Aggregator
Cisco Unified Intelligence Center Flaw Lets Remote Attackers Upload Arbitrary Files
A critical security vulnerability has been discovered in Cisco’s Unified Intelligence Center that allows authenticated remote attackers to upload arbitrary files to affected systems, potentially enabling complete system compromise. The flaw, tracked as CVE-2025-20274, carries a CVSS score of 6.3 and has been assigned a High security impact rating by Cisco due to the potential […]
The post Cisco Unified Intelligence Center Flaw Lets Remote Attackers Upload Arbitrary Files appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-4302 | Stop User Enumeration Plugin up to 1.7.2 on WordPress REST API /wp-json/wp/v2/users/ information exposure
Побег из песочницы: Google экстренно закрывает брешь в защите Chrome
五大使用场景说明:该抛弃VPN的时候到了
Most European Financial Firms Still Lagging on DORA Compliance
Weaponizing SVG: How Threat Actors Embed Malicious JavaScript in Vector Files
Cybersecurity researchers have identified an emerging attack campaign where threat actors are weaponizing Scalable Vector Graphics (SVG) files to deliver sophisticated JavaScript-based redirect attacks. This technique exploits the inherent trust placed in image formats, allowing malicious actors to embed obfuscated JavaScript within seemingly harmless vector graphics files that execute automatically when opened in web browsers. […]
The post Weaponizing SVG: How Threat Actors Embed Malicious JavaScript in Vector Files appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Submit #616224: CMS Made Simple 2.2.21 Cross Site Scripting [Duplicate]
Chinese Hackers Target Taiwan's Semiconductor Sector with Cobalt Strike, Custom Backdoors
Submit #616168: CMS Made Simple 2.2.21 Cross Site Scripting (XSS) [Duplicate]
Submit #615671: CMS Made Simple 2.2.21 Cross Site Scripting [Duplicate]
UNC6148 deploys Overstep malware on SonicWall devices, possibly for ransomware operations
SpaceX 的 Falcon 9 火箭发射了亚马逊的 24 颗宽带卫星
Роботы научились чинить себя. Следующий шаг — жить без людей
0-Day RCE Flaw in SonicWall SMA Devices Exploited to Launch OVERSTEP Ransomware
Google’s Threat Intelligence Group (GTIG) has uncovered a sophisticated cyberattack campaign targeting end-of-life SonicWall Secure Mobile Access (SMA) 100 series appliances, where threat actors are exploiting previously stolen credentials and deploying a new rootkit called OVERSTEP. The financially motivated group, tracked as UNC6148, has been operating since at least October 2024 and is suspected of […]
The post 0-Day RCE Flaw in SonicWall SMA Devices Exploited to Launch OVERSTEP Ransomware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Hutool路径遍历漏洞(CVE-2018-17297)分析报告
Socure Workforce Verification detects manipulated or fabricated identities
Socure launched Workforce Verification solution to address the growing threat of employee fraud. Socure’s Workforce Verification adapts its enterprise-grade identity verification and fraud prevention specific to hiring workflows, detecting manipulated or fabricated identities before they enter organizations and addressing workforce risk at its source: identity. “Identity fraud is no longer confined to the consumer realm, it’s infiltrating the workforce at an accelerating rate and has become a foundational risk to cybersecurity, compliance, and organizational trust … More →
The post Socure Workforce Verification detects manipulated or fabricated identities appeared first on Help Net Security.
农业塑料带来的污染挑战
Legit Security delivers automated security reviews for AppSec and development teams
Legit Security announced enhanced capabilities for significant code change and workflow orchestration within its platform. These capabilities provide insight into changes in code, configuration, or infrastructure that can impact an application’s security or compliance posture. With visibility into where everyday code changes are occurring and the appropriate workflows to resolve them, AppSec and development teams can overcome the challenges of disconnected tool sprawl, duplicate alerts, remediation without context, and hidden or unnoticed code. Detecting, documenting, … More →
The post Legit Security delivers automated security reviews for AppSec and development teams appeared first on Help Net Security.