Aggregator
CVE-2025-4123 | Grafana Custom Frontend Plugin cross site scripting
CVE-2025-47539 | Eventin Plugin up to 4.0.26 on WordPress import_items authorization
CVE-2025-4564 | TicketBAI Facturas para WooCommerce Plugin up to 3.18 on WordPress wp-config.php denial of service
CVE-2024-45436:Ollama ZIP文件解压导致的命令执行漏洞
New Weaponized PyPI Package Attacking Developers to Steal Source Code
A newly discovered malicious Python package, solana-token, has been weaponized to steal source code and sensitive secrets from developers working on Solana blockchain applications. Uploaded to the Python Package Index (PyPI), the module masqueraded as a legitimate utility for Solana-based projects but harbored code designed to exfiltrate critical data to a remote server. ReversingLabs researchers […]
The post New Weaponized PyPI Package Attacking Developers to Steal Source Code appeared first on Cyber Security News.
Valve 否认 Steam 被黑客入侵
AI技术驱动下的网络安全变局:以ChatGPT为例的威胁与机遇分析
锦行科技2025网安创意课第五站:在广州市工贸技师学院顺利开展!
The Growing and Changing Threat of Deepfake Attacks
Enterprises should extend deepfake-awareness training and mitigation techniques beyond C-suite executives to address the increasingly likely threat against other roles in the company.
The post The Growing and Changing Threat of Deepfake Attacks appeared first on Security Boulevard.
介绍《Artificial Intelligence for Security - Enhancing Protection》
Linux Security Essentials – Protecting Servers from Supply Chain Attacks
The Linux ecosystem, long celebrated for its open-source ethos and robust security architecture, faces an escalating threat landscape dominated by sophisticated supply chain attacks. Recent incidents, including the near-catastrophic XZ Utils backdoor, malicious Go modules delivering disk-wiping payloads, and compromised PyPI packages, highlight systemic vulnerabilities in software distribution networks. As attackers increasingly exploit trust in […]
The post Linux Security Essentials – Protecting Servers from Supply Chain Attacks appeared first on Cyber Security News.
CVE-2024-13914 | WP Experts File Manager Advanced Shortcode Plugin up to 2.5.4/2.5.6 on WordPress path traversal (EUVD-2024-54483)
CVE-2025-25370 | realme GT 5.0 Setting information disclosure (EUVD-2025-14892)
CVE-2025-48027 | MutonUfoAI pGina.Fork up to 3.9.9.12 HttpAuth Plugin authentication spoofing (EUVD-2025-15099)
CVE-2025-47888 | DingTalk Plugin up to 2.7.3 on Jenkins TLS Certificate certificate validation (EUVD-2025-14888)
CVE-2025-47886 | Cadence vManager Plugin up to 4.0.1-286.v9e25a_740b_a_48 on Jenkins cross-site request forgery
CVE-2025-47885 | Health Advisor by CloudBees Plugin up to 358.v58972d19b_1f0/374.v194b_d4f0c8c8 on Jenkins Health Advisor Server Response cross site scripting
Building cybersecurity culture in science-driven organizations
In this Help Net Security interview, Anne Sofie Roed Rasmussen, CISO at Novonesis, discusses how a science-driven organization approaches cybersecurity, aligning innovation with protection, measuring cultural progress, managing shadow IT, and earning trust from scientific leaders. How do you measure progress when it comes to building a cybersecurity culture in a science-driven organization? Science, exploration, and innovation are at the heart of our organizational DNA. However, no one is immune to making mistakes—anyone, regardless of … More →
The post Building cybersecurity culture in science-driven organizations appeared first on Help Net Security.