Aggregator
CVE-2025-10013 | Portabilis i-Educar up to 2.10 /exportacao-para-o-seb access control
Under lock and key: Safeguarding business data with encryption
CVE-2025-10012 | Portabilis i-Educar up to 2.10 educar_historico_escolar_lst.php ref_cod_aluno sql injection
CVE-2025-10011 | Portabilis i-Educar up to 2.10 edit ID sql injection
Submit #643575: Portabilis i-educar 2.10 Broken Object Level Authorization [Duplicate]
Submit #643567: Portabilis i-educar 2.10 Broken Access Control [Accepted]
Submit #643549: Portabilis i-educar 2.10 SQL Injection [Accepted]
Submit #643544: Portabilis i-educar 2.10 SQL Injection [Accepted]
North Korean Hackers Expose Their Playbook for Swapping Infrastructure
A sophisticated North Korean cyber operation has been exposed, revealing how state-sponsored hackers systematically monitor cybersecurity intelligence platforms to detect when their malicious infrastructure is discovered and rapidly deploy replacement assets to maintain operations. The analysis, conducted by SentinelLABS in collaboration with Validin, provides unprecedented insight into the operational practices of threat actors behind the […]
The post North Korean Hackers Expose Their Playbook for Swapping Infrastructure appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Hackers Use AI Platforms to Steal Microsoft 365 Credentials in Phishing Campaign
Cybercriminals are increasingly exploiting the trust organizations place in artificial intelligence platforms to conduct sophisticated phishing attacks, according to a new report from cybersecurity firm Cato Networks. The company’s Managed Detection and Response (MDR) service recently uncovered a campaign where threat actors leveraged Simplified AI, a popular marketing platform, to steal Microsoft 365 credentials from […]
The post Hackers Use AI Platforms to Steal Microsoft 365 Credentials in Phishing Campaign appeared first on Cyber Security News.