Aggregator
CVE-2026-23496 | pimcore Web2Print Tools Bundle up to 5.2.1/6.1.0 API Endpoint access control (GHSA-4wg4-p27p-5q2r)
CVE-2026-23511 | Zitadel up to 3.4.5/4.9.0 Login Interface response discrepancy
CVE-2026-22775 | sveltejs devalue up to 5.6.1 amplification (GHSA-g2pg-6438-jwpf)
CVE-2026-22803 | sveltejs kit up to 2.49.4 memory allocation (GHSA-j2f3-wq62-6q46)
CVE-2026-22774 | sveltejs devalue up to 5.6.1 devalue.parse amplification (GHSA-vw5p-8cq8-m7mv)
CVE-2025-36911 | Google Android Key-based Pairing information disclosure
CVE-2026-0227 | Palo Alto Cloud NGFW/PAN-OS/Prisma Access unusual condition
CVE-2026-23494 | Pimcore up to 11.5.13/12.3.0 API Endpoint staticroutes.php access control (GHSA-m3r2-724c-pwgf)
CVE-2023-37061 | Chamilo LMS up to 1.11.20 Languages Management cross site scripting (EUVD-2023-40981)
CVE-2023-37062 | Chamilo LMS up to 1.11.20 Course Categories Definition cross site scripting (EUVD-2023-40982)
CVE-2023-37058 | Jlink AX1800 1.0 permission (EUVD-2023-40978)
Hackers Abusing Legitimate Cloud and CDN Platforms to Host Phishing Kits
Threat actors are increasingly using trusted cloud and content delivery network platforms to host phishing kits, creating major detection challenges for security teams. Unlike traditional phishing campaigns that rely on newly registered suspicious domains, these attacks use legitimate infrastructure from providers like Google, Microsoft Azure, and AWS CloudFront. This approach allows hackers to bypass many […]
The post Hackers Abusing Legitimate Cloud and CDN Platforms to Host Phishing Kits appeared first on Cyber Security News.
AWS CodeBuild Misconfiguration Exposed GitHub Repos to Potential Supply Chain Attacks
Promptware Kill Chain – Five-Step Kill Chain Model for Analyzing Cyberthreats
Large language models have become deeply integrated into everyday business operations, from customer service chatbots to autonomous agents managing calendars, executing code, and handling financial transactions. This rapid expansion has created a critical security blind spot. Researchers have identified that attacks targeting these systems are not simple prompt injections as commonly believed, but rather sophisticated, […]
The post Promptware Kill Chain – Five-Step Kill Chain Model for Analyzing Cyberthreats appeared first on Cyber Security News.