Aggregator
CVE-2025-10663 | PHPGurukul Online Course Registration 3.1 /my-profile.php cgpa sql injection
LinkedIn now uses your data for AI by default, opt out now!
LinkedIn is making major changes to its User Agreement and Privacy Policy, effective November 3, 2025. Among the most notable updates, the company will now use member data by default to improve its generative AI models, unless users manually opt out. The update reflects LinkedIn’s growing reliance on AI-powered features across its platform. While the company says the data will help improve content-generating tools and user experiences, privacy-conscious members may want to review their settings. … More →
The post LinkedIn now uses your data for AI by default, opt out now! appeared first on Help Net Security.
Tracking New Entrants in Global Spyware Markets
Lurking in the murky depths of the global marketplace for offensive cyber capabilities sits a particularly dangerous instrument—spyware. Spyware’s danger stems from its acute contribution to human rights abuses and national security risks. Most recently, NSO Group, a notorious spyware vendor known to have contributed to the surveillance of journalists, diplomats, and civil society actors […]
The post Tracking New Entrants in Global Spyware Markets appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
如何分析一个人的心理状态(16个分步指南)
Delphi, C++ и безграничная наглость. Raven Stealer превращает Telegram в канал для кражи паролей
CISA Releases Malware Analysis Report on Malicious Listener Targeting Ivanti Endpoint Manager Mobile Systems
Today, CISA released a Malware Analysis Report detailing the functionality of two sets of malware obtained from an organization compromised by cyber threat actors exploiting CVE-2025-4427 and CVE-2025-4428 in Ivanti Endpoint Manager Mobile (Ivanti EPMM).
The Malware Analysis Report, Malicious Listener for Ivanti EPMM Systems, provides guidance to help organizations detect and mitigate these threats, including indicators of compromise and YARA and SIGMA rules. Mitigations include highlighting the need to upgrade Ivanti EPMM systems to the latest version and to treat mobile device management systems as high-value assets with strengthened monitoring and restrictions.
For more information, visit https://www.cisa.gov/news-events/analysis-reports/ar25-261a.
CISA Releases Nine Industrial Control Systems Advisories
CISA released nine Industrial Control Systems (ICS) advisories on September 18, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
- ICSA-25-261-01 Westermo Network Technologies WeOS 5
- ICSA-25-261-02 Westermo Network Technologies WeOS 5
- ICSA-25-261-03 Schneider Electric Saitel DR & Saitel DP Remote Terminal Unit
- ICSA-25-261-04 Hitachi Energy Asset Suite
- ICSA-25-261-05 Hitachi Energy Service Suite
- ICSA-25-261-06 Cognex In-Sight Explorer and In-Sight Camera Firmware
- ICSA-25-261-07 Dover Fueling Solutions ProGauge MagLink LX4 Devices
- ICSA-25-191-10 End-of-Train and Head-of-Train Remote Linking Protocol (Update C)
- ICSA-24-030-02 Mitsubishi Electric FA Engineering Software Products (Update D)
CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.
6位数赏金rce
Insight Partners Confirms Data Breach Exposing Users’ Personal Data
Insight Partners, a global venture capital and private equity firm, has officially confirmed a significant data breach that exposed personal information of individuals connected to the company. The breach notification reveals sophisticated attack methods and a months-long timeline that has raised serious concerns about data security practices at one of the world’s largest investment firms. […]
The post Insight Partners Confirms Data Breach Exposing Users’ Personal Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-30177 | Apache Camel up to 4.8.5/4.10.2 Camel-Undertow Message Header injection (Nessus ID 265334)
Fake Empire Podcast Invites Target Crypto Industry with macOS AMOS Stealer
SonicWall Advises Users to Reset Logins After Config Backup Leak
SonicWall has alerted its customers to reset all login credentials after a recent leak exposed firewall configuration backups. The vendor emphasizes three critical stages—containment, remediation, and monitoring—to minimize risk and restore secure access. Users should follow each stage in order, beginning with containment to block further exposure, proceeding to remediation to reset passwords and shared […]
The post SonicWall Advises Users to Reset Logins After Config Backup Leak appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2002-0412 | Luca Deri ntop 2.0 TraceEvent syslog format string (ID 10560 / XFDB-8347)
CVE-2002-0417 | Endymion Mailman Webmail up to 3.0 mmstdo*.cgi ALTERNATE_TEMPLATES path traversal (ID 10524 / XFDB-8357)
CVE-2002-0418 | Endymion Sake Mail up to 1.0.36 Servlet param_name path traversal (ID 10525 / XFDB-8358)
CVE-2002-0413 | ReBB 1.0 IMG Tag cross site scripting (EDB-21312 / ID 10510)
SilentSync RAT Delivered via Two Malicious PyPI Packages Targeting Python Developers
Intel похоронила свою лучшую разработку заживо — Python-программисты выкопали и вернули к жизни
Hackers Target Facebook Accounts in Latest Phishing Attack
A newly discovered phishing campaign is exploiting Facebook’s external URL warning feature to dupe users into handing over their login credentials. By abusing Facebook’s “You’re about to leave Facebook” redirect mechanism, attackers can conceal malicious URLs behind the social media giant’s official domain and graphic style—making the lure appear bona fide even to cautious users. […]
The post Hackers Target Facebook Accounts in Latest Phishing Attack appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.