Aggregator
Microsoft 365 Direct Send Weaponized to Bypass Email Security Defenses
Cybersecurity researchers have uncovered a sophisticated spear phishing campaign that weaponizes Microsoft 365’s Direct Send feature to bypass traditional email security defenses and conduct hyper-personalized credential theft attacks. The campaign demonstrates an alarming evolution in attack sophistication, combining technical exploitation of legitimate Microsoft services with advanced social engineering techniques designed to disarm even experienced security […]
The post Microsoft 365 Direct Send Weaponized to Bypass Email Security Defenses appeared first on Cyber Security News.
玄武在BlackHat揭示劫持智能体达成RCE的新方法
Author: Jiashuo Liang and Guancheng Li of Tencent Xuanwu Lab
0x00 前言大语言模型(LLM)正在从简单的对话工具演化为能够编写代码、操作浏览器、执行系统命令的智能体。随着大模型应用的演进,提示词注入攻击的威胁也在不断升级。
设想这样一个场景:你让AI助手帮你编写代码,它却突然开始执行恶意指令,控制了你的电脑。这种看似科幻的情节,如今正在变为现实。
本文将介绍一种新型的提示词注入攻击范式。攻击者只需掌握一套“通用触发器”,就能精确控制大模型输出任意攻击者指定的内容,从而利用AI智能体实现远程代码执行等高风险操作。
Ваш "VPN" шпионит за вами уже месяцами, пока вы платите за "защиту" — срочно удалите эти приложения
Google Confirms Salesforce Data Breach by ShinyHunters via Vishing Scam
Securing the AI Era: Sonatype Safeguards Open Source Software Supply Chains
Open source drives modern software—but with innovation comes risk. Learn how Sonatype secures the software supply chain to enable safer, faster delivery.
The post Securing the AI Era: Sonatype Safeguards Open Source Software Supply Chains appeared first on Security Boulevard.
CVE-2025-50098 | Oracle MySQL Server up to 8.0.42/8.4.5/9.3.0 Optimizer denial of service (EUVD-2025-21482 / Nessus ID 244814)
CVE-2025-50078 | Oracle MySQL Server up to 8.0.42/8.4.5/9.3.0 DML improper authorization (Nessus ID 244819)
CVE-2024-27308 | mio Token use after free (Nessus ID 244820)
CVE-2025-50097 | Oracle MySQL Server up to 8.0.42/8.4.5/9.3.0 Encryption improper authorization (Nessus ID 244830)
CVE-2025-50100 | Oracle MySQL Server up to 8.0.42/8.4.5/9.3.0 Thread Pooling denial of service (EUVD-2025-21480 / Nessus ID 244827)
CVE-2025-50085 | Oracle MySQL Server up to 8.0.42/8.4.5/9.3.0 InnoDB improper authorization (Nessus ID 244833)
CVE-2025-50093 | Oracle MySQL Server up to 8.0.42/8.4.5/9.3.0 DDL improper authorization (Nessus ID 244835)
Weaponized npm Packages Target WhatsApp Developers with Remote Kill Switch
Socket’s Threat Research Team has uncovered a sophisticated supply chain attack targeting developers integrating with the WhatsApp Business API. Two malicious npm packages, naya-flore and nvlore-hsc, published by the npm user nayflore using the email [email protected], disguise themselves as legitimate WhatsApp socket libraries. These packages exploit the growing ecosystem of third-party tools for WhatsApp automation, […]
The post Weaponized npm Packages Target WhatsApp Developers with Remote Kill Switch appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Microsoft urges admins to plug severe Exchange security hole (CVE-2025-53786)
“In an Exchange hybrid deployment, an attacker who first gains administrative access to an on-premises Exchange server could potentially escalate privileges within the organization’s connected cloud environment without leaving easily detectable and auditable trace,” Microsoft has announced on Wednesday. The privilege escalation can be performed by exploiting CVE-2025-53786, a newly disclosed vulnerability that stems from Exchange Server and Exchange Online sharing the same service principal – i.e., the Office 365 Exchange Online application – in … More →
The post Microsoft urges admins to plug severe Exchange security hole (CVE-2025-53786) appeared first on Help Net Security.
Evolving Your DSPM Program: A Data-First Imperative
DSPM has become essential in today’s complex security landscape. This piece explores how organizations are evolving beyond basic deployment, the trends reshaping DSPM, and how Netwrix helps deliver continuous, actionable data security at scale. Data Security Posture Management (DSPM) has rapidly matured into a critical component of modern cybersecurity. Today’s security landscape—defined by hybrid environments, … Continued