Aggregator
CISA warns of N-able N-central flaws exploited in zero-day attacks
2025年6月企业必修安全漏洞清单
2025年7月企业必修安全漏洞清单
【有奖调研】2025白帽子能力调研来啦!
生成式AI应用激增下的企业安全挑战
Campaigners Slam Expansion of Police Facial Recognition Schemes in UK
Critical WordPress Plugin Vulnerability Exposes 70,000+ Sites to RCE Attacks
A critical security vulnerability has been discovered in the popular “Database for Contact Form 7, WPforms, Elementor forms” WordPress plugin, potentially exposing over 70,000 websites to remote code execution attacks. The vulnerability, tracked as CVE-2025-7384 with a maximum CVSS score of 9.8, affects all versions up to and including 1.4.3 and was publicly disclosed on […]
The post Critical WordPress Plugin Vulnerability Exposes 70,000+ Sites to RCE Attacks appeared first on Cyber Security News.
От VPN к FortiManager за 3 дня — и Fortinet под угрозой нового 0Day
CISA Warns of N-able N-Central Deserialization and Injection Vulnerability Exploited in Attacks
CISA has issued urgent warnings regarding two critical security vulnerabilities in N-able N-Central remote monitoring and management (RMM) software that threat actors are actively exploiting. The vulnerabilities, identified as CVE-2025-8875 and CVE-2025-8876, pose significant risks to organizations using this widely-deployed IT management platform. Key Takeaways1. Two critical N-able N-Central vulnerabilities were actively exploited for remote […]
The post CISA Warns of N-able N-Central Deserialization and Injection Vulnerability Exploited in Attacks appeared first on Cyber Security News.
How SSO Reduces Login Fatigue and Improves Security Compliance
Learn how Single Sign-On reduces login fatigue, improves compliance, and enhances productivity while keeping systems secure.
The post How SSO Reduces Login Fatigue and Improves Security Compliance appeared first on Security Boulevard.
Zoom patches critical Windows flaw allowing privilege escalation
ShinyHunters Possibly Collaborates With Scattered Spider in Salesforce Attack Campaigns
The notorious ShinyHunters cybercriminal group has emerged from a year-long hiatus with a sophisticated new wave of attacks targeting Salesforce platforms across major organizations, including high-profile victims like Google. This resurgence marks a significant tactical evolution for the financially motivated threat actors, who have traditionally focused on database exploitation and credential theft rather than the […]
The post ShinyHunters Possibly Collaborates With Scattered Spider in Salesforce Attack Campaigns appeared first on Cyber Security News.
CVE-2025-27388 | OPPO Health App up to 4.23.4 WebView information disclosure
Passkeys Are Not Phishing-Proof: A New Attack Bypasses Passwordless Security
Although passkeys are promoted as a passwordless, phishing-resistant, and inherently secure authentication method, Proofpoint researchers warn that such protection can be bypassed with relative ease. Under certain conditions, an attacker can force a user...
The post Passkeys Are Not Phishing-Proof: A New Attack Bypasses Passwordless Security appeared first on Penetration Testing Tools.
Один снимок — и полиция уже у вашей двери. Как работает новый инструмент слежки
Whonix 17.4 Is Here: A New Era of Uncompromising Online Anonymity
Whonix 17.4, a distribution purpose-built for uncompromising anonymity online, has been released. Based on Debian GNU/Linux, the system routes all network traffic exclusively through Tor, with its source code available under the GPLv3 license....
The post Whonix 17.4 Is Here: A New Era of Uncompromising Online Anonymity appeared first on Penetration Testing Tools.
ASI is Back: Google Revives a Linux Kernel Defense Against CPU Attacks
Several years ago, Google engineers began developing the Address Space Isolation (ASI) mechanism for the Linux kernel, designed to shield systems from attacks exploiting speculative processor execution. The aim was to create a universal...
The post ASI is Back: Google Revives a Linux Kernel Defense Against CPU Attacks appeared first on Penetration Testing Tools.
A Storm on the Horizon: Fortinet SSL VPNs Hit by Credential-Stuffing Attacks
Researchers have reported a sharp surge in credential-stuffing attempts targeting Fortinet devices with SSL VPN enabled. On August 3, 2025, GreyNoise detected a wave of suspicious traffic involving more than 780 distinct IP addresses....
The post A Storm on the Horizon: Fortinet SSL VPNs Hit by Credential-Stuffing Attacks appeared first on Penetration Testing Tools.