Aggregator
CVE-2025-53935 | LabRedesCefetRJ WeGIA up to 3.4.4 personalizacao_selecao.php cross site scripting (GHSA-5x6v-h459-xjqh / EUVD-2025-21719)
CVE-2025-53938 | LabRedesCefetRJ WeGIA up to 3.4.4 HTTP Request verificar_recursos_cargo.php missing authentication (GHSA-6p76-7mm4-j5rj / EUVD-2025-21716)
CVE-2025-53937 | LabRedesCefetRJ WeGIA up to 3.4.4 /controle/control.php cargo sql injection (GHSA-j3qv-v3m7-73pj / EUVD-2025-21717)
CVE-2025-20272 | Cisco Evolved Programmable Network Manager REST API sql injection (cisco-sa-piepnm-bsi-25JJqsbb / EUVD-2025-21713)
CVE-2025-20285 | Cisco Identity Services Engine Software up to 3.4.0 IP Access Restriction Feature authentication bypass by assumed-immutable data (cisco-sa-ise-multi-3VpsXOxO / EUVD-2025-21709)
Квантовые сети против Эйнштейна: начался эксперимент, способный переписать физику
CVE-2025-20283 | Cisco Identity Services Engine Software 3.3.0/3.4.0 API injection (cisco-sa-ise-multi-3VpsXOxO / EUVD-2025-21712)
CVE-2025-20288 | Cisco Unified Contact Center Express Web-based Management Interface server-side request forgery (cisco-sa-cuis-ssrf-JSuDjeV / EUVD-2025-21710)
CVE-2025-20284 | Cisco Identity Services Engine Software 3.3.0/3.4.0 API injection (cisco-sa-ise-multi-3VpsXOxO / EUVD-2025-21711)
CVE-2025-20337 | Cisco Identity Services Engine Software 3.3.0/3.4.0 API injection (cisco-sa-ise-unauth-rce-ZAd2GnJ6 / EUVD-2025-21708)
CVE-2025-20274 | Cisco Unified Contact Center Express Web-based Management Interface unrestricted upload (cisco-sa-cuis-file-upload-UhNEtStm / EUVD-2025-21714)
Dark Partners Hackers Group Wiping Crypto Wallets With Fake Ai Tools and VPN Services
A sophisticated cybercrime group dubbed “Dark Partners” has emerged as a significant threat to cryptocurrency users worldwide, orchestrating large-scale theft campaigns through an extensive network of fake websites impersonating AI tools, VPN services, and popular software brands. Active since at least May 2025, this financially motivated group has deployed a complex infrastructure spanning over 250 […]
The post Dark Partners Hackers Group Wiping Crypto Wallets With Fake Ai Tools and VPN Services appeared first on Cyber Security News.
International operation disrupts pro-Russian hacker group NoName057(16)
Bridging the Visibility Gap: 2025 Global Cybersecurity Maturity Report
Reuven “Rubi” Aronashvili, CEO of CYE, asks a blunt question: Why are breaches still rampant when security budgets have never been larger? Drawing on his journey from leading an Israeli red‑team unit to advising Fortune‑500 boards, Aronashvili argues that most companies are still flying blind. Visibility—knowing exactly which assets, vulnerabilities and business processes are at..
The post Bridging the Visibility Gap: 2025 Global Cybersecurity Maturity Report appeared first on Security Boulevard.
How Organizations Can Secure AI at the Speed of Business
Organizations face mounting pressure to accelerate AI adoption while maintaining robust security controls across hybrid cloud environments where traditional tools fall short. This World AI Appreciation Day, it's time to challenge the assumption that rapid innovation comes at the cost of security.
iCounter Debuts With Mission to Defeat AI-Enabled Threats
Former FireEye and Mandiant leader John Watters unveils iCounter, a new cyber risk intelligence startup focused on targeted attacks and AI-enabled adversaries. Backed by Syn Ventures, the firm aims to transform threat detection with deeper visibility into attacker reconnaissance.
Drive-By Attack Vector Patched in Oracle Code Editor
Exploring Oracle Cloud Infrastructure, researchers at Tenable found that Oracle's console-based Code Editor tool failed to block arbitrary file uploads, and could be silently exploited via drive-by attacks to install malware. They said Oracle has now fixed the vulnerability.
Hackers Use Backdoor to Steal Data From SonicWall Appliance
A cybercrime group used a backdoor in a fully patched SonicWall appliance to steal credentials and may have sold the stolen data to ransomware groups as part of an ongoing campaign, Google Threat Intelligence Group found. The firm attributed the campaign to a cybercrime group it tracks as UNC6148.
SonicWall SMA devices persistently infected with stealthy OVERSTEP backdoor and rootkit
Unknown intruders are targeting fully patched end-of-life SonicWall Secure Mobile Access (SMA) 100 series appliances and deploying a novel, persistent backdoor / rootkit, analysts with Google’s Threat Intelligence Group (GTIG) have warned. The analysts say UNC6148 – as they dubbed the threat group – is likely financially motivated. “An organization targeted by UNC6148 in May 2025 was posted to the ‘World Leaks’ data leak site (DLS) in June 2025, and UNC6148 activity overlaps with publicly … More →
The post SonicWall SMA devices persistently infected with stealthy OVERSTEP backdoor and rootkit appeared first on Help Net Security.