Aggregator
CVE-2025-53944 | Significant-Gravitas AutoGPT up to 0.6.15 get_graph_execution_results graph_exec_id improper authorization (GHSA-x77j-qg2x-fgg6)
CVE-2025-53008 | glpi up to 10.0.18 insufficiently protected credentials (GHSA-52h8-76ph-4j9q)
CVE-2025-52897 | glpi up to 10.0.18 cross site scripting (GHSA-6whm-q2rp-prqm)
CVE-2025-52567 | glpi up to 10.0.18 RSS Feed server-side request forgery (GHSA-5mp6-mgmh-vrq7)
CVE-2025-53111 | glpi up to 10.0.18 access control (GHSA-p665-mqcr-j96j)
CVE-2025-46811 | SUSE Container Manager missing authentication
CVE-2025-54433 | Bugsink up to 1.4.2/1.5.4/1.6.3/1.7.3 event_id path traversal (GHSA-q78p-g86f-jg6q)
CVE-2025-54572 | SAML-Toolkits ruby-saml up to 1.18.0 resource consumption (GHSA-rrqh-93c8-j966)
CVE-2025-53112 | glpi up to 10.0.18 access control
CVE-2025-54573 | cvat-ai cvat up to 2.41.x improper authentication
5 Email Attacks SOCs Cannot Detect Without A Sandbox
Even with Slack, Teams, and every new communication tool out there, email remains the top attack vector for businesses. Why? Because it’s familiar, trusted, and easy to exploit. One convincing message is all it takes and threats slip right past filters, AVs, and EDRs without making a sound. Below are five real examples of attacks […]
The post 5 Email Attacks SOCs Cannot Detect Without A Sandbox appeared first on Cyber Security News.
Lazarus Subgroup ‘TraderTraitor’ Attacking Cloud Platforms and Poisoning Supply Chains
A sophisticated North Korean cyber espionage operation known as TraderTraitor has emerged as one of the most formidable threats to the global cryptocurrency ecosystem, conducting billion-dollar heists through advanced supply chain compromises and cloud platform infiltrations. Originally codnamed by the U.S. government in 2022, TraderTraitor represents a specialized subgroup within the notorious Lazarus Group, North […]
The post Lazarus Subgroup ‘TraderTraitor’ Attacking Cloud Platforms and Poisoning Supply Chains appeared first on Cyber Security News.
Threat Actors Use LNK Files to Deploy RedLoader Malware on Windows Systems
Sophos analysts have identified a novel infection chain employed by the financially motivated cybercriminal group GOLD BLADE, also known as RedCurl, Red Wolf, and Earth Kapre, to deploy their custom RedLoader malware on Windows systems. This group, active since 2018 and specializing in commercial espionage, has been observed using highly targeted phishing emails to infiltrate […]
The post Threat Actors Use LNK Files to Deploy RedLoader Malware on Windows Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Israeli Fashion Brand Breach Exposes Internal Data on Darknet Forum
You must login to view this content
BSidesSF 2025: Trace to Triage: How to Connect Product Vulnerabilities to Security Paths
Creator/Author/Presenter: Ben Stav
Our deep appreciation to Security BSides - San Francisco and the Creators/Authors/Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held at the lauded CityView / AMC Metreon - certainly a venue like no other; and via the organization's YouTube channel.
Additionally, the organization is welcoming volunteers for the BSidesSF Volunteer Force, as well as their Program Team & Operations roles. See their succinct BSidesSF 'Work With Us' page, in which, the appropriate information is to be had!
The post BSidesSF 2025: Trace to Triage: How to Connect Product Vulnerabilities to Security Paths appeared first on Security Boulevard.
Hidden Backdoor Found in ATM Network via Raspberry Pi
Звезда? Пульсар? Нет. Это что-то совсем другое. И оно подмигивает нам из глубин космоса
Palo Alto’s Acquisition of CyberArk Could Set Off a Wave of Consolidation in the Cyber World
The Big News: Palo Alto Networks Moves on CyberArk Palo Alto Networks today announced a landmark agreement to acquire CyberArk Software in a deal valued at approximately $25 billion. Under the terms, CyberArk shareholders will receive $45 in cash plus 2.2005 shares of Palo Alto Networks common stock per share—representing a 26% premium to CyberArk’s unaffected..
The post Palo Alto’s Acquisition of CyberArk Could Set Off a Wave of Consolidation in the Cyber World appeared first on Security Boulevard.