Aggregator
CVE-2025-8949 | D-Link DIR-825 2.10 httpd ping_response.cgi get_ping_app_stat ping_ipaddr stack-based overflow
CVE-2025-8956 | D-Link DIR‑818L up to 1.05B01 ssdpcgi /htdocs/cgibin getenv command injection
Hackers Using Dedicated Phishlet to Launch FIDO Authentication Downgrade Attacks
A sophisticated new threat vector has emerged that could undermine one of the most trusted authentication methods in cybersecurity. FIDO-based passkeys, long considered the gold standard for phishing-resistant authentication, are now facing a potentially devastating attack technique that forces users to downgrade to less secure authentication methods. The attack exploits a critical vulnerability in FIDO […]
The post Hackers Using Dedicated Phishlet to Launch FIDO Authentication Downgrade Attacks appeared first on Cyber Security News.
FireWood Malware Targets Linux Systems for Command Execution and Data Theft
Intezer’s Research Team has uncovered a new, low-detection variant of the FireWood backdoor, a sophisticated Linux-based remote access trojan (RAT) initially discovered by ESET researchers. Linked to the “Project Wood” malware lineage dating back to 2005, FireWood is associated with espionage campaigns like Operation TooHash and shows low-confidence ties to the China-aligned Gelsemium APT group, […]
The post FireWood Malware Targets Linux Systems for Command Execution and Data Theft appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
The 6 Steps of the Third-Party Risk Management Lifecycle
Third-party risk management (TPRM) is no longer a periodic compliance exercise; it’s a strategic imperative. As organizations expand their digital ecosystems, managing third-party risk becomes more complex and critical. Siloed point solutions, manual processes, and fragmented oversight lead to blind spots that expose organizations to regulatory gaps and cybersecurity threats.
The post The 6 Steps of the Third-Party Risk Management Lifecycle appeared first on Security Boulevard.
Have You Turned Off Your Virtual Oven?
ANY.RUN & OpenCTI: Transform SOC for Maximum Performance
Editor’s note: The current article was originally published on March 11, 2024, and updated on August 14, 2025. Security Operations Centers (SOCs) face an overwhelming volume of threat alerts, making it difficult to separate real threats from false positives without heavy resource use. For teams already working with, or planning to adopt Filigran’s OpenCTI, ANY.RUN now […]
The post ANY.RUN & OpenCTI: Transform SOC for Maximum Performance appeared first on ANY.RUN's Cybersecurity Blog.
Jules Zombie Agent: From Prompt Injection to Remote Control
In the previous post, we explored two data exfiltration vectors that Jules is vulnerable to and that can be exploited via prompt injection. This post takes it further by demonstrating how Jules can be convinced to download malware and join a remote command & control server.
This research was performed in May 2025 and findings were shared with Google.
Remote Command & Control - Proof Of ConceptThe basic attack chain follows the classic AI Kill Chain:
CVE-2025-25256: FortiSIEM ломают без авторизации. Через один запрос к CLI-интерфейсу
Xerox FreeFlow Core Vulnerability Let Remote Attackers Execute Malicious Code – PoC Released
Critical vulnerabilities in Xerox FreeFlow Core, a widely-used print orchestration platform, allow unauthenticated remote attackers to execute malicious code on vulnerable systems. The flaws, tracked as CVE-2025-8355 and CVE-2025-8356, affect the JMF Client service and have been patched in FreeFlow Core version 8.0.5. Key Takeaways1. Two critical vulnerabilities in Xerox FreeFlow Core allow remote code […]
The post Xerox FreeFlow Core Vulnerability Let Remote Attackers Execute Malicious Code – PoC Released appeared first on Cyber Security News.
CVE-2025-8918 | Portabilis i-Educar up to 2.10 Editar Page educar_instituicao_cad.php neighborhood name cross site scripting
CVE-2025-8939 | Tenda AC20 up to 16.03.08.12 /goform/WifiGuestSet shareSpeed buffer overflow
CVE-2025-8940 | Tenda AC20 up to 16.03.08.12 saveParentControlInfo strcpy Time buffer overflow
CVE-2025-51452 | TOTOLINK A7000R 9.1.0u.6115_B20201022 Login formLoginAuth.htm improper authentication
CVE-2025-51451 | TOTOLINK EX1200T up to 4.1.2cu.5215 Login formLoginAuth.htm improper authentication
一个奇葩的xss
Splunk Release Guide for Defenders to Detect Suspicious Activity Before ESXi Ransomware Attack
A detailed security guide released by Splunk to help cybersecurity teams detect and prevent ransomware attacks targeting ESXi infrastructure before they can cause catastrophic damage. The guide comes as a response to increasing threats against VMware’s ESXi hypervisor systems, which have become prime targets for cybercriminals due to their centralized nature and often inadequate monitoring. […]
The post Splunk Release Guide for Defenders to Detect Suspicious Activity Before ESXi Ransomware Attack appeared first on Cyber Security News.