Aggregator
CVE-2025-32544 | WooCommerce Loyal Customers Plugin up to 2.6 on WordPress authorization
CVE-2025-26867 | Bulk Theme up to 1.0.11 on WordPress authorization
CVE-2025-32652 | Solace Extra Plugin up to 1.3.1 on WordPress unrestricted upload
CVE-2025-26920 | customify-theme Theme up to 0.4.8 on WordPress authorization
CVE-2025-30406:Gladinet 公司 Triofox 和 CentreStack 产品 RCE 漏洞被黑客恶意利用
CVE-2025-28137 | TOTOLINK A810R 4.1.2cu.5182_B20201026 setNoticeCfg NoticeUrl privilege escalation
Microsoft Disables ActiveX by Default in 365 to Block Malware Execution by Hackers
Microsoft has taken a critical step to enhance security across its productivity suite by disabling ActiveX controls by default in Microsoft 365 applications. This significant security update, which began rolling out earlier this month, aims to reduce the risk of malware and unauthorized code execution that has long plagued the legacy technology. Starting April 2025, […]
The post Microsoft Disables ActiveX by Default in 365 to Block Malware Execution by Hackers appeared first on Cyber Security News.
CVE-2025-29280 | PerfreeBlog 4.0.11 Backend System Settings website name cross site scripting
CVE-2025-28136 | TOTOLINK A800R 4.1.2cu.5137_B20200730 downloadFile.cgi buffer overflow
Hertz data breach: Customers in US, EU, UK, Australia and Canada affected
American car rental company Hertz has suffered a data breach linked to last year’s exploitation of Cleo zero-day vulnerabilities by a ransomware gang. The breach resulted in information of an unknown number of customers of Hertz and Hertz’s subsidiaries Dollar and Thrifty to be compromised. Hertz data breach notifications “Cleo is a vendor that provides a file transfer platform used by Hertz for limited purposes,” the company shared – though it did not specify what … More →
The post Hertz data breach: Customers in US, EU, UK, Australia and Canada affected appeared first on Help Net Security.
育碧开源色盲模拟工具 Chroma
North Korean Hackers Exploit LinkedIn to Infect Crypto Developers with Infostealers
可灵 AI 开启视频生成 2.0 时代!全球用户数已突破 2200 万
CTO 详解理想「系统开源」:希望成为汽车圈的「DeepSeek」
Trump vs. Biden Cyber Strategy — According to AI
We asked an AI agent to analyze the latest shift in U.S. cybersecurity policy, comparing past strategies under Biden to the new 2025 Trump Executive Order. The result? A surprisingly structured analysis that maps out the core philosophical and operational differences, from federal-led resilience to localized risk ownership. But this raises a more provocative question: […]
The post Trump vs. Biden Cyber Strategy — According to AI appeared first on VERITI.
The post Trump vs. Biden Cyber Strategy — According to AI appeared first on Security Boulevard.
Chinese Hackers Target Linux Systems Using SNOWLIGHT Malware and VShell Tool
Critical Apache Roller flaw allows to retain unauthorized access even after a password change
Akira
SecMap - ReDos
最近在给一个安全产品配置一个正则,有趣的是,回溯历史数据的时候发现,有一些字符串会导致引擎超时,从而触发熔断机制,导致策略失效。经过简单的测试,发现是触发了 redos。