Aggregator
WorldLeaks
You must login to view this content
Hackers Actively Exploited CitrixBleed 2 Flaw Ahead of PoC Disclosure
Cybersecurity researchers have discovered that threat actors began exploiting the critical CitrixBleed 2 vulnerability nearly two weeks before a public proof-of-concept was released, highlighting the sophisticated nature of modern attack campaigns. The vulnerability, tracked as CVE-2025-5777, represents a significant security risk for organizations running Citrix NetScaler appliances. Early Exploitation Timeline GreyNoise security researchers observed the […]
The post Hackers Actively Exploited CitrixBleed 2 Flaw Ahead of PoC Disclosure appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
RCE без уязвимостей — новая реальность. Claude научил хакера обходить самого себя
US Data Breaches Head for Another Record Year After 11% Surge
Cisco Unified Intelligence Center Flaw Lets Remote Attackers Upload Arbitrary Files
A critical security vulnerability has been discovered in Cisco’s Unified Intelligence Center that allows authenticated remote attackers to upload arbitrary files to affected systems, potentially enabling complete system compromise. The flaw, tracked as CVE-2025-20274, carries a CVSS score of 6.3 and has been assigned a High security impact rating by Cisco due to the potential […]
The post Cisco Unified Intelligence Center Flaw Lets Remote Attackers Upload Arbitrary Files appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-4302 | Stop User Enumeration Plugin up to 1.7.2 on WordPress REST API /wp-json/wp/v2/users/ information exposure
Побег из песочницы: Google экстренно закрывает брешь в защите Chrome
五大使用场景说明:该抛弃VPN的时候到了
Most European Financial Firms Still Lagging on DORA Compliance
Weaponizing SVG: How Threat Actors Embed Malicious JavaScript in Vector Files
Cybersecurity researchers have identified an emerging attack campaign where threat actors are weaponizing Scalable Vector Graphics (SVG) files to deliver sophisticated JavaScript-based redirect attacks. This technique exploits the inherent trust placed in image formats, allowing malicious actors to embed obfuscated JavaScript within seemingly harmless vector graphics files that execute automatically when opened in web browsers. […]
The post Weaponizing SVG: How Threat Actors Embed Malicious JavaScript in Vector Files appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Submit #616224: CMS Made Simple 2.2.21 Cross Site Scripting [Duplicate]
Chinese Hackers Target Taiwan's Semiconductor Sector with Cobalt Strike, Custom Backdoors
Submit #616168: CMS Made Simple 2.2.21 Cross Site Scripting (XSS) [Duplicate]
Submit #615671: CMS Made Simple 2.2.21 Cross Site Scripting [Duplicate]
UNC6148 deploys Overstep malware on SonicWall devices, possibly for ransomware operations
SpaceX 的 Falcon 9 火箭发射了亚马逊的 24 颗宽带卫星
Роботы научились чинить себя. Следующий шаг — жить без людей
0-Day RCE Flaw in SonicWall SMA Devices Exploited to Launch OVERSTEP Ransomware
Google’s Threat Intelligence Group (GTIG) has uncovered a sophisticated cyberattack campaign targeting end-of-life SonicWall Secure Mobile Access (SMA) 100 series appliances, where threat actors are exploiting previously stolen credentials and deploying a new rootkit called OVERSTEP. The financially motivated group, tracked as UNC6148, has been operating since at least October 2024 and is suspected of […]
The post 0-Day RCE Flaw in SonicWall SMA Devices Exploited to Launch OVERSTEP Ransomware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.