Aggregator
Было «своевременно», стало — «3 часа на инцидент»: что меняет ЦБ в ИБ-правилах
Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods
Critical Bluetooth Protocol Vulnerabilities Expose Devices to RCE Attacks
Security researchers have disclosed a critical set of Bluetooth vulnerabilities dubbed “PerfektBlue” that affect millions of vehicles and other devices using OpenSynergy’s BlueSDK framework. The vulnerabilities can be chained together to achieve remote code execution (RCE) with minimal user interaction, requiring only device pairing to launch successful attacks. Bluetooth Protocol Vulnerabilities The PerfektBlue attack leverages […]
The post Critical Bluetooth Protocol Vulnerabilities Expose Devices to RCE Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Sigma360 AI Investigator Agent reduces manual reviews
Sigma360 launched AI Investigator Agent, an autonomous GenAI agent that transforms how compliance teams handle risk alerts. This innovation leverages advanced AI and entity resolution models to clear easily identifiable false positives, reducing manual match reviews by up to 90% and enabling analysts to focus on genuine threats. The agent addresses one of the most persistent challenges in financial crime compliance: dealing with overwhelming volumes of alerts that drain valuable analyst time and expertise. Through … More →
The post Sigma360 AI Investigator Agent reduces manual reviews appeared first on Help Net Security.
Lynx
You must login to view this content
CISA Releases Thirteen Industrial Control Systems Advisories
CISA released thirteen Industrial Control Systems (ICS) advisories on July 10, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
- ICSA-25-191-01 Siemens SINEC NMS
- ICSA-25-191-02 Siemens Solid Edge
- ICSA-25-191-03 Siemens TIA Administrator
- ICSA-25-191-04 Siemens SIMATIC CN 4100
- ICSA-25-191-05 Siemens TIA Project-Server and TIA Portal
- ICSA-25-191-06 Siemens SIPROTEC 5
- ICSA-25-191-07 Delta Electronics DTM Soft
- ICSA-25-191-08 Advantech iView
- ICSA-25-191-09 KUNBUS RevPi Webstatus
- ICSA-25-191-10 End-of-Train and Head-of-Train Remote Linking Protocol
- ICSA-25-121-01 KUNBUS GmbH Revolution Pi (Update A)
- ICSA-25-135-19 ECOVACS DEEBOT Vacuum and Base Station (Update A)
- ICSA-24-263-02 IDEC Products (Update A)
CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CVE-2025-5777 Citrix NetScaler ADC and Gateway Out-of-Bounds Read Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
То, что бомбардирует Землю на скорости света — теперь у нас под микроскопом
微信支付商户号注册全流程指南(最新版)| 如何开通微信支付收款功能
Nippon Steel IT Subsidiary Hit by "Zero-Day Attack," Causing Data Breach
Four arrested by UK police over ransomware attacks on M&S, Co-op and Harrods
Code highlighting with Cursor AI for $500,000
Мы думали, Калигула был психом …а он хладнокровно выписывал смерть — будто это рецепт от кашля
Brave Browser For Android via F‑Droid: Now Fully Available
Brave has taken a significant step toward empowering privacy-conscious Android users by making its browser fully available through its own F-Droid repository, providing an alternative distribution method that bypasses Google Play Store entirely. According to the recent report, this strategic move addresses growing concerns about Big Tech’s control over app distribution and offers users greater […]
The post Brave Browser For Android via F‑Droid: Now Fully Available appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
掌握多云安全的八个技巧
Using Signal Groups for Activism
Rhadamanthys Infostealer Uses ClickFix Technique to Steal Login Credentials
The Rhadamanthys Stealer, a highly modular information-stealing virus that was first discovered in 2022, has made a comeback with a clever and dishonest delivery method called ClickFix Captcha. This is a terrifying development for cybersecurity experts. This technique disguises malicious payloads behind seemingly legitimate CAPTCHA interfaces, tricking users into executing sophisticated malware. Leverages CAPTCHA Disguise […]
The post Rhadamanthys Infostealer Uses ClickFix Technique to Steal Login Credentials appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.