Aggregator
【安全圈】针对近期 Chrome 零日漏洞的利用,Mozilla 向 Windows 用户发布紧急补丁
【安全圈】假冒《白雪公主》电影种子传播恶意软件感染设
【安全圈】美国电信巨头遭新型勒索软件攻击 超40万用户数据泄露
Best Practices for Cyber Risk Management: Why CISOs Must Lead with Real-time Data
The world of cybersecurity has undergone a dramatic transformation, moving beyond simple checklists and technical jargon. The focus has shifted from siloed governance, risk, and compliance (GRC) exercises to cyber risk management that aligns security with business priorities. This transition was a key topic in the recent webinar, The Next-Gen CISO’s Guide to Cyber ROI, where experts discussed how organizations must adopt a risk-first mindset rather than a compliance-driven approach.
The post Best Practices for Cyber Risk Management: Why CISOs Must Lead with Real-time Data appeared first on Security Boulevard.
Critical Firefox, Tor Browser sandbox escape flaw fixed (CVE-2025-2857)
Google’s fixing of CVE-2025-2783, a Chrome zero-day vulnerability exploited by state-sponsored attackers, has spurred Firefox developers to check whether the browser might have a similar flaw – and they found it. There’s currently no indication that the Firefox bug (CVE-2025-2857) is under active exploitation, but this should not be surprising: according to Statcounter, Chrome is used by 66.3% of internet users worldwide and Firefox only by 2.62%. About CVE-2025-2857 CVE-2025-2783 has been described as “a … More →
The post Critical Firefox, Tor Browser sandbox escape flaw fixed (CVE-2025-2857) appeared first on Help Net Security.
GLPI ITSM Tool Flaw Allows Attackers to Inject Malicious SQL Queries
A critical SQL injection vulnerability, tracked as CVE-2025-24799, has been identified in GLPI, a widely used open-source IT Service Management (ITSM) tool. The flaw, if exploited, enables remote, unauthenticated attackers to manipulate database queries, potentially leading to severe consequences such as data theft, tampering, or even remote code execution. CVE-2025-24799 is an SQL injection vulnerability that specifically […]
The post GLPI ITSM Tool Flaw Allows Attackers to Inject Malicious SQL Queries appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.