Aggregator
CVE-2025-37106 | HPE AutoPass License Server up to 9.17 improper authentication (EUVD-2025-21733)
HPE security advisory (AV25-427)
Hackers Leverage 607 Malicious Domains to Spread APK Malware with Remote Command Execution
PreCrime Labs at BforeAI discovered a complex cyber threat operation in which hackers have used a vast network of 607 rogue domains to spread fake Telegram Messenger application files (APKs) over the course of the last month. These domains, primarily registered via the Gname registrar and hosting content in Chinese, form part of a large-scale […]
The post Hackers Leverage 607 Malicious Domains to Spread APK Malware with Remote Command Execution appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Louis Vuitton says regional data breaches tied to same cyberattack
Threat Actors Weaponize WordPress Sites to Redirect Visitors to Malicious Domains
Security researchers identified a sophisticated malware campaign targeting WordPress websites, where threat actors embedded malicious code within core files to facilitate unauthorized redirects and search engine optimization (SEO) poisoning. The infection was traced to the wp-settings.php file, a fundamental component of the WordPress framework, which had been altered to include two anomalous lines of PHP […]
The post Threat Actors Weaponize WordPress Sites to Redirect Visitors to Malicious Domains appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
iCounter Debuts With Mission to Defeat AI-Enabled Threats
Former FireEye and Mandiant leader John Watters unveils iCounter, a new cyber risk intelligence startup focused on targeted attacks and AI-enabled adversaries. Backed by Syn Ventures, the firm aims to transform threat detection with deeper visibility into attacker reconnaissance.
Drive-By Attack Vector Patched in Oracle Code Editor
Exploring Oracle Cloud Infrastructure, researchers at Tenable found that Oracle's console-based Code Editor tool failed to block arbitrary file uploads, and could be silently exploited via drive-by attacks to install malware. They said Oracle has now fixed the vulnerability.
Hackers Use Backdoor to Steal Data From SonicWall Appliance
A cybercrime group used a backdoor in a fully patched SonicWall appliance to steal credentials and may have sold the stolen data to ransomware groups as part of an ongoing campaign, Google Threat Intelligence Group found. The firm attributed the campaign to a cybercrime group it tracks as UNC6148.
Томас Эдисон изобрёл «алло». Gen Z — отменил. Всё, эпоха закрыта
test draft
The post test draft appeared first on Security Boulevard.
Women Who 'Hacked the Status Quo' Aim to Inspire Cybersecurity Careers
9,8 из 10: Российские хакеры показали, как взломать сервер одним кликом
Red Teaming AI Systems: Why Traditional Security Testing Falls Short
What if your AI-powered application leaked sensitive data, generated harmful content, or revealed internal instructions – and none of your security tools caught it? This isn’t hypothetical. It’s happening now and exposing critical gaps in how we secure modern AI systems. When AI systems like LLMs, agents, or AI-driven applications reach production, many security teams..
The post Red Teaming AI Systems: Why Traditional Security Testing Falls Short appeared first on Security Boulevard.
Microsoft Teams Call Weaponized to Deploy and Execute Matanbuchus Ransomware
A sophisticated cyberattack campaign emerged in July 2025, weaponizing Microsoft Teams calls to deploy the latest iteration of Matanbuchus ransomware. The attack begins with adversaries impersonating IT helpdesk personnel through external Teams calls, leveraging social engineering tactics to convince employees to execute malicious scripts. During these fraudulent support sessions, attackers activate Quick Assist and instruct […]
The post Microsoft Teams Call Weaponized to Deploy and Execute Matanbuchus Ransomware appeared first on Cyber Security News.
Favicorn: Favicorn takes a favicon and provides search result links across 10 platforms
SquidLoader Deploys Stealthy Malware with Near-Zero Detection to Evade Security Measures
A fresh variant of SquidLoader malware has surfaced, actively entering Hong Kong institutions with previously unheard-of stealth, which is alarming for the financial industry. This sophisticated loader achieves near-zero detection rates on platforms like VirusTotal, leveraging intricate anti-analysis, anti-sandbox, and anti-debugging mechanisms to deploy Cobalt Strike Beacons for remote access. The malware’s attack chain begins […]
The post SquidLoader Deploys Stealthy Malware with Near-Zero Detection to Evade Security Measures appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.