Aggregator
CVE-2024-38822 | VMware SALT prior 3006.12/3007.4 a one-way hash with a predictable salt (EUVD-2024-54685 / Nessus ID 242657)
CVE-2025-22238 | VMware SALT prior 3006.12/3007.4 Cache path traversal (EUVD-2025-18252 / Nessus ID 242657)
CVE-2024-38825 | VMware SALT prior 3006.12/3007.4 salt.auth.pki Password certificate validation (EUVD-2024-54683 / Nessus ID 242657)
CVE-2024-38823 | VMware SALT prior 3006.12/3007.4 authentication replay (EUVD-2024-54684 / Nessus ID 242657)
CVE-2025-22237 | VMware SALT prior 3006.12/3007.4 command injection (EUVD-2025-18253 / Nessus ID 242657)
APT28 Hackers Unveil First LLM-Powered Malware, Enhancing Attack Techniques with AI
Ukraine’s Computer Emergency Response Team (CERT-UA) has publicly reported the emergence of LAMEHUG, marking it as the inaugural malware to embed large language model (LLM) capabilities directly into its attack chain. This campaign targets Ukrainian government officials through phishing emails masquerading as communications from ministry representatives. These emails deliver ZIP archives containing PyInstaller-compiled Python executables, […]
The post APT28 Hackers Unveil First LLM-Powered Malware, Enhancing Attack Techniques with AI appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Xteam: All in one Instagram, Android, Phishing OSINT and WiFi Hacking Tool
Минус солнце, минус урожай: Суперкомпьютер просчитал ядерную зиму и рассказал, как накормить планету.
Qilin
You must login to view this content
Qilin
You must login to view this content
Plankey vows to boot China from U.S. supply chain, advocate for CISA budget
But Trump’s pick to lead CISA sidestepped questions about alleged past or future election manipulation claims.
The post Plankey vows to boot China from U.S. supply chain, advocate for CISA budget appeared first on CyberScoop.
Phishers Target Aviation Execs to Scam Customers
Вертолётам конец. Китай поднял в небо 2-тонного дрона-монстра
Top IT Staff Augmentation Companies in USA 2025
TorCrawl: A Python script designed for anonymous web scraping via the Tor network
Intelligence Insights: July 2025
TP-Link Network Video Recorder Vulnerability Let Attackers Execute Arbitrary Commands
Two high-severity vulnerabilities in TP-Link VIGI network video recorder (NVR) systems could allow attackers to execute arbitrary commands on affected devices. The security flaws, identified as CVE-2025-7723 and CVE-2025-7724, impact the VIGI NVR1104H-4P V1 and VIGI NVR2016H-16MP V2 models, posing significant risks to surveillance infrastructure security. Key Takeaways1. Two serious vulnerabilities let attackers run commands […]
The post TP-Link Network Video Recorder Vulnerability Let Attackers Execute Arbitrary Commands appeared first on Cyber Security News.
SharePoint 0-day Vulnerability Exploited in Wild by All Sorts of Hacker Groups
A critical zero-day vulnerability in Microsoft SharePoint servers has become a playground for threat actors across the cybercriminal spectrum, with attacks ranging from opportunistic hackers to sophisticated nation-state groups since mid-July 2025. On July 19, 2025, Microsoft confirmed that vulnerabilities collectively known as “ToolShell” were being actively exploited in the wild. The exploit chain comprises […]
The post SharePoint 0-day Vulnerability Exploited in Wild by All Sorts of Hacker Groups appeared first on Cyber Security News.