Aggregator
CVE-2025-1254 | RTI Connext Professional up to 7.4.x Core Libraries out-of-bounds
CVE-2025-31199
CVE-2025-20337
CVE-2025-20281
Chinese Companies Linked With Hackers Filed Patents Over 10+ Forensics and Intrusion Tools
Cybersecurity researchers have uncovered more than 10 patents for highly intrusive forensics and data collection technologies filed by Chinese companies directly linked to state-sponsored hacking operations, according to a new report from SentinelLABS released this week. The patents, registered by firms named in recent U.S. Department of Justice indictments, detail sophisticated offensive capabilities including encrypted […]
The post Chinese Companies Linked With Hackers Filed Patents Over 10+ Forensics and Intrusion Tools appeared first on Cyber Security News.
New DoubleTrouble Banking Malware Targets Users Through Phishing Sites to Steal Credentials
Researchers at zLabs have been closely monitoring the DoubleTrouble banking trojan, a rapidly evolving malware strain that has shifted its tactics to exploit unsuspecting users across Europe. Initially disseminated via phishing websites mimicking reputable banks, the trojan has now adapted to more insidious distribution methods, including bogus sites hosting samples directly in Discord channels. This […]
The post New DoubleTrouble Banking Malware Targets Users Through Phishing Sites to Steal Credentials appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2024-56134 | Progress LoadMaster up to 7.2.60.1 os command injection
Inside a Real Clickfix Attack: How This Social Engineering Hack Unfolds
Researchers Link New SS7 Encoding Attack to Surveillance Vendor Activity
GitHub security advisory AV25-472
What the Coinbase Breach Says About Insider Risk
Ransomware Attacks Escalate to Physical Threats Against Executives
Threat Actors Weaponizes LNK Files to Deploy RedLoader Malware on Windows Systems
The cybersecurity landscape faces a renewed threat as the GOLD BLADE cybercriminal group has significantly evolved their attack methodology, combining previously observed techniques to create a sophisticated infection chain. This new campaign, which surged in July 2025, leverages malicious LNK files paired with a recycled WebDAV technique to deploy their custom RedLoader malware on Windows […]
The post Threat Actors Weaponizes LNK Files to Deploy RedLoader Malware on Windows Systems appeared first on Cyber Security News.
20 Best Inventory Management Tools in 2025
Inventory management tools streamline tracking and managing stock levels, orders, sales, and deliveries. It provides real-time visibility into inventory across multiple locations, ensuring accurate stock levels and reducing the risk of overstocking or stockouts. These tools often include features for barcode scanning, which automates updating inventory counts and reduces human error. Advanced inventory management systems […]
The post 20 Best Inventory Management Tools in 2025 appeared first on Cyber Security News.
Камера для защиты — или троян с объективом? Dahua подставила своих пользователей
Espionage costing Australia $8 billion each year, warns intelligence chief
CVE-2024-56135 | Progress LoadMaster up to 7.2.60.1 os command injection
Lenovo IdeaCentre and Yoga Laptop BIOS Vulnerabilities Let Attackers Execute Arbitrary Code
Critical vulnerabilities in Lenovo’s IdeaCentre and Yoga All-In-One systems could allow privileged local attackers to execute arbitrary code and access sensitive system information. The vulnerabilities affect InsydeH2O BIOS implementations used in specific Lenovo desktop and all-in-one computer models, with CVSS scores ranging from 6.0 to 8.2, indicating high severity risks. Key Takeaways1. Six BIOS vulnerabilities […]
The post Lenovo IdeaCentre and Yoga Laptop BIOS Vulnerabilities Let Attackers Execute Arbitrary Code appeared first on Cyber Security News.