Aggregator
1st September – Threat Intelligence Report
For the latest discoveries in cyber research for the week of 1st September, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES American consumer credit reporting agency TransUnion has suffered a data breach that resulted in the exposure of sensitive personal information for over 4.4 million individuals in the United States. The leaked data […]
The post 1st September – Threat Intelligence Report appeared first on Check Point Research.
CVE-2025-9797 | mrvautin expressCart up to b31302f4e99c3293bd742c6d076a721e168118b0 Edit Product Page /admin/product/edit/ injection (Issue 288 / EUVD-2025-26362)
CVE-2025-9796 | thinkgem JeeSite up to 5.12.1 EncodeUtils.java decodeUrl2 cross site scripting (Issue 33 / EUVD-2025-26363)
Submit #641127: mrvautin https://github.com/mrvautin/expressCart <=1.0.0 Frame Injection [Accepted]
Docker Desktop逃逸漏洞(CVE-2025-9074)分析报告
CVE-2025-9795 | xujeff tianti 天梯 up to 2.3 UploadController.java ajaxUploadFile upfile unrestricted upload (Issue 43 / EUVD-2025-26359)
Submit #641125: thinkgem https://github.com/thinkgem/jeesite5 <=v5.12.1 XSS [Accepted]
CVE-2025-9794 | Campcodes Computer Sales and Inventory System 1.0 pos_transac.php?action=add cash/firstname sql injection (EUVD-2025-26360)
Submit #641122: xujeff https://github.com/xujeff/tianti <=2.3 Dangerous type of file upload (CWE-434) [Accepted]
AI Agent祛魅之路
Galaxy Kylin: эта ОС умеет то, что не может Windows — безвозвратно стирает компромат
Submit #642559: Campcodes Computer Sales and Inventory System V1.0 SQL Injection [Duplicate]
Submit #641103: Campcodes Computer Sales and Inventory System V1.0 SQL Injection [Accepted]
Hackers Exploit Email Marketing Platforms to Deliver Hidden Malware
In recent months, Trustwave SpiderLabs—a LevelBlue company renowned for its threat intelligence and incident response services—has observed a marked uptick in phishing campaigns that leverage legitimate email marketing platforms to cloak malicious links. By hijacking established infrastructure and URL redirectors, attackers are evading traditional defenses and duping recipients into divulging sensitive information. To combat these […]
The post Hackers Exploit Email Marketing Platforms to Deliver Hidden Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Critical Next.js Flaw Lets Attackers Bypass Authorization Controls
A newly disclosed critical vulnerability in the Next.js framework, tracked as CVE-2025-29927, allows unauthenticated attackers to bypass middleware-based authorization checks by exploiting improper handling of the x-middleware-subrequest HTTP header. This flaw impacts all versions of Next.js that rely on this header to differentiate between internal subrequests and external traffic, risking exposure of protected routes and administrative interfaces. […]
The post Critical Next.js Flaw Lets Attackers Bypass Authorization Controls appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Amazon Disrupts Russian APT29 Watering Hole Targeting Microsoft Authentication
Top 10 Cybersecurity Companies in United States (2025 Ranking)
Cyberattacks in the United States aren’t slowing down. From billion-dollar ransomware hits to stealthy supply chain breaches, every month brings a new headline. And the cost is staggering. The average...
The post Top 10 Cybersecurity Companies in United States (2025 Ranking) appeared first on Strobes Security.
The post Top 10 Cybersecurity Companies in United States (2025 Ranking) appeared first on Security Boulevard.