Aggregator
CVE-2012-10059 | Dolibarr ERP/CRM up to 3.1.1/3.2.0 Database Backup sql_compat os command injection (EDB-18724)
CVE-2011-10018 | MyBB 1.6.4 backdoor (EDB-17949 / SA46300)
Russia restricts WhatsApp, Telegram calls, alleging criminal, terrorist activity
The two messaging apps replied separately, commenting on user rights and efforts to counter crime.
The post Russia restricts WhatsApp, Telegram calls, alleging criminal, terrorist activity appeared first on CyberScoop.
CVE-2025-53786
Fortinet Products Are in the Crosshairs Again
Support Your Cybersecurity with Strong NHI Practices
Why Should NHI Practices Be a Core Component of Your Cybersecurity Strategy? A question frequently on the minds of executives and professionals is: What is the role of Non-Human Identities (NHI) management in fortifying an organization’s security posture? This question is of prime importance as companies increasingly navigate digital, where NHIs – the machine identities […]
The post Support Your Cybersecurity with Strong NHI Practices appeared first on Entro.
The post Support Your Cybersecurity with Strong NHI Practices appeared first on Security Boulevard.
Intel security advisory (AV25-511)
CISA Added WinRaR Zero-Day (CVE-2025-8088) Vulnerability That is Actively Exploited In the Wild
The U.S. Cybersecurity and Infrastructure Security Agency has added this vulnerability to its Known Exploited Vulnerabilities catalog, with a due date of September 2, 2025, for federal agencies to apply mitigations. WinRAR has released version 7.13 to address a critical security vulnerability that has been actively exploited by cybercriminals, marking another significant security incident for […]
The post CISA Added WinRaR Zero-Day (CVE-2025-8088) Vulnerability That is Actively Exploited In the Wild appeared first on Cyber Security News.
CVE-2025-25256: Fortinet FortiSIEM OS Command Injection Vulnerability, Exploit in the Wild
Fortinet warns of FortiSIEM pre-auth RCE flaw with exploit in the wild
Foxit security advisory (AV25-510)
Ноль градусов или 25? Физики разрушили главное правило квантового мира.
Microsoft Removes PowerShell 2.0 From Windows To Clean Up Legacy Code
Microsoft is officially removing Windows PowerShell 2.0 from its operating systems, marking the end of an era for the legacy scripting component that has been deprecated since 2017. The removal affects Windows 11 version 24H2 starting August 2025 and Windows Server 2025 beginning September 2025, with Windows Insider preview builds already reflecting this change as […]
The post Microsoft Removes PowerShell 2.0 From Windows To Clean Up Legacy Code appeared first on Cyber Security News.
Whispers of XZ Utils Backdoor Live on in Old Docker Images
Infamous XZ Backdoor Found Hidden in Docker Images for Over a Year
Security researchers at Binarly have discovered that the sophisticated supply chain hack still exists in publicly accessible Docker images on Docker Hub, more than a year after the startling revelation of the XZ Utils backdoor in March 2024. The backdoor, attributed to a pseudonymous developer known as ‘Jia Tan’ who infiltrated the XZ Utils project […]
The post Infamous XZ Backdoor Found Hidden in Docker Images for Over a Year appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Qilin
You must login to view this content
New ‘Curly’ threat actor found targeting sensitive organizations in Georgia, Moldova
F5 security advisory (AV25-509)
That 16 Billion Password Story (AKA "Data Troll")
Spoiler: I have data from the story in the title of this post, it's mostly what I expected it to be, I've just added it to HIBP where I've called it "Data Troll", and I'm going to give everyone a