Aggregator
MediaTek Warns of Multiple Vulnerabilities that let Attackers Escalate Privileges
MediaTek has issued urgent security advisories warning of multiple high-severity vulnerabilities in its system-on-chip (SoC) architectures, including flaws that enable local privilege escalation (LPE) and remote code execution (RCE). The March 2025 Product Security Bulletin highlights three high severity vulnerabilities CVE-2025-20644, CVE-2025-20645, and CVE-2025-20646—affecting modem firmware, cryptographic key management, and Wi-Fi subsystems. These vulnerabilities impact […]
The post MediaTek Warns of Multiple Vulnerabilities that let Attackers Escalate Privileges appeared first on Cyber Security News.
The New Ransomware Groups Shaking Up 2025
【安全圈】黑客滥用 Google 和 PayPal 的基础设施窃取用户个人数据
【安全圈】虚假验证码网络钓鱼活动影响超过1150个组织
【安全圈】美国追回 2021 年铀金融黑客攻击中被盗的 3100 万美元
报告发布 | BLACKBASTA勒索组织内部泄密事件分析报告
报告发布 | BLACKBASTA勒索组织内部泄密事件分析报告
报告发布 | BLACKBASTA勒索组织内部泄密事件分析报告
报告发布 | BLACKBASTA勒索组织内部泄密事件分析报告
报告发布 | BLACKBASTA勒索组织内部泄密事件分析报告
New Vulnerability in Substack let Attackers Take Over Subdomains
A newly disclosed edge case in Substack’s custom domain implementation allows threat actors to hijack inactive subdomains, potentially enabling content spoofing, phishing campaigns, and brand impersonation. The researcher identified 1,426 vulnerable domains – representing 8% of all Substack-associated custom domains – that remain exposed due to misconfigured DNS records, including 11 wildcard domains that exponentially […]
The post New Vulnerability in Substack let Attackers Take Over Subdomains appeared first on Cyber Security News.
DOGE Access to Personal Information and The Difficulty of Showing Harm in Privacy Litigation
If a company has effective insurance, prevention becomes even less cost-effective. By failing to “value” privacy alone, the system skews in favor of not protecting privacy.
The post DOGE Access to Personal Information and The Difficulty of Showing Harm in Privacy Litigation appeared first on Security Boulevard.
您有一份两会重保方案,请查收!
Ensuring Continuity in Industrial Operations: A Guide to OT Backup Strategies
Tailoring backup strategies to ensure operational resilience, safeguard critical configurations, and mitigate risks in Operational Technology environments.
The post Ensuring Continuity in Industrial Operations: A Guide to OT Backup Strategies appeared first on Sygnia.
New Poco RAT Via Weaponized PDF Attacking Users to Capture Sensitive Data
A new variant of malware, dubbed “Poco RAT,” has emerged as a potent espionage tool in a campaign targeting Spanish-speaking users in Latin America. Security researchers at Positive Technologies Expert Security Center (PT ESC) have linked this malware to the notorious Dark Caracal group, known for its cyber-mercenary operations. The campaign employs weaponized PDF files […]
The post New Poco RAT Via Weaponized PDF Attacking Users to Capture Sensitive Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.