Aggregator
CVE-2025-3706 | 104 eHRMS up to 202412 cross site scripting
CVE-2025-31144 | SIOS Quick Agent up to 2.9.7/3.2.0 communication channel to intended endpoints
Cybercriminals Selling Sophisticated HiddenMiner Malware on Dark Web Forums
Cybercriminals have begun openly marketing a powerful new variant of the HiddenMiner malware on underground dark web forums, raising alarms within the cybersecurity community. The malware, a heavily modified Monero (XMR) cryptocurrency miner, attracts buyers due to its advanced stealth capabilities and ease of use, even for less technically skilled threat actors. A New Breed […]
The post Cybercriminals Selling Sophisticated HiddenMiner Malware on Dark Web Forums appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-27937 | SIOS Quick Agent up to 2.9.7/3.2.0 path traversal
Three IXON VPN Client Vulnerabilities Let Attackers Escalate Privileges
Security researchers at Shelltrail have discovered three significant vulnerabilities in the IXON VPN client that could allow attackers to escalate privileges on both Windows and Linux systems. The vulnerabilities, temporarily designated as CVE-2025-ZZZ-01, CVE-2025-ZZZ-02, and CVE-2025-ZZZ-03, affect the widely used VPN solution that provides remote access to industrial systems. While official CVE IDs have been […]
The post Three IXON VPN Client Vulnerabilities Let Attackers Escalate Privileges appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-26692 | SIOS Quick Agent up to 2.9.7/3.2.0 path traversal
卢卡斯解释为什么尤达大师总是说倒装句
Everest
Qilin
Qilin
Threat actors are scanning your environment, even if you’re not
In a world where organizations’ digital footprint is constantly changing and attackers regularly capitalize on security failings in exposed IT assets, making the effort to minimize your external attack surface is a no-brainer. The goal is simple: Make your organization a hard nut to crack and thus force attackers to look for easier targets. To do that, you must be able to see the entirety of your organization’s external attack surface as threat actors see … More →
The post Threat actors are scanning your environment, even if you’re not appeared first on Help Net Security.
Blue Shield of California Data Breach Exposes 4.7M Members’ Info
Discover the Blue Shield of California data breach affecting 4.7M members. Learn about the risks and essential security measures to protect your data.
The post Blue Shield of California Data Breach Exposes 4.7M Members’ Info appeared first on Security Boulevard.
Google Cloud Enhances Databases with Firestore and MongoDB Features
Discover Google's Firestore with MongoDB compatibility, enhancing cloud database functionality with serverless architecture. Explore the future of data storage.
The post Google Cloud Enhances Databases with Firestore and MongoDB Features appeared first on Security Boulevard.
Cybersecurity Firm CEO Arrested for Planting Malware in Hospital Systems
Jeffrey Bowie, the CEO of a local cybersecurity firm, has been arrested for allegedly planting malware on computers at SSM St. Anthony Hospital. Bowie, who until recently touted himself as a leader in protecting businesses from cyber threats, now faces charges that he became the very threat he promised to prevent. Police say the incident […]
The post Cybersecurity Firm CEO Arrested for Planting Malware in Hospital Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-38152 | Linux Kernel up to 6.14.1 remoteproc table_sz null pointer dereference (Nessus ID 234884)
CVE-2025-22093 | Linux Kernel up to 6.1.133/6.6.86/6.12.22/6.13.10/6.14.1 AMD Display null pointer dereference (Nessus ID 234884)
CVE-2025-22097 | Linux Kernel up to 6.14.1 vkms_exit initialization (Nessus ID 234884)
CVE-2025-22095 | Linux Kernel up to 6.1.133/6.6.86/6.12.22/6.13.10/6.14.1 regulator_bulk_get denial of service (Nessus ID 234884)
GoSearch: Open-source OSINT tool for uncovering digital footprints
GoSearch is an open-source OSINT tool built to uncover digital footprints linked to specific usernames. Designed for speed and accuracy, it lets users quickly track someone’s online presence across multiple platforms. GoSearch incorporates data from Hudson Rock’s Cybercrime Database, offering detailed insights into potential cybercrime connections. It also draws from BreachDirectory.org and ProxyNova databases, providing extensive access to breached data, including plain-text and hashed passwords associated with usernames. For investigators who need reliable results without … More →
The post GoSearch: Open-source OSINT tool for uncovering digital footprints appeared first on Help Net Security.