Aggregator
Из гостя — в захватчика: что нашли на Pwn2Own в VMware
技术控必入!看雪 2025 限定 T 恤,用技术诠释安全态度
BIND 9 DNS解析软件漏洞,可能引发缓存投毒与拒绝服务攻击
2025名企急招!京东/光年 AI 等企业放出高薪岗,Android 逆向/渗透工程师等你投
从Google CTF Fluffy 看Dart逆向
Lenovo Protection Driver Flaw Enables Privilege Escalation and Code Execution
A critical security vulnerability has been discovered in Lenovo’s protection driver software, affecting millions of users across desktop and laptop systems. The flaw, identified as CVE-2025-4657, allows local attackers with elevated privileges to execute arbitrary code through a buffer overflow exploit, posing significant security risks to enterprise and consumer environments. Vulnerability Details and Impact The […]
The post Lenovo Protection Driver Flaw Enables Privilege Escalation and Code Execution appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
【0718】重保演习每日情报汇总
OpenAI: GPT-5 is coming, "we'll see" if it creates a shockwave
LameHug: first AI-Powered malware linked to Russia’s APT28
新闻出版业下线绕过付费墙的服务 12ft.io
金融监管总局:关于防范虚假宣传诱导网络贷款的风险提示
专家观点 | 筑牢未成年人网络保护防护网——对《可能影响未成年人身心健康的网络信息分类办法(征求意见稿)》的思考
专家解读 | 金融行业跨机构核验中的数据流通安全治理——解读《基于金融业跨银行企业资金流水核验场景的安全多方计算技术应用案例》
关注 | 国家网信办开展个人信息保护负责人信息报送工作
Microsoft Uncovers Scattered Spider Tactics, Techniques, and Procedures in Recent Attacks
Microsoft has shed light on the sophisticated operations of Octo Tempest, a financially motivated cybercriminal group alternatively known as Scattered Spider, Muddled Libra, UNC3944, or 0ktapus. This threat actor has demonstrated a versatile arsenal of tactics, techniques, and procedures (TTPs) in end-to-end attacks targeting organizations across various sectors. Octo Tempest’s methodology typically begins with initial […]
The post Microsoft Uncovers Scattered Spider Tactics, Techniques, and Procedures in Recent Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-6226 | Mattermost up to 9.11.16/10.5.6/10.7.3/10.8.1 Private Channel missing authentication (EUVD-2025-21867)
CVE-2025-6233 | Mattermost up to 9.11.16/10.5.7/10.7.3/10.8.1 JSONL File Import path traversal (EUVD-2025-21866)
CVE-2025-7803 | descreekert wx-discuz up to 12bd4745c63ec203cb32119bf77ead4a923bf277 /wx.php validToken echostr cross site scripting (EUVD-2025-21921)
WAFFLED: New Technique Targets Web Application Firewall Weaknesses
Cybersecurity researchers at Northeastern University and Dartmouth College have unveiled a groundbreaking attack technique that exploits fundamental parsing discrepancies in Web Application Firewalls (WAFs), potentially compromising the security of millions of websites worldwide. The research, dubbed “WAFFLED” (Web Application Firewall Fuzzing through Language Exploitation and Discrepancy), demonstrates how attackers can bypass five major WAF platforms. […]
The post WAFFLED: New Technique Targets Web Application Firewall Weaknesses appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.