Aggregator
以色列要求 Google 和亚马逊使用秘密的眨眼信号警告外国政府的数据披露要求
Kimsuky and Lazarus Hackers Deploy New Backdoor Tools for Remote Access Attacks
North Korean state-sponsored threat actors have escalated their cyber operations with the deployment of sophisticated new malware variants designed to establish persistent backdoor access to compromised systems. Recent investigations by threat intelligence researchers have uncovered two distinct toolsets from prominent DPRK-aligned hacking groups: Kimsuky’s newly identified HttpTroy backdoor and an upgraded version of Lazarus’s BLINDINGCAN […]
The post Kimsuky and Lazarus Hackers Deploy New Backdoor Tools for Remote Access Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CISA Warns of XWiki Platform Injection vulnerability Exploited to Execute Remote Code
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning about a severe injection vulnerability in the XWiki Platform, designated as CVE-2025-24893. This flaw allows unauthenticated attackers to execute arbitrary remote code, posing significant risks to organizations using the open-source wiki software. Discovered and actively exploited, the vulnerability underscores the dangers of […]
The post CISA Warns of XWiki Platform Injection vulnerability Exploited to Execute Remote Code appeared first on Cyber Security News.
CVE-2025-12486 | Heimdall Database Proxy cross site scripting
CVE-2025-12489 | evernote-mcp-server openBrowser command injection
CVE-2025-12150 | Red Hat Keycloak WebAuthn Attestation Statement Verification state issue
CVE-2025-12488 | oobabooga text-generation-webui trust_remote_code Remote Code Execution
CVE-2025-12487 | oobabooga text-generation-webui trust_remote_code Remote Code Execution
CVE-2025-12490 | Netgate pfSense CE path traversal
CVE-2025-12041 | ERI File Library Plugin up to 1.1.0 on WordPress File Download erifl_file authorization (EUVD-2025-37323)
Ну вот, приехали. Новый виток «борьбы» с Telegram и WhatsApp: теперь без регистрации
CVE-2025-8383 | Depicter Plugin up to 4.0.4 on WordPress cross-site request forgery (EUVD-2025-37312)
CVE-2025-12175 | Events Calendar Plugin up to 6.15.9 on WordPress Draft Event tec_qr_code_modal authorization (EUVD-2025-37314)
CVE-2025-8385 | Zombify Plugin up to 1.7.5 on WordPress zf_get_file_by_url path traversal (EUVD-2025-37309)
CVE-2025-12094 | OOPSpam Anti-Spam Plugin up to 1.2.53 on WordPress Header X-Forwarded-For protection mechanism (EUVD-2025-37313)
CVE-2025-12115 | WPC Name Your Price for WooCommerce Plugin up to 2.1.9 on WordPress client-side enforcement of server-side security (EUVD-2025-37322)
CVE-2025-10897 | WooCommerce Designer Pro Theme Plugin up to 1.9.28 on WordPress wp-config.php path traversal (EUVD-2025-37310)
Shadow AI: New ideas emerge to tackle an old problem in new form
Shadow AI is the second-most prevalent form of shadow IT in corporate environments, 1Password’s latest annual report has revealed. Based on a survey of over 5,000 IT/security professionals and knowledge workers in the US, UK, Europe, Canada and Singapore, the report shows that over a quarter (27%) of the polled workers use AI-based applications that their employer did not buy or approve, and over a third (37%) follow company AI policies “most of the time”. … More →
The post Shadow AI: New ideas emerge to tackle an old problem in new form appeared first on Help Net Security.