Aggregator
Submit #631663: code-projects Medical Store Management System 1 SQL injection [Accepted]
Submit #631662: code-projects Medical Store Management System 1 SQL injection [Accepted]
Submit #631661: code-projects Medical Store Management System 1 SQL injection [Accepted]
Microsoft Office Vulnerabilities Allow Attackers to Execute Remote Code
Microsoft has disclosed three critical security vulnerabilities in its Office suite that could enable attackers to execute malicious code remotely on affected systems. The vulnerabilities, identified as CVE-2025-53731, CVE-2025-53740, and CVE-2025-53730, were released on August 12, 2025, and pose significant security risks to organizations and individual users worldwide. All three vulnerabilities stem from use-after-free memory corruption issues […]
The post Microsoft Office Vulnerabilities Allow Attackers to Execute Remote Code appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
AI SOC 101: Key Capabilities Security Leaders Need to Know
OpenAI adds new GPT-5 models, restores o3, o4-mini and it's a mess all over again
Fake Minecraft Installer Spreads NjRat Spyware to Steal Data
Криптовалюты 10 лет обещали финансовую свободу, но До Квон сказал: "Это была пирамида
Submit #631654: mtons https://gitee.com/mtons/mblog <=3.5.0 Email Enumeration [Accepted]
Submit #631612: Tenda AC6 Tenda AC6V1.0 V15.03.05.19 Command Injection [Duplicate]
Bridging the Threat Intelligence Gap in Your SOC: A Guide for Security Leaders
As we highlighted in our article on building threat resilience in enterprises, one of the key challenges that stand before CISOs is ensuring proactive security. Reacting to incidents is no longer enough; you need to anticipate upcoming threats. To achieve this, your team needs powerful solutions that meet your criteria and deliver fast results. Explore […]
The post Bridging the Threat Intelligence Gap in Your SOC: A Guide for Security Leaders appeared first on ANY.RUN's Cybersecurity Blog.
Submit #631603: SourceCodester COVID 19 Testing Management System Project V1.0 SQL Injection [Accepted]
Submit #631551: itsourcecode Sports Management System V1.0 SQL injection [Accepted]
Submit #631543: Campcodes Online Water Billing System V1.0 SQL Injection [Accepted]
【通知】第三届全国大学生开源情报数据采集与分析大赛开始报名啦!提供免费培训
【资料】美国空军近期发布的几个战略文件
CVE-2023-1972 | binutils Table bfd/elf.c _bfd_elf_slurp_version_tables heap-based overflow (EUVD-2023-24156 / Nessus ID 212848)
New Charon Ransomware Employs DLL Sideloading, and Anti-EDR Capabilities to Attack Organizations
A sophisticated new ransomware family called Charon has emerged in the cybersecurity landscape, targeting organizations in the Middle East’s public sector and aviation industry with advanced persistent threat (APT) techniques typically reserved for nation-state actors. The ransomware campaign represents a concerning evolution in cybercriminal operations, combining stealth, precision, and destructive capabilities to maximize impact on […]
The post New Charon Ransomware Employs DLL Sideloading, and Anti-EDR Capabilities to Attack Organizations appeared first on Cyber Security News.