Positioning security leaders as more than risk managers turns them into business enablers, trusted advisers, and, eventually, integral members of the C-suite.
Russia-linked Gamaredon targets Ukraine with a phishing campaign using troop-related lures to deploy the Remcos RAT via PowerShell downloader. Talos researchers warn that Russia-linked APT group Gamaredon (a.k.a. Armageddon, Primitive Bear, ACTINIUM, Callisto) targets Ukraine with a phishing campaign. The cyberespionage group is behind a long series of spear-phishing attacks targeting Ukrainian entities, and organizations related […]
Jachtvliegtuigen zoals de F-35, de F-18 Hornet, de Eurofighter EF2000 en meer. Verder onbemande toestellen en helikopters. Een bont arsenaal van bijna 100 toestellen, afkomstig uit 18 NAVO-landen is vanaf vandaag in de buurt van Vliegbasis Leeuwarden te zien. Ze nemen tot en met 11 april deel aan NAVO-oefening Ramstein Flag.
A vulnerability was found in Ubuntu linux-bluefield. It has been classified as critical. This affects the function nft_lookup. The manipulation leads to denial of service.
This vulnerability is uniquely identified as CVE-2023-0881. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in apimofficiel Apimo Connector Plugin up to 2.6.3.1 on WordPress and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to cross-site request forgery.
This vulnerability is handled as CVE-2025-31602. The attack may be launched remotely. There is no exploit available.
A vulnerability has been found in Ashish Ajani WP Copy Media URL Plugin up to 2.1 on WordPress and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross-site request forgery.
This vulnerability is known as CVE-2025-31583. The attack can be launched remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in Aboobacker AB Google Map Travel Plugin up to 4.6 on WordPress. Affected is an unknown function. The manipulation leads to cross-site request forgery.
This vulnerability is traded as CVE-2025-31613. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in designnbuy DesignO Plugin up to 2.2.0 on WordPress. This issue affects some unknown processing. The manipulation leads to cross-site request forgery.
The identification of this vulnerability is CVE-2025-31600. The attack may be initiated remotely. There is no exploit available.
A vulnerability classified as problematic was found in richtexteditor Rich Text Editor Plugin up to 1.0.1 on WordPress. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery.
This vulnerability was named CVE-2025-31623. The attack can be initiated remotely. There is no exploit available.
A vulnerability classified as problematic has been found in riosisgroup Rio Video Gallery Plugin up to 2.3.6 on WordPress. This affects an unknown part. The manipulation leads to cross-site request forgery.
This vulnerability is uniquely identified as CVE-2025-31566. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Cal.com Plugin up to 1.0.0 on WordPress. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to basic cross site scripting.
This vulnerability is handled as CVE-2025-31604. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in ramanparashar Useinfluence Plugin up to 1.0.8 on WordPress. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2025-31625. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in owenr88 Simple Contact Forms Plugin up to 1.6.4 on WordPress. It has been classified as problematic. Affected is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2025-31615. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Jacob Allred Infusionsoft Web Form JavaScript Plugin up to 1.1.1 on WordPress and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2025-31629. The attack may be initiated remotely. There is no exploit available.
A vulnerability has been found in GhozyLab Gallery Plugin up to 1.3.170 on WordPress and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2025-31586. The attack can be initiated remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in wp-buy Related Posts Widget with Thumbnails Plugin up to 1.2 on WordPress. This affects an unknown part. The manipulation leads to cross-site request forgery.
This vulnerability is uniquely identified as CVE-2025-31570. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability classified as problematic was found in carperfer CoverManager Plugin up to 0.0.1 on WordPress. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2025-31620. The attack can be launched remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in LABCAT Processing Projects Plugin up to 1.0.2 on WordPress. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2025-31624. The attack may be launched remotely. There is no exploit available.