Aggregator
CVE-2025-30891 | magepeopleteam WpTravelly Plugin up to 1.8.7 on WordPress filename control
CVE-2025-30894 | Epsiloncool WP Fast Total Search Plugin up to 1.79.262 on WordPress authorization
CVE-2025-30895 | magepeopleteam WpEvently Plugin up to 4.2.9 on WordPress path traversal
CVE-2025-30887 | magepeopleteam WpEvently Plugin up to 4.2.9 on WordPress authorization
CVE-2025-30890 | SuitePlugins Login Widget for Ultimate Member Plugin up to 1.1.2 on WordPress filename control
Java漏洞在黑盒实战中的技巧——反序列化篇
New Research Links RansomHub’s EDRKillShifter to Established Ransomware Gangs
ESET researchers have connections between the newly emerged ransomware-as-a-service (RaaS) group RansomHub and established ransomware gangs, including Play, Medusa, and BianLian. Emerging Threat Actor Connects Multiple Ransomware Operations The investigation centered on RansomHub’s custom EDR killer tool, EDRKillShifter, which has gained popularity among ransomware affiliates since its introduction in May 2024. The research team identified […]
The post New Research Links RansomHub’s EDRKillShifter to Established Ransomware Gangs appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-30865 | fuzzoid 3DPrint Lite Plugin up to 2.1.3.5 on WordPress cross-site request forgery
CVE-2025-30833 | Soft8Soft Verge3D Plugin up to 4.8.2 on WordPress cross-site request forgery
CVE-2025-30822 | Hakik Zaman Custom Login Logo Plugin up to 1.1.7 on WordPress cross-site request forgery
CVE-2025-30769 | alexvtn WIP WooCarousel Lite Plugin up to 1.1.7 on WordPress cross-site request forgery
CVE-2025-30811 | Javier Revilla ValidateCertify Plugin up to 1.6.1 on WordPress cross-site request forgery
CVE-2025-30823 | Boone Gorges Anthologize Plugin up to 0.8.2 on WordPress cross-site request forgery
CVE-2025-30805 | wpdesk Flexible Cookies Plugin up to 1.1.8 on WordPress cross-site request forgery
Vivaldi integrates Proton VPN into the browser to fight web tracking
Legit’s prevention dashboard helps security teams proactively stop vulnerabilities
Legit Security launched a new Legit AppSec risk prevention dashboard. The new dashboard helps reduce the time, costs, and effort of fixing vulnerabilities by preventing issues in the first place. Legit’s prevention dashboard allows companies to go beyond “shift left” by stopping issues from making their way into software releases. This positions companies to more quickly bring new software capabilities and products to market by reducing time developers spend on later-stage vulnerability remediation. Getting ahead … More →
The post Legit’s prevention dashboard helps security teams proactively stop vulnerabilities appeared first on Help Net Security.
Threat Actors Use Fake Booking.com Emails to Deceive Hotel Staff and Gain System Access
A sophisticated phishing campaign targeting the hospitality industry has been uncovered, with threat actors impersonating Booking.com to gain access to hotel systems and customer data. Microsoft Threat Intelligence has attributed the ongoing attacks, which began in December 2024 and continued through February 2025, to a group known as Storm-1865. The campaign primarily targets North America, […]
The post Threat Actors Use Fake Booking.com Emails to Deceive Hotel Staff and Gain System Access appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.