Aggregator
CVE-2023-52555 | mongo-express 1.0.2 Collection /admin cross-site request forgery (Issue 1338)
CVE-2024-29804 | Team Heateor Fancy Comments Plugin up to 1.2.14 on WordPress cross site scripting
CVE-2022-41751 | Jhead 3.06.0.1 JPEG Filename os command injection (FEDORA-2022-1d9133bc8e / Nessus ID 211356)
Ivanti Cloud Services Application Vulnerability Leads to Privilege Escalation
Ivanti has disclosed a high-severity security vulnerability affecting its Cloud Services Application (CSA) that could allow attackers to escalate privileges on vulnerable systems. The security flaw, tracked as CVE-2025-22460, was announced on May 13, 2025, as part of Ivanti’s ongoing security update program. According to the company’s security advisory, the vulnerability is caused by default […]
The post Ivanti Cloud Services Application Vulnerability Leads to Privilege Escalation appeared first on Cyber Security News.
Охота за новой физикой продолжается, но Вселенная отвечает одним и тем же — «читайте Эйнштейна, неучи!»
Скатертью по коду: Telegram вычищает казино, будто уже под прицелом SEC
Randall Munroe’s XKCD ‘Pascal’s Law’
via the inimitable Daniel Stori at Turnoff.US!
The post Randall Munroe’s XKCD ‘Pascal’s Law’ appeared first on Security Boulevard.
FortiVoice 0-day Vulnerability Exploited in the Wild to Execute Arbitrary Code
Fortinet has disclosed a critical stack-based buffer overflow vulnerability (CVE-2025-32756) affecting multiple products in its security portfolio, with confirmed exploitation targeting FortiVoice systems in the wild. The vulnerability, assigned a CVSS score of 9.6, allows remote unauthenticated attackers to execute arbitrary code or commands through specially crafted HTTP requests, potentially giving them complete control over […]
The post FortiVoice 0-day Vulnerability Exploited in the Wild to Execute Arbitrary Code appeared first on Cyber Security News.
Alleged Sale of Network Acess to the Israeli Internet Exchange (IIX)
Fortinet fixes critical zero-day exploited in FortiVoice attacks
Ransomware Attacks Surge by 123% Amid Evolving Tactics and Strategies
The 2025 Third-Party Breach Report from Black Kite highlights a staggering 123% surge in ransomware attacks during 2024, driven largely by sophisticated exploitation of third-party vendor ecosystems. As cybercriminals refine their tactics, third-party vendors have emerged as the predominant entry point for some of the most catastrophic breaches in recent history. The report underscores how […]
The post Ransomware Attacks Surge by 123% Amid Evolving Tactics and Strategies appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Researchers Introduce Mythic Framework Agent to Enhance Pentesting Tool Performance
Penetration testing is still essential for upholding strong security procedures in a time when cybersecurity threats are changing quickly. Recently, a team of security professionals has announced significant advancements in penetration testing tools with the introduction of a new agent for the Mythic framework, aimed at improving detection evasion and operational efficiency. Framework Overview The […]
The post Researchers Introduce Mythic Framework Agent to Enhance Pentesting Tool Performance appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Critical Ivanti ITSM Vulnerability Let Remote Attacker Gain Administrative Access
Ivanti has released security updates to address a critical authentication bypass vulnerability in its Neurons for ITSM (IT Service Management) solution that could allow unauthenticated attackers to gain administrative access to vulnerable systems. Disclosed on May 13, 2025, the flaw affects on-premises instances only and has been assigned a CVSS score of 9.8, indicating its […]
The post Critical Ivanti ITSM Vulnerability Let Remote Attacker Gain Administrative Access appeared first on Cyber Security News.
Alleged Leak of Data of Universidad Nacional de Educación Enrique Guzmán y Valle
Swan Vector APT Targets Organizations with Malicious LNK and DLL Implants
A newly identified advanced persistent threat (APT) campaign, dubbed “Swan Vector” by Seqrite Labs, has been targeting educational institutions and mechanical engineering industries in East Asian nations, particularly Taiwan and Japan. Discovered in April 2025, this campaign leverages intricate social engineering tactics, primarily through spearphishing attachments disguised as resumes and financial documents. The initial infection […]
The post Swan Vector APT Targets Organizations with Malicious LNK and DLL Implants appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
PrepHero-Linked Database Exposed Data of 3M Students and Coaches
微软裁员 3%
Они не нашли аксионы — но впервые почти услышали их шёпот сквозь шум космоса
Hackers Weaponize KeePass Password Manager to Spread Malware and Steal Passwords
Threat actors have successfully exploited the widely-used open-source password manager, KeePass, to spread malware and facilitate large-scale password theft. The attack, which was reported by WithSecure’s Incident Response team, involved modifying and re-signing KeePass installers with trusted certificates to deliver a custom malware loader dubbed KeeLoader. Malware Delivery Through KeePass The infection chain began with […]
The post Hackers Weaponize KeePass Password Manager to Spread Malware and Steal Passwords appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.