Aggregator
EV Charging Provider Confirm Data Breach – Customers Personal Data Exposed
Digital Charging Solutions GmbH (DCS), a leading provider of white-label charging services for automotive OEMs and fleet operators, has confirmed a data breach affecting a limited number of its customers. DCS disclosed that unauthorized access to personal data occurred in the course of its customer-support processes. The incident was detected through irregularities in log data and […]
The post EV Charging Provider Confirm Data Breach – Customers Personal Data Exposed appeared first on Cyber Security News.
第三届“天网杯”网络安全大赛收官,夯实网络安全战略人才基石
360发布银狐木马预警: 新变种实现驱动漏洞武器化,手法堪比APT攻击
“天网杯”纳米AI视频创作赛圆满落幕,ISC.AI学苑推动“教育AI+”新范式
Роботы теперь сливают секреты производства. Нужно не взламывать, а просто наблюдать за машиной
Hackers Hijacking IIS Servers Using Malicious BadIIS Module to Serve Malicious Content
A sophisticated cyber campaign, dubbed “Operation Rewrite,” is actively hijacking Microsoft Internet Information Services (IIS) web servers to serve malicious content through a technique known as search engine optimization (SEO) poisoning. Palo Alto Networks uncovered the operation in March 2025, attributing it with high confidence to a Chinese-speaking threat actor who uses a malicious IIS […]
The post Hackers Hijacking IIS Servers Using Malicious BadIIS Module to Serve Malicious Content appeared first on Cyber Security News.
CVE-2025-39801 | Linux Kernel up to 6.17-rc2 dwc3 denial of service (EUVD-2025-29185 / Nessus ID 265710)
CVE-2025-39800 | Linux Kernel up to 6.1.148/6.6.102/6.12.43/6.16.3 btrfs btrfs_copy_root buffer overflow (EUVD-2025-29186 / Nessus ID 265710)
CVE-2025-38676 | Linux Kernel up to 6.17-rc2 iommu str stack-based overflow (Nessus ID 265710)
Hackers Abuse IMDS Service for Cloud Initial Access
Cloud environments rely on the Instance Metadata Service (IMDS) to provide virtual machines with temporary credentials and essential configuration data. IMDS allows applications to securely retrieve credentials without embedding secrets in code or configuration files. However, threat actors have found ways to misuse this convenience, turning IMDS into a springboard for stealing credentials, moving laterally, […]
The post Hackers Abuse IMDS Service for Cloud Initial Access appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.