Aggregator
Your wearable knows your heartbeat, but who else does?
Smartwatches, glucose sensors, and connected drug-monitoring devices are common in care programs. Remote monitoring helps detect changes early and supports personalized treatment and long-term condition management. They give clinicians valuable insight into patient health but also introduce new exposure points. As more care shifts outside hospital walls, sensitive information crosses networks that few organizations can see end to end. Security leaders are paying attention. “Consider the devastating consequences of bad actors attacking remote patient monitoring … More →
The post Your wearable knows your heartbeat, but who else does? appeared first on Help Net Security.
APT Down:朝鲜档案 from Phrack 72#7
CVE-2025-59489
CVE-2025-8427 | Beaver Builder Plugin up to 2.9.2.1 on WordPress auto_play cross site scripting
CVE-2025-10705 | MxChat Plugin up to 2.4.6 on WordPress PDF mxchat_handle_chat_request server-side request forgery
CVE-2025-11128 | Feedzy RSS Aggregator Plugin up to 5.1.0 on WordPress feedzy_sanitize_feeds server-side request forgery
CVE-2025-62032 | tagDiv Cloud Library Plugin up to 3.9 on WordPress cross site scripting
CVE-2025-62051 | UDesign Core Plugin up to 4.14.1 on WordPress cross site scripting
CVE-2025-62043 | WPCasa Plugin up to 1.4.1 on WordPress cross site scripting
CVE-2025-62044 | TheGem Theme Elements for WPBakery Plugin up to 5.10.5.1 on WordPress cross site scripting
CVE-2025-62030 | tagDiv Composer Plugin up to 5.4.1 on WordPress cross site scripting
CVE-2025-48085 | Simple Stripe Plugin up to 0.9.17 on WordPress cross-site request forgery
CVE-2025-48083 | wpNamedUsers Plugin up to 0.5 on WordPress cross-site request forgery
CVE-2025-48077 | Block Country Plugin up to 1.0 on WordPress cross-site request forgery
CVE-2025-31029 | replyMail Plugin up to 1.2.0 on WordPress cross-site request forgery
CVE-2025-48078 | Slick Google Map Plugin up to 0.3 on WordPress cross-site request forgery
How Lazarus Group used fake job ads to spy on Europe’s drone and defense sector
ESET researchers have uncovered a fresh wave of Operation DreamJob, a long-running campaign linked to North Korea’s Lazarus Group. This latest activity targeted several European defense contractors, including firms deeply involved in drone and UAV development, which may point to a connection with Pyongyang’s push to expand its drone capabilities. According to ESET, the attackers went after three defense companies in Central and Southeastern Europe, likely gaining initial access through carefully crafted social engineering lures. … More →
The post How Lazarus Group used fake job ads to spy on Europe’s drone and defense sector appeared first on Help Net Security.