Aggregator
Citrix Bleed 2漏洞被网络犯罪分子利用进行攻击
国家网络安全通报中心:重点防范境外恶意网址和恶意IP
Citrix Bleed 2漏洞被网络犯罪分子利用进行攻击
«Кнопки плюс разум» — Китай представил ИИ-телефон за 1500 ₽
Octalyn Stealer Steals VPN Configurations, Passwords and Cookies in Structured Folders
A sophisticated new credential stealer disguised as a legitimate forensic toolkit has emerged on GitHub, targeting sensitive user data including VPN configurations, browser credentials, and cryptocurrency wallet information. The Octalyn Stealer, first identified in July 2025, presents itself as an educational research tool while functioning as a fully operational malware designed for large-scale data theft […]
The post Octalyn Stealer Steals VPN Configurations, Passwords and Cookies in Structured Folders appeared first on Cyber Security News.
Blender 4.5 LTS 释出
L3/L4 атаки упали на 81%, но HTTP-флуд вырос до 4,8 миллиарда pps — это новая эра DDoS
Node.js Vulnerabilities Leave Windows Apps Vulnerable to Path Traversal and HashDoS
The Node.js project has released critical security updates across multiple release lines to address two high-severity vulnerabilities that pose significant risks to Windows applications and could enable denial-of-service attacks. The vulnerabilities, identified as CVE-2025-27210 and CVE-2025-27209, affect active Node.js release lines including versions 20.x, 22.x, and 24.x, prompting immediate security patches released on July 15, […]
The post Node.js Vulnerabilities Leave Windows Apps Vulnerable to Path Traversal and HashDoS appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
To Gunicorn or to Poetry, That is The Question
The Lie That Loves You Back
Ukraine Is Becoming Hot Spot #1 for Cybersecurity Innovation
VMware ESXi and Workstation Vulnerabilities Allow Host-Level Code Execution
Broadcom disclosed four critical vulnerabilities in VMware’s virtualization suite on July 15, 2025, enabling attackers to escape virtual machines and execute code directly on host systems. The flaws, discovered through the Pwn2Own competition, affect ESXi, Workstation, Fusion, and VMware Tools across enterprise and desktop environments. Vulnerability Overview CVE ID Component Vulnerability Type CVSS Score Impact […]
The post VMware ESXi and Workstation Vulnerabilities Allow Host-Level Code Execution appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-22224
CVE-2025-7503
CVE-2025-7357 | LITEON IC48A/IC80A FTP Server credentials storage (icsa-25-196-03)
Product showcase: Enzoic for Active Directory
Enzoic for Active Directory is an easy-to-install plugin that integrates with Microsoft Active Directory (AD) to set, monitor, and remediate unsafe passwords and credentials. In essence, it serves as an always-on sentinel for AD, preventing users from choosing compromised or weak passwords and alerting administrators if any existing credentials become exposed in a breach. By layering continuous credential monitoring and customizable password policy enforcement onto AD, Enzoic aims to neutralize the very risks that make … More →
The post Product showcase: Enzoic for Active Directory appeared first on Help Net Security.
CVE-2025-6151 | TP-Link TL-WR940N V4/TL-WR841N V11 WanSlaacCfgRpm.htm dnsserver1 buffer overflow (EUVD-2025-18451)
Experts unpack the biggest cybersecurity surprises of 2025
2025 has been a busy year for cybersecurity. From unexpected attacks to new tactics by threat groups, a lot has caught experts off guard. We asked cybersecurity leaders to share the biggest surprises they’ve seen so far this year and what those surprises might mean for the rest of us. Chris Acevedo, Principal Consultant, Optiv The biggest cybersecurity surprise of 2025 has been the speed and sophistication of AI-powered Business Email Compromise, specifically the pivot … More →
The post Experts unpack the biggest cybersecurity surprises of 2025 appeared first on Help Net Security.