Aggregator
CVE-2025-4797 | Golo Theme up to 1.7.0 on WordPress Setting improper authentication
CVE-2025-48124 | Spreadsheet Price Changer for WooCommerce and WP E-commerce Plugin path traversal
CVE-2025-5103 | Ultimate Gift Cards for WooCommerce Plugin up to 3.1.4 on WordPress wps_wgm_save_post default_price/product_id sql injection
CVE-2025-32291 | SUMO Affiliates Pro Plugin up to 10.7.0 on WordPress unrestricted upload
CVE-2025-31052 | Fashion Theme up to 1.4.4 on WordPress deserialization
CVE-2025-39358 | WP Posts Carousel Plugin up to 1.3.12 on WordPress deserialization
CVE-2025-32283 | Solar Energy Theme up to 3.5 on WordPress deserialization
CVE-2025-48267 | WP Pipes Plugin up to 1.4.2 on WordPress wp-config.php delete_template denial of service
CVE-2025-49069 | Cimatti Consulting Contact Forms Plugin up to 1.9.8 on WordPress cross-site request forgery (EUVD-2025-16689)
CVE-2025-48387 | mafintosh tar-fs up to 1.16.4/2.1.2/3.0.8 path traversal (EUVD-2025-16687)
CVE-2025-48996 | haxtheweb haxPsuUsage.js up to 10.0.2 API Endpoint HAXPsuUsage insertion of sensitive information into sent data (EUVD-2025-16686)
HPE security advisory (AV25-310)
Alleged sale of admin access to Opco EP – Root & Application-Level MySQL Credentials
MainStreet Bank reports vendor cyber incident that leaked customer info
Survey: Changing Threat Landscape Drives Cybersecurity Spending Shifts
A survey of 840 cybersecurity leaders conducted by The Futurum Group finds that cybersecurity budgets will increase on average to 11% of the IT budget in 2025, with just under half (49%) planning either a major (10%), moderate (21%) or minor consolidation (18%) to streamline operations. In contrast, just under a quarter (24%) are planning..
The post Survey: Changing Threat Landscape Drives Cybersecurity Spending Shifts appeared first on Security Boulevard.
How to Keep Your Litecoin Safe: A Practical Guide
Threat Actors Leverage ClickFix Technique to Deploy EddieStealer Malware
Cybersecurity researchers have identified a sophisticated malware campaign utilizing deceptive CAPTCHA interfaces to distribute EddieStealer, a Rust-based information stealing malware that targets sensitive user data across multiple platforms. The attack employs the ClickFix technique, tricking victims into executing malicious commands through fake verification prompts, representing a significant evolution in social engineering tactics used by cybercriminals. […]
The post Threat Actors Leverage ClickFix Technique to Deploy EddieStealer Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Trickbot, Conti Ransomware Operator Unmasked Amid Huge Ops Leak
OffensiveCon25 – Fighting Cavities: Securing Android Bluetooth By Red Teaming
Author/Presenter: Jeong Wook Oh, Rishika Hooda and Xuan Xing
Our sincere appreciation to OffensiveCon by Binary Gecko, and the Presenters/Authors for publishing their outstanding OffensiveCon 2025 video content. Originating from the conference’s events located at the Hilton Berlin; and via the organizations YouTube channel.
Thanks and a Tip O' The Hat to Verification Labs :: Penetration Testing Specialists :: Trey Blalock GCTI, GWAPT, GCFA, GPEN, GPCS, GCPN, CRISC, CISA, CISM, CISSP, SSCP, CDPSE for recommending the OffensiveCon 25 conference.
The post OffensiveCon25 – Fighting Cavities: Securing Android Bluetooth By Red Teaming appeared first on Security Boulevard.