Aggregator
CVE-2024-58105 | Trend Micro Apex One/Apex One as a Service Plug-in User Interface Manager incorrect user management
Cursor AI Code Editor Fixed Flaw Allowing Attackers to Run Commands via Prompt Injection
Hackers leak purported Aeroflot data as Russia denies breach
Железный занавес для Excel: Microsoft перекрывает хакерам кислород
CVE-2022-20920 | Cisco IOS/IOS XE SSH exceptional condition (cisco-sa-ssh-excpt-dos-FzOBQTnk)
CVE-2025-27405 | Icinga icingaweb2 up to 2.11.4/2.12.2 Setting cross site scripting
CVE-2025-27609 | Icinga icingaweb2 up to 2.11.4/2.12.2 cross site scripting
CVE-2025-20256 | Cisco Secure Network Analytics 7.4.1/7.4.2/7.5.0/7.5.1/7.5.2 Web-based Management Interface injection (cisco-sa-sna-ssti-dPuLqSmZ / EUVD-2025-16019)
CVE-2025-20129 | Cisco SocialMiner/Unified Contact Center Express Web-based Chat Interface information disclosure (cisco-sa-ccp-info-disc-ZyGerQpd / EUVD-2025-16892)
Storm-2603 Deploys Custom Malware Using BYOVD to Bypass Endpoint Protections
Check Point Research (CPR) has delved into the operations of Storm-2603, a recently identified threat actor linked to Chinese advanced persistent threat (APT) groups, amid widespread exploitation of Microsoft SharePoint Server vulnerabilities known as “ToolShell.” This campaign exploits four critical CVEs CVE-2025-49704, CVE-2025-49706, CVE-2025-53770, and CVE-2025-53771 to facilitate intrusions, with Storm-2603 deploying a custom command-and-control […]
The post Storm-2603 Deploys Custom Malware Using BYOVD to Bypass Endpoint Protections appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-7694 | Woffice Core Plugin up to 5.4.26 on WordPress woffice_file_manager_delete denial of service (EUVD-2025-23419)
CVE-2025-45767 | jose 6.0.10 inadequate encryption
CVE-2023-44976 | Hangzhou Shunwang Rentdrv2 prior 2024-12-24 exposed ioctl with insufficient access control (EUVD-2023-49299)
CVE-2025-20209 | Cisco IOS XR up to 24.2.11 IKEv2 allocation of resources (cisco-sa-xrike-9wYGpRGq)
CVE-2025-30164 | Icinga icingaweb2 up to 2.11.4/2.12.2 Command-Line Interface redirect
Exfiltrating Your ChatGPT Chat History and Memories With Prompt Injection
In this post we demonstrate how a bypass in OpenAI’s “safe URL” rendering feature allows ChatGPT to send personal information to a third-party server. This can be exploited by an adversary via a prompt injection via untrusted data.
If you process untrusted content, like summarizing a website, or analyze a pdf document, the author of that document can exfiltrate any information present in the prompt context, including your past chat history.
Было 69 отключений, стало 2099. Связь в России отключается всё чаще и громче
Overcoming the Limitations of Using AI Security in Telecom
Telecom firms face rising cyberthreats, growing regulatory pressure and shrinking budgets. But instead of chasing flashy solutions, the industry should focus on strengthening its security fundamentals, said Silke Holtmanns, telecommunication and critical infrastructure security expert at Blue Hour.
What Makes an AI Startup Fundable - From a VC Who Knows
Q2 2025 saw AI dominate global VC funding, grabbing $47.5 billion of the $94.6 billion raised. AI Investor Umesh Padval breaks down what makes AI infrastructure startups worth betting on - from platform depth and speed to regional ecosystems and exit timing.