Aggregator
15th September – Threat Intelligence Report
For the latest discoveries in cyber research for the week of 15th September, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Panama’s Ministry of Economy and Finance (MEF) was hit by a ransomware attack that resulted in the theft of more than 1.5TB of data, including emails, financial documents, and budgeting details. The […]
The post 15th September – Threat Intelligence Report appeared first on Check Point Research.
CVE-2025-58795 | Payoneer Checkout Plugin up to 3.4.0 on WordPress authorization
CVE-2025-10436 | Campcodes Computer Sales and Inventory System 1.0 sup_searchfrm.php?action=edit ID sql injection
CVE-2025-10440 | D-Link DI-8100/DI-8100G/DI-8200/DI-8200G/DI-8003/DI-8003G jhttpd usb_paswd.asp sub_4621DC os command injection
CVE-2025-10441 | D-Link DI-8100G/DI-8200G/DI-8003G 17.12.20A1/19.12.10A1 jhttpd version_upgrade.asp sub_433F7C path os command injection
CVE-2025-10443 | Tenda AC9/AC15 15.03.05.14/15.03.05.18 /goform/exeCommand formexeCommand cmdinput buffer overflow
CVE-2025-10444 | Campcodes Online Job Finder System 1.0 /advancesearch.php Username sql injection
AI-Forged Military IDs Used in North Korean Phishing Attack
CVE-2007-1416 | JCcorp URLshrink 1.3.1 createurl.php formurl file inclusion (EDB-29722 / BID-22894)
CVE-2007-1795 | JCcorp URLshrink 1.3.1 privileges management (EDB-3611 / XFDB-33320)
CVE-2007-5706 | Jeeblestechnology Jeebles Directory 2.9.60 download.php path traversal (EDB-30701 / XFDB-37378)
CVE-2007-1156 | Browser Remote Code Execution (EDB-23628 / Nessus ID 12032)
CVE-2007-0335 | Jax Jax Petition Book 1.0.3.06 jax_petitionbook.php languagepack path traversal (EDB-29469 / XFDB-31543)
Hackers Hide RMM Installs as Fake Chrome Updates and Teams Invites
Why 47-day SSL/TLS certificates can be used as a driver for crypto agility
SSL/TLS certificates are no longer just a technical detail, they’re now a strategic driver of crypto agility. With certificate lifespans shortening to just 47 days by 2029, organizations must adopt automation, certificate visibility, and lifecycle management to stay secure. This shift, alongside the coming impact of quantum computing, forces leadership to treat certificate agility as a core business priority for resilience, compliance, and post-quantum readiness.
The post Why 47-day SSL/TLS certificates can be used as a driver for crypto agility appeared first on Security Boulevard.
Более 12 тысяч участников остались без «укрытия». Силовики ликвидировали Dark French Anti System
Burger King Uses DMCA to Remove Blog Exposing Drive-Thru System Security Flaws
Burger King has invoked the Digital Millennium Copyright Act to force the removal of a security researcher’s blog post that disclosed serious vulnerabilities in its new drive-thru “Assistant” system. Ethical hacker BobDaHacker published a report showing how attackers could bypass authentication, listen in on customer orders, and access employee records before a takedown notice took […]
The post Burger King Uses DMCA to Remove Blog Exposing Drive-Thru System Security Flaws appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Mustang Panda With SnakeDisk USB Worm and Toneshell Backdoor Seeking to Penetrate Air-Gap Systems
The cybersecurity landscape witnessed a significant escalation in July 2025 when the China-aligned threat actor Hive0154, commonly known as Mustang Panda, deployed sophisticated new malware variants designed to breach air-gapped systems. This advanced persistent threat group introduced SnakeDisk, a novel USB worm, alongside an updated Toneshell9 backdoor, representing a calculated evolution in their cyber espionage […]
The post Mustang Panda With SnakeDisk USB Worm and Toneshell Backdoor Seeking to Penetrate Air-Gap Systems appeared first on Cyber Security News.
New Red Teaming Tool “Red AI Range” Discovers, Analyzes, and Mitigates AI Vulnerabilities
Red AI Range (RAR), an open-source AI red teaming platform, is transforming the way security professionals assess and harden AI systems. Designed to simulate realistic attack scenarios, RAR streamlines the discovery, analysis, and mitigation of AI-specific vulnerabilities by leveraging containerized architectures and automated tooling. Key Takeaways1. Arsenal/Target buttons spin up isolated AI testing containers.2. Recording, […]
The post New Red Teaming Tool “Red AI Range” Discovers, Analyzes, and Mitigates AI Vulnerabilities appeared first on Cyber Security News.