Although no Gmail inboxes, passwords, or internal Google systems were accessed, attackers gained entry to a sales database that included names, phone numbers, email addresses, and internal notes related to small business clients. This type of data is often […]
The post Hackers Threaten Google Following Data Exposure appeared first on Centraleyes.
The post Hackers Threaten Google Following Data Exposure appeared first on Security Boulevard.
Phishing Campaign Exploits Ads to Breach Hotel Property Management Systems
A sophisticated malvertising campaign has emerged that specifically targets hoteliers and vacation rental operators by impersonating well-known service providers. Okta Threat Intelligence reports that attackers have used malicious search engine advertisements—particularly sponsored ads on Google Search—to lure unsuspecting hospitality professionals to counterfeit login portals. The ultimate goal: harvesting credentials for cloud-based property management and guest […]
The post Phishing Campaign Exploits Ads to Breach Hotel Property Management Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
When Browsers Become the Attack Surface: Rethinking Security for Scattered Spider
1st September – Threat Intelligence Report
For the latest discoveries in cyber research for the week of 1st September, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES American consumer credit reporting agency TransUnion has suffered a data breach that resulted in the exposure of sensitive personal information for over 4.4 million individuals in the United States. The leaked data […]
The post 1st September – Threat Intelligence Report appeared first on Check Point Research.
CVE-2025-9797 | mrvautin expressCart up to b31302f4e99c3293bd742c6d076a721e168118b0 Edit Product Page /admin/product/edit/ injection (Issue 288 / EUVD-2025-26362)
CVE-2025-9796 | thinkgem JeeSite up to 5.12.1 EncodeUtils.java decodeUrl2 cross site scripting (Issue 33 / EUVD-2025-26363)
Submit #641127: mrvautin https://github.com/mrvautin/expressCart <=1.0.0 Frame Injection [Accepted]
Docker Desktop逃逸漏洞(CVE-2025-9074)分析报告
CVE-2025-9795 | xujeff tianti 天梯 up to 2.3 UploadController.java ajaxUploadFile upfile unrestricted upload (Issue 43 / EUVD-2025-26359)
Submit #641125: thinkgem https://github.com/thinkgem/jeesite5 <=v5.12.1 XSS [Accepted]
CVE-2025-9794 | Campcodes Computer Sales and Inventory System 1.0 pos_transac.php?action=add cash/firstname sql injection (EUVD-2025-26360)
Submit #641122: xujeff https://github.com/xujeff/tianti <=2.3 Dangerous type of file upload (CWE-434) [Accepted]
AI Agent祛魅之路
Galaxy Kylin: эта ОС умеет то, что не может Windows — безвозвратно стирает компромат
Submit #642559: Campcodes Computer Sales and Inventory System V1.0 SQL Injection [Duplicate]
Submit #641103: Campcodes Computer Sales and Inventory System V1.0 SQL Injection [Accepted]
Hackers Exploit Email Marketing Platforms to Deliver Hidden Malware
In recent months, Trustwave SpiderLabs—a LevelBlue company renowned for its threat intelligence and incident response services—has observed a marked uptick in phishing campaigns that leverage legitimate email marketing platforms to cloak malicious links. By hijacking established infrastructure and URL redirectors, attackers are evading traditional defenses and duping recipients into divulging sensitive information. To combat these […]
The post Hackers Exploit Email Marketing Platforms to Deliver Hidden Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Critical Next.js Flaw Lets Attackers Bypass Authorization Controls
A newly disclosed critical vulnerability in the Next.js framework, tracked as CVE-2025-29927, allows unauthenticated attackers to bypass middleware-based authorization checks by exploiting improper handling of the x-middleware-subrequest HTTP header. This flaw impacts all versions of Next.js that rely on this header to differentiate between internal subrequests and external traffic, risking exposure of protected routes and administrative interfaces. […]
The post Critical Next.js Flaw Lets Attackers Bypass Authorization Controls appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.