Aggregator
恶意npm包仿冒Nodemailer劫持加密货币
Soar is your Safest Bet
It’s the middle of the week, you are working on a project that needs to be done, and while you are trying to focus, you get the same phishing alert for the 10th time this week. Your team is drowning in noise, and you’re looking around thinking, ‘It’s 2025. There has to be an [...]
The post Soar is your Safest Bet appeared first on Hurricane Labs.
The post Soar is your Safest Bet appeared first on Security Boulevard.
史上最大规模DDoS攻击:Cloudflare成功拦截11.5 Tbps破纪录攻击
When Hackers Pivot and Hospitals Freeze: What the Latest Threats Reveal About Cybercrime’s New Playbook
What do a pharma firm, a hospital service provider, and your smart doorbell have in common? They were all targets in cyberattacks last month. Here’s the August end-of-month threat rundown from the ColorTokens Threat Advisory Team, a peek into how threat actors are rewriting the rules, one zero-day or botnet at a time. And if […]
The post When Hackers Pivot and Hospitals Freeze: What the Latest Threats Reveal About Cybercrime’s New Playbook appeared first on ColorTokens.
The post When Hackers Pivot and Hospitals Freeze: What the Latest Threats Reveal About Cybercrime’s New Playbook appeared first on Security Boulevard.
Attackers Are Abusing Malicious PDFs: Here’s How to Spot Them Early
Phishing has moved far beyond suspicious links. Today, attackers hide inside the files employees trust most; PDFs. On the surface, they look like invoices, contracts, or reports. But once opened, these documents can trigger hidden scripts, redirect to fake login pages, or quietly steal credentials. The danger lies in how convincing they are. PDFs often […]
The post Attackers Are Abusing Malicious PDFs: Here’s How to Spot Them Early appeared first on Cyber Security News.
CVE-2025-8701 | Wanzhou WOES Intelligent Optimization Energy Saving System GetPageList sql injection (EUVD-2025-23953)
CVE-2025-3831 | Check Point Harmony SASE Harmony SASE Agent information disclosure
CVE-2025-55287 | MGeurts genealogy up to 4.3.x cross site scripting (GHSA-j457-9m86-6q5r / EUVD-2025-25150)
CVE-2025-55288 | MGeurts genealogy up to 4.3.x cross site scripting (GHSA-3h8x-g9xj-rhwg / EUVD-2025-25149)
CVE-2025-52478 | n8n-io n8n up to 1.98.1 cross site scripting
CVE-2025-1139 | IBM Edge Application Manager 4.5 permission assignment
CVE-2025-9100 | zhenfeng13 My-Blog 1.0.0 Frontend Blog Article Comment /blog/comment authentication replay (Issue 149 / EUVD-2025-25111)
CVE-2025-9101 | zhenfeng13 My-Blog up to 1.0.0 Tag /admin/tags/save cross site scripting (Issue 147)
CVE-2025-8702 | Wanzhou WOES Intelligent Optimization Energy Saving System Historical Data Query GetVariableByOneIDNew sql injection (EUVD-2025-23971)
CVE-2025-8703 | Wanzhou WOES Intelligent Optimization Energy Saving System Environmental Real-Time Data GetAreaTrendChartData sql injection (EUVD-2025-23969)
CVE-2024-24915 | Check Point SmartConsole R81.10/R81.20/R82 sensitive information in memory (sk183545 / EUVD-2024-22278)
CVE-2025-32387 | Helm up to 3.17.2 JSON Schema File stack-based overflow (GHSA-5xqw-8hwv-wg92 / Nessus ID 237919)
CVE-2025-32386 | Helm up to 3.17.2 memory allocation (GHSA-4hfp-h4cw-hj8p / Nessus ID 237919)
House panel approves cyber information sharing, grant legislation as expiration deadlines loom
The Homeland Security Committee also voted out bills addressing pipeline cybersecurity and terrorists’ use of AI.
The post House panel approves cyber information sharing, grant legislation as expiration deadlines loom appeared first on CyberScoop.