Aggregator
CVE-2025-21042 | Samsung Devices libimagecodec.quram.so out-of-bounds write (EUVD-2025-29029)
CVE-2025-9784 | Red Hat Undertow HTTP/2 MadeYouReset denial of service (EUVD-2025-26388 / Nessus ID 261317)
CVE-2024-7557 | Red Hat OpenShift AI/OpenShift Data Science access control (EUVD-2024-48861)
Top 10 Best Breach and Attack Simulation (BAS) Tools in 2025
In 2025, the cybersecurity landscape is defined by its complexity and the speed of modern threats. Security teams are overwhelmed by a fragmented array of security controls and a lack of clear visibility into what’s actually working. Breach and Attack Simulation (BAS) platforms solve this problem by continuously and safely validating security defenses against real-world […]
The post Top 10 Best Breach and Attack Simulation (BAS) Tools in 2025 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-10059 | MongoDB Server up to 6.0.23/7.0.17/8.0.5 Setting lsid permission assignment (Nessus ID 264352)
CVE-2025-10061 | MongoDB Server up to 6.0.24/7.0.21/8.0.11/8.1.1 Accumulator group denial of service (EUVD-2025-27034 / Nessus ID 264354)
CVE-2025-29486 | libming 0.4.8 parseSWF_PLACEOBJECT3 memory leak (EUVD-2025-8451 / Nessus ID 264356)
Scattered Lapsus$ Hunters Hacker Group Announces Shutdown
Hacker convicted of extorting 20,000 psychotherapy victims walks free during appeal
CVE-2025-29483 | libming 0.4.8 parseSWF_ENABLEDEBUGGER2 memory leak (EUVD-2025-8465 / Nessus ID 264358)
CVE-2025-29492 | libming 0.4.8 decompileSETVARIABLE memory corruption (Issue 330 / EUVD-2025-8446)
CVE-2025-29489 | libming 0.4.8 parseSWF_MORPHLINESTYLES memory leak (EUVD-2025-8460 / Nessus ID 264359)
New HybridPetya Ransomware Bypasses UEFI Secure Boot With CVE-2024-7344 Exploit
New Clickfix Attack Promises “Free WiFi” But Delivers Powershell-Based Malware
The Cybersecuritynews researcher team uncovered a sophisticated social engineering campaign that is exploiting the public’s need for free internet access, using deceptive Wi-Fi portals to trick users into downloading and executing PowerShell-based malware. Dubbed the “Clickfix” attack, this method turns a user’s own browser actions against them to compromise their system under the guise of […]
The post New Clickfix Attack Promises “Free WiFi” But Delivers Powershell-Based Malware appeared first on Cyber Security News.
New Malware Abuses Azure Functions to Host Command and Control Infrastructure
A malicious ISO image named Servicenow-BNM-Verify.iso was uploaded to VirusTotal from Malaysia with almost no detections. The image contains four files—two openly visible and two hidden. The visible files include a Windows shortcut, servicenow-bnm-verify.lnk, which launches PanGpHip.exe, a legitimate Palo Alto Networks binary. Hidden in the same ISO are libeay32.dll, a genuine OpenSSL library, and […]
The post New Malware Abuses Azure Functions to Host Command and Control Infrastructure appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Samsung fixed actively exploited zero-day
Добро пожаловать в Google. Только это ловушка. VoidProxy — сервис, крадущий всё в момент входа
Man gets over 4 years in prison for selling unreleased movies
New Malvertising Campaign Exploits GitHub Repositories to Distribute Malware
A sophisticated malvertising campaign has been uncovered targeting unsuspecting users through “dangling commits” in a legitimate GitHub repository. Attackers are injecting promotional content for a counterfeit GitHub Desktop installer into popular development and open-source projects. When users download what appears to be the genuine client, the installer quietly delivers malicious payloads in the background, compromising […]
The post New Malvertising Campaign Exploits GitHub Repositories to Distribute Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.