Aggregator
CVE-2025-58861 | WP Corner Quick Event Calendar Plugin up to 1.4.9 on WordPress cross-site request forgery
CVE-2025-58860 | KaizenCoders Enable Latex Plugin up to 1.2.16 on WordPress cross-site request forgery
CVE-2025-58859 | David Merinas Add to Feedly Plugin up to 1.2.11 on WordPress cross-site request forgery
CVE-2025-58848 | aakash1911 WP Likes Plugin up to 3.1.1 on WordPress cross-site request forgery
CVE-2025-58849 | Deepak S Hide Real Download Path Plugin up to 1.6 on WordPress cross-site request forgery
CVE-2025-58845 | ChrisHurst Bulk Watermark Plugin up to 1.6.10 on WordPress cross-site request forgery
CVE-2025-58843 | David Merinas Auto Last Youtube Video Plugin up to 1.0.7 on WordPress cross-site request forgery
CVE-2025-58847 | Yaidier WN Flipbox Pro Plugin up to 2.1 on WordPress cross-site request forgery
CVE-2025-58809 | Nick Ciske To Lead for Salesforce Plugin up to 2.7.3.9 on WordPress cross-site request forgery
CVE-2025-58807 | Dsingh Purge Varnish Cache Plugin up to 2.6 on WordPress cross-site request forgery
Hackers Weaponize Fake Microsoft Teams Site to Deploy Odyssey macOS Stealer
A sophisticated cyber campaign is targeting macOS users by distributing the potent “Odyssey” information stealer through a deceptive website impersonating the official Microsoft Teams download page. The attack, identified by researchers at CloudSEK’s TRIAD, leverages a social engineering technique known as a “Clickfix” attack to trick victims into executing malicious code that systematically harvests sensitive […]
The post Hackers Weaponize Fake Microsoft Teams Site to Deploy Odyssey macOS Stealer appeared first on Cyber Security News.
Chess.com Hit by Limited Data Breach Linked to 3rd-Party File Transfer Tool
The GhostAction Campaign: 3,325 Secrets Stolen Through Compromised GitHub Workflows
On September 5, 2025, GitGuardian discovered GhostAction, a massive supply chain attack affecting 327 GitHub users across 817 repositories. Attackers injected malicious workflows that exfiltrated 3,325 secrets, including PyPI, npm, and DockerHub tokens via HTTP POST requests to a remote endpoint.
The post The GhostAction Campaign: 3,325 Secrets Stolen Through Compromised GitHub Workflows appeared first on Security Boulevard.