Aggregator
CVE-2018-6180 | Online Voting System 1.0 Password 7pk security (EDB-43967)
CVE-2018-8903 | Open-AudIT Professional 2.1 Name/Description cross site scripting (EDB-44354)
CVE-2018-17428 | OPAC EasyWeb Five 5.7 index.php?scelta=campi biblio sql injection (EDB-45518)
Linux 6.16 Released with Performance and Networking Enhancements
Linux creator Linus Torvalds announced the release of Linux kernel version 6.16 on July 27, 2025, marking the end of what he described as a “nice and calm” development cycle. The latest stable release brings numerous performance improvements, networking enhancements, and driver fixes across multiple hardware platforms, continuing the kernel’s evolution with focused stability improvements […]
The post Linux 6.16 Released with Performance and Networking Enhancements appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
The hidden risks of browser extensions – and how to stay safe
New macOS Vulnerability Allows Attackers to Steal Private Files by Bypassing TCC
Microsoft Threat Intelligence has uncovered a critical macOS vulnerability that enables attackers to bypass Apple’s Transparency, Consent, and Control (TCC) framework, potentially exposing sensitive user data including files protected by privacy controls and information cached by Apple Intelligence. Vulnerability Overview The newly discovered vulnerability, dubbed “Sploitlight” by Microsoft researchers, exploits Spotlight plugins to access private […]
The post New macOS Vulnerability Allows Attackers to Steal Private Files by Bypassing TCC appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-5684 | MetForm Plugin up to 4.0.1 on WordPress mf-template cross site scripting
CVE-2025-26400 | SolarWinds Web Help Desk up to 12.8.6 Configuration xml external entity reference
银河系发现首个幽灵行星状星云
Покупали онлайн? Поздравляем — F6 нашла ваши данные в открытом доступе
Pro-Ukraine Hacktivists Ground Dozens of Aeroflot Flights
Varonis unveils Next-Gen Database Activity Monitoring for agentless database security and compliance
Varonis released Next-Gen Database Activity Monitoring (DAM), a new approach to database security that deploys quickly and overcomes the challenges legacy vendors face in preventing data breaches and ensuring regulatory compliance. Databases are the backbone of the global economy and serve as the central nervous system of AI, yet they’ve never been harder to protect. Lack of competition and complex barriers to entry have stifled innovation in the DAM market. “Legacy DAM solutions use outdated, … More →
The post Varonis unveils Next-Gen Database Activity Monitoring for agentless database security and compliance appeared first on Help Net Security.
Hackers Exploit IIS Servers with New Web Shell Script for Full Remote Control
Security researchers have examined a complex online shell script called UpdateChecker.aspx that was installed on compromised Internet Information Services (IIS) servers in response to a notable increase in cyberthreats directed at Microsoft Windows installations. This analysis stems from a follow-up investigation by FortiGuard’s Incident Response Team into a prolonged intrusion at a Middle East critical […]
The post Hackers Exploit IIS Servers with New Web Shell Script for Full Remote Control appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.