Aggregator
CVE-2020-1008 | Microsoft Windows up to Server 2019 JET Database Engine memory corruption
CVE-2020-1049 | Microsoft Dynamics 365 9.0 cross site scripting
CVE-2020-1020 | Microsoft Windows up to Server 2019 Adobe Font Manager Library out-of-bounds write
Leading Through Uncertainty: AI, Risk, and Real Talk from RSAC’s Women in Cyber
Recapping Synack's Women in Cyber panel: Inside the hard conversations about AI risk, hiring struggles, and why resilience
The post Leading Through Uncertainty: AI, Risk, and Real Talk from RSAC’s Women in Cyber appeared first on Security Boulevard.
Researchers Turn the Tables: Scamming the Scammers in Telegram’s PigButchering Scheme
Cybersecurity specialists have devised an innovative approach to combat an emerging cybercrime called “PigButchering” on the Telegram platform. This form of cyber fraud involves scammers cultivating false relationships with victims over time, much like fattening a pig for slaughter, only to deceive and defraud them at the opportune moment. Digital Sleuths and the Cyber Swindle […]
The post Researchers Turn the Tables: Scamming the Scammers in Telegram’s PigButchering Scheme appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
利用pwntools脚本联动内置gdb函数优雅的调试docker中的pwn程序
CVE-2025-4432 | ring AES new_mask denial of service
CVE-2025-4434 | Remote Images Grabber Plugin up to 0.6 on WordPress cross site scripting
CVE-2025-3811 | WPBookit Plugin up to 1.0.2 on WordPress edit_newdata_customer_callback resource injection
CVE-2025-3810 | WPBookit Plugin up to 1.0.2 on WordPress edit_profile_data resource injection
CVE-2025-46441 | Section Widget Plugin up to 3.3.1 on WordPress path traversal
Indirect prompt injection attacks target common LLM data sources
While the shortest distance between two points is a straight line, a straight-line attack on a large language model isn't always the most efficient — and least noisy — way to get the LLM to do bad things. That's why malicious actors have been turning to indirect prompt injection attacks on LLMs.
The post Indirect prompt injection attacks target common LLM data sources appeared first on Security Boulevard.
CVE-2025-47730 | TeleMessage Archiving Backend up to 2025-05-05 API Call hard-coded credentials
CVE-2025-47729 | TeleMessage Archiving Backend up to 2025-05-05 wild backdoor
CVE-2025-3506 | Checkmk up to 2.1.0p50/2.2.0/2.3.0/2.4.0b5 exposure of sensitive system information to an unauthorized control sphere
New Spam Campaign Leverages Remote Monitoring Tools to Exploit Organizations
A sophisticated spam campaign targeting Portuguese-speaking users in Brazil has been uncovered by Cisco Talos, active since at least January 2025. This campaign exploits commercial remote monitoring and management (RMM) tools, such as PDQ Connect and N-able Remote Access, to gain unauthorized access to victims’ systems. The attackers, identified with high confidence as initial access […]
The post New Spam Campaign Leverages Remote Monitoring Tools to Exploit Organizations appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2024-6648 | Apollo Theme AP Page Builder up to 3.x JSON File Parser product_item_path path traversal
New Attack Exploits X/Twitter Ad URL Feature to Deceive Users
Silent Push Threat Analysts have recently exposed a sophisticated financial scam leveraging a vulnerability in X/Twitter’s advertising display URL feature to deceive users. This attack manipulates the platform’s URL display mechanism to present a legitimate-looking link, such as “From CNN[.]com,” while redirecting unsuspecting victims to a malicious cryptocurrency scam site impersonating Apple’s brand. This campaign, […]
The post New Attack Exploits X/Twitter Ad URL Feature to Deceive Users appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.