Aggregator
CVE-2025-32943 | PeerTube up to 7.1.0 HLS Video path traversal
CVE-2025-32997 | chimurai http-proxy-middleware up to 2.0.8/3.0.4 fixRequestBody unusual condition
CVE-2025-32996 | chimurai http-proxy-middleware up to 2.0.7/3.0.3 writeBody control flow
CVE-2025-32987 | Arctera eDiscovery Platform up to 10.3.1 Enterprise Vault Collection Module invocation of process using visible sensitive information
CVE-2025-29984 | Dell Trusted Device Client prior 7.0.3.0 access control (dsa-2025-151)
CVE-2025-29983 | Dell Trusted Device Client prior 7.0.3.0 link following (dsa-2025-151)
Cloud Misconfigurations – A Leading Cause of Data Breaches
Cloud computing has transformed the way organizations operate, offering unprecedented scalability, flexibility, and cost savings. However, this rapid shift to the cloud has also introduced new security challenges, with misconfigurations emerging as one of the most significant and persistent threats. Cloud misconfigurations occur when cloud resources are set up with incorrect or suboptimal security settings, […]
The post Cloud Misconfigurations – A Leading Cause of Data Breaches appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
踩坑篇:将移动硬盘挂载为 WSL 下的用户主目录
慢雾:AI 安全之 MCP 安全检查清单
慢雾:AI 安全之 MCP 安全检查清单
CVE-2025-3575 | T-INNOVA Deporsite 05.29.0907 establecerUsuarioSeleccion idUsuario authorization
Security Awareness Metrics That Matter to the CISO
Security awareness has become a critical component of organizational defense strategies, particularly as companies adopt zero-trust architectures. Chief Information Security Officers (CISOs) are increasingly challenged to demonstrate the effectiveness of security awareness programs through meaningful metrics that resonate with leadership. With human error contributing to approximately 95% of data breaches, quantifying the impact of security […]
The post Security Awareness Metrics That Matter to the CISO appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-3574 | T-INNOVA Deporsite 05.29.0907 obtenerFamiliaUsuario idUsuario authorization
CVE-2024-13610 | Simple Social Media Share Buttons Plugin up to 5.x on WordPress Setting cross site scripting
CVE-2024-13207 | Widget for Social Page Feeds Plugin up to 6.4.1 on WordPress cross site scripting
CVE-2025-3578 | AiDex up to 1.6 /api//message automated recognition mechanism with inadequate detection or handling of adversarial input perturbations
New ‘Waiting Thread Hijacking’ Malware Technique Evades Modern Security Measures
Security researchers have unveiled a new malware process injection technique dubbed “Waiting Thread Hijacking” (WTH), designed to execute malicious code within legitimate processes while bypassing many modern security defenses. Developed by Check Point Research, WTH represents an evolution of classic Thread Execution Hijacking, achieving stealth by avoiding notoriously suspicious API calls. Process injection techniques are […]
The post New ‘Waiting Thread Hijacking’ Malware Technique Evades Modern Security Measures appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.