Aggregator
【安全圈】美联邦法院电子档案系统遭大规模黑客攻击,或泄露机密证人身份
【安全圈】歌手伍佰紧急公告:官网被黑客入侵
【安全圈】突发!上海全市医保系统瘫痪
CVE-2023-1457 | Ubiquiti EdgeRouter X 2.0.9-hotfix.6 Static Routing Configuration next-hop-interface command injection (EUVD-2023-23706)
CVE-2023-1458 | Ubiquiti EdgeRouter X 2.0.9-hotfix.6 OSPF area command injection (EUVD-2023-23707)
CVE-2023-1390 | Linux Kernel TIPC tipc_link_xmit excessive platform resource consumption within a loop (EUVD-2023-23646)
CVE-2023-1456 | Ubiquiti EdgeRouter X 2.0.9-hotfix.6 NAT Configuration command injection (EUVD-2023-23705)
CVE-2023-1417 | GitLab up to 15.9.3/15.10.0 Child Epics access control (Issue 396720 / EUVD-2023-23671)
CVE-2023-1393 | X.Org Server Overlay Window use after free (FEDORA-2023-eb3c27ff25 / EUVD-2023-23649)
CVE-2023-1380 | Linux Kernel cfg80211.c brcmf_get_assoc_ies out-of-bounds (EUVD-2023-23636)
CVE-2023-24620 | Esoteric YamlBeans up to 1.15 YAML Document memory allocation (EUVD-2023-2362)
From legacy to SaaS: Why complexity is the enemy of enterprise security
In this Help Net Security interview, Robert Buljevic, Technology Consultant at Bridge IT, discusses how the coexistence of legacy systems and SaaS applications is changing the way organizations approach security. He explains why finding the right balance between old and new technology is essential for maintaining protection. As more companies move from traditional on-prem setups to SaaS, how is that changing the way they approach security? Are most organizations handling that shift well, or are … More →
The post From legacy to SaaS: Why complexity is the enemy of enterprise security appeared first on Help Net Security.
CVE-2023-1361 | unilogies bumsys up to 2.0.1 sql injection (EUVD-2023-23619)
GPT-5 Compromised Using Echo Chamber and Storytelling Exploits
Cybersecurity researchers have successfully demonstrated a new jailbreaking technique that compromises OpenAI’s GPT-5 model by combining “Echo Chamber” algorithms with narrative-driven manipulation, raising fresh concerns about the vulnerability of advanced AI systems to sophisticated exploitation methods. Novel Attack Vector Emerges The breakthrough attack, documented by AI safety researchers, represents an evolution in Large Language Model […]
The post GPT-5 Compromised Using Echo Chamber and Storytelling Exploits appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Ваша веб-камера — тихий шпион. Хакеры научили её эмулировать нажатия и красть данные
7-Zip Arbitrary File Write Vulnerability Let Attackers Execute Arbitrary Code
A newly disclosed security vulnerability in the popular 7-Zip file compression software has raised significant concerns in the cybersecurity community. CVE-2025-55188, discovered and reported by security researcher Landon on August 9, 2025, allows attackers to perform arbitrary file writes during archive extraction, potentially leading to code execution on vulnerable systems. The vulnerability affects all versions […]
The post 7-Zip Arbitrary File Write Vulnerability Let Attackers Execute Arbitrary Code appeared first on Cyber Security News.
脱北者爆料:朝鲜网诈背后竟是美韩联手炒作!
揭秘支持乌克兰军队的高度机密的美国非营利组织
7-Zip Vulnerability Lets Hackers Write Files and Run Malicious Code
A security vulnerability has been discovered in the popular 7-Zip file compression utility that could allow attackers to write arbitrary files to victim systems and potentially execute malicious code. The flaw, tracked as CVE-2025-55188, affects all versions of 7-Zip prior to the recently released version 25.01 and stems from improper handling of symbolic links during […]
The post 7-Zip Vulnerability Lets Hackers Write Files and Run Malicious Code appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.