Aggregator
CVE-2025-53394 | Paramount Macrium Reflect up to 2025-06-26 Backup File Local Privilege Escalation
CVE-2025-38741 | Dell Enterprise SONiC OS up to 4.5.0 SSH hard-coded key (dsa-2025-275)
CVE-2025-21120 | Dell Avamar Data Store Gen4T trusting http permission methods on the server side (dsa-2025-271)
CVE-2025-34147 | Shenzhen Aitemi M300 Wi-Fi Repeater MT02 extap2g SSID os command injection
CVE-2013-10054 | LibrettoCMS 1.1.7 File Manager Plugin upload.php unrestricted upload (EDB-26213)
Modular Malware Suite Sold by Threat Actors Through Public Storefront Domains
A threat actor operating under the moniker Cyber Products has established a public-facing storefront at cyberproducts[.]io to distribute their modular malware suite, dubbed Cyber Stealer. This development marks a shift toward overt commercialization of malicious tools, with additional promotion occurring in clandestine online communities such as Hackforums. The malware, alternatively branded as Cyber Botnet & […]
The post Modular Malware Suite Sold by Threat Actors Through Public Storefront Domains appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Threat Actors Increasingly Leaning on GenAI Tools
Hackers Abuse Microsoft 365 Direct Send to Deliver Internal Phishing Emails
Elevate Your Influence: Building a Personal Brand in Tech 2025
why building a personal brand in tech is crucial for career success in 2025. Start your journey today and stand out in the competitive landscape!
The post Elevate Your Influence: Building a Personal Brand in Tech 2025 appeared first on Security Boulevard.
New Malware Attack Uses LNK Files to Deploy REMCOS Backdoor on Windows Systems
The investigation began with the detection of two scanning IP addresses, 91.238.181[.]225 and 5.188.86[.]169 sharing a common Secure Shell (SSH) fingerprint (b5:4c:ce:68:9e:91:39:e8:24:b6:e5:1a:84:a7:a1:03). Cybersecurity researchers have uncovered a sophisticated multi-stage malware campaign that leverages malicious Windows LNK shortcut files to deploy the REMCOS backdoor, a potent remote access trojan capable of full system compromise. This fingerprint […]
The post New Malware Attack Uses LNK Files to Deploy REMCOS Backdoor on Windows Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Proton fixes Authenticator bug leaking TOTP secrets in logs
Darktrace Acquires Mira Security
Квантовый эксперимент пробил дыру в реальности — без единого запутанного фотона
Live Webinar | Adaptive API Security for OWASP Top 10 in DevSecOps Pipelines
Live Webinar | Modern Bots Imitate Humans — And Your APIs & Business Are in the Crosshairs
Russia Uses ISPs to Spy on Diplomats, Warns Microsoft
Russian intelligence since 2024 has been using their country's internet service providers to run adversary-in-the-middle attacks designed to infect diplomats inside the country's borders with intelligence-gathering malware, Microsoft warns.
Milan Court Rejects Chinese Hacker's House Arrest Plea
Prosecutors at a Milan court on Friday rejected a house arrest request by lawyers of a Chinese national awaiting possible extradition to the United States in Italy, citing flight risk. Italian authorities arrested Xu Zewei, 33, of Shanghai, in July after his arrival at Milan's Malpensa Airport.