Aggregator
CVE-2025-4784 | Moderec Tourtella prior 26.05.2025 sql injection (EUVD-2025-22511)
CVE-2025-51085 | Tenda AC8V4 16.03.34.06 /goform/SetSysTimeCfg timeZone stack-based overflow (EUVD-2025-22527)
CVE-2025-7795 | Tenda FH451 1.0.0.9 /goform/P2pListFilter fromP2pListFilter page stack-based overflow (EUVD-2025-21917 / EDB-52374)
FBI Exposes The Com’s Criminal Activities and Involvement of Minors
Там, где мёрзнут панели и гаснет свет, NASA запускает ядерное сердце на 400 лет
CVE-2022-24468 | Microsoft Azure Site Recovery VMWare to Azure privilege escalation (EUVD-2022-29349)
CVE-2022-24489 | Microsoft Windows Server 20H2/Server 2016/Server 2019/Server 2022 Cluster Client Failover privilege escalation (EUVD-2022-29370)
CVE-2022-26917 | Microsoft Windows up to Server 2022 Fax Compose Form Remote Code Execution (EUVD-2022-31463)
CVE-2025-7852 | WPBookit Plugin up to 1.0.6 on WordPress image_upload_handle unrestricted upload (EUVD-2025-22478)
CVE-2025-7437 | Ebook Store Plugin up to 5.8012 on WordPress ebook_store_save_form unrestricted upload (EUVD-2025-22477)
CVE-2022-35768 | Microsoft Windows up to Server 2022 Kernel privilege escalation (EUVD-2022-38641)
CVE-2024-21548 | bun up to 1.1.29 API prototype pollution (SNYK-JS-BUN-8499549 / EUVD-2024-3614)
CVE-2025-50127 | dj-extensions DJ-Flyer Component up to 3.2 on Joomla sql injection (EUVD-2025-22444)
Threat Actors Weaponizing .hwp Files to Deliver RokRAT Malware
Cybersecurity researchers have uncovered a sophisticated malware campaign where threat actors are exploiting Hangul Word Processor (.hwp) documents to distribute the notorious RokRAT malware. This marks a significant shift from the malware’s traditional distribution method through malicious shortcut (LNK) files, demonstrating the evolving tactics of advanced persistent threat groups. The attack campaign utilizes carefully crafted […]
The post Threat Actors Weaponizing .hwp Files to Deliver RokRAT Malware appeared first on Cyber Security News.
Elephant APT Group Exploits VLC Player and Encrypted Shellcode in Attacks on Defense Sector
Arctic Wolf Labs has uncovered a sophisticated cyber-espionage operation attributed to the Dropping Elephant advanced persistent threat (APT) group, also known as Patchwork or Quilted Tiger, focusing on Turkish defense contractors specializing in precision-guided missile systems. The campaign, which began active operations in July 2025, employs a five-stage execution chain initiated through spear-phishing emails containing […]
The post Elephant APT Group Exploits VLC Player and Encrypted Shellcode in Attacks on Defense Sector appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Windows 强制认证攻击全面解析(2025 年最新)
Everest
You must login to view this content