Aggregator
Adversarial Exposure Validation (AEV) – The Missing Link in Your CTEM Program
Webinar | FAIK Everything: The Deepfake Playbook, Unleashed
AI Needs a Firewall and Cloud Needs a Rethink
The cloud was meant to be cheaper, but it's not. A bold new vision is emerging: one that slashes costs, decentralizes AI and secures APIs at the edge. From inference to firewalls, a reimagined internet is challenging hyperscaler dominance.
Hackers Target Zero-Day Vulnerability to Exploit CrushFTP
Managed file-transfer software developer CrushFTP said a zero-day vulnerability in its tool's web interface is being actively exploited to gain admin-level access to servers. The company urged immediate updating, saying all versions of its software released since July 1 are patched.
UK Sanctions 3 Russian Military Cyber Units
The U.K. government on Friday sanctioned three Russian Military Intelligence Service units 29155, 26165 and 74455 in the United Kingdom and Ukraine. The sanctions also targeted 18 Russian officials for their role in GRU cyber operations dating back to 2013.
UNG0002 Deploys Weaponized LNK Files with Cobalt Strike and Metasploit to Target Organizations
Seqrite Labs APT-Team has uncovered a persistent threat entity, UNG0002 (Unknown Group 0002), orchestrating espionage-driven operations across Asian jurisdictions, including China, Hong Kong, and Pakistan. Active since at least May 2024, this South-East Asia-based cluster has demonstrated a high degree of adaptability and technical prowess, targeting critical sectors such as defense, civil aviation, electrotechnical engineering, […]
The post UNG0002 Deploys Weaponized LNK Files with Cobalt Strike and Metasploit to Target Organizations appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Malicious Implants Are Coming to AI Components, Applications
After website hack, Arizona election officials unload on Trump’s CISA
As the state responded to a pro-Iranian attack, officials tell CyberScoop that it avoided reaching out to the federal agency, partly because it has been “politicized and weakened” under the president.
The post After website hack, Arizona election officials unload on Trump’s CISA appeared first on CyberScoop.
File transfer company CrushFTP warns of zero-day exploit seen in the wild
CVE-2025-21957 | Linux Kernel up to 6.1.131/6.6.83/6.12.19/6.13.7 qla1280.c DEBUG_QLA1280 null pointer dereference (Nessus ID 234309 / WID-SEC-2025-0683)
CVE-2025-21942 | Linux Kernel up to 6.13.6 cow_file_range allocation of resources (EUVD-2025-9379 / WID-SEC-2025-0683)
CVE-2025-21946 | Linux Kernel up to 6.6.82/6.12.18/6.13.6 ksmbd parse_sec_desc out-of-bounds (Nessus ID 241070 / WID-SEC-2025-0683)
CVE-2025-21947 | Linux Kernel up to 6.1.130/6.6.82/6.12.18/6.13.6 IPC Response ipc_msg_send_request type confusion (Nessus ID 234309 / WID-SEC-2025-0683)
CVE-2025-21939 | Linux Kernel up to 6.12.18/6.13.6 xe hmm_range_fault null pointer dereference (Nessus ID 241070 / WID-SEC-2025-0683)
CVE-2025-21936 | Linux Kernel up to 6.1.130/6.6.82/6.12.18/6.13.6 Bluetooth mgmt_alloc_skb null pointer dereference (Nessus ID 234309 / WID-SEC-2025-0683)
CVE-2025-21938 | Linux Kernel up to 6.1.130/6.6.82/6.12.18/6.13.6 mptcp_pm_nl_append_new_local_addr state issue (Nessus ID 234309 / WID-SEC-2025-0683)
CVE-2025-21934 | Linux Kernel up to 6.13.6 rapidio rio_add_net use after free (Nessus ID 234309 / WID-SEC-2025-0683)
CVE-2025-21935 | Linux Kernel up to 6.13.6 rapidio rio_add_net return value (Nessus ID 234309 / WID-SEC-2025-0683)
DeerStealer Malware Spread Through Weaponized .LNK and LOLBin Tools
A new wave of cyber-attacks has emerged, exploiting Windows shortcut files (.LNK) combined with legitimate system utilities collectively known as Living-off-the-Land Binaries and Scripts (LOLBin/S) to deliver the DeerStealer infostealer through highly obfuscated multi-stage chains. Recent campaigns begin with phishing emails or fraudulent file shares containing weaponized .LNK files camouflaged as seemingly benign documents, often […]
The post DeerStealer Malware Spread Through Weaponized .LNK and LOLBin Tools appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.