Aggregator
CVE-2012-4901 | Template CMS up to 2.1.1 admin/index.php themes_editor cross site scripting (EDB-21742 / BID-55766)
CVE-2021-31682 | Automated Logic WebCTRL/WebCTRL OEM up to 6.5 Login Portal operatorlocale cross site scripting (EDB-50463)
CVE-2021-41182 | jQuery-UI up to 1.12.x Datepicker Widget altField cross site scripting (GHSA-9gj3-hwp5-pmwc / Nessus ID 211078)
CVE-2021-41183 | jQuery-UI up to 1.12.x Datepicker Widget *Text cross site scripting (GHSA-j7qv-pgf6-hvh4 / Nessus ID 211078)
CVE-2021-41184 | jQuery-UI up to 1.12.x position of cross site scripting (GHSA-gpqq-952q-5327 / Nessus ID 211078)
TeamsPhisher: Send phishing messages and attachments to Microsoft Teams users
TeamsPhisher TeamsPhisher is a Python3 program that facilitates the delivery of phishing messages and attachments to Microsoft Teams users whose organizations allow external communications. It is not ordinarily possible to send files to Teams...
The post TeamsPhisher: Send phishing messages and attachments to Microsoft Teams users appeared first on Penetration Testing Tools.
Damn Vulnerable RESTaurant: An intentionally vulnerable Web API game for learning and training
Damn Vulnerable RESTaurant An intentionally vulnerable API service designed for learning and training purposes dedicated to developers, ethical hackers, and security engineers. The idea of the project is to provide an environment that can...
The post Damn Vulnerable RESTaurant: An intentionally vulnerable Web API game for learning and training appeared first on Penetration Testing Tools.
More From Our Main Blog: DragonForce Ransomware Gang | From Hacktivists to High Street Extortionists
DragonForce ransomware group is targeting major UK retailers. Learn about this evolving threat and what steps can be taken to mitigate risk.
The post DragonForce Ransomware Gang | From Hacktivists to High Street Extortionists appeared first on SentinelOne.
CVE-2025-31324
CVE-2025-2783
Daily Dose of Dark Web Informer - 2nd of May 2025
How to Handle CMMC Scoping for Remote Employees
CMMC mandates that companies working as part of the government supply line need to comply with a level of security determined by their handling of controlled information. Identifying the level of compliance necessary for your business is the first step in achieving that compliance. The second step is scoping. All About Scoping for CMMC What […]
The post How to Handle CMMC Scoping for Remote Employees appeared first on Security Boulevard.
Alleged Sale of Credit Card Data from the UK
Hundreds of Fortune 500 Companies Have Unknowingly Employed North Korean IT Operatives
North Korean nationals have successfully infiltrated the employee ranks of major global corporations at a scale previously underestimated, creating a pervasive threat to IT infrastructure and sensitive data worldwide. Security experts revealed at the RSAC 2025 Conference that the infiltration extends across virtually every major corporation, with hundreds of Fortune 500 companies unknowingly employing North […]
The post Hundreds of Fortune 500 Companies Have Unknowingly Employed North Korean IT Operatives appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
State-Sponsored Hacktivism on the Rise, Transforming the Cyber Threat Landscape
Global cybersecurity landscape is undergoing a significant transformation, as state-sponsored hacktivism gains traction amid ongoing conflicts. In 2024, Forescout Technologies Inc. documented 780 hacktivist attacks, predominantly conducted by four groups operating on opposite sides of the Russia-Ukraine and Israel-Palestine conflicts: BlackJack, Handala Group, Indian Cyber Force, and NoName057(16). Critical infrastructure, including government, military, transportation, logistics, […]
The post State-Sponsored Hacktivism on the Rise, Transforming the Cyber Threat Landscape appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Stealthy New NodeJS Backdoor Infects Users Through CAPTCHA Verifications
Security researchers have uncovered a sophisticated malware campaign utilizing fake CAPTCHA verification screens to deploy a stealthy NodeJS backdoor. The attack, part of the broader KongTuke campaign, leverages compromised websites to distribute malicious JavaScript that ultimately deploys advanced remote access trojans (RATs) capable of tunneling traffic through SOCKS5 proxies with XOR-based encryption. SpiderLabs researchers note […]
The post Stealthy New NodeJS Backdoor Infects Users Through CAPTCHA Verifications appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Interlock
NVIDIA Riva AI Speech Flaw Let Hackers Gain Unauthorized Access to Abuse GPU Resources & API keys
Researchers have uncovered significant security vulnerabilities in NVIDIA Riva, a breakthrough AI speech technology platform used for transcription, voice assistants, and conversational AI. The flaws, now formally recognized as CVE-2025-23242 and CVE-2025-23243, expose enterprise users to potential unauthorized access and resource theft. These vulnerabilities stemmed from exposed API endpoints that operated without proper authentication safeguards, […]
The post NVIDIA Riva AI Speech Flaw Let Hackers Gain Unauthorized Access to Abuse GPU Resources & API keys appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.