Aggregator
CVE-2025-5258 | Conference Scheduler Plugin up to 2.5.1 on WordPress className cross site scripting
CVE-2025-50213 | Apache Airflow Providers Snowflake up to 6.3.x CopyFromExternalStageToSnowflakeOperator sql injection (EUVD-2025-19239)
Whole Foods supplier UNFI restores core systems after cyberattack
2025-06-26: Lumma Stealer infection with follow-up Rsockstun malware
Pre-Auth Flaw in MongoDB Server Allows Attackers to Cause DoS
A critical pre-authentication vulnerability (CVE-2025-6709) in MongoDB Server enables unauthenticated attackers to trigger denial-of-service (DoS) conditions by exploiting improper input validation in OIDC authentication. The flaw allows malicious actors to crash database servers by sending specially crafted JSON payloads containing specific date values, causing invariant failures and server crashes. This vulnerability affects MongoDB Server versions […]
The post Pre-Auth Flaw in MongoDB Server Allows Attackers to Cause DoS appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
The TechBeat: I Used AI Agents to Automate My Business — Here’s What Happened (6/27/2025)
10 из 10: Хакеры получили способ создать учётную запись администратора на сервере без пароля — и теперь проникают даже в выключенные системы
CVE-2025-6768 | sfturing hosp_order up to 627f426331da8086ce8fff2017d65b1ddef384f8 HospitalServiceImpl.java findAllHosByCondition hospitalName sql injection (Issue 110)
CVE-2025-6767 | sfturing hosp_order up to 627f426331da8086ce8fff2017d65b1ddef384f8 DoctorServiceImpl.java findDoctorByCondition hospitalName sql injection (Issue 109)
CVE-2025-6766 | sfturing hosp_order up to 627f426331da8086ce8fff2017d65b1ddef384f8 OfficeServiceImpl.java getOfficeName officesName sql injection (Issue 108)
Submit #601081: sfturing hosporder v1.0 SQL Injection [Accepted]
Submit #600547: sfturing hosporder v1.0 SQL Injection [Accepted]
Submit #600529: sfturing hosporder v1.0 SQL Injection [Accepted]
BreachForums黑客论坛运营者在法国被捕
BreachForums黑客论坛运营者在法国被捕
CVE-2025-6522 | TrendMakers Sight Bulb Pro Service Port 16668 command injection (icsa-25-177-02)
嘶吼安全产业研究院 | 2025中国网络安全「制造行业」优秀解决方案汇编
嘶吼安全产业研究院 | 2025中国网络安全「制造行业」优秀解决方案汇编
Money mule networks evolve into hierarchical, business-like criminal enterprises
In this Help Net Security interview, Michal Tresner, CEO of ThreatMark, discusses how cybercriminals are weaponizing AI, automation, and social engineering to industrialize money mule operations. He looks at how these networks have changed and how behavioral intelligence is helping to catch fraud. Tresner also shares practical tips for CISOs trying to stop mule activity before it gets out of hand. How are cybercriminals using automation, AI, or social engineering to scale mule recruitment and … More →
The post Money mule networks evolve into hierarchical, business-like criminal enterprises appeared first on Help Net Security.