Aggregator
Qilin
You must login to view this content
New Blitz Malware Targets Windows Servers to Deploy Monero Miner
A new Windows-based malware named Blitz has been identified in 2024, with an updated version detected in early 2025. This malware, actively developed and distributed through deceptive game cheats, poses a significant threat by deploying a Monero cryptocurrency miner alongside information-stealing and denial-of-service (DoS) capabilities. Detailed analysis by Palo Alto Networks’ Unit 42 reveals that […]
The post New Blitz Malware Targets Windows Servers to Deploy Monero Miner appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Next-Gen Developers Are a Cybersecurity Powder Keg
OpenAI Shuts Down ChatGPT Accounts Linked to Russian, Iranian & Chinese Cyber
In an era where artificial intelligence (AI) is reshaping every facet of society, our mission remains steadfast: to ensure that artificial general intelligence (AGI) benefits all of humanity. By advancing AI tools that empower people to solve complex problems, we are laying the groundwork for a future where technology serves as a force for good12. […]
The post OpenAI Shuts Down ChatGPT Accounts Linked to Russian, Iranian & Chinese Cyber appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Ubuntu security advisory (AV25-323)
CVE-2025-27819 | Apache Kafka up to 3.3.2 SASL JAAS JndiLoginModule privilege escalation
CVE-2025-27818 | Apache Kafka up to 3.9.0 SASL JAAS LdapLoginModule privilege escalation
CVE-2025-27817 | Apache Kafka Client up to 3.9.0 server-side request forgery
CVE-2025-49130 | barryvdh laravel-translation-manager up to 0.6.7 cross site scripting (GHSA-j226-63j7-qrqh / EUVD-2025-17461)
CVE-2025-49013 | WilderForge code injection (GHSA-m6r3-c73x-8fw5 / EUVD-2025-17466)
从原生反序列化到Hessian反序列化的hook方法
CVE-2025-48877 | Discourse up to 3.4.3/3.5.0.beta4/3.5.0.beta5-dev Setting allowed_iframes insecure automated optimizations (GHSA-cm93-6m2m-cjcv / EUVD-2025-17469)
CVE-2025-49006 | wasp-lang wasp up to 0.16.5 OAuth default permission (GHSA-qvjc-6xv7-6v5f / EUVD-2025-17468)
CVE-2025-49131 | labring FastGPT up to 4.9.10 Python Module permission assignment (GHSA-f3pf-r3g7-g895 / EUVD-2025-17467)
一次恶意挖矿样本分析到捕获矿池地址
第二届parloo杯应急响应挑战赛应急部分WP
Contrast Northstar pairs runtime data and contextual analysis with AI-powered auto-remediation
Contrast Security announced Northstar, a major release for the company that redefines how businesses see cyberattacks, stop breaches, and protect their applications and APIs. Contrast pairs runtime data and contextual analysis with AI-powered auto-remediation to cut response times and eliminate noise. The Contrast Graph: Live runtime insight that drives precision At the core of the platform is the Contrast Graph, which powers its most advanced capabilities, including optional agentic AI workflows that help teams respond … More →
The post Contrast Northstar pairs runtime data and contextual analysis with AI-powered auto-remediation appeared first on Help Net Security.
Trump cyber executive order drops Biden-era provisions
Hackers Deploy FormBook Malware via Weaponized Excel Files to Target Windows Systems
A critical phishing campaign targeting Windows users has been uncovered by FortiGuard Labs, leveraging malicious Excel attachments to exploit a long-standing vulnerability in older versions of Microsoft Office. This sophisticated attack distributes FormBook, a notorious information-stealing malware designed to harvest sensitive data such as login credentials, keystrokes, and clipboard information. Phishing Campaign Exploits Old Microsoft […]
The post Hackers Deploy FormBook Malware via Weaponized Excel Files to Target Windows Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.