Aggregator
A Threat Actor Claims to have Leaked The Unified State Register of Real Estate of the Russian Federation
9 - CVE-2025-26617
10 - CVE-2025-1094
2025-02-18: SmartApeSG script for fake browser update leads to NetSupport RAT and StealC
T00ls第十二届年度(2024)人物风云榜
T00ls第十二届年度(2024)人物风云榜
T00ls第十二届年度(2024)人物风云榜
T00ls第十二届年度(2024)人物风云榜
T00ls第十二届年度(2024)人物风云榜
T00ls第十二届年度(2024)人物风云榜
T00ls第十二届年度(2024)人物风云榜
[Meachines] [Easy] Horizontall Strapi RCE+KTOR-HTTP扫描+Laravel Monolog 权限提升
BianLian
Russian Hackers Target Signal Messenger Users to Steal Sensitive Data
Russian state-aligned threat actors have intensified their efforts to compromise Signal Messenger accounts, targeting individuals of strategic interest, according to the Google Threat Intelligence Group (GTIG). These campaigns, primarily linked to Russia’s ongoing military operations in Ukraine, aim to intercept sensitive communications from military personnel, politicians, journalists, and activists. The attackers are exploiting Signal’s “linked […]
The post Russian Hackers Target Signal Messenger Users to Steal Sensitive Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Akira
Hackers Exploit Jarsigner Tool to Deploy XLoader Malware
Security researchers at AhnLab Security Intelligence Center (ASEC) have uncovered a new campaign leveraging the legitimate JAR signing tool, jarsigner.exe, to distribute the XLoader malware. The attack employs a DLL side-loading technique, where malicious DLL files are placed alongside legitimate executable files to ensure their execution when the legitimate application is run. This method exploits […]
The post Hackers Exploit Jarsigner Tool to Deploy XLoader Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Hackers Converting Stolen Payment Card Data into Apple & Google Wallets
Cybercriminal groups, primarily based in China, are leveraging advanced phishing techniques and mobile wallet technologies to convert stolen payment card data into fraudulent Apple and Google Wallet accounts. This innovative approach has revitalized the underground carding industry, which had been weakened in recent years by the adoption of chip-based payment cards in the United States. […]
The post Hackers Converting Stolen Payment Card Data into Apple & Google Wallets appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
iOS 18 settings to lock down your privacy and security
Enhancing your security and privacy on iOS 18 involves configuring various settings to control access to your personal data and device features. Here are 12 essential settings to consider. Enable two-factor authentication (2FA) Using 2FA authentication adds an extra layer of security to your Apple ID. When it’s on, the account password and the six-digit verification code are required to access the account. The verification code is sent to the phone number associated with the … More →
The post iOS 18 settings to lock down your privacy and security appeared first on Help Net Security.
DEF CON 32 – MoWireless MoProblems: Modular Wireless Survey Sys. & Data Analytics
Authors/Presenters: G. Horvath, W.. Tam
Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel.
The post DEF CON 32 – MoWireless MoProblems: Modular Wireless Survey Sys. & Data Analytics appeared first on Security Boulevard.