Aggregator
CVE-2022-50138 | Linux Kernel up to 5.10.136/5.15.60/5.18.17/5.19.1 RDMA __qedr_alloc_mr memory leak
CVE-2022-50131 | Linux Kernel up to 5.10.136/5.15.60/5.18.17/5.19.1 HID hid-mcp2221.c mcp_smbus_write len buffer overflow
CVE-2022-50140 | Linux Kernel up to 5.19.1 bitmap_free memory leak
Cyber Centre advice on securing operational technology systems
Cyber Centre advice on securing operating technology systems
Zyxel NWA50AX Pro Hit by N-Day Flaw Allowing Arbitrary File Deletion
A recent vulnerability has been discovered in the Zyxel NWA50AX Pro, a WiFi 6 access point for small businesses, exposing it to an n-day flaw that allows arbitrary file deletion via a misconfigured CGI endpoint. This issue, tracked as CVE-2024-29974, highlights the risks of shared codebases and incomplete patching in embedded devices. Discovery and Technical […]
The post Zyxel NWA50AX Pro Hit by N-Day Flaw Allowing Arbitrary File Deletion appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
善恶有报:两个著名病毒作者的初心与归宿
Hackers Exploit Transit Mode in Apple Pay and GPay to Steal Money
Mobile wallets like Apple Pay and Google Pay (GPay) have revolutionized the way we pay, offering speed and convenience that traditional cards can’t match. But as recent research and real-world incidents show, these digital wallets are not immune to attack. In fact, some of their most convenient features—like Express Transit mode—are now being exploited by […]
The post Hackers Exploit Transit Mode in Apple Pay and GPay to Steal Money appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Microsoft Enhances Office 365 Defender to Stop Email Bombing Campaigns
Microsoft has announced a significant enhancement to its Office 365 Defender suite with the introduction of Mail Bombing Detection, a new feature designed to combat the rising threat of email bombing attacks. This capability will be rolled out globally, starting in late June 2025, and is expected to reach all customers by late July 2025. […]
The post Microsoft Enhances Office 365 Defender to Stop Email Bombing Campaigns appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Threat Hunting: Hands-on Tips for SOC Analysts and MSSPs
Editor’s note: The current article is authored by Clandestine, threat researcher and threat hunter. You can find Clandestine on X. Threat actors today are continuously developing sophisticated techniques to evade traditional detection methods. ANY.RUN’s Threat Intelligence Lookup offers advanced capabilities for threat data gathering and analysis. As a specialized search engine, it allows security analysts to query […]
The post Threat Hunting: Hands-on Tips for SOC Analysts and MSSPs appeared first on ANY.RUN's Cybersecurity Blog.
Fake Minecraft mods distributed by the Stargazers Ghost Network to steal gamers’ data
Research by: Jaromír Hořejší (@JaromirHorejsi), Antonis Terefos (@Tera0017) Key Points Introduction Minecraft is a popular video game with a massive global player base, with over 200 million monthly active players. The game has also sold over 300 million copies, making it one of the best-selling video games ever. Minecraft supports mods (user-created modifications), which enrich the […]
The post Fake Minecraft mods distributed by the Stargazers Ghost Network to steal gamers’ data appeared first on Check Point Research.
AWS Makes Bevy of Updates to Simplify Cloud Security
Amazon Web Services (AWS) added a bevy of additional cybersecurity tools and services to its portfolio that collectively make securing its cloud computing platform simpler. Announced at the AWS re:Inforce 2025 conference, the additions include a preview of a revamped AWS Security Hub that now identifies which vulnerabilities from a threat perspective are potentially the..
The post AWS Makes Bevy of Updates to Simplify Cloud Security appeared first on Security Boulevard.
MITRE and Splunk Expose Critical Vulnerabilities in Open Source GitHub Actions
The Sysdig TRT has uncovered critical vulnerabilities in the GitHub Actions workflows of several high-profile open source projects, including those maintained by MITRE and Splunk. GitHub Actions, a popular platform for automating CI/CD pipelines, offers immense flexibility for developers but also harbors significant security risks when improperly configured. High-Profile Projects Compromised The Sysdig TRT’s proactive […]
The post MITRE and Splunk Expose Critical Vulnerabilities in Open Source GitHub Actions appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Serpentine#Cloud Uses Cloudflare Tunnels in Sneak Attacks
Connect any React application to an MCP server in three lines of code
Cloudflare Log Explorer is now GA, providing native observability and forensics
Secrets in the Open: Cloud Data Exposures That Put Your Business at Risk
Sensitive data and secrets are leaking. How cloud security leaders can shut them down.
Despite the billions of dollars organizations are investing in cybersecurity, one of the most preventable threats persists: sensitive data and credentials exposed in publicly accessible cloud services. According to the Tenable Cloud Security Risk Report 2025, 9% of public cloud storage resources contain sensitive data — including personally identifiable information (PII), intellectual property (IP), Payment Card Industry (PCI) details, and protected health information (PHI).
