Aggregator
CVE-2025-30183 | CyberData 011209 SIP Emergency Intercom prior 22.0.1 insufficiently protected credentials (icsa-25-155-01 / EUVD-2025-17581)
CVE-2025-5901 | TOTOLINK T10 4.1.8cu.5207 POST Request /cgi-bin/cstecgi.cgi UploadCustomModule File buffer overflow (EUVD-2025-17591)
CVE-2025-5902 | TOTOLINK T10 4.1.8cu.5207 POST Request /cgi-bin/cstecgi.cgi setUpgradeFW slaveIpList buffer overflow (EUVD-2025-17589)
CVE-2025-5903 | TOTOLINK T10 4.1.8cu.5207 POST Request /cgi-bin/cstecgi.cgi setWiFiAclRules desc buffer overflow (EUVD-2025-17612)
CVE-2025-5904 | TOTOLINK T10 4.1.8cu.5207 POST Request /cgi-bin/cstecgi.cgi setWiFiMeshName device_name buffer overflow (EUVD-2025-17609)
CVE-2024-2318 | ZKTeco ZKBio Media 2.0.0_x64_2024-01-29-1028 Service Port 9999 /pro/common/download fileName path traversal (EUVD-2024-27273)
Unpatched Wazuh servers targeted by Mirai botnets (CVE-2025-24016)
Two Mirai botnets are exploiting a critical remote code execution vulnerability (CVE-2025-24016) in the open-source Wazuh XDR/SIEM platform, Akamai researchers have warned. What is Wazuh? Wazuh is a popular open-source security information and event management (SIEM) and extended detection and response (XDR) solution that’s widely used for host-based intrusion detection, log analysis, file integrity monitoring, and more. It’s core components are: Wazuh Manager (server component), which analyzes data and triggers alerts. Made to be installed … More →
The post Unpatched Wazuh servers targeted by Mirai botnets (CVE-2025-24016) appeared first on Help Net Security.
报名 | 美团技术沙龙第85期【AI+安全:智能技术在安全领域的应用探索】
Malicious Actors Exploit SoraAI’s Popularity & GitHub to Distribute Malware
Threat actors are leveraging the growing popularity of OpenAI’s Sora, a cutting-edge video generation model, to distribute malicious software. Disguised as a legitimate shortcut file named “SoraAI.lnk,” this information-stealing malware mimics the branding of Sora to trick users into initiating a multi-stage attack chain. Deceptive Tactics Target OpenAI’s Sora Brand First reported on VirusTotal from […]
The post Malicious Actors Exploit SoraAI’s Popularity & GitHub to Distribute Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Researcher Found Flaw to Discover Phone Numbers Linked to Any Google Account
Только начали карьеру в ИТ? Поздравляем — вы входите в список «легко заменяемых»
20 万一台的「人脑计算机」,可能是人类战胜 AI 的唯一方式?
全球六大AI安全智能体差异对比
按摩脸部和颈部或有助于大脑冲掉垃圾
CVE-2025-3117 | Schneider Electric Modicon Controllers M262 prior 5.3.12.51 cross site scripting (SEVD-2025-161-02)
CVE-2025-3905 | Schneider Electric Modicon Controllers LMC058 prior 5.3.12.51 PLC cross site scripting (SEVD-2025-161-02)
CVE-2025-5742 | Schneider Electric EVLink WallBox configuration cross site scripting (SEVD-2025-161-03)
CVE-2025-3899 | Schneider Electric Modicon Controllers M241/Modicon Controllers M251 prior 5.3.12.51 Webserver cross site scripting (SEVD-2025-161-02)
NHS: Blood Supply Still Affected by June 2024 Vendor Attack
The National Health System in England is still dealing with blood supply issues one year after a ransomware attack on a British pathology laboratory services provider disrupted patient care and testing services at several London-based hospitals and triggered a nationwide blood shortage.