Aggregator
CVE-2025-62520 | mantisbt Mantis Bug Tracker up to 2.27.1 Private Project manage_config_columns_page.php improper authorization (GHSA-g582-8vwr-68h2)
Connected homes: Is bystander privacy anyone’s responsibility?
Smart doorbells, connected cameras, and home monitoring systems have become common sights on doorsteps and living rooms. They promise safety and convenience, but they also raise a problem. These devices record more than their owners. They capture neighbors, visitors, and anyone passing by. Overlooking bystander privacy A new study from researchers at the Budapest University of Technology and Economics shows that while companies selling these products talk about privacy, they rarely protect those who never … More →
The post Connected homes: Is bystander privacy anyone’s responsibility? appeared first on Help Net Security.
WordPress Post SMTP Plugin Vulnerability Exposes 400,000 Websites to Account Takeover Attacks
A critical security flaw in the WordPress Post SMTP plugin has left more than 400,000 websites vulnerable to account takeover attacks. The vulnerability, identified as CVE-2025-11833, enables unauthenticated attackers to access email logs containing sensitive password reset information, potentially compromising administrator accounts and entire websites. The flaw stems from a missing authorization check in the […]
The post WordPress Post SMTP Plugin Vulnerability Exposes 400,000 Websites to Account Takeover Attacks appeared first on Cyber Security News.
Bugcrowd Purchases Mayhem to Expand AppSec Testing Platform
Bugcrowd acquired Mayhem Security to integrate automated application testing with human-led testing capabilities. The company plans to embed Pittsburgh-based Mayhem's reinforcement learning tech and AI models into its broader platform to speed up vulnerability detection.
Lawsuits, Investigations Piling Up in Conduent Hack
Proposed federal class action litigation and various investigations are piling up against Conduent Business Solutions following its recent public disclosure that an October 2024 hacking incident potentially compromised personal and health information of more than 10.5 million people.
'It's Been a Mess': Shutdown Slows Federal F5 Hack Response
Current and former federal officials tell Information Security Media Group furloughs and leadership gaps across the federal cyber ecosystem have hindered the U.S. government's ability to coordinate response efforts after a nation-state actor exploited flaws in F5’s BIG-IP systems amid the shutdown.
Cyber Physical Systems Face Rising Geopolitical Risks
Global conflicts and tariff wars provide new opportunities for cyber adversaries, especially those targeting operational technology systems. Now attackers are focusing on fragile supply chains. Claroty researchers predict attackers will breach at least one major cyber-physical system in the next year.
学术年会 | 郑建华院士确认出席2025年网络空间安全学术会议并作大会主旨报告
CVE-2022-24793 | PJSIP up to 2.12 DNS Resolution buffer overflow (GHSA-p6g5-v97c-w5q4)
CVE-2022-28806 | Fujitsu Lifebook FjGabiFlashCoreAbstractionSmm Driver buffer overflow
CVE-2022-31031 | PJSIP up to 2.12.1 STUN buffer overflow (GHSA-26j7-ww69-c4qj)
CVE-2016-3709 | libxml 960f0e2 cross site scripting (Nessus ID 239929)
CVE-2022-37035 | FRRouting 8.3 bgpd bgp_packet.c bgp_notify_send_with_data use after free (Issue 11698)
CVE-2022-29970 | Sinatra up to 2.1.x Static File path traversal (Nessus ID 242690)
CVE-2022-28739 | Ruby up to 2.6.9/2.7.5/3.0.3/3.1.1 String-to-Float Conversion Kernel#Float/String#to_f buffer overflow (Nessus ID 214476)
CVE-2022-28739 | Apple macOS Ruby memory corruption (HT213488 / Nessus ID 214476)
CVE-2022-2309 | libxml2 2.9.10/2.9.11/2.9.12/2.9.13/2.9.14 lxml null pointer dereference (Nessus ID 211245)
CVE-2022-0028 | Palo Alto PAN-OS URL Filter amplification
Beat Threats with Context: 5 Actionable Tactics for SOC Analysts
Security teams drown in alerts but starve for insight. Blocklists catch the obvious. SIEM correlation gives clues. But only context reveals what an alert really means, and what you should do about it. Every SOC sees thousands of signals: odd domains, masquerading binaries, strange persistence artifacts. On their own, these indicators mean almost nothing. A suspicious […]
The post Beat Threats with Context: 5 Actionable Tactics for SOC Analysts appeared first on Cyber Security News.