Aggregator
CVE-2022-41473 | RPCMS 3.0.2 Search cross site scripting
CVE-2022-41474 | RPCMS 3.0.2 cross-site request forgery
CVE-2022-41475 | RPCMS 3.0.2 cross-site request forgery
Emulating the Terrorizing VanHelsing Ransomware
AttackIQ has released a new attack graph emulating the behaviors exhibited by VanHelsing ransomware, a new and rapidly growing ransomware-as-a-service (RaaS) affiliate program that emerged in March 2025. This emulation enables defenders to test and validate their detection and response capabilities against this new threat.
The post Emulating the Terrorizing VanHelsing Ransomware appeared first on AttackIQ.
The post Emulating the Terrorizing VanHelsing Ransomware appeared first on Security Boulevard.
BitLocker加密通过Bitpixie(CVE-2023-21563)在几分钟内绕过 - PoC揭示了高风险攻击路径
Tor через oniux: без proxy, без ошибок, без утечек — только Rust и namespaces
CISA Alerts on Five Active Zero-Day Windows Vulnerabilities Being Exploited
Cybersecurity professionals and network defenders, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added five newly identified Windows 0-day vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. These vulnerabilities, currently exploited in the wild, present significant risks for organizations relying on Microsoft Windows environments. The CISA urges all stakeholders to prioritize immediate mitigation efforts […]
The post CISA Alerts on Five Active Zero-Day Windows Vulnerabilities Being Exploited appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
三个漏洞使Apache IoTDB面临攻击
Intruder vs. Acunetix vs. Attaxion: Comparing Vulnerability Management Solutions
The vulnerability management market is projected to reach US$24.08 billion by 2030, with numerous vendors offering seemingly different solutions to the same problem. How does an organization choose the right vulnerability management tool for its needs? Today, we compare three tools that offer overlapping (but different) vulnerability management capabilities—Intruder, Acunetix, and Attaxion. We’ll start with […]
The post Intruder vs. Acunetix vs. Attaxion: Comparing Vulnerability Management Solutions appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Proofpoint to acquire Hornetsecurity
Proofpoint has entered into a definitive agreement to acquire Hornetsecurity, a pan-European provider of AI-powered Microsoft 365 (M365) security, data protection, compliance, and security awareness services. Terms of the deal are confidential. The acquisition significantly enhances Proofpoint’s ability to provide human-centric security to SMBs globally through MSPs, further enabling all organizations to protect their people and defend their data. By combining Proofpoint’s global leadership with Hornetsecurity’s expertise in the MSP ecosystem, the two companies will … More →
The post Proofpoint to acquire Hornetsecurity appeared first on Help Net Security.
Hackers Exploit Google Services to Send Malicious Law Enforcement Requests
Cybersecurity researchers have uncovered a sophisticated phishing campaign where malicious actors exploit Google services to dispatch fraudulent law enforcement requests. This audacious scheme leverages the trust associated with Google’s infrastructure, specifically Google Forms and Google Drive, to craft and distribute highly convincing requests that appear to originate from legitimate law enforcement entities. The primary objective […]
The post Hackers Exploit Google Services to Send Malicious Law Enforcement Requests appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Threat Actors Exploit Open Source Packages to Deploy Malware in Supply Chain Attacks
The Socket Threat Research Team has uncovered a surge in supply chain attacks where threat actors weaponize open source software libraries to deliver malicious payloads such as infostealers, remote shells, and cryptocurrency drainers. With modern development heavily reliant on ecosystems like npm, PyPI, Go Module, Maven Central, and RubyGems where 70–90% of codebases consist of […]
The post Threat Actors Exploit Open Source Packages to Deploy Malware in Supply Chain Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-4795 | gongfuxiang schoolcms 2.3.1 index.php?m=Admin&c=article&a=SaveInfo ID sql injection
CVE-2024-52880 | Insyde InsydeH2O up to 05.70.49 VariableRuntimeDxe Driver denial of service
Record-Breaking $27 Billion Black Market ‘Haowang Guarantee’ Deals Conducted Behind Closed Doors
Major victory against online crime, two of the world’s largest illicit marketplaces-Huione Guarantee (also known as “Haowang Guarantee”) and Xinbi Guarantee-were forced offline on May 13, 2025. These platforms collectively enabled over $35 billion in transactions, mostly in the stablecoin Tether (USDT), for a range of illegal goods and services including money laundering, stolen data, […]
The post Record-Breaking $27 Billion Black Market ‘Haowang Guarantee’ Deals Conducted Behind Closed Doors appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-4794 | PHPGurukul Online Course Registration 3.1 /news.php newstitle sql injection
CVE-2025-4793 | PHPGurukul Online Course Registration 3.1 edit-student-profile.php cgpa sql injection
Submit #572601: https://github.com/gongfuxiang/schoolcms schoolcms2.3.1 2.3.1 SQL injection [Accepted]
CISA Alerts on Active Exploitation of Zero-Day Vulnerability in Multiple Fortinet Products
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning regarding five zero-day vulnerabilities affecting multiple Fortinet products, after evidence emerged of active exploitation in the wild. The vulnerabilities, tracked as CVE-2025-32756, impact Fortinet’s FortiVoice, FortiMail, FortiNDR, FortiRecorder, and FortiCamera platforms, widely used in enterprise environments for unified communications, email, network detection, […]
The post CISA Alerts on Active Exploitation of Zero-Day Vulnerability in Multiple Fortinet Products appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.