Aggregator
CVE-2024-47640 | weDevs WP ERP Plugin up to 1.13.2 on WordPress cross site scripting
CVE-2024-49632 | Coral Web Design CWD 3D Image Gallery Plugin up to 1.0 on WordPress cross site scripting
CVE-2024-49634 | Rimon Habib BP Member Type Manager Plugin up to 1.01 on WordPress cross site scripting
CVE-2024-49639 | Edward Stoever Monitor.chat Plugin up to 1.1.1 on WordPress cross site scripting
CVE-2024-50459 | HM Plugin Stripe Donation and Payment Plugin up to 3.2.3 on WordPress authorization
Why Your Automated Pentesting Tool Just Hit a Wall
SOHO router compromise leads to DNS hijacking and adversary-in-the-middle attacks
Executive summary Forest Blizzard, a threat actor linked to the Russian military, has been compromising insecure home and small-office internet equipment like routers, then modifying their settings in ways that turn them into part of the actor’s malicious infrastructure.
The post SOHO router compromise leads to DNS hijacking and adversary-in-the-middle attacks appeared first on Microsoft Security Blog.
UK exposes Russian cyber unit hacking home routers to hijack internet traffic
SOHO router compromise leads to DNS hijacking and adversary-in-the-middle attacks
Executive summary Forest Blizzard, a threat actor linked to the Russian military, has been compromising insecure home and small-office internet equipment like routers, then modifying their settings in ways that turn them into part of the actor’s malicious infrastructure.
The post SOHO router compromise leads to DNS hijacking and adversary-in-the-middle attacks appeared first on Microsoft Security Blog.
GrafanaGhost Exploit Bypasses AI Guardrails for Silent Data Exfiltration
Telegram для Android теперь сложнее заблокировать. В мессенджере исправили критический баг
Major outage cripples Russian banking apps and metro payments nationwide
CVE-2026-5627 | mintplex-labs anything-llm up to 1.12.0 AgentFlows index.js loadFlow/deleteFlow path traversal
CVE-2026-5741 | suvarchal docker-mcp-server up to 0.1.0 HTTP Interface src/index.ts stop_container/remove_container/pull_image os command injection
KRYBIT
You must login to view this content
‘GrafanaGhost’ bypasses Grafana’s AI defenses without leaving a trace
Noma Security researchers used indirect prompt injection to turn Grafana's own AI into an unwitting courier for sensitive corporate data.
The post ‘GrafanaGhost’ bypasses Grafana’s AI defenses without leaving a trace appeared first on CyberScoop.