Even more concerning, the report shows that over half of organizations using Amazon Web Services (AWS) Elastic Container Service (ECS) task definitions and Google Cloud Platform (GCP) Cloud Run have, knowingly or not, at least one secret embedded in these services.
These exposures are concerning, as they are the kind of exploitable oversights attackers are already scanning for — and weaponizing.
Why this matters to security leadersExposed secrets — like API keys and encryption tokens — can open the door to attackers, enabling lateral movement, data exfiltration or full environment takeover.
This isn’t just a misconfiguration issue. It’s a governance gap, made worse by legacy security tooling and, in some cases, the mistaken perception that native cloud services provide sufficient protection.
What you should be doing nowSecurity leaders must shift from detection to prevention and improve their sensitive data protection by enforcing the following:
- Automated data discovery and classification: Know what data lives in your environment and continuously assess its sensitivity. This should be an ongoing, telemetry-driven effort — not a quarterly scan.
- Eliminate public access by default: Enforce least privilege for both data and network access. Public storage should be the rare exception.
- Employ enterprise-grade secrets management: Remove hardcoded secrets and implement cloud-native tools like AWS Secrets Manager and Microsoft Azure Key Vault.
- Cloud Security Posture Management (CSPM): Use identity-intelligent CSPM to unify visibility across your cloud footprint and detect misconfigurations, secrets, and excessive permissions in real time.
Key takeaway: Exposed secrets and sensitive data aren’t obscure edge cases. They’re systemic risks hiding in plain sight — and must be eliminated before attackers exploit them.
Learn more- Download the Tenable Cloud Security Risk Report 2025
- Join our upcoming research webinar Why Your Cloud Data Might Not Be Secure After All: Insights From Tenable Cloud Research
The post Secrets in the Open: Cloud Data Exposures That Put Your Business at Risk appeared first on Security Boulevard.
Secrets in the Open: Cloud Data Exposures That Put Your Business at Risk
Sensitive data and secrets are leaking. How cloud security leaders can shut them down.
Despite the billions of dollars organizations are investing in cybersecurity, one of the most preventable threats persists: sensitive data and credentials exposed in publicly accessible cloud services. According to the Tenable Cloud Security Risk Report 2025, 9% of public cloud storage resources contain sensitive data — including personally identifiable information (PII), intellectual property (IP), Payment Card Industry (PCI) details, and protected health information (PHI).
Even more concerning, the report shows that over half of organizations using Amazon Web Services (AWS) Elastic Container Service (ECS) task definitions and Google Cloud Platform (GCP) Cloud Run have, knowingly or not, at least one secret embedded in these services.
These exposures are concerning, as they are the kind of exploitable oversights attackers are already scanning for — and weaponizing.
Why this matters to security leadersExposed secrets — like API keys and encryption tokens — can open the door to attackers, enabling lateral movement, data exfiltration or full environment takeover.
This isn’t just a misconfiguration issue. It’s a governance gap, made worse by legacy security tooling and, in some cases, the mistaken perception that native cloud services provide sufficient protection.
What you should be doing nowSecurity leaders must shift from detection to prevention and improve their sensitive data protection by enforcing the following:
- Automated data discovery and classification: Know what data lives in your environment and continuously assess its sensitivity. This should be an ongoing, telemetry-driven effort — not a quarterly scan.
- Eliminate public access by default: Enforce least privilege for both data and network access. Public storage should be the rare exception.
- Employ enterprise-grade secrets management: Remove hardcoded secrets and implement cloud-native tools like AWS Secrets Manager and Microsoft Azure Key Vault.
- Cloud Security Posture Management (CSPM): Use identity-intelligent CSPM to unify visibility across your cloud footprint and detect misconfigurations, secrets, and excessive permissions in real time.
Key takeaway: Exposed secrets and sensitive data aren’t obscure edge cases. They’re systemic risks hiding in plain sight — and must be eliminated before attackers exploit them.
Learn more- Download the Tenable Cloud Security Risk Report 2025
- Join our upcoming research webinar Why Your Cloud Data Might Not Be Secure After All: Insights From Tenable Cloud Research
System Admins Beware! Weaponized Putty Ads in Bing Installs Remote Access Tools
Cybersecurity experts are sounding the alarm about a sophisticated malware campaign that leverages malicious advertisements targeting system administrators through weaponized PuTTY downloads. This emerging threat represents a significant shift in attack vectors, with malicious advertisements now surpassing traditional phishing methods as the primary delivery mechanism for malware infections. The current campaign uncovered by ExpelSecurity specifically […]
The post System Admins Beware! Weaponized Putty Ads in Bing Installs Remote Access Tools appeared first on Cyber Security News.