Aggregator
CVE-2025-5587 | Appzend Plugin up to 1.2.6 on WordPress progressbarLayout cross site scripting
SolarWinds security advisory (AV25-462)
Gemini CLI Vulnerability Allows Hackers to Execute Malicious Commands on Developer Systems
A critical security vulnerability discovered in Google’s Gemini CLI tool allowed attackers to execute arbitrary malicious commands on developer systems without detection. The vulnerability, identified by cybersecurity firm Tracebit on June 27, 2025, exploited a combination of prompt injection techniques, inadequate input validation, and misleading user interface elements to achieve silent code execution when developers […]
The post Gemini CLI Vulnerability Allows Hackers to Execute Malicious Commands on Developer Systems appeared first on Cyber Security News.
CVE-2025-27800 | Optimizely Episerver Content Management System up to 11.21.3/12.22.0 Admin Dashboard cross site scripting
CVE-2025-27801 | Optimizely Episerver Content Management System up to 11.21.3/12.22.0 SVG File cross site scripting
CVE-2025-27802 | Optimizely Episerver Content Management System up to 11.21.3/12.22.0 cross site scripting
CISA Warns of Exploited Critical Vulnerabilities in Cisco Identity Services Engine
npm ‘is’ Package With 2.8M Weekly Downloads Weaponized to Attack Developers
The latest wave of npm-centric phishing has taken a darker turn with the hijack of the ubiquitous is utility, a module pulled 2.8 million times every week. On 19 July 2025 attackers, armed with stolen maintainer credentials, slipped malicious versions 3.3.1 and 5.0.0 into the registry, seamlessly propagating the backdoor through ordinary dependency resolution. The […]
The post npm ‘is’ Package With 2.8M Weekly Downloads Weaponized to Attack Developers appeared first on Cyber Security News.
Циркадный ритм на заказ. Учёные приближаются к перепрошивке биологии
Beyond Passwords: A Guide to Advanced Enterprise Security Protection
Credentials, not firewalls, are now the front line of enterprise security. Attackers are bypassing traditional defenses using stolen passwords, infostealer malware, and MFA fatigue tactics. Enzoic’s Beyond Passwords guide shows how to shift to identity-first protection with real-time credential monitoring, policy enforcement, and automated ATO defense. Get the guide to learn: Why credential-based attacks are still the #1 breach vector How to detect exposed credentials before attackers use them Ways to harden Active Directory and … More →
The post Beyond Passwords: A Guide to Advanced Enterprise Security Protection appeared first on Help Net Security.
CISA Releases Part One of Zero Trust Microsegmentation Guidance
CISA released Microsegmentation in Zero Trust, Part One: Introduction and Planning as part of its ongoing efforts to support Federal Civilian Executive Branch (FCEB) agencies implementing zero trust architectures (ZTAs).
This guidance provides a high-level overview of microsegmentation, focusing on its key concepts, associated challenges and potential benefits, and includes recommended actions to modernize network security and advance zero trust principles.
Microsegmentation is a critical component of ZTA that reduces the attack surface, limits lateral movement, and enhances visibility for monitoring smaller, isolated groups of resources.
While the guidance focuses on FCEB references, its principles are applicable to any organization. As part of its Journey to Zero Trust series, CISA plans to release a subsequent technical guide to offer detailed implementation scenarios and technical considerations for implementation teams. Visit our Zero Trust webpage for more information and resources.
CISA Releases Five Industrial Control Systems Advisories
CISA released five Industrial Control Systems (ICS) advisories on July 29, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
- ICSA-25-210-01 National Instruments LabVIEW
- ICSA-25-210-02 Samsung HVAC DMS
- ICSA-25-210-03 Delta Electronics DTN Soft
- ICSA-24-158-04 Johnson Controls Software House iStar Pro Door Controller (Update A)
- ICSA-24-338-06 Fuji Electric Tellus Lite V-Simulator (Update A)
CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.
CISA and Partners Release Updated Advisory on Scattered Spider Group
CISA, along with the Federal Bureau of Investigation, Canadian Centre for Cyber Security, Royal Canadian Mounted Police, the Australian Cyber Security Centre’s Australian Signals Directorate, and the Australian Federal Police and National Cyber Security Centre, released an updated joint Cybersecurity Advisory on Scattered Spider—a cybercriminal group targeting commercial facilities sectors and subsectors. This advisory provides updated tactics, techniques, and procedures (TTPs) obtained through FBI investigations conducted through June 2025.
Scattered Spider threat actors have been known to use various ransomware variants in data extortion attacks, most recently including DragonForce ransomware. While Scattered Spider often changes TTPs to remain undetected, some TTPs remain consistent. These actors frequently use social engineering techniques such as phishing, push bombing, and subscriber identity module swap attacks to obtain credentials, install remote access tools, and bypass multi-factor authentication.
The Mitigations section of the Scattered Spider joint Cybersecurity Advisory offers critical infrastructure organizations and commercial facilities recommendations to fortify their defenses.
Инопланетяне могли строить орбитальные империи. Но космос стёр все доказательства
Linux 6.16 Released – Optimized for Better Performance and Networking
The Linux Foundation has officially released Linux kernel 6.16 on July 27, 2025, marking another milestone in open-source operating system development. Released by Linus Torvalds, this version focuses on stability improvements and networking enhancements while maintaining the project’s commitment to reliability and performance optimization. Key Takeaways1. Fixed XFRM vulnerabilities and enhanced Intel i40e/MLX5 drivers for […]
The post Linux 6.16 Released – Optimized for Better Performance and Networking appeared first on Cyber Security News.
Microsoft Teams Introduces New Join Bar to Help Users Join Meetings on Time
Microsoft Teams is rolling out a new meeting join banner designed to streamline the meeting experience for users who have committed to attending scheduled sessions. The feature, which launched in mid-July 2025, represents the company’s continued effort to enhance productivity and reduce meeting-related friction for its millions of users worldwide. Enhanced Meeting Access Experience The […]
The post Microsoft Teams Introduces New Join Bar to Help Users Join Meetings on Time appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Intruder launches GregAI to deliver AI-powered, contextual security workflow management
Intruder has launched GregAI, an AI-powered security analyst that offers comprehensive visibility into users’ security infrastructure, now available in beta. Unlike generic AI assistants, GregAI integrates directly with data from Intruder’s exposure management platform, delivering contextual security intelligence to help lean security teams manage vulnerability workflows while maintaining a strong cybersecurity posture. Security teams face an overwhelming volume of vulnerability data while operating with limited resources. Manual processes for vulnerability validation, risk assessment and stakeholder … More →
The post Intruder launches GregAI to deliver AI-powered, contextual security workflow management appeared first on Help Net Security.
Researchers Reveal Technical Details of SonicWall SMA100 Series N-Day Vulnerabilities
Security researchers have disclosed technical details of three previously patched vulnerabilities affecting SonicWall’s SMA100 series SSL-VPN appliances, highlighting concerning pre-authentication security flaws that could have enabled remote code execution and cross-site scripting attacks. The vulnerabilities, all confirmed against firmware version 10.2.1.15, underscore persistent challenges in network appliance security despite decades of awareness around common programming […]
The post Researchers Reveal Technical Details of SonicWall SMA100 Series N-Day Vulnerabilities appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.