Aggregator
TopSec: утечка данных показала, как Китай контролирует интернет
安全热点周报:Microsoft Power Pages 零日漏洞遭在野利用
CVE-2025-24526 | Mattermost up to 9.11.7/10.1.3/10.2.2/10.3.2/10.4.1 Archived Channel authorization
CVE-2025-1412 | Mattermost up to 9.11.6/10.4.1 session fixiation
CVE-2025-25279 | Mattermost up to 9.11.7/10.2.2/10.3.2/10.4.1 Archive Import path traversal
CVE-2025-24490 | Mattermost up to 9.11.7/10.2.2/10.3.2/10.4.1 Boards Category sql injection
SpyLend Android malware found on Google Play enabled financial cyber crime and extortion
Wireshark 4.4.4 Released With Fix for Vulnerability That Triggers DoS Attack
The Wireshark Foundation has released version 4.4.4 of its widely used network protocol analyzer, addressing a high-severity vulnerability that could allow attackers to trigger denial-of-service (DoS) conditions by injecting malicious packets. The update resolves CVE-2025-1492, a flaw in the Bundle Protocol and CBOR dissectors that caused crashes, infinite loops, and memory leaks when processing specially […]
The post Wireshark 4.4.4 Released With Fix for Vulnerability That Triggers DoS Attack appeared first on Cyber Security News.
GhostSocks Malware Uses SOCKS5 Proxy to Evade Detection Systems
GhostSocks, a Golang-based SOCKS5 backconnect proxy malware, has emerged as a significant threat within the cybercrime ecosystem. First identified in October 2023 on Russian-language forums, its distribution expanded to English-speaking criminal platforms by mid-2024. This malware operates as part of a Malware-as-a-Service (MaaS) model, allowing threat actors to exploit compromised systems for financial gain. Its […]
The post GhostSocks Malware Uses SOCKS5 Proxy to Evade Detection Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Protoclone: андроид-домохозяин с кровью и мышцами готов выйти в свет
CVE-2025-20051 | Mattermost up to 9.11.7/10.2.2/10.3.2/10.4.1 Block path traversal
LockBit Ransomware Strikes: Exploiting a Confluence Vulnerability
In a swift and highly coordinated attack, LockBit ransomware operators exploited a critical remote code execution vulnerability (CVE-2023-22527) in Atlassian Confluence servers, targeting an exposed Windows server. This vulnerability, rated CVSS 10.0, enabled unauthenticated attackers to execute arbitrary commands by injecting malicious Object-Graph Navigation Language (OGNL) expressions into improperly sanitized template files. The attack commenced […]
The post LockBit Ransomware Strikes: Exploiting a Confluence Vulnerability appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
长亭科技荣获ITEC国际技术创新大赛二等奖:以科创实力引领智能网络安全未来
长亭科技荣获ITEC国际技术创新大赛二等奖:以科创实力引领智能网络安全未来
长亭科技荣获ITEC国际技术创新大赛二等奖:以科创实力引领智能网络安全未来
长亭科技荣获ITEC国际技术创新大赛二等奖:以科创实力引领智能网络安全未来
长亭科技荣获ITEC国际技术创新大赛二等奖:以科创实力引领智能网络安全未来
Hackers Exploited Confluence Server Vulnerability To Deploy LockBit Ransomware
A sophisticated ransomware attack leveraging a critical Atlassian Confluence vulnerability (CVE-2023-22527, CVSS 10.0) has been uncovered, culminating in the deployment of LockBit Black ransomware across enterprise networks within two hours of initial compromise. The attackers orchestrated a multi-stage intrusion involving credential theft, lateral movement via RDP, and automated ransomware distribution using legitimate tools like PDQ […]
The post Hackers Exploited Confluence Server Vulnerability To Deploy LockBit Ransomware appeared first on Cyber Security News.