Aggregator
The Network-Security Compliance Checklist: 25 Controls, Mapped And Audit-Ready
You’re on a four-day clock. Following new SEC rules announced on July 26, 2023, U.S. public companies must disclose any cybersecurity incident they determine to be ‘material’ within four business days of that determination. For most companies, this requirement became effective on December 15, 2023. Meanwhile, the average global cost of a data breach jumped […]
The post The Network-Security Compliance Checklist: 25 Controls, Mapped And Audit-Ready appeared first on Cyber Security News.
CVE-2025-50688 | TwistedWeb 14.0.0 command injection (EUVD-2025-23636)
CVE-2025-51628 | Impresa Eccobook up to 2.81.1 PdfHandler DocumentoId resource injection (EUVD-2025-23639)
CVE-2025-7674 | Roche Diagnostics Navify Monitoring up to 1.7.x denial of service
CVE-2025-43978 | Jointelli 5G CPE 21H01 JY_21H01_A3_v1.36 /ubus/?flag=set_WPS_pin SSID/WPS/Traceroute/Ping os command injection
Dialysis company DaVita says more than 900,000 people affected by April ransomware attack
CVE-2025-47152 | PDF-XChange Editor 10.6.0.396 EMF File Parser out-of-bounds (TALOS-2025-2203)
CVE-2025-27931 | PDF-XChange Editor 10.5.2.395 EMF File Parser out-of-bounds (TALOS-2025-2171)
CVE-2025-43980 | FIRSTNUM JC21A-04 up to 2.01ME-FN SSH Service default credentials
CVE-2025-43979 | FIRSTNUM JC21A-04 up to 2.01ME-FN xml_action.cgi?method os command injection
CVE-2025-2611 | ICT Innovations ICTBroadcast up to 7.4 Session Cookie os command injection
CVE-2025-54253 | Adobe Experience Manager up to 6.5.23 config (apsb25-82)
Iranian hackers were more coordinated, aligned during Israel conflict than it seemed
SecurityScorecard and the Middle East Institute said in separate reports this week that Iranian hacker operations during the 12-day conflict exhibited clear strategic intent.
The post Iranian hackers were more coordinated, aligned during Israel conflict than it seemed appeared first on CyberScoop.
Электросети трещат — но спасение в тиристоре. Найден способ обуздать ток будущего
New MCPoison Attack Leverages Cursor IDE MCP Validation to Execute Arbitrary System Commands
A critical vulnerability in Cursor IDE, the rapidly growing AI-powered development environment, enables persistent remote code execution through manipulation of the Model Context Protocol (MCP) system. The vulnerability, tracked as CVE-2025-54136 and dubbed “MCPoison,” exploits a trust validation flaw that allows attackers to execute arbitrary commands on developer machines without triggering security warnings. Cursor IDE […]
The post New MCPoison Attack Leverages Cursor IDE MCP Validation to Execute Arbitrary System Commands appeared first on Cyber Security News.
Over 10,000 Malicious TikTok Shop Domains Target Users with Malware and Credential Theft
Cybersecurity firm CTM360 has uncovered an ongoing malicious operation dubbed “ClickTok,” specifically targeting TikTok Shop users worldwide through a dual-pronged strategy of phishing and malware deployment. This campaign leverages deceptive replicas of TikTok’s official in-app e-commerce platform, impersonating affiliates and legitimate interfaces to ensnare both end-users (buyers) and participants in the TikTok Shop Affiliate Program. […]
The post Over 10,000 Malicious TikTok Shop Domains Target Users with Malware and Credential Theft appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
‘Critical’ firmware-level vulnerabilities found in laptops commonly used by security specialists
How Certificate Mismanagement Opens The Door For Phishing And MITM Attacks
SSL certificates are used everywhere from websites and APIs to mobile apps, internal tools and CI/CD pipelines. While most teams know they’re important, they often don’t manage them well. Certificates are usually forgotten until something breaks. If they expire, get misused, or aren’t monitored, they turn into easy targets for attackers. A small mistake in […]
The post How Certificate Mismanagement Opens The Door For Phishing And MITM Attacks appeared first on Cyber Security News.