Aggregator
Submit #805508: Flux159 mcp-game-asset-gen 0.1.0 Path Traversal [Accepted]
Submit #805507: Sunwood-ai-labs command-executor-mcp-server 0.1.0 Command Injection [Accepted]
Ransomware Victims Jump to 7,831 as AI Crime Tools Scale Global Attacks
The ransomware threat has reached a new and alarming level. According to Fortinet’s newly released 2026 Global Threat Landscape Report, the number of confirmed ransomware victims worldwide jumped to 7,831 in 2025, up from roughly 1,600 victims recorded in the previous year’s report. That is a 389% increase year-over-year, a rise that reflects how deeply […]
The post Ransomware Victims Jump to 7,831 as AI Crime Tools Scale Global Attacks appeared first on Cyber Security News.
Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft
Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft
Weekly Threat Landscape Digest – Week 18
Week 18 highlighted an active and evolving cyber threat landscape with widespread exploitation of critical vulnerabilities across enterprise systems, browsers, […]
The post Weekly Threat Landscape Digest – Week 18 appeared first on HawkEye.
Submit #804453: itsourcecode Courier Management System V1.0 SQL Injection [Accepted]
Submit #804450: TimBroddin astro-mcp-server 1.1.1 SQL Injection [Accepted]
Submit #804413: eyal-gor p_69_branch_monkey_mcp d77e757 Command Injection [Accepted]
Submit #804408: ghantakiran splunk-mcp-integration 0b86b09 Path Traversal [Accepted]
Submit #804390: ggerve coding-standards-mcp c21ab2754684329eab4feb72427dc9acfe61e52f Path Traversal [Accepted]
关于举办“CCF-INFORSEC网络空间安全前沿创新论坛”的通知
Overview of Content Published in April
Submit #804339: Open5gs AMF v2.7.7 Denial of Service [Accepted]
Billions of meals at risk due to Iran war, says fertiliser boss
Deep#Door Stealer Harvests Browser Passwords, Cloud Tokens, SSH Keys, and Wi-Fi Credentials
A newly identified Python-based malware known as DEEP#DOOR has surfaced as a serious threat to Windows users, combining a fully-featured backdoor with a powerful credential-stealing engine. What makes this threat especially concerning is how quietly it operates, embedding itself deep inside a compromised system while collecting sensitive data from multiple sources at once. The malware […]
The post Deep#Door Stealer Harvests Browser Passwords, Cloud Tokens, SSH Keys, and Wi-Fi Credentials appeared first on Cyber Security News.