Aggregator
CVE-2022-41231 | Build-Publisher Plugin up to 1.22 on Jenkins File config.xml path traversal
CVE-2022-41233 | Rundeck Plugin up to 3.6.11 on Jenkins HTTP Endpoint authorization
CVE-2022-41234 | Rundeck Plugin up to 3.6.11 on Jenkins /plugin/rundeck/webhook/ authorization
CVE-2022-41229 | NS-ND Integration Performance Publisher Plugin up to 4.8.0.134 on Jenkins Test cross site scripting
CVE-2022-41232 | Build-Publisher Plugin up to 1.22 on Jenkins API Endpoint config.xml cross-site request forgery
CVE-2022-41236 | Security Inspector Plugin up to 117.v6eecc36919c2 on Jenkins Session Cache /report cross-site request forgery
Earth Lamia Hackers Exploits Vulnerabilities in Web Applications to Attack Multiple Industries
Cybersecurity researchers at Trend Research have uncovered the aggressive operations of Earth Lamia, an Advanced Persistent Threat (APT) group with a China-nexus, targeting organizations across Brazil, India, and Southeast Asia since 2023. This threat actor has demonstrated a sophisticated approach to cyber intrusions by exploiting SQL injection vulnerabilities in web applications to infiltrate SQL servers […]
The post Earth Lamia Hackers Exploits Vulnerabilities in Web Applications to Attack Multiple Industries appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Ivanti Vulnerability Exploit Could Expose UK NHS Data
Alleged Data Breach of Universidad Pedagógica Experimental Libertador (UPEL)
ACTF2025 Web Writeup
Evertz SDN Vulnerabilities Enable Unauthenticated Arbitrary Command Execution
A newly disclosed critical vulnerability (CVE-2025-4009) in Evertz’s Software Defined Video Network (SDVN) product line exposes a wide range of broadcasting infrastructure to unauthenticated remote code execution. The flaw, uncovered by ONEKEY Research Labs, affects the core web administration interface shared by multiple Evertz devices, putting global media operations at risk. Unauthenticated Arbitrary Command Injection […]
The post Evertz SDN Vulnerabilities Enable Unauthenticated Arbitrary Command Execution appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Fake Bitdefender Site Spreads Trio of Malware Tools
BSidesLV24 – PasswordsCon – Zero Downtime Credential Rotation
Author/Presenter: Kenton McDonough
Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel.
The post BSidesLV24 – PasswordsCon – Zero Downtime Credential Rotation appeared first on Security Boulevard.
The Future of Cybersecurity – Trends Shaping the Industry
As digital transformation accelerates across industries, the cybersecurity landscape is changing. 2025 marks a pivotal moment, with organizations worldwide facing increasingly sophisticated cyber threats, regulatory demands, and technological disruptions. Here’s a deep dive into the trends shaping the future of cybersecurity, the challenges they present, and how industry leaders are responding. AI: The Double-Edged Sword […]
The post The Future of Cybersecurity – Trends Shaping the Industry appeared first on Cyber Security News.
Russian APT28 Hackers Attacking NATO-aligned Organizations to Steal Sensitive Data
Russia’s GRU-backed APT28, widely known as Fancy Bear, has intensified its cyber espionage campaign against NATO-aligned organizations. Active since at least 2007, this notorious threat actor has been attributed to a series of sophisticated attacks targeting critical infrastructure, government entities, and logistics firms across the United States, United Kingdom, Germany, Canada, Poland, Ukraine, and other […]
The post Russian APT28 Hackers Attacking NATO-aligned Organizations to Steal Sensitive Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.