Aggregator
CVE-2024-12415 | quantumcloud AI Infographic Maker Plugin up to 4.9.0 on WordPress code injection
CVE-2024-12037 | svenl77 Post Form Plugin up to 2.8.13 on WordPress bf_new_submission_link cross site scripting
CVE-2024-13662 | vernonsystems eHive Objects Image Grid Plugin up to 2.4.1 on WordPress cross site scripting
Qilin
Patient monitors with backdoor are sending info to China, CISA warns
Contec CMS8000, a patient monitor manufactured by a Chinese company, and Epsimed MN-120, which is the same monitor but relabeled, exfiltrate patients’ data to a hard-coded IP address and have a backdoor that can be used to download and execute unverified files, the US Cybersecurity and Infrastructure Security Agency confirmed. “CISA assesses the inclusion of this backdoor in the firmware of the monitor can create conditions which may allow remote code execution and device modification … More →
The post Patient monitors with backdoor are sending info to China, CISA warns appeared first on Help Net Security.
DeepSeek’s Growing Influence Sparks a Surge in Frauds and Phishing Attacks
The rapid rise of DeepSeek, a Chinese artificial intelligence (AI) company, has not only disrupted the AI industry but also attracted the attention of cybercriminals. As its AI Assistant app became the most downloaded free app on the iOS App Store in January 2025, surpassing OpenAI’s ChatGPT, malicious actors have exploited its popularity to launch […]
The post DeepSeek’s Growing Influence Sparks a Surge in Frauds and Phishing Attacks appeared first on Cyber Security News.
Police dismantles HeartSender cybercrime marketplace network
Italy’s data protection authority Garante blocked the DeepSeek AI platform
Top 5 AI-Powered Social Engineering Attacks
Italy Bans Chinese DeepSeek AI Over Data Privacy and Ethical Concerns
Coyote Banking Malware Weaponizing Windows LNK Files To Execute Malicious Scripts
A new wave of cyberattacks leveraging the Coyote Banking Trojan has been identified, targeting financial institutions in Brazil. This sophisticated malware employs malicious Windows LNK (shortcut) files as an entry point to execute PowerShell scripts, enabling multi-stage infection chains that ends in data theft and system compromise. The attack begins with a malicious LNK file […]
The post Coyote Banking Malware Weaponizing Windows LNK Files To Execute Malicious Scripts appeared first on Cyber Security News.