Aggregator
CVE-2025-10205 | ABB FLXEON up to 9.3.5 hash without salt
CVE-2025-10664 | PHPGurukul Small CRM 4.0 /create-ticket.php subject sql injection
6000 чужих миров и один из них может быть обитаемым. NASA переписала карту космоса
Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
Google has released a security update for the Chrome stable channel to fix a zero‑day vulnerability (CVE-2025-10585) reported by its Threat Analysis Group (TAG) on Tuesday. “Google is aware that an exploit for CVE-2025-10585 exists in the wild,” the company announced. About CVE-2025-10585 Like CVE-2025-6554, which was fixed earlier this year, CVE-2025-10585 is a type confusion vulnerability in V8, Chrome’s JavaScript and WebAssembly engine. Unfortunately, that’s the only information Google has shared about it. As … More →
The post Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585) appeared first on Help Net Security.
CVE-2025-10662 | SeaCMS up to 13.3 admin_members.php?ac=editsave ID sql injection
CVE-2025-10663 | PHPGurukul Online Course Registration 3.1 /my-profile.php cgpa sql injection
LinkedIn now uses your data for AI by default, opt out now!
LinkedIn is making major changes to its User Agreement and Privacy Policy, effective November 3, 2025. Among the most notable updates, the company will now use member data by default to improve its generative AI models, unless users manually opt out. The update reflects LinkedIn’s growing reliance on AI-powered features across its platform. While the company says the data will help improve content-generating tools and user experiences, privacy-conscious members may want to review their settings. … More →
The post LinkedIn now uses your data for AI by default, opt out now! appeared first on Help Net Security.
Tracking New Entrants in Global Spyware Markets
Lurking in the murky depths of the global marketplace for offensive cyber capabilities sits a particularly dangerous instrument—spyware. Spyware’s danger stems from its acute contribution to human rights abuses and national security risks. Most recently, NSO Group, a notorious spyware vendor known to have contributed to the surveillance of journalists, diplomats, and civil society actors […]
The post Tracking New Entrants in Global Spyware Markets appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
如何分析一个人的心理状态(16个分步指南)
Delphi, C++ и безграничная наглость. Raven Stealer превращает Telegram в канал для кражи паролей
CISA Releases Malware Analysis Report on Malicious Listener Targeting Ivanti Endpoint Manager Mobile Systems
Today, CISA released a Malware Analysis Report detailing the functionality of two sets of malware obtained from an organization compromised by cyber threat actors exploiting CVE-2025-4427 and CVE-2025-4428 in Ivanti Endpoint Manager Mobile (Ivanti EPMM).
The Malware Analysis Report, Malicious Listener for Ivanti EPMM Systems, provides guidance to help organizations detect and mitigate these threats, including indicators of compromise and YARA and SIGMA rules. Mitigations include highlighting the need to upgrade Ivanti EPMM systems to the latest version and to treat mobile device management systems as high-value assets with strengthened monitoring and restrictions.
For more information, visit https://www.cisa.gov/news-events/analysis-reports/ar25-261a.
CISA Releases Nine Industrial Control Systems Advisories
CISA released nine Industrial Control Systems (ICS) advisories on September 18, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
- ICSA-25-261-01 Westermo Network Technologies WeOS 5
- ICSA-25-261-02 Westermo Network Technologies WeOS 5
- ICSA-25-261-03 Schneider Electric Saitel DR & Saitel DP Remote Terminal Unit
- ICSA-25-261-04 Hitachi Energy Asset Suite
- ICSA-25-261-05 Hitachi Energy Service Suite
- ICSA-25-261-06 Cognex In-Sight Explorer and In-Sight Camera Firmware
- ICSA-25-261-07 Dover Fueling Solutions ProGauge MagLink LX4 Devices
- ICSA-25-191-10 End-of-Train and Head-of-Train Remote Linking Protocol (Update C)
- ICSA-24-030-02 Mitsubishi Electric FA Engineering Software Products (Update D)
CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.
6位数赏金rce
Insight Partners Confirms Data Breach Exposing Users’ Personal Data
Insight Partners, a global venture capital and private equity firm, has officially confirmed a significant data breach that exposed personal information of individuals connected to the company. The breach notification reveals sophisticated attack methods and a months-long timeline that has raised serious concerns about data security practices at one of the world’s largest investment firms. […]
The post Insight Partners Confirms Data Breach Exposing Users’ Personal Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-30177 | Apache Camel up to 4.8.5/4.10.2 Camel-Undertow Message Header injection (Nessus ID 265334)
Fake Empire Podcast Invites Target Crypto Industry with macOS AMOS Stealer
SonicWall Advises Users to Reset Logins After Config Backup Leak
SonicWall has alerted its customers to reset all login credentials after a recent leak exposed firewall configuration backups. The vendor emphasizes three critical stages—containment, remediation, and monitoring—to minimize risk and restore secure access. Users should follow each stage in order, beginning with containment to block further exposure, proceeding to remediation to reset passwords and shared […]
The post SonicWall Advises Users to Reset Logins After Config Backup Leak appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.