Aggregator
BlockBlasters Steam Game Downloads Malware to Computer Disguised as Patch
A seemingly innocent patch update for the popular 2D platformer game BlockBlasters has transformed into a sophisticated malware campaign, exposing hundreds of Steam users to data theft and system compromise. The malicious patch, deployed on August 30, 2025, demonstrates how threat actors are increasingly exploiting the gaming ecosystem to distribute information-stealing malware while users remain […]
The post BlockBlasters Steam Game Downloads Malware to Computer Disguised as Patch appeared first on Cyber Security News.
Apple: «Мы не навязываем, мы просто объясняем, что Chrome — зло»
Closing the Visibility Gap: Corporate Exposure Analytics in the Infostealer Era
Co-authored by Constella Intelligence and Kineviz As infostealer malware continues to scale in reach, automation, and precision, organizations face an increasingly urgent challenge: a lack of comprehensive visibility across their identity exposure landscape. While credential leaks and cookie thefts are often detected in isolation, without centralized and time-aware analytics, security teams cannot understand the true extent …
The post Closing the Visibility Gap: Corporate Exposure Analytics in the Infostealer Era appeared first on Security Boulevard.
CVE-2025-55241:CVSS评分10.0的Microsoft Entra ID漏洞可能危及全球所有租户
BlackLock勒索软件:新型跨平台威胁迅速蔓延
CVE-2025-9961:TP-Link路由器漏洞可被利用实现远程代码执行,PoC已发布
Microsoft将在威斯康星州打造“世界最强AI数据中心
SystemBC僵尸网络每日入侵1500台VPS服务器用于DDoS攻击
ImmuniWeb提供免费工具测试TLS协议栈的抗量子能力
伪造的LastPass GitHub仓库传播Mac信息窃取恶意软件
OpenID基金会为实时安全事件共享制定新标准
BiDi Swap:存在十年的Unicode漏洞仍可实现URL欺骗
PyPI遭遇攻击:新型恶意软件“SilentSync”窃取凭证
Automaker giant Stellantis confirms data breach after Salesforce hack
Threat Actors Leverage Oracle Database Scheduler to Gain Access to Corporate Environments
In recent weeks, security researchers have observed a surge in attacks exploiting Oracle Database Scheduler’s External Jobs feature to gain a foothold in corporate environments. This technique abuses the scheduler’s ability to execute arbitrary commands on Windows-based database servers, allowing adversaries to bypass perimeter defenses. Initial intrusion vectors involve probing publicly exposed Oracle listener ports […]
The post Threat Actors Leverage Oracle Database Scheduler to Gain Access to Corporate Environments appeared first on Cyber Security News.