Aggregator
CVE-2025-9619 | E4 Sistemas Mercatus ERP 2.00.019 id resource injection (EUVD-2025-26164)
CVE-2025-8619 | OSM Map Widget for Elementor Plugin up to 1.3.0 on WordPress Button URL cross site scripting
CVE-2025-9374 | Ultimate Tag Warrior Importer Plugin up to 0.2 on WordPress cross-site request forgery
CVE-2025-8147 | LWSCache Plugin up to 2.8.5 on WordPress Plugin Activation lwscache_activatePlugin authorization
CVE-2025-9441 | iATS Online Forms Plugin up to 1.2 on WordPress order sql injection
CVE-2025-8290 | List Subpages Plugin up to 1.0.6 on WordPress Title cross site scripting
CVE-2025-8150 | Events Addon for Elementor Plugin up to 2.2.9 on WordPress Typewriter Widget/Countdown Widget cross site scripting
TransUnion Data Breach Compromises Over 4 Million Customers
In a significant data breach disclosed by TransUnion LLC, more than 4.4 million consumers had sensitive personal information compromised in late July 2025. The credit reporting agency, headquartered at 555 W. Adams Street in Chicago, Illinois, revealed the incident on August 26, following its discovery on July 30. TransUnion’s Senior Privacy Counsel, Sanjana Palla, reported […]
The post TransUnion Data Breach Compromises Over 4 Million Customers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
深度复现CVE-2025-50154获取NTLM哈希
Опция или ловушка? Крупная кнопка «Принять» и незаметный тумблер решают судьбу ваших данных
以“人工智能+”赋能国家安全治理体系变革 深入推进国家治理体系和治理能力现代化
年轻人没有以前快乐了
专访黑客老兵核攻击:从零开始,以码为核【T00ls人物专访第十三期】
How Adversary-In-The-Middle (AiTM) Attack Bypasses MFA and EDR?
Adversary-in-the-Middle (AiTM) attacks are among the most sophisticated and dangerous phishing techniques in the modern cybersecurity landscape. Unlike traditional phishing attacks that merely collect static credentials, AiTM attacks actively intercept and manipulate communications between users and legitimate services in real-time, enabling attackers to bypass multi-factor authentication (MFA) and evade endpoint detection and response (EDR) systems. […]
The post How Adversary-In-The-Middle (AiTM) Attack Bypasses MFA and EDR? appeared first on Cyber Security News.