Aggregator
CVE-2025-40907 | ETHER FCGI up to 0.82 on Perl fcgiapp.c ReadParams nameLen/valueLen vulnerable third-party component (EUVD-2025-15438 / Nessus ID 237968)
CVE-2024-24780 | Apache IoTDB up to 1.3.3 URI code injection
RTL-SDR Blog Review of the HydraSDR
IDE уверяют: «Опасности нет». А вирус уже сидит внутри — и ждет вашего клика
Over 600K WordPress Sites at Risk Due to Critical Plugin Vulnerability
A critical security flaw in the popular Forminator WordPress plugin has put more than 600,000 websites worldwide at risk of remote takeover, according to recent disclosures from security firm Wordfence and independent researchers. The vulnerability, tracked as CVE-2025-6463 and rated 8.8 (High) on the CVSS scale, allows unauthenticated attackers to delete arbitrary files from affected servers—potentially leading to full site compromise. […]
The post Over 600K WordPress Sites at Risk Due to Critical Plugin Vulnerability appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-52463 | QUALITIA Active mail up to 6.60.060085 cross-site request forgery (EUVD-2025-19690)
CVE-2025-52462 | QUALITIA Active mail up to 6.60.060085 cross site scripting (EUVD-2025-19691)
MCP检查器出现高危安全漏洞 可远程执行任意代码并获得完全访问权(附更新)
Exabeam Nova Advisor Agent equips security leaders with a real-time strategic planning engine
Exabeam announced a major expansion of its integrated multi-agent AI system Exabeam Nova that now equips security leaders with a real-time strategic planning engine and boardroom communication tool. The Exabeam Nova Advisor Agent is the AI capability designed to turn security data into a strategy that CISOs can defend in the boardroom. Translating complex security metrics into business-relevant terms has been a long-standing challenge, making it difficult to demonstrate risk reduction, prove the value of … More →
The post Exabeam Nova Advisor Agent equips security leaders with a real-time strategic planning engine appeared first on Help Net Security.
The TechBeat: The GTM Singularity: Why Sales Will Never be the Same Again (7/2/2025)
Scamnetic KnowScam 2.0 helps consumers detect every type of scam
Scamnetic releaseed KnowScam 2.0, its flagship product for scam protection and digital identity verification. KnowScam 2.0 builds on everything users already trust — now with major upgrades, including an enhanced three-point scoring system, the new Auto Scan feature for Microsoft Outlook and Android RCS, and a new deepfake detection and ID verification feature in IDeveryone for instant identification. “KnowScam 2.0 marks a major leap forward in proactive scam protection by combining broader platform coverage, automated … More →
The post Scamnetic KnowScam 2.0 helps consumers detect every type of scam appeared first on Help Net Security.
RisingAttacK 攻击让 AI “看到”你想让它看到的内容
RisingAttacK 攻击让 AI “看到”你想让它看到的内容
U.S. Treasury Sanctions Bulletproof Hosting Firm Fueling Ransomware Campaigns
The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) has imposed sweeping sanctions on Aeza Group, a Russia-based bulletproof hosting (BPH) provider, for its pivotal role in enabling global cybercrime, including ransomware attacks, data theft, and illicit drug trafficking. The action, announced Tuesday, targets Aeza Group’s international network, including affiliated companies in Russia […]
The post U.S. Treasury Sanctions Bulletproof Hosting Firm Fueling Ransomware Campaigns appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
链接式网络钓鱼:可信域如何成为威胁载体
一图读懂 | 国家标准GB/T 45654—2025《网络安全技术 生成式人工智能服务安全基本要求》
一图读懂 | 国家标准GB/T 45654—2025《网络安全技术 生成式人工智能服务安全基本要求》
链接式网络钓鱼:可信域如何成为威胁载体
Cybersecurity essentials for the future: From hype to what works
Cybersecurity never stands still. One week it’s AI-powered attacks, the next it’s a new data breach, regulation, or budget cut. With all that noise, it’s easy to get distracted. But at the end of the day, the goal stays the same: protect the business. CISOs are being asked to juggle more, with tighter resources, more boardroom time, and threats that keep changing. Here are five areas that deserve your attention now and going forward. Get … More →
The post Cybersecurity essentials for the future: From hype to what works appeared first on Help Net Security.