Aggregator
Submit #607949: SCADA-LTS 2.7.8.1 Cross Site Scripting [Accepted]
Chinese ‘Salt Typhoon’ Hackers Hijacked US National Guard Network for Nearly a Year
Chinese state-sponsored hackers known as Salt Typhoon successfully infiltrated and maintained persistent access to a U.S. state’s Army National Guard network for nearly ten months, from March 2024 through December 2024, according to a Department of Homeland Security memo obtained by NBC News. The sophisticated cyberespionage campaign represents a significant escalation in Beijing’s ongoing cyber […]
The post Chinese ‘Salt Typhoon’ Hackers Hijacked US National Guard Network for Nearly a Year appeared first on Cyber Security News.
CVE-2025-4941
Qilin
You must login to view this content
Cracked Apps Delivering Infostealers Identified as Leading Attack Vector in June 2025
The AhnLab Security Intelligence Center (ASEC) published a thorough analysis in June 2025 that identified infostealer malware masquerading as keygens and cracked software as a primary attack vector. This malware uses advanced search engine optimization (SEO) poisoning to elevate malicious distribution sites in search results. ASEC’s automated malware collection systems, including crack monitoring, email honeypots, […]
The post Cracked Apps Delivering Infostealers Identified as Leading Attack Vector in June 2025 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Cisco security advisory (AV25-428)
Operation Eastwood disrupted operations of pro-Russian hacker group NoName057(16)
BADBOX 2.0 Found Preinstalled on Android IoT Devices Worldwide
CVE-2025-39561 | loginwp-pro Plugin up to 4.0.8.5 on WordPress authorization
CVE-2025-37107 | HPE AutoPass License Server up to 9.17 improper authentication (EUVD-2025-21732)
CVE-2025-37106 | HPE AutoPass License Server up to 9.17 improper authentication (EUVD-2025-21733)
HPE security advisory (AV25-427)
Hackers Leverage 607 Malicious Domains to Spread APK Malware with Remote Command Execution
PreCrime Labs at BforeAI discovered a complex cyber threat operation in which hackers have used a vast network of 607 rogue domains to spread fake Telegram Messenger application files (APKs) over the course of the last month. These domains, primarily registered via the Gname registrar and hosting content in Chinese, form part of a large-scale […]
The post Hackers Leverage 607 Malicious Domains to Spread APK Malware with Remote Command Execution appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Louis Vuitton says regional data breaches tied to same cyberattack
Threat Actors Weaponize WordPress Sites to Redirect Visitors to Malicious Domains
Security researchers identified a sophisticated malware campaign targeting WordPress websites, where threat actors embedded malicious code within core files to facilitate unauthorized redirects and search engine optimization (SEO) poisoning. The infection was traced to the wp-settings.php file, a fundamental component of the WordPress framework, which had been altered to include two anomalous lines of PHP […]
The post Threat Actors Weaponize WordPress Sites to Redirect Visitors to Malicious Domains appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
iCounter Debuts With Mission to Defeat AI-Enabled Threats
Former FireEye and Mandiant leader John Watters unveils iCounter, a new cyber risk intelligence startup focused on targeted attacks and AI-enabled adversaries. Backed by Syn Ventures, the firm aims to transform threat detection with deeper visibility into attacker reconnaissance.
Drive-By Attack Vector Patched in Oracle Code Editor
Exploring Oracle Cloud Infrastructure, researchers at Tenable found that Oracle's console-based Code Editor tool failed to block arbitrary file uploads, and could be silently exploited via drive-by attacks to install malware. They said Oracle has now fixed the vulnerability.
Hackers Use Backdoor to Steal Data From SonicWall Appliance
A cybercrime group used a backdoor in a fully patched SonicWall appliance to steal credentials and may have sold the stolen data to ransomware groups as part of an ongoing campaign, Google Threat Intelligence Group found. The firm attributed the campaign to a cybercrime group it tracks as UNC6148.