Aggregator
CVE-2025-24298 | OpenHarmony up to 5.0.3 tcb use after free
CVE-2025-27128 | OpenHarmony up to 5.0.3 tcb use after free
CVE-2025-24844 | OpenHarmony up to 5.0.3 memory leak
CVE-2025-24925 | OpenHarmony up to 5.0.3 memory leak
CVE-2025-25212 | OpenHarmony up to 5.0.3 denial of service
CVE-2025-26690 | OpenHarmony up to 5.0.3 null pointer dereference
CVE-2025-27536 | OpenHarmony up to 5.0.3 type confusion
CVE-2025-27562 | OpenHarmony up to 5.0.3.x memory leak
CVE-2025-8824 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 up to 20250801 /goform/setRIP RIPmode/RIPpasswd stack-based overflow (EUVD-2025-24106)
CVE-2025-8826 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 up to 20250801 /goform/RP_setBasicAuto um_rp_autochannel apcli_AuthMode_2G/apcli_AuthMode_5G stack-based overflow (EUVD-2025-24118)
Dell security advisory (AV25-494)
Hackers Weaponized Linux Webcams as Attack Tools to Inject Keystrokes and Launch Attacks
A critical vulnerability was uncovered that transforms ordinary Linux-powered webcams into weaponized BadUSB attack tools, enabling remote hackers to inject malicious keystrokes and compromise target systems without detection. The research, presented at DEF CON 2025, demonstrates the first known case where attackers can remotely weaponize USB devices already connected to computers, marking a significant evolution […]
The post Hackers Weaponized Linux Webcams as Attack Tools to Inject Keystrokes and Launch Attacks appeared first on Cyber Security News.
Meta’s New Feature Turns Instagram into a Real-Time Location Broadcaster
Meta has introduced a transformative update to Instagram, evolving the platform from a simple photo-sharing service into an always-on real-time location broadcaster via its new “Map” feature. Announced in early August 2025, this functionality allows users to opt-in for sharing their last active location with selected friends, updating automatically whenever the app is opened or […]
The post Meta’s New Feature Turns Instagram into a Real-Time Location Broadcaster appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Секретные инструкции GPT-5 попали в сеть — теперь каждый может заглянуть в «чёрный ящик»
AI Coding Assistant Creating a Perfect Blueprints for Attackers
The cybersecurity landscape faces an unprecedented threat as artificial intelligence coding assistants inadvertently transform into reconnaissance tools for malicious actors. A recent investigation reveals how developers’ interactions with AI tools like Claude CLI and GitHub Copilot are creating comprehensive attack blueprints that eliminate the traditional barriers to sophisticated cyber intrusions. Modern AI coding assistants store […]
The post AI Coding Assistant Creating a Perfect Blueprints for Attackers appeared first on Cyber Security News.