Aggregator
CVE-2025-8177 | LibTIFF up to 4.7.0 tools/thumbnail.c setrow buffer overflow (Issue 715 / EUVD-2025-22770)
Senator Urges FTC Probe Into Microsoft After Ascension Ransomware Attack
Top 10 Best Penetration Testing as a Service (PTaaS) Companies in 2025
Penetration Testing as a Service (PTaaS) is a modern approach to offensive security that combines the best of human-led penetration testing with the efficiency of an automated platform. Unlike traditional, project-based penetration tests, a PTaaS model provides continuous, on-demand testing, real-time collaboration, and a centralized dashboard for managing findings. In 2025, this agile approach is […]
The post Top 10 Best Penetration Testing as a Service (PTaaS) Companies in 2025 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Business speed, lasting security: Conversation with Amazon’s Senior Software Development Engineer Naman Jain
To ensure the security of sensitive internet data, it takes more than encryption; it requires clear principles, careful design, and evidential support. Naman Jain is a Senior Software Development Engineer and a leading practitioner in secure systems for fintech and digital payments. At Amazon, he has led the architecture of an enterprise tokenization and sensitive […]
The post Business speed, lasting security: Conversation with Amazon’s Senior Software Development Engineer Naman Jain appeared first on Cyber Security News.
16 Minutes to Impact: npm Supply Chain Abuse Deploys crypto-draining malware
A targeted supply chain compromise of an open-source node package manager (npm) resulted in malicious updates to widely used packages, enabling cryptocurrency theft through traffic interception and transaction manipulation of browser-based crypto wallets.
The post 16 Minutes to Impact: npm Supply Chain Abuse Deploys crypto-draining malware appeared first on Sygnia.
«Угроза стабильности интернета». Домашние роутеры обрушили европейский сервис по защите от DDoS-атак
CVE-2025-7901 | yangzongzhuan RuoYi up to 4.8.1 Swagger UI /swagger-ui/index.html configUrl cross site scripting (Issue 293 / EUVD-2025-22027)
CVE-2025-7906 | yangzongzhuan RuoYi up to 4.8.1 CommonController.java uploadFile unrestricted upload (Issue 296 / EUVD-2025-22036)
CVE-2025-51458 | eosphoros-ai db-gpt 0.7.0 /v1/editor/sql/run editor_sql_run/query_ex sql injection
CVE-2025-51464 | aimhubio aim 3.28.0 /api/reports pyodide.code.run_js cross site scripting
CVE-2025-51459 | eosphoros-ai db-gpt 0.7.0 ZIP File upload agent.hub.controller.refresh_plugins unrestricted upload
CVE-2025-54573 | cvat-ai cvat up to 2.41.x improper authentication
CVE-2025-8847 | yangzongzhuan RuoYi up to 4.8.1 /system/notice/edit noticeTitle/noticeContent cross site scripting (Issue 298)
CVE-2025-54366 | freescout-help-desk freescout up to 1.8.185 Helper::decrypt deserialization (GHSA-vcc2-6r66-gvvj / EUVD-2025-22772)
CVE-2025-54377 | RooCodeInc Roo-Code up to 3.23.18 command injection (EUVD-2025-22473)
CVE-2025-7903 | yangzongzhuan RuoYi up to 4.8.1 Image Source ui layer (Issue 295 / EUVD-2025-22029)
Akira ransomware exploiting critical SonicWall SSLVPN bug again
Vidar Infostealer Back With a Vengeance
PhishKit Evasion Tactics: What You Need to Pay Attention to Right Now
Cyber attackers constantly refine their evasion methods. That’s what makes threats, including phishing, increasingly hard to detect and investigate. Kits like Tycoon 2FA regularly evolve with new tricks added to their arsenal. They slip past defenses and compromise companies, demonstrating great adaptivity in modern cyber threats. Let’s review three key evasion techniques of Tycoon 2FA […]
The post PhishKit Evasion Tactics: What You Need to Pay Attention to Right Now appeared first on Cyber Security News.