Aggregator
CVE-2025-43018 | HP LaserJet Pro Printers Address Book information disclosure
CVE-2025-53357 | glpi up to 10.0.18 authorization (GHSA-x9mj-822q-6cf8)
CVE-2025-53113 | glpi up to 10.0.18 access control (GHSA-r2mm-6499-4m8j)
CVE-2025-53944 | Significant-Gravitas AutoGPT up to 0.6.15 get_graph_execution_results graph_exec_id improper authorization (GHSA-x77j-qg2x-fgg6)
CVE-2025-53008 | glpi up to 10.0.18 insufficiently protected credentials (GHSA-52h8-76ph-4j9q)
CVE-2025-52897 | glpi up to 10.0.18 cross site scripting (GHSA-6whm-q2rp-prqm)
CVE-2025-52567 | glpi up to 10.0.18 RSS Feed server-side request forgery (GHSA-5mp6-mgmh-vrq7)
CVE-2025-53111 | glpi up to 10.0.18 access control (GHSA-p665-mqcr-j96j)
CVE-2025-46811 | SUSE Container Manager missing authentication
CVE-2025-54433 | Bugsink up to 1.4.2/1.5.4/1.6.3/1.7.3 event_id path traversal (GHSA-q78p-g86f-jg6q)
CVE-2025-54572 | SAML-Toolkits ruby-saml up to 1.18.0 resource consumption (GHSA-rrqh-93c8-j966)
CVE-2025-53112 | glpi up to 10.0.18 access control
CVE-2025-54573 | cvat-ai cvat up to 2.41.x improper authentication
5 Email Attacks SOCs Cannot Detect Without A Sandbox
Even with Slack, Teams, and every new communication tool out there, email remains the top attack vector for businesses. Why? Because it’s familiar, trusted, and easy to exploit. One convincing message is all it takes and threats slip right past filters, AVs, and EDRs without making a sound. Below are five real examples of attacks […]
The post 5 Email Attacks SOCs Cannot Detect Without A Sandbox appeared first on Cyber Security News.
Lazarus Subgroup ‘TraderTraitor’ Attacking Cloud Platforms and Poisoning Supply Chains
A sophisticated North Korean cyber espionage operation known as TraderTraitor has emerged as one of the most formidable threats to the global cryptocurrency ecosystem, conducting billion-dollar heists through advanced supply chain compromises and cloud platform infiltrations. Originally codnamed by the U.S. government in 2022, TraderTraitor represents a specialized subgroup within the notorious Lazarus Group, North […]
The post Lazarus Subgroup ‘TraderTraitor’ Attacking Cloud Platforms and Poisoning Supply Chains appeared first on Cyber Security News.
Threat Actors Use LNK Files to Deploy RedLoader Malware on Windows Systems
Sophos analysts have identified a novel infection chain employed by the financially motivated cybercriminal group GOLD BLADE, also known as RedCurl, Red Wolf, and Earth Kapre, to deploy their custom RedLoader malware on Windows systems. This group, active since 2018 and specializing in commercial espionage, has been observed using highly targeted phishing emails to infiltrate […]
The post Threat Actors Use LNK Files to Deploy RedLoader Malware on Windows Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Israeli Fashion Brand Breach Exposes Internal Data on Darknet Forum
You must login to view this content
BSidesSF 2025: Trace to Triage: How to Connect Product Vulnerabilities to Security Paths
Creator/Author/Presenter: Ben Stav
Our deep appreciation to Security BSides - San Francisco and the Creators/Authors/Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held at the lauded CityView / AMC Metreon - certainly a venue like no other; and via the organization's YouTube channel.
Additionally, the organization is welcoming volunteers for the BSidesSF Volunteer Force, as well as their Program Team & Operations roles. See their succinct BSidesSF 'Work With Us' page, in which, the appropriate information is to be had!
The post BSidesSF 2025: Trace to Triage: How to Connect Product Vulnerabilities to Security Paths appeared first on Security Boulevard.