Aggregator
CVE-2026-21728 | Grafana Tempo up to 2.10.x allocation of resources
CVE-2026-3565 | Taqnix Plugin up to 1.0.3 on WordPress taqnix_delete_my_account cross-site request forgery
CVE-2026-3569 | Liaison Site Prober Plugin up to 1.2.1 on WordPress REST API Endpoint logs permissions_read authorization
CVE-2026-4078 | ITERAS Plugin up to 1.8.2 on WordPress Shortcode combine_attributes cross site scripting
CVE-2025-11762 | hubspotdev HubSpot All-In-One Marketing Plugin up to 11.3.32 on WordPress class-adminconstants.php authorization
Xinference PyPI Supply Chain Poisoning Warning
Overview Recently, NSFOCUS CERT detected that Xinference had suffered supply chain poisoning in its PyPI warehouse. The attacker stole the PyPI release permission credentials of Xinference maintainers and released three consecutive malicious versions implanted with Trojans on April 22, GMT+8. When triggered by the user, it will collect cloud credentials, SSH keys, API tokens, Sensitive […]
The post Xinference PyPI Supply Chain Poisoning Warning appeared first on NSFOCUS.
The post Xinference PyPI Supply Chain Poisoning Warning appeared first on Security Boulevard.
NASA Roman 太空望远镜最早九月发射
Microsoft’s April Security Update of High-Risk Vulnerability Notice for Multiple Products
Overview On April 15, NSFOCUS CERT detected that Microsoft released the April Security Update patch, fixing 165 security issues involving Windows, Microsoft Office, Microsoft SQL Server, Microsoft Visual Studio, Microsoft .NET Framework, Widely used products such as Azure, including high-risk vulnerability types such as privilege escalation and remote code execution. Among the vulnerabilities fixed by […]
The post Microsoft’s April Security Update of High-Risk Vulnerability Notice for Multiple Products appeared first on NSFOCUS.
The post Microsoft’s April Security Update of High-Risk Vulnerability Notice for Multiple Products appeared first on Security Boulevard.
在360AI知识库第一时间用上DeepSeek V4!
IDC认证!360登顶中国智能体安全能力评估 综合能力位列安全行业第一
Secure-by-Design Principles for UK SMEs: A Practical Guide
Secure-by-Design Principles for UK SMEs: A Practical Guide For many UK SMEs, security still gets treated as something to add once a system is already chosen, configured, or live. That approach can work for a while, but it often creates avoidable cost, friction, and rework. Secure-by-design principles take a different view. They ask a simple […]
The post Secure-by-Design Principles for UK SMEs: A Practical Guide appeared first on Clear Path Security Ltd.
The post Secure-by-Design Principles for UK SMEs: A Practical Guide appeared first on Security Boulevard.
Домофон, который разорил семью: история на 8 млн рублей и один перелет в Москву
Npm Supply Chain Malware Attack Targets Developers With Worm-Like Propagation
Locked in eBPF: Meet Jailer, the Next-Gen Process Jailing System for Linux Security
Jailer is an eBPF-based process jailing system that provides mandatory access control (MAC) for Linux. It tracks processes
The post Locked in eBPF: Meet Jailer, the Next-Gen Process Jailing System for Linux Security appeared first on Penetration Testing Tools.
Hackers Use Telegram Bots to Track 900+ Successful React2Shell Exploits
A newly exposed server has revealed how a threat actor used automated tools, AI assistance, and Telegram bots to silently hack into more than 900 companies around the world. The operation, built around a tool called “Bissa scanner,” targeted internet-facing web applications at a massive scale, harvested sensitive credentials, and sent real-time exploit alerts straight […]
The post Hackers Use Telegram Bots to Track 900+ Successful React2Shell Exploits appeared first on Cyber Security News.
The 11-Day Head Start: How “Internet Noise” Predicts the Next Major Zero-Day Breach
Subtle fluctuations in internet activity can serve as premonitory indicators of severe vulnerabilities long before their public disclosure.
The post The 11-Day Head Start: How “Internet Noise” Predicts the Next Major Zero-Day Breach appeared first on Penetration Testing Tools.
深度求索发布 DeepSeek-V4 预览版
Retro Revolution: How One Hacker Brought the Windows Subsystem for Linux to Windows 95
The Windows Subsystem for Linux (WSL) has long been synonymous with contemporary iterations of the Windows operating system;
The post Retro Revolution: How One Hacker Brought the Windows Subsystem for Linux to Windows 95 appeared first on Penetration Testing Tools.
Digital Scorched Earth: The “Lotus Wiper” Attack Paralyzing Venezuela’s Energy Grid
A sophisticated destructive malware, designated as Lotus Wiper, has been identified within Venezuela, specifically targeting the energy and
The post Digital Scorched Earth: The “Lotus Wiper” Attack Paralyzing Venezuela’s Energy Grid appeared first on Penetration Testing Tools.