Aggregator
Critical WordPress Plugin Vulnerability Puts 70,000+ Sites at Risk of Remote Code Execution
A severe security vulnerability has been discovered in a popular WordPress plugin used by over 70,000 websites worldwide, potentially exposing them to complete takeover by malicious actors. The vulnerability, tracked as CVE-2025-7384, affects the “Database for Contact Form 7, WPforms, Elementor forms” plugin and carries a critical CVSS score of 9.8 out of 10. Vulnerability […]
The post Critical WordPress Plugin Vulnerability Puts 70,000+ Sites at Risk of Remote Code Execution appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
The top CTEM platforms you should know in 2025
Continuous Threat Exposure Management (CTEM) is a cybersecurity strategy originally coined by Gartner analysts, which focuses on identifying, prioritizing, validating, and mobilizing teams to reduce threat exposure across an organization’s full attack surface. It’s in a category of cybersecurity tools often considered as, “offensive security,” as the tools and processes related to CTEM deal with stopping attacks before they happen. Unlike traditional vulnerability management or threat detection, CTEM emphasizes continuous insight into how an attacker … More →
The post The top CTEM platforms you should know in 2025 appeared first on Help Net Security.
ZDI-CAN-27873: Windscribe
ZDI-CAN-27644: Trend Micro
ZDI-CAN-27867: PDFsam
'Blue Locker' Analysis: Ransomware Targeting Oil & Gas Sector in Pakistan
ZDI-CAN-27889: Cisco
ZDI-CAN-27478: Schneider Electric
ZDI-CAN-27455: Schneider Electric
ZDI-CAN-27480: Schneider Electric
ZDI-CAN-27894: Apple
ZDI-CAN-26620: Hancom
ZDI-CAN-27784: github-kanban-mcp-server
ZDI-CAN-22274: Hexo
ZDI-CAN-27786: Katana Network
CrossC2 Expanding Cobalt Strike Beacon to Cross-Platform Attacks
Альтернатива WhatsApp и Telegram: полный гид по децентрализованным чатам
CISA Alerts on N-able N-Central Deserialization and Injection Flaw Under Active Exploitation
The Cybersecurity and Infrastructure Security Agency (CISA) has issued urgent alerts regarding two critical vulnerabilities in N-able N-Central that are currently being actively exploited, prompting immediate action from organizations using this remote monitoring and management platform. These vulnerabilities, identified as CVE-2025-8875 and CVE-2025-8876, represent significant security risks that could enable attackers to execute commands and […]
The post CISA Alerts on N-able N-Central Deserialization and Injection Flaw Under Active Exploitation appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.