Aggregator
CVE-2025-9519 | kleor Easy Timer Plugin up to 4.2.1 on WordPress Shortcode code injection
CVE-2025-9517 | docjojo atec Debug Plugin up to 1.2.22 on WordPress custom_log code injection
CVE-2025-9518 | docjojo atec Debug Plugin up to 1.2.22 on WordPress debug_path absolute path traversal
Cato Networks acquires Aim Security to bring AI protection into SASE Cloud
Cato Networks acquired Aim Security to further enhance the Cato SASE Cloud Platform, supporting secure enterprise adoption of AI agents and both public and private AI applications. Cato has now exceeded $300 million in annual recurring revenue (ARR). The company also added $50 million to its Series G funding round, originally announced in June, through an investment from Acrew Capital. This brings the total funding round to $409 million, at the same terms and valuation. … More →
The post Cato Networks acquires Aim Security to bring AI protection into SASE Cloud appeared first on Help Net Security.
New Namespace Reuse Vulnerability Allows Remote Code Execution in Microsoft Azure AI, Google Vertex AI, and Hugging Face
Cybersecurity researchers have uncovered a critical vulnerability in the artificial intelligence supply chain that enables attackers to achieve remote code execution across major cloud platforms including Microsoft Azure AI Foundry, Google Vertex AI, and thousands of open-source projects. The newly discovered attack method, termed “Model Namespace Reuse,” exploits a fundamental flaw in how AI platforms […]
The post New Namespace Reuse Vulnerability Allows Remote Code Execution in Microsoft Azure AI, Google Vertex AI, and Hugging Face appeared first on Cyber Security News.
XWorm Malware Adopts New Infection Chain to Bypass Security Detection
Cybersecurity researchers have identified a sophisticated evolution in XWorm malware operations, with the backdoor campaign implementing advanced tactics to evade detection systems. The Trellix Advanced Research Center has documented this significant shift in the malware’s deployment strategy, revealing a deliberate move toward more deceptive and intricate infection methods designed to increase success rates while remaining […]
The post XWorm Malware Adopts New Infection Chain to Bypass Security Detection appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Cutting through CVE noise with real-world threat signals
CISOs are dealing with an overload of vulnerability data. Each year brings tens of thousands of new CVEs, yet only a small fraction ever become weaponized. Teams often fall back on CVSS scores, which label thousands of flaws as “high” or “critical” but fail to show which ones actually matter. The result is wasted effort, long patch backlogs, and exploitable weaknesses left in production. Traditional approaches have left security leaders with what Jeff Gouge, CISO … More →
The post Cutting through CVE noise with real-world threat signals appeared first on Help Net Security.