Aggregator
CVE-2024-54494 | Apple visionOS up to 13.6/18.1 race condition (WID-SEC-2024-3692)
CVE-2024-54494 | Apple macOS up to 13.6/18.1 race condition (WID-SEC-2024-3692)
CVE-2024-54493 | Apple macOS up to 15.1 Privacy Indicators for Microphone state issue (WID-SEC-2024-3692)
CVE-2025-9684 | Portabilis i-Educar up to 2.10 Formula de Cálculo de Média Page edit ID sql injection
CVE-2025-9685 | Portabilis i-Educar up to 2.10 Listagem de áreas de conhecimento Page view ID sql injection
CVE-2025-9686 | Portabilis i-Educar up to 2.10 Listagem de áreas de conhecimento Page edit ID sql injection
CVE-2025-9687 | Portabilis i-Educar up to 2.10 processamentoApi improper authorization
WhatsApp уведомил пользователей о «нулевом клике» и шпионском ПО. Единственное спасение — срочный сброс телефона до заводских настроек
Linus Torvalds 将 Bcachefs 标记为由外部维护
"Кто я?" — "Ты — огромная языковая модель. И ты только что забыл всё, что украл." — Новый алгоритм стирает память ИИ
Hackers Exploit CrushFTP Zero-Day to Take Over Servers
Google Urges 2.5B Gmail Users to Reset Passwords After Salesforce Breach
A sophisticated voice phishing operation has emerged as a significant threat to organizations worldwide, with cybercriminals successfully infiltrating Salesforce environments to steal sensitive data and demand ransom payments. Google’s Threat Intelligence Group has identified this financially motivated campaign, designating the primary threat cluster as UNC6040, which has demonstrated alarming success in breaching corporate networks through […]
The post Google Urges 2.5B Gmail Users to Reset Passwords After Salesforce Breach appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Where Should I Start My Cybersecurity Journey?”
Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling
快手的 2025:一个 4 亿人社区的新陈代谢,与 2600 万人的变现之路
Critical Citrix 0-Day Vulnerability Exploited Since May, Leaving Global Entities Exposed
A critical zero-day vulnerability in Citrix NetScaler products, identified as CVE-2025-6543, has been actively exploited by threat actors since at least May 2025, months before a patch was made available. While Citrix initially downplayed the flaw as a “memory overflow vulnerability leading to unintended control flow and Denial of Service,” it has since been revealed […]
The post Critical Citrix 0-Day Vulnerability Exploited Since May, Leaving Global Entities Exposed appeared first on Cyber Security News.