Aggregator
Threat Actors Widely Abuse .COM TLD to Host Credential Phishing Website
The .COM top-level domain continues to dominate the cybercriminal landscape as the primary vehicle for hosting credential phishing websites, maintaining its position as the most extensively abused TLD by threat actors worldwide. Recent intelligence indicates that malicious actors leverage the trusted reputation and widespread recognition of .COM domains to deceive victims into surrendering sensitive login […]
The post Threat Actors Widely Abuse .COM TLD to Host Credential Phishing Website appeared first on Cyber Security News.
Beware of Fake Chinese E-Commerce Sites Imitating Apple, Wrangler, and Exploiting Payment Services like MasterCard and PayPal
A sophisticated phishing campaign, initially spotlighted by Mexican journalist Ignacio Gómez Villaseñor, has evolved into a sprawling global threat, as revealed by Silent Push Threat Analysts. What began as a targeted attack on Spanish-language audiences during Mexico’s “Hot Sale 2025” an annual sales event akin to Black Friday has expanded into a massive fake marketplace […]
The post Beware of Fake Chinese E-Commerce Sites Imitating Apple, Wrangler, and Exploiting Payment Services like MasterCard and PayPal appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-53500 | MassEditRegex Extension up to 1.39.12/1.42.6/1.43.1 on Mediawiki cross site scripting (EUVD-2025-19887)
CVE-2025-49846 | wireapp wire-ios up to 3.124.0 canOpenUrl neutralization for logs (EUVD-2025-19895)
CVE-2025-6926 | CentralAuth Extension up to 1.39.12/1.42.6/1.43.1 on Mediawiki improper authentication (EUVD-2025-19884)
CVE-2025-48939 | AmauriC tarteaucitron.js up to 1.21.x special element (EUVD-2025-19885)
CVE-2025-45938 | Akeles Out of Office Assistant 4.0.1 on Jira Jira fullName cross site scripting (EUVD-2025-19878)
CVE-2025-53490 | CampaignEvents Extension up to 1.43.1 on Mediawiki cross site scripting (EUVD-2025-19890)
CVE-2025-53502 | FeaturedFeeds Extension 1.39.x/1.42.x/1.43.x on Mediawiki cross site scripting (EUVD-2025-19888)
CVE-2025-53489 | GoogleDocs4MW Extension up to 1.42.6/1.43.1 on Mediawiki cross site scripting (EUVD-2025-19889)
CVE-2025-53501 | Scribunto Extension up to 1.39.12/1.42.6/1.43.1 on Mediawiki access control (EUVD-2025-19886)
Medusa Blog
You must login to view this content
CVE-2024-4267 | parisneo lollms-webui up to 9.5 open_file command injection
CVE-2025-6756 | Ultra Addons for Contact Form 7 Plugin up to 3.5.21 on WordPress Shortcode UACF7_CUSTOM_FIELDS cross site scripting
CVE-2025-49482 | ASR Falcon_Linux/Kestrel/Lapwing_Linux prior 1536 tr069 Module tr069/tr098.c denial of service (EUVD-2025-19621)
CVE-2025-6932 | D-Link DCS-7517 up to 2.02.0 Qlync Password Generation /bin/httpd g_F_n_GenPassForQlync hard-coded password (EUVD-2025-19591)
CVE-2024-4403 | parisneo lollms-webui up to 9.6 restart_program cross-site request forgery
Clothoff 试图支配深度伪造色情
Citrix Warns Authentication Failures Following The Update of NetScaler to Fix Auth Vulnerability
Citrix has issued an urgent advisory warning customers of widespread authentication failures following recent updates to NetScaler builds 14.1.47.46 and 13.1.59.19. The updates, released as part of the company’s ongoing secure-by-design initiative, have inadvertently caused significant disruption to enterprise authentication systems across multiple organizations worldwide. The authentication failures manifest as broken login pages and complete […]
The post Citrix Warns Authentication Failures Following The Update of NetScaler to Fix Auth Vulnerability appeared first on Cyber Security News.