Aggregator
CVE-2024-43334 | gavias Themes on WordPress cross site scripting (EUVD-2024-54751)
CVE-2025-7123 | Campcodes Complaint Management System 1.0 complaint-details.php cid/uid sql injection (EUVD-2025-20206)
Проверьте свою профессию: роботы заменят 20% рабочих, ИИ — 50% офисных
Ongoing Phishing Campaign Utilizes LogoKit for Credential Harvesting
【安全圈】Cisco 紧急修复 Unified CM 中存在的严重 Root 账户漏洞
【安全圈】警惕!境外势力入侵校园广播
【安全圈】俄罗斯逮捕为乌克兰情报部门工作的黑客,涉嫌攻击关键基础设施
【安全圈】微软“偷偷”推送KB5001716更新引争议,强制升级条款已被删除
No Hack No CTF 2025
Date: July 5, 2025, 8 a.m. — 07 July 2025, 08:00 UTC [add to calendar]
Format: Jeopardy
On-line
Offical URL: https://nhnc.ic3dt3a.org/
Rating weight: 0
Event organizers: ICEDTEA
The dual reality of AI-augmented development: innovation and risk
AI coding is a big security problem when most security teams are still relying on tools designed for a world where human-written code remains prevalent.
The post The dual reality of AI-augmented development: innovation and risk appeared first on CyberScoop.
《2025中国软件供应链安全报告》发布:大模型、智能网联车风险亟待重视
《2025中国软件供应链安全报告》发布:大模型、智能网联车风险亟待重视
Manufacturing Security: Why Default Passwords Must Go
Threat Actors Use AV/EDR Evasion Framework in the Wild to Deploy Malware Payloads
Elastic Security Labs has uncovered multiple campaigns leveraging SHELLTER, a commercial AV/EDR evasion framework originally designed for offensive security evaluations by red teams. Since late April 2025, threat actors have been using what appears to be Shellter Elite v11.0, released on April 16, 2025, to package and deploy various infostealer malware payloads. SHELLTER Framework Exploited […]
The post Threat Actors Use AV/EDR Evasion Framework in the Wild to Deploy Malware Payloads appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Manufacturing Security: Why Default Passwords Must Go
扳手攻击:新高之下绑架案掀起暗流
扳手攻击:新高之下绑架案掀起暗流
CVE-2013-1081 | Novell ZENworks Mobile Management 2.6.1 MDM.php Language path traversal (EDB-26012 / Nessus ID 65551)
6th July – Threat Intelligence Report
For the latest discoveries in cyber research for the week of 6th July, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES The International Criminal Court (ICC) disclosed a sophisticated cyber‐security incident in late June 2025, its second such event in recent years. The intrusion, which occurred in June 2025, was promptly detected and […]
The post 6th July – Threat Intelligence Report appeared first on Check Point Research.