Aggregator
CVE-2025-30390 | Microsoft Azure Machine Learning improper authorization (EUVD-2025-12759)
CVE-2025-31062 | redqteam Wishlist Plugin up to 2.1.0 on WordPress exposure of sensitive system information to an unauthorized control sphere (EUVD-2025-15465)
CVE-2025-26673 | Microsoft Windows up to Server 2025 Lightweight Directory Access Protocol resource consumption (EUVD-2025-10211)
CVE-2025-29823 | Microsoft Excel use after free (EUVD-2025-10121 / Nessus ID 234233)
Lynx
You must login to view this content
Сложить банан с яблоком не получится. А вот 3 + 11 = 2 — легко, если вы в группе
CVE-2025-21416 | Microsoft Azure Virtual Desktop authorization (EUVD-2025-12761)
CVE-2025-30392 | Microsoft Azure AI Bot Service improper authorization (EUVD-2025-12760)
CVE-2025-31063 | redqteam Wishlist Plugin up to 2.1.0 on WordPress authorization (EUVD-2025-15464)
CVE-2025-31065 | themeton Rozario Plugin up to 1.4 on WordPress authorization (EUVD-2025-15463)
CVE-2025-31071 | themeton HotStar Plugin up to 1.4 on WordPress authorization (EUVD-2025-15460)
CVE-2025-31066 | themeton Acerola Plugin up to 1.6.5 on WordPress authorization (EUVD-2025-15462)
CVE-2025-31068 | themeton Seven Stars Plugin up to 1.4.4 on WordPress cross-site request forgery (EUVD-2025-15461)
Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack
A serious security flaw affecting the Eventin plugin, a popular event management solution for WordPress, was recently discovered by Denver Jackson, a member of the Patchstack Alliance community. This vulnerability in the plugin, which boasts over 10,000 active installations, allowed any unauthenticated user to gain administrative access to the affected sites, putting them at significant […]
The post Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication
A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign embedded within the seemingly innocuous package os-info-checker-es6. First published on March 19, 2025, with initial versions appearing benign, the package rapidly evolved into a complex threat. Early iterations focused on gathering basic OS information, but subsequent updates between March 22-23 introduced […]
The post Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
FCC commissioner blasts Trump administration censorship policies
“When minority commissioners dissent, they are fired,” Commissioner Anna Gomez said of the Trump administration’s assault on free speech.
The post FCC commissioner blasts Trump administration censorship policies appeared first on CyberScoop.
CVE-2005-0410 | CitrusDB 0.3.6 importcc.php sql injection (EDB-25101 / XFDB-19355)
macOS Gatekeeper Explained – Strengthening System Defenses
Apple’s macOS Gatekeeper, a cornerstone of the operating system’s defense against malicious software, has undergone significant macOS Sequoia (15.0) updates to address emerging security challenges. These changes reflect Apple’s ongoing efforts to balance user freedom with robust protection against increasingly sophisticated cyber threats. This article examines Gatekeeper’s evolving role, recent policy shifts, and the implications […]
The post macOS Gatekeeper Explained – Strengthening System Defenses appeared first on Cyber Security News.
New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads
A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through a highly sophisticated phishing-based attack. Cybersecurity researchers have uncovered a multi-stage infection chain that begins with a deceptive PDF document titled “Pay Adjustment.” This document lures victims into downloading a malicious ZIP file hosted on Netlify, a popular web hosting platform. […]
The post New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.