Aggregator
CVE-2025-45471 | measure-cold-start 1.4.1 Customer Cloud Account permission (ID 32 / EUVD-2025-16155)
CVE-2025-23182 | UBtech Freepass 1.3.1807.1500 information exposure (EUVD-2025-16161)
CVE-2025-2506 | EnterpriseDB pglogical/BDR PGD authorization
SecWiki News 2025-05-22 Review
Blurring Lines Between Scattered Spider & Russian Cybercrime
健美先生有高死亡风险
Halo Security Achieves SOC 2 Type 1 Compliance, Validating Security Controls for Its Attack Surface Management Platform
Halo Security, a leading provider of attack surface management and penetration testing services, today announced it has successfully achieved SOC 2 Type 1 compliance following a comprehensive audit by Insight Assurance. This certification validates that Halo Security’s security controls and practices are properly designed and implemented to meet the SOC 2 trust principles. “Security isn’t a destination; it’s […]
The post Halo Security Achieves SOC 2 Type 1 Compliance, Validating Security Controls for Its Attack Surface Management Platform appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Uber的跨云密钥管理解决方案
Hackers Deploy Weaponized npm Packages to Target React and Node.js JavaScript Frameworks
Socket’s Threat Research Team, a series of malicious npm packages have been found lurking in the JavaScript ecosystem for over two years, amassing more than 6,200 downloads. These weaponized packages, targeting popular frameworks like React, Vue.js, Vite, Node.js, and the Quill Editor, were crafted by a threat actor under the npm alias “xuxingfeng” (linked to […]
The post Hackers Deploy Weaponized npm Packages to Target React and Node.js JavaScript Frameworks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Halo Security Achieves SOC 2 Type 1 Compliance, Validating Security Controls for Its Attack Surface Management Platform
Halo Security, a leading provider of attack surface management and penetration testing services, today announced it has successfully achieved SOC 2 Type 1 compliance following a comprehensive audit by Insight Assurance. This certification validates that Halo Security’s security controls and practices are properly designed and implemented to meet the SOC 2 trust principles. “Security isn’t a destination; it’s […]
The post Halo Security Achieves SOC 2 Type 1 Compliance, Validating Security Controls for Its Attack Surface Management Platform appeared first on Cyber Security News.
从娱乐到办公,AR 眼镜正在发生「生产力转向」
大芯片和小米 YU7,雷军要用技术挽回人心
AI-Generated TikTok Videos Used to Distribute Infostealer Malware
Police arrests 270 dark web vendors, buyers in global crackdown
Malicious VS Code Extensions Target Windows Solidity Developers to Steal Login Credentials
Datadog Security Research has uncovered a targeted malware campaign aimed at Solidity developers on Windows systems, using malicious Visual Studio Code (VS Code) extensions as the initial attack vector. Identified as the work of a single threat actor tracked as MUT-9332, this operation deployed three trojanized extensions solaibot, among-eth, and blankebesxstnion disguised as legitimate tools […]
The post Malicious VS Code Extensions Target Windows Solidity Developers to Steal Login Credentials appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Unpatched Windows Server vulnerability allows full domain compromise
A privilege escalation vulnerability in Windows Server 2025 can be used by attackers to compromise any user in Active Directory (AD), including Domain Admins. “The [“BadSuccessor”] attack exploits the delegated Managed Service Account (dMSA) feature that was introduced in Windows Server 2025, works with the default configuration, and is trivial to implement,” Akamai researcher Yuval Gordon warned. BadSuccessor attack technique explained The exploitable feature was introduced to help organizations replace the legacy non-managed service accounts … More →
The post Unpatched Windows Server vulnerability allows full domain compromise appeared first on Help Net Security.
Ubuntu, nginx и немного зла: как вредонос притворился веб-сервером и заразил всё подряд
Windows 10紧急更新修复了MIDI恢复问题
Lumma Stealer Infrastructure Behind Global Attacks on Millions of Users Dismantled
The U.S. Justice Department, in collaboration with the FBI and private sector partners like Microsoft, has announced the disruption of the Lumma Stealer (also known as LummaC2) malware infrastructure. This global operation targeted the notorious Malware-as-a-Service (MaaS) platform, which has been linked to over 1.7 million instances of data theft worldwide. The unsealing of two […]
The post Lumma Stealer Infrastructure Behind Global Attacks on Millions of Users Dismantled appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.