Aggregator
Data Act e cyber security: cambia la sicurezza informatica per le aziende
WiFi测绘—黑客借WiFi穿墙透视,物理空间不再是安全边界
Urgent: Google Releases Critical Chrome Update for CVE-2025-6558 Exploit Active in the Wild
Deepfakes. Fake Recruiters. Cloned CFOs — Learn How to Stop AI-Driven Attacks in Real Time
New Konfety Malware Variant Evades Detection by Manipulating APKs and Dynamic Code
Deepfakes. Fake Recruiters. Cloned CFOs — Learn How to Stop AI-Driven Attacks in Real Time
New Konfety Malware Variant Evades Detection by Manipulating APKs and Dynamic Code
Urgent: Google Releases Critical Chrome Update for CVE-2025-6558 Exploit Active in the Wild
Command-Line Editor Vim Hit by Vulnerability Allowing File Overwrites
A critical security vulnerability has been discovered in Vim, the popular open-source command-line text editor, that could allow attackers to overwrite arbitrary files on users’ systems. The vulnerability, designated CVE-2025-53906, was published on July 15, 2025, and affects all versions of Vim prior to 9.1.1551. The security flaw stems from a path traversal issue within Vim’s […]
The post Command-Line Editor Vim Hit by Vulnerability Allowing File Overwrites appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
欧盟人工智能大模型风险规制制度及其对我国的启示
网络安全服务虚标注水,IT供应商被罚超1亿元
欧盟人工智能大模型风险规制制度及其对我国的启示
网络安全服务虚标注水,IT供应商被罚超1亿元
CVE-2007-4976 | Coppermine Photo Gallery path traversal (EDB-30595 / Nessus ID 26084)
揭秘朝俄会晤背后的深层战略,我东北与T海安全受联动影响
情报在反恐中的核心作用
Таинственный "$$$" создал Uber для киберпреступников: 85% дивидендов привлекли армию инвесторов-хакеров
Hackers Exploit Ivanti and Fortinet VPN Vulnerabilities in Attacks on Japanese Companies
Cyber espionage campaigns against Japanese companies have increased in fiscal year 2024, which runs from April 2024 to March 2025, according to a thorough analysis published by Macnica’s Security Research Center. The main objective of these campaigns is to exfiltrate sensitive data, including manufacturing blueprints, policy-related documents, and personal information. Since initiating monitoring in 2014, […]
The post Hackers Exploit Ivanti and Fortinet VPN Vulnerabilities in Attacks on Japanese Companies appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.