Aggregator
CVE-2025-9684 | Portabilis i-Educar up to 2.10 Formula de Cálculo de Média Page edit ID sql injection
Safeguarding Healthcare With Secure and Smart Hospitals
Torkel Thune, head of the department for architecture, operational IT security and chief security officer at Oslo University Hospital, discusses how global shifts are affecting cybersecurity for the Nordic region, and how healthcare is especially vulnerable.
Bridging the IT-OT Security Divide in Manufacturing
Manufacturers face many challenges in securing OT and IT systems, from legacy technology to managing vulnerabilities. Tammy Klotz, CISO at Trinseo and last year's ManuSec Summit event chair, discusses the value of sharing firsthand insights with a cybersecurity community.
Submit #638582: Portabilis i-educar 2.10 Broken Object Level Authorization [Accepted]
Popular Nx Packages Compromised by Credential-Stealing Malware
A widespread supply chain attack on the popular Nx build system has compromised dozens of high-traffic packages, exposing sensitive credentials and demonstrating a frighteningly comprehensive approach to future threats. Security researchers have confirmed that malicious versions of Nx—numbered 20.9.0 through 21.8.0—systematically scanned infected machines for a broad range of secrets before exfiltrating them to public […]
The post Popular Nx Packages Compromised by Credential-Stealing Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Submit #638577: Portabilis i-educar 2.10 SQL Injection [Accepted]
Submit #638576: Portabilis i-educar 2.10 SQL Injection [Accepted]
Submit #638574: Portabilis i-educar 2.10 SQL Injection [Accepted]
Attackers use “Contact Us” forms and fake NDAs to phish industrial manufacturing firms
A recently uncovered phishing campaign – carefully designed to bypass security defenses and avoid detection by its intended victims – is targeting firms in industrial manufacturing and other companies critical to various supply chains, Check Point researchers have warned. The phishing campaign(s) The researchers believe that the campaign has been mounted by financially motivated threat actors. Its goal is to deliver a malicious ZIP archive that contains a PowerShell script that will be executed in … More →
The post Attackers use “Contact Us” forms and fake NDAs to phish industrial manufacturing firms appeared first on Help Net Security.