Aggregator
CVE-2025-20225 | Cisco IOS/ASA/IOS XE/Firepower Threat Defense IKEv2 memory leak (cisco-sa-asa-ftd-ios-dos-DOESHWHy)
Norway confirms dam intrusion by Pro-Russian hackers
Google Chrome Enterprise: Extend Protections From Browser to OS
Невидимый глаз в адресной строке Chrome будет следить… за теми, кто следит за вами
Netflix Job Phishing Scam Steals Facebook Login Data
Google Announces That Android’s pKVM Framework Achieves SESIP Level 5 Certification
Google has achieved a significant milestone in mobile security with the announcement that Android’s protected KVM (pKVM) hypervisor has officially received SESIP Level 5 certification, marking it as the first software security system designed for large-scale consumer electronics deployment to reach this prestigious assurance level. This groundbreaking achievement positions Android at the forefront of secure […]
The post Google Announces That Android’s pKVM Framework Achieves SESIP Level 5 Certification appeared first on Cyber Security News.
Palo Alto Networks security advisory (AV25-515)
New NFC-Based PhantomCard Malware Targets Android Banking Users
ThreatFabric analysts have uncovered PhantomCard, a sophisticated NFC-based Trojan designed to relay sensitive card data from victims’ devices to cybercriminals. This malware, which primarily targets banking customers in Brazil but shows potential for global expansion, exemplifies the growing interest among threat actors in NFC relay attacks. PhantomCard operates by masquerading as a legitimate “card protection” […]
The post New NFC-Based PhantomCard Malware Targets Android Banking Users appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
80 000 учёток, 8 бойцов. Остальные — массовка для устрашения. Вот как устроены хакерские «армии»
Turkish crypto exchange BTCTurk warns of security incident after $49 million leaves platform
Norway police believe pro-Russian hackers were behind April dam sabotage
Why the Browser Is Becoming a Prime Security Battleground
At Black Hat, Push Security co-founder and CTO Tyron Erasmus talks about why attackers are increasingly shifting their focus from endpoints to browsers — and what that means for defenders. Erasmus, who began his career in penetration testing and offensive security, said endpoint detection has matured to the point where it’s harder for attackers to..
The post Why the Browser Is Becoming a Prime Security Battleground appeared first on Security Boulevard.
Threat Actors Use Advanced Tactics to Personalize Phishing for Malware Delivery
Threat actors are using topic customization as a more advanced strategy in targeted malware-delivery phishing campaigns as the environment of cyber threats changes. This method involves crafting personalized subject lines, attachment names, and embedded links to mimic authentic communications, fostering a sense of familiarity or urgency that heightens the probability of recipient engagement. According to […]
The post Threat Actors Use Advanced Tactics to Personalize Phishing for Malware Delivery appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Приняли звонок в Teams? Поздравляем, троян уже в системе — с правами выше, чем у вас
Google Mandates License or Certification for Crypto App Developers
The cryptocurrency ecosystem is experiencing heightened scrutiny from both regulatory authorities and criminal organizations, as Google Play implements stringent publishing requirements for crypto applications while the FBI warns of sophisticated recovery scams targeting previous fraud victims. These developments highlight the ongoing challenges facing the digital asset industry as it seeks legitimacy while combating persistent criminal […]
The post Google Mandates License or Certification for Crypto App Developers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Hackers Exploit Microsoft Flaw to Breach Canadian House of Commons to Gain Unauthorized Access
The Canadian House of Commons has fallen victim to a significant cyberattack orchestrated by an unidentified “threat actor” who successfully exploited a recent Microsoft vulnerability to access sensitive government employee data. The incident, which occurred on Friday, August 9, 2025, represents one of the most serious cybersecurity breaches to affect Canada’s parliamentary system in recent […]
The post Hackers Exploit Microsoft Flaw to Breach Canadian House of Commons to Gain Unauthorized Access appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
ReiserFS 在内核的最后残余被清除
What Is Zero Trust, Really?
Zero Trust. It’s the security buzzword of the decade, right up there with “AI-powered” and “next-gen.” Vendors slap it on everything from VPN replacements to microsegmentation tools. Analysts write about...
The post What Is Zero Trust, Really? appeared first on Security Boulevard.