Aggregator
BSidesSF 2025: Welcome To Day Two Of BSidesSF 2025!
Creator, Author and Presenter: Reed Loden
Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held at the lauded CityView / AMC Metreon - certainly a venue like no other; and via the organization's YouTube channel.
Additionally, the organization is welcoming volunteers for the BSidesSF Volunteer Force, as well as their Program Team & Operations roles. See their succinct BSidesSF 'Work With Us' page, in which, the appropriate information is to be had!
The post BSidesSF 2025: Welcome To Day Two Of BSidesSF 2025! appeared first on Security Boulevard.
New Cryptojacking Attack Exploits Redis Servers to Install Miners and Disable Defenses
A sophisticated cryptojacking campaign has emerged, exploiting misconfigured Redis servers across multiple continents to deploy cryptocurrency miners while systematically dismantling security defenses. The threat actor behind this operation, designated TA-NATALSTATUS, has been active since 2020 but has significantly escalated their activities throughout 2025, targeting exposed Redis instances with alarming success rates across major economies. The […]
The post New Cryptojacking Attack Exploits Redis Servers to Install Miners and Disable Defenses appeared first on Cyber Security News.
CVE-2025-51989 | Evolution Consulting HRmaster Module 235 keresztnév cross site scripting (EUVD-2025-25487)
CVE-2009-20003 | Xenorate up to 2.50 xpl Playlist File stack-based overflow (EUVD-2009-5117)
CVE-2010-20115 | Arcane Vermillion FTP Daemon up to 1.31 PORT Command out-of-bounds write (EUVD-2010-5307)
CVE-2025-43747 | Liferay DXP server-side request forgery (EUVD-2025-25497 / WID-SEC-2025-1894)
CVE-2025-41451 | Danfoss AK-SM8xxA up to 4.3.0 Configuration os command injection (EUVD-2025-25499)
Why adversaries LOVE scripts
Удар по GPS-империи: британский ИИ убил спутниковую навигацию одной камерой смартфона
CVE-2025-24285 | Ubiquiti UniFi Connect EV Station Lite up to 1.5.1 command injection (EUVD-2025-25502)
CVE-2025-31239 | Apple visionOS File Parser use after free (EUVD-2025-14774)
CVE-2025-31239 | Apple watchOS File Parser use after free (EUVD-2025-14774)
CVE-2025-31239 | Apple tvOS File Parser use after free (EUVD-2025-14774)
CVE-2025-31239 | Apple macOS File Parser use after free (EUVD-2025-14774)
CVE-2025-31239 | Apple iOS/iPadOS File Parser use after free (EUVD-2025-14774)
China-linked Murky Panda targets and moves laterally through cloud services
In its recently released 2025 Threat Hunting Report, Crowdstrike pointed out an interesting trend: a 136% surge in cloud intrusions. A good chunk of this surge is due to “China-nexus adversaries”, Murky Panda (aka Silk Typhoon) among them. Murky Panda’s modus operandi The group has been active since at least 2023, and is primarily focused on breaching government, technology, academia, legal, and professional services entities in North America and stealing sensitive information from them. The … More →
The post China-linked Murky Panda targets and moves laterally through cloud services appeared first on Help Net Security.
Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection
BQTLOCK Ransomware-as-a-Service Emerges, Boasting Sophisticated Evasion Tactics
Ransomware-as-a-Service (RaaS) models continue to democratize sophisticated attacks in the ever-changing world of cybercrime by allowing affiliates with little technical know-how to distribute ransomware through profit-sharing or subscription models. A newly identified strain, BQTLock, has emerged since mid-July 2025, operating under this RaaS paradigm and marketed aggressively on dark web forums and Telegram channels. Overview […]
The post BQTLOCK Ransomware-as-a-Service Emerges, Boasting Sophisticated Evasion Tactics appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.