Aggregator
CVE-2025-20088 | Mattermost up to 9.11.5/10.0.3/10.1.3 improper validation of specified type of input (Nessus ID 214906)
CVE-2024-52791 | t2bot matrix-media-repo up to 1.3.7 memory allocation (Nessus ID 214906)
CVE-2024-36402 | t2bot matrix-media-repo up to 1.3.4 improper authentication (Nessus ID 214906)
CVE-2024-52602 | t2bot matrix-media-repo up to 1.3.7 server-side request forgery (Nessus ID 214906)
CVE-2024-52594 | matrix-org gomatrixserverlib server-side request forgery (GHSA-4ff6-858j-r822 / Nessus ID 214906)
CVE-2025-24355 | Updatecli up to 0.92.x exposure of private personal information to an unauthorized actor (GHSA-v34r-vj4r-38j6 / Nessus ID 214906)
CVE-2025-24354 | imgproxy up to 3.27.1 server-side request forgery (Nessus ID 214906)
CVE-2025-24030 | Envoy Gateway up to 1.2.5 Kubernetes Cluster unprotected primary channel (GHSA-j777-63hf-hx76 / Nessus ID 214906)
RansomHub
RansomHub
RansomHub
RansomHub
Тревожный аккорд: Apple экстренно обновляет GarageBand для Mac
ICAO and ACAO Breached: Cyberespionage Groups Targeting Aviation Safety Specialists
ZDI-CAN-26487: Microsoft
Multiple Flaws in Dell PowerProtect Allow System Compromise
Dell has released a Critical Security Update (DSA-2025-022) for its PowerProtect Data Domain (DD) systems to address multiple vulnerabilities that could allow attackers to compromise affected systems. These vulnerabilities, identified in various components and open-source dependencies, highlight the importance of timely patching to safeguard enterprise data protection environments. Impact of the Disclosed Vulnerabilities The vulnerabilities include seven […]
The post Multiple Flaws in Dell PowerProtect Allow System Compromise appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
AsyncRAT Abusing Python and TryCloudflare For Stealthy Malware Delivery
A recent cybersecurity threat has emerged in the form of AsyncRAT, a remote access trojan (RAT) that leverages Python and TryCloudflare for stealthy malware delivery. This sophisticated campaign involves a complex sequence of events, starting with phishing emails that deceive users into downloading malicious payloads. Here the attack chain exploits legitimate infrastructure which makes the […]
The post AsyncRAT Abusing Python and TryCloudflare For Stealthy Malware Delivery appeared first on Cyber Security News.
Aim for crypto-agility, prepare for the long haul
While organizations have long experimented with various facets of digital transformation, the journey toward crypto-agility is one of the most significant technological transitions of our time. Success in the emerging quantum era will require technical expertise, strategic foresight, careful planning, and an unwavering commitment to security. The challenges Perhaps the most pressing challenge in the quest towards cryptographic agility is encryption key sprawl, where visibility into organizations’ encryption key ecosystem becomes cloudy. Many companies struggle … More →
The post Aim for crypto-agility, prepare for the long haul appeared first on Help Net Security.