Aggregator
CVE-2024-12756 | Avaya Spaces cross site scripting
CVE-2025-50062 | Oracle PeopleSoft Enterprise HCM Global Payroll Core 9.2.51/9.2.52 Global Payroll for Core improper authorization (EUVD-2025-21516)
CVE-2025-30750 | Oracle Database Server up to 19.27/21.18/23.8 Unified Audit Component improper authorization (EUVD-2025-21529)
CVE-2025-30758 | Oracle Siebel CRM End User up to 25.5 User Interface information disclosure (EUVD-2025-21523)
CVE-2025-30739 | Oracle CRM Technical Foundation up to 12.2.13 Preferences improper authorization (EUVD-2025-21538)
CVE-2025-30743 | Oracle Lease and Finance Management 12.2.13 Internal Operations authorization (EUVD-2025-21536)
CVE-2025-30745 | Oracle MES for Process Manufacturing 12.2.12/12.2.13 Device Integration cross-site request forgery
CVE-2025-48795 | Apache CXF up to 3.5.10/3.6.5/4.0.6/4.1.0 resource consumption (EUVD-2025-21438 / Nessus ID 242260)
Android Banking Malware Masquerades as Government Agencies to Attack Users
Cyble Research and Intelligence Labs (CRIL) has uncovered a sophisticated Android banking trojan dubbed RedHook, which disguises itself as legitimate applications from Vietnamese government and financial institutions to deceive users. This malware, first observed in the wild around January 2025, exploits phishing websites mimicking entities like the State Bank of Vietnam, Sacombank, Central Power Corporation, […]
The post Android Banking Malware Masquerades as Government Agencies to Attack Users appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Russian airline Aeroflot grounds dozens of flights after cyberattack
Want To Detect Incidents Before It’s Too Late? You Need Threat Intelligence
The difference between a minor security incident and a devastating breach often comes down to one critical factor: how quickly you can detect and respond to a threat. Hackers rarely target an isolated business: they typically launch campaigns that hit multiple companies with similar tactics, techniques, and procedures (TTPs). This means, by the time an […]
The post Want To Detect Incidents Before It’s Too Late? You Need Threat Intelligence appeared first on Cyber Security News.
Beast New Threat Actor
You must login to view this content
Порноместь: как сохранить свои сексуальные данные в безопасности и как действовать, если вы стали жертвой незаконного распространения интимной информации
Спутники Маска в криминале? Starlink уличили в работе на лагеря интернет-рабства
Beast
You must login to view this content
Beast
You must login to view this content
Beast
You must login to view this content
Beast
You must login to view this content
Beast
You must login to view this content