Aggregator
【安全圈】谷歌因未经用户同意使用Android移动数据被判赔偿3.14亿美元
【安全圈】黑客伪造Cloudflare验证界面诱导用户执行恶意程序
【安全圈】".edu.eu"骗局:虚假教育域名与网站全球诱骗学生
Next.js Vulnerability Allows Attackers to Trigger DoS via Cache Poisoning
A critical vulnerability, tracked as CVE-2025-49826, has been discovered and addressed in the popular React-based web framework, Next.js. The flaw, present in versions >=15.1.0 and <15.1.8, allowed attackers to exploit a cache poisoning bug, potentially leading to a Denial of Service (DoS) condition for affected applications, as per a report by Vercel. CVE ID Affected Versions Severity […]
The post Next.js Vulnerability Allows Attackers to Trigger DoS via Cache Poisoning appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Hackers Abuse Legitimate Inno Setup Installer to Deliver Malware
Cybercriminals are increasingly weaponizing legitimate software installer frameworks like Inno Setup to distribute malware, turning user-friendly tools into covert vehicles for malicious payloads. Originally designed to simplify software deployment on Windows, Inno Setup has become a favored tool among threat actors due to its trusted appearance and powerful Pascal scripting capabilities. This sophisticated abuse allows […]
The post Hackers Abuse Legitimate Inno Setup Installer to Deliver Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
深度:以伊冲突期间黑客行动主义活动全面解析
特朗普全球资产结构分析
Идеальный ИИ или очередной эксперимент? Что скрывает новый Grok 4 от xAI
Viaggi negli Usa, alto rischio per esperti cyber: ecco che fare con lo smartphone per non essere respinti
武汉大学 | SymAgent:基于神经符号自学习的知识图谱复杂推理智能体框架
Taiwan Flags Chinese Apps Over Data Security Violations
Hunters International ransomware group shuts down – but will it regroup under a new guise?
Writable File in Lenovo Path Lets Attackers Evade AppLocker Restrictions
A security researcher has uncovered a significant vulnerability affecting Lenovo computers: a writable file within the Windows directory that can be exploited to bypass AppLocker restrictions. The file in question, C:\Windows\MFGSTAT.zip, is present on many Lenovo machines that ship with the manufacturer’s default Windows image. This issue, initially thought to affect only a handful of […]
The post Writable File in Lenovo Path Lets Attackers Evade AppLocker Restrictions appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.