Aggregator
CVE-2011-4968 | nginx 0.8.40 HTTP Proxy input validation (Nessus ID 254321 / XFDB-80952)
FTC Chair Tells Tech Giants to Hold the Line on Encryption
ThreatActors Leverage Google Classroom to Target 13,500 Organizations
Google Classroom, a popular educational platform, has been exploited by threat actors to launch a major phishing campaign in a complex operation discovered by Check Point researchers. Over a single week from August 6 to August 12, 2025, attackers disseminated more than 115,000 malicious emails across five coordinated waves, targeting approximately 13,500 organizations globally. These […]
The post ThreatActors Leverage Google Classroom to Target 13,500 Organizations appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Farmers Insurance data breach impacts 1.1M people after Salesforce attack
How to Streamline Your Game Development Process: 4 Smart Solutions
ClickFix Attack Tricks AI Summaries Into Pushing Malware
Каждую секунду мы живем в иллюзии. Время не течёт — оно просто 'есть' целиком
CVE-2013-4354 | OpenStack Image Registry And Delivery Service (glance) input validation (Nessus ID 254322)
CVE-2012-6617 | FFmpeg 1.0/1.0.1 ffserver.c prepare_sdp_description denial of service (ID 1986 / Nessus ID 254323)
CVE-2008-5144 | Federico Di Gregorio nvidia-cg-toolkit 2.0.0015 Installer link following (Nessus ID 254327 / BID-32411)
CVE-2013-6825 | Offis DCMTK up to 3.6.1 Privileges movescu.cc access control (ID 126883 / Nessus ID 254332)
CVE-2007-2353 | Apache Axis 1.0 Installation javaioFileNotFoundException information disclosure (EDB-29930 / Nessus ID 254329)
CVE-2007-3719 | Linux Kernel 2.6.16 denial of service (Nessus ID 254336 / OSVDB-37127)
CVE-2008-4953 | firehol 1.256 link following (Nessus ID 254335)
CVE-2009-3583 | SQL-Ledger 2.8.24 path traversal (Nessus ID 254334 / XFDB-54967)
New Stealthy Malware Hijacking Cisco, TP-Link, and Other Routers for Remote Control
FortiGuard Labs has uncovered a sophisticated malware campaign targeting critical infrastructure devices from multiple vendors, with the “Gayfemboy” malware strain demonstrating advanced evasion techniques and multi-platform capabilities. The campaign affects organizations globally, exploiting vulnerabilities in DrayTek, TP-Link, Raisecom, and Cisco systems to establish persistent botnet infrastructure with backdoor access and distributed denial-of-service (DDoS) attack capabilities. […]
The post New Stealthy Malware Hijacking Cisco, TP-Link, and Other Routers for Remote Control appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Warlock
You must login to view this content
BSidesSF 2025: Into The Dragon’s Den
Creator, Author and Presenter: Jacob Salassi, Michele Freschi
Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held at the lauded CityView / AMC Metreon - certainly a venue like no other; and via the organization's YouTube channel.
Additionally, the organization is welcoming volunteers for the BSidesSF Volunteer Force, as well as their Program Team & Operations roles. See their succinct BSidesSF 'Work With Us' page, in which, the appropriate information is to be had!
The post BSidesSF 2025: Into The Dragon’s Den appeared first on Security Boulevard.