Aggregator
CVE-2024-8245 | GamiPress Plugin up to 1.0.0 on WordPress Setting cross-site request forgery (EUVD-2025-15260)
CVE-2015-2462 | Microsoft Windows up to Vista OpenType Font Parser input validation (MS15-080 / EDB-37916)
Blockchain Security – Protecting Decentralized Systems
As decentralized systems mature, 2024–2025 has emerged as a watershed period for blockchain security, marked by sophisticated cyberattacks, novel attack vectors, and landmark regulatory interventions. While stolen cryptocurrency values declined compared to previous years, falling to $1.7 billion in 2023-the frequency of breaches has intensified, with 231 hacking incidents reported in 2023 alone. This paradox […]
The post Blockchain Security – Protecting Decentralized Systems appeared first on Cyber Security News.
New Ransomware Attack Mocking Elon Musk Supporters Using PowerShell to Deploy Payloads
A sophisticated ransomware campaign specifically targeting and mocking supporters of Elon Musk has been identified by cybersecurity experts. The attack, identified as a variant of Fog Ransomware, employs multi-stage PowerShell scripts and Netlify-hosted payloads to execute its malicious code. This campaign represents a concerning evolution in politically-themed malware that combines financial motivation with satirical commentary. […]
The post New Ransomware Attack Mocking Elon Musk Supporters Using PowerShell to Deploy Payloads appeared first on Cyber Security News.
NightSpire
You must login to view this content
NightSpire
You must login to view this content
CVE-2024-8031 | Secure Downloads Plugin up to 1.2.2 on WordPress update path traversal
CVE-2024-7761 | Simple Job Board Plugin up to 2.12.1 on WordPress Setting cross site scripting (EUVD-2025-15264)
CVE-2024-6809 | Simple Video Directory Plugin up to 1.4.2 on WordPress sql injection
CVE-2024-7758 | Stylish Price List Plugin up to 7.1.7 on WordPress Setting cross site scripting
CVE-2024-7556 | Simple Share Plugin up to 0.5.3 on WordPress Setting cross site scripting (EUVD-2025-15267)
VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2
Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering critical vulnerabilities across major enterprise platforms and earning $435,000 in bounties. The competition, now in its second day at the OffensiveCon conference in Berlin, has awarded a cumulative total of $695,000 with participants revealing 20 unique zero-day vulnerabilities thus far. With […]
The post VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Lynx
You must login to view this content
Printer Company Offered Malicious Drivers Infected With XRed Malware
In a concerning cybersecurity incident, printer manufacturer Procolored unknowingly distributed malware-infected software for approximately six months, ending in May 2025. The issue came to light when YouTube creator Cameron Coward of the channel Serial Hobbyism attempted to review a $6,000 UV printer and was alerted by his antivirus software to infections on the company-provided USB […]
The post Printer Company Offered Malicious Drivers Infected With XRed Malware appeared first on Cyber Security News.
【安全圈】“ AI 骗局”升级!FBI 警告:已有美国高官的声音被冒充
【安全圈】现在全世界都知道我买不起迪奥了
【安全圈】无视任何杀毒软件!世界上第一个 CPU 级勒索病毒:可直接攻击处理器 控制 BIOS
Guide to Cloud API Security – Preventing Token Abuse
As organizations accelerate cloud adoption, API token abuse has emerged as a critical vulnerability vector. Recent incidents at significant platforms like DocuSign and Heroku exposed systemic risks in token management. A 2025 study reveals 57% of enterprises experienced API-related breaches in the past two years, with 73% facing multiple incidents. This surge highlights the urgent […]
The post Guide to Cloud API Security – Preventing Token Abuse appeared first on Cyber Security News.