Aggregator
CVE-2025-50972 | AbanteCart 1.4.2 index.php tmpl_id sql injection
CISA releases New ICS Advisories Surrounding Vulnerabilities and Exploits
CISA released three significant Industrial Control Systems (ICS) advisories on August 26, 2025, alerting organizations to critical vulnerabilities affecting widely-deployed automation systems. These advisories highlight severe security flaws across INVT Electric’s engineering tools, Schneider Electric’s Modicon controllers, and Danfoss refrigeration systems, with CVSS v4 scores reaching 8.7, indicating high-severity exploitable conditions. Key Takeaways1. CISA issued […]
The post CISA releases New ICS Advisories Surrounding Vulnerabilities and Exploits appeared first on Cyber Security News.
Over 28,000 Citrix devices vulnerable to new exploited RCE flaw
Citrix NetScaler曝零日漏洞(CVE-2023-6548)黑客正利用RCE漏洞发动攻击
Analysis of Apple’s ImageIO Zero-Day Vulnerability: Attacker Context and Historical iOS Zero-Click Similarities
Apple has issued emergency security updates across its entire ecosystem to address CVE-2025-43300, a critical zero-day vulnerability in the ImageIO framework that has been actively exploited in sophisticated targeted attacks. This represents the seventh zero-day vulnerability that Apple has patched in 2025, underscoring the persistent and escalating threat landscape facing iOS and macOS devices. The vulnerability’s addition to CISA’s […]
The post Analysis of Apple’s ImageIO Zero-Day Vulnerability: Attacker Context and Historical iOS Zero-Click Similarities appeared first on Cyber Security News.
New ShadowCaptcha Attack Exploiting Hundreds of WordPress Sites to Tricks Victims into Executing Malicious Commands
A sophisticated global cybercrime campaign dubbed “ShadowCaptcha” has emerged as a significant threat to organizations worldwide, leveraging fake Google and Cloudflare CAPTCHA pages to trick victims into executing malicious commands. Discovered by researchers at the Israel National Digital Agency in August 2025, this large-scale operation has been active for at least one year, exploiting hundreds […]
The post New ShadowCaptcha Attack Exploiting Hundreds of WordPress Sites to Tricks Victims into Executing Malicious Commands appeared first on Cyber Security News.
Alleged Data Sale of the Civil Service Commission (CSC) of the Philippines
GitHub открыл публичный предпросмотр Grok Code Fast 1 в Visual Studio Code
CISA Strengthens Software Procurement Security With New Tool
Cephalus Ransomware Exploits RDP for Initial Access in Latest Attack Campaign
Cybersecurity researchers at Huntress identified a novel ransomware variant dubbed Cephalus, deployed in two separate incidents targeting organizations lacking robust access controls. This emerging threat, which claims its name from Greek mythology symbolizing inevitable tragedy, leverages exposed Remote Desktop Protocol (RDP) endpoints as its primary initial access vector, exploiting compromised credentials without multi-factor authentication (MFA). […]
The post Cephalus Ransomware Exploits RDP for Initial Access in Latest Attack Campaign appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Alleged Sale of Access to Compromised Italian E-Commerce Shop
Sinobi
You must login to view this content
Hackers use fake NDAs to deliver malware to US manufacturers
3 уязвимости в NetScaler. Одна из них 0Day. Обновления обязательны
9,3 из 10 по CVSS: 1 контейнер — и диск C: в руках злоумышленника
Storm-0501’s evolving techniques lead to cloud-based ransomware
Financially motivated threat actor Storm-0501 has continuously evolved their campaigns to achieve sharpened focus on cloud-based tactics, techniques, and procedures (TTPs). While the threat actor has been known for targeting hybrid cloud environments, their primary objective has shifted from deploying on-premises endpoint ransomware to using cloud-based ransomware tactics.
The post Storm-0501’s evolving techniques lead to cloud-based ransomware appeared first on Microsoft Security Blog.
Storm-0501 Hits Enterprise With 'Cloud-Based Ransomware' Attack
Storm-0501’s evolving techniques lead to cloud-based ransomware
Financially motivated threat actor Storm-0501 has continuously evolved their campaigns to achieve sharpened focus on cloud-based tactics, techniques, and procedures (TTPs). While the threat actor has been known for targeting hybrid cloud environments, their primary objective has shifted from deploying on-premises endpoint ransomware to using cloud-based ransomware tactics.
The post Storm-0501’s evolving techniques lead to cloud-based ransomware appeared first on Microsoft Security Blog.