Aggregator
CVE-2024-42646 | NanoMQ 0.21.10 Message memory corruption (EUVD-2024-54786)
CVE-2024-42649 | NanoMQ 0.22.10 PUBLISH Message memory leak (EUVD-2024-54785)
CVE-2024-42648 | NanoMQ 0.22.10 CONNECT Message denial of service (EUVD-2024-54784)
CVE-2025-50756 | Wavlink WN535K3 20191010 set_sys_adm newpass command injection (EUVD-2025-21351)
Dedicated Proxies: A Key Tool for Online Privacy, Security and Speed
Threat Actors Attacking Gen Z Gamers With Weaponized Versions of Popular Games
A sophisticated malware campaign targeting Generation Z gamers has emerged, leveraging weaponized versions of popular games to infiltrate gaming communities and steal sensitive information. The campaign, which has recorded over 19 million malware distribution attempts in a single year, demonstrates how cybercriminals are increasingly exploiting the digital native generation’s passion for gaming to execute large-scale […]
The post Threat Actors Attacking Gen Z Gamers With Weaponized Versions of Popular Games appeared first on Cyber Security News.
New PHP-Based Interlock RAT Variant Uses FileFix Delivery Mechanism to Target Multiple Industries
Хотели на юг? Попали на «Мамонта». Пока мечтали о море — кормили хакеров
Gigabyte UEFI Firmware Vulnerability Let Attackers Execute Arbitrary Code in the SMM Environment
Critical security vulnerabilities have been discovered in Gigabyte UEFI firmware that could allow attackers to execute arbitrary code in System Management Mode (SMM), one of the most privileged execution environments in modern processors. The vulnerabilities, disclosed by the Software Engineering Institute’s CERT Coordination Center on July 11, 2025, affect multiple Gigabyte systems and could enable […]
The post Gigabyte UEFI Firmware Vulnerability Let Attackers Execute Arbitrary Code in the SMM Environment appeared first on Cyber Security News.
Gigabyte motherboards vulnerable to UEFI malware bypassing Secure Boot
Microsoft Details on Fixing Error “Identify Which Process Is Blocking a File in Windows” With Built-in Tools
Microsoft has provided comprehensive guidance for resolving the common Windows error “The process cannot access the file because it is being used by another process.” This technical issue, which frequently frustrates users attempting to delete, move, or modify files, can now be systematically diagnosed and resolved using several built-in Windows utilities and free Microsoft tools. […]
The post Microsoft Details on Fixing Error “Identify Which Process Is Blocking a File in Windows” With Built-in Tools appeared first on Cyber Security News.
Global
You must login to view this content
Russia-linked group spoofing European journalists to spread disinformation
朝鲜 IT 工程师用假身份求职逐渐成为一个全球性问题
Алло, это не Сбербанк. Скоро эта фраза станет историей — навсегда
Top Cyber Struggles of Small, Rural Healthcare Providers
Summarizing Emails With Gemini? Beware Prompt Injection Risk
Attackers can hide malicious instructions inside emails to trick Google's Gemini into delivering falsified summaries with deceptive messages to end users, researchers warn. Google said it's continuing to put multiple defenses in place to combat these types of prompt injection attacks.
PerfektBlue Bug Chain Exposes Cars to Bluetooth Hacking
A set of critical Bluetooth flaws in software that helps cars connect to phones and other devices could enable attackers to remotely take control of car infotainment systems used by major automakers including Mercedes-Benz, Skoda and Volkswagen, new research shows.
SecWiki News 2025-07-14 Review
规划适合自己的学习路径、锚定自己的创新坐标 by ourren
Gartner 2025年安全运营技术成熟度曲线速读 by ourren
更多最新文章,请访问SecWiki