Aggregator
G.O.S.S.I.P 阅读推荐 2025-05-17 本地网络立入禁止
Sophisticated NPM Attack Exploits Google Calendar C2 For Sophisticated Communication
A new advanced supply chain attack targeting the Node Package Manager (NPM) ecosystem has emerged, leveraging Google Calendar as a covert command and control (C2) channel. Cybersecurity experts discovered the malware embedded in seemingly legitimate JavaScript libraries that, once installed, establish a stealthy communication pathway with attackers through common Google services. The malware has potentially […]
The post Sophisticated NPM Attack Exploits Google Calendar C2 For Sophisticated Communication appeared first on Cyber Security News.
CVE-2025-4815 | Campcodes Sales and Inventory System 1.0 supplier_update.php Name sql injection (EUVD-2025-15560)
CVE-2024-6667 | KBucket Plugin up to 4.1.4 on WordPress $_SERVER['REQUEST_URI'] cross site scripting (EUVD-2025-15287)
CVE-2024-7769 | ClickSold IDX Plugin up to 1.90 on WordPress Setting cross site scripting (EUVD-2025-15261)
CVE-2024-7759 | PWA for WP Plugin up to 1.7.71 on WordPress Setting cross site scripting (EUVD-2025-15262)
CVE-2024-7984 | Joy of Text Lite Plugin up to 2.3.1 on WordPress Setting cross-site request forgery (EUVD-2025-15245)
CVE-2024-8245 | GamiPress Plugin up to 1.0.0 on WordPress Setting cross-site request forgery (EUVD-2025-15260)
CVE-2015-2462 | Microsoft Windows up to Vista OpenType Font Parser input validation (MS15-080 / EDB-37916)
Blockchain Security – Protecting Decentralized Systems
As decentralized systems mature, 2024–2025 has emerged as a watershed period for blockchain security, marked by sophisticated cyberattacks, novel attack vectors, and landmark regulatory interventions. While stolen cryptocurrency values declined compared to previous years, falling to $1.7 billion in 2023-the frequency of breaches has intensified, with 231 hacking incidents reported in 2023 alone. This paradox […]
The post Blockchain Security – Protecting Decentralized Systems appeared first on Cyber Security News.
New Ransomware Attack Mocking Elon Musk Supporters Using PowerShell to Deploy Payloads
A sophisticated ransomware campaign specifically targeting and mocking supporters of Elon Musk has been identified by cybersecurity experts. The attack, identified as a variant of Fog Ransomware, employs multi-stage PowerShell scripts and Netlify-hosted payloads to execute its malicious code. This campaign represents a concerning evolution in politically-themed malware that combines financial motivation with satirical commentary. […]
The post New Ransomware Attack Mocking Elon Musk Supporters Using PowerShell to Deploy Payloads appeared first on Cyber Security News.
NightSpire
You must login to view this content
NightSpire
You must login to view this content
CVE-2024-8031 | Secure Downloads Plugin up to 1.2.2 on WordPress update path traversal
CVE-2024-7761 | Simple Job Board Plugin up to 2.12.1 on WordPress Setting cross site scripting (EUVD-2025-15264)
CVE-2024-6809 | Simple Video Directory Plugin up to 1.4.2 on WordPress sql injection
CVE-2024-7758 | Stylish Price List Plugin up to 7.1.7 on WordPress Setting cross site scripting
CVE-2024-7556 | Simple Share Plugin up to 0.5.3 on WordPress Setting cross site scripting (EUVD-2025-15267)
VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2
Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering critical vulnerabilities across major enterprise platforms and earning $435,000 in bounties. The competition, now in its second day at the OffensiveCon conference in Berlin, has awarded a cumulative total of $695,000 with participants revealing 20 unique zero-day vulnerabilities thus far. With […]
The post VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.