• Search
  • Topics
  • Nodes
< back

#CyberSecurityNews

72 449 daily Toot LinkedIn
A chart of hourly posts over the last week (for big screens). A chart of hourly posts over the last week (for small screens).
Correlated tags: #rssfeedpostgeneratorecho

1

From gbhackers.com

Bug Bounty Bonanza: $40,000 Reward for Escalating Limited Path Traversal to RCE

1 1

Turning a limited path traversal vulnerability into a fully-fledged remote code execution (RCE) exploit, earning a generous bounty of $40,000.

#bugbounty #cybersecurity #CyberSecurityNews

16h ago


1

From gbhackers.com

BitMEX Fined $100 Million for Violating Bank Secrecy Act

1 1

In a significant legal development, HDR Global Trading Ltd., operating under the name BitMEX, has been fined $100 million for violating the Bank Secrecy Act.

#cybersecurity #CyberSecurityNews

18h ago


1

From gbhackers.com

Hackers Deploy Web Shell To Abuse IIS Worker And Exfiltrate Data

1 1

An attacker exploited a vulnerability in the batchupload.aspx and email_settings.aspx pages on the target server that allowed them to upload

#cve #iis #cyberattack #webshellattack #iisexploitation #CyberSecurityNews #cybersecurityincident

19h ago


1

From cybersecuritynews.com

Pumakit - A Sophisticated Linux Rootkit Attack Critical Infrastructure

1 1

a stealthy and highly sophisticated Linux rootkit named Pumakit has been identified, targeting critical infrastructure sectors.

#malware #cybersecurity #CyberSecurityNews

22h ago


1

From gbhackers.com

FlowerStorm PaaS Platform Attacking Microsoft Users With Fake Login Pages

1 1

Rockstar2FA is a PaaS kit that mimics the legitimate credential-request behavior of cloud/SaaS platforms. Phishing campaigns are delivered

#phishing #microsoft #cybercrime #cybersecurity #credentialtheft #phishingattacks #CyberSecurityNews

12h ago


1

From cybersecuritynews.com

US Treasury Breach - Chinese Hackers Accessed Secretary Janet Yellen’s Computer

1 1

Chinese state-sponsored hackers have successfully breached the computer systems of the U.S. Treasury Department, gaining access to Secretary Janet Yellen's personal computer.

#cybernews #cyberattack #cybersecurity #CyberSecurityNews #computersecuritynews

23h ago


1

From gbhackers.com

AWS Warns of Multiple Vulnerabilities in Amazon WorkSpaces, Amazon AppStream 2.0, & Amazon DCV

2 2

AWS has issued a critical security advisory highlighting vulnerabilities in specific versions of its native clients for Amazon WorkSpaces, AppStream 2.0.

#aws #cve #infosec #ceptbiro #security #amazonaws #amazondcv #vulnerability #amazonappstream #vulnerabilities

11h ago


1

From gbhackers.com

Russian Threat Actor "Star Blizzard" Exploit WhatsApp Accounts Using QR Codes

1 1

Microsoft Threat Intelligence has identified a concerning strategic shift by the notorious Russian threat actor group "Star Blizzard."

#CyberSecurityNews

20h ago


1

From gbhackers.com

Let’s Encrypt Unveils Six-Day Certificate and IP Address Options for 2025

2 2

Let’s Encrypt has announced plans to introduce six-day certificate options and support for IP address certificates in 2025.

#infosec #ceptbiro #security #letsencrypt #ipaddressoptions #CyberSecurityNews #sixdaycertificate #cybersecurity

16h ago


1

From cybersecuritynews.com

Russian Hackers Attacking WhatsApp Users With Malicious QR Codes

1 1

Russian state-sponsored hacking group Star Blizzard has shifted its tactics to exploit WhatsApp users through malicious QR codes.

#malware #cyberattack #cybersecurity #cyberthreatnews #CyberSecurityNews

22h ago


1

From gbhackers.com

New Tool Unveiled to Scan Hacking Content on Telegram

1 1

A Russian software developer, aided by the National Technology Initiative, has introduced a groundbreaking AI module designed to monitor and analyze content on Telegram.

#tools #telegram #cybersecurity #CyberSecurityNews

12h ago


1

From ciso2ciso.com

Sophos ZTNA Updates – Source: news.sophos.com

1 1

Source: news.sophos.com - Author: Chris McCormack PRODUCTS & SERVICES

#ztna #network #products #nakedsecurity #CyberSecurityNews #rssfeedpostgeneratorecho

19h ago


1

From gbhackers.com

PoC Exploit Released for Ivanti Connect Secure RCE Vulnerability

2 2

A serious security flaw has been identified in Ivanti Connect Secure, designated as CVE-2025-0282, which enables remote unauthenticated attackers to execute arbitrary code.

#cve #rce #ivanti #infosec #ceptbiro #security #pocexploit #connectsecure #CyberSecurityNews #cybersecurity

16h ago


1

From ciso2ciso.com

Gootloader inside out – Source: news.sophos.com

1 1

Source: news.sophos.com - Author: Gabor Szappanos The Gootloader malware family uses a distinctive form of social engineering to infect computers: Its cre

#php #seo #yara #gootkit #jscript #malware #Featured #phpshell #wordpress #gootloader

20h ago


1

From ciso2ciso.com

Was ist ein Payload? – Source: www.csoonline.com

1 1

Source: www.csoonline.com - Author: Kein Cyberangriff ohne Payload. Doch was genau meint der Begriff, welche Arten gibt es und wie las

#csoonline #riskmanagement #CyberSecurityNews #rssfeedpostgeneratorecho

13h ago


1

From cybersecuritynews.com

AWS Patches Multiple Vulnerabilities in Amazon WorkSpaces, Amazon AppStream 2.0, & Amazon DCV

1 1

AWS has recently addressed two critical security vulnerabilities affecting its popular cloud-based services.

#threats #cyberattack #cyberattacknews #CyberSecurityNews

9h ago


1

From cybersecuritynews.com

Active Directory Group Policy Bypassed To Allow NTLMv1 Authentications

1 1

Silverfort's cybersecurity research team has uncovered a significant flaw in Microsoft's Active Directory Group Policy that allows NTLMv1 authentication to persist despite being ostensibly disabled.

#ntlmv1 #cybersecurity #authentication #CyberSecurityNews #networksecuritynews #computersecuritynews

19h ago


1

From cybersecuritynews.com

CISA Releases Recommendations For Closing Software Understanding Gap

1 1

CISA in collaboration with other federal agencies, has released a report urging a national effort to close the software understanding gap.

#threats #cybersecurity #CyberSecurityNews

19h ago


1

From gbhackers.com

CISA Releases Guidelines For Closing Software Understanding Gap

1 1

The Cybersecurity and Infrastructure Security Agency (CISA) has released a pivotal report calling for urgent action to address the “software understanding gap.”

#software #cybersecurity #CyberSecurityNews

19h ago

Showing first 20 out of 72