Aggregator
CVE-2025-36557 | F5 BIG-IP Next SPK/BIG-IP Next CNF/BIG-IP Traffic Management Microkernel buffer overflow (K000139571 / Nessus ID 235474)
CVE-2025-20141 | Cisco IOS XR 7.9.2 allocation of resources (cisco-sa-xr792-bWfVDPY / Nessus ID 234055)
CVE-2025-2045 | GitLab Enterprise Edition up to 17.7.5/17.8.3/17.9.0 authorization (Issue 512050 / Nessus ID 232215)
CVE-2025-1540 | GitLab Community Edition/Enterprise Edition up to 17.6.4/17.7.3/17.8.1 Internal Project authorization (Nessus ID 232197)
'ReVault' Security Flaws Impact Millions of Dell Laptops
Lazarus Hackers Use Fake Camera/Microphone Alerts to Deploy PyLangGhost RAT
North Korean state-sponsored threat actors associated with the Lazarus Group, specifically the subgroup known as Famous Chollima, have evolved their tactics by deploying a new Python-based remote access trojan (RAT) dubbed PyLangGhost. This malware represents a reimplementation of the earlier GoLangGhost RAT, exhibiting code structures indicative of AI-assisted porting, including Go-like logic patterns and extensive […]
The post Lazarus Hackers Use Fake Camera/Microphone Alerts to Deploy PyLangGhost RAT appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Nederland draagt bij aan training van 56.000 Oekraïners in Verenigd Koninkrijk
Researchers Uncover ECScape Flaw in Amazon ECS Enabling Cross-Task Credential Theft
Contrast Security Adds GitHub Copilot and Sumo Logic Integrations to ADR Platform
This week at the Black Hat USA 2025 conference, Contrast Security added integrations with GitHub Copilot and the security information and event management (SIEM) platform from Sumo Logic to the Northstar edition of its application detection and response (ADR) platform. The ADR platform from Contrast Security maps live attack paths and correlates runtime behavior to surface..
The post Contrast Security Adds GitHub Copilot and Sumo Logic Integrations to ADR Platform appeared first on Security Boulevard.
Akira and Lynx Ransomware Target MSPs Using Stolen Credentials and Exploited Vulnerabilities
The Acronis Threat Research Unit (TRU) dissected recent samples from the Akira and Lynx ransomware families, revealing incremental enhancements in their ransomware-as-a-service (RaaS) models and double-extortion strategies. Both groups leverage stolen credentials, VPN vulnerabilities, reconnaissance, privilege escalation, defense evasion, and data exfiltration to infiltrate systems, primarily targeting small and medium-sized businesses (SMBs) with recycled yet […]
The post Akira and Lynx Ransomware Target MSPs Using Stolen Credentials and Exploited Vulnerabilities appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Play
You must login to view this content
Play
You must login to view this content
Play
You must login to view this content
Play
You must login to view this content