Aggregator
CISA Adds Four Known Exploited Vulnerabilities to Catalog
CISA has added four new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CVE-2014-3931 Multi-Router Looking Glass (MRLG) Buffer Overflow Vulnerability
- CVE-2016-10033 PHPMailer Command Injection Vulnerability
- CVE-2019-5418 Rails Ruby on Rails Path Traversal Vulnerability
- CVE-2019-9621 Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery (SSRF) Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
Nine Years and Counting: NICE RAMPS Communities Keep Expanding Opportunities in Cybersecurity Work and Learning
CVE-2025-5472 | run-llama llama_index up to 0.12.37 JSONReader recursion (EUVD-2025-20209)
CVE-2025-3263 | huggingface transformers up to 4.50.x transformers.configuration_utils get_configuration_file redos (EUVD-2025-20215)
CVE-2025-6386 | parisneo lollms up to 20.0 parisneo/lollms authenticate_user information exposure (EUVD-2025-20213)
CVE-2025-3264 | huggingface transformers up to 4.50.x dynamic_module_utils.py get_imports redos (EUVD-2025-20214)
New Phishing Attack Impersonates DWP to Steal Credit Card Information from Users
A sophisticated phishing campaign targeting UK residents has been active since late May 2025, with a significant surge in activity during the second half of June. This malicious operation impersonates the Department for Work and Pensions (DWP), a key UK government body responsible for welfare and pension services, by sending fraudulent SMS messages to unsuspecting […]
The post New Phishing Attack Impersonates DWP to Steal Credit Card Information from Users appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVSS 9.8 из 10: один клик — и ваш Mac — ловушка, а вы — жертва
1000+ New Fake Domains Mimic Amazon Prime Day Registered to Hunt Online Shoppers
As Amazon Prime Day 2025 approaches on July 8-11, millions of eager shoppers are preparing their wish lists and hunting for the best deals. However, cybercriminals are equally prepared, having registered over 1,000 new fake domains resembling Amazon in June alone. Alarmingly, 87% of these domains have already been flagged as malicious or suspicious, with […]
The post 1000+ New Fake Domains Mimic Amazon Prime Day Registered to Hunt Online Shoppers appeared first on Cyber Security News.
⚡ Weekly Recap: Chrome 0-Day, Ivanti Exploits, MacOS Stealers, Crypto Heists and More
⚡ Weekly Recap: Chrome 0-Day, Ivanti Exploits, MacOS Stealers, Crypto Heists and More
XWorm RAT Deploys New Stagers and Loaders to Bypass Defenses
The XWorm Remote Access Trojan (RAT), a longstanding favorite among cybercriminals, has recently showcased a significant evolution in its attack methodology, employing an array of sophisticated stagers and loaders to evade detection and infiltrate systems. Known for its comprehensive malicious capabilities including keylogging, remote desktop access, data exfiltration, and command execution XWorm has become a […]
The post XWorm RAT Deploys New Stagers and Loaders to Bypass Defenses appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Hiding Prompt Injections in Academic Papers
CVE-2007-2473 | CMS Made Simple up to 1.0.5 stylesheet.php templateid sql injection (EDB-29941 / XFDB-34044)
Top 10 Security Service Edge (SSE) Solutions For Network Security – 2025
In 2025, Security Service Edge (SSE) solutions have become essential for organizations aiming to secure their rapidly evolving networks. As businesses embrace hybrid work, cloud-first strategies, and global digital operations, the demand for robust, cloud-delivered security has surged. SSE platforms integrate critical security functions such as Secure Web Gateway (SWG), Cloud Access Security Broker (CASB), […]
The post Top 10 Security Service Edge (SSE) Solutions For Network Security – 2025 appeared first on Cyber Security News.
Linux Boot Vulnerability Allows Bypass of Secure Boot Protections on Modern Linux Systems
A significant vulnerability affecting modern Linux distributions that allows attackers with brief physical access to bypass Secure Boot protections through initramfs manipulation. The attack exploits debug shells accessible during boot failures, enabling persistent malware injection that survives system reboots and maintains access even after users enter correct passwords for encrypted partitions. key Takeaways1. Attackers with […]
The post Linux Boot Vulnerability Allows Bypass of Secure Boot Protections on Modern Linux Systems appeared first on Cyber Security News.
Hackers Target Employee Credentials Amid Spike in ID Attacks
Gamers hacked playing Call of Duty: WWII—PC version temporarily taken offline
Comodo Internet Security 2025 Flaws Allow Remote Code Execution With SYSTEM Privileges
Security researchers have uncovered a series of critical vulnerabilities in Comodo Internet Security 2025, exposing users to remote code execution (RCE) attacks that could grant threat actors SYSTEM-level privileges. These flaws affect Comodo Internet Security Premium version 12.3.4.8162 and potentially other recent releases, putting both individual and enterprise users at risk. CVE ID Vulnerability Type […]
The post Comodo Internet Security 2025 Flaws Allow Remote Code Execution With SYSTEM Privileges appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.