Aggregator
CVE-2025-54234 | Adobe ColdFusion up to 2021.19/2023.13/2025.1 server-side request forgery (apsb25-52)
Weaponized Python Package “termncolor” Uses Windows Run Key for Persistence
Cybersecurity experts discovered a complex supply chain attack that originated from the Python Package Index (PyPI) in a recent disclosure from Zscaler ThreatLabz. The package in question, termed “termncolor,” masquerades as a benign color utility for Python terminals but covertly imports a malicious dependency named “colorinal.” This dependency serves as the initial infection vector, triggering […]
The post Weaponized Python Package “termncolor” Uses Windows Run Key for Persistence appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-54421 | NamelessMC Nameless up to 2.2.3 default_keywords cross site scripting (GHSA-f5rm-w4mx-q7rx)
CVE-2025-54117 | NamelessMC Nameless up to 2.2.3 cross site scripting (GHSA-gp3j-j84w-vqxx)
CVE-2025-55214 | copier-org copier up to 9.9.0 _copier_conf.sep path traversal
CVE-2025-55201 | copier-org copier up to 9.9.0 pathlib.Path path traversal
CVE-2025-55205 | projectcapsule up to 0.10.3 authorization
CVE-2025-54118 | NamelessMC Nameless up to 2.2.3 list information disclosure (GHSA-cj37-8jqc-hv2w)
«Поздравляем, вы оштрафованы»: мошенники научили машину работать лучше любого суда
Fake Copyright Notices Drop New Noodlophile Stealer Variant
Randall Munroe’s XKCD ‘Grounded’
via the cosmic humor & dry-as-the-desert wit of Randall Munroe, creator of XKCD
The post Randall Munroe’s XKCD ‘Grounded’ appeared first on Security Boulevard.
Workday Breach Likely Linked to ShinyHunters Salesforce Attacks
UK sentences “serial hacker” of 3,000 sites to 20 months in prison
GitHub-автообновления превратились в канал заражения тысяч проектов по всему миру
智能体防御 | 一文了解3种系统提示词加固方法
Intrusion Detection and Prevention
In today’s hyper-connected digital world, businesses of all sizes face relentless cyber threats. From ransomware and phishing campaigns to advanced persistent threats (APTs) and insider risks, attackers are becoming increasingly sophisticated in the ways they infiltrate corporate networks. Protecting sensitive data, ensuring business continuity, and maintaining regulatory compliance requires more than traditional security tools—it requires
The post Intrusion Detection and Prevention appeared first on Seceon Inc.
The post Intrusion Detection and Prevention appeared first on Security Boulevard.
Crypto24
You must login to view this content