Aggregator
CVE-2024-11037 | binary-husky gpt_academic on Windows blocked_paths path traversal
CVE-2024-11041 | vLLM up to 0.6.2 API Function MessageQueue.dequeue deserialization
3 км ради одной рентгеновской вспышки? Учёные сжали лазер FEL до метров — и он уже работает
Вы не знаете, что делать при взломе? Начните с этих 7 шагов
CVE-2024-12376 | lm-sys fastchat server-side request forgery
CVE-2024-12387 | binary-husky gpt_academic ZIP unrestricted upload
North Korean hackers target open-source repositories in new espionage campaign
Silver Fox Hackers Exploit Weaponized Google Translate Tools to Deliver Windows Malware
The Knownsec 404 Advanced Threat Intelligence Team has lately discovered increased activity from the Silver Fox cybercrime gang, which has been using fake versions of popular programs as weapons to spread malware in a complex cyber threat landscape. Tracing back to 2024, these attacks often masquerade as legitimate Google Translate interfaces, employing deceptive JavaScript redirects […]
The post Silver Fox Hackers Exploit Weaponized Google Translate Tools to Deliver Windows Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
17K+ SharePoint Servers Exposed to Internet – 840 Servers Vulnerable to 0-Day Attacks
A massive exposure of Microsoft SharePoint servers to internet-based attacks has been identified, with over 17,000 servers exposed and 840 specifically vulnerable to the critical zero-day vulnerability CVE-2025-53770, according to new findings from Shadowserver Foundation. The vulnerability, dubbed “ToolShell” by researchers, carries a critical CVSS score of 9.8 and allows unauthenticated attackers to execute arbitrary […]
The post 17K+ SharePoint Servers Exposed to Internet – 840 Servers Vulnerable to 0-Day Attacks appeared first on Cyber Security News.
The truth about macOS malware in 2025
高铁的环境影响
Городские автобусы под атакой. Хакеры могут следить, подменять маршруты и исчезать с радаров
实战-某次通过API接口进行的渗透测试
Researchers Detailed North Korean Threat Actors Technical Strategies to Uncover Illicit Access
North Korean threat actors have evolved their cybercriminal operations into a sophisticated digital deception campaign that has successfully siphoned at least $88 million USD from organizations worldwide. These operatives, masquerading as legitimate freelance developers, IT staff, and contractors, have exploited the global shift toward remote work to embed themselves within trusted corporate workflows. The campaign […]
The post Researchers Detailed North Korean Threat Actors Technical Strategies to Uncover Illicit Access appeared first on Cyber Security News.