Aggregator
CVE-2026-28414 | gradio-app gradio up to 6.6 on Windows /windows/win.ini absolute path traversal (GHSA-39mp-8hj3-5c49 / EUVD-2026-9082)
CVE-2025-14532 | Studio Fabryka DobryCMS up to 4.x unrestricted upload
CVE-2026-27167 | gradio-app gradio up to 6.5.x OAuth /login/huggingface get_token hard-coded credentials (GHSA-h3h8-3v2v-rg7m / EUVD-2026-9075)
CVE-2026-28272 | kiteworks up to 9.1.x User Interface cross site scripting (GHSA-7hxj-ch78-xqgr / EUVD-2026-9067)
CVE-2026-28231 | bigcat88 pillow_heif up to 1.2.x HEIF Image Parser _pillow_heif.c out-of-bounds (GHSA-5gjj-6r7v-ph3x / EUVD-2026-9061)
CVE-2026-28270 | kiteworks up to 9.1.x Configuration unrestricted upload (EUVD-2026-9065)
CVE-2026-28271 | kiteworks up to 9.1.x Configuration dns rebinding (EUVD-2026-9066)
CVE-2026-28354 | MacWarrior clipbucket-v5 up to up to 5.5.2 add_to_collection.php removeItemFromCollection authorization (GHSA-6wf8-rw5f-c9mv / EUVD-2026-9062)
Phobos Ransomware admin faces up to 20 years after guilty plea
What's Actually in an Anti-Kidnapping Kit and Why High-Risk Individuals Should Care
Threat Actors Using Fake Claude Code Download to Deploy Infostealer
Cybercriminals have found a new way to target developers and IT professionals by setting up fake download pages that impersonate Claude Code, a legitimate AI coding assistant. These deceptive pages trick users into downloading what appears to be an official installation package, but instead silently deploy an infostealer malware onto the victim’s system. The use […]
The post Threat Actors Using Fake Claude Code Download to Deploy Infostealer appeared first on Cyber Security News.
WordPress membership plugin bug exploited to create admin accounts
Submit #765096: DefaultFuction Jeson CRM V1.0.0 SQL Injection [Accepted]
FBI arrests suspect linked to $46M crypto theft from US Marshals
5 Best Next Gen Endpoint Protection Platforms in 2026
Brain Cipher
You must login to view this content
Handala
You must login to view this content
Brain Cipher
You must login to view this content
Threat Actors Use New RingH23 Arsenal to Compromise MacCMS and CDN Infrastructure at Scale
A cybercriminal group known as Funnull — previously sanctioned by the U.S. Treasury — has returned with a dangerous new toolkit called RingH23, silently compromising CDN nodes and poisoning the MacCMS content management system to redirect millions of users to illegal websites. The campaign marks a significant escalation in Funnull’s capabilities, moving beyond simply hijacking […]
The post Threat Actors Use New RingH23 Arsenal to Compromise MacCMS and CDN Infrastructure at Scale appeared first on Cyber Security News.