Aggregator
CVE-2022-20920 | Cisco IOS/IOS XE SSH exceptional condition (cisco-sa-ssh-excpt-dos-FzOBQTnk)
CVE-2025-27405 | Icinga icingaweb2 up to 2.11.4/2.12.2 Setting cross site scripting
CVE-2025-27609 | Icinga icingaweb2 up to 2.11.4/2.12.2 cross site scripting
CVE-2025-20256 | Cisco Secure Network Analytics 7.4.1/7.4.2/7.5.0/7.5.1/7.5.2 Web-based Management Interface injection (cisco-sa-sna-ssti-dPuLqSmZ / EUVD-2025-16019)
CVE-2025-20129 | Cisco SocialMiner/Unified Contact Center Express Web-based Chat Interface information disclosure (cisco-sa-ccp-info-disc-ZyGerQpd / EUVD-2025-16892)
Storm-2603 Deploys Custom Malware Using BYOVD to Bypass Endpoint Protections
Check Point Research (CPR) has delved into the operations of Storm-2603, a recently identified threat actor linked to Chinese advanced persistent threat (APT) groups, amid widespread exploitation of Microsoft SharePoint Server vulnerabilities known as “ToolShell.” This campaign exploits four critical CVEs CVE-2025-49704, CVE-2025-49706, CVE-2025-53770, and CVE-2025-53771 to facilitate intrusions, with Storm-2603 deploying a custom command-and-control […]
The post Storm-2603 Deploys Custom Malware Using BYOVD to Bypass Endpoint Protections appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-7694 | Woffice Core Plugin up to 5.4.26 on WordPress woffice_file_manager_delete denial of service (EUVD-2025-23419)
CVE-2025-45767 | jose 6.0.10 inadequate encryption
CVE-2023-44976 | Hangzhou Shunwang Rentdrv2 prior 2024-12-24 exposed ioctl with insufficient access control (EUVD-2023-49299)
CVE-2025-20209 | Cisco IOS XR up to 24.2.11 IKEv2 allocation of resources (cisco-sa-xrike-9wYGpRGq)
CVE-2025-30164 | Icinga icingaweb2 up to 2.11.4/2.12.2 Command-Line Interface redirect
Exfiltrating Your ChatGPT Chat History and Memories With Prompt Injection
Было 69 отключений, стало 2099. Связь в России отключается всё чаще и громче
Overcoming the Limitations of Using AI Security in Telecom
Telecom firms face rising cyberthreats, growing regulatory pressure and shrinking budgets. But instead of chasing flashy solutions, the industry should focus on strengthening its security fundamentals, said Silke Holtmanns, telecommunication and critical infrastructure security expert at Blue Hour.
What Makes an AI Startup Fundable - From a VC Who Knows
Q2 2025 saw AI dominate global VC funding, grabbing $47.5 billion of the $94.6 billion raised. AI Investor Umesh Padval breaks down what makes AI infrastructure startups worth betting on - from platform depth and speed to regional ecosystems and exit timing.
BSidesSF 2025: 0.0.0.0 Day: Exploiting Localhost APIs From The Browser
Creator/Author/Presenter: Gal Elbaz
Our deep appreciation to Security BSides - San Francisco and the Creators/Authors/Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held at the lauded CityView / AMC Metreon - certainly a venue like no other; and via the organization's YouTube channel.
Additionally, the organization is welcoming volunteers for the BSidesSF Volunteer Force, as well as their Program Team & Operations roles. See their succinct BSidesSF 'Work With Us' page, in which, the appropriate information is to be had!
The post BSidesSF 2025: 0.0.0.0 Day: Exploiting Localhost APIs From The Browser appeared first on Security Boulevard.