Aggregator
Думали — картинка для блога, оказалось — дело на 8 тысяч исков и сотни миллионов
Tea снова слил женские тайны. Второй раз за неделю. И теперь всё стало гораздо хуже…
Lionishackers Exfiltrate Sensitive Corporate Databases for Sale on the Dark Web
Outpost24’s threat intelligence researchers have uncovered the operations of Lionishackers, a financially motivated cyber threat actor specializing in the exfiltration and illicit sale of corporate databases. This group employs an opportunistic approach to target selection, with a notable preference for entities in Asian countries such as Thailand, Syria, and India. While primarily driven by profit, […]
The post Lionishackers Exfiltrate Sensitive Corporate Databases for Sale on the Dark Web appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2018-8815 | Alkacon OpenCms 10.5.3 SVG Image gallery cross site scripting (Issue 587 / EDB-44392)
CVE-2018-15139 | OpenEMR up to 5.0.1.3 File Upload manage_site_files.php unrestricted upload (ID 163110 / EDB-49998)
CVE-2018-15152 | OpenEMR up to 5.0.1.3 register.php improper authentication (ID 163181 / EDB-50017)
CVE-2018-6180 | Online Voting System 1.0 Password 7pk security (EDB-43967)
CVE-2018-8903 | Open-AudIT Professional 2.1 Name/Description cross site scripting (EDB-44354)
CVE-2018-17428 | OPAC EasyWeb Five 5.7 index.php?scelta=campi biblio sql injection (EDB-45518)
Linux 6.16 Released with Performance and Networking Enhancements
Linux creator Linus Torvalds announced the release of Linux kernel version 6.16 on July 27, 2025, marking the end of what he described as a “nice and calm” development cycle. The latest stable release brings numerous performance improvements, networking enhancements, and driver fixes across multiple hardware platforms, continuing the kernel’s evolution with focused stability improvements […]
The post Linux 6.16 Released with Performance and Networking Enhancements appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
The hidden risks of browser extensions – and how to stay safe
New macOS Vulnerability Allows Attackers to Steal Private Files by Bypassing TCC
Microsoft Threat Intelligence has uncovered a critical macOS vulnerability that enables attackers to bypass Apple’s Transparency, Consent, and Control (TCC) framework, potentially exposing sensitive user data including files protected by privacy controls and information cached by Apple Intelligence. Vulnerability Overview The newly discovered vulnerability, dubbed “Sploitlight” by Microsoft researchers, exploits Spotlight plugins to access private […]
The post New macOS Vulnerability Allows Attackers to Steal Private Files by Bypassing TCC appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-5684 | MetForm Plugin up to 4.0.1 on WordPress mf-template cross site scripting
CVE-2025-26400 | SolarWinds Web Help Desk up to 12.8.6 Configuration xml external entity reference
银河系发现首个幽灵行星状星云
Покупали онлайн? Поздравляем — F6 нашла ваши данные в открытом доступе
Pro-Ukraine Hacktivists Ground Dozens of Aeroflot Flights
Varonis unveils Next-Gen Database Activity Monitoring for agentless database security and compliance
Varonis released Next-Gen Database Activity Monitoring (DAM), a new approach to database security that deploys quickly and overcomes the challenges legacy vendors face in preventing data breaches and ensuring regulatory compliance. Databases are the backbone of the global economy and serve as the central nervous system of AI, yet they’ve never been harder to protect. Lack of competition and complex barriers to entry have stifled innovation in the DAM market. “Legacy DAM solutions use outdated, … More →
The post Varonis unveils Next-Gen Database Activity Monitoring for agentless database security and compliance appeared first on Help Net Security.
Hackers Exploit IIS Servers with New Web Shell Script for Full Remote Control
Security researchers have examined a complex online shell script called UpdateChecker.aspx that was installed on compromised Internet Information Services (IIS) servers in response to a notable increase in cyberthreats directed at Microsoft Windows installations. This analysis stems from a follow-up investigation by FortiGuard’s Incident Response Team into a prolonged intrusion at a Middle East critical […]
The post Hackers Exploit IIS Servers with New Web Shell Script for Full Remote Control appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.