Aggregator
CVE-2024-13683 | Sperse Automate Hub Free up to 1.7.0 on WordPress Status Update cross-site request forgery
CVE-2024-13659 | Listamester Plugin up to 2.3.4 on WordPress cross site scripting
CVE-2024-13680 | Form Builder CP Plugin up to 1.2.41 on WordPress sql injection
Fake Microsoft Teams Page Drops Malware On Windows By Exploiting Bing Ads
Unit 42 researchers Bradley Duncan and Zach Diehl uncovered a malicious campaign exploiting Bing search advertisements to deliver malware through deceptive websites impersonating legitimate software pages. This alarming discovery highlights the growing trend of attackers leveraging legitimate platforms for malicious purposes. Malicious Bing Ad Campaign The researchers detected a malicious ad in Bing search results […]
The post Fake Microsoft Teams Page Drops Malware On Windows By Exploiting Bing Ads appeared first on Cyber Security News.
CVE-2024-55930 | Xerox Workplace Suite prior 5.6.701.9 Folder default permission
CVE-2024-55927 | Xerox Workplace Suite prior 5.6.701.9 Token Generation hard-coded credentials
Hundreds of fake Reddit sites push Lumma Stealer malware
CVE-2024-55926 | Xerox Workplace Suite prior 5.6.701.9 Header unrestricted upload
CVE-2024-55929 | Xerox Workplace Suite prior 5.6.701.9 data authenticity
CVE-2024-55925 | Xerox Workplace Suite prior 5.6.701.9 API improper authentication
CVE-2024-55928 | Xerox Workplace Suite prior 5.6.701.9 cleartext storage
CVE-2025-24033 | fastify-multipart up to 8.3.0/9.0.2 Temporary Files saveRequestFiles allocation of resources (ID 546)
CVE-2025-24353 | Directus up to 11.1.x privileges management (GHSA-pmf4-v838-29hg)
CVE-2024-45672 | IBM Security Verify Bridge up to 1.0.15 modification of assumed-immutable data
CVE-2025-22153 | zopefoundation RestrictedPython up to 7.x type confusion (GHSA-gmj9-h825-chq2)
CVE-2025-24034 | himmelblau up to 0.7.14/0.8.2 himmelblau.conf logon_script d log file (GHSA-p989-2f5w-9cf6)
CVE-2025-23227 | IBM Tivoli Application Dependency Discovery Manager up to 7.3.0.11 Web UI cross site scripting
Can a esp32 be used like a HID device? I found a WHID Cactus from rabbit labs
TrustFour’s OWASP 2025 NHI Top Ten Coverage
T4 redefines ASM by ensuring only authorized workloads can utilize NHIs through robust isolation powered by mTLS and a “ring-fenced” authorization map. With T4, unauthorized workloads are stopped in their tracks, slashing the attack surface and mitigating risks before they become breaches. Focusing on ASM first delivers immediate, impactful reductions in risk—because with T4, attackers never get a foot in the door.
The post TrustFour’s OWASP 2025 NHI Top Ten Coverage appeared first on TrustFour: Workload and Non-Human Identity Attack Surface Security.
The post TrustFour’s OWASP 2025 NHI Top Ten Coverage appeared first on Security Boulevard.