Aggregator
Hush Security emerges from stealth to replace legacy vaults with secretless access
Hush Security has raised $11 million in seed funding led by Battery Ventures and YL Ventures. As agentic AI expands, Hush replaces legacy vaults and secrets across the enterprise with just-in-time, policy-driven access controls enforced at runtime. This approach eliminates the operational and security risks of traditional vaults and secrets managers, delivering a faster, safer way to secure machine-to-machine access. Gartner predicts that 40% of organizations will adopt a secretless approach by 2027 as the … More →
The post Hush Security emerges from stealth to replace legacy vaults with secretless access appeared first on Help Net Security.
Chrome Extension Scam Exposed: Hackers Stealing Meta Accounts
A sophisticated campaign targeting Meta advertisers through fake AI-powered ad optimization tools has been uncovered, with cybercriminals deploying malicious Chrome extensions to steal credentials and hijack business accounts. Cybereason Security Services has identified an evolving malicious Chrome extension campaign that specifically targets Meta (Facebook/Instagram) advertisers through a deceptive platform called “Madgicx Plus.” This fake AI-driven […]
The post Chrome Extension Scam Exposed: Hackers Stealing Meta Accounts appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
INC
You must login to view this content
Nginx 路径绕过
ACSC Warns of Actively Exploited SonicWall Access Control Vulnerability
The Australian Cyber Security Centre (ACSC) has issued an urgent warning about a critical vulnerability in SonicWall firewall devices that is being actively exploited by threat actors. The flaw, tracked as CVE-2024-40766, affects SonicOS management access and SSLVPN functionality across multiple generations of SonicWall devices. Critical Vulnerability Details The improper access control vulnerability carries a […]
The post ACSC Warns of Actively Exploited SonicWall Access Control Vulnerability appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
NASA 称毅力号漫游车在火星发现潜在生物特征
Key Operators of LockerGoga, MegaCortex, and Nefilim Ransomware Gangs Arrested
The U.S. District Court for the Eastern District of New York has charged Volodymyr Viktorovich Tymoshchuk, a Ukrainian national known as deadforz, Boba, msfv, and farnetwork, for his role in administering LockerGoga, MegaCortex, and Nefilim ransomware operations. The indictment alleges that Tymoshchuk managed attacks against more than 250 companies in the U.S. and hundreds of […]
The post Key Operators of LockerGoga, MegaCortex, and Nefilim Ransomware Gangs Arrested appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
ACSC Warns Of Sonicwall Access Control Vulnerability Actively Exploited In Attacks
The Australian Cyber Security Centre (ACSC) has issued a critical alert regarding a severe access control vulnerability in SonicWall products that is being actively exploited in attacks. The flaw, tracked as CVE-2024-40766, affects multiple generations of SonicWall firewalls and carries a critical CVSS score of 9.3, highlighting the significant risk it poses to organizations. The […]
The post ACSC Warns Of Sonicwall Access Control Vulnerability Actively Exploited In Attacks appeared first on Cyber Security News.
Украинский хакер довёл США до отчаяния. ФБР выставило рекордную цену за его голову
dataease最新绕过利用json覆盖属性RCE
AsyncRAT Exploits ConnectWise ScreenConnect to Steal Credentials and Crypto
黑客发起供应链攻击 向周下载量达20亿次的NPM包植入恶意软件
When typing becomes tracking: Study reveals widespread silent keystroke interception
You type your email address into a website form but never hit submit. Hours later, a marketing email shows up in your inbox. According to new research, that is not a coincidence. A team of researchers from UC Davis, Maastricht University, and other institutions has found that many websites collect keystrokes as users type, sometimes before a form is ever submitted. The study explores how third-party scripts capture and share this information in ways that … More →
The post When typing becomes tracking: Study reveals widespread silent keystroke interception appeared first on Help Net Security.
京东账号安全团队招人啦!
HTTP-методы без мистики: что нужно сайту по умолчанию
Submit #635871: Ascensio System SIA OnlyOffice Community Server 12.7.0 Cross Site Scripting [Accepted]
Submit #635870: Ascensio System SIA OnlyOffice Community Server 12.7.0 Cross Site Scripting [Accepted]
Hackers Reap Minimal Gains from Massive npm Supply Chain Breach
On September 8th, 2025, at approximately 9AM EST, the npm ecosystem faced an acute supply chain attack. A threat actor leveraged social engineering techniques to compromise the account of well-known npm developer Qix, subsequently publishing malicious releases for several widely-used packages, most notably debug, chalk, and dozens of related dependencies. Within two hours of the […]
The post Hackers Reap Minimal Gains from Massive npm Supply Chain Breach appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.