Aggregator
3 in 4 Enterprise Users Upload Data to GenAI Including Passwords and Keys
In a startling revelation, a new report indicates that three out of four enterprise users are uploading data to generative AI (genAI) applications, including sensitive information such as passwords and keys. This alarming trend highlights the growing risks associated with the widespread adoption of AI technologies in the workplace. The 2025 Generative AI Cloud and […]
The post 3 in 4 Enterprise Users Upload Data to GenAI Including Passwords and Keys appeared first on Cyber Security News.
Microsoft fixes printing issues caused by January Windows updates
CVE-2025-24972 | Discourse up to 3.3.3/3.4.0.beta5 Direct Message authorization
CVE-2025-24808 | Discourse up to 3.3.3/3.4.0.beta4 add_users_to_channel race condition (GHSA-hfcx-qjw6-573r)
How AI is Fueling ATOs & Fake Account Creation—And Why Bot Detection Needs to Evolve
AI is now part of the botnet. See how it’s powering ATOs and fake accounts, and why real-time, multi-layered detection is the only way to fight back.
The post How AI is Fueling ATOs & Fake Account Creation—And Why Bot Detection Needs to Evolve appeared first on Security Boulevard.
CrushFTP HTTPS Port Vulnerability Leads to Unauthorized Access
Two critical vulnerabilities have been identified in widely used software: CrushFTP and Next.js. CrushFTP, a file transfer solution, contains a vulnerability allowing unauthorized access through standard web ports, bypassing security measures. Additionally, Next.js, a popular React framework, suffers from CVE-2025-29927, which enables attackers to circumvent authorization checks in middleware. Both vulnerabilities pose significant risks, potentially […]
The post CrushFTP HTTPS Port Vulnerability Leads to Unauthorized Access appeared first on Cyber Security News.
CVE-2025-2481 | MediaView Plugin up to 1.1.2 on WordPress ID cross site scripting
CVE-2022-39163 | IBM Cognos Controller/Controller up to 11.0.1 request smuggling
紧急警报:Chrome 严重漏洞或致攻击者执行任意代码
CVE-2025-23203 | Icinga icingaweb2-module-director up to 1.10.2/1.11.2 service information disclosure (GHSA-3233-ggc5-m3qg)
Alleged Sale of Database and Shell Access – Government of Nepal
CVE-2024-45351 | Xiaomi Game Center Application 13.10 improper validation of specified quantity in input
Operation ForumTroll – APT Hackers Exploit Google Chrome Zero-Day To Bypass Sandbox Protections
In mid-March 2025, cybersecurity researchers uncovered “Operation ForumTroll,” targeting Russian media outlets and educational institutions. Victims are infected by clicking phishing links disguised as invitations to the “Primakov Readings” forum, requiring no further interaction for the sophisticated malware to deploy on vulnerable systems. The campaign exploits a critical zero-day vulnerability (CVE-2025-2783) in Chrome that bypasses […]
The post Operation ForumTroll – APT Hackers Exploit Google Chrome Zero-Day To Bypass Sandbox Protections appeared first on Cyber Security News.
CrushFTP security advisory (AV25-165)
Google Chrome security advisory (AV25-164)
Your Smart TV May Bring Down the Entire Network
CYFOX has uncovered significant vulnerabilities in smart TVs that could potentially disrupt entire enterprise networks. This discovery was made possible by their groundbreaking OmniSec vCISO platform, the first GenAI-powered autonomous security and compliance agent. During the implementation of OmniSec, CYFOX identified critical security flaws within smart TVs. Joseph Tal, CEO of CYFOX, emphasized the significance […]
The post Your Smart TV May Bring Down the Entire Network appeared first on Cyber Security News.
近半加拿大家庭完全停止消费有线电视
Threat Actors Abuse Trust in Cloud Collaboration Platforms
Production Line Camera Flaws Allow Hackers to Disable Recordings
Nozomi Networks Labs has uncovered four severe vulnerabilities in the Inaba Denki Sangyo Co., Ltd. IB-MCT001, a camera widely used in Japanese production plants for recording production stoppages. These security flaws, which remain unpatched, pose significant risks to industrial environments, potentially allowing unauthorized remote access and manipulation of critical production data. The CHOCO TEI WATCHER […]
The post Production Line Camera Flaws Allow Hackers to Disable Recordings appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.