Aggregator
Claude Code: Data Exfiltration with DNS (CVE-2025-55284)
«Кровавая барыня» Собчак слила план «большой четвёрки» по блокировке звонков
Linux Webcams Weaponized to Inject Keystrokes and Execute Attacks
Security researchers have uncovered a concerning vulnerability that transforms everyday USB webcams into covert attack tools capable of injecting malicious keystrokes and executing unauthorized commands on connected computers. This groundbreaking discovery represents the first documented case of weaponizing USB devices already attached to systems that were not originally designed for malicious purposes. Researchers Jesse Michael […]
The post Linux Webcams Weaponized to Inject Keystrokes and Execute Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
North Korean Group ScarCruft Expands From Spying to Ransomware Attacks
RubyGems 生态系统遭供应链攻击
Google Calendar 邀请被用于劫持 Gemini,泄露用户数据
Embargo Ransomware Gang Amasses $34.2m in Attack Proceeds
Legitimate System Functions Exploited to Steal Secrets in Shared Linux Setups
Security researcher Ionuț Cernica revealed how commonplace Linux utilities can be weaponized to siphon sensitive data in multi-tenant environments. His talk, “Silent Leaks: Harvesting Secrets from Shared Linux Environments,” exposed that without any root privileges or zero-day exploits, attackers can exploit standard tools—such as ps, /proc, and temporary file handling—to harvest database credentials, API keys, and user […]
The post Legitimate System Functions Exploited to Steal Secrets in Shared Linux Setups appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.