Aggregator
CVE-2025-58198 | Xpro Theme Builder Plugin up to 1.2.9 on WordPress authorization
CVE-2025-58193 | Uncanny Owl Uncanny Automator Plugin up to 6.7.0.1 on WordPress authorization (EUVD-2025-25935)
CVE-2025-58192 | Xylus Themes WP Bulk Delete Plugin up to 1.3.6 on WordPress authorization
CVE-2025-51667 | simple-admin-core up to 1.6.7 /sys-api/role/update sql injection
CVE-2025-50979 | NodeBB 4.3.0 API Endpoint categories Search sql injection
CVE-2025-50428 | RaspAP raspap-webgui up to 3.3.2 includes/hostapd.php interface command injection
U.S. CISA adds Citrix NetScaler flaw to its Known Exploited Vulnerabilities catalog
PoC Exploit Released for CrushFTP 0-day Vulnerability (CVE-2025-54309)
A weaponized proof-of-concept exploit has been publicly released targeting CVE-2025-54309, a severe authentication bypass vulnerability affecting CrushFTP file transfer servers. The flaw enables remote attackers to gain administrative privileges through a race condition in AS2 validation processing, circumventing authentication mechanisms entirely. Key Takeaways1. Race-condition exploit lets attackers bypass CrushFTP authentication.2. Public PoC on GitHub confirms […]
The post PoC Exploit Released for CrushFTP 0-day Vulnerability (CVE-2025-54309) appeared first on Cyber Security News.
INC
You must login to view this content
US sanctions Russian national and Chinese company over North Korean IT worker schemes
How ClickFix and Multi-Stage Phishing Frameworks Are Breaking Enterprise Defenses
August 2025 has marked a significant evolution in cybercrime tactics, with threat actors deploying increasingly sophisticated phishing frameworks and social engineering techniques that are successfully bypassing traditional security defenses. Security researchers at ANY.RUN has identified three major campaign families that represent a fundamental shift in how cybercriminals approach credential theft and system compromise: the multi-stage […]
The post How ClickFix and Multi-Stage Phishing Frameworks Are Breaking Enterprise Defenses appeared first on Cyber Security News.
The Coding Personalities of Leading LLMs—GPT-5 update
GPT-5’s arrival on the scene adds an important new dimension to the landscape, so we have updated our analysis to include it.
The post The Coding Personalities of Leading LLMs—GPT-5 update appeared first on Security Boulevard.
谷歌Chrome紧急发布ANGLE高危补丁,人工智能安全研究员Big Sleep发现零日漏洞(CVE-2025-9478)
全球性UpCrypter钓鱼攻击持续蔓延 Windows用户面临紧急安全威胁
全球首例AI驱动勒索软件“PromptLock”已在野利用
新型AI攻击将数据窃取指令隐藏于缩小图像中
ShinyHunters and Scattered Spider Linked to Farmers Insurance Data Breach
100% эффективности плюс цена обработки информации. Учёные обошли двухсотлетний предел Карно без нарушения законов физики
Emulating the Expedited Warlock Ransomware
AttackIQ has released a new attack graph that emulates the behaviors exhibited by Warlock ransomware, which emerged in June 2025. Beginning in July, Warlock operators have primarily targeted internet-exposed, unpatched on-premises Microsoft SharePoint servers, exploiting a set of recently disclosed zero-day vulnerabilities, specifically CVE-2025-49704, CVE-2025-49706, CVE-2025-53770, and CVE-2025-53771, collectively referred to as the "ToolShell" exploit chain.
The post Emulating the Expedited Warlock Ransomware appeared first on AttackIQ.
The post Emulating the Expedited Warlock Ransomware appeared first on Security Boulevard.