Aggregator
CVE-2025-7674 | Roche Diagnostics Navify Monitoring up to 1.7.x denial of service
CVE-2025-43978 | Jointelli 5G CPE 21H01 JY_21H01_A3_v1.36 /ubus/?flag=set_WPS_pin SSID/WPS/Traceroute/Ping os command injection
Dialysis company DaVita says more than 900,000 people affected by April ransomware attack
CVE-2025-47152 | PDF-XChange Editor 10.6.0.396 EMF File Parser out-of-bounds (TALOS-2025-2203)
CVE-2025-27931 | PDF-XChange Editor 10.5.2.395 EMF File Parser out-of-bounds (TALOS-2025-2171)
CVE-2025-43980 | FIRSTNUM JC21A-04 up to 2.01ME-FN SSH Service default credentials
CVE-2025-43979 | FIRSTNUM JC21A-04 up to 2.01ME-FN xml_action.cgi?method os command injection
CVE-2025-2611 | ICT Innovations ICTBroadcast up to 7.4 Session Cookie os command injection
CVE-2025-54253 | Adobe Experience Manager up to 6.5.23 config (apsb25-82)
Iranian hackers were more coordinated, aligned during Israel conflict than it seemed
SecurityScorecard and the Middle East Institute said in separate reports this week that Iranian hacker operations during the 12-day conflict exhibited clear strategic intent.
The post Iranian hackers were more coordinated, aligned during Israel conflict than it seemed appeared first on CyberScoop.
Электросети трещат — но спасение в тиристоре. Найден способ обуздать ток будущего
New MCPoison Attack Leverages Cursor IDE MCP Validation to Execute Arbitrary System Commands
A critical vulnerability in Cursor IDE, the rapidly growing AI-powered development environment, enables persistent remote code execution through manipulation of the Model Context Protocol (MCP) system. The vulnerability, tracked as CVE-2025-54136 and dubbed “MCPoison,” exploits a trust validation flaw that allows attackers to execute arbitrary commands on developer machines without triggering security warnings. Cursor IDE […]
The post New MCPoison Attack Leverages Cursor IDE MCP Validation to Execute Arbitrary System Commands appeared first on Cyber Security News.
Over 10,000 Malicious TikTok Shop Domains Target Users with Malware and Credential Theft
Cybersecurity firm CTM360 has uncovered an ongoing malicious operation dubbed “ClickTok,” specifically targeting TikTok Shop users worldwide through a dual-pronged strategy of phishing and malware deployment. This campaign leverages deceptive replicas of TikTok’s official in-app e-commerce platform, impersonating affiliates and legitimate interfaces to ensnare both end-users (buyers) and participants in the TikTok Shop Affiliate Program. […]
The post Over 10,000 Malicious TikTok Shop Domains Target Users with Malware and Credential Theft appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
‘Critical’ firmware-level vulnerabilities found in laptops commonly used by security specialists
How Certificate Mismanagement Opens The Door For Phishing And MITM Attacks
SSL certificates are used everywhere from websites and APIs to mobile apps, internal tools and CI/CD pipelines. While most teams know they’re important, they often don’t manage them well. Certificates are usually forgotten until something breaks. If they expire, get misused, or aren’t monitored, they turn into easy targets for attackers. A small mistake in […]
The post How Certificate Mismanagement Opens The Door For Phishing And MITM Attacks appeared first on Cyber Security News.
Scilla: Information Gathering tool - DNS / Subdomains / Ports / Directories enumeration
How To Get Real-Time IOCs From Incidents Across 15K SOCs
Cybersecurity is about staying one step ahead. The security of business assets hinges on proactive threat detection and rapid response powered by data. Every security system and service from network monitoring and incident response to analytics depends on continuous data feeds to function effectively. The Foundation: Quality Threat Data Effective cybersecurity hinges on data quality. […]
The post How To Get Real-Time IOCs From Incidents Across 15K SOCs appeared first on Cyber Security News.