Aggregator
Submit #628435: Portabilis i-Educar 2.10 Cross Site Scripting [Duplicate]
CVE-2025-9139 | Scada-LTS 2.7.8.1 WatchListDwr.init.dwr information disclosure
CVE-2025-9138 | Scada-LTS 2.7.8.1 pointHierarchy/new/ Title cross site scripting
CVE-2025-9137 | Scada-LTS 2.7.8.1 scheduled_events.shtm alias cross site scripting
Submit #628192: China ShangHai Lingdang Information Technology Co., Ltd Lingdang CRM <= V8.6.5.2.23 SQL Injection [Duplicate]
Submit #628087: Shanghai Lingdang Information Technology Lingdang CRM ≤V8.6.4.3 SQL Injection [Accepted]
Hackers Exploit Cisco Secure Links to Evade Link Scanners and Bypass Network Filters
A sophisticated attack campaign uncovered where cybercriminals are weaponizing Cisco’s own security infrastructure to conduct phishing attacks. The attackers are exploiting Cisco Safe Links technology, designed to protect users from malicious URLs, to evade detection systems and bypass network filters by leveraging the trust associated with Cisco’s security brand. Key Takeaways1. Attackers use legitimate Cisco […]
The post Hackers Exploit Cisco Secure Links to Evade Link Scanners and Bypass Network Filters appeared first on Cyber Security News.
Submit #621062: SCADA-LTS Scada-LTS 2.7.8.1 Exposure of Private Personal Information to an Unauthorized Acto [Accepted]
Submit #620516: Scada-LTS 2.7.8.1 Cross Site Scripting [Accepted]
Submit #620487: Scada-LTS 2.7.8.1 Cross Site Scripting [Accepted]
CVE-2025-9136 | libretro RetroArch 1.18.0/1.19.0/1.20.0 file_stream.c filestream_vscanf out-of-bounds (ID 17555)
Хакерский журнал рассекретил методы северокорейской APT-группировки. След идёт от самого Пхеньяна
Submit #617657: libretro RetroArch v1.20.0/v1.19.0/v1.18.0 Out-of-Bounds Read [Accepted]
As AI grows smarter, your identity security must too
AI is no longer on the horizon, it’s already transforming how organizations operate. In just a few years, we’ve gone from isolated pilots to enterprise-wide adoption. According to a recent SailPoint survey, 82% of companies are running AI agents today, often across multiple business functions. These agents aren’t just passive tools; they’re autonomous systems that act, decide, and adapt at remarkable speed and scale. These systems now handle responsibilities once reserved for skilled human oversight, … More →
The post As AI grows smarter, your identity security must too appeared first on Help Net Security.