Aggregator
CVE-2025-9407 | mtons mblog up to 3.5.0 /settings/profile signature cross site scripting (ICPML3 / EUVD-2025-25662)
Скачали "брутфорсер" SSH? Проверьте, не работаете ли вы на российского хакера
Qilin
You must login to view this content
Qilin
You must login to view this content
CISA Adds Three Known Exploited Vulnerabilities to Catalog
CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CVE-2024-8069 Citrix Session Recording Deserialization of Untrusted Data Vulnerability
- CVE-2024-8068 Citrix Session Recording Improper Privilege Management Vulnerability
- CVE-2025-48384 Git Link Following Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
Fake macOS help sites push Shamos infostealer via ClickFix technique
Criminals are taking advantage of macOS users’ need to resolve technical issues to get them to infect their machines with the Shamos infostealer, Crowdstrike researchers have warned. To prevent macOS security features from blocking the installation, the malware peddlers are using the so-called ClickFix technique, which relies on users running malicious commands. The Shamos malware delivery campaign For the campaign, which unfolded between June and August 2025, the cyber crooks created fraudulent macOS help websites … More →
The post Fake macOS help sites push Shamos infostealer via ClickFix technique appeared first on Help Net Security.
扫描版PDF的整书OCR简介
Why SIEM Rules Fail and How to Fix Them: Insights from 160 Million Attack Simulations
Cybercriminals Exploit Cheap VPS to Launch SaaS Hijacking Attacks
Arch Linux Services Hit by Week-Long DDoS Attack
Arch Linux—the community-driven, lightweight distribution renowned for its rolling-release model—has confirmed that a distributed denial-of-service (DDoS) attack has been targeting its core infrastructure for over a week. Beginning on August 18, users worldwide have experienced intermittent outages and slowdowns on the Arch Linux main website, the Arch User Repository (AUR), and the official forums. According […]
The post Arch Linux Services Hit by Week-Long DDoS Attack appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2023-20152 | Cisco Identity Services Engine CLI command injection (cisco-sa-ise-injection-2XbOg9Dg / EUVD-2023-24331)
CVE-2023-20153 | Cisco Identity Services Engine CLI command injection (cisco-sa-ise-injection-2XbOg9Dg / EUVD-2023-24332)
CVE-2023-20149 | Cisco Small Business RV325 Web-based Management Interface cross site scripting (cisco-sa-rv-stored-xss-vqz7gC8W / EUVD-2023-24328)
CVE-2023-20150 | Cisco Small Business RV325 Web-based Management Interface cross site scripting (cisco-sa-rv-stored-xss-vqz7gC8W / EUVD-2023-24329)
CVE-2023-20151 | Cisco Small Business RV325 Web-based Management Interface cross site scripting (cisco-sa-rv-stored-xss-vqz7gC8W / EUVD-2023-24330)
CVE-2023-20147 | Cisco Small Business RV325 Web-based Management Interface cross site scripting (cisco-sa-rv-stored-xss-vqz7gC8W / EUVD-2023-24326)
CVE-2023-20148 | Cisco Small Business RV325 Web-based Management Interface cross site scripting (cisco-sa-rv-stored-xss-vqz7gC8W / EUVD-2023-24327)
ChatGPT и Gemini работают на фишеров — их просто обманули скрытыми промптами
Kimsuky APT Exposed: GPKI Certificates, Rootkits, and Cobalt Strike Assets Uncovered
A comprehensive operational dump from the North Korean Kimsuky APT organization, also known as APT43, Thallium, or Velvet Chollima, appeared on a dark web forum in an uncommon instance of state-sponsored cyber espionage. This leak, comprising virtual machine images, VPS dumps, phishing kits, rootkits, and over 20,000 browser history records, provides an unparalleled glimpse into […]
The post Kimsuky APT Exposed: GPKI Certificates, Rootkits, and Cobalt Strike Assets Uncovered appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.