Aggregator
CVE-2021-24300 | PickPlugins Product Slider for WooCommerce Plugin up to 1.13.21 on WordPress Slider Import Search keyword cross site scripting (EDB-50704)
CVE-2021-33562 | Shopizer up to 2.16.x insert-product-name-here.html ref cross site scripting (Exploit 49901 / EDB-49901)
CVE-2021-24308 | LMS by LifterLMS Plugin up to 4.21.0 on WordPress Profile Page cross site scripting (EDB-49912)
CVE-2021-23841 | Apple iOS/iPadOS up to 14.5.1 WebRTC null pointer dereference (HT212528 / Nessus ID 211827)
CVE-2021-33561 | Shopizer up to 2.16.x list.html customer_name cross site scripting (Exploit 49901 / EDB-49901)
Cyberattacks Grow 40%, but Budgets Not Keeping Up
Good AI defense requires real-time visibility across all endpoints, according to Tanium CEO Dan Streetman. He shared how Tanium's "confidence score" framework enables organizations to monitor operational impact on every endpoint when a change is rolled out, helping teams remediate threats at scale.
Cybersecurity Trends: Impact of Tariffs and Data Sovereignty
Organizations are beginning to be more cautious in the wake of the ongoing tariff war in terms of budgeting, although the situation is an opportunity for the cybersecurity industry to improve performance overall, said Kevin Simzer, chief operating officer at Trend Micro.
Balancing AI Innovation With Security
AI governance must balance innovation with security, making it vital that organizations adopt flexible, consensus-driven approach to ensure responsible AI deployment while addressing risks such as data exposure and software resilience, said Jim Routh, chief trust officer at Saviynt.
Prepare to Start Implementing Quantum-Safe Algorithms
Quantum computing is at a tipping point, moving from theoretical math to deployable physics, said Jon France, CISO at ISC2. So, security teams need to start addressing the implementation of quantum-safe algorithms now, beginning with the five new safe algorithms released by NIST.
CVE-2021-30470 | PoDoFo 0.9.7 ReadDataType stack-based overflow (Nessus ID 214391)
CVE-2021-33570 | Postbird 0.8.4 XMLHttpRequest onerror cross site scripting (EDB-49910)
CVE-2021-30471 | PoDoFo 0.9.7 PdfNamesTree.cpp AddToDictionary stack-based overflow (Nessus ID 214391)
CVE-2009-2930 | Elkagroup Elkapax Cms Search Feature cross site scripting (EDB-34616)
RansomHub Taps SocGholish: WebDAV & SCF Exploits Fuel Credential Heists
SocGholish, a notorious loader malware, has evolved into a critical tool for cybercriminals, often delivering payloads like Cobalt Strike and, more recently, RansomHub ransomware. Darktrace’s Threat Research team has tracked multiple incidents since January 2025, where threat actors exploited SocGholish to compromise networks through fake browser updates and JavaScript-based attacks on vulnerable CMS platforms like […]
The post RansomHub Taps SocGholish: WebDAV & SCF Exploits Fuel Credential Heists appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Hackers Weaponize Go Modules to Deliver Disk‑Wiping Malware, Causing Massive Data Loss
Cybersecurity researchers uncovered a sophisticated supply chain attack targeting the Go programming language ecosystem in April 2025. Hackers have weaponized three malicious Go modules-github[.]com/truthfulpharm/prototransform, github[.]com/blankloggia/go-mcp, and github[.]com/steelpoor/tlsproxy-to deploy devastating disk-wiping malware. Leveraging the decentralized nature of Go’s module system, where developers directly import dependencies from public repositories like GitHub sans centralized gatekeeping, attackers exploit namespace […]
The post Hackers Weaponize Go Modules to Deliver Disk‑Wiping Malware, Causing Massive Data Loss appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.