Aggregator
CVE-2025-2859 | Arteche saTECH BCU 2.1.3 improper authentication
CVE-2025-2858 | Arteche saTECH BCU 2.1.3 CLI privileges management
CVE-2025-2861 | Arteche saTECH BCU 2.1.3 HTTP Protocol cleartext transmission
SHELBY Malware Steals Data by Abusing GitHub as Command-and-Control Server
Elastic Security Labs has uncovered a sophisticated malware campaign, dubbed REF8685, targeting the Iraqi telecommunications sector. The campaign utilizes a novel malware family called SHELBY, which abuses GitHub for command-and-control (C2) operations, data exfiltration, and command retrieval. Novel Malware Family Targets Iraqi Telecommunications Sector The SHELBY malware family consists of two main components: SHELBYLOADER and […]
The post SHELBY Malware Steals Data by Abusing GitHub as Command-and-Control Server appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-0986 | IBM PowerVM Hypervisor up to FW1050.30/FW1060.20 Linux Processor Combability Mode data amplification
Что такое Shadow IT и почему оно угрожает бизнесу
CVE-2025-2909 | Fermax DuoxMe App up to 3.3.0 on iOS cleartext storage
CVE-2025-2910 | Fermax MeetMe prior 2024-09 Authentication Service observable response discrepancy
CVE-2025-2911 | Fermax MeetMe prior 2024-09 excessive authentication
CVE-2024-7407 | Streamsoft Prestiż up to 18.2.376 weak encoding for password
Researchers Uncover 46 Critical Flaws in Solar Power Systems From Sungrow, Growatt, and SMA
CVE-2024-11504 | Streamsoft Prestiż prior 18.1.376.37 Multiple sql injection
Taking control of monetization
aiSIEM-Cguard: Revolutionizing Cybersecurity with AI-Powered Threat Detection
In today’s evolving digital landscape, cyber threats are becoming increasingly sophisticated, targeting organizations of all sizes. Traditional security measures struggle to keep up with the sheer volume and complexity of modern cyberattacks. To counter these challenges, businesses need a proactive, AI-driven security solution that offers real-time threat detection, automated responses, and comprehensive security analytics. Seceon’s
The post aiSIEM-Cguard: Revolutionizing Cybersecurity with AI-Powered Threat Detection appeared first on Seceon Inc.
The post aiSIEM-Cguard: Revolutionizing Cybersecurity with AI-Powered Threat Detection appeared first on Security Boulevard.
46 New Vulnerabilities in Solar Inverter Systems Allow Attackers to Tamper with Settings
Forescout Vedere Labs has uncovered 46 new vulnerabilities in solar power systems, primarily affecting inverters from three leading manufacturers Sungrow, Growatt, and SMA. These flaws, if exploited, could enable attackers to manipulate inverter settings, disrupt power grids, and compromise user privacy. The research highlights that 80% of vulnerabilities disclosed in solar systems over the past […]
The post 46 New Vulnerabilities in Solar Inverter Systems Allow Attackers to Tamper with Settings appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Prevent Web Scraping by Applying the Pyramid of Pain
DeBackdoor: A Framework for Detecting Backdoor Attacks in Deep Learning Models
Deep learning models, increasingly integral to safety-critical systems like self-driving cars and medical devices, are vulnerable to stealthy backdoor attacks. These attacks involve injecting hidden triggers into models, causing them to misbehave when triggered. Researchers from the Qatar Computing Research Institute and the Mohamed bin Zayed University of Artificial Intelligence have developed DeBackdoor, a novel […]
The post DeBackdoor: A Framework for Detecting Backdoor Attacks in Deep Learning Models appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.