Aggregator
CVE-2020-36521 | Apple iOS/iPadOS TIFF File out-of-bounds
CVE-2020-36521 | Apple watchOS TIFF File out-of-bounds
Физики всерьёз считают, что в центре галактики есть звёзды с встроенными чёрными дырами
Cryptohack Roundup: 12 Charged in $263M Theft Case
This week, charges in $263 million theft and Unicoin cases, a jury convicted ex-CEO of SafeMoon, U.S. SEC X account hacker sentenced, Hong Kong police arrested dozens for money laundering, Russian police arrested the Blum co-founder. Israeli police arrested an alleged Nomad Bridge money launderer.
CefSharp Enumeration Tool Identifies Critical Security Issues in .NET Desktop Applications
Cybersecurity researchers and red teamers, a newly released tool named CefEnum is shedding light on critical security flaws in .NET-based desktop applications leveraging CefSharp, a lightweight wrapper around the Chromium Embedded Framework (CEF). CefSharp enables developers to embed Chromium browsers within .NET applications, facilitating the creation of web-based thick-clients for Windows environments. However, as detailed […]
The post CefSharp Enumeration Tool Identifies Critical Security Issues in .NET Desktop Applications appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CertiK助力以太坊扩展战略,解析Pectra升级的变革与挑战
Chinese-speaking hackers targeting US municipalities with Cityworks bug
Russian Hackers Exploit Oracle Cloud Infrastructure to Target Scaleway Object Storage
Russian threat actors have been leveraging trusted cloud infrastructure platforms like Oracle Cloud Infrastructure (OCI) Object Storage and Scaleway Object Storage to propagate sophisticated attacks using the Lumma Stealer malware. This malware-as-a-service (MaaS) infostealer, also known as LummaC2 Stealer, targets Windows systems to siphon credentials, system data, and cryptocurrency wallets. Investigations conducted in 2025 reveal […]
The post Russian Hackers Exploit Oracle Cloud Infrastructure to Target Scaleway Object Storage appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-5080 | Tenda FH451 1.0.0.9 webExcptypemanFilter page stack-based overflow (EUVD-2025-16154)
CVE-2022-3076 | Creative Minds CM Download Manager Plugin up to 2.8.5 on WordPress Setting unrestricted upload (EUVD-2022-42505)
CVE-2020-21514 | Fluent Fluentd/Fluent-ui hard-coded password (Issue 2722 / EUVD-2023-1414)
CVE-2022-45794 | Omron SYSMAC CS/SYSMAC CJ missing authentication (icsa-23-108-01 / EUVD-2022-48650)
CVE-2022-22637 | Apple watchOS up to 8.4.2 WebKit cross-domain policy (HT213193 / EUVD-2022-27782)
CVE-2022-22637 | Apple tvOS up to 15.3 WebKit cross-domain policy (HT213186 / EUVD-2022-27782)
Каждый день на орбите — это минус к костям, иммунитету и мозгу. Протокол GENESTAR поможет следить за счётом
Critical Vulnerability in Netwrix Password Manager Enables Authenticated Remote Code Execution
A critical security vulnerability has been discovered in Netwrix Password Secure, a widely used enterprise password management solution, potentially allowing authenticated attackers to execute remote code on other users’ systems. Identified in versions up to 9.2.2, including the specific build 9.2.0.32454 for both client (PSC) and server (PSS) components, this flaw poses a significant risk […]
The post Critical Vulnerability in Netwrix Password Manager Enables Authenticated Remote Code Execution appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Evaluating open-source tools for data masking
Can you use open-source tools to mask sensitive production data for use in testing and development? We explore the available options and weigh the pros and cons of relying on DIY data masking solutions.
The post Evaluating open-source tools for data masking appeared first on Security Boulevard.