Aggregator
CVE-2025-7775 | Citrix NetScaler ADC/NetScaler Gateway up to 37.240/47.47/55.329/59.21 Gateway/IPv6 Service CitrixDeelb memory corruption (CTX694938 / Nessus ID 255232)
CVE-2025-9577 | TOTOLINK X2000R up to 2.0.0 Administrative Interface /etc/shadow.sample default credentials
CVE-2025-9576 | seeedstudio ReSpeaker LinkIt7688 Administrative Interface /etc/shadow default credentials
Submit #636070: Tenda Wi-Fi 5 Router AC10 AC10V4.0si_V16.03.10.13 Insecure Storage of Sensitive Information [Duplicate]
新态势·新实战 | CSOP 2025 网络安全运营实战大会上海站圆满举行
Submit #636069: TOTOLINK Wi-Fi 6 Router X2000R-Gh-V2.0.0 Insecure Storage of Sensitive Information [Accepted]
Submit #636068: seeedstudio ReSpeaker Core - Based On MT7688 and OpenWRT ramips-openwrt-LinkIt7688 Insecure Storage of Sensitive Information [Accepted]
The Role of Enterprise Email Security in Modern Cybersecurity Strategies
Cisco Nexus 3000 & 9000 Vulnerability Enables DoS Attacks
Cisco has issued a high-severity security advisory warning of a dangerous vulnerability in its Nexus 3000 and 9000 Series switches that could allow attackers to trigger denial of service (DoS) attacks through crafted network packets. The vulnerability, tracked as CVE-2025-20241 and assigned a CVSS score of 7.4, affects the Intermediate System-to-Intermediate System (IS-IS) feature in Cisco NX-OS […]
The post Cisco Nexus 3000 & 9000 Vulnerability Enables DoS Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
【安全圈】美国著名公关公司 Singer Associates遭Qilin攻击
【安全圈】18 亿条 Discord 聊天记录被暗网兜售:付费才能删除?
【安全圈】瑞典多家市政及地区系统因网络攻击瘫痪
【安全圈】腾讯云曝严重安全漏洞重要长期暴露公网
Submit #634840: Linksys E6500、RE6250、RE6300、RE6350、RE7000、RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) OS Command Injection [Accepted]
The API Security Reality Check: Key Takeaways from Q2 2025 API ThreatStats Report
API security has never been more crucial. Vulnerabilities are growing in volume and severity. AI integrations are a burgeoning attack vector. Increasing GraphQL adoption presents hidden dangers. To protect your organization, you must secure your APIs. Keep reading for our key takeaways from the Wallarm Q2 2025 API ThreatStats report – and find out what [...]
The post The API Security Reality Check: Key Takeaways from Q2 2025 API ThreatStats Report appeared first on Wallarm.
The post The API Security Reality Check: Key Takeaways from Q2 2025 API ThreatStats Report appeared first on Security Boulevard.
Hidden Vulnerabilities of Project Management Tools & How FluentPro Backup Secures Them
Submit #634839: Linksys RE6500、RE6250、RE6300、RE6350、RE7000、RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) OS Command Injection [Duplicate]
10 тысяч незакрытых систем в США против дедлайна до 28 августа. CISA объявила ультиматум федеральным агентствам
New Research Explores Emulating Scattered Spider Tactics in Real-World Scenarios
Experts have described methods for mimicking the strategies of the advanced persistent threat (APT) group Scattered Spider in a recent in-depth analysis by cybersecurity company Lares, allowing enterprises to strengthen their defenses through adversarial cooperation. Lares specializes in threat emulation, replicating real-world tactics, techniques, and procedures (TTPs) observed in cybercriminal activities. By dissecting incidents like […]
The post New Research Explores Emulating Scattered Spider Tactics in Real-World Scenarios appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